WO2019237589A1 - 自动授权方法、装置、计算机设备及计算机存储介质 - Google Patents

自动授权方法、装置、计算机设备及计算机存储介质 Download PDF

Info

Publication number
WO2019237589A1
WO2019237589A1 PCT/CN2018/109393 CN2018109393W WO2019237589A1 WO 2019237589 A1 WO2019237589 A1 WO 2019237589A1 CN 2018109393 W CN2018109393 W CN 2018109393W WO 2019237589 A1 WO2019237589 A1 WO 2019237589A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
host
attribute
information
target host
Prior art date
Application number
PCT/CN2018/109393
Other languages
English (en)
French (fr)
Inventor
夏永燕
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019237589A1 publication Critical patent/WO2019237589A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present application relates to the field of computer technology, and in particular, to an automatic authorization method, device, and computer storage computer storage medium.
  • the user's authority to operate the host server is generally artificial authorization.
  • the user needs to deploy specific tasks outside the authority to a specific host server, he needs to submit an authorization application, and then the authorization request is manually approved by the superior.
  • the superior corresponds to the specific host server.
  • the user can perform operations for deploying specific tasks.
  • the superior judges incorrectly, opening the wrong host to the user, causing authorization errors, or granting permissions to users who do not have the corresponding operation level; in addition, artificial authorization also causes the authorization to take too long , Authorization is inefficient.
  • the embodiments of the present application provide an automatic authorization method, device, computer equipment, and computer storage medium, which can achieve the purpose of automatic authorization and avoid artificial authorization errors.
  • an embodiment of the present application provides an automatic authorization method.
  • the method includes:
  • an embodiment of the present application further provides an automatic authorization device, where the automatic authorization device includes a unit for implementing the automatic authorization method described in the first aspect.
  • an embodiment of the present application further provides a computer device including a memory and a processor connected to the memory;
  • the memory is used to store a computer program that implements an automatic authorization method
  • the processor is configured to run a computer program stored in the memory to perform the method according to the first aspect.
  • an embodiment of the present application provides a computer storage medium, where the computer storage medium stores one or more computer programs, and the one or more computer programs can be executed by one or more processors to Implement the method described in the first aspect above.
  • Embodiments of the present application provide an automatic authorization method, device, computer equipment, and computer storage medium.
  • the method includes: obtaining a first attribute of a user from a database of a system; obtaining a second attribute of a host associated with the system, the host There are multiple; searching for a host that matches the user according to the second attribute of the host and the first attribute of the user; granting the user permission to deploy a preset task on the host.
  • the user is assigned the authority to operate the host according to the second attribute of the host and the first attribute of the user.
  • the host can be operated by the user to perform a preset task, which avoids Authorizing the wrong host to the user, it also avoids authorizing the host to the wrong user who does not have permission, and shortens the authorization time and improves the user experience.
  • FIG. 1 is a schematic flowchart of an automatic authorization method according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a sub-flow of an automatic authorization method according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of another sub-flow of an automatic authorization method according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of interaction between a server and a host according to an embodiment of the present application.
  • FIG. 5 is another schematic flowchart of an automatic authorization method according to an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of an automatic authorization device according to an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a subunit of an automatic authorization device according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of another subunit of an automatic authorization device according to an embodiment of the present application.
  • FIG. 9 is another schematic block diagram of an automatic authorization device according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a computer device according to an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of an automatic authorization method according to an embodiment of the present application.
  • the method is applied to a server, and the server can be connected to a plurality of hosts to form a system.
  • the automatic authorization method is used to select users from a number of hosts in the system. Matching host.
  • the method includes steps S101 to S104:
  • users can be divided into ordinary users and users with special permissions.
  • Ordinary users can perform some common business operations, and users with special permissions will have certain permissions. They can connect to the host associated with the system, that is, the server. Host for specific operations.
  • the ID has a unique identifier.
  • the server of the system can identify the identity of the user by the user ID.
  • the system allocates a user ID or uses the user's ID number as the user ID of the user.
  • the user needs to fill in his personal information.
  • the personal information filled in by the user needs to include the first attribute that reflects the characteristics of the user, so that the server can obtain the first attribute of the user from the system database when needed. Achieve user-related permissions.
  • the first attribute of the user includes position information and service objects of the user.
  • Job information includes, for example, development posts, test posts, and production posts.
  • the service object refers to the company that the user serves or the company to which the user belongs.
  • step S101 includes sub-steps S1011-S1012.
  • S1011 Receive login information for the user to log in to the system, where the login information includes a user ID.
  • the server obtains the post information and service objects corresponding to the user from the database through the user ID.
  • the system can be used to manage all companies in a group.
  • the server of the system can be configured with multiple hosts, and each host is added with the label of the affiliated company. Different hosts have different purposes and can be used to handle corresponding Company business.
  • the second attribute of the host includes the host's environmental information and beneficiary objects.
  • the beneficiary refers to the company to which the host belongs.
  • a host is mainly used to process the business of the host company.
  • the environmental information can reflect the main functions of the host.
  • the environmental information includes the test environment, development environment, and production environment. For example, if a host is mainly used for testing, the environment information added for that host is the test environment; if a host is mainly used for development, the environment information added for the host is the development environment; a host is mainly used for testing For operation or production, the environment information added for the host is the production environment; in another embodiment, the environment information of the host used for operation may also be defined as the production environment.
  • one host's environmental information is a test environment and the beneficiary is an insurance company under the group, the host is used to process some of the insurance company's testing business.
  • the other host's environmental information is a development environment.
  • this host is used to handle some of the development business of the fund company.
  • S103 Search for a host matching the user as a target host according to a plurality of second attributes of the host and the first attribute of the user.
  • the permission matching relationship between the host and the user refers to the relationship between the deployment subject (user) and the execution carrier (host) of the preset task.
  • the deployment subject (user) has the authority to deploy preset tasks on the specific execution carrier (host).
  • existing user A, user B, user C, and host a, host b, and host c Based on the match between the first attribute of the user and the second attribute of the host, the user A can deploy a preset on the host a User B can not deploy a preset task on host b and host c. User B can deploy a preset task b1 on host b, but not on host a and host c. User C can deploy a preset task on host c. , But ca n’t deploy preset tasks on host a and host b. Therefore, user A has the right to deploy preset tasks on host a, user B has the right to deploy preset tasks on host b, and user C has the ability to host preset tasks on host c. Permission to deploy scheduled tasks.
  • the target host matching the user may be searched by the second attribute of the host and the first attribute of the user.
  • step S103 includes sub-steps S1031-S1032.
  • the environmental information of the multiple hosts is compared with the post information of the user, and the beneficiary objects of the multiple hosts are compared with the service objects of the user.
  • a host whose environmental information matches the post information of the user and whose benefit object is consistent with the service object of the user is identified as a target host.
  • the matching of the host's corresponding environmental information with the user's post information means: (1) If the user's post information is a development post and the host corresponds to a development environment, the host's environmental information matches the user's post information; (2) if the user's post information is The post information is a test post, and the host corresponds to a test environment, so the environmental information of the host matches the post information of the user; (3) If the post information of the user is a production post (in another embodiment, it can be an operation post), the host Corresponding to the production environment, the host's environment information matches the user's job information.
  • the benefit object (company) corresponding to the host is the same as the service object (company) of the user, then the benefit object of the host matches the user's service object.
  • the production post personnel (in another embodiment, the operation post personnel) authorizes the host of the production environment, the test post personnel authorizes the test environment host, and the development post personnel authorizes the development environment host.
  • the deployment preset task refers to deploying a script on a target host to analyze corresponding business data on the target host.
  • the user can use the host, and preset tasks are deployed on the host to ensure that users who meet specific characteristics use the specific host for specific task.
  • FIG. 4 is a schematic diagram of interaction between a server of the system and a host of the system.
  • the server and the host can implement remote communication to send tasks to the host
  • FIG. 5 It is a schematic flowchart of an automatic authorization method according to another embodiment. After step S104, the method further includes the following steps:
  • the system server After the system server automatically grants users to deploy preset tasks on the host, the user can deploy the preset tasks through the system server. After the user deploys the preset tasks, the system server delivers the user-deployed tasks to the corresponding target host. It is implemented to implement remote operation of the target host by users, and perform data analysis on specific services.
  • the system can directly assign hosts within the permissions (matching hosts) according to the user's first attribute, which optimizes the user experience and intelligent authorization greatly shortens authorization Time, at the same time, it also avoids the security risks of human misauthorization and irregular authorization.
  • FIG. 6 is a schematic block diagram of an automatic authorization device 100 according to an embodiment of the present application.
  • the automatic authorization device 100 includes a first acquisition unit 101, a second acquisition unit 102, a search unit 103, and an authorization unit 104.
  • the first obtaining unit 101 is configured to obtain a first attribute of a user from a database of the system.
  • the second obtaining unit 102 is configured to obtain a second attribute of a host associated with the system, where there are multiple hosts.
  • the searching unit 103 is configured to search for a host matching the user as a target host according to a plurality of second attributes of the hosts and first attributes of the users.
  • the authorization unit 104 is configured to grant the user permission to deploy a preset task on the target host.
  • the first attribute includes job information and service objects
  • the second attribute includes environmental information and beneficiary objects
  • the first obtaining unit 101 includes subunits 1011-1012.
  • the receiving subunit 1011 is configured to receive login information for the user to log in to the system, where the login information includes a user ID.
  • the obtaining subunit 1012 is configured to obtain post information and service objects of a user corresponding to the user ID from a database of the system.
  • the search unit 103 includes sub-units 1031-1033.
  • the first comparison subunit 1031 is configured to compare the environmental information of the multiple hosts with the post information of the user, respectively.
  • the second comparison subunit 1032 is configured to compare multiple beneficiary objects of the host with service objects of the user, respectively.
  • the confirmation subunit 1033 is configured to match a host whose environment information matches the post information of the user with a beneficiary object and a service object of the user as a target host.
  • the automatic authorization device 100 further includes a receiving unit 105 and a sending unit 106.
  • the receiving unit 105 is configured to receive an operation instruction for the user to deploy the preset task.
  • the issuing unit 106 is configured to deliver the preset task to the target host.
  • the automatic authorization of the Hang Seng Index in the embodiment of this application can directly assign the host within the authority (matching host) according to the first attribute of the user, optimizing the user experience, intelligent authorization greatly shortens the authorization time, and also avoids the existence of artificial authorization Security risks caused by human misauthorization and irregular authorization.
  • the automatic authorization device 100 may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in FIG. 10.
  • FIG. 10 is a schematic block diagram of a structure of a computer device 200 according to an embodiment of the present application.
  • the computer device 200 may be a server, and the server may be an independent server or a server cluster composed of multiple servers.
  • the computer device 200 includes a processor 202, a memory, and a network interface 205 connected through a system bus 201.
  • the memory may include a non-volatile storage medium 203 and an internal memory 204.
  • the non-volatile storage medium 203 of the computer device 200 can store an operating system 2031 and a computer program 2032. When the computer program 2032 is executed, the processor 202 can execute an automatic authorization method.
  • the internal memory 204 provides an environment for running the computer program 2032 in the non-volatile storage medium 203.
  • the processor 202 of the computer device 200 is used to provide computing and control capabilities to support the operation of the entire computer device 200.
  • the network interface 205 of the computer device 200 is used for network communication, such as sending assigned tasks and receiving data.
  • the processor 202 runs the computer program 2032 in the non-volatile storage medium 203, the processor 202 performs the following steps: obtaining the first attribute of the user from the database of the system; obtaining the second attribute of the host associated with the system, so There are a plurality of hosts; a host matching the user is searched as a target host according to the second attribute of the plurality of hosts and the first attribute of the user; and the user is granted a deployment preset on the target host Task permissions.
  • the processor 202 after the processor 202 executes the step of granting the user permission to deploy a preset task on the target host, the processor 202 further performs the following step: receiving the user to deploy the preset task An operation instruction; sending the preset task to the target host.
  • the first attribute includes job information and service objects.
  • the processor 202 executes the step of obtaining the first attribute of the user from the database of the system, the processor 202 specifically performs the following steps: receiving login information for the user to log in to the system, the login information including a user ID; The system database obtains the post information and service objects of the user corresponding to the user ID.
  • the two attributes include environmental information and a beneficiary object.
  • the processor 202 executes the step of searching for a host matching the user as a target host according to the second attribute of the plurality of hosts and the first attribute of the user, the processor 202 specifically performs the following steps: Compare the environment information of the plurality of hosts with the post information of the user; compare the beneficiary objects of the plurality of hosts with the service object of the user; match the environment information with the post information of the user and The host whose beneficiary object is consistent with the service object of the user is identified as the target host.
  • the embodiment of the computer device shown in FIG. 10 does not constitute a limitation on the specific configuration of the computer device.
  • the computer device may include more or fewer components than shown in the figure. Either some parts are combined or different parts are arranged.
  • the computer device may include only a memory and a processor. In such an embodiment, the structures and functions of the memory and the processor are the same as those in the embodiment shown in FIG. 10, and details are not described herein again.
  • the present application also provides a computer storage medium.
  • the computer storage medium stores one or more computer programs, and the one or more computer programs can be executed by one or more processors, and the following steps can be implemented:
  • the following steps are further implemented: receiving an operation instruction for the user to deploy the preset task;
  • the preset task is delivered to the target host.
  • the first attribute includes job information and service objects.
  • the following steps are specifically implemented: receiving login information for the user to log in to the system, the login information including a user ID; and from the database of the system To obtain post information and service objects of a user corresponding to the user ID.
  • the two attributes include environmental information and a beneficiary object.
  • a plurality of the hosts are respectively Compare the environmental information of the user with the position information of the user; compare multiple beneficiary objects of the host with the service object of the user; match the environmental information with the position information of the user and the benefited object matches the The host whose user service object is consistent is identified as the target host.
  • the computer storage medium may be an internal storage unit of the foregoing device, such as a hard disk or a memory of the device.
  • the computer storage medium may also be an external storage device of the device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, and a flash memory provided on the device. Card (Flash Card), etc.
  • the computer storage medium may further include both an internal storage unit of the device and an external storage device.
  • the disclosed devices, devices, and methods may be implemented in other ways.
  • the device embodiments described above are merely schematic.
  • the division of the units is only a logical function division.
  • Combining a unit for example, multiple units or components can be combined or integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices, or units, or may be electrical, mechanical, or other forms of connection.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions in the embodiments of the present application.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology, or all or part of the technical solution may be embodied in the form of a software product, which is stored in a computer storage
  • the medium includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing computer storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a magnetic disk, or an optical disk, which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种自动授权方法、装置、计算机设备及计算机存储介质。该方法包括:从系统的数据库中获取用户的第一属性(S101);获取所述系统关联的主机的第二属性,所述主机为多个(S102);根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机(S103);授予所述用户在所述目标主机上部署预设任务的权限(S104)。上述方法避免了将错误的主机授权给用户使用,同时也避免了将主机授权给不具有权限的错误用户使用,并且缩短授权时间,提高用户的体验感。

Description

自动授权方法、装置、计算机设备及计算机存储介质
本申请要求于2018年06月14日提交中国专利局、申请号为201810613477.5、申请名称为“自动授权方法、装置、计算机设备及计算机存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,尤其涉及一种自动授权方法、装置、计算机设备计算机存储介质。
背景技术
为了保证系统中各个主机服务器的业务数据安全性,用户往往需要得到一定的权限才可以操作主机服务器。
目前用户操作主机服务器的权限一般是人为授权,当用户需要将权限外的特定任务部署到特定的主机服务器时,需要提交授权申请,然后由上级人工审批授权申请,上级将该特定的主机服务器对应的操作权限开放给用户后,用户才可以进行部署特定任务的操作。这一过程中存在着一个风险,即上级判断错误,将错误的主机开放给用户,造成授权错误,或将权限授予了不具有对应操作水平的用户;另外,人为授权还导致授权的时间过长,授权效率低下。
发明内容
本申请实施例提供了一种自动授权方法、装置、计算机设备及计算机存储介质,能够达到自动授权、避免人为授权失误的目的。
第一方面,本申请实施例提供了一种自动授权方法,该方法包括:
接从系统的数据库中获取用户的第一属性;
获取所述系统关联的主机的第二属性,所述主机为多个;
根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;
授予所述用户在所述目标主机上部署预设任务的权限。
第二方面,本申请实施例还提供了一种自动授权装置,所述自动授权装置包括用于实现第一方面所述的自动授权方法的单元。
第三方面,本申请实施例还提供了一种计算机设备,包括存储器,以及与所述存储器相连的处理器;
所述存储器用于存储实现自动授权方法的计算机程序;
所述处理器用于运行所述存储器中存储的计算机程序,以执行如上述第一方面所述的方法。
第四方面,本申请实施例提供了一种计算机存储介质,所述计算机存储介质存储有一个或者一个以上计算机程序,所述一个或者一个以上计算机程序可被一个或者一个以上的处理器执行,以实现上述第一方面所述的方法。
本申请实施例提供了自动授权方法、装置、计算机设备及计算机存储介质,该方法包括:从系统的数据库中获取用户的第一属性;获取所述系统关联的主机的第二属性,所述主机为多个;根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机;授予所述用户在所述主机上部署预设任务的权限。本申请实施例根据主机的第二属性与用户的第一属性给用户分配操作主机的权限,当主机的属性与用户的属性相匹配时,该主机可被用户进行预设任务的操作,避免了将错误的主机授权给用户使用,同时也避免了将主机授权给不具有权限的错误用户使用,并且缩短授权时间,提高用户的体验感。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种自动授权方法的流程示意图;
图2是本申请实施例提供的一种自动授权方法的子流程示意图;
图3是本申请实施例提供的一种自动授权方法的另一子流程示意图;
图4是本申请实施例提供的服务器与主机的交互示意图;
图5是本申请实施例提供的一种自动授权方法的另一流程示意图;
图6是本申请实施例提供的一种自动授权装置的示意性框图;
图7是本申请实施例提供的一种自动授权装置的子单元示意性框图;
图8是本申请实施例提供的一种自动授权装置的另一子单元示意性框图;
图9是本申请实施例提供的一种自动授权装置的另一示意性框图;
图10是本申请实施例提供的一种计算机设备的结构示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。
也应当理解,尽管术语第一、第二等可以在此用来描述各种元素,但这些元素不应该受限于这些术语,这些术语仅用来将这些元素彼此区分开。
图1为本申请实施例提供的一种自动授权方法的流程示意图,该方法应用于一服务器,该服务器可与若干主机连接形成一系统,通过该自动授权方法从系统的若干主机中为用户选择匹配的主机。
如图1所示,该方法包括步骤S101~S104:
S101,从系统的数据库中获取用户的第一属性。
任何系统在用户注册账号时其数据库都需要保存用户的信息。对于系统而言,用户可分为普通用户和具有特别权限的用户,普通用户可进行一些普通的业务操作,而具有特别权限的用户会具有某些权限,可以对系统关联的主机,即服务器连接的主机进行特定操作。
ID具有唯一标识性,在本申请实施例中,系统的服务器可通过用户ID识别用户的身份,用户在注册登录账号时系统分配一个用户ID,或将用户的证件 号码作为该用户的用户ID,同时用户需要填写其个人信息,针对具有特别权限的用户,用户填写的个人信息需要包括能体现用户特性的第一属性,以便在需要之时服务器可以从系统的数据库中获取用户的第一属性以实现用户的相关权限。
在本申请实施例中,用户的第一属性包括用户的岗位信息和服务对象。岗位信息例如包括开发岗、测试岗和生产岗等,服务对象指的是该用户所服务的公司或该用户所属的公司。
如图2所示,步骤S101包括子步骤S1011-S1012。
S1011、接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID。
S1012、从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
当用户需要对主机进行一定权限的操作时,需要通过用户ID进行权限匹配,服务器通过用户ID从数据库中获取该用户对应的岗位信息和服务对象。
S102,获取所述系统关联的主机的第二属性,所述主机为多个。
在本申请实施例中,该系统可用于管理一集团旗下所有公司,系统的服务器可配置多台主机,每台主机都添加有隶属的公司的标签,不同主机具有不同的用途,可用来处理对应公司的业务。
预先根据每一台主机的功能和所属公司给每一台主机添加第二属性作为该主机的特定标记,并将每一台主机添加第二属性保存在系统的数据库中。主机的第二属性包括主机的环境信息和受益对象。
受益对象指的是主机所属的公司,某一主机主要用于处理所属公司的业务,环境信息可体现主机的主要功能,环境信息包括测试环境、开发环境和生产环境等。例如,某一台主机主要用于测试,则为该主机添加的环境信息为测试环境;某一台主机主要用于开发,则为该主机添加的环境信息为开发环境;某一台主机主要用于运行或生产,则为该主机添加的环境信息为生产环境;在另一实施例中也可定义用于运营的主机的环境信息为生产环境。
例如,有一台主机的环境信息为测试环境,受益对象为集团旗下的保险公司,则该主机用来处理保险公司的一些测试业务,再如,另一台主机的环境信息为开发环境,受益对象为集团旗下的基金公司,则该主机用来处理基金公司的一些开发业务。
S103,根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用 户相匹配的主机作为目标主机。
预先根据主机的第二属性以及用户的第一属性建立主机与用户的权限匹配关系,主机与用户的权限匹配关系指的是预设任务的部署主体(用户)与执行载体(主机)之间的对应关系,即部署主体(用户)在具体的执行载体(主机)具有部署预设任务的权限。
例如,现有用户A、用户B、用户C和主机a、主机b、主机c,根据用户的第一属性和主机的第二属性之间的匹配性,用户A可以在主机a上部署预设任务,而不能在主机b和主机c部署预设任务,用户B可以在主机b部署预设任务b1,而不能在主机a和主机c部署预设任务,用户C可以在主机c部署预设任务,而不能在主机a和主机b部署预设任务,因此,用户A具有在主机a部署预设任务的权限,用户B具有在主机b能部署预设任务的权限,用户C具有在主机c能部署预设任务的权限。
因此,在本申请实施例中,可通过主机的第二属性及所述用户的第一属性来搜索与该用户相匹配的目标主机。
如图3所示,步骤S103包括子步骤S1031-S1032。
S1031、分别将多个所述主机的环境信息与所述用户的岗位信息进行比较,分别将多个所述主机的受益对象与所述用户的服务对象进行比较。
S1032、将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
主机对应的环境信息与用户的岗位信息匹配指的是:(1)若用户的岗位信息为开发岗,主机对应为开发环境,则主机的环境信息与用户的岗位信息匹配;(2)若用户的岗位信息为测试岗,主机对应为测试环境,则主机的环境信息与用户的岗位信息匹配;(3)若用户的岗位信息为生产岗(在另一实施例中可为运营岗),主机对应为生产环境,则主机的环境信息与用户的岗位信息匹配。
主机对应的受益对象(公司)与用户的服务对象(公司)一致,则主机的受益对象与用户的服务对象匹配。
只有当用户的第一属性与主机的第二属性完全相匹配的情况下,该用户才匹配该主机,可以使用该主机,以保证符合特定特点的用户使用特定的主机(目标主机),例如给生产岗位人员(在另一实施例中可为运营岗位人员)授权生产环境的主机,给测试岗位人员授权测试环境的主机,给开发岗位人员授权开发环境的主机。
S104,授予所述用户在所述目标主机上部署预设任务的权限。
部署预设任务指的是在目标主机上部署脚本以分析该目标主机上相应的业务数据。
只有当用户的第一属性与主机的第二属性完全相匹配的情况下,该用户才可以使用该主机,在该主机部署预设任务,以保证符合特定特点的用户使用特定的主机进行特定的任务。
在另一申请实施例中,参考图4和图5,其中,图4为系统的服务器与系统的主机的交互示意图,服务器与主机之间可实现远程通信,将任务下发至主机,图5为另一实施例的自动授权方法的流程示意图,在步骤S104之后还包括以下步骤:
S105、接收所述用户部署所述预设任务的操作指令。
S106、将所述预设任务下发至所述目标主机。
系统的服务器自动授予用户可在主机上部署预设任务之后,用户可通过系统的服务器部署预设任务,用户部署预设任务完成后,系统的服务器将用户部署的任务下发至对应的目标主机上执行,以实现用户远程操作目标主机,对具体业务进行数据分析。
通过本申请实施例的自动授权方法,用户不需要提交权限申请签批,系统可以根据用户的第一属性直接分配权限内的主机(匹配的主机),优化了用户体验,智能授权大大地缩短授权时间,同时也避免了人为授权存在的人为误授权以及不规范授权的安全隐患。
图6为本申请实施例提供的一种自动授权装置100的示意性框图。该自动授权装置100包括第一获取单元101、第二获取单元102、搜索单元103和授权单元104。
第一获取单元101用于从系统的数据库中获取用户的第一属性。
第二获取单元102用于获取所述系统关联的主机的第二属性,所述主机为多个。
搜索单元103用于根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机。
授权单元104用于授予所述用户在所述目标主机上部署预设任务的权限。
在一申请实施例中,所述第一属性包括岗位信息和服务对象,所述二属性 包括环境信息和受益对象。
如图7所示,所述第一获取单元101包括子单元1011-1012。
接收子单元1011用于接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID。
获取子单元1012用于从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
如图8所示,所述搜索单元103包括子单元1031-1033。
第一比较子单元1031用于分别将多个所述主机的环境信息与所述用户的岗位信息进行比较。
第二比较子单元1032用于分别将多个所述主机的受益对象与所述用户的服务对象进行比较。
确认子单元1033用于将环境信息与所述用户的岗位信息匹配,且受益对象与所述用户的服务对象一致的主机确认为目标主机。
在另一申请实施例中,如图9所示,所述自动授权装置100还包括接收单元105和下发单元106。
接收单元105用于接收所述用户部署所述预设任务的操作指令。
下发单元106用于将所述预设任务下发至所述目标主机。
本申请实施例的自动授权咋恒指,可以根据用户的第一属性直接分配权限内的主机(匹配的主机),优化了用户体验,智能授权大大地缩短授权时间,同时也避免了人为授权存在的人为误授权以及不规范授权的安全隐患。
上述自动授权装置100的作用以及各个单元的具体描述,本申请实施例未详尽之处可参考上述方法实施例,此处不做赘述。上述自动授权装置100可以实现为一种计算机程序的形式,计算机程序可以在如图10所示的计算机设备上运行。
图10为本申请实施例提供的一种计算机设备200的结构示意性框图。该计算机设备200,该计算机设备200可以是服务器,服务器可以是独立的服务器,也可以是多个服务器组成的服务器集群。
该计算机设备200,包括通过系统总线201连接的处理器202、存储器和网络接口205,其中,存储器可以包括非易失性存储介质203和内存储器204。
该计算机设备200的非易失性存储介质203可存储操作系统2031和计算机 程序2032,该计算机程序2032被执行时,可使得处理器202执行一种自动授权方法。该内存储器204为非易失性存储介质203中的计算机程序2032的运行提供环境。该计算机设备200的处理器202用于提供计算和控制能力,支撑整个计算机设备200的运行。计算机设备200的网络接口205用于进行网络通信,如发送分配的任务、接收数据等。
处理器202运行非易失性存储介质203中的计算机程序2032时,处理器202执行以下步骤:从系统的数据库中获取用户的第一属性;获取所述系统关联的主机的第二属性,所述主机为多个;根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;授予所述用户在所述目标主机上部署预设任务的权限。
在一实施例中,所述处理器202在执行所述授予所述用户在所述目标主机上部署预设任务的权限的步骤之后,还执行以下步骤:接收所述用户部署所述预设任务的操作指令;将所述预设任务下发至所述目标主机。
在一实施例中,所述第一属性包括岗位信息和服务对象。
所述处理器202在执行所述从系统的数据库中获取用户的第一属性的步骤时,具体执行以下步骤:接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
在一实施例中,所述二属性包括环境信息和受益对象。
所述处理器202在执行所述根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机的步骤时,具体执行以下步骤:分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;分别将多个所述主机的受益对象与所述用户的服务对象进行比较;将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
本领域技术人员可以理解,图10中示出的计算机设备的实施例并不构成对计算机设备具体构成的限定,在其他实施例中,计算机设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。例如,在一些实施例中,计算机设备可以仅包括存储器及处理器,在这样的实施例中,存储器及处理器的结构及功能与图10所示实施例一致,在此不再赘述。
本申请还提供一种计算机存储介质,所述计算机存储介质存储有一个或者 一个以上计算机程序,所述一个或者一个以上计算机程序可被一个或者一个以上的处理器执行,可实现以下步骤:
从系统的数据库中获取用户的第一属性;获取所述系统关联的主机的第二属性,所述主机为多个;根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;授予所述用户在所述目标主机上部署预设任务的权限。
在一实施例中,在实现所述授予所述用户在所述目标主机上部署预设任务的权限的步骤之后,还实现以下步骤:接收所述用户部署所述预设任务的操作指令;将所述预设任务下发至所述目标主机。
在一实施例中,所述第一属性包括岗位信息和服务对象。
在实现所述从系统的数据库中获取用户的第一属性的步骤时,具体实现以下步骤:接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
在一实施例中,所述二属性包括环境信息和受益对象。
在实现所述根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机的步骤时,具体实现以下步骤:分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;分别将多个所述主机的受益对象与所述用户的服务对象进行比较;将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
所述计算机存储介质可以是前述设备的内部存储单元,例如设备的硬盘或内存。所述计算机存储介质也可以是所述设备的外部存储设备,例如所述设备上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述计算机存储介质还可以既包括所述设备的内部存储单元也包括外部存储设备。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的设备、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超 出本申请的范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,也可以将具有相同功能的单元集合成一个单元,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本申请实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分,或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个计算机存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的计算机存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (20)

  1. 一种自动授权方法,包括:
    从系统的数据库中获取用户的第一属性;
    获取所述系统关联的主机的第二属性,所述主机为多个;
    根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;
    授予所述用户在所述目标主机上部署预设任务的权限。
  2. 根据权利要求1所述的自动授权方法,其中,所述第一属性包括岗位信息和服务对象。
  3. 根据权利要求2所述的自动授权方法,其中,所述从系统的数据库中获取用户的第一属性,包括:
    接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;
    从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
  4. 根据权利要求2所述的自动授权方法,其中,所述第二属性包括环境信息和受益对象;
    所述根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机,包括:
    分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;
    分别将多个所述主机的受益对象与所述用户的服务对象进行比较;
    将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
  5. 根据权利要求1所述的自动授权方法,其中,所述授予所述用户在所述目标主机上部署预设任务的权限之后,还包括:
    接收所述用户部署所述预设任务的操作指令;
    将所述预设任务下发至所述目标主机。
  6. 一种自动授权装置,其中,包括:
    第一获取单元,用于从系统的数据库中获取用户的第一属性;
    第二获取单元,用于获取所述系统关联的主机的第二属性,所述主机为多个;
    搜索单元,用于根据多个所述主机的第二属性及所述用户的第一属性搜索 与所述用户相匹配的主机作为目标主机;
    授权单元,用于授予所述用户在所述目标主机上部署预设任务的权限。
  7. 根据权利要求6所述的自动授权装置,其中,所述第一属性包括岗位信息和服务对象。
  8. 根据权利要求7所述的自动授权装置,其中,所述第一获取单元包括:
    接收子单元,用于接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;
    获取子单元,用于从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
  9. 根据权利要求7所述的自动授权装置,其中,所述二属性包括环境信息和受益对象;
    所述搜索单元包括:
    第一比较子单元,用于分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;
    第二比较子单元,用于分别将多个所述主机的受益对象与所述用户的服务对象进行比较;
    确认子单元,用于将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
  10. 根据权利要求6所述的自动授权装置,其中,还包括:
    接收单元,用于接收所述用户部署所述预设任务的操作指令;
    下发单元,用于将所述预设任务下发至所述目标主机。
  11. 一种计算机设备,其包括存储器,以及与所述存储器相连的处理器;
    所述存储器用于存储实现自动授权方法的计算机程序;
    所述处理器用于运行所述存储器中存储的计算机程序,以执行以下步骤:
    从系统的数据库中获取用户的第一属性;
    获取所述系统关联的主机的第二属性,所述主机为多个;
    根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;
    授予所述用户在所述目标主机上部署预设任务的权限。
  12. 根据权利要求11所述的计算机设备,其中,所述第一属性包括岗位信息和服务对象。
  13. 根据权利要求12所述的计算机设备,其中,所述处理器在执行所述从 系统的数据库中获取用户的第一属性的步骤时,具体执行以下步骤:
    接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;
    从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
  14. 根据权利要求12所述的计算机设备,其中,所述二属性包括环境信息和受益对象;
    所述处理器在执行所述根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机的步骤时,具体执行以下步骤:
    分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;
    分别将多个所述主机的受益对象与所述用户的服务对象进行比较;
    将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
  15. 根据权利要求11所述的计算机设备,其中,所述处理器在执行所述授予所述用户在所述目标主机上部署预设任务的权限的步骤之后,还执行以下步骤:
    接收所述用户部署所述预设任务的操作指令;
    将所述预设任务下发至所述目标主机。
  16. 一种计算机存储介质,其中,所述计算机存储介质存储有一个或者一个以上计算机程序,所述一个或者一个以上计算机程序可被一个或者一个以上的处理器执行,以实现以下步骤:
    从系统的数据库中获取用户的第一属性;
    获取所述系统关联的主机的第二属性,所述主机为多个;
    根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机;
    授予所述用户在所述目标主机上部署预设任务的权限。
  17. 根据权利要求16所述的计算机存储介质,其中,所述第一属性包括岗位信息和服务对象。
  18. 根据权利要求17所述的计算机存储介质,其中,在实现所述从系统的数据库中获取用户的第一属性的步骤时,具体实现以下步骤:
    接收所述用户登录所述系统的登录信息,所述登录信息包括用户ID;
    从所述系统的数据库中获取所述用户ID对应的用户的岗位信息和服务对象。
  19. 根据权利要求17所述的计算机存储介质,其中,所述二属性包括环境信息和受益对象;
    在实现所述根据多个所述主机的第二属性及所述用户的第一属性搜索与所述用户相匹配的主机作为目标主机的步骤时,具体实现以下步骤:
    分别将多个所述主机的环境信息与所述用户的岗位信息进行比较;
    分别将多个所述主机的受益对象与所述用户的服务对象进行比较;
    将环境信息与所述用户的岗位信息匹配且受益对象与所述用户的服务对象一致的主机确认为目标主机。
  20. 根据权利要求16所述的计算机存储介质,其中,在实现所述授予所述用户在所述目标主机上部署预设任务的权限的步骤之后,还实现以下步骤:
    接收所述用户部署所述预设任务的操作指令;
    将所述预设任务下发至所述目标主机。
PCT/CN2018/109393 2018-06-14 2018-10-09 自动授权方法、装置、计算机设备及计算机存储介质 WO2019237589A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810613477.5A CN108830054B (zh) 2018-06-14 2018-06-14 自动授权方法、装置、计算机设备及计算机存储介质
CN201810613477.5 2018-06-14

Publications (1)

Publication Number Publication Date
WO2019237589A1 true WO2019237589A1 (zh) 2019-12-19

Family

ID=64141765

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/109393 WO2019237589A1 (zh) 2018-06-14 2018-10-09 自动授权方法、装置、计算机设备及计算机存储介质

Country Status (2)

Country Link
CN (1) CN108830054B (zh)
WO (1) WO2019237589A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162946B (zh) * 2019-05-30 2022-08-16 奇安信科技集团股份有限公司 移动存储管控方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1465052A2 (en) * 2003-04-01 2004-10-06 Seiko Epson Corporation Document sharing service for network printing
CN104680082A (zh) * 2015-03-17 2015-06-03 浪潮集团有限公司 一种数据权限访问控制模型
CN106453425A (zh) * 2016-12-09 2017-02-22 郑州云海信息技术有限公司 一种多用户使用主机插件的权限管理方法及系统
CN107944254A (zh) * 2017-11-01 2018-04-20 平安科技(深圳)有限公司 系统的权限配置方法、应用服务器及计算机可读存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4830503B2 (ja) * 2006-01-18 2011-12-07 株式会社日立製作所 個人情報を保護した通信セッション確立仲介システムおよび方法
CN106911489B (zh) * 2015-12-22 2019-08-27 中国电信股份有限公司 一种接入设备的自动适配方法、管理装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1465052A2 (en) * 2003-04-01 2004-10-06 Seiko Epson Corporation Document sharing service for network printing
CN104680082A (zh) * 2015-03-17 2015-06-03 浪潮集团有限公司 一种数据权限访问控制模型
CN106453425A (zh) * 2016-12-09 2017-02-22 郑州云海信息技术有限公司 一种多用户使用主机插件的权限管理方法及系统
CN107944254A (zh) * 2017-11-01 2018-04-20 平安科技(深圳)有限公司 系统的权限配置方法、应用服务器及计算机可读存储介质

Also Published As

Publication number Publication date
CN108830054B (zh) 2021-06-29
CN108830054A (zh) 2018-11-16

Similar Documents

Publication Publication Date Title
US8346908B1 (en) Identity migration apparatus and method
TWI582610B (zh) 本端備份之基於雲端儲存
US9684505B2 (en) Development environment system, development environment apparatus, development environment providing method, and program
US11089013B2 (en) Enhanced password authentication across multiple systems and user identifications
US20170353458A1 (en) System and method to allow third-party developer to debug code in customer environment
US9135056B2 (en) Automated, controlled distribution and execution of commands and scripts
US9088563B2 (en) Using service request ticket for multi-factor authentication
US8302201B1 (en) Security and licensing with application aware storage
CN108351771A (zh) 维持对于在部署到云计算环境期间的受限数据的控制
JP7021239B2 (ja) 初期オペレーティングシステム・セットアップ・オプションのリモート管理
CN104303534B (zh) 用于对移动设备验证进行验证的方法和计算机
CN103581187A (zh) 访问权限的控制方法及控制系统
EP2711860A2 (en) A system and method for managing role based access control of users
CN111352737A (zh) 一种基于资源池的容器云计算服务平台
US11190519B2 (en) Dock administration using a token
US9026456B2 (en) Business-responsibility-centric identity management
US11488105B2 (en) Order status
CN109033804A (zh) 一种虚拟机软件授权方法和装置
US10701108B2 (en) System and method for determining a policy in virtual desktop infrastructure (VDI)
US20160203074A1 (en) System to enable multi-tenancy testing of business data and validation logic on the cloud
WO2019237589A1 (zh) 自动授权方法、装置、计算机设备及计算机存储介质
US11409856B2 (en) Video-based authentication
JP6154683B2 (ja) 計算機システム
WO2022246753A1 (zh) 设备注册方法、装置、电子设备及存储介质
US10805176B2 (en) SW framework support method for open IPMI and DCMI development

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18922429

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.04.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18922429

Country of ref document: EP

Kind code of ref document: A1