CN1485746A - Management system and method for user safety authority limit - Google Patents
Management system and method for user safety authority limit Download PDFInfo
- Publication number
- CN1485746A CN1485746A CNA021348626A CN02134862A CN1485746A CN 1485746 A CN1485746 A CN 1485746A CN A021348626 A CNA021348626 A CN A021348626A CN 02134862 A CN02134862 A CN 02134862A CN 1485746 A CN1485746 A CN 1485746A
- Authority
- CN
- China
- Prior art keywords
- user
- role
- database
- password
- ssl
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The user authority safety management system and method, wherein the system comprises a plurality of client end computers, a distributed application program server and a data base, the user calls the application program device for proceeding operation definition and role definition through the user interface on the client end computer, and store the information into the database. The invention realizes the user authority control based the system operation, thus guaranteeing the expandability of the system.
Description
[technical field]
The present invention particularly comes limited subscriber access and operated system and method about a kind of by user right is set about a kind of system and method for protecting computer system security.
[background technology]
For any computer information system, the security of system is all most important.Have much about the method that strengthens the computer information system security in the prior art, comprise access control list, group's control, user ID and password etc.The whole bag of tricks respectively has its relative merits.The access control table method is that all authorities and authority that the user allowed are shown in the table, goes on this basis to judge whether a user access is legal.The drawback of this method is user's authority to be safeguarded lack dirigibility.Group's control is to define each group's authority earlier, and then the user is added into relevant groups according to each user's demand, though flexible relatively than the access visit control table like this, all carry out allocation manager for the setting of group and the distribution of user right by the system manager.And user ID and password be with unencryption form storage, causes password stolen and cause security of system to be on the hazard easily.
The 6th of United States Patent (USP) trademark office bulletin in 25 days September calendar year 2001,295, No. 605 patents, patent name is " multi-level safety evaluating system and method " (Method and apparatus formulti-level security evaluation), provide a kind of in conjunction with various single methods, aforesaid access control list, group's control etc., utilize the advantage of each method on system handles speed that a kind of system and method that promotes safe handling speed is provided, this system is divided into multiclass with the user, has the different rights rank respectively; The system resource respective user classification that will visit simultaneously also is divided into multiclass, selects a suitable method to judge whether system's request of access allows according to certain rule then.This patented technology provides a kind of access control method to system resource, but system requirements not merely are single access control sometimes, also need control of authority is carried out in corresponding operation, as to a project management system, need control projects associative operation authority, said method goes management and control to seem unable to do what one wishes from the angle of restriction system resource, because the number of entry can get more and more, go definition very loaded down with trivial details one by one, dirigibility is not enough, and extensibility is bad.In addition; general privilege control system is all rare to provide the user cipher protection; like this user cipher in network transmission process and database side all be easy to be intercepted and destroy, so wish in above-mentioned user right managing and control system, to add the user cipher resist technology.
[summary of the invention]
User right safety management system of the present invention and method, it carries out the user right management and control based on system operation, guarantees the extensibility of system.
User right safety management system of the present invention and method, it encrypts user cipher, guarantees the security of password in Network Transmission and storing process.
The invention provides a kind of user right safety management system, it includes: many client computers, a distributed application program server and a database.Arbitrary client computer includes: an interactive user interface, and the user can send operation requests by it; One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption.Distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state; One data base encryption device is used for the password of unencrypted state is encrypted; One user authentication device is used for the identifying user identity legitimacy; One operation demonstration plant is used to verify user's operation validity.Database is used to store above-mentioned user ID and reaches the role who distributes for the user.Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, the password of storing in the password of described user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right safety management system, and it includes: many client computers, and interactive user interface is provided for it so that the user sends operation requests; One distributed application program server and a database.This distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One operation demonstration plant is used to the legitimacy of verifying that the user operates.This database is used to store the role of above-mentioned user ID and user's correspondence.Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: many client computers are provided, a distributed application program server is provided, and a database is provided.Arbitrary client computer includes: an interactive user interface, and the user uses and sends operation requests; One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption.Described distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state; One data base encryption device is used for the password of unencrypted state is encrypted; One user authentication device is used for the identifying user identity legitimacy; One operation demonstration plant is used to the legitimacy of verifying that the user operates.Described database is used to store the role of above-mentioned user ID and user's correspondence.The password of storing in the password of wherein said user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: many client computers are provided, and it provides interactive user interface, and the user uses and sends operation requests; One distributed application program server is provided, and a database is provided.Described distributed application program server includes: an operation definition device, and definition has the multiple systems operation; It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation; One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user; One operation demonstration plant is used to the legitimacy of verifying that the user operates.Described database is used to store the role of above-mentioned user ID and user's correspondence.Wherein said operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
The present invention also provides a kind of user right method for managing security, and it includes: the operation of definition multiple systems; According to defined operation definition role, the set of corresponding a kind of operation of each role or multiple operation; For the user distributes the role, and the user role that this is distributed is stored to a database; Judge user's operation validity according to role that the user distributes.
By above user right safety management system and method thereof, go to define the user right scope from the angle of system operation, guarantee the system expandability.In addition, the user cipher that reaches in the data bank store status in the transmission course of networking is remained on a kind of encrypted state, guarantee the user cipher security.
[description of drawings]
Fig. 1 is user right safety management system hardware structure figure of the present invention.
Fig. 2 is the functional block diagram of user right safety management system of the present invention.
Fig. 3 is that the user cipher of user right method for managing security of the present invention is provided with process flow diagram.
Fig. 4 is that the user right of user right method for managing security of the present invention is safeguarded process flow diagram.
Fig. 5 is the checking process flow diagram of user right method for managing security of the present invention.
[embodiment]
As shown in Figure 1, be the hardware structure figure of user right safety management system of the present invention.Many client computers 10 link to each other with a distributed application program server 12 by network 11; This distributed application program server 12 links to each other with database 14 by connecting 13.Wherein, network 11 is a kind of electric networks, and it can be Intranet, Internet or other type network.Connecting 13 is that a kind of database connects, as the open type data storehouse connect (Open DatabaseConnectivity, ODBC), perhaps the Java database connect (Java Database Connectivity, JDBC) etc.Client computer 10 is for the user provides interactive user interface, and the user carries out user ID and password, user right setting and sends various operation requests by it.Distributed application program server 12 stores a series of software program means (shown in second figure), is used for user cipher encrypting and decrypting, subscriber authentication and the checking of user's operation validity etc.User ID that all set and password, user right are stored in the database 14.Input user ID and password during logging in system by user, distributed application program server 12 by user cipher in the Query Database and will with login the time input password compare the legitimacy of identifying user identity; When the user sent operation requests, distributed application program server 12 judged by user right in the Query Database whether this requested operation verifies the legitimacy of solicit operation in the extent of competence of setting.
As shown in Figure 2, be the functional block diagram of user right safety management system of the present invention.Client computer 10 comprises a user interface 101 and a SSL encryption device 102.Wherein user interface 101 provides an interactive user interface for the user, so that the user carries out corresponding operating.SSL encryption device 102 is used for the password of user input is encrypted, the security when guaranteeing this password by Network Transmission.Distributed application program server 12 includes authority setting device 121, safety feature 122 and demo plant 123.Wherein authority setting device 121 is used to be provided with user right, and it includes operation definition device 1211, role definition device 1212 and user management device 1213.Operation definition device 1211 is used for the define system operation, and the operation that all systems are relevant is pre-defined by the system designer, and is stored in the database 14.These operations include and Add User, distributing user role, project undertaking etc.Role definition device 1212 is used for the define system role.Each role is the set of one group of operation, has the user of authority to call this role definition device 1212 by user interface 101 and carries out role definition.User management device 1213 is used to increase newly, revises, deletes user and user role.As a newly-increased user, be required to be this user corresponding user ID and password are set, also need simultaneously for this user distributes a role, this role has promptly determined the executable opereating specification of this user.A user can distribute a plurality of roles, and its operation that can carry out is the union of the defined operational set of these a plurality of roles.Safety feature 122 is used for the encryption and the deciphering of relevant information, and it includes SSL decryption device 1221 and data base encryption device 1222.Wherein SSL decryption device 1221 is used for the user cipher of encrypting through SSL is decrypted.User cipher transfers to distributed application program server 12 by network 11 after client computer 10 carries out the SSL encryption, password after SSL decryption device 1221 will be encrypted is decrypted and is reduced into virgin state, then the password of this virgin state is encrypted by data base encryption device 1222 again, and the password storage after will encrypting is to database 14.Like this, user cipher all is in encrypted state at Network Transmission state and store status, has promoted the security of user cipher.Demo plant 123 is used for the legitimacy of the legitimacy of user identity and user's operation is verified respectively, includes user authentication device 1231 and operation demonstration plant 1232.Wherein user authentication device 1231 is used for the legitimacy of user identity is verified.When the user logins this system by a client computer, its input user ID and password, wherein user cipher is sent to distributed application program server 12 with user ID by network by behind the above-mentioned SSL cryptographic operation.The SSL decryption device 1221 of distributed application program server 12 is decrypted this SSL password, encrypts by data base encryption device 1222 again.User authentication device 1231 according in this user ID Query Database 14 corresponding to the user cipher of this user ID, the user cipher of storing in above-mentioned password after data base encryption device 1222 is encrypted and the database 14 is compared, if identical, then this user identity is legal; If inequality, prove that then user identity is illegal, system refuses it and logins.Operation demonstration plant 1232 is used to verify user's operation validity.Behind user's accessing system, send operation requests at client computer by corresponding action button, this operation requests is sent to distributed application program server 12 by network.Operation demonstration plant 1232 obtains the role of this user's correspondence according to this user ID Query Database, judges this user's requested operation whether in the defined opereating specification of this role, if, then user's operation requests approval, the user carries out corresponding operating; If not, then user's operation requests is rejected.
As shown in Figure 3, be that the user cipher of user right safety management system of the present invention is provided with process flow diagram.At first be password setting (step S30).For each user, unique one group of user ID and password are all arranged, its user ID is its identify label in this system.Add User for each, all can be endowed a user ID and initial password, the user can revise this initial password by user interface 101.The password that sets is encrypted (step S31) by SSL encryption device 102.Password after this encryption is sent to distributed application program server 12 (step S32) by network 11, is decrypted by the SSL decryption device 1221 in the distributed application program server 12 then and is reduced into original state (step S33).This original state password is encrypted once again by data base encryption device 1222, so that be stored in (step S34) in the database 14.This password that sets is saved in the database 14 at last.
As shown in Figure 4, be that the user right of user right safety management system of the present invention is safeguarded process flow diagram.At first, operate definition (step S40).The operation definition is finished in system design process.When system finished, all operations had all defined and have finished.Then carry out role definition (step S41), role definition is finished by the system manager, each role is the set of one group of operation, and the system manager can define multiple role according to system's actual demand, can also make amendment to the role who has defined and deletion action.Be safeguard (step S42) at last to user role.The maintenance of user role is included as the user and distributes operations such as new role, modification user role, deletion user role.When increasing a user newly, be required to be this new user's distributing user role, the user has just had the associative operation authority of this system like this.When user's request changes, can be by revising user role, distributing new role to come maintenance customer role to user and the existing role of deletion user.User and the role who distributes to this user are the relations of multi-to-multi, and promptly a role can distribute to a plurality of users simultaneously, and simultaneously, a user can be assigned with a plurality of roles.When deletion one user, the corresponding relation between this user and its role is also eliminated thereupon.Be kept in the database 14 after correspondence setting between user ID and the user role is good.
As shown in Figure 5, be the checking process flow diagram of user right safety management system of the present invention.In this flow process 5, at first, the user logins this system (step S50) by the user interface of client computer 10, the user inputs user ID and password, this password carries out SSL by SSL encryption device 102 to be encrypted, and is sent to distributed application program server 12 by network 11 together by the user cipher after this user ID and the encryption then and carries out subscriber authentication (step S51).SSL decryption device 1221 in the distributed application program server 12 is decrypted this password that is in the SSL encrypted state and is reduced into virgin state, and then encrypts by data base encryption device 1222.Simultaneously the user authentication device 1231 in the distributed application program server 12 according to store in this user ID Query Database with the corresponding user cipher of this user ID, then above-mentioned password and this user cipher after encrypting by data base encryption device 1222 compared (step S52), if it is identical, prove that then user identity is legal, allow its accessing system; If inequality, prove that then user identity is illegal, the refusing user's accessing system.Behind user's accessing system, send operation requests (step S53) by user interface 101, this operation requests is sent to distributed application program server 12 by network 11, carries out operation validity checking (step S54).Operation demonstration plant 1232 is according to the user role of storage in the user ID Query Database 14, judge then whether user's requested operation belongs to the defined opereating specification of this user role (step S55), if, prove that then this operation is legal, allow this operation to carry out (step 56); If not, prove that then this operation is illegal, refuse this operation and carry out (step 57).After maybe this operation was rejected after this operation was finished, the user can judge whether to send another operation requests (step S58) as required, and if desired, then flow process 5 is back to step S53, repeated the aforesaid operations step; If do not need, then this flow process 5 finishes.
Claims (7)
1. user right safety management system is characterized in that comprising:
Many client computers, every client computer comprises:
One interactive user interface, the user can send operation requests by this interactive user interface;
One SSL encryption device is used for the user cipher of user's input is carried out the SSL encryption;
One distributed application program server, it includes:
One operation definition device, definition has the multiple systems operation;
It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation;
One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user;
One SSL decryption device, the password that is used for being in the SSL state is decrypted and is reduced into unencrypted state;
One data base encryption device is used for the password of unencrypted state is encrypted;
One user authentication device is used for the identifying user identity legitimacy;
One operation demonstration plant is used to the legitimacy of verifying that the user operates;
One database is used to store the role of above-mentioned user ID and user's correspondence;
Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, the password of storing in the password of described user authentication device by the user being logined time input and the database is compared and is carried out the legitimacy of identifying user identity, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
2. user right safety management system as claimed in claim 1, it is characterized in that: the user sets user cipher by interactive user interface invoke user management devices, after this user cipher is encrypted by the SSL encryption device, and be transmitted through the network to distributed application program server, be decrypted by the SSL decryption device then and be reduced into unencrypted state, be saved to database after encrypting by the data base encryption device again.
3. user right safety management system is characterized in that comprising:
Many client computers, interactive user interface is provided for it so that the user sends operation requests;
One distributed application program server, it includes:
One operation definition device, definition has the multiple systems operation;
It is the set of one group of operation that one role definition device, definition have at least a role, each role, comprises at least a operation;
One user management device is convenient to increase newly, is revised, deletes user ID and distributes the role for the user;
One operation demonstration plant is used to the legitimacy of verifying that the user operates;
One database is used to store the role of above-mentioned user ID and user's correspondence;
Client computer links to each other with distributed application program server by network, distributed application program server is connected by a kind of database with database and links to each other, and described operation demonstration plant compares the legitimacy of judging that the user operates by the defined operation of user role and user's requested operation that will be stored in the database.
4. user right method for managing security is characterized in that being achieved as follows step by a user right safety management system:
The operation of definition multiple systems;
According to defined operation definition role, the set of corresponding a kind of operation of each role or multiple operation;
For the user distributes the role, and the user role that this is distributed is stored to a database;
Judge user's operation validity according to the user role of storing in the database.
5. user right method for managing security as claimed in claim 4 is characterized in that: judge that wherein user's operation validity comprises the steps:
Send operation requests;
The user role corresponding in the Query Database with the user;
Judge this operation requests whether in the defined opereating specification of user role, if this operation requests is in the defined opereating specification of user role, it is legal to operate, and is allowed to carry out;
If this operation requests is not in the defined opereating specification of user role, operate illegally, be rejected execution.
6. user right method for managing security as claimed in claim 4 is characterized in that also being achieved as follows step by the SSL encryption device of storing on the client computer, the SSL decryption device that is stored in distributed application program server and data base encryption device:
By client computer user cipher is set;
The SSL encryption device carries out SSL with user cipher and encrypts;
Password after the encryption is transmitted through the network to distributed application program server to carry out SSL deciphering by the SSL decryption device and is reduced into unencrypted state, and the password of this unencrypted state is stored to database after being encrypted to another kind of form by the data base encryption device again;
When the user logins, with the password of storing in the password of user input and the database identifying user identity legitimacy of comparing.
7. user right method for managing security as claimed in claim 6 is characterized in that: wherein the identifying user identity legitimacy includes following steps:
The user inputs user ID and password;
Be transmitted through the network to distributed application program server after this password is encrypted by SSL and carry out the SSL deciphering and be reduced into unencrypted state, the password of this unencrypted state is encrypted to another kind of encrypted state again;
The user cipher of storing in the Query Database compares this user cipher and the described password that is in another kind of encrypted state, if user cipher is consistent with the described password that is in another kind of encrypted state, then user identity is legal;
If user cipher and the described password that is in another kind of encrypted state are inconsistent, then user identity is illegal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021348626A CN1485746A (en) | 2002-09-27 | 2002-09-27 | Management system and method for user safety authority limit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021348626A CN1485746A (en) | 2002-09-27 | 2002-09-27 | Management system and method for user safety authority limit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1485746A true CN1485746A (en) | 2004-03-31 |
Family
ID=34145985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA021348626A Pending CN1485746A (en) | 2002-09-27 | 2002-09-27 | Management system and method for user safety authority limit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1485746A (en) |
Cited By (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100354790C (en) * | 2004-09-13 | 2007-12-12 | 阿鲁策株式会社 | Information process device |
CN100381964C (en) * | 2003-12-26 | 2008-04-16 | 华为技术有限公司 | A user right management method |
CN100437607C (en) * | 2005-12-07 | 2008-11-26 | 华为技术有限公司 | Method and system for processing virtual article data |
CN100464338C (en) * | 2007-06-25 | 2009-02-25 | 浪潮集团山东通用软件有限公司 | Method for binding security mechanism of application software and large database |
CN100464336C (en) * | 2005-06-14 | 2009-02-25 | 华为技术有限公司 | Method for controlling system account right |
US7530113B2 (en) | 2004-07-29 | 2009-05-05 | Rockwell Automation Technologies, Inc. | Security system and method for an industrial automation system |
WO2009100678A1 (en) * | 2008-02-15 | 2009-08-20 | Sursen Corp. | Method, system and document base for controlling document base access security |
CN101359355B (en) * | 2007-08-02 | 2010-07-14 | 芯微技术(深圳)有限公司 | Method for raising user's authority for limitation account under Windows system |
CN101409642B (en) * | 2008-11-21 | 2010-11-17 | 深圳市华冠电气有限公司 | Data service system and administrative operation method |
CN101945108A (en) * | 2010-09-14 | 2011-01-12 | 中兴通讯股份有限公司 | Method and system for controlling authority in LDAP server |
CN101312396B (en) * | 2007-05-24 | 2011-01-19 | 中兴通讯股份有限公司 | Electronic workform management system and resource authority control method thereof |
CN1570942B (en) * | 2004-04-29 | 2011-01-19 | 北京交通大学 | A distributed intelligent traffic data processing system |
CN101043319B (en) * | 2006-03-22 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Digital content protective system and method |
CN102053969A (en) * | 2009-10-28 | 2011-05-11 | 上海宝信软件股份有限公司 | Web ERP (enterprise resource planning) user right management system |
CN102064953A (en) * | 2009-11-12 | 2011-05-18 | 中兴通讯股份有限公司 | System, device and method for configuring user right information of lightweight directory access protocol (ldap) server |
CN101452514B (en) * | 2007-12-06 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | User data protection method for safety computer |
CN102118697A (en) * | 2009-12-22 | 2011-07-06 | 索尼公司 | Wireless communication device, wireless communication method, program, and wireless communication system |
CN101060519B (en) * | 2006-04-19 | 2011-08-17 | 上海贝尔阿尔卡特股份有限公司 | A control method and its device for the user to dial with the specified dialing program |
CN101656736B (en) * | 2009-08-28 | 2012-01-25 | 深圳市茁壮网络股份有限公司 | Device and method for processing service data, and service processing system |
CN102457503A (en) * | 2010-10-29 | 2012-05-16 | 镇江雅迅软件有限责任公司 | Secret key control device based on file authority management |
CN102882870A (en) * | 2012-09-25 | 2013-01-16 | 鸿富锦精密工业(深圳)有限公司 | Account managing system and method |
US8396942B2 (en) | 2004-12-01 | 2013-03-12 | Canon Kabushiki Kaisha | Web browser operation method and operation apparatus |
WO2013053269A1 (en) * | 2011-10-12 | 2013-04-18 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
WO2013063944A1 (en) * | 2011-10-31 | 2013-05-10 | 腾讯科技(深圳)有限公司 | Right management method and system, and computer storage medium |
CN103617381A (en) * | 2013-11-21 | 2014-03-05 | 北京奇虎科技有限公司 | Permission configuration method and permission configuration system of equipment |
CN103632082A (en) * | 2013-12-10 | 2014-03-12 | 惠州华阳通用电子有限公司 | Universal permission management system and universal permission management method |
CN102130961B (en) * | 2005-11-17 | 2014-07-16 | 三星电子株式会社 | Apparatus and method for managing user interface |
CN104335523A (en) * | 2014-04-15 | 2015-02-04 | 华为技术有限公司 | Access control method, client and server |
CN104506320A (en) * | 2014-12-15 | 2015-04-08 | 山东中创软件工程股份有限公司 | Method and system for identity authentication |
CN104732314A (en) * | 2013-12-20 | 2015-06-24 | 国家电网公司 | User management method and system |
CN101079738B (en) * | 2006-05-26 | 2015-11-25 | 艾优克服务有限公司 | Use the network management software as the safety communication channel of network management basics |
CN105117655A (en) * | 2015-07-31 | 2015-12-02 | 成都亿信标准认证集团有限公司 | Project storage server with good confidentiality |
CN105162617A (en) * | 2015-07-31 | 2015-12-16 | 成都亿信标准认证集团有限公司 | Background management device with project backup function |
CN105303084A (en) * | 2015-09-24 | 2016-02-03 | 北京奇虎科技有限公司 | Privilege management system and method |
CN105528556A (en) * | 2015-12-03 | 2016-04-27 | 中国人民解放军信息工程大学 | Hybrid SQLite3 safety access method |
CN105871807A (en) * | 2015-12-14 | 2016-08-17 | 乐视云计算有限公司 | Anti-stealing-link method, device and system |
CN106254306A (en) * | 2015-06-03 | 2016-12-21 | 西门子公司 | For discharging client device and the server apparatus of the function of client safely |
CN108009210A (en) * | 2017-11-08 | 2018-05-08 | 狐狸金服(北京)信息技术咨询有限公司 | A kind of data access arrangement and method |
CN108183894A (en) * | 2017-12-26 | 2018-06-19 | 深圳市海恒智能科技有限公司 | The right management method and device of book self-help equipment |
CN108848117A (en) * | 2018-09-14 | 2018-11-20 | 南京理工技术转移中心有限公司 | A kind of cultivation surroundings monitoring system and its working method |
CN108879966A (en) * | 2018-09-14 | 2018-11-23 | 南京理工技术转移中心有限公司 | A kind of electric power cabinet use environment monitoring system and its working method |
CN109164223A (en) * | 2018-09-14 | 2019-01-08 | 南京理工技术转移中心有限公司 | A kind of water environment monitoring processing system and its working method |
CN109186040A (en) * | 2018-09-14 | 2019-01-11 | 南京理工技术转移中心有限公司 | A kind of metro environment remote monitoring system and its working method |
CN110445775A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Method and apparatus for account management |
TWI696932B (en) * | 2018-11-14 | 2020-06-21 | 中華電信股份有限公司 | System for providing multi-authentication management in a multi-tenant environment and method thereof |
CN113127850A (en) * | 2021-04-12 | 2021-07-16 | 西安赤鸾信息科技有限公司 | Browser password filling interaction control method and device |
CN113132369A (en) * | 2021-04-12 | 2021-07-16 | 西安赤鸾信息科技有限公司 | Android mobile phone password automatic filling method and device |
CN113225317A (en) * | 2021-04-12 | 2021-08-06 | 西安赤鸾信息科技有限公司 | iPhone mobile phone password automatic filling method and device |
TWI736832B (en) * | 2019-01-29 | 2021-08-21 | 台灣房屋仲介股份有限公司 | System for interactively providing real estate agency information |
US11196745B2 (en) | 2019-07-24 | 2021-12-07 | Advanced New Technologies Co., Ltd. | Blockchain-based account management |
-
2002
- 2002-09-27 CN CNA021348626A patent/CN1485746A/en active Pending
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100381964C (en) * | 2003-12-26 | 2008-04-16 | 华为技术有限公司 | A user right management method |
CN1570942B (en) * | 2004-04-29 | 2011-01-19 | 北京交通大学 | A distributed intelligent traffic data processing system |
US7530113B2 (en) | 2004-07-29 | 2009-05-05 | Rockwell Automation Technologies, Inc. | Security system and method for an industrial automation system |
CN1737719B (en) * | 2004-07-29 | 2010-10-06 | 洛克威尔自动控制技术股份有限公司 | Security system and method for an industrial automation system |
CN100354790C (en) * | 2004-09-13 | 2007-12-12 | 阿鲁策株式会社 | Information process device |
US9317187B2 (en) | 2004-12-01 | 2016-04-19 | Canon Kabushiki Kaisha | Web browser operation method and operation apparatus |
US8396942B2 (en) | 2004-12-01 | 2013-03-12 | Canon Kabushiki Kaisha | Web browser operation method and operation apparatus |
CN100464336C (en) * | 2005-06-14 | 2009-02-25 | 华为技术有限公司 | Method for controlling system account right |
CN102130961B (en) * | 2005-11-17 | 2014-07-16 | 三星电子株式会社 | Apparatus and method for managing user interface |
CN100437607C (en) * | 2005-12-07 | 2008-11-26 | 华为技术有限公司 | Method and system for processing virtual article data |
CN101043319B (en) * | 2006-03-22 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Digital content protective system and method |
CN101060519B (en) * | 2006-04-19 | 2011-08-17 | 上海贝尔阿尔卡特股份有限公司 | A control method and its device for the user to dial with the specified dialing program |
CN101079738B (en) * | 2006-05-26 | 2015-11-25 | 艾优克服务有限公司 | Use the network management software as the safety communication channel of network management basics |
CN101312396B (en) * | 2007-05-24 | 2011-01-19 | 中兴通讯股份有限公司 | Electronic workform management system and resource authority control method thereof |
CN100464338C (en) * | 2007-06-25 | 2009-02-25 | 浪潮集团山东通用软件有限公司 | Method for binding security mechanism of application software and large database |
CN101359355B (en) * | 2007-08-02 | 2010-07-14 | 芯微技术(深圳)有限公司 | Method for raising user's authority for limitation account under Windows system |
CN101452514B (en) * | 2007-12-06 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | User data protection method for safety computer |
WO2009100678A1 (en) * | 2008-02-15 | 2009-08-20 | Sursen Corp. | Method, system and document base for controlling document base access security |
CN101409642B (en) * | 2008-11-21 | 2010-11-17 | 深圳市华冠电气有限公司 | Data service system and administrative operation method |
CN101656736B (en) * | 2009-08-28 | 2012-01-25 | 深圳市茁壮网络股份有限公司 | Device and method for processing service data, and service processing system |
CN102053969A (en) * | 2009-10-28 | 2011-05-11 | 上海宝信软件股份有限公司 | Web ERP (enterprise resource planning) user right management system |
WO2011057488A1 (en) * | 2009-11-12 | 2011-05-19 | 中兴通讯股份有限公司 | System, apparatus and method for configuring user authority information of lightweight directory access protocol server |
CN102064953A (en) * | 2009-11-12 | 2011-05-18 | 中兴通讯股份有限公司 | System, device and method for configuring user right information of lightweight directory access protocol (ldap) server |
CN102118697A (en) * | 2009-12-22 | 2011-07-06 | 索尼公司 | Wireless communication device, wireless communication method, program, and wireless communication system |
CN102118697B (en) * | 2009-12-22 | 2016-12-21 | 索尼公司 | Wireless Telecom Equipment, wireless communications method and wireless communication system |
CN101945108A (en) * | 2010-09-14 | 2011-01-12 | 中兴通讯股份有限公司 | Method and system for controlling authority in LDAP server |
CN102457503A (en) * | 2010-10-29 | 2012-05-16 | 镇江雅迅软件有限责任公司 | Secret key control device based on file authority management |
WO2013053269A1 (en) * | 2011-10-12 | 2013-04-18 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
WO2013063944A1 (en) * | 2011-10-31 | 2013-05-10 | 腾讯科技(深圳)有限公司 | Right management method and system, and computer storage medium |
CN102882870A (en) * | 2012-09-25 | 2013-01-16 | 鸿富锦精密工业(深圳)有限公司 | Account managing system and method |
CN103617381A (en) * | 2013-11-21 | 2014-03-05 | 北京奇虎科技有限公司 | Permission configuration method and permission configuration system of equipment |
CN103632082A (en) * | 2013-12-10 | 2014-03-12 | 惠州华阳通用电子有限公司 | Universal permission management system and universal permission management method |
CN103632082B (en) * | 2013-12-10 | 2016-08-17 | 惠州华阳通用电子有限公司 | A kind of general-purpose rights management system and method |
CN104732314A (en) * | 2013-12-20 | 2015-06-24 | 国家电网公司 | User management method and system |
CN104335523A (en) * | 2014-04-15 | 2015-02-04 | 华为技术有限公司 | Access control method, client and server |
CN104335523B (en) * | 2014-04-15 | 2018-08-21 | 华为技术有限公司 | A kind of authority control method, client and server |
US10237267B2 (en) | 2014-04-15 | 2019-03-19 | Huawei Technologies Co., Ltd. | Rights control method, client, and server |
CN104506320B (en) * | 2014-12-15 | 2018-04-17 | 山东中创软件工程股份有限公司 | A kind of identity authentication method and system |
CN104506320A (en) * | 2014-12-15 | 2015-04-08 | 山东中创软件工程股份有限公司 | Method and system for identity authentication |
CN106254306A (en) * | 2015-06-03 | 2016-12-21 | 西门子公司 | For discharging client device and the server apparatus of the function of client safely |
US10284546B2 (en) | 2015-06-03 | 2019-05-07 | Siemens Aktiengesellschaft | Client device and server device for the secured activation of functions of a client |
CN105117655A (en) * | 2015-07-31 | 2015-12-02 | 成都亿信标准认证集团有限公司 | Project storage server with good confidentiality |
CN105162617A (en) * | 2015-07-31 | 2015-12-16 | 成都亿信标准认证集团有限公司 | Background management device with project backup function |
CN105303084A (en) * | 2015-09-24 | 2016-02-03 | 北京奇虎科技有限公司 | Privilege management system and method |
CN105528556A (en) * | 2015-12-03 | 2016-04-27 | 中国人民解放军信息工程大学 | Hybrid SQLite3 safety access method |
CN105871807A (en) * | 2015-12-14 | 2016-08-17 | 乐视云计算有限公司 | Anti-stealing-link method, device and system |
CN108009210A (en) * | 2017-11-08 | 2018-05-08 | 狐狸金服(北京)信息技术咨询有限公司 | A kind of data access arrangement and method |
CN108183894A (en) * | 2017-12-26 | 2018-06-19 | 深圳市海恒智能科技有限公司 | The right management method and device of book self-help equipment |
CN108183894B (en) * | 2017-12-26 | 2021-03-05 | 深圳市海恒智能科技有限公司 | Authority management method and device of book self-service equipment |
CN108879966A (en) * | 2018-09-14 | 2018-11-23 | 南京理工技术转移中心有限公司 | A kind of electric power cabinet use environment monitoring system and its working method |
CN109186040A (en) * | 2018-09-14 | 2019-01-11 | 南京理工技术转移中心有限公司 | A kind of metro environment remote monitoring system and its working method |
CN109164223A (en) * | 2018-09-14 | 2019-01-08 | 南京理工技术转移中心有限公司 | A kind of water environment monitoring processing system and its working method |
CN108848117A (en) * | 2018-09-14 | 2018-11-20 | 南京理工技术转移中心有限公司 | A kind of cultivation surroundings monitoring system and its working method |
TWI696932B (en) * | 2018-11-14 | 2020-06-21 | 中華電信股份有限公司 | System for providing multi-authentication management in a multi-tenant environment and method thereof |
TWI736832B (en) * | 2019-01-29 | 2021-08-21 | 台灣房屋仲介股份有限公司 | System for interactively providing real estate agency information |
CN110445775A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Method and apparatus for account management |
US11196745B2 (en) | 2019-07-24 | 2021-12-07 | Advanced New Technologies Co., Ltd. | Blockchain-based account management |
CN113127850A (en) * | 2021-04-12 | 2021-07-16 | 西安赤鸾信息科技有限公司 | Browser password filling interaction control method and device |
CN113132369A (en) * | 2021-04-12 | 2021-07-16 | 西安赤鸾信息科技有限公司 | Android mobile phone password automatic filling method and device |
CN113225317A (en) * | 2021-04-12 | 2021-08-06 | 西安赤鸾信息科技有限公司 | iPhone mobile phone password automatic filling method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1485746A (en) | Management system and method for user safety authority limit | |
CN109670768A (en) | Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain | |
CN111783075B (en) | Authority management method, device and medium based on secret key and electronic equipment | |
US8136166B2 (en) | Installation of black box for trusted component for digital rights management (DRM) on computing device | |
US6532543B1 (en) | System and method for installing an auditable secure network | |
US6795855B2 (en) | Non-root users execution of root commands | |
US6678682B1 (en) | Method, system, and software for enterprise access management control | |
CN111064718B (en) | Dynamic authorization method and system based on user context and policy | |
CN101442404B (en) | Multilevel management system and method for license | |
CN112464212B (en) | Data authority control reconstruction method based on mature complex service system | |
WO2001082092A1 (en) | Secure system access | |
CN105915338A (en) | Key generation method and key generation system | |
US20030229782A1 (en) | Method for computer identification verification | |
TW583559B (en) | Authorization and security management system and method | |
CN111737232A (en) | Database management method, system, device, equipment and computer storage medium | |
CN114866346B (en) | Password service platform based on decentralization | |
CN110851837B (en) | Self-service equipment based on trusted computing, and security management system and method thereof | |
CN112925645A (en) | Method and system for automatically constructing cloud access control | |
CN114881469A (en) | Performance assessment and management system and method for enterprise workers | |
CN111159736B (en) | Application control method and system of block chain | |
CN109802927A (en) | A kind of security service providing method and device | |
CN116438778A (en) | Persistent source value of assumed alternate identity | |
Ashraf et al. | Transparency service model for data security in cloud computing | |
CN1567300A (en) | Database using right inquiry system and method | |
CN114785553A (en) | Authority authentication method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |