WO2021056910A1 - 一种通信方法、系统、设备及计算机可读存储介质 - Google Patents

一种通信方法、系统、设备及计算机可读存储介质 Download PDF

Info

Publication number
WO2021056910A1
WO2021056910A1 PCT/CN2019/129977 CN2019129977W WO2021056910A1 WO 2021056910 A1 WO2021056910 A1 WO 2021056910A1 CN 2019129977 W CN2019129977 W CN 2019129977W WO 2021056910 A1 WO2021056910 A1 WO 2021056910A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
identification information
media file
access control
control list
Prior art date
Application number
PCT/CN2019/129977
Other languages
English (en)
French (fr)
Inventor
王唯融
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Priority to US17/764,287 priority Critical patent/US11792195B2/en
Priority to EP19946614.5A priority patent/EP4027600A4/en
Publication of WO2021056910A1 publication Critical patent/WO2021056910A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/30Peripheral units, e.g. input or output ports
    • H04L49/3027Output queuing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Definitions

  • This application relates to the field of computer software technology, and more specifically, to a communication method, system, device, and computer-readable storage medium.
  • the Boost library provides a large number of convenient and easy-to-use functions that can be implemented across platforms for the C++ language.
  • the Boost library is the general term for some C++ program libraries that provide extensions to the C++ language standard library. It is developed and maintained by the Boost community. , Boost library can work perfectly with C++ standard library and provide extended functions for it.
  • the message_queue (message queue) function of the interprocess module can realize the non-waiting blocking inter-process communication function. Because the message queue has the characteristics of simple use and no dependency, the message queue has been widely used in the C++ field. .
  • the purpose of this application is to provide a communication method that can solve the technical problem of how to improve the communication stability of the Windows system to a certain extent.
  • the application also provides a communication system, equipment, and computer-readable storage medium.
  • a communication method applied to Windows system including:
  • the identification information is added to the access control list of the media file, so that the communication sender can access the media file, thereby enabling the communication sender to communicate through the message queue.
  • the method further includes:
  • the method before acquiring the identification information of the communication sender, the method further includes:
  • the judging whether the identification information exists in the access control list includes:
  • the method before adding the identification information to the access control list of the media file, the method further includes:
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the communication sender is prompted to communicate through the message queue.
  • a communication system applied to Windows system including:
  • the first determining module is used to determine the media file used when communicating through the message queue
  • the first obtaining module is used to obtain the identification information of the communication sender
  • the first adding module is configured to add the identification information to the access control list of the media file, so that the communication sender can access the media file, thereby enabling the communication sender to pass the message Queue to communicate.
  • a communication device used in Windows system including:
  • Memory used to store computer programs
  • the processor is used to implement the steps of any one of the above communication methods when the computer program is executed.
  • a computer-readable storage medium is applied to a Windows system, and a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the communication method as described in any one of the above are realized.
  • the communication method provided by this application is applied to the Windows system to determine the media file used when communicating through the message queue; obtain the identification information of the communication sender; add the identification information to the access control list of the media file to enable the communication to be sent The party can access the media file, which in turn enables the communication sender to communicate through the message queue.
  • the communication method provided by the present application by adding the identification information of the communication sender to the access control list of the media file, the probability of the communication sender successfully accessing the media file is increased, thereby increasing the communication sender’s ability to communicate through the message queue.
  • the success rate has improved the communication stability of the Windows system.
  • the communication system, equipment and computer-readable storage medium provided by this application also solve the corresponding technical problems.
  • FIG. 1 is a flowchart of a communication method provided by an embodiment of this application.
  • FIG. 2 is another flowchart of a communication method provided by an embodiment of this application.
  • FIG. 3 is a third flowchart of a communication method provided by an embodiment of this application.
  • FIG. 4 is a schematic structural diagram of a communication system provided by an embodiment of this application.
  • FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 6 is a schematic diagram of another structure of a communication device provided by an embodiment of the application.
  • the Boost library provides a large number of convenient and easy-to-use functions that can be implemented across platforms for the C++ language.
  • the Boost library is also the general term for some C++ program libraries that provide extensions to the C++ language standard library. It is developed and maintained by the Boost community. , Boost library can work perfectly with C++ standard library and provide extended functions for it.
  • the message_queue (message queue) function of the interprocess module can realize the non-waiting blocking inter-process communication function. Because the message queue has the characteristics of simple use and no dependency, the message queue has been widely used in the C++ field. .
  • the communication method provided by this application can improve the communication stability of the Windows system.
  • FIG. 1 is a flowchart of a communication method according to an embodiment of the application.
  • a communication method provided by an embodiment of the present application, applied to a Windows system may include the following steps:
  • Step S101 Determine the media file used when communicating through the message queue.
  • the communication sender needs to use the media file created by the communication receiver to communicate, and the media file is created by the communication receiver, so the read and write permissions of the media file are all It belongs to the communication receiver, so the communication sender cannot normally read and write the media file.
  • the communication sender and the communication receiver belong to different permission groups, the communication sender and the communication receiver cannot use the message queue to communicate. Therefore, you can first determine the media file used when communicating through the message queue.
  • the communication method provided by the embodiment of the present application is applied to a Windows system, and specifically, it can be applied to a server, a computer, etc., where the Windows system is installed.
  • Step S102 Obtain the identification information of the communication sender.
  • the identification information of the communication sender can be obtained.
  • the specific type of the identification information of the communication sender can be determined according to actual needs.
  • the identification information of the communication sender can be It is the IP address of the communication sender, etc.
  • Step S103 Add the identification information to the access control list of the media file, so that the communication sender can access the media file, so that the communication sender can communicate through the message queue.
  • the identification information can be added to the access control list of the media file, so that the communication sender has the ability to access the media file, so that the communication sender can communicate with the media file through the message queue.
  • the communication receiver communicates.
  • the communication method provided by this application is applied to the Windows system to determine the media file used when communicating through the message queue; obtain the identification information of the communication sender; add the identification information to the access control list of the media file to enable the communication to be sent The party can access the media file, which in turn enables the communication sender to communicate through the message queue.
  • the communication method provided by the present application by adding the identification information of the communication sender to the access control list of the media file, the probability of the communication sender successfully accessing the media file is increased, thereby increasing the communication sender’s ability to communicate through the message queue.
  • the success rate has improved the communication stability of the Windows system.
  • FIG. 2 is another flowchart of a communication method according to an embodiment of the application.
  • a communication method provided by an embodiment of the present application, applied to a Windows system may include the following steps:
  • Step S201 It is determined whether it is the first time to communicate through the message queue, and if so, step S202 is executed.
  • Step S202 Determine the media file used when communicating through the message queue.
  • Step S203 Acquire the security descriptor of the media file, and generate a new security descriptor based on the security descriptor.
  • the security descriptor of the media file can also be obtained; a new security descriptor is generated based on the security descriptor. Security descriptor.
  • the media file path can be obtained through the ipcdetail::tmp_filename function; then based on the media file path, the security descriptor of the media file is obtained through the GetFileSecurity function; finally, the initializeSecurity function is called to generate a new security descriptor.
  • Step S204 Obtain the identification information of the communication sender.
  • the communication sender can be determined through the GetUserName function, and then the identification information of the communication sender can be obtained through the LookupAccountName function.
  • Step S205 Obtain an access control item instance of the current free access control list in the access control list of the media file.
  • the access control list of the media file can be determined through the InitializeAcl function; the access control item (ACE) instance of the current free access control list (DACL) can be obtained through the GetAce function.
  • Step S206 Determine whether there is identification information in the access control item instance, if yes, execute step S207, if not, execute step S208.
  • the EqualSid function can be used to determine whether there is identification information in the access control item instance.
  • Step S207 It is determined that there is identification information in the access control list, and the process ends.
  • Step S208 It is determined that there is no identification information in the access control list, and step S209 is executed.
  • Step S209 Add the identification information to the access control list of the media file, so that the communication sender can access the media file, so that the communication sender can communicate through the message queue.
  • the representation information can be added to the access control list through the AddAccessAllowAceEx function.
  • Step S210 Set the access control list to the new security descriptor, set the new security descriptor to the corresponding file, and perform a memory release operation to release the corresponding memory.
  • the access control list can be set to the new security descriptor through the SetSecurityDescriptorDacl function, and the new security descriptor can be set to the corresponding file through the SetFileSecurity function.
  • the communication sender may also be prompted to communicate through the message queue.
  • FIG. 3 is a third flowchart of a communication method provided by an embodiment of this application.
  • a communication method provided by an embodiment of the present application may include the following steps:
  • Step S301 Receive a message queue communication request from the communication sender.
  • Step S302 Determine, based on the message queue communication request, the media file used when communicating through the message queue.
  • Step S303 Obtain the identification information of the communication sender in the message queue communication request.
  • Step S304 Add the identification information to the access control list of the media file, so that the communication sender can access the media file, and thereby the communication sender can communicate through the message queue.
  • the communication receiver can determine the required media file based on the message queue communication request, and then obtain the communication sender from the message queue communication request. Then, the identification information of the communication sender is added to the access control list of the media file, so that the communication sender can access the media file, and then the communication sender can communicate through the message queue.
  • FIG. 4 is a schematic structural diagram of a communication system provided by an embodiment of this application.
  • a communication system provided by an embodiment of the present application, applied to a Windows system may include:
  • the first determining module 101 is configured to determine the media file used when communicating through the message queue
  • the first obtaining module 102 is configured to obtain identification information of the communication sender
  • the first adding module 103 is configured to add the identification information to the access control list of the media file, so that the communication sender can access the media file, thereby enabling the communication sender to communicate through the message queue.
  • a communication system provided by an embodiment of the present application, applied to a Windows system, may also include:
  • the first determining module is used to determine whether it is the first time to communicate through the message queue before the first determining module determines the media file used when communicating through the message queue, and if so, prompt the first determining module to perform the determination of the application when communicating through the message queue The step of media file, if not, end.
  • a communication system provided by an embodiment of the present application, applied to a Windows system, may also include:
  • the second judgment module is used to judge whether the identification information exists in the access control list before the second acquisition module acquires the identification information of the communication sender, if not, prompt the second acquisition module to perform the step of acquiring the identification information of the communication sender, If yes, it ends.
  • the communication system provided by the embodiment of the present application is applied to a Windows system, and the second judgment module may include:
  • the first obtaining unit is configured to obtain an access control item instance of the current free access control list in the access control list;
  • the first judging unit is used to judge whether there is identification information in the access control item instance, if it is, it is judged that there is identification information in the access control list, and if it is not, it is judged that there is no identification information in the access control list.
  • a communication system provided by an embodiment of the present application, applied to a Windows system, may also include:
  • the third acquiring module is used to acquire the security descriptor of the media file before the first adding module adds the identification information to the access control list of the media file;
  • the first generating module is used to generate a new security descriptor based on the security descriptor
  • the first setting module is used for setting the access control list to the new security descriptor after the first adding module adds the identification information to the access control list of the media file;
  • the second setting module is used to set the new security descriptor to the corresponding file.
  • a communication system provided by an embodiment of the present application, applied to a Windows system, may also include:
  • the first release module is used for the second setting module to execute a memory release operation after setting the new security descriptor in the corresponding file to release the corresponding memory.
  • a communication system provided by an embodiment of the present application, applied to a Windows system, may also include:
  • the first prompting module is used for prompting the communication sender to communicate through the message queue after the first adding module adds the identification information to the access control list of the media file.
  • the present application also provides a communication device and a computer-readable storage medium, both of which have the corresponding effects of the communication method provided in the embodiments of the present application.
  • FIG. 5 is a schematic structural diagram of a communication device according to an embodiment of the application.
  • a communication device provided by an embodiment of the present application includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 implements the following steps when the computer program is executed:
  • the identification information is added to the access control list of the media file, so that the communication sender can access the media file, so that the communication sender can communicate through the message queue.
  • a communication device includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 executes the computer program, the following steps are implemented: Before determining the media file used when communicating via a message queue, It is judged whether it is the first time to communicate through the message queue, if it is, the step of determining the media file applied when communicating through the message queue is executed, and if not, it ends.
  • a communication device provided by an embodiment of the present application includes a memory 201 and a processor 202.
  • a computer program is stored in the memory 201.
  • the processor 202 executes the computer program, the following steps are implemented: before obtaining the identification information of the communication sender, determine the access control Whether there is identification information in the list, if not, execute the step of obtaining the identification information of the communication sender, and if yes, end.
  • a communication device includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 executes the computer program, the following steps are implemented: in the access control list, obtain the current free access control list Instance of access control item; determine whether there is identification information in the access control item instance, if yes, determine that there is identification information in the access control list, if not, then determine that there is no identification information in the access control list.
  • a communication device includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 executes the computer program, the following steps are implemented: adding identification information to the access control list of the media file Before, obtain the security descriptor of the media file; generate a new security descriptor based on the security descriptor; accordingly, after adding the identification information to the access control list of the media file, set the access control list to the new security descriptor; The new security descriptor is set to the corresponding file.
  • a communication device includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 executes the computer program, the following steps are implemented: After setting a new security descriptor in a corresponding file, Perform a memory release operation to release the corresponding memory.
  • a communication device provided by an embodiment of the present application includes a memory 201 and a processor 202.
  • the memory 201 stores a computer program.
  • the processor 202 executes the computer program, the following steps are implemented: adding identification information to the access control list of the media file After that, the communication sender is prompted to communicate through the message queue.
  • another communication device may further include: an input port 203 connected to the processor 202 for transmitting commands input from the outside to the processor 202; and a display connected to the processor 202
  • the unit 204 is used to display the processing result of the processor 202 to the outside; the communication module 205 connected to the processor 202 is used to implement the communication between the communication device and the outside.
  • the display unit 204 may be a display panel, a laser scanning display, etc.; the communication method adopted by the communication module 205 includes, but is not limited to, mobile high-definition link technology (HML), universal serial bus (USB), high-definition multimedia interface (HDMI), Wireless connection: wireless fidelity technology (WiFi), Bluetooth communication technology, low-power Bluetooth communication technology, communication technology based on IEEE802.11s.
  • HML mobile high-definition link technology
  • USB universal serial bus
  • HDMI high-definition multimedia interface
  • WiFi wireless fidelity technology
  • Bluetooth communication technology Low-power Bluetooth communication technology
  • An embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
  • the identification information is added to the access control list of the media file, so that the communication sender can access the media file, so that the communication sender can communicate through the message queue.
  • An embodiment of the present application provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program.
  • the computer program When the computer program is executed by a processor, the following steps are implemented: before determining the media file used when communicating through a message queue, determine whether It is the first time to communicate through the message queue. If yes, execute the step of determining the media file used when communicating through the message queue; if not, end.
  • An embodiment of the present application provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program.
  • the computer program is executed by a processor, the following steps are implemented: before obtaining the identification information of the communication sender, determine whether it is in the access control list Whether there is identification information, if not, execute the step of obtaining the identification information of the communication sender, if yes, end.
  • An embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented: in the access control list, access to the current free access control list is obtained Control item instance; judge whether there is identification information in the access control item instance, if yes, then judge that there is identification information in the access control list, if not, then judge that there is no identification information in the access control list.
  • An embodiment of the present application provides a computer-readable storage medium in which a computer program is stored.
  • the computer program is executed by a processor, the following steps are implemented: Before adding identification information to the access control list of the media file, Obtain the security descriptor of the media file; generate a new security descriptor based on the security descriptor; accordingly, after adding the identification information to the access control list of the media file, set the access control list to the new security descriptor; set the new security The descriptor is set to the corresponding file.
  • An embodiment of the present application provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program.
  • the computer program When executed by a processor, the following steps are implemented: After setting a new security descriptor in a corresponding file, it also includes : Perform a memory release operation to release the corresponding memory.
  • An embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented: after identification information is added to the access control list of the media file, Prompt the communication sender to communicate through the message queue.
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically programmable ROM
  • EEPly erasable programmable ROM registers
  • hard disks hard disks
  • removable disks or CD-ROMs , Or any other form of storage medium known in the technical field.
  • the steps of the method or algorithm described in combination with the embodiments disclosed herein can be directly implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all areas in the technical field. Any other known storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种通信方法、系统、设备及计算机可读存储介质,应用于Windows系统,该方法中,确定通过消息队列通信时应用的介质文件;获取通信发送方的标识信息;将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。本申请提供的通信方法中,通过将通信发送方的标识信息添加至介质文件的访问控制列表中,提高了通信发送方成功访问介质文件的概率,进而提高了通信发送方通过消息队列进行通信的成功率,提高了Windows系统的通信稳定性。本申请提供的一种通信系统、设备及计算机可读存储介质也解决了相应技术问题。

Description

一种通信方法、系统、设备及计算机可读存储介质
本申请要求于2019年9月29日提交中国专利局、申请号为201910931200.1、发明名称为“一种通信方法、系统、设备及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机软件技术领域,更具体地说,涉及一种通信方法、系统、设备及计算机可读存储介质。
背景技术
在C++语言中,Boost库为C++语言提供了大量方便易用且可以跨平台的功能实现,Boost库也即为C++语言标准库提供扩展的一些C++程序库的总称,由Boost社区组织开发、维护,Boost库可以与C++标准库完美共同工作,并且为其提供扩展功能。在这些功能实现中,interprocess模块的message_queue(消息队列)功能可以实现无等待的阻塞式进程间通信功能,因消息队列具有使用简单、无依赖的特性,所以消息队列在C++领域内得到了广泛应用。
然而,当消息队列应用于Windows系统中,并且进程间通信双方的用户组权限不同时,通信可能无法进行,使得Windows系统的通信稳定性较低。
综上所述,如何提高Windows系统的通信稳定性是目前本领域技术人员亟待解决的问题。
发明内容
本申请的目的是提供一种通信方法,其能在一定程度上解决如何提高Windows系统的通信稳定性的技术问题。本申请还提供了一种通信系统、设备及计算机可读存储介质。
为了实现上述目的,本申请提供如下技术方案:
一种通信方法,应用于Windows系统,包括:
确定通过消息队列通信时应用的介质文件;
获取通信发送方的标识信息;
将所述标识信息添加至所述介质文件的访问控制列表中,以使所述通信发送方能够访问所述介质文件,进而使得所述通信发送方能够通过所述消息队列进行通信。
优选的,所述确定通过所述消息队列通信时应用的介质文件之前,还包括:
判断是否为首次通过所述消息队列进行通信,若是,则执行所述确定通过消息队列通信时应用的介质文件的步骤,若否,则结束。
优选的,所述获取通信发送方的标识信息之前,还包括:
判断所述访问控制列表中是否存在所述标识信息,若否,则执行所述获取通信发送方的标识信息的步骤,若是,则结束。
优选的,所述判断所述访问控制列表中是否存在所述标识信息,包括:
在所述访问控制列表中,获取当前自由访问控制列表的访问控制项实例;
判断所述访问控制项实例中是否存在所述标识信息,若是,则判定所述访问控制列表中存在所述标识信息,若否,则判定所述访问控制列表中不存在所述标识信息。
优选的,所述将所述标识信息添加至所述介质文件的访问控制列表中之前,还包括:
获取所述介质文件的安全描述符;
基于所述安全描述符生成新安全描述符;
所述将所述标识信息添加至所述介质文件的访问控制列表中之后,还包括:
将所述访问控制列表设置至所述新安全描述符中;
将所述新安全描述符设置至对应文件中。
优选的,所述将所述新安全描述符设置至对应文件中之后,还包括:
执行释放内存操作,以释放相应内存。
优选的,所述将所述标识信息添加至所述介质文件的访问控制列表中之后,还包括:
提示所述通信发送方通过所述消息队列进行通信。
一种通信系统,应用于Windows系统,包括:
第一确定模块,用于确定通过消息队列通信时应用的介质文件;
第一获取模块,用于获取通信发送方的标识信息;
第一添加模块,用于将所述标识信息添加至所述介质文件的访问控制列表中,以使所述通信发送方能够访问所述介质文件,进而使得所述通信发送方能够通过所述消息队列进行通信。
一种通信设备,应用于Windows系统,包括:
存储器,用于存储计算机程序;
处理器,用于执行所述计算机程序时实现如上任一所述通信方法的步骤。
一种计算机可读存储介质,应用于Windows系统,所述计算机可读存储介质中存储有计算机程序,所述计算机程序被处理器执行时实现如上任一项所述通信方法的步骤。
本申请提供的一种通信方法,应用于Windows系统,确定通过消息队列通信时应用的介质文件;获取通信发送方的标识信息;将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。本申请提供的通信方法中,通过将通信发送方的标识信息添加至介质文件的访问控制列表中,提高了通信发送方成功访问介质文件的概率,进而提高了通信发送方通过消息队列进行通信的成功率,提高了Windows系统的通信稳定性。本申请提供的一种通信系统、设备及计算机可读存储介质也解决了相应技术问题。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本申请实施例提供的一种通信方法的流程图;
图2为本申请实施例提供的一种通信方法的另一流程图;
图3为本申请实施例提供的一种通信方法的第三流程图;
图4为本申请实施例提供的一种通信系统的结构示意图;
图5为本申请实施例提供的一种通信设备的结构示意图;
图6为本申请实施例提供的一种通信设备的另一结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
在C++语言中,Boost库为C++语言提供了大量方便易用且可以跨平台的功能实现,Boost库也即为C++语言标准库提供扩展的一些C++程序库的总称,由Boost社区组织开发、维护,Boost库可以与C++标准库完美共同工作,并且为其提供扩展功能。在这些功能实现中,interprocess模块的message_queue(消息队列)功能可以实现无等待的阻塞式进程间通信功能,因消息队列具有使用简单、无依赖的特性,所以消息队列在C++领域内得到了广泛应用。然而,当消息队列应用于Windows系统中,并且进程间通信双方的用户组权限不同时,通信可能无法进行,使得Windows系统的通信稳定性较低。本申请提供的一种通信方法可以提高Windows系统的通信稳定性。
请参阅图1,图1为本申请实施例提供的一种通信方法的流程图。
本申请实施例提供的一种通信方法,应用于Windows系统,可以包括以下步骤:
步骤S101:确定通过消息队列通信时应用的介质文件。
实际应用中,Windows系统在应用消息队列进行通信时,通信发送方需借助通信接收方创建的介质文件进行通信,而该介质文件是由通信接收 方创建的,所以该介质文件的读写权限均属于通信接收方,从而通信发送方无法正常读写该介质文件,尤其在通信发送方与通信接收方属于不同权限组时,通信发送方与通信接收方更加无法应用消息队列进行通信。因此,可以先确定通过消息队列通信时应用的介质文件。
应当指出,本申请实施例提供的一种通信方法应用于Windows系统中,具体的,可以应用于安装了Windows系统的服务器、计算机等中。
步骤S102:获取通信发送方的标识信息。
实际应用中,在确定出通过消息队列通信时的介质文件后,便可以获取通信发送方的标识信息,通信发送方的标识信息的具体类型可以根据实际需要确定,比如通信发送方的标识信息可以为通信发送方的IP地址等。
步骤S103:将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
实际应用中,在获取通信发送方的标识信息之后,便可以将标识信息添加至介质文件的访问控制列表中,使得通信发送方具有访问介质文件的能力,进而使得通信发送方可以通过消息队列与通信接收方进行通信。
本申请提供的一种通信方法,应用于Windows系统,确定通过消息队列通信时应用的介质文件;获取通信发送方的标识信息;将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。本申请提供的通信方法中,通过将通信发送方的标识信息添加至介质文件的访问控制列表中,提高了通信发送方成功访问介质文件的概率,进而提高了通信发送方通过消息队列进行通信的成功率,提高了Windows系统的通信稳定性。
请参阅图2,图2为本申请实施例提供的一种通信方法的另一流程图。
本申请实施例提供的一种通信方法,应用于Windows系统,可以包括以下步骤:
步骤S201:判断是否为首次通过消息队列进行通信,若是,则执行步骤S202。
步骤S202:确定通过消息队列通信时应用的介质文件。
实际应用中,为了提高Windows系统的通信效率,在确定通过消息队列通信时应用的介质文件之前,还可以先判断是否为首次通过消息队列进行通信,若是,则执行确定通过消息队列通信时应用的介质文件的步骤,若否,则结束,以此避免重复将通信发送方的标识信息添加至介质文件的访问控制列表中的步骤。
步骤S203:获取介质文件的安全描述符,基于安全描述符生成新安全描述符。
实际应用中,为了保证介质文件与介质文件的访问控制列表的安全性,在将标识信息添加至介质文件的访问控制列表中之前,还可以获取介质文件的安全描述符;基于安全描述符生成新安全描述符。
具体应用场景中,可以通过ipcdetail::tmp_filename函数获取介质文件路径;再基于介质文件路径,通过GetFileSecurity函数获取介质文件的安全描述符;最后调用initializeSecurity函数生成新安全描述符。
步骤S204:获取通信发送方的标识信息。
实际应用中,为了进一步避免重复将通信发送方的标识信息添加至介质文件的访问控制列表中,在获取通信发送方的标识信息之前,可以先判断访问控制列表中是否存在标识信息,若否,则执行获取通信发送方的标识信息的步骤,若是,则结束。
具体应用场景中,可以通过GetUserName函数确定通信发送方,再通过LookupAccountName函数获取通信发送方的标识信息。
步骤S205:在介质文件的访问控制列表中,获取当前自由访问控制列表的访问控制项实例。
具体应用场景中,可以通过InitializeAcl函数确定介质文件的访问控制列表;可以通过GetAce函数获取当前自由访问控制列表(DACL)的访问控制项(ACE)实例。
步骤S206:判断访问控制项实例中是否存在标识信息,若是,则执行步骤S207,若否,则执行步骤S208。
实际应用中,可以借助访问控制项实例来快速判断访问控制列表中是 否存在通信发送方的标识信息。
具体应用场景中,可以通过EqualSid函数判断访问控制项实例中是否存在标识信息。
步骤S207:判定访问控制列表中存在标识信息,结束。
步骤S208:判定访问控制列表中不存在标识信息,执行步骤S209。
步骤S209:将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
实际应用中,可以通过AddAccessAllowAceEx函数将表示信息添加至访问控制列表中。
步骤S210:将访问控制列表设置至新安全描述符中,将新安全描述符设置至对应文件中,执行释放内存操作,以释放相应内存。
实际应用中,可以通过SetSecurityDescriptorDacl函数将访问控制列表设置至新安全描述符中,可以通过SetFileSecurity函数将新安全描述符设置至对应文件中。
具体应用场景中,在将标识信息添加至介质文件的访问控制列表中之后,还可以提示通信发送方通过消息队列进行通信。
请参阅图3,图3为本申请实施例提供的一种通信方法的第三流程图。
本申请实施例提供的一种通信方法,应用于安装Windows系统的通信接收方时,可以包括以下步骤:
步骤S301:接收通信发送方的消息队列通信请求。
步骤S302:基于该消息队列通信请求确定通过消息队列通信时应用的介质文件。
步骤S303:在消息队列通信请求中获取通信发送方的标识信息。
步骤S304:将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
也即实时应用中,通信接收方在接收到通信发送方发送的消息队列通 信请求后,可以基于该消息队列通信请求确定出所需的介质文件,之后再在消息队列通信请求中获取通信发送方的标识信息,之后将通信发送方的标识信息添加至介质文件的访问控制列表中,使得通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
请参阅图4,图4为本申请实施例提供的一种通信系统的结构示意图。
本申请实施例提供的一种通信系统,应用于Windows系统,可以包括:
第一确定模块101,用于确定通过消息队列通信时应用的介质文件;
第一获取模块102,用于获取通信发送方的标识信息;
第一添加模块103,用于将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
本申请实施例提供的一种通信系统,应用于Windows系统,还可以包括:
第一判断模块,用于第一确定模块确定通过消息队列通信时应用的介质文件之前,判断是否为首次通过消息队列进行通信,若是,则提示第一确定模块执行确定通过消息队列通信时应用的介质文件的步骤,若否,则结束。
本申请实施例提供的一种通信系统,应用于Windows系统,还可以包括:
第二判断模块,用于第二获取模块获取通信发送方的标识信息之前,判断访问控制列表中是否存在标识信息,若否,则提示第二获取模块执行获取通信发送方的标识信息的步骤,若是,则结束。
本申请实施例提供的一种通信系统,应用于Windows系统,第二判断模块可以包括:
第一获取单元,用于在访问控制列表中,获取当前自由访问控制列表的访问控制项实例;
第一判断单元,用于判断访问控制项实例中是否存在标识信息,若是,则判定访问控制列表中存在标识信息,若否,则判定访问控制列表中不存 在标识信息。
本申请实施例提供的一种通信系统,应用于Windows系统,还可以包括:
第三获取模块,用于第一添加模块将标识信息添加至介质文件的访问控制列表中之前,获取介质文件的安全描述符;
第一生成模块,用于基于安全描述符生成新安全描述符;
第一设置模块,用于第一添加模块将标识信息添加至介质文件的访问控制列表中之后,将访问控制列表设置至新安全描述符中;
第二设置模块,用于将新安全描述符设置至对应文件中。
本申请实施例提供的一种通信系统,应用于Windows系统,还可以包括:
第一释放模块,用于第二设置模块将新安全描述符设置至对应文件中之后,执行释放内存操作,以释放相应内存。
本申请实施例提供的一种通信系统,应用于Windows系统,还可以包括:
第一提示模块,用于第一添加模块将标识信息添加至介质文件的访问控制列表中之后,提示通信发送方通过消息队列进行通信。
本申请还提供了一种通信设备及计算机可读存储介质,其均具有本申请实施例提供的一种通信方法具有的对应效果。请参阅图5,图5为本申请实施例提供的一种通信设备的结构示意图。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:
确定通过消息队列通信时应用的介质文件;
获取通信发送方的标识信息;
将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤: 确定通过消息队列通信时应用的介质文件之前,判断是否为首次通过消息队列进行通信,若是,则执行确定通过消息队列通信时应用的介质文件的步骤,若否,则结束。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:获取通信发送方的标识信息之前,判断访问控制列表中是否存在标识信息,若否,则执行获取通信发送方的标识信息的步骤,若是,则结束。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:在访问控制列表中,获取当前自由访问控制列表的访问控制项实例;判断访问控制项实例中是否存在标识信息,若是,则判定访问控制列表中存在标识信息,若否,则判定访问控制列表中不存在标识信息。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:将标识信息添加至介质文件的访问控制列表中之前,获取介质文件的安全描述符;基于安全描述符生成新安全描述符;相应的,将标识信息添加至介质文件的访问控制列表中之后,将访问控制列表设置至新安全描述符中;将新安全描述符设置至对应文件中。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:将新安全描述符设置至对应文件中之后,执行释放内存操作,以释放相应内存。
本申请实施例提供的一种通信设备,包括存储器201和处理器202,存储器201中存储有计算机程序,处理器202执行计算机程序时实现如下步骤:将标识信息添加至介质文件的访问控制列表中之后,提示通信发送方通过消息队列进行通信。
请参阅图6,本申请实施例提供的另一种通信设备中还可以包括:与处理器202连接的输入端口203,用于传输外界输入的命令至处理器202;与处理器202连接的显示单元204,用于显示处理器202的处理结果至外界;与处 理器202连接的通信模块205,用于实现通信设备与外界的通信。显示单元204可以为显示面板、激光扫描使显示器等;通信模块205所采用的通信方式包括但不局限于移动高清链接技术(HML)、通用串行总线(USB)、高清多媒体接口(HDMI)、无线连接:无线保真技术(WiFi)、蓝牙通信技术、低功耗蓝牙通信技术、基于IEEE802.11s的通信技术。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:
确定通过消息队列通信时应用的介质文件;
获取通信发送方的标识信息;
将标识信息添加至介质文件的访问控制列表中,以使通信发送方能够访问介质文件,进而使得通信发送方能够通过消息队列进行通信。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:确定通过消息队列通信时应用的介质文件之前,判断是否为首次通过消息队列进行通信,若是,则执行确定通过消息队列通信时应用的介质文件的步骤,若否,则结束。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:获取通信发送方的标识信息之前,判断访问控制列表中是否存在标识信息,若否,则执行获取通信发送方的标识信息的步骤,若是,则结束。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:在访问控制列表中,获取当前自由访问控制列表的访问控制项实例;判断访问控制项实例中是否存在标识信息,若是,则判定访问控制列表中存在标识信息,若否,则判定访问控制列表中不存在标识信息。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:将标识信息添加至介质文件的访问控制列表中之前,获取介质文件的安全描述符; 基于安全描述符生成新安全描述符;相应的,将标识信息添加至介质文件的访问控制列表中之后,将访问控制列表设置至新安全描述符中;将新安全描述符设置至对应文件中。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:将新安全描述符设置至对应文件中之后,还包括:执行释放内存操作,以释放相应内存。
本申请实施例提供的一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,计算机程序被处理器执行时实现如下步骤:将标识信息添加至介质文件的访问控制列表中之后,提示通信发送方通过消息队列进行通信。
本申请所涉及的计算机可读存储介质包括随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质。
本申请实施例提供的一种通信系统、设备及计算机可读存储介质中相关部分的说明请参见本申请实施例提供的一种通信方法中对应部分的详细说明,在此不再赘述。另外,本申请实施例提供的上述技术方案中与现有技术中对应技术方案实现原理一致的部分并未详细说明,以免过多赘述。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可 以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
对所公开的实施例的上述说明,使本领域技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种通信方法,其特征在于,应用于Windows系统,包括:
    确定通过消息队列通信时应用的介质文件;
    获取通信发送方的标识信息;
    将所述标识信息添加至所述介质文件的访问控制列表中,以使所述通信发送方能够访问所述介质文件,进而使得所述通信发送方能够通过所述消息队列进行通信。
  2. 根据权利要求1所述的方法,其特征在于,所述确定通过所述消息队列通信时应用的介质文件之前,还包括:
    判断是否为首次通过所述消息队列进行通信,若是,则执行所述确定通过消息队列通信时应用的介质文件的步骤,若否,则结束。
  3. 根据权利要求2所述的方法,其特征在于,所述获取通信发送方的标识信息之前,还包括:
    判断所述访问控制列表中是否存在所述标识信息,若否,则执行所述获取通信发送方的标识信息的步骤,若是,则结束。
  4. 根据权利要求3所述的方法,其特征在于,所述判断所述访问控制列表中是否存在所述标识信息,包括:
    在所述访问控制列表中,获取当前自由访问控制列表的访问控制项实例;
    判断所述访问控制项实例中是否存在所述标识信息,若是,则判定所述访问控制列表中存在所述标识信息,若否,则判定所述访问控制列表中不存在所述标识信息。
  5. 根据权利要求4所述的方法,其特征在于,所述将所述标识信息添加至所述介质文件的访问控制列表中之前,还包括:
    获取所述介质文件的安全描述符;
    基于所述安全描述符生成新安全描述符;
    所述将所述标识信息添加至所述介质文件的访问控制列表中之后,还包括:
    将所述访问控制列表设置至所述新安全描述符中;
    将所述新安全描述符设置至对应文件中。
  6. 根据权利要求5所述的方法,其特征在于,所述将所述新安全描述符设置至对应文件中之后,还包括:
    执行释放内存操作,以释放相应内存。
  7. 根据权利要求1至6任一项所述的方法,其特征在于,所述将所述标识信息添加至所述介质文件的访问控制列表中之后,还包括:
    提示所述通信发送方通过所述消息队列进行通信。
  8. 一种通信系统,其特征在于,应用于Windows系统,包括:
    第一确定模块,用于确定通过消息队列通信时应用的介质文件;
    第一获取模块,用于获取通信发送方的标识信息;
    第一添加模块,用于将所述标识信息添加至所述介质文件的访问控制列表中,以使所述通信发送方能够访问所述介质文件,进而使得所述通信发送方能够通过所述消息队列进行通信。
  9. 一种通信设备,其特征在于,应用于Windows系统,包括:
    存储器,用于存储计算机程序;
    处理器,用于执行所述计算机程序时实现如权利要求1至7任一项所述通信方法的步骤。
  10. 一种计算机可读存储介质,其特征在于,应用于Windows系统,所述计算机可读存储介质中存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述通信方法的步骤。
PCT/CN2019/129977 2019-09-29 2019-12-30 一种通信方法、系统、设备及计算机可读存储介质 WO2021056910A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17/764,287 US11792195B2 (en) 2019-09-29 2019-12-30 Communication method, system and device and computer-readable storage medium
EP19946614.5A EP4027600A4 (en) 2019-09-29 2019-12-30 COMMUNICATION METHOD, SYSTEM AND DEVICE, AND COMPUTER READABLE STORAGE MEDIUM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910931200.1 2019-09-29
CN201910931200.1A CN110740102B (zh) 2019-09-29 2019-09-29 一种通信方法、系统、设备及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2021056910A1 true WO2021056910A1 (zh) 2021-04-01

Family

ID=69269802

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/129977 WO2021056910A1 (zh) 2019-09-29 2019-12-30 一种通信方法、系统、设备及计算机可读存储介质

Country Status (4)

Country Link
US (1) US11792195B2 (zh)
EP (1) EP4027600A4 (zh)
CN (1) CN110740102B (zh)
WO (1) WO2021056910A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102112990A (zh) * 2008-06-27 2011-06-29 微软公司 为计算过程授予最小特权访问
US20140115496A1 (en) * 2012-10-18 2014-04-24 Huawei Technologies Co., Ltd. Method and Apparatus for Switching Among Multiple Message Reply Windows
CN105204950A (zh) * 2015-09-25 2015-12-30 深圳怡化电脑股份有限公司 一种任务间队列通信方法及装置
CN108768948A (zh) * 2018-04-28 2018-11-06 努比亚技术有限公司 一种访问权限管理方法、服务器及计算机可读存储介质
CN109885410A (zh) * 2019-01-09 2019-06-14 广州视源电子科技股份有限公司 消息发送方法、装置、计算机设备和存储介质
CN110086883A (zh) * 2019-05-08 2019-08-02 福州福昕网络技术有限责任公司 一种用于Windows平台的消息推送方法和系统

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7020697B1 (en) 1999-10-01 2006-03-28 Accenture Llp Architectures for netcentric computing systems
US7467212B2 (en) * 2000-12-28 2008-12-16 Intel Corporation Control of access control lists based on social networks
US7103772B2 (en) 2003-05-02 2006-09-05 Giritech A/S Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US7389512B2 (en) 2003-05-09 2008-06-17 Sun Microsystems, Inc. Interprocess communication within operating system partitions
US7529811B2 (en) * 2003-08-21 2009-05-05 Microsoft Corporation Systems and methods for the implementation of a core schema for providing a top-level structure for organizing units of information manageable by a hardware/software interface system
US20070110074A1 (en) 2004-06-04 2007-05-17 Bob Bradley System and Method for Synchronizing Media Presentation at Multiple Recipients
US8060937B2 (en) * 2004-07-15 2011-11-15 Lieberman Software Corporation System for protecting domain system configurations from users with local privilege rights
CN101369302B (zh) * 2008-09-24 2011-04-27 北京飞天诚信科技有限公司 一种控制信息安全设备访问权限的方法和系统
US8544046B2 (en) * 2008-10-09 2013-09-24 Packetvideo Corporation System and method for controlling media rendering in a network using a mobile device
CN101515241A (zh) * 2009-02-19 2009-08-26 北京安高科技有限公司 一种进程间数据通讯控制方法和系统
US9454652B2 (en) * 2009-10-23 2016-09-27 Secure Vector, Llc Computer security system and method
US8819766B2 (en) * 2010-12-10 2014-08-26 International Business Machines Corporation Domain-based isolation and access control on dynamic objects
US9438494B2 (en) * 2011-12-28 2016-09-06 Avvasi Inc. Apparatus and methods for optimizing network data transmission
US9405602B1 (en) * 2012-06-25 2016-08-02 Google Inc. Method for application notification and tasking
CN103218564A (zh) * 2013-04-01 2013-07-24 广东欧珀移动通信有限公司 一种移动终端保护方法及装置
US11057446B2 (en) 2015-05-14 2021-07-06 Bright Data Ltd. System and method for streaming content from multiple servers
US10719617B2 (en) * 2018-02-20 2020-07-21 Government Of The United States Of America, As Represented By The Secretary Of Commerce Access control system and process for managing and enforcing an attribute based access control policy
US10410000B1 (en) * 2017-12-29 2019-09-10 Entefy Inc. System and method of applying adaptive privacy control regions to bitstream data
CN109086146A (zh) * 2018-07-26 2018-12-25 郑州云海信息技术有限公司 一种基于Boost的相对可靠的进程间通信方法
US11656924B2 (en) * 2018-08-03 2023-05-23 Samsung Electronics Co., Ltd. System and method for dynamic volume management
CN109933441B (zh) * 2019-02-28 2020-11-17 上海交通大学 微内核进程间通讯方法和系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102112990A (zh) * 2008-06-27 2011-06-29 微软公司 为计算过程授予最小特权访问
US20140115496A1 (en) * 2012-10-18 2014-04-24 Huawei Technologies Co., Ltd. Method and Apparatus for Switching Among Multiple Message Reply Windows
CN105204950A (zh) * 2015-09-25 2015-12-30 深圳怡化电脑股份有限公司 一种任务间队列通信方法及装置
CN108768948A (zh) * 2018-04-28 2018-11-06 努比亚技术有限公司 一种访问权限管理方法、服务器及计算机可读存储介质
CN109885410A (zh) * 2019-01-09 2019-06-14 广州视源电子科技股份有限公司 消息发送方法、装置、计算机设备和存储介质
CN110086883A (zh) * 2019-05-08 2019-08-02 福州福昕网络技术有限责任公司 一种用于Windows平台的消息推送方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZHANG, TAO ET AL.: "The Design and Implementation of Windows System Access Control based on Process Monitoring", NETINFO SECURITY, no. 04, 30 April 2014 (2014-04-30), pages 13 - 19, XP055795728, ISSN: 1671-1122 *

Also Published As

Publication number Publication date
EP4027600A1 (en) 2022-07-13
CN110740102B (zh) 2021-10-15
US20220368693A1 (en) 2022-11-17
CN110740102A (zh) 2020-01-31
EP4027600A4 (en) 2022-11-02
US11792195B2 (en) 2023-10-17

Similar Documents

Publication Publication Date Title
CN110096857B (zh) 区块链系统的权限管理方法、装置、设备和介质
CN108810006B (zh) 资源访问方法、装置、设备及存储介质
CN110414268B (zh) 访问控制方法、装置、设备及存储介质
JP5268945B2 (ja) ユーザーインターフェースの表示を管理する方法
WO2020155492A1 (zh) 一种基于设备id的登录态共享方法及装置
CN108923908B (zh) 授权处理方法、装置、设备及存储介质
WO2018177124A1 (zh) 业务处理方法、装置、数据共享系统及存储介质
JP5830102B2 (ja) 取得ファイルの評判チェック
EP2876568B1 (en) Permission management method and apparatus, and terminal
US8645967B2 (en) Efficient secure data marshaling through at least one untrusted intermediate process
CN109688186B (zh) 数据交互方法、装置、设备及可读存储介质
EP2428894A1 (en) Private application clipboard
WO2020057388A1 (zh) 一种智能合约管理方法、系统、设备及计算机存储介质
JP2009529182A (ja) エンタイトルメントの管理および適用
CN109710695B (zh) 事务请求有效性识别和发起方法、装置、设备和介质
WO2014190802A1 (en) Method,system and terminal device for scanning virus
CN110138767B (zh) 事务请求的处理方法、装置、设备和存储介质
WO2021088671A1 (zh) 一种端能力的调用方法、设备和计算机存储介质
US20100223475A1 (en) Low-level code signing mechanism
CN111400760B (zh) web应用访问数据库的方法、装置、服务器和存储介质
CN110719590B (zh) 基于手机号码的一键登录方法、装置、设备及存储介质
CN112860953A (zh) 图数据库的数据导入方法、装置、设备及存储介质
WO2019037521A1 (zh) 安全检测的方法、装置、系统以及服务器
CN107181802B (zh) 智能硬件控制方法和装置、服务器、存储介质
US11019004B1 (en) System, method, and computer program for performing bot engine abstraction

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19946614

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019946614

Country of ref document: EP

Effective date: 20220404