CN1485746A - Management system and method for user safety authority limit - Google Patents

Management system and method for user safety authority limit Download PDF

Info

Publication number
CN1485746A
CN1485746A CNA021348626A CN02134862A CN1485746A CN 1485746 A CN1485746 A CN 1485746A CN A021348626 A CNA021348626 A CN A021348626A CN 02134862 A CN02134862 A CN 02134862A CN 1485746 A CN1485746 A CN 1485746A
Authority
CN
China
Prior art keywords
user
role
database
password
ssl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA021348626A
Other languages
Chinese (zh)
Inventor
李忠一
叶建发
姜志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CNA021348626A priority Critical patent/CN1485746A/en
Publication of CN1485746A publication Critical patent/CN1485746A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The user authority safety management system and method, wherein the system comprises a plurality of client end computers, a distributed application program server and a data base, the user calls the application program device for proceeding operation definition and role definition through the user interface on the client end computer, and store the information into the database. The invention realizes the user authority control based the system operation, thus guaranteeing the expandability of the system.

Description

User right safety management system and method
[technical field]
The present invention particularly comes limited subscriber access and operated system and method about a kind of by user right is set about a kind of system and method for protecting computer system security.
[background technology]
For any computer information system, the security of system is all most important.Have much about the method that strengthens the computer information system security in the prior art, comprise access control list, group's control, user ID and password etc.The whole bag of tricks respectively has its relative merits.The access control table method is that all authorities and authority that the user allowed are shown in the table, goes on this basis to judge whether a user access is legal.The drawback of this method is user's authority to be safeguarded lack dirigibility.Group's control is to define each group's authority earlier, and then the user is added into relevant groups according to each user's demand, though flexible relatively than the access visit control table like this, all carry out allocation manager for the setting of group and the distribution of user right by the system manager.And user ID and password be with unencryption form storage, causes password stolen and cause security of system to be on the hazard easily.
The 6th of United States Patent (USP) trademark office bulletin in 25 days September calendar year 2001,295, No. 605 patents, patent name is " multi-level safety evaluating system and method " (Method and apparatus formulti-level security evaluation), provide a kind of in conjunction with various single methods, aforesaid access control list, group's control etc., utilize the advantage of each method on system handles speed that a kind of system and method that promotes safe handling speed is provided, this system is divided into multiclass with the user, has the different rights rank respectively; The system resource respective user classification that will visit simultaneously also is divided into multiclass, selects a suitable method to judge whether system's request of access allows according to certain rule then.This patented technology provides a kind of access control method to system resource, but system requirements not merely are single access control sometimes, also need control of authority is carried out in corresponding operation, as to a project management system, need control projects associative operation authority, said method goes management and control to seem unable to do what one wishes from the angle of restriction system resource, because the number of entry can get more and more, go definition very loaded down with trivial details one by one, dirigibility is not enough, and extensibility is bad.In addition; general privilege control system is all rare to provide the user cipher protection; like this user cipher in network transmission process and database side all be easy to be intercepted and destroy, so wish in above-mentioned user right managing and control system, to add the user cipher resist technology.
[summary of the invention]
User right safety management system of the present invention and method, it carries out the user right management and control based on system operation, guarantees the extensibility of system.
User right safety management system of the present invention and method, it encrypts user cipher, guarantees the security of password in Network Transmission and storing process.
The invention provides a kind of user right safety management system, it includes: many client computers, a distributed application program server and a database.Arbitrary client computer includes: an interactive user interface, and the user can send operation requests by it; One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption.Distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state; One data base encryption device is used for the password of unencrypted state is encrypted; One user authentication device is used for the identifying user identity legitimacy; One operation demonstration plant is used to verify user's operation validity.Database is used to store above-mentioned user ID and reaches the role who distributes for the user.Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, the password of storing in the password of described user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right safety management system, and it includes: many client computers, and interactive user interface is provided for it so that the user sends operation requests; One distributed application program server and a database.This distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One operation demonstration plant is used to the legitimacy of verifying that the user operates.This database is used to store the role of above-mentioned user ID and user's correspondence.Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: many client computers are provided, a distributed application program server is provided, and a database is provided.Arbitrary client computer includes: an interactive user interface, and the user uses and sends operation requests; One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption.Described distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state; One data base encryption device is used for the password of unencrypted state is encrypted; One user authentication device is used for the identifying user identity legitimacy; One operation demonstration plant is used to the legitimacy of verifying that the user operates.Described database is used to store the role of above-mentioned user ID and user's correspondence.The password of storing in the password of wherein said user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: many client computers are provided, and it provides interactive user interface, and the user uses and sends operation requests; One distributed application program server is provided, and a database is provided.Described distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One operation demonstration plant is used to the legitimacy of verifying that the user operates.Described database is used to store the role of above-mentioned user ID and user's correspondence.Wherein said operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: the operation of definition multiple systems; According to defined operation definition role, the set of corresponding a kind of operation of each role or multiple operation; For the user distributes the role, and the user role that this is distributed is stored to a database; Judge user's operation validity according to role that the user distributes.
By above user right safety management system and method thereof, go to define the user right scope from the angle of system operation, guarantee the system expandability.In addition, the user cipher that reaches in the data bank store status in the transmission course of networking is remained on a kind of encrypted state, guarantee the user cipher security.
[description of drawings]
Fig. 1 is user right safety management system hardware structure figure of the present invention.
Fig. 2 is the functional block diagram of user right safety management system of the present invention.
Fig. 3 is that the user cipher of user right method for managing security of the present invention is provided with process flow diagram.
Fig. 4 is that the user right of user right method for managing security of the present invention is safeguarded process flow diagram.
Fig. 5 is the checking process flow diagram of user right method for managing security of the present invention.
[embodiment]
As shown in Figure 1, be the hardware structure figure of user right safety management system of the present invention.Many client computers 10 link to each other with a distributed application program server 12 by network 11; This distributed application program server 12 links to each other with database 14 by connecting 13.Wherein, network 11 is a kind of electric networks, and it can be Intranet, Internet or other type network.Connecting 13 is that a kind of database connects, as the open type data storehouse connect (Open DatabaseConnectivity, ODBC), perhaps the Java database connect (Java Database Connectivity, JDBC) etc.Client computer 10 is for the user provides interactive user interface, and the user carries out user ID and password, user right setting and sends various operation requests by it.Distributed application program server 12 stores a series of software program means (shown in second figure), is used for user cipher encrypting and decrypting, subscriber authentication and the checking of user's operation validity etc.User ID that all set and password, user right are stored in the database 14.Input user ID and password during logging in system by user, distributed application program server 12 by user cipher in the Query Database and will with login the time input password compare the legitimacy of identifying user identity; When the user sent operation requests, distributed application program server 12 judged by user right in the Query Database whether this requested operation verifies the legitimacy of solicit operation in the extent of competence of setting.
As shown in Figure 2, be the functional block diagram of user right safety management system of the present invention.Client computer 10 comprises a user interface 101 and a SSL encryption device 102.Wherein user interface 101 provides an interactive user interface for the user, so that the user carries out corresponding operating.SSL encryption device 102 is used for the password of user input is encrypted, the security when guaranteeing this password by Network Transmission.Distributed application program server 12 includes authority setting device 121, safety feature 122 and demo plant 123.Wherein authority setting device 121 is used to be provided with user right, and it includes operation definition device 1211, role definition device 1212 and user management device 1213.Operation definition device 1211 is used for the define system operation, and the operation that all systems are relevant is pre-defined by the system designer, and is stored in the database 14.These operations include and Add User, distributing user role, project undertaking etc.Role definition device 1212 is used for the define system role.Each role is the set of one group of operation, has the user of authority to call this role definition device 1212 by user interface 101 and carries out role definition.User management device 1213 is used to increase newly, revises, deletes user and user role.As a newly-increased user, be required to be this user corresponding user ID and password are set, also need simultaneously for this user distributes a role, this role has promptly determined the executable opereating specification of this user.A user can distribute a plurality of roles, and its operation that can carry out is the union of the defined operational set of these a plurality of roles.Safety feature 122 is used for the encryption and the deciphering of relevant information, and it includes SSL decryption device 1221 and data base encryption device 1222.Wherein SSL decryption device 1221 is used for the user cipher of encrypting through SSL is decrypted.User cipher transfers to distributed application program server 12 by network 11 after client computer 10 carries out the SSL encryption, password after SSL decryption device 1221 will be encrypted is decrypted and is reduced into virgin state, then the password of this virgin state is encrypted by data base encryption device 1222 again, and the password storage after will encrypting is to database 14.Like this, user cipher all is in encrypted state at Network Transmission state and store status, has promoted the security of user cipher.Demo plant 123 is used for the legitimacy of the legitimacy of user identity and user's operation is verified respectively, includes user authentication device 1231 and operation demonstration plant 1232.Wherein user authentication device 1231 is used for the legitimacy of user identity is verified.When the user logins this system by a client computer, its input user ID and password, wherein user cipher is sent to distributed application program server 12 with user ID by network by behind the above-mentioned SSL cryptographic operation.The SSL decryption device 1221 of distributed application program server 12 is decrypted this SSL password, encrypts by data base encryption device 1222 again.User authentication device 1231 according in this user ID Query Database 14 corresponding to the user cipher of this user ID, the user cipher of storing in above-mentioned password after data base encryption device 1222 is encrypted and the database 14 is compared, if identical, then this user identity is legal; If inequality, prove that then user identity is illegal, system refuses it and logins.Operation demonstration plant 1232 is used to verify user's operation validity.Behind user's accessing system, send operation requests at client computer by corresponding action button, this operation requests is sent to distributed application program server 12 by network.Operation demonstration plant 1232 obtains the role of this user's correspondence according to this user ID Query Database, judges this user's requested operation whether in the defined opereating specification of this role, if, then user's operation requests approval, the user carries out corresponding operating; If not, then user's operation requests is rejected.
As shown in Figure 3, be that the user cipher of user right safety management system of the present invention is provided with process flow diagram.At first be password setting (step S30).For each user, unique one group of user ID and password are all arranged, its user ID is its identify label in this system.Add User for each, all can be endowed a user ID and initial password, the user can revise this initial password by user interface 101.The password that sets is encrypted (step S31) by SSL encryption device 102.Password after this encryption is sent to distributed application program server 12 (step S32) by network 11, is decrypted by the SSL decryption device 1221 in the distributed application program server 12 then and is reduced into original state (step S33).This original state password is encrypted once again by data base encryption device 1222, so that be stored in (step S34) in the database 14.This password that sets is saved in the database 14 at last.
As shown in Figure 4, be that the user right of user right safety management system of the present invention is safeguarded process flow diagram.At first, operate definition (step S40).The operation definition is finished in system design process.When system finished, all operations had all defined and have finished.Then carry out role definition (step S41), role definition is finished by the system manager, each role is the set of one group of operation, and the system manager can define multiple role according to system's actual demand, can also make amendment to the role who has defined and deletion action.Be safeguard (step S42) at last to user role.The maintenance of user role is included as the user and distributes operations such as new role, modification user role, deletion user role.When increasing a user newly, be required to be this new user's distributing user role, the user has just had the associative operation authority of this system like this.When user's request changes, can be by revising user role, distributing new role to come maintenance customer role to user and the existing role of deletion user.User and the role who distributes to this user are the relations of multi-to-multi, and promptly a role can distribute to a plurality of users simultaneously, and simultaneously, a user can be assigned with a plurality of roles.When deletion one user, the corresponding relation between this user and its role is also eliminated thereupon.Be kept in the database 14 after correspondence setting between user ID and the user role is good.
As shown in Figure 5, be the checking process flow diagram of user right safety management system of the present invention.In this flow process 5, at first, the user logins this system (step S50) by the user interface of client computer 10, the user inputs user ID and password, this password carries out SSL by SSL encryption device 102 to be encrypted, and is sent to distributed application program server 12 by network 11 together by the user cipher after this user ID and the encryption then and carries out subscriber authentication (step S51).SSL decryption device 1221 in the distributed application program server 12 is decrypted this password that is in the SSL encrypted state and is reduced into virgin state, and then encrypts by data base encryption device 1222.Simultaneously the user authentication device 1231 in the distributed application program server 12 according to store in this user ID Query Database with the corresponding user cipher of this user ID, then above-mentioned password and this user cipher after encrypting by data base encryption device 1222 compared (step S52), if it is identical, prove that then user identity is legal, allow its accessing system; If inequality, prove that then user identity is illegal, the refusing user's accessing system.Behind user's accessing system, send operation requests (step S53) by user interface 101, this operation requests is sent to distributed application program server 12 by network 11, carries out operation validity checking (step S54).Operation demonstration plant 1232 is according to the user role of storage in the user ID Query Database 14, judge then whether user's requested operation belongs to the defined opereating specification of this user role (step S55), if, prove that then this operation is legal, allow this operation to carry out (step 56); If not, prove that then this operation is illegal, refuse this operation and carry out (step 57).After maybe this operation was rejected after this operation was finished, the user can judge whether to send another operation requests (step S58) as required, and if desired, then flow process 5 is back to step S53, repeated the aforesaid operations step; If do not need, then this flow process 5 finishes.

Claims (7)

1. user right safety management system is characterized in that comprising:
Many client computers, every client computer comprises:
One interactive user interface, the user can send operation requests by this interactive user interface;
One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption;
One distributed application program server, it includes:
One operation definition device, definition has the multiple systems operation;
It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation;
One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user;
One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state;
One data base encryption device is used for the password of unencrypted state is encrypted;
One user authentication device is used for the identifying user identity legitimacy;
One operation demonstration plant is used to the legitimacy of verifying that the user operates;
One database is used to store the role of above-mentioned user ID and user's correspondence;
Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, the password of storing in the password of described user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
2. user right safety management system as claimed in claim 1, it is characterized in that: the user sets user cipher by interactive user interface invoke user management devices, after this user cipher is encrypted by the SSL encryption device, and be transmitted through the network to distributed application program server, be decrypted by the SSL decryption device then and be reduced into unencrypted state, be saved to database after encrypting by the data base encryption device again.
3. user right safety management system is characterized in that comprising:
Many client computers, interactive user interface is provided for it so that the user sends operation requests;
One distributed application program server, it includes:
One operation definition device, definition has the multiple systems operation;
It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation;
One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user;
One operation demonstration plant is used to the legitimacy of verifying that the user operates;
One database is used to store the role of above-mentioned user ID and user's correspondence;
Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
4. user right method for managing security is characterized in that being achieved as follows step by a user right safety management system:
The operation of definition multiple systems;
According to defined operation definition role, the set of corresponding a kind of operation of each role or multiple operation;
For the user distributes the role, and the user role that this is distributed is stored to a database;
Judge user's operation validity according to the user role of storing in the database.
5. user right method for managing security as claimed in claim 4 is characterized in that: judge that wherein user's operation validity comprises the steps:
Send operation requests;
The user role corresponding in the Query Database with the user;
Judge this operation requests whether in the defined opereating specification of user role, if this operation requests is in the defined opereating specification of user role, it is legal to operate, and is allowed to carry out;
If this operation requests is not in the defined opereating specification of user role, operate illegally, be rejected execution.
6. user right method for managing security as claimed in claim 4 is characterized in that also being achieved as follows step by the SSL encryption device of storing on the client computer, the SSL decryption device that is stored in distributed application program server and data base encryption device:
By client computer user cipher is set;
The SSL encryption device carries out SSL with user cipher and encrypts;
Password after the encryption is transmitted through the network to distributed application program server to carry out SSL deciphering by the SSL decryption device and is reduced into unencrypted state, and the password of this unencrypted state is stored to database after being encrypted to another kind of form by the data base encryption device again;
When the user logins, with the password of storing in the password of user input and the database identifying user identity legitimacy of comparing.
7. user right method for managing security as claimed in claim 6 is characterized in that: wherein the identifying user identity legitimacy includes following steps:
The user inputs user ID and password;
Be transmitted through the network to distributed application program server after this password is encrypted by SSL and carry out the SSL deciphering and be reduced into unencrypted state, the password of this unencrypted state is encrypted to another kind of encrypted state again;
The user cipher of storing in the Query Database compares this user cipher and the described password that is in another kind of encrypted state, if user cipher is consistent with the described password that is in another kind of encrypted state, then user identity is legal;
If user cipher and the described password that is in another kind of encrypted state are inconsistent, then user identity is illegal.
CNA021348626A 2002-09-27 2002-09-27 Management system and method for user safety authority limit Pending CN1485746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA021348626A CN1485746A (en) 2002-09-27 2002-09-27 Management system and method for user safety authority limit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA021348626A CN1485746A (en) 2002-09-27 2002-09-27 Management system and method for user safety authority limit

Publications (1)

Publication Number Publication Date
CN1485746A true CN1485746A (en) 2004-03-31

Family

ID=34145985

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA021348626A Pending CN1485746A (en) 2002-09-27 2002-09-27 Management system and method for user safety authority limit

Country Status (1)

Country Link
CN (1) CN1485746A (en)

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100354790C (en) * 2004-09-13 2007-12-12 阿鲁策株式会社 Information process device
CN100381964C (en) * 2003-12-26 2008-04-16 华为技术有限公司 A user right management method
CN100437607C (en) * 2005-12-07 2008-11-26 华为技术有限公司 Method and system for processing virtual article data
CN100464338C (en) * 2007-06-25 2009-02-25 浪潮集团山东通用软件有限公司 Method for binding security mechanism of application software and large database
CN100464336C (en) * 2005-06-14 2009-02-25 华为技术有限公司 Method for controlling system account right
US7530113B2 (en) 2004-07-29 2009-05-05 Rockwell Automation Technologies, Inc. Security system and method for an industrial automation system
WO2009100678A1 (en) * 2008-02-15 2009-08-20 Sursen Corp. Method, system and document base for controlling document base access security
CN101359355B (en) * 2007-08-02 2010-07-14 芯微技术(深圳)有限公司 Method for raising user's authority for limitation account under Windows system
CN101409642B (en) * 2008-11-21 2010-11-17 深圳市华冠电气有限公司 Data service system and administrative operation method
CN101945108A (en) * 2010-09-14 2011-01-12 中兴通讯股份有限公司 Method and system for controlling authority in LDAP server
CN101312396B (en) * 2007-05-24 2011-01-19 中兴通讯股份有限公司 Electronic workform management system and resource authority control method thereof
CN1570942B (en) * 2004-04-29 2011-01-19 北京交通大学 A distributed intelligent traffic data processing system
CN101043319B (en) * 2006-03-22 2011-02-02 鸿富锦精密工业(深圳)有限公司 Digital content protective system and method
CN102053969A (en) * 2009-10-28 2011-05-11 上海宝信软件股份有限公司 Web ERP (enterprise resource planning) user right management system
CN102064953A (en) * 2009-11-12 2011-05-18 中兴通讯股份有限公司 System, device and method for configuring user right information of lightweight directory access protocol (ldap) server
CN101452514B (en) * 2007-12-06 2011-06-29 中国长城计算机深圳股份有限公司 User data protection method for safety computer
CN102118697A (en) * 2009-12-22 2011-07-06 索尼公司 Wireless communication device, wireless communication method, program, and wireless communication system
CN101060519B (en) * 2006-04-19 2011-08-17 上海贝尔阿尔卡特股份有限公司 A control method and its device for the user to dial with the specified dialing program
CN101656736B (en) * 2009-08-28 2012-01-25 深圳市茁壮网络股份有限公司 Device and method for processing service data, and service processing system
CN102457503A (en) * 2010-10-29 2012-05-16 镇江雅迅软件有限责任公司 Secret key control device based on file authority management
CN102882870A (en) * 2012-09-25 2013-01-16 鸿富锦精密工业(深圳)有限公司 Account managing system and method
US8396942B2 (en) 2004-12-01 2013-03-12 Canon Kabushiki Kaisha Web browser operation method and operation apparatus
WO2013053269A1 (en) * 2011-10-12 2013-04-18 惠州Tcl移动通信有限公司 Wireless communication device and configuration method thereof
WO2013063944A1 (en) * 2011-10-31 2013-05-10 腾讯科技(深圳)有限公司 Right management method and system, and computer storage medium
CN103617381A (en) * 2013-11-21 2014-03-05 北京奇虎科技有限公司 Permission configuration method and permission configuration system of equipment
CN103632082A (en) * 2013-12-10 2014-03-12 惠州华阳通用电子有限公司 Universal permission management system and universal permission management method
CN102130961B (en) * 2005-11-17 2014-07-16 三星电子株式会社 Apparatus and method for managing user interface
CN104335523A (en) * 2014-04-15 2015-02-04 华为技术有限公司 Access control method, client and server
CN104506320A (en) * 2014-12-15 2015-04-08 山东中创软件工程股份有限公司 Method and system for identity authentication
CN104732314A (en) * 2013-12-20 2015-06-24 国家电网公司 User management method and system
CN101079738B (en) * 2006-05-26 2015-11-25 艾优克服务有限公司 Use the network management software as the safety communication channel of network management basics
CN105117655A (en) * 2015-07-31 2015-12-02 成都亿信标准认证集团有限公司 Project storage server with good confidentiality
CN105162617A (en) * 2015-07-31 2015-12-16 成都亿信标准认证集团有限公司 Background management device with project backup function
CN105303084A (en) * 2015-09-24 2016-02-03 北京奇虎科技有限公司 Privilege management system and method
CN105528556A (en) * 2015-12-03 2016-04-27 中国人民解放军信息工程大学 Hybrid SQLite3 safety access method
CN105871807A (en) * 2015-12-14 2016-08-17 乐视云计算有限公司 Anti-stealing-link method, device and system
CN106254306A (en) * 2015-06-03 2016-12-21 西门子公司 For discharging client device and the server apparatus of the function of client safely
CN108009210A (en) * 2017-11-08 2018-05-08 狐狸金服(北京)信息技术咨询有限公司 A kind of data access arrangement and method
CN108183894A (en) * 2017-12-26 2018-06-19 深圳市海恒智能科技有限公司 The right management method and device of book self-help equipment
CN108848117A (en) * 2018-09-14 2018-11-20 南京理工技术转移中心有限公司 A kind of cultivation surroundings monitoring system and its working method
CN108879966A (en) * 2018-09-14 2018-11-23 南京理工技术转移中心有限公司 A kind of electric power cabinet use environment monitoring system and its working method
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN109186040A (en) * 2018-09-14 2019-01-11 南京理工技术转移中心有限公司 A kind of metro environment remote monitoring system and its working method
CN110445775A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Method and apparatus for account management
TWI696932B (en) * 2018-11-14 2020-06-21 中華電信股份有限公司 System for providing multi-authentication management in a multi-tenant environment and method thereof
CN113127850A (en) * 2021-04-12 2021-07-16 西安赤鸾信息科技有限公司 Browser password filling interaction control method and device
CN113132369A (en) * 2021-04-12 2021-07-16 西安赤鸾信息科技有限公司 Android mobile phone password automatic filling method and device
CN113225317A (en) * 2021-04-12 2021-08-06 西安赤鸾信息科技有限公司 iPhone mobile phone password automatic filling method and device
TWI736832B (en) * 2019-01-29 2021-08-21 台灣房屋仲介股份有限公司 System for interactively providing real estate agency information
US11196745B2 (en) 2019-07-24 2021-12-07 Advanced New Technologies Co., Ltd. Blockchain-based account management

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100381964C (en) * 2003-12-26 2008-04-16 华为技术有限公司 A user right management method
CN1570942B (en) * 2004-04-29 2011-01-19 北京交通大学 A distributed intelligent traffic data processing system
US7530113B2 (en) 2004-07-29 2009-05-05 Rockwell Automation Technologies, Inc. Security system and method for an industrial automation system
CN1737719B (en) * 2004-07-29 2010-10-06 洛克威尔自动控制技术股份有限公司 Security system and method for an industrial automation system
CN100354790C (en) * 2004-09-13 2007-12-12 阿鲁策株式会社 Information process device
US9317187B2 (en) 2004-12-01 2016-04-19 Canon Kabushiki Kaisha Web browser operation method and operation apparatus
US8396942B2 (en) 2004-12-01 2013-03-12 Canon Kabushiki Kaisha Web browser operation method and operation apparatus
CN100464336C (en) * 2005-06-14 2009-02-25 华为技术有限公司 Method for controlling system account right
CN102130961B (en) * 2005-11-17 2014-07-16 三星电子株式会社 Apparatus and method for managing user interface
CN100437607C (en) * 2005-12-07 2008-11-26 华为技术有限公司 Method and system for processing virtual article data
CN101043319B (en) * 2006-03-22 2011-02-02 鸿富锦精密工业(深圳)有限公司 Digital content protective system and method
CN101060519B (en) * 2006-04-19 2011-08-17 上海贝尔阿尔卡特股份有限公司 A control method and its device for the user to dial with the specified dialing program
CN101079738B (en) * 2006-05-26 2015-11-25 艾优克服务有限公司 Use the network management software as the safety communication channel of network management basics
CN101312396B (en) * 2007-05-24 2011-01-19 中兴通讯股份有限公司 Electronic workform management system and resource authority control method thereof
CN100464338C (en) * 2007-06-25 2009-02-25 浪潮集团山东通用软件有限公司 Method for binding security mechanism of application software and large database
CN101359355B (en) * 2007-08-02 2010-07-14 芯微技术(深圳)有限公司 Method for raising user's authority for limitation account under Windows system
CN101452514B (en) * 2007-12-06 2011-06-29 中国长城计算机深圳股份有限公司 User data protection method for safety computer
WO2009100678A1 (en) * 2008-02-15 2009-08-20 Sursen Corp. Method, system and document base for controlling document base access security
CN101409642B (en) * 2008-11-21 2010-11-17 深圳市华冠电气有限公司 Data service system and administrative operation method
CN101656736B (en) * 2009-08-28 2012-01-25 深圳市茁壮网络股份有限公司 Device and method for processing service data, and service processing system
CN102053969A (en) * 2009-10-28 2011-05-11 上海宝信软件股份有限公司 Web ERP (enterprise resource planning) user right management system
WO2011057488A1 (en) * 2009-11-12 2011-05-19 中兴通讯股份有限公司 System, apparatus and method for configuring user authority information of lightweight directory access protocol server
CN102064953A (en) * 2009-11-12 2011-05-18 中兴通讯股份有限公司 System, device and method for configuring user right information of lightweight directory access protocol (ldap) server
CN102118697A (en) * 2009-12-22 2011-07-06 索尼公司 Wireless communication device, wireless communication method, program, and wireless communication system
CN102118697B (en) * 2009-12-22 2016-12-21 索尼公司 Wireless Telecom Equipment, wireless communications method and wireless communication system
CN101945108A (en) * 2010-09-14 2011-01-12 中兴通讯股份有限公司 Method and system for controlling authority in LDAP server
CN102457503A (en) * 2010-10-29 2012-05-16 镇江雅迅软件有限责任公司 Secret key control device based on file authority management
WO2013053269A1 (en) * 2011-10-12 2013-04-18 惠州Tcl移动通信有限公司 Wireless communication device and configuration method thereof
WO2013063944A1 (en) * 2011-10-31 2013-05-10 腾讯科技(深圳)有限公司 Right management method and system, and computer storage medium
CN102882870A (en) * 2012-09-25 2013-01-16 鸿富锦精密工业(深圳)有限公司 Account managing system and method
CN103617381A (en) * 2013-11-21 2014-03-05 北京奇虎科技有限公司 Permission configuration method and permission configuration system of equipment
CN103632082A (en) * 2013-12-10 2014-03-12 惠州华阳通用电子有限公司 Universal permission management system and universal permission management method
CN103632082B (en) * 2013-12-10 2016-08-17 惠州华阳通用电子有限公司 A kind of general-purpose rights management system and method
CN104732314A (en) * 2013-12-20 2015-06-24 国家电网公司 User management method and system
CN104335523A (en) * 2014-04-15 2015-02-04 华为技术有限公司 Access control method, client and server
CN104335523B (en) * 2014-04-15 2018-08-21 华为技术有限公司 A kind of authority control method, client and server
US10237267B2 (en) 2014-04-15 2019-03-19 Huawei Technologies Co., Ltd. Rights control method, client, and server
CN104506320B (en) * 2014-12-15 2018-04-17 山东中创软件工程股份有限公司 A kind of identity authentication method and system
CN104506320A (en) * 2014-12-15 2015-04-08 山东中创软件工程股份有限公司 Method and system for identity authentication
CN106254306A (en) * 2015-06-03 2016-12-21 西门子公司 For discharging client device and the server apparatus of the function of client safely
US10284546B2 (en) 2015-06-03 2019-05-07 Siemens Aktiengesellschaft Client device and server device for the secured activation of functions of a client
CN105117655A (en) * 2015-07-31 2015-12-02 成都亿信标准认证集团有限公司 Project storage server with good confidentiality
CN105162617A (en) * 2015-07-31 2015-12-16 成都亿信标准认证集团有限公司 Background management device with project backup function
CN105303084A (en) * 2015-09-24 2016-02-03 北京奇虎科技有限公司 Privilege management system and method
CN105528556A (en) * 2015-12-03 2016-04-27 中国人民解放军信息工程大学 Hybrid SQLite3 safety access method
CN105871807A (en) * 2015-12-14 2016-08-17 乐视云计算有限公司 Anti-stealing-link method, device and system
CN108009210A (en) * 2017-11-08 2018-05-08 狐狸金服(北京)信息技术咨询有限公司 A kind of data access arrangement and method
CN108183894A (en) * 2017-12-26 2018-06-19 深圳市海恒智能科技有限公司 The right management method and device of book self-help equipment
CN108183894B (en) * 2017-12-26 2021-03-05 深圳市海恒智能科技有限公司 Authority management method and device of book self-service equipment
CN108879966A (en) * 2018-09-14 2018-11-23 南京理工技术转移中心有限公司 A kind of electric power cabinet use environment monitoring system and its working method
CN109186040A (en) * 2018-09-14 2019-01-11 南京理工技术转移中心有限公司 A kind of metro environment remote monitoring system and its working method
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN108848117A (en) * 2018-09-14 2018-11-20 南京理工技术转移中心有限公司 A kind of cultivation surroundings monitoring system and its working method
TWI696932B (en) * 2018-11-14 2020-06-21 中華電信股份有限公司 System for providing multi-authentication management in a multi-tenant environment and method thereof
TWI736832B (en) * 2019-01-29 2021-08-21 台灣房屋仲介股份有限公司 System for interactively providing real estate agency information
CN110445775A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Method and apparatus for account management
US11196745B2 (en) 2019-07-24 2021-12-07 Advanced New Technologies Co., Ltd. Blockchain-based account management
CN113127850A (en) * 2021-04-12 2021-07-16 西安赤鸾信息科技有限公司 Browser password filling interaction control method and device
CN113132369A (en) * 2021-04-12 2021-07-16 西安赤鸾信息科技有限公司 Android mobile phone password automatic filling method and device
CN113225317A (en) * 2021-04-12 2021-08-06 西安赤鸾信息科技有限公司 iPhone mobile phone password automatic filling method and device

Similar Documents

Publication Publication Date Title
CN1485746A (en) Management system and method for user safety authority limit
CN109670768A (en) Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain
CN111783075B (en) Authority management method, device and medium based on secret key and electronic equipment
US8136166B2 (en) Installation of black box for trusted component for digital rights management (DRM) on computing device
US6532543B1 (en) System and method for installing an auditable secure network
US6795855B2 (en) Non-root users execution of root commands
US6678682B1 (en) Method, system, and software for enterprise access management control
CN111064718B (en) Dynamic authorization method and system based on user context and policy
CN101442404B (en) Multilevel management system and method for license
CN112464212B (en) Data authority control reconstruction method based on mature complex service system
WO2001082092A1 (en) Secure system access
CN105915338A (en) Key generation method and key generation system
US20030229782A1 (en) Method for computer identification verification
TW583559B (en) Authorization and security management system and method
CN111737232A (en) Database management method, system, device, equipment and computer storage medium
CN114866346B (en) Password service platform based on decentralization
CN110851837B (en) Self-service equipment based on trusted computing, and security management system and method thereof
CN112925645A (en) Method and system for automatically constructing cloud access control
CN114881469A (en) Performance assessment and management system and method for enterprise workers
CN111159736B (en) Application control method and system of block chain
CN109802927A (en) A kind of security service providing method and device
CN116438778A (en) Persistent source value of assumed alternate identity
Ashraf et al. Transparency service model for data security in cloud computing
CN1567300A (en) Database using right inquiry system and method
CN114785553A (en) Authority authentication method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication