TW201035888A - Authorization management system and method thereof - Google Patents

Authorization management system and method thereof Download PDF

Info

Publication number
TW201035888A
TW201035888A TW98110017A TW98110017A TW201035888A TW 201035888 A TW201035888 A TW 201035888A TW 98110017 A TW98110017 A TW 98110017A TW 98110017 A TW98110017 A TW 98110017A TW 201035888 A TW201035888 A TW 201035888A
Authority
TW
Taiwan
Prior art keywords
authorization
message
client
server
identification
Prior art date
Application number
TW98110017A
Other languages
Chinese (zh)
Inventor
Chau-Cer Chiu
Zheng Chen
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW98110017A priority Critical patent/TW201035888A/en
Publication of TW201035888A publication Critical patent/TW201035888A/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An authorization management system and method are disclosed. By providing an authorization table for recording a login time and an identify message so as to obtain an authorization state, and detecting the authorization state to recover authorized when exceeding the maximum number of authorization. The mechanism is to improve the authorization utilization.

Description

201035888 六、發明說明: 【發明所屬之技術領域】 本發明為有_-種授齡_統 能夠對卿進行时賴齡_統及法制疋“ 一種 【先前技術】 近年來,隨著網路科技的蓬勃發 L 斗夕企業均建置企業網 自連線’以提高行政效率及降低訊 心傳輸的成本,舉絲說,透職子郵件傳送公规奸省郵資, 又可大幅降低公文傳送的時間成本。 、 細路的㈣率’各家麵絲_應用於企 業稱的服務,例如:網路公文系統、網路防毒系統及網路翻譯 ......等。這些服務的特色便是將所提供的服務安裝於企掌網 路中的某-台電腦作為鑛端,並且允許其它電腦(即所謂的客戶 染由網路連線至該伺服端以使用此服務,舉例來說,假設將網 路翻譯系統安裝於伺服端’那麼客戶端即可透侧覽器連線至該 飼服端進行網路翻譯,也就是說,客戶端獨絲翻譯軟體即可 使用翻譯服務。 不過’為了避免無限制的使用該服務,通常會增加授權機制, 用以限制客戶的使用數量,舉例來說,假設授權數量為五十人, 其伺服端將記錄五十台獨客戶端的識別訊息,以便根據此識別 訊息判斷是否允許客戶端進行連線來提供服務,換句話說,便是 對這五十台客戶端進行授權。然而,當其中-台客戶端超出使用 年限而遭致淘汰時,伺服端無法得知客戶端已經遭淘汰,並進行 授權回收處理,由此造成淘汰的客戶端一直佔用伺服端之授權數 201035888 量的情況產生。 綜上·’可純前技術中長_來—直存在無法回收授權 =題’因此實有必要提出改進的技術手段,來解決此 【發明内容】 =於先前技術存在的問題,本發明遂揭露—種授權管理系 既及其方法。 ==揭露之授權_、統,應胁客戶糊服端的網路 t 騎_包含_㈣則包含: 、授獅働、提神_難組 ===啸收授縣纽息,纽職縣 將授權請求訊 === 輸4纟,物#咖服端連201035888 VI. Description of the invention: [Technical field to which the invention pertains] The present invention is capable of carrying out a _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The company has built a corporate network self-connection to increase administrative efficiency and reduce the cost of the transmission of the heart. It is said that the postal mail will be used to transmit the postage of the public patrol, and the transfer of official documents can be greatly reduced. The cost of time. The (4) rate of the roads is used in the services of enterprises, such as: network document systems, network anti-virus systems and network translations. etc. The characteristics of these services are It is to install the service provided on a certain computer in the network as a mine, and to allow other computers (so-called customers to connect to the server via the network to use the service, for example, Assume that the network translation system is installed on the server side, then the client can connect to the feeding server through the browser to perform network translation. That is to say, the client can use the translation service for the software. To avoid infinity The use of this service usually increases the authorization mechanism to limit the number of customers used. For example, if the number of authorized users is 50, the server will record the identification information of 50 unique clients to judge based on this identification message. Whether to allow the client to connect to provide the service, in other words, to authorize the 50 clients. However, when the client is out of service and is eliminated, the server cannot know the client. The terminal has been eliminated, and the authorization is recycled. As a result, the eliminated client has been occupying the number of authorizations of the server for 201035888. In summary, 'can be purely in the middle of the technology _ come - there is no recycling authorization = [Therefore it is necessary to propose improved technical means to solve this [invention]] In the prior art problems, the present invention discloses a kind of authorization management system and its method. == disclosure of authorization _, system, Should threaten the customer's network t-ride _ _ _ (four) contains:, lion lion, refreshing _ difficult group === Xiaoxian County magistrate, New County will be authorized Seeking news === losing 4纟, object #咖服端连

Lvvli 根據授權資料表獲得客戶端的登人數量,並且 除模組,當提示訊紐時,訊息至客戶端;删 時間範圍的識別訊息。 表中刪除登入時間超出 至於本發明之授權營里古 _境中,其步驟包括:客戶端的 將授權請求訊息求訊息,並且 訊息的識別訊息及登入冑間記錄 ^习編_請求 伺服端連結;伺服端根據料=表’並授權客戶端與 且於登入數量超出授權數量:貝=客:端· 座生亚傳迗提示訊息至客戶端; 201035888 當提示訊息產生時,端自鋪㈣表巾 間範圍的識別訊息。 了』屹出守 本發明所揭露n與方法如上,與先前技術之間的差異在 於本發明透過授權資料表記錄登入時間及識別訊息,用以得知目 別授減態,並膽超級餘量時作為时娜㈣斷依據。 透過上述的技術手段,本發明可以達到提高授權利用率之技 術功效。 Ο ❹ 【實施方式】 以下將配合W式及實_來詳細朗本發明之實施方式,藉 此對本發明如何應用技術手段來解決技術問題並達成技術功效= 實現過程能充分理解並據以實施。 在說明本發日騎揭露之_管_統及其方法之前,先對本 發明的架構及所自行定義的名詞作如下轉,首先在架構的部 分,本發明㈣統包含:客戶端及伺服端,所述客戶端為具有網 路通訊能力的電子裝置,如:手機、個人數位助理、個人電腦 等;·所制服端為能夠與客戶端連線,並且提供服務的電子農置,. 么如:舰器。除此之外,客戶端及伺服端應用於客戶端/飼服端的 轉環境中,其網路環境可為有線或無線的網際網路或區域網路。 而在自行定義的名詞中,本發明中所提到的授權資料表記錄 ,戶端的識別訊息及登入時間,舉例來說,假設客戶端的識別訊 Μ為媒體存取控·址“G(M1_22_33_44_55,,,而其登入時間為 年11月11曰22時33分44秒,則授權記錄表將記錄為 00-11-22-33-44-55” 及 “20081111223344” 作為一筆授權資 料。特別要說明的是,此授權資料表所記錄的資料可預先設置二 5 201035888 伺服端中,亦可於客戶端進行登入時,祠服端將所接收到的識別 訊息,以及該客戶端的登入時間記錄於授權資料表中。 以下配合圖式對本發明授權管理系統及其方法作進一步的說 明,請參閱「第1圖」,「第1圖」為本發明授權管理系統之方塊 圖’包含.客戶端110、飼服端12G及網路請,且飼服端12〇包 ^ :時間記錄模組121、㈣記錄模組122、提示模組123及刪除 模組124,除此之外’飼服端m更可包含預借模組125。其中, 客戶端110透過網路130傳送授權請求訊息,該授權請求訊息包 t識別訊息’所述識別訊息為能夠識別客戶端110的資料,如: w電細名f冉、網路位址(IPaddress)”、“硬體序號”、“電 腦名稱及網路位址,,、“電腦名稱及硬體序號,,、“網路位址及 硬體序號,,或“電腦名稱、網路位址及硬體序號”。在實際實施 ^授權請求訊息可為用以登人錬端⑽的帳號及密碼等資 ,亚且包含識別客戶端110的識別訊息,如:“電腦名稱”、 網路健(IP邊ess),,、“硬體鞭、“·名稱及網路位 “、電腦名稱及硬體序號”、“網路位址及硬體序號”或“電 腦名稱、網路位址及硬體序號,,等具有識別作用的資料,其中, 媒體存取控制位址(MACaddress)、中央處理 序就或硬碟序號等具有唯-性的數值。 錄楔端=的部分’前面提到’词服端120包含:時間記 =、、且授權5己錄拉組122、提示模組123及刪除模組124。 /、中’時間記錄模組121用以垃收分 用以接收客戶端110所傳送的授權請求 二,並謂授縣魏息的接㈣間⑽如:厕年“月U日 了 33刀44心己錄為登入時間,如:‘%術⑴2说44”。由 201035888 於登入飼服端12〇的詳細流程為習知技術,故在此不多作費述。 特別要說㈣是,本發明絲限定登人咖的記錄格式,也就是 說任何用喊錄咖的記祕式料·本發_精神所在1疋 授權記錄敝m _將鋪訊息的識舰息及登 間,錄於授權資料表,並授權客戶端11〇與飼服端12〇連結,也 ,是說,當客戶端11G的識職息及登人時間記錄於授师料表 後’即代表已經授權客戶端削油服端12〇連結 Ο Ο =收到授權請求訊息,便可根據所包含的識別訊息及此授: 知是否允許客戶端110進行連結,由於授權資料表已於 刖面自仃定義的名詞中作說明,故在此不再作贅述。 旦提示歡m用以根據授權資料表獲得客戶端ιι〇的登入數 ^亚錄登人數量超纽權數鱗,產生並傳送提示訊息至客 戶‘則’舉例來說,假設授權資料表記錄五筆資料(例如: 提示模組123即可根據這五筆資料獲得客戶端ιι〇的 =入數量,亦即登入數量為“5”,而授權數量則為預先設置的數 安例如.假設數值設定為“5G”則代表授魏量為五十台不同 示模組123所獲得客戶端仙的登人數量超出 預叹的她數讀,魅提示訊息,並 Γ ί八 並可包含登人數量減去授權數量的數值。另 人數量超出該授槪量時,禁止客戶端⑽連結至 人日士 124 ’當提示訊息產生時’自授權資料表中刪除登 ㈣超㈣間朗的識別訊息,所述時間範圍為舰設置於飼 7 201035888 服端贈的參數值,舉例來說,假設欲設柿_ 天,則可設定為錄“30”,以此例而言,若目前時間為遞年 11月11日22 4 33分44秒,當提示訊息產生時,將自授權資料 表中刪除登人時間超出細年⑽u㈣時%分44秒至纖 年12月11日22時33分44秒之範圍的識別訊息。 另外,錬端120更可包含預借模組!25,用以於登入數量 超出授權數量時’於預借__整授雜量以避免產生提干^ 息,所述預借_亦為触設置於值端m中的參數值,舉例 來說’當預設的參數值設為“1G” ,代表在十天内允許調整授 權數罝以避免產生提示訊息,在實際實施上,其調整的方式可為 增加授權數量的數值’以上例而言,當提示觀123所獲得客戶 端110的登入數量超出預設的授權數量時,珊模、组⑵可增加 授權數量(例如:將授權數量的數值由“50”增加4 “70”),^且 將修改後的娜數麵持十天,朗十天過後再將娜數量恢復 為原數值(例如:數值“50”)。 如第2圖」所示’「第2圖」為本發明授權管理方法之流程 圖,包含下列步驟:客戶端110透過網路13〇傳送授權請求訊息, 該授權請求訊息包含_訊息(步驟2G1);做端i2G接收授權請 求訊息’並且將授權請求訊息的接收時間記錄為登入時間(步: 202^鑛端12G將授權請求訊息的識別訊息及登人時間記錄於 授權貧料表,並授權客戶端110與伺服端12〇連結(步驟加);飼 服端120根據授權資料表獲得客戶端11〇的登入數量,並且於登 入數量超紐雜量時,產生麟送提示訊息至客戶端ιι〇(步驟 2〇4);當提示訊息產生時,伺服端12〇自授權資料表中删除登入 201035888 時間超出時間範圍的識別訊息(步驟205)。除此之外,在步驟2〇4 中’當登入數量超出授權數量時,更可於預借期間内調整授權數 量以避免產生提示訊息(步驟2041)。經由上述各步驟,即可透過 授權資料表§己錄客戶端110的登入時間及識別訊息,用以得知目 月’J授權狀,並且於超出授權數量時作為回收授權的判斷依據, 用以提高授權利用率。 ΟLvvli obtains the number of clients on the license according to the authorization data sheet, and in addition to the module, when the message is prompted, the message is sent to the client; the identification message of the time range is deleted. The deletion time in the table is beyond the scope of the authorization camp of the present invention. The steps include: the client requests the authorization request message, and the message identification message and the login time record ^ _ request server connection; The server is based on the material = table 'and authorizes the client and the number of logins exceeds the authorized number: Bay = Guest: End · The student sends a message to the client; 201035888 When the prompt message is generated, the end is self-supplied (four) A range of identification messages. The difference between the n and the method disclosed above is that the difference between the prior art and the prior art is that the present invention records the login time and the identification message through the authorization data table, so as to know the target reduction state and the gallbladder. Time is used as the basis for Shina (four). Through the above technical means, the present invention can achieve the technical effect of improving the authorization utilization rate.实施 ❹ [Embodiment] Hereinafter, embodiments of the present invention will be described in detail in conjunction with the W formula and the actual method, thereby how to apply the technical means to solve the technical problem and achieve technical efficiency. The implementation process can be fully understood and implemented. Before describing the method and method of the present disclosure, the architecture of the present invention and the self-defined nouns are first changed as follows. First, in the framework part, the invention (4) includes: a client and a server. The client is an electronic device with network communication capability, such as a mobile phone, a personal digital assistant, a personal computer, etc.; the uniformed end is an electronic farm that can be connected with the client and provides services, such as: Ship. In addition, the client and server are used in the client/feeding environment, and the network environment can be wired or wireless internet or regional network. In the self-defined noun, the authorization data table mentioned in the present invention records the identification information of the terminal and the login time. For example, it is assumed that the identification information of the client is the media access control address “G (M1_22_33_44_55, , and the login time is 11:22:33:44, November 11, the authorization record will be recorded as 00-11-22-33-44-55" and "20081111223344" as an authorization. The data recorded in the authorization data sheet can be preset in the server of the 20105888 server. When the client logs in, the server will record the received identification message and the login time of the client. In the data sheet, the authorization management system and the method thereof are further described below with reference to the drawings. Please refer to FIG. 1 and FIG. 1 is a block diagram of the authorization management system of the present invention. The feeding end 12G and the network please, and the feeding end 12 〇 package ^: time recording module 121, (4) recording module 122, prompt module 123 and deletion module 124, in addition to the 'feeding end m Can include pre-borrowing module 125 The client 110 transmits an authorization request message through the network 130. The authorization request message packet t identifies the message 'the identification message is a data capable of identifying the client 110, such as: w electric name, network address (IPaddress), "hardware serial number", "computer name and network address,", "computer name and hardware serial number,", "network address and hardware serial number, or "computer name, network The address and the hardware serial number. In the actual implementation, the authorization request message may be an account number and a password used to log in to the terminal (10), and includes an identification message identifying the client 110, such as: "computer name", network Lu Jian (IP side ess),,, "hard whip, "·name and network bit", computer name and hardware serial number", "network address and hardware serial number" or "computer name, network bit Address and hardware serial number, and other identification data, wherein the media access control address (MAC address), central processing sequence or hard disk serial number has a unique value. Mention 'word service end 120 contains: time record =, and authorization 5 The recording group 122, the prompting module 123 and the deleting module 124. The middle time recording module 121 is configured to receive the authorization request sent by the client 110, and the prefecture Weixian is connected. (4) Room (10) For example: the toilet year "Monthly U-day 33 knives 44 hearts have been recorded as the login time, such as: '% surgery (1) 2 said 44". The detailed process of logging in to the feeding service end by 201035888 is a well-known technology, so In this case, it is not necessary to mention more. In particular, (4) is that the present invention defines the recording format of the coffee, that is to say, any secret material used in the shouting coffee, the hair _ spirit is located in the authorized record 敝m _ will be the information of the shop and the board, recorded in the authorization data sheet, and authorized the client 11〇 and the feeding service end 12〇, also, that is, when the client 11G's job information and boarding time record After the teacher's form, it means that the client has been authorized to cut the service port. 12 〇 Ο 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到 收到Since the authorization data sheet has been explained in the nouns defined in the face, it is no longer used here. Said. Once the reminder is used to obtain the number of logins of the client ιι〇 according to the authorization data sheet, the number of entries in the sub-records exceeds the number of quotas, and the prompt message is generated and sent to the client's. For example, assume that the authorization data sheet records five data. (For example: the prompt module 123 can obtain the number of the input of the client ιι〇 according to the five data, that is, the number of logins is “5”, and the authorized quantity is a preset number of amps. For example, the assumed value is set to “5G”. "On behalf of Wei Wei, 50 different display modules 123 obtained the number of clients who have exceeded the number of pre-satisfied hers, the charm message, and Γ ί 八 and can include the number of people minus the number of authorizations If the number of others exceeds the authorized amount, the client (10) is prohibited from connecting to the person's day 124 'when the prompt message is generated', the identification message of the (four) super (four) room is deleted from the authorization data table, the time range For the ship set in the feed 7 201035888 service end gift value, for example, suppose you want to set persimmon _ days, you can set to record "30", for example, if the current time is the delivery year November 11 22 4 33 minutes 44 seconds, when When the message is generated, the identification message in the range of more than 44 seconds from the fine (10) u (four) to 22:33:44 on December 11 will be deleted from the authorization data sheet. In addition, the terminal 120 can be deleted. Including the pre-borrowing module !25, when the number of logins exceeds the authorized quantity, the amount of the pre-borrowing__ is used to avoid the generation of the lifting information, and the pre-borrowing_ is also set in the value end m. For the parameter value, for example, when the preset parameter value is set to “1G”, it means that the number of authorizations can be adjusted within ten days to avoid generating a prompt message. In actual implementation, the adjustment method can be increased by the number of authorized quantities. In the above example, when the number of logins of the client 110 obtained by the prompt view 123 exceeds the preset authorized number, the mode, group (2) may increase the number of authorizations (for example, the value of the authorized number is increased by "50" by 4" 70"), ^ and the modified Na number is held for ten days, after the ten days have passed, the number of Na is restored to the original value (for example: the value "50"). As shown in Figure 2, "Figure 2 The flowchart of the authorization management method of the present invention includes the following steps: The client 110 transmits an authorization request message through the network 13, the authorization request message includes a _ message (step 2G1); the terminal i2G receives the authorization request message 'and records the reception time of the authorization request message as the login time (step: 202^) The mine end 12G records the identification message of the authorization request message and the boarding time in the authorized poor list, and authorizes the client 110 to connect with the server 12 (step addition); the feeding end 120 obtains the client according to the authorization data sheet. The number of logins, and when the number of logins exceeds the amount of nuisance, a message is sent to the client ιι〇 (step 2〇4); when the prompt message is generated, the server 12 deletes the login time from the authorization data sheet 201035888 An identification message that exceeds the time range (step 205). In addition, in step 2〇4, when the number of logins exceeds the authorized number, the number of grants can be adjusted during the pre-borrowing period to avoid generating a prompt message (step 2041). Through the above steps, the login time and the identification message of the client 110 can be recorded through the authorization data table to learn the authorization status of the target month, and when it exceeds the authorized quantity, it is used as the judgment basis for the recycling authorization. Increase authorization utilization. Ο

以下配合「第3圖」至「第5圖」以實施例的方式進行如下 說明’ Μ先參閱「第3圖」,「第3圖」為應用本發明進行詞彙查 詢^示意圖’包含:詞彙查詢視窗300、授權狀態顯示區塊310、 詞囊輸入區塊320、内容顯示區塊330、查詢元件340及清除元件 35〇。特別要說明的是,本發明並未以此限定詞彙查詢視窗獨所 包含的兀件_及數量,且本發明授鮮理祕亦未蚊應用於 網路翻譯巾’町進行财細僅為方便說明之用。 百先’當使用者欲於客戶端11〇使用應用本發明授權管理系 2網路翻譯時,可在詞彙查詢視窗300開啟時,透過網路130 客戶端UG之識舰息(例如:賴存取控制位址為 Ί33-44-55”)的授權請求訊息至伺服端12〇。 戶诚11^ 4司服端120的時間記錄模組121透過網路130接收客 時間記錄m鋪請求訊息,並且將接收此授騎求訊息的 11日22 :认%間’舉例來說,假設接收時間為2_年11月 ”。接下1 33分44秒,故記錄的登入時間為“200811删344 息及二授:記錄模組122將授權請求訊息内包含的識別訊 資料(包含識別訊息及登,,並且授權==:= 9 201035888 錄的:別讯:、之客戶端110與伺服端120連接。 择提不模組123根據授權資料表巾的識別訊息之總合來 ::& U〇的登入數量,由於目前授權資料表中僅具有一筆 5 ’故所獲得客戶端11〇的登入數量為數值丫,且因登入數 =超過預设的授權數量(假設數值為“π”),故不產生 心’删除模組124亦不作任何處理。 … 至此,客戶端UG成雜恤端i2G連結後,並可於授 二’射區塊310中顯不授權狀態⑽如:以文字的方式顯示「已授 權」)’使用者即可於詞彙輸入區塊no中輸入欲查詢的詞, 透過點選查詢元件進__制崎錢,查詢的結 顯不於内容顯示區塊33G中,献點選清除元件35G將詞彙輸入 ,塊,〇及内容顯示區塊33G的内容進行清除,以便輸入另一詞 菜再次查詢。由於詞彙查詢為網路翻譯系統的習知技術,故在此 不多作贅述。 d而,P通著登入的客戶端110逐漸增加,授權資料表所記錄 的識別訊息亦隨之增加,t提賴組123所獲得客戶端則的登 入數量超出預設的授權數量時,將產生並傳送提示訊息(圖中未^ 至客戶端110。此時,冊j除模組m自授權資料表中刪除登入時 間超出預設的時間範圍之識別訊息。若授權資料表中不具有超出 =設的時間範圍之識別訊息,更可透過預借模組125在預設的預 ^期間(例如:預借_為數值“⑴”)_整授餘量以避免產生 提示訊息,以此_言,珊歡125可對授魏量進行增加的 調整(例如:將授權數量纟“50,,增加A “70”),並且將調^後的 授權數量轉十天(即預借制為數值“1G”),直斜天期滿後再 201035888 恢復原授權數量。 如「第4圖」所示,「第4圖」為應用本發明概及編輯授權 資料表之不。前©提到’舰端12G中的授權資料表可預先 s置’其設置方式可透過授槪態視窗働來進行,經由點選載 人元件410雜權資料表載入至授權編輯區塊420進行顯示^編 輯,其顯示的授權資料表之内容包含識別訊息⑽、如、·: “00-11-22-33-44-55”)及登入時間(例如:“2〇〇81111223344”), ㈣者可直接在授權編龍塊帽麵㈣錢行編輯,用 ⑽增、修改或删除識別訊息,另外,亦可透過排序树依登入 時間對識別訊息進行排序顯示,如:遞增或遞減的排序方式,並 且在編輯後可點選確定元件_進行儲存,或是點選取消元件· 取消編輯。 一如「第5圖」所示,「第5圖」為應用本發明進行授權設定之 示意圖。前面亦提到’授權數量、時職圍及預借_皆可為預 先設置的參數值,在實際實施上,可在值端12G透過授權管理 〇 贿500來進行設定,舉例來說,可分別透過授權數量設定元件 51〇、時間範圍設定元件530及預借期間設定元件S4〇來設定授權 數量、日寺間範圍及預借期間的參數值,除此之外,提示模組123 所產生的提不訊息更可根據提示訊息設定元件52()來生成,舉例 來說’在提示訊息設定元件別中輸入文字為「授權已滿」,那麼 當提示模組123產生提示訊息時,其内容將包含文字「授權已滿」。 次綜上所述,可知本發明與先前技術之間的差異在於透過授權 資料表記錄登入時間及識別訊息,用以得知目前授權狀態,並且 於超出授權數量時作為时授獅觸依據,藉由此—技術手段 11 201035888 3以只現回收鋪’來解決先前技術所存在的問題,進而達成提 高授權利用率之技術功效。 雖然本發日⑽前述之實施例揭露如上,然其並非用以限定本 發明’任何熟習相似技藝者,在不脫離本發明之精神和範圍内, =作些許之魏制飾,因此本㈣之補锻翻須視本說 明書所附之申請專利範圍所界定者為準。 【圖式簡單說明】 第1圖為本發明授權管理系統之方塊圖。 第2圖為本發明授權管理方法之流程圖。 第3圖為應用本發明進行詞彙查詢之示意圖。 第4圖為本發_覽及編輯授權:祕表u 第5圖為應用本發明進行授權設定之示意圖。、回 【主要元件符號說明】 110客戶端 120伺服端 121時間記錄模組 122授權記錄模組 123提示模組 124删除模組 125預借模組 130網路 300詞彙查詢視窗 310授權狀態顯示區塊 320詞彙輸入區塊 12 201035888 330内容顯示區塊 340查詢元件 350清除元件 400授權狀態視窗 410載入元件 420授權編輯區塊 430排序元件 440確定元件 Ο 450取消元件 500授權管理視窗 510授權數量設定元件 520提示訊息設定元件 530時間範圍設定元件 540預借期間設定元件 550儲存元件 560預設元件 ❹ 步驟201該客戶端透過網路傳送一授權請求訊息,且該授權 請求訊息包含一識別訊息 ' 步驟202該伺服端接收該授權請求訊息,並且將該授權請求 訊息的接收時間記錄為一登入時間 步驟203該伺服端將該授權請求訊息的該識別訊息及該登入 時間記錄於一授權資料表,並授權該客戶端與該伺 服端連結 步驟204該伺服端根據該授權資料表獲得客戶端的登入數 13 201035888 量,並且於該登入數量超出一授權數量時,產生並 傳送一提示訊息至該些客戶端 步驟2041當該登入數量超出該授權數量時,於一預借期間 内調整授權數量以避免產生該提示訊息 步驟205當該提示訊息產生時,該伺服端自該授權資料表中 刪除該登入時間超出一時間範圍的該識別訊息 14The following is a description of the following examples in conjunction with "3" to "5". "Please refer to "3" and "3" for vocabulary query using the present invention. The window 300, the authorization status display block 310, the word capsule input block 320, the content display block 330, the query component 340, and the clearing component 35A. In particular, the present invention does not limit the number of 兀 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ For illustrative purposes. When the user wants to use the application to authorize the management system 2 network translation on the client terminal 11, when the vocabulary query window 300 is opened, the client UG can be informed through the network 130 (for example: The authorization request message with the control address is Ί33-44-55") is sent to the server terminal 12. The time recording module 121 of the server terminal 120 of the client 11^4 receives the request message of the guest time record through the network 130. And will receive the request for the ride on the 11th 22: recognition % 'for example, assume that the reception time is 2_11 November. After 1 33 minutes and 44 seconds, the log-in time of the record is "200811 delete 344 information and two grants: the record module 122 will encrypt the identification information contained in the request message (including identification information and login, and authorization ==: = 9 201035888 Recorded: No news: The client 110 is connected to the server 120. The selection module 123 is based on the sum of the identification information of the authorized data towel:: & U〇 login number, due to the current There is only one 5' in the authorization data sheet, so the number of logins obtained by the client is 丫, and because the number of logins exceeds the preset number of authorizations (assuming the value is “π”), the heart is not deleted. The group 124 also does not do any processing. ... At this point, the client UG is connected to the i2G, and can be displayed in the second radio block 310 (10), such as: "authorized" in text mode) The user can input the word to be queried in the vocabulary input block no, and input the query component into the __ system, and the query is not displayed in the content display block 33G, and the selection clear component 35G will vocabulary Input, block, 〇 and content display block 33G content into The line is cleared so that you can enter another word for the query again. Since the vocabulary query is a well-known technique of the network translation system, it will not be repeated here. d, the client 110 that is logged in through P is gradually increased, and the identification information recorded in the authorization data table is also increased. When the number of logins obtained by the client 123 is higher than the preset authorization amount, the generation will be generated. And send a prompt message (the picture is not ^ to the client 110. At this time, in addition to the module m from the authorization data table, the identification message whose login time exceeds the preset time range is deleted. If the authorization data table does not have exceeded= The identification message of the set time range can be further extended by the pre-borrowing module 125 during a preset pre-period (for example, pre-borrowing_value "(1)")_ to avoid generating a prompt message. , Shan Huan 125 can make an adjustment to the amount of Wei (for example: the number of authorizations is 纟 "50, increase A "70"), and the number of authorizations after the adjustment is transferred to ten days (that is, the pre-borrowing value is " 1G"), after the expiration of the straight day, the original authorized quantity will be restored again at 201035888. As shown in "Fig. 4", "4th picture" is the application of the present invention and the editorial authorization data sheet. The authorization data sheet in the terminal 12G can be pre-set. The status window is loaded and loaded into the authorized editing block 420 via the click-to-manage component 410 miscellaneous data table for display editing. The content of the authorized data table displayed includes the identification message (10), eg, ·: "00 -11-22-33-44-55") and login time (for example: "2〇〇81111223344"), (4) can be directly edited in the authorized dragon block (4) money line, use (10) to add, modify or delete identification The message can also be sorted by the sorting tree according to the login time, such as: sorting by incrementing or decrementing, and after editing, click OK to save the component, or click to cancel the component. . As shown in Fig. 5, "figure 5" is a schematic diagram of the authorization setting by applying the present invention. As mentioned above, 'authorization quantity, time position and pre-borrowing_ can be preset parameter values. In actual implementation, it can be set at the value end 12G through authorization management bribe 500, for example, separately The authorized quantity setting component 51, the time range setting component 530, and the pre-borrowing period setting component S4〇 are used to set the parameter values of the authorized number, the inter-temporal range, and the pre-borrowing period, and the prompting module 123 generates The message can be generated according to the prompt message setting component 52(). For example, if the input text is "authorized full" in the prompt message setting component, when the prompting module 123 generates a prompt message, the content thereof will be Contains the text "Authorization is full." In summary, it can be seen that the difference between the present invention and the prior art is that the login time and the identification information are recorded through the authorization data table to know the current authorization status, and when the authorized quantity is exceeded, the lion is used as a basis. Therefore, the technical means 11 201035888 3 solves the problems of the prior art by using only the recycling shop, thereby achieving the technical effect of improving the utilization rate of the authorization. Although the foregoing embodiments of the present invention (10) are disclosed above, it is not intended to limit the invention to any skilled person, and without departing from the spirit and scope of the invention, The forging and forging shall be subject to the definition of the patent application scope attached to this manual. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a block diagram of an authorization management system of the present invention. Figure 2 is a flow chart of the authorization management method of the present invention. Figure 3 is a schematic diagram of a vocabulary query using the present invention. Fig. 4 is a schematic diagram of the present invention. The secret table u is a schematic diagram of the authorization setting by applying the present invention. [Back to main component symbol description] 110 client 120 servo terminal 121 time recording module 122 authorization recording module 123 prompt module 124 deletion module 125 pre-borrowing module 130 network 300 vocabulary query window 310 authorization status display block 320 vocabulary input block 12 201035888 330 content display block 340 query element 350 clear component 400 authorization status window 410 load component 420 authorized editing block 430 sorting component 440 determination component Ο 450 cancel component 500 authorization management window 510 authorized quantity setting component 520 prompt message setting component 530 time range setting component 540 pre-borrowing period setting component 550 storage component 560 preset component ❹ Step 201: The client transmits an authorization request message through the network, and the authorization request message includes an identification message. The server receives the authorization request message, and records the reception time of the authorization request message as a login time step 203. The server records the identification message of the authorization request message and the login time in an authorization data table, and authorizes The client and the server connect the step 204 to the server root According to the authorization data table, the number of logins of the client is 13 201035888, and when the number of logins exceeds an authorized quantity, a prompt message is generated and transmitted to the clients. Step 2041, when the number of logins exceeds the authorized quantity, Adjusting the number of authorizations during the pre-borrowing period to avoid generating the prompt message. Step 205. When the prompt message is generated, the server deletes the identification message 14 from the authorization data table that the login time exceeds a time range.

Claims (1)

201035888 七、申請專利範圍: ❹201035888 VII. Patent application scope: ❹ 一種授權管理系統,應用於客戶端 該系統包含: /飼服端的網 路環境中 息, 至少-客戶端’該客戶端透過網路傳送— 且該授權請求訊息包含—識別訊息;及 一伺服端,該伺服端包含: 授權請求訊 一時間記錄模組’用以接收該授權請求气章, 將該授權請求訊息的接收時間記錄為—登入;.心=:組:以將該授權請求訊息_識別 n亥且入時間§己錄於一授權資料表 端與該伺服端連結; 客戶 並且 -提示模組’用以根據該授權資料表獲得客戶端的 登入數量,並且於該登入數量超出一授權數量時,產生 並傳送一提示訊息至該些客戶端;及 -刪除模組,當該提示訊息產生時,自該授權資料 表中刪除該登入時間超出一時間範圍的該識別訊息。 2. 如申請專補圍第1項所述之授鮮理祕,其巾該系統更 包含-預借模組,肋於該登人數量超出該授權數量時,於 一預借期間内調整授權數量以避免產生該提示訊息。 3. 如申請專利範圍第1項所述之授權管理系統,其中該登入數 量超出該授權數量時,禁止該些客戶端連結至該伺服端。 4. 如申請專利範圍第丨項所述之授權管理系統,其中該識別訊 息包含電腦名稱、網路位址及硬體序號至少其中之一,其中 該硬體序號包含媒體存取控制位址、中央處理器序號或硬碟 15 201035888 序號。 5. 6· 2請專利範圍第1項所述之授權管理系統,其中該登入數 二為雜權資料表中的該識別訊息之總合。 具有至少-客戶端及,端的 該客戶端透轉送—授騎求訊息,且雜權請求 巩^包含一識別訊息;An authorization management system for a client that includes: / a network environment in the feeding end, at least - the client 'the client transmits over the network - and the authorization request message contains - an identification message; and a server The server includes: an authorization request message, a time recording module 'to receive the authorization request gas chapter, and the reception time of the authorization request message is recorded as - login; heart =: group: to request the authorization request message_ The identification and the time of entry are recorded on the end of an authorization data table and the server; the client and the prompt module are used to obtain the number of logins of the client according to the authorization data table, and the number of logins exceeds an authorized quantity. And generating and transmitting a prompt message to the clients; and deleting the module, and when the prompt message is generated, deleting the identification message whose login time exceeds a time range from the authorization data table. 2. If the application is to supplement the secret information mentioned in item 1, the system of the towel further includes a pre-borrowing module, and the arbitrator adjusts the authorization within a pre-borrowing period when the number of the person exceeds the authorized amount. The number is to avoid generating this prompt message. 3. For the authorization management system described in claim 1, wherein the number of logins exceeds the authorized number, the clients are prohibited from being linked to the server. 4. The authorization management system of claim 2, wherein the identification message comprises at least one of a computer name, a network address, and a hardware serial number, wherein the hardware serial number includes a media access control address, CPU serial number or hard disk 15 201035888 serial number. 5. 6· 2 Please refer to the authorization management system described in item 1 of the patent scope, where the number of logins is the sum of the identification messages in the miscellaneous data sheet. The client has at least a client and a client, and the client requests a message, and the miscellaneous request includes an identification message; 摘服端接收該麵請求訊息,並且將該授騎求訊息 的接收時間記錄為一登入時間; 該飼服端將該授權請求訊息的該識別訊息及該登入時 間記錄於—授料表,並授_客戶端與_服端連結; 該词服端根據該授權資料表獲得客戶端的登人數量,並 且於该登人數量超Λ —授餘量時,產生並傳送-提示訊息 至該些客戶端;及 _ ¥ 士示°孔息產生時,該祠服端自該授權資料表中刪除Receiving, by the server, the face request message, and recording the receiving time of the call request message as a login time; the feeding server records the identification message of the authorization request message and the login time in the “receiving form”, and The client is connected with the server; the word server obtains the number of clients on the basis according to the authorization data table, and generates and transmits a message to the customers when the number of the person exceeds the amount of the allowance. End; and _ ¥ When the hole is generated, the service end is deleted from the authorization data sheet. 該登入時間超出一時間範圍的該識別訊息。 7. 如申μ專利細第6項所述之授權管理方法,其中該方法更 包含於該登入數量超出該授權數量時,於一預借期間内調整 授權數量以避免產生該提示訊息的步驟。 8. 如申請專利細第6項所述之授權管理方法,其中該登入數 篁超出該授權數量時’禁止該些客戶端連結至關服端。 9. 如申請專利顧第6騎狀授㈣理方法,其巾賴別訊 息包含電腦名稱、網路位址及硬體序號至少其中之一,其中 該硬體序號包含媒體存取控制位址、中央處理器序號或硬碟 16 201035888 序號。 10.如申請專利範圍第6項所述之授權管理方法,其中該登入數 量為該授權資料表中的該識別訊息之總合。The identification message exceeds the identification message for a time range. 7. The authorization management method according to claim 6, wherein the method further comprises the step of adjusting the number of authorizations during a pre-borrowing period to avoid generating the prompt message when the number of logins exceeds the authorized number. 8. If the authorization management method described in claim 6 is applied, wherein the number of logins exceeds the authorized number, the clients are prohibited from connecting to the service terminal. 9. If the patent application method is applied to the patent, the message of the towel includes at least one of a computer name, a network address and a hardware serial number, wherein the hardware serial number includes a media access control address, CPU serial number or hard disk 16 201035888 serial number. 10. The authorization management method of claim 6, wherein the login number is a sum of the identification messages in the authorization data table. 1717
TW98110017A 2009-03-26 2009-03-26 Authorization management system and method thereof TW201035888A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98110017A TW201035888A (en) 2009-03-26 2009-03-26 Authorization management system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98110017A TW201035888A (en) 2009-03-26 2009-03-26 Authorization management system and method thereof

Publications (1)

Publication Number Publication Date
TW201035888A true TW201035888A (en) 2010-10-01

Family

ID=44856034

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98110017A TW201035888A (en) 2009-03-26 2009-03-26 Authorization management system and method thereof

Country Status (1)

Country Link
TW (1) TW201035888A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI692960B (en) * 2018-10-18 2020-05-01 新穎數位文創股份有限公司 Blockchain authentication system and blockchain authentication method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI692960B (en) * 2018-10-18 2020-05-01 新穎數位文創股份有限公司 Blockchain authentication system and blockchain authentication method

Similar Documents

Publication Publication Date Title
US8065424B2 (en) System and method for data transport
US8819410B2 (en) Private electronic information exchange
US8275718B2 (en) System and method for secure and/or interactive dissemination of information
CN102918801B (en) By network traffics application of policies in the system and method for utility cession
US6684248B1 (en) Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist
US20140059702A1 (en) System and Method to Associate a Private User Identity with a Public User Identity
US20050004881A1 (en) Method and apparatus for identifying, managing, and controlling communications
EP2894829B1 (en) Method for secure transmission of a data object
WO2006043495A1 (en) E-mail transmission system
US8756422B2 (en) System and method for secure and/or interactive dissemination of information
US20060031352A1 (en) Tamper-proof electronic messaging
WO2008050743A1 (en) Electronic mail transmission/reception system
WO2005109795A1 (en) Tamper-proof electronic messaging
AU2013223989B2 (en) Method for the certification of electronic mail delivery
US20120272339A1 (en) Method and system for accessing password-protected data on a device
US20050198165A1 (en) Systems and methods for electronic information distribution
WO2001050691A2 (en) Sender-controlled post delivery handling of digitally delivered documents in a computer network
WO2005046148A1 (en) Caching in an electronic messaging system
US9686212B2 (en) Systems, methods and interfaces for using a messaging program across a multiple applications and communications environment
TW201035888A (en) Authorization management system and method thereof
NL2011857C2 (en) Secure single sign-on exchange of electronic data.
JP7308554B2 (en) Security authentication method, device and server for B2B service based on corporate official mailbox
KR101483295B1 (en) Method for Sharing
JP2005184215A (en) Electronic signature approval data transmission method and apparatus
JP4847519B2 (en) COMMUNICATION SYSTEM, COMMUNICATION PROGRAM, AND COMMUNICATION METHOD