WO2021169112A1 - 基于共享权限的业务数据处理方法、装置、设备和介质 - Google Patents

基于共享权限的业务数据处理方法、装置、设备和介质 Download PDF

Info

Publication number
WO2021169112A1
WO2021169112A1 PCT/CN2020/098690 CN2020098690W WO2021169112A1 WO 2021169112 A1 WO2021169112 A1 WO 2021169112A1 CN 2020098690 W CN2020098690 W CN 2020098690W WO 2021169112 A1 WO2021169112 A1 WO 2021169112A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
tenant
authority
query
Prior art date
Application number
PCT/CN2020/098690
Other languages
English (en)
French (fr)
Inventor
翟献成
王琛
Original Assignee
平安国际智慧城市科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安国际智慧城市科技股份有限公司 filed Critical 平安国际智慧城市科技股份有限公司
Publication of WO2021169112A1 publication Critical patent/WO2021169112A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Definitions

  • This application relates to the technical field of big data processing, in particular to a business data processing method, device, device, and medium based on sharing permissions.
  • SaaS SoftwareasaService, that is, software and service
  • SaaS is a mode of providing software through the Internet.
  • Software vendors deploy application software on their own servers. Customers can order the required application software services from vendors through the Internet according to their actual needs, according to the number and time of the ordered services Long and short to pay fees to software vendors, and obtain the services provided by software vendors through the Internet. Users no longer need to purchase software, but instead rent Web-based software from software vendors to manage business activities without the need to maintain the software.
  • Software vendors have full authority to manage and maintain software.
  • SaaS is the best way to adopt advanced technology. It eliminates the need for businesses to purchase, build, and maintain infrastructure and applications.
  • Platform roles are divided into rule roles and management roles.
  • the rule roles are used to perform the business functions of the platform, and the management roles are used to manage the creation of roles and the assignment of permissions in the platform.
  • the traditional RBAC model is global in the allocation and role division of resources on the entire platform, and cannot customize access control policies according to tenant needs, nor can it separate the rules and management roles between tenants, and thus cannot separate different tenants on the same platform.
  • the data of different tenants is managed in isolation, leading to the risk of data leakage between different tenants.
  • a service data processing method, device, device, and medium based on sharing authority are provided.
  • a business data processing method based on sharing authority including:
  • the tenant identifier corresponding to the user identifier query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant identifier, and generate authorization information according to the user authority information;
  • the response data is returned to the user terminal.
  • a business data processing device based on sharing authority including:
  • the first receiving module is configured to receive a login request from a user terminal, where the login request carries a user identifier
  • the first query module is used to query the tenant identifier corresponding to the user identifier, and query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant identifier, and generate authorization based on the user authority information information;
  • a session information generating module configured to generate session information according to the authorization information, the user authority information, and the user identifier, and send the authorization information to the user terminal;
  • the second receiving module is configured to receive a service request sent by a user terminal, where the service request carries authorization information;
  • the second query module is used to query the stored session information corresponding to the authorization information, and obtain a response corresponding to the service request after performing permission control on the service request according to the user permission information in the session information Data;
  • the sending module is used to return the response data to the user terminal.
  • a computer device including a memory and one or more processors, the memory stores computer readable instructions, and when the computer readable instructions are executed by the processor, the one or more processors execute The following steps:
  • the tenant identifier corresponding to the user identifier query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant identifier, and generate authorization information according to the user authority information;
  • the response data is returned to the user terminal.
  • One or more computer-readable storage media storing computer-readable instructions.
  • the one or more processors perform the following steps:
  • the tenant identifier corresponding to the user identifier query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant identifier, and generate authorization information according to the user authority information;
  • the response data is returned to the user terminal.
  • the above-mentioned service data processing method, device, device and medium based on shared authority after receiving the login request sent by the user terminal, first obtains the tenant ID corresponding to the user ID, and then can query the user's authority information in the tenant, and Authorization information is generated according to the authority information, so that the authorization information, user authority information, and user ID are generated and saved after the session information is generated.
  • the corresponding authority information in the session information can be directly queried, so that the business request can be made through the authority information.
  • Permission control can ensure that different users can only obtain the data within the permissions, and will not cause data leakage, and since the user permission information is queried when logging in, the user permission information can be used directly in the subsequent business processing. , There is no need for multiple queries, which can also improve processing efficiency.
  • Fig. 1 is an application scenario diagram of a business data processing method based on sharing permissions according to one or more embodiments.
  • Fig. 2 is a schematic flowchart of a business data processing method based on sharing permissions according to one or more embodiments.
  • Fig. 3 is an example diagram of a seven-layer model according to one or more embodiments.
  • Fig. 4 is a schematic diagram of permission configuration according to one or more embodiments.
  • Fig. 5 is a schematic diagram of personalized tenant function adaptation according to one or more embodiments.
  • Fig. 6 is a schematic diagram of domain management according to one or more embodiments.
  • Fig. 7 is a sequence diagram of a business data processing method based on sharing rights according to one or more embodiments.
  • Fig. 8 is a structural block diagram of a business data processing apparatus based on sharing authority according to one or more embodiments.
  • Figure 9 is a block diagram of a computer device according to one or more embodiments.
  • the business data processing method based on sharing permissions provided in this application can be applied to the application environment as shown in FIG. 1.
  • the user terminal 102 and the server 104 communicate through the network.
  • the user terminal 102 sends a login request to the server 104, so that the server 104 can query the tenant ID corresponding to the user ID, and query the user authority information of the user corresponding to the user ID in the tenant corresponding to the tenant ID, and generate authorization information based on the user authority information , Generate session information according to the authorization information, user authority information, and user identification, and send the authorization information to the user terminal 102.
  • the server 104 can query the stored session information corresponding to the authorization information, and obtain a response corresponding to the service request after performing permission control on the service request according to the user permission information in the session information. Data and send the obtained response data 104 to the user terminal 102.
  • the authority control of the business request through the authority information can ensure that different users can only obtain the data within the authority, and will not cause data leakage, and since the user authority information is queried when logging in, it will be directly processed in the subsequent business processing.
  • the user authority information can be used without multiple queries, which can also improve the processing efficiency.
  • the terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
  • the server 104 may be implemented by an independent server or a server cluster composed of multiple servers.
  • a method for processing business data based on sharing permissions is provided. Taking the method applied to the server in FIG. 1 as an example for description, the method includes the following steps:
  • S202 Receive a login request from the user terminal, where the login request carries a user identifier.
  • the login request is generated by the user terminal, which can include user identification, such as account and password, list, map, and deep-level parameters, etc.
  • the user terminal splices these parameters through the signature string **, and after the splicing is completed, it is combined with the header
  • use random string + timestamp form parameter to splice and finally add dynamic encryption value to form the parameter signature string, first use sha256 to encrypt the signature string, and then use md5 in reverse order
  • the signature value is obtained through encryption, and finally a login request is generated according to the signature value.
  • S204 Query the tenant identifier corresponding to the user identifier, query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant identifier, and generate authorization information according to the user authority information.
  • the tenant ID is used to uniquely identify the tenant.
  • the tenant is an abstract organization relative to the platform.
  • the platform can include multiple different products, and each product can correspond to different systems.
  • the system can include multiple different permission packages, and tenants can be configured with multiple different permission packages.
  • Multiple different roles can be set under the tenant, and each role can be configured with different users. Among them, roles are authorized to users under tenants; different tenants can define roles according to their management requirements and authorize them to users.
  • the server receives the user ID, it can determine the tenant ID corresponding to the user ID to determine which tenant the user belongs to, so that the role corresponding to the user under the tenant can be obtained, and the permissions corresponding to the role can be obtained, that is, It is user authority information.
  • user authority information it means that the user is legal, so that authorization information can be generated to facilitate subsequent business processing.
  • the server may receive the login request through the gateway, and verify the signature information in the login request through the gateway, and after the verification is successful, log in to the user center through the user account and password.
  • the verification process is the same as the above The process of generating signature information is reversed, so I won't repeat it here.
  • S206 Generate session information according to the authorization information, user authority information, and user identification, and send the authorization information to the user terminal.
  • the server After the server generates the authorization information, it generates and saves the authorization information, the user authority information, and the user ID to generate session information, so that the user terminal can directly use the session information when making a service processing request.
  • the user center After logging in to the user center, the user center verifies the account and password entered by the user, and then performs authentication. After the authentication is successful, the session information is generated. For example, after the validity of the user information is verified, the authorization token and dynamic encryption verification value will be issued for this login.
  • the token, dynamic verification value and user information will be cached in the cache server, and only The authorized token information and dynamic verification value information are returned to the user terminal, so that when the user terminal performs subsequent business processing, it can directly query the corresponding authority information and maintain the login status of the user terminal.
  • the above authentication process may include multiple authentication methods: for example, multiple authentication strategies (including no authentication, session-level authentication, permission item authentication, and non-public network interface authentication), multiple security encryption strategies (including: AccessToken and RefreshToken dual Token mechanism, session-level dynamic encryption verification mechanism, interface authentication mechanism), custom tamper-proof encryption algorithm, and other three-level security design (encrypted storage of sensitive data, control of the number of sessions and concurrent users, Two-factor authentication mechanism (when logging in, the user enters the original personal password (static password), and then enters the dynamic password displayed on the token to achieve secure two-factor identity authentication protection.)) and so on.
  • multiple authentication strategies including no authentication, session-level authentication, permission item authentication, and non-public network interface authentication
  • multiple security encryption strategies including: AccessToken and RefreshToken dual Token mechanism, session-level dynamic encryption verification mechanism, interface authentication mechanism), custom tamper-proof encryption algorithm, and other three-level security design (encrypted storage of sensitive data, control of the number of sessions and concurrent users, Two-
  • S208 Receive a service request sent by the user terminal, where the service request carries authorization information.
  • the service request is a request for the user terminal to apply for the service of the server, which may carry the above-mentioned authorization information, which ensures the login status and facilitates the query of authority information.
  • the server can receive the service request through the gateway, and then verify the signature information in the service request through the gateway. Specifically, it can be authenticated through a unified gateway based on the OAuth2.0 protocol, and the authentication After success, read the session information from the user center.
  • S210 Query the stored session information corresponding to the authorization information, and after performing permission control on the service request according to the user permission information in the session information, the response data corresponding to the service request is obtained.
  • the server sends the authentication success information to the user center, so that the user center can read the stored session information, and perform permission control on the service request based on the user permission information in the session information, such as whether to allow data to be read, Whether to allow data to be written, etc., to obtain the response data corresponding to the business request.
  • the server After the processing is completed, the server returns the response data to the user terminal to complete the processing of the entire service request. And if the user also processes other systems in the platform, he can jump directly to another system, and then perform business processing. The specific processing process is as above and will not be repeated.
  • the tenant ID corresponding to the user ID is first obtained, and then the authority information of the user in the tenant can be queried, and authorization information is generated according to the authority information In this way, the authorization information, user authority information, and user ID are generated and saved after the session information is generated.
  • the corresponding authority information in the session information can be directly queried.
  • the authority information can be used to control the authority of the service request to ensure different Of users can only obtain the data within the authority, and will not cause data leakage, and since the user authority information is queried when logging in, the user authority information can be directly used in the subsequent business processing, and there is no need to query multiple times , This can also improve the efficiency of processing.
  • FIG. 3 is an example diagram of a seven-layer model in an embodiment
  • FIG. 4 is a schematic diagram of permission configuration in an embodiment
  • FIG. 5 is a personalization in an embodiment. Schematic diagram of tenant function adaptation.
  • the generation of user authority information includes:
  • the server receives the user authority configuration request sent by the tenant terminal, and creates a role corresponding to the user authority configuration request and multiple user accounts corresponding to the role.
  • the role is used for the authorization of the administrator, and the tenant is an abstract organization with users under it, and the role is authorized to the users under the tenant; different tenants can define roles and authorize the users according to their respective management requirements.
  • the tenant can configure the user.
  • the server receives the user permission configuration request sent by the tenant, and then can create different roles and users according to the configuration request.
  • the server obtains the tenant authority information corresponding to the tenant terminal, and the tenant authority information includes the system authority package of the system corresponding to several products in the platform.
  • the tenant can obtain the permission packages of multiple systems, so that the tenant permission information is obtained, and the tenant permission information may include the permission packages of multiple systems.
  • the server parses the system authority package to obtain multiple initial authority information; configures the corresponding initial authority information for the role to authorize the user account to generate user authority information.
  • the server can parse the permission package to obtain multiple initial permission information, for example, different permission information corresponding to each type of data, including read and write permissions, permissions for the data reading range, etc.
  • the server can provide each type of data as needed Configure the initial authority information corresponding to the role, and then authorize the role to the user account to complete the configuration of the user authority information.
  • users are managed at the granularity of roles, and permissions are configured for users from platforms, products, systems, permissions packages, tenants, roles, and users to meet the permissions function management requirements and facilitate user management.
  • the method of generating tenant authority information includes:
  • the server receives the tenant authority configuration request sent by the tenant terminal, and the tenant authority configuration request carries the product identifier and the system identifier.
  • the tenant authority configuration request corresponds to the product and the system.
  • Each product can have multiple systems, and the tenant can rent different systems under different products to complete the corresponding business.
  • the server queries multiple systems corresponding to the product identification, and selects the target system based on the system identification.
  • the server first queries multiple systems corresponding to the product identification, and determines the system leased by the user, that is, the target system, according to the system identification.
  • the server obtains the system authority information corresponding to the target system, selects the target authority information from the system authority information according to the tenant authority configuration request, and packages the target authority information to obtain a tenant authority package.
  • the method of generating the permission package includes: metadata definition and data rule definition.
  • Metadata is mainly information describing data attributes, used to support functions such as indicating storage location, historical data, resource search, file recording, etc.
  • the data rule is Pre-set data processing rules, package the data rules, that is, the system permission information to get the corresponding permission package.
  • the server configures the permission package to different tenants to obtain the tenant permission information.
  • the system permission package is used as the granularity to configure permission information for tenants, which can flexibly meet the personalized functional requirements of different tenants, and improve the adaptability and expansion capabilities of the platform through configuration management.
  • querying multiple systems corresponding to the product identification includes: querying the tenant domain corresponding to the tenant terminal; and querying multiple systems corresponding to the product identification from the tenant domain.
  • the tenant authority configuration request also includes the tenant domain.
  • the server queries multiple systems corresponding to the product identifier, It is also necessary to query the corresponding domain according to the domain of the tenant, so as to query multiple systems corresponding to the product identifier from the corresponding domain, that is, the user distinguishes the user type.
  • Tenant is one of the core components of the platform, representing different organizations, such as hospitals, companies, government departments, etc. In the platform, different types of organizations will classify users into domains, such as A ⁇ B ⁇ G three domains , The platform service provider corresponds to the field A, the hospital corresponds to the field B, and the government department corresponds to the field G.
  • the realm needs to be determined to facilitate obtaining different permission packages, so that when the tenant configures the users under it, the user type can be marked to obtain the permissions corresponding to the realm.
  • querying the stored session information corresponding to the authorization information includes: querying whether there is stored session information corresponding to the authorization information in the cache; when there is no stored session information corresponding to the authorization information in the cache For session information, it is queried whether there is stored session information corresponding to the authorization information in the database; when there is stored session information corresponding to the authorization information in the database, the session information is read into the cache.
  • the server when the server reads the stored session information, it can first read whether the session information corresponding to the authorization information exists in the cache. If it exists, it will directly return the query success, otherwise it can continue to query whether it exists in the database. If it exists, the session information in the database is read into the cache, so that the server directly queries the cache when processing the service request, and then obtains the user authority information. After the authority control is performed on the user authority information, the corresponding service request is obtained Response data.
  • FIG. 7 is a sequence diagram of a service data processing method based on shared authority in an embodiment.
  • the user terminal first generates a login request, then signs the login request and sends it to The gateway, the gateway verifies the login request. After the verification is completed, the login authentication is sent to the user center, the user center authenticates and records the log, the corresponding user authority information is queried, and the authorization information and session information are generated and cached Go to the cache management database, and then return the session result, that is, authorization information, to the user terminal through the user center and gateway, so that the user terminal caches the authorization information and jumps to the service processing interface.
  • the user terminal receives the service request input by the user through the service processing interface, signs the service request, and sends the signed service request to the gateway.
  • the gateway After the gateway performs the signature verification, it sends the completed service request to the user center for verification.
  • Perform interface authentication so that the user center can read the cache from the cache management database and return the session information and permission information, and if the cache does not exist, read the session information and permission information in the database to complete the interface authentication, And the authentication result is returned to the gateway, so that the gateway sends the service request to the service system after the authentication is passed, so that the service system reads the session information from the cache management database, and performs the service request according to the user authority information in the session information
  • the response data corresponding to the service request is obtained. After the service system obtains the response data, the response data is returned to the user terminal.
  • the tenant ID corresponding to the user ID is first obtained, and then the authority information of the user in the tenant can be queried, and authorization information is generated according to the authority information In this way, the authorization information, user authority information, and user ID are generated and saved after the session information is generated.
  • the corresponding authority information in the session information can be directly queried.
  • the authority information can be used to control the authority of the service request to ensure different Of users can only obtain the data within the authority, and will not cause data leakage, and since the user authority information is queried when logging in, the user authority information can be directly used in the subsequent business processing, and there is no need to query multiple times , This can also improve the efficiency of processing.
  • a service data processing device based on sharing authority including: a first receiving module 100, a first query module 200, a session information generating module 300, and a second receiving module 400.
  • the second query module 500 and the sending module 600 where:
  • the first receiving module 100 is configured to receive a login request from a user terminal, and the login request carries a user identifier.
  • the first query module 200 is configured to query the tenant ID corresponding to the user ID, and query the user authority information of the user corresponding to the user identifier in the tenant corresponding to the tenant ID, and generate authorization information according to the user authority information.
  • the session information generating module 300 is configured to generate session information according to authorization information, user authority information, and user identification, and send the authorization information to the user terminal.
  • the second receiving module 400 is configured to receive a service request sent by a user terminal, and the service request carries authorization information.
  • the second query module 500 is used to query the stored session information corresponding to the authorization information, and obtain the response data corresponding to the service request after performing permission control on the service request according to the user permission information in the session information.
  • the sending module 600 is used to return the response data to the user terminal.
  • the above-mentioned service data processing apparatus based on sharing authority may further include:
  • the third receiving module is configured to receive the user authority configuration request sent by the tenant terminal, and create a role corresponding to the user authority configuration request and multiple user accounts corresponding to the role.
  • the system permission package obtaining module is used to obtain the tenant permission information corresponding to the tenant terminal.
  • the tenant permission information includes the system permission package of the system corresponding to several products in the platform.
  • the parsing module is used to parse the system permission package to obtain multiple initial permission information.
  • the user authority information generation module is used to configure the corresponding initial authority information for the role to authorize the user account to generate user authority information.
  • the above-mentioned service data processing apparatus based on sharing authority may further include:
  • the fourth receiving module is configured to receive a tenant authority configuration request sent by the tenant terminal, and the tenant authority configuration request carries a product identifier and a system identifier.
  • the third query module is used to query multiple systems corresponding to the product identification, and select the target system according to the system identification.
  • the tenant authority package acquisition module is used to obtain system authority information corresponding to the target system, select the target authority information from the system authority information according to the tenant authority configuration request, and package the target authority information to obtain the tenant authority package.
  • the tenant authority information configuration module is used to configure the tenant authority package to the tenant to obtain the tenant authority information.
  • the above-mentioned third query module may include:
  • the domain query unit is used to query the tenant domain corresponding to the tenant terminal.
  • the system query unit is used to query multiple systems corresponding to product identifiers from the tenant domain.
  • the above-mentioned second query module 500 may include:
  • the cache query unit is used to query whether there is stored session information corresponding to the authorization information in the cache.
  • the database query unit is used to query whether the stored session information corresponding to the authorization information exists in the database when the stored session information corresponding to the authorization information does not exist in the cache.
  • the reading unit is configured to read the session information into the cache when there is stored session information corresponding to the authorization information in the database.
  • Each module in the above-mentioned service data processing device based on shared authority can be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 9.
  • the computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus.
  • the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer readable instructions, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the database of the computer equipment is used to store business data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • FIG. 9 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
  • a computer device including a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more processors perform the following steps: receiving a login from a user terminal Request, the login request carries the user ID; query the tenant ID corresponding to the user ID, and query the user authority information of the user corresponding to the user ID in the tenant corresponding to the tenant ID, and generate authorization information based on the user authority information; according to the authorization information, User authority information and user identification generate session information, and send authorization information to the user terminal; receive the service request sent by the user terminal, the service request carries authorization information; and query the stored session information corresponding to the authorization information, according to the session information After the user authority information in the authority controls the service request, the response data corresponding to the service request is obtained; the response data is returned to the user terminal.
  • the generation of user authority information involved when the processor executes the computer-readable instruction includes: receiving a user authority configuration request sent by the tenant terminal, creating a role corresponding to the user authority configuration request, and multiple roles corresponding to the role.
  • a user account obtain the tenant authority information corresponding to the tenant terminal, the tenant authority information includes the system authority package corresponding to several products in the platform; analyze the system authority package to obtain multiple initial authority information; and configure the corresponding initial authority for the role Information to authorize the user account to generate user authority information.
  • the method for generating tenant authority information involved when the processor executes the computer-readable instruction includes: receiving a tenant authority configuration request sent by a tenant terminal, the tenant authority configuration request carrying a product identifier and a system identifier; query and Multiple systems corresponding to the product identification, and select the target system according to the system identification; obtain the system authority information corresponding to the target system, select the target authority information from the system authority information according to the tenant authority configuration request, and package the target authority information to obtain the tenant authority package ; And configure the tenant authority package to the tenant to obtain the tenant authority information.
  • the query for multiple systems corresponding to the product identifier includes: querying the tenant domain corresponding to the tenant terminal; and querying the tenant domain corresponding to the product identifier.
  • the query of the stored session information corresponding to the authorization information that is implemented when the processor executes the computer-readable instruction includes: querying whether the stored session information corresponding to the authorization information exists in the cache; When there is no stored session information corresponding to the authorization information in the database, query whether there is stored session information corresponding to the authorization information in the database; and when there is stored session information corresponding to the authorization information in the database, then Read the session information into the cache.
  • One or more computer-readable storage media storing computer-readable instructions.
  • the one or more processors perform the following steps: receiving a login request from a user terminal, and logging in The request carries the user ID; query the tenant ID corresponding to the user ID, and query the user permission information of the user corresponding to the user ID in the tenant corresponding to the tenant ID, and generate authorization information based on the user permission information; according to the authorization information and user permission information ,
  • the user ID generates session information and sends the authorization information to the user terminal; receives the service request sent by the user terminal, the service request carries authorization information; queries the stored session information corresponding to the authorization information, according to the user authority in the session information After the information controls the authority of the service request, the response data corresponding to the service request is obtained; and the response data is returned to the user terminal.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the generation of user authority information involved when the computer-readable instruction is executed by the processor includes: receiving a user authority configuration request sent by a tenant terminal, creating a role corresponding to the user authority configuration request and a role corresponding to the role Multiple user accounts; obtain the tenant authority information corresponding to the tenant terminal, the tenant authority information includes the system authority package corresponding to several products in the platform; analyze the system authority package to obtain multiple initial authority information; and configure the corresponding initial authority for the role Authority information, to authorize the user account to generate user authority information.
  • the method of generating tenant authority information involved when the computer-readable instruction is executed by the processor includes: receiving a tenant authority configuration request sent by a tenant terminal, the tenant authority configuration request carrying a product identifier and a system identifier; querying Multiple systems corresponding to the product identification, and select the target system according to the system identification; obtain the system authority information corresponding to the target system, select the target authority information from the system authority information according to the tenant authority configuration request, and package the target authority information to obtain the tenant authority Package; and configure the tenant authority package to the tenant to obtain tenant authority information.
  • the query of multiple systems corresponding to the product identifier realized when the computer-readable instruction is executed by the processor includes: querying the tenant domain corresponding to the tenant terminal; and querying the tenant domain corresponding to the product identifier Multiple systems.
  • the query of the stored session information corresponding to the authorization information realized when the computer-readable instruction is executed by the processor includes: querying whether the stored session information corresponding to the authorization information exists in the cache; When there is no stored session information corresponding to the authorization information in the cache, query whether there is stored session information corresponding to the authorization information in the database; and when there is stored session information corresponding to the authorization information in the database, Then read the session information into the cache.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种基于共享权限的业务数据处理方法,涉及大数据领域,包括:接收用户终端的登录请求,登录请求携带有用户标识(S202);查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息(S204);根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给用户终端(S206);接收用户终端发送的业务请求,业务请求携带有授权信息(S208);查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据(S210);将响应数据返回给用户终端(S312)。

Description

基于共享权限的业务数据处理方法、装置、设备和介质
相关申请的交叉引用
本申请要求于2020年2月28日提交中国专利局,申请号为2020101309677,申请名称为“基于共享权限的业务数据处理方法、装置、设备和介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及大数据处理技术领域,特别是涉及一种基于共享权限的业务数据处理方法、装置、设备和介质。
背景技术
随着虚拟化和云计算技术的日益完善,SaaS(SoftwareasaService,即软件及服务)这种全新的应用模式逐步被广泛接收和使用。SaaS是一种通过Internet提供软件的模式,软件厂商将应用软件统一部署在自己的服务器上,客户可以根据自己实际需求,通过互联网向厂商定购所需的应用软件服务,按定购的服务多少和时间长短向软件厂商支付费用,并通过互联网获得软件厂商提供的服务。用户不用再购买软件,而改用向软件厂商租用基于Web的软件,来管理企业经营活动,且无需对软件进行维护。软件厂商会全权管理和维护软件,软件厂商在向客户提供互联网应用的同时,也提供软件的离线操作和本地数据存储,让用户随时随地都可以使用其定购的软件和服务。对于许多小型企业来说,SaaS是采用先进技术的最好途径,它消除了企业购买、构建和维护基础设施和应用程序的需要。
然而,发明人意识到,对于SaaS模式来说,大多都是基于传统RBAC模型的,传统RABC模型为单层管理模型,即针对平台层进行访问控制。平台角色分为规则角色和管理角色,规则角色用来执行平台的业务功能,管理角色用来管理平台中角色的创建、权限的分配。但是传统RBAC模型对整个平台资源的分配和角色划分都是全局性的,不能根据租户需求进行访问控制策略定制,也不能将各租户之间的规则、管理角色分开,进而无法将同一平台不同租户的数据进行隔离管理,导致不同租户之间的数据存在泄露的风险。
发明内容
根据本申请公开的各种实施例,提供一种基于共享权限的业务数据处理方法、装置、设备和介质。
一种基于共享权限的业务数据处理方法,包括:
接收用户终端的登录请求,所述登录请求携带有用户标识;
查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标 识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
接收用户终端发送的业务请求,所述业务请求携带有授权信息;
查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
将所述响应数据返回给用户终端。
一种基于共享权限的业务数据处理装置,包括:
第一接收模块,用于接收用户终端的登录请求,所述登录请求携带有用户标识;
第一查询模块,用于查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
会话信息生成模块,用于根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
第二接收模块,用于接收用户终端发送的业务请求,所述业务请求携带有授权信息;
第二查询模块,用于查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
发送模块,用于将所述响应数据返回给用户终端。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:
接收用户终端的登录请求,所述登录请求携带有用户标识;
查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
接收用户终端发送的业务请求,所述业务请求携带有授权信息;
查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
将所述响应数据返回给用户终端。
一个或多个存储有计算机可读指令的计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
接收用户终端的登录请求,所述登录请求携带有用户标识;
查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标 识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
接收用户终端发送的业务请求,所述业务请求携带有授权信息;
查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
将所述响应数据返回给用户终端。
上述基于共享权限的业务数据处理方法、装置、设备和介质,在接收到用户终端发送的登录请求后,首先获取到用户标识对应的租户标识,进而可以查询到用户在租户中的权限信息,且根据权限信息生成授权信息,这样将授权信息、用户权限信息、用户标识生成会话信息后保存,当存在业务请求的时候,可以直接查询会话信息中对应的权限信息,这样通过权限信息对业务请求进行权限控制,可以保证不同的用户仅能获取到权限内的数据,不会造成数据泄露,且由于在登录的时候查询到了用户权限信息,后续在业务处理的时候直接使用该些用户权限信息即可,不需要多次查询,这样还可以提高处理的效率。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中基于共享权限的业务数据处理方法的应用场景图。
图2为根据一个或多个实施例中基于共享权限的业务数据处理方法的流程示意图。
图3为根据一个或多个实施例中的七层模型实例图。
图4为根据一个或多个实施例中的权限配置化示意图。
图5为根据一个或多个实施例中的个性化租户功能适配示意图。
图6为根据一个或多个实施例中的领域管理示意图。
图7为根据一个或多个实施例中的基于共享权限的业务数据处理方法的时序图。
图8为根据一个或多个实施例中基于共享权限的业务数据处理装置的结构框图。
图9为根据一个或多个实施例中计算机设备的框图。
具体实施方式
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的基于共享权限的业务数据处理方法,可以应用于如图1所示的应用环境中。其中,用户终端102与服务器104通过网络进行通信。用户终端102向服务器104发送登录请求,这样服务器104可以查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息,根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给用户终端102。从而用户终端102向服务器104发送业务请求时,服务器104可以查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据,并将所得到的响应数据104发送给用户终端102。这样通过权限信息对业务请求进行权限控制,可以保证不同的用户仅能获取到权限内的数据,不会造成数据泄露,且由于在登录的时候查询到了用户权限信息,后续在业务处理的时候直接使用该些用户权限信息即可,不需要多次查询,这样还可以提高处理的效率。终端102可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,服务器104可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
在其中一个实施例中,如图2所示,提供了一种基于共享权限的业务数据处理方法,以该方法应用于图1中的服务器为例进行说明,包括以下步骤:
S202:接收用户终端的登录请求,登录请求携带有用户标识。
具体地,登录请求是用户终端生成的,其可以包括用户标识,例如账户和密码、list、map以及深层次参数等,用户终端将该些参数通过签名字符串**拼接,拼接完成后与header中固定参数进行拼接,为了保证唯一性,使用随机字符串+时间戳形式参数进行拼接,最后加上动态加密值共同组成参数签名字符串,先使用sha256对签名字符串进行加密,然后逆序使用md5加密获取签名值,最后根据该签名值生成登录请求。
S204:查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息。
具体地,租户标识是用于唯一确定租户的,租户是相对于平台来说的,是一个抽象的组织,平台中可以包括多个不同的产品,每个产品可以对应有不用的系统,每个系统可以包括多个不同的权限包,租户可以被配置多个不同的权限包。租户下可以设置多个不同的角色,每个角色可以配置有不同的用户。其中角色授权给租户下的用户;不同的租户可以根据各自管理的要求进行角色定义并授权给用户。这样当服务器接收到用户标识后,可以确定用户标识对应的租户标识,以确定用户是属于哪一个租户的,这样可以获取到租户下的用户对应的角色,从而可以得到角色对应的权限,也即为用户权限信息,当存在用户权限信息时,则说明用户是合法的,这样可以生成授权信息,以便于后续业务的处理。
可选地,服务器可以通过网关来接收到登录请求,并通过网关对登录请求中的签名信息进行验证,并在验证成功后,则通过用户账户和密码登录到用户中心,其中验证的过程与上述签名信息生成的过程相逆,在此不再赘述。
S206:根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给 用户终端。
具体地,服务器在生成授权信息后,将授权信息、用户权限信息以及用户标识生成会话信息并进行保存,以便于用户终端进行业务处理请求时,直接使用该会话信息。
具体地,如上,在登录到用户中心后,用户中心验证用户输入的账户和密码,然后进行鉴权。鉴权成功后,则生成会话信息,例如用户信息合法性验证通过后,会对本次登录颁发授权token及动态加密验证值,Token、动态验证值及用户信息会缓存在缓存服务器内,同时仅将授权的token信息及动态验证值信息返回至用户终端,以便于用户终端后续进行业务处理时,可以直接查询到对应的权限信息以及保持用户终端的登录状态。
上述的鉴权过程可以包括多种鉴权方式:例如多种鉴权策略(包括无鉴权、会话级鉴权、权限项鉴权以及非公网接口鉴权)、多重安全加密策略(包括:AccessToken与RefreshToken双重Token机制、会话级动态加密验证机制、接口鉴权机制)、自定义防篡改加密算法、等保三级安全级别设计(敏感数据的加密存储,会话与并发用户数的控制能力,双因素认证机制(在登陆时,用户输入个人的原有密码(静态密码)后,再输入令牌上显示的动态密码,实现安全的双因素身份认证保护。))等。
S208:接收用户终端发送的业务请求,业务请求携带有授权信息。
具体地,业务请求是用户终端申请服务器的服务的请求,其可以携带有上述的授权信息,这样保证了登录状态的同时,还可以方便权限信息的查询。
且可选地,服务器可以通过网关来接收到业务请求,然后通过网关来对该业务请求中的签名信息进行验证,具体地可以通过基于OAuth2.0协议的统一网关进行鉴权,且在鉴权成功后,从用户中心读取会话信息。
S210:查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据。
具体地,服务器将鉴权成功的信息发送给用户中心,这样用户中心可以读取已存储的会话信息,并根据会话信息中的用户权限信息对业务请求进行权限控制,例如是否允许读取数据,是否允许写入数据等,以得到与业务请求对应的响应数据。
S212:将响应数据返回给用户终端。
具体地,在处理完成后,服务器将响应数据返回给用户终端,完成整个业务请求的处理。且若用户还对平台中的其他系统进行处理,则可以直接跳转到另一个系统,然后进行业务处理,具体地处理过程如上,不再赘述。
上述基于共享权限的业务数据处理方法,在接收到用户终端发送的登录请求后,首先获取到用户标识对应的租户标识,进而可以查询到用户在租户中的权限信息,且根据权限信息生成授权信息,这样将授权信息、用户权限信息、用户标识生成会话信息后保存,当存在业务请求的时候,可以直接查询会话信息中对应的权限信息,这样通过权限信息对业务请求进行权限控制,可以保证不同的用户仅能获取到权限内的数据,不会造成数据泄露,且由于在登录的时候查询到了用户权限信息,后续在业务处理的时候直接使用该些用户权 限信息即可,不需要多次查询,这样还可以提高处理的效率。
具体地,请参阅图3至图5所示,图3为一个实施例中的七层模型实例图,图4为一个实施例中的权限配置化示意图,图5为一个实施例中的个性化租户功能适配示意图。
在其中一个实施例中,结合图3至图5,用户权限信息的生成包括:
首先,服务器接收租户终端发送的用户权限配置请求,创建与用户权限配置请求对应的角色以及与角色对应的多个用户账户。
具体地,角色是用于管理人的授权,租户是抽象的组织,其下有用户,角色授权给租户下的用户;不同的租户可以根据各自管理的要求进行角色定义并授权给用户。租户可以对用户进行配置,在配置时,服务器接收到租户发送的用户权限配置请求,然后根据该配置请求可以创建不同的角色和用户。
其次,服务器获取租户终端对应的租户权限信息,租户权限信息包括与平台中的若干产品对应的系统的系统权限包。
具体地,租户可以获取到多个系统的权限包,这样就得到了租户权限信息,租户权限信息中可以包括多个系统的权限包。
第三,服务器解析系统权限包得到多个初始权限信息;为角色配置对应的初始权限信息,以给用户账户进行授权生成用户权限信息。
具体地,服务器可以解析权限包得到多个初始权限信息,例如每一类数据对应的不同的权限信息,包括读取和写入权限,数据读取范围的权限等,服务器可以按照需要为每个角色配置对应的初始权限信息,这样再将角色授权给用户账户,从而完成对用户权限信息的配置。
上述实施例中,以角色为粒度对用户进行管理,且从平台、产品、系统、权限包、租户、角色以及用户层层为用户进行权限配置可以达到权限功能管理要求,方便对用户的管理。
在其中一个实施例中,请继续结合图3至图5所示,租户权限信息的生成方式包括:
首先,服务器接收租户终端发送的租户权限配置请求,租户权限配置请求携带有产品标识和系统标识。
租户权限配置请求是与产品和系统相对应的,每个产品可以设置有多个系统,租户可以租用不同的产品下的不同的系统,以完成对应的业务。
其次,服务器查询与产品标识对应的多个系统,并根据系统标识选取目标系统。
服务器首先查询产品标识对应的多个系统,并根据系统标识确定用户所租用的系统,即目标系统。
第三,服务器获取目标系统对应的系统权限信息,根据租户权限配置请求从系统权限信息中选取目标权限信息,并将目标权限信息打包得到租户权限包。
具体地,权限包的生成方式包括:元数据定义和数据规则定义,元数据主要是描述数据属性的信息,用来支持如指示存储位置、历史数据、资源查找、文件纪录等功能,数据 规则是预先设置的数据处理规则,对数据规则,也就系统权限信息进行打包即可以得到对应的权限包。
第四,将租户权限包配置给租户得到租户权限信息。
服务器将权限包配置给不同的租户从而得到租户权限信息。
上述实施例中,以系统权限包为粒度,给租户配置权限信息,可以灵活满足不同租户个性化功能需求,通过配置化管理提高平台的适配能力和扩展能力。
在其中一个实施例中,查询与产品标识对应的多个系统,包括:查询租户终端对应的租户领域;从租户领域中查询与产品标识对应的多个系统。
具体地,请参见图6,图6为一个实施例中的领域管理示意图,在该实施例中,租户权限配置请求还包括租户领域,服务器在查询与所述产品标识对应的多个系统之前,还需要根据租户的领域查询到对应的领域,以从对应领域中查询与所述产品标识对应的多个系统,也就是说用户区分用户类型。租户是平台内核心的组成单元之一,代表不同的组织,如医院、公司、政府部门等,在平台内不同类型的组织会进行用户分类即领域,如分为A\B\G三个领域,平台服务提供商对应领域A,医院对应领域B,政府部门对应领域G。在对租户进行配置的时候,需要确定领域,以便于获取不同的权限包,这样当租户对其下的用户进行配置的时候可以对用户的类型进行标注,从而获取到与领域对应的权限。
在其中一个实施例中,查询与授权信息对应的已存储的会话信息,包括:查询缓存中是否存在与授权信息对应的已存储的会话信息;当缓存中不存在与授权信息对应的已存储的会话信息时,则查询数据库中是否存在与授权信息对应的已存储的会话信息;当数据库中存在与授权信息对应的已存储的会话信息时,则将会话信息读取至缓存中。
具体地,服务器在读取已存储的会话信息的时候,可以先读取缓存中是否存在与授权信息对应的会话信息,如果存在,则直接返回查询成功,否则则可以继续查询数据库中是否存在,如果存在,则将数据库中的会话信息读取至缓存中,这样服务器在处理业务请求时,直接查询缓存,然后得到用户权限信息,通过该用户权限信息对进行权限控制后,得到与业务请求对应的响应数据。
请参阅图7所示,图7为一个实施例中的基于共享权限的业务数据处理方法的时序图,在该实施例中,用户终端首先生成登录请求,然后对该登录请求进行签名后发送给网关,网关对该登录请求进行验签,验签完成后,将该登录认证发送给用户中心,用户中心认证并记录日志,查询到对应的用户权限信息,并生成授权信息和会话信息后,缓存至缓存管理数据库,然后通过用户中心、网关以向用户终端返回会话结果,也即授权信息,这样用户终端缓存该授权信息,并跳转至业务处理界面。
这样用户终端通过业务处理界面接收用户输入的业务请求,并将业务请求进行签名,且将签名后的业务请求发送给网关,网关进行验签后,将验签完成的业务请求发送给用户中心以进行接口鉴权,这样用户中心可以从缓存管理数据库中读取缓存,并返回会话信息和权限信息,且如果缓存中不存在,则读取数据库中的会话信息和权限信息以完成接口鉴 权,并将鉴权结果返回给网关,这样网关在鉴权通过后,将业务请求发送给业务系统,从而业务系统从缓存管理数据库读取会话信息,并根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据,在业务系统得到响应数据后,将响应数据返回给用户终端。
上述基于共享权限的业务数据处理方法,在接收到用户终端发送的登录请求后,首先获取到用户标识对应的租户标识,进而可以查询到用户在租户中的权限信息,且根据权限信息生成授权信息,这样将授权信息、用户权限信息、用户标识生成会话信息后保存,当存在业务请求的时候,可以直接查询会话信息中对应的权限信息,这样通过权限信息对业务请求进行权限控制,可以保证不同的用户仅能获取到权限内的数据,不会造成数据泄露,且由于在登录的时候查询到了用户权限信息,后续在业务处理的时候直接使用该些用户权限信息即可,不需要多次查询,这样还可以提高处理的效率。
应该理解的是,虽然图2和图7的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2和图7中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在其中一个实施例中,如图8所示,提供了一种基于共享权限的业务数据处理装置,包括:第一接收模块100、第一查询模块200、会话信息生成模块300、第二接收模块400、第二查询模块500和发送模块600,其中:
第一接收模块100,用于接收用户终端的登录请求,登录请求携带有用户标识。
第一查询模块200,用于查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息。
会话信息生成模块300,用于根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给用户终端。
第二接收模块400,用于接收用户终端发送的业务请求,业务请求携带有授权信息。
第二查询模块500,用于查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据。
发送模块600,用于将响应数据返回给用户终端。
在其中一个实施例中,上述基于共享权限的业务数据处理装置还可以包括:
第三接收模块,用于接收租户终端发送的用户权限配置请求,创建与用户权限配置请求对应的角色以及与角色对应的多个用户账户。
系统权限包获取模块,用于获取租户终端对应的租户权限信息,租户权限信息包括与 平台中的若干产品对应的系统的系统权限包。
解析模块,用于解析系统权限包得到多个初始权限信息。
用户权限信息生成模块,用于为角色配置对应的初始权限信息,以给用户账户进行授权生成用户权限信息。
在其中一个实施例中,上述基于共享权限的业务数据处理装置还可以包括:
第四接收模块,用于接收租户终端发送的租户权限配置请求,租户权限配置请求携带有产品标识和系统标识。
第三查询模块,用于查询与产品标识对应的多个系统,并根据系统标识选取目标系统。
租户权限包获取模块,用于获取目标系统对应的系统权限信息,根据租户权限配置请求从系统权限信息中选取目标权限信息,并将目标权限信息打包得到租户权限包。
租户权限信息配置模块,用于将租户权限包配置给租户得到租户权限信息。
在其中一个实施例中,上述第三查询模块可以包括:
领域查询单元,用于查询租户终端对应的租户领域。
系统查询单元,用于从租户领域中查询与产品标识对应的多个系统。
在其中一个实施例中,上述第二查询模块500可以包括:
缓存查询单元,用于查询缓存中是否存在与授权信息对应的已存储的会话信息。
数据库查询单元,用于当缓存中不存在与授权信息对应的已存储的会话信息时,则查询数据库中是否存在与授权信息对应的已存储的会话信息。
读取单元,用于当数据库中存在与授权信息对应的已存储的会话信息时,则将会话信息读取至缓存中。
关于基于共享权限的业务数据处理装置的具体限定可以参见上文中对于基于共享权限的业务数据处理方法的限定,在此不再赘述。上述基于共享权限的业务数据处理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图9所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储业务数据数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种基于共享权限的业务数据处理方法。
本领域技术人员可以理解,图9中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可 以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:接收用户终端的登录请求,登录请求携带有用户标识;查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息;根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给用户终端;接收用户终端发送的业务请求,业务请求携带有授权信息;及查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应数据;将响应数据返回给用户终端。
在其中一个实施例中,处理器执行计算机可读指令时所涉及的用户权限信息的生成包括:接收租户终端发送的用户权限配置请求,创建与用户权限配置请求对应的角色以及与角色对应的多个用户账户;获取租户终端对应的租户权限信息,租户权限信息包括与平台中的若干产品对应的系统的系统权限包;解析系统权限包得到多个初始权限信息;及为角色配置对应的初始权限信息,以给用户账户进行授权生成用户权限信息。
在其中一个实施例中,处理器执行计算机可读指令时所涉及的租户权限信息的生成方式包括:接收租户终端发送的租户权限配置请求,租户权限配置请求携带有产品标识和系统标识;查询与产品标识对应的多个系统,并根据系统标识选取目标系统;获取目标系统对应的系统权限信息,根据租户权限配置请求从系统权限信息中选取目标权限信息,并将目标权限信息打包得到租户权限包;及将租户权限包配置给租户得到租户权限信息。
在其中一个实施例中,处理器执行计算机可读指令时所实现的查询与产品标识对应的多个系统,包括:查询租户终端对应的租户领域;及从租户领域中查询与产品标识对应的多个系统。
在其中一个实施例中,处理器执行计算机可读指令时所实现的查询与授权信息对应的已存储的会话信息,包括:查询缓存中是否存在与授权信息对应的已存储的会话信息;当缓存中不存在与授权信息对应的已存储的会话信息时,则查询数据库中是否存在与授权信息对应的已存储的会话信息;及当数据库中存在与授权信息对应的已存储的会话信息时,则将会话信息读取至缓存中。
一个或多个存储有计算机可读指令的计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:接收用户终端的登录请求,登录请求携带有用户标识;查询与用户标识对应的租户标识,并查询用户标识对应的用户在租户标识对应的租户中的用户权限信息,并根据用户权限信息生成授权信息;根据授权信息、用户权限信息、用户标识生成会话信息,并将授权信息发送给用户终端;接收用户终端发送的业务请求,业务请求携带有授权信息;查询与授权信息对应的已存储的会话信息,根据会话信息中的用户权限信息对业务请求进行权限控制后,得到与业务请求对应的响应 数据;及将响应数据返回给用户终端。
其中,该计算机可读存储介质可以是非易失性,也可以是易失性的。
在其中一个实施例中,计算机可读指令被处理器执行时所涉及的用户权限信息的生成包括:接收租户终端发送的用户权限配置请求,创建与用户权限配置请求对应的角色以及与角色对应的多个用户账户;获取租户终端对应的租户权限信息,租户权限信息包括与平台中的若干产品对应的系统的系统权限包;解析系统权限包得到多个初始权限信息;及为角色配置对应的初始权限信息,以给用户账户进行授权生成用户权限信息。
在其中一个实施例中,计算机可读指令被处理器执行时所涉及的租户权限信息的生成方式包括:接收租户终端发送的租户权限配置请求,租户权限配置请求携带有产品标识和系统标识;查询与产品标识对应的多个系统,并根据系统标识选取目标系统;获取目标系统对应的系统权限信息,根据租户权限配置请求从系统权限信息中选取目标权限信息,并将目标权限信息打包得到租户权限包;及将租户权限包配置给租户得到租户权限信息。
在其中一个实施例中,计算机可读指令被处理器执行时所实现的查询与产品标识对应的多个系统,包括:查询租户终端对应的租户领域;及从租户领域中查询与产品标识对应的多个系统。
在其中一个实施例中,计算机可读指令被处理器执行时所实现的查询与授权信息对应的已存储的会话信息,包括:查询缓存中是否存在与授权信息对应的已存储的会话信息;当缓存中不存在与授权信息对应的已存储的会话信息时,则查询数据库中是否存在与授权信息对应的已存储的会话信息;及当数据库中存在与授权信息对应的已存储的会话信息时,则将会话信息读取至缓存中。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能 因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (16)

  1. 一种基于共享权限的业务数据处理方法,包括:
    接收用户终端的登录请求,所述登录请求携带有用户标识;
    查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
    根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
    接收用户终端发送的业务请求,所述业务请求携带有授权信息;
    查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
    将所述响应数据返回给用户终端。
  2. 根据权利要求1所述的方法,其中,所述用户权限信息的生成方式包括:
    接收租户终端发送的用户权限配置请求,创建与所述用户权限配置请求对应的角色以及与所述角色对应的多个用户账户;
    获取所述租户终端对应的租户权限信息,所述租户权限信息包括与平台中的若干产品对应的系统的系统权限包;
    解析所述系统权限包得到多个初始权限信息;及
    为所述角色配置对应的初始权限信息,以给所述用户账户进行授权生成用户权限信息。
  3. 根据权利要求1所述的方法,其中,所述租户权限信息的生成方式包括:
    接收租户终端发送的租户权限配置请求,所述租户权限配置请求携带有产品标识和系统标识;
    查询与所述产品标识对应的多个系统,并根据所述系统标识选取目标系统;
    获取目标系统对应的系统权限信息,根据所述租户权限配置请求从所述系统权限信息中选取目标权限信息,并将所述目标权限信息打包得到租户权限包;及
    将所述租户权限包配置给所述租户得到租户权限信息。
  4. 根据权利要求3所述的方法,其中,所述查询与所述产品标识对应的多个系统,包括:
    查询所述租户终端对应的租户领域;及
    从所述租户领域中查询与所述产品标识对应的多个系统。
  5. 根据权利要求1至4任意一项所述的方法,其中,所述查询与所述授权信息对应的已存储的会话信息,包括:
    查询缓存中是否存在与所述授权信息对应的已存储的会话信息;
    当所述缓存中不存在与所述授权信息对应的已存储的会话信息时,则查询数据库中是否存在与所述授权信息对应的已存储的会话信息;及
    当所述数据库中存在与所述授权信息对应的已存储的会话信息时,则将所述会话信息读取至缓存中。
  6. 一种基于共享权限的业务数据处理装置,包括:
    第一接收模块,用于接收用户终端的登录请求,所述登录请求携带有用户标识;
    第一查询模块,用于查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
    会话信息生成模块,用于根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
    第二接收模块,用于接收用户终端发送的业务请求,所述业务请求携带有授权信息;
    第二查询模块,用于查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
    发送模块,用于将所述响应数据返回给用户终端。
  7. 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收用户终端的登录请求,所述登录请求携带有用户标识;
    查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
    根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
    接收用户终端发送的业务请求,所述业务请求携带有授权信息;
    查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
    将所述响应数据返回给用户终端。
  8. 根据权利要求7所述的计算机设备,其中,所述处理器执行所述计算机可读指令时所涉及的所述用户权限信息的生成方式包括:
    接收租户终端发送的用户权限配置请求,创建与所述用户权限配置请求对应的角色以及与所述角色对应的多个用户账户;
    获取所述租户终端对应的租户权限信息,所述租户权限信息包括与平台中的若干产品对应的系统的系统权限包;
    解析所述系统权限包得到多个初始权限信息;及
    为所述角色配置对应的初始权限信息,以给所述用户账户进行授权生成用户权限信息。
  9. 根据权利要求7所述的计算机设备,其中,所述处理器执行所述计算机可读指令时所涉及的所述租户权限信息的生成方式包括:
    接收租户终端发送的租户权限配置请求,所述租户权限配置请求携带有产品标识和系统标识;
    查询与所述产品标识对应的多个系统,并根据所述系统标识选取目标系统;
    获取目标系统对应的系统权限信息,根据所述租户权限配置请求从所述系统权限信息中选取目标权限信息,并将所述目标权限信息打包得到租户权限包;及
    将所述租户权限包配置给所述租户得到租户权限信息。
  10. 根据权利要求9所述的计算机设备,其中,所述处理器执行所述计算机可读指令时所执行的所述查询与所述产品标识对应的多个系统,包括:
    查询所述租户终端对应的租户领域;及
    从所述租户领域中查询与所述产品标识对应的多个系统。
  11. 根据权利要求7至10任意一项所述的计算机设备,其中,所述处理器执行所述计算机可读指令时所执行的所述查询与所述授权信息对应的已存储的会话信息,包括:
    查询缓存中是否存在与所述授权信息对应的已存储的会话信息;
    当所述缓存中不存在与所述授权信息对应的已存储的会话信息时,则查询数据库中是否存在与所述授权信息对应的已存储的会话信息;及
    当所述数据库中存在与所述授权信息对应的已存储的会话信息时,则将所述会话信息读取至缓存中。
  12. 一个或多个存储有计算机可读指令的计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收用户终端的登录请求,所述登录请求携带有用户标识;
    查询与所述用户标识对应的租户标识,并查询所述用户标识对应的用户在所述租户标识对应的租户中的用户权限信息,并根据所述用户权限信息生成授权信息;
    根据所述授权信息、所述用户权限信息、所述用户标识生成会话信息,并将所述授权信息发送给所述用户终端;
    接收用户终端发送的业务请求,所述业务请求携带有授权信息;
    查询与所述授权信息对应的已存储的会话信息,根据所述会话信息中的用户权限信息对所述业务请求进行权限控制后,得到与所述业务请求对应的响应数据;及
    将所述响应数据返回给用户终端。
  13. 根据权利要求12所述的存储介质,其中,所述计算机可读指令被所述处理器执行时所涉及的所述用户权限信息的生成方式包括:
    接收租户终端发送的用户权限配置请求,创建与所述用户权限配置请求对应的角色以及与所述角色对应的多个用户账户;
    获取所述租户终端对应的租户权限信息,所述租户权限信息包括与平台中的若干产品 对应的系统的系统权限包;
    解析所述系统权限包得到多个初始权限信息;及
    为所述角色配置对应的初始权限信息,以给所述用户账户进行授权生成用户权限信息。
  14. 根据权利要求12所述的存储介质,其中,所述计算机可读指令被所述处理器执行时所涉及的所述租户权限信息的生成方式包括:
    接收租户终端发送的租户权限配置请求,所述租户权限配置请求携带有产品标识和系统标识;
    查询与所述产品标识对应的多个系统,并根据所述系统标识选取目标系统;
    获取目标系统对应的系统权限信息,根据所述租户权限配置请求从所述系统权限信息中选取目标权限信息,并将所述目标权限信息打包得到租户权限包;及
    将所述租户权限包配置给所述租户得到租户权限信息。
  15. 根据权利要求14所述的存储介质,其中,所述计算机可读指令被所述处理器执行时所执行的所述查询与所述产品标识对应的多个系统,包括:
    查询所述租户终端对应的租户领域;及
    从所述租户领域中查询与所述产品标识对应的多个系统。
  16. 根据权利要求12至15任意一项所述的存储介质,其中,所述计算机可读指令被所述处理器执行时所执行的所述查询与所述授权信息对应的已存储的会话信息,包括:
    查询缓存中是否存在与所述授权信息对应的已存储的会话信息;
    当所述缓存中不存在与所述授权信息对应的已存储的会话信息时,则查询数据库中是否存在与所述授权信息对应的已存储的会话信息;及
    当所述数据库中存在与所述授权信息对应的已存储的会话信息时,则将所述会话信息读取至缓存中。
PCT/CN2020/098690 2020-02-28 2020-06-29 基于共享权限的业务数据处理方法、装置、设备和介质 WO2021169112A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010130967.7 2020-02-28
CN202010130967.7A CN111400676A (zh) 2020-02-28 2020-02-28 基于共享权限的业务数据处理方法、装置、设备和介质

Publications (1)

Publication Number Publication Date
WO2021169112A1 true WO2021169112A1 (zh) 2021-09-02

Family

ID=71435944

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/098690 WO2021169112A1 (zh) 2020-02-28 2020-06-29 基于共享权限的业务数据处理方法、装置、设备和介质

Country Status (2)

Country Link
CN (1) CN111400676A (zh)
WO (1) WO2021169112A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417287A (zh) * 2022-03-25 2022-04-29 阿里云计算有限公司 数据处理方法、系统、设备及存储介质
CN114726590A (zh) * 2022-03-18 2022-07-08 重庆米帕斯科技有限公司 一种分布式系统中去中心化实现登录鉴权的方法
CN114726629A (zh) * 2022-04-12 2022-07-08 树根互联股份有限公司 权限配置方法、系统、装置、电子设备及可读存储介质
CN114928461A (zh) * 2022-03-01 2022-08-19 达而观信息科技(上海)有限公司 一种机器人流程自动化系统及其数据权限控制方法
CN115086431A (zh) * 2022-06-10 2022-09-20 深圳市大族数控科技股份有限公司 Pcb设备数据传送方法、装置、计算机设备及存储介质
CN115208646A (zh) * 2022-07-03 2022-10-18 上海妙一生物科技有限公司 一种SaaS应用权限管理方法及系统
CN117273479A (zh) * 2023-08-21 2023-12-22 杭州微宏科技有限公司 一种集团数据管理系统、方法和存储介质

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914233A (zh) * 2020-08-11 2020-11-10 广东电网有限责任公司广州供电局 一种账户权限管理方法和装置
CN111800440B (zh) * 2020-09-08 2020-12-18 平安国际智慧城市科技股份有限公司 多策略访问控制登录方法、装置、计算机设备及存储介质
CN112333272B (zh) * 2020-11-06 2023-05-26 杭州安恒信息技术股份有限公司 一种微服务数据访问方法、装置、设备及可读存储介质
CN112257047B (zh) * 2020-11-17 2022-08-02 珠海大横琴科技发展有限公司 一种数据共享平台的安全控制方法及装置、设备、介质
CN114553450A (zh) * 2020-11-24 2022-05-27 贝斯平环球公司 合并管理系统及合并管理系统的控制方法
CN113542527B (zh) * 2020-11-26 2023-08-18 腾讯科技(深圳)有限公司 一种人脸图像传输方法、装置、电子设备及存储介质
CN112995179B (zh) * 2021-02-25 2022-08-26 杭州迪普信息技术有限公司 一种应答报文处理方法及设备
CN113359526A (zh) * 2021-06-10 2021-09-07 上海钛米机器人股份有限公司 权限数据处理方法、装置、设备及存储介质
CN113626863A (zh) * 2021-08-11 2021-11-09 杭州橙鹰数据技术有限公司 数据处理方法及装置
CN113626844A (zh) * 2021-08-18 2021-11-09 平安普惠企业管理有限公司 用户权限控制方法、系统、计算机设备及存储介质
CN113779625A (zh) * 2021-08-31 2021-12-10 成都商汤科技有限公司 一种数据访问的方法、装置、电子设备及存储介质
CN113794720B (zh) * 2021-09-14 2023-06-23 树根互联股份有限公司 跨租户设备资源的权限授权方法、装置和电子设备
CN115883394A (zh) * 2021-09-30 2023-03-31 华为技术有限公司 一种管理服务的通信方法和装置
CN114301714B (zh) * 2022-01-20 2024-01-19 杭萧钢构股份有限公司 一种多租户权限控制方法和系统
CN114238420B (zh) * 2022-02-24 2022-06-14 北京仁科互动网络技术有限公司 基于多租户架构的元数据使用的方法、装置及电子设备
CN114826738B (zh) * 2022-04-26 2024-06-18 广州鑫景信息科技服务有限公司 基于sso用户体系的多租户实现方法、处理器及装置
CN117375901B (zh) * 2023-09-30 2024-05-17 上海复通软件技术有限公司 一种跨租户多终端鉴权方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467617A (zh) * 2010-11-04 2012-05-23 镇江金软计算机科技有限责任公司 SaaS应用软件的数据隔离方法
CN103714273A (zh) * 2013-12-31 2014-04-09 深圳市兴邦创新信息技术有限公司 一种基于在线动态授权的软件授权系统及方法
US20180039501A1 (en) * 2016-08-05 2018-02-08 Oracle International Corporation Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service
CN109388631A (zh) * 2018-10-11 2019-02-26 山东浪潮通软信息科技有限公司 一种多租户的数据库分库实现方法
CN110086813A (zh) * 2019-04-30 2019-08-02 新华三大数据技术有限公司 访问权限控制方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467617A (zh) * 2010-11-04 2012-05-23 镇江金软计算机科技有限责任公司 SaaS应用软件的数据隔离方法
CN103714273A (zh) * 2013-12-31 2014-04-09 深圳市兴邦创新信息技术有限公司 一种基于在线动态授权的软件授权系统及方法
US20180039501A1 (en) * 2016-08-05 2018-02-08 Oracle International Corporation Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service
CN109388631A (zh) * 2018-10-11 2019-02-26 山东浪潮通软信息科技有限公司 一种多租户的数据库分库实现方法
CN110086813A (zh) * 2019-04-30 2019-08-02 新华三大数据技术有限公司 访问权限控制方法和装置

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114928461A (zh) * 2022-03-01 2022-08-19 达而观信息科技(上海)有限公司 一种机器人流程自动化系统及其数据权限控制方法
CN114726590A (zh) * 2022-03-18 2022-07-08 重庆米帕斯科技有限公司 一种分布式系统中去中心化实现登录鉴权的方法
CN114726590B (zh) * 2022-03-18 2024-05-17 重庆米帕斯科技有限公司 一种分布式系统中去中心化实现登录鉴权的方法
CN114417287A (zh) * 2022-03-25 2022-04-29 阿里云计算有限公司 数据处理方法、系统、设备及存储介质
CN114726629A (zh) * 2022-04-12 2022-07-08 树根互联股份有限公司 权限配置方法、系统、装置、电子设备及可读存储介质
CN114726629B (zh) * 2022-04-12 2024-03-12 树根互联股份有限公司 权限配置方法、系统、装置、电子设备及可读存储介质
CN115086431A (zh) * 2022-06-10 2022-09-20 深圳市大族数控科技股份有限公司 Pcb设备数据传送方法、装置、计算机设备及存储介质
CN115086431B (zh) * 2022-06-10 2024-03-15 深圳市大族数控科技股份有限公司 Pcb设备数据传送方法、装置、计算机设备及存储介质
CN115208646A (zh) * 2022-07-03 2022-10-18 上海妙一生物科技有限公司 一种SaaS应用权限管理方法及系统
CN115208646B (zh) * 2022-07-03 2024-03-26 上海妙一生物科技有限公司 一种SaaS应用权限管理方法及系统
CN117273479A (zh) * 2023-08-21 2023-12-22 杭州微宏科技有限公司 一种集团数据管理系统、方法和存储介质

Also Published As

Publication number Publication date
CN111400676A (zh) 2020-07-10

Similar Documents

Publication Publication Date Title
WO2021169112A1 (zh) 基于共享权限的业务数据处理方法、装置、设备和介质
US10790980B2 (en) Establishing trust in an attribute authentication system
US10142326B2 (en) Attribute-based access control
US10944560B2 (en) Privacy-preserving identity asset exchange
CN109274652B (zh) 身份信息验证系统、方法及装置及计算机存储介质
US11290446B2 (en) Access to data stored in a cloud
US11122052B2 (en) Sensitive information accessibility in blockchain
WO2021003977A1 (zh) 违约信息查询方法、装置、计算机设备和存储介质
US11652631B2 (en) Distribution of security credentials
US11856090B2 (en) Data protection optimization
KR20180127384A (ko) 공동 계좌에 대한 인가 방법과 디바이스, 및 공동 계좌에 대한 인증 방법과 디바이스
US20200296089A1 (en) Validating containers on a microservice framework
US20230254147A1 (en) Authorization management in an internet of things (iot) network
US11677549B2 (en) Maintaining confidentiality in decentralized policies
US10972455B2 (en) Secure authentication in TLS sessions
WO2022206203A1 (en) Connection resilient multi-factor authentication
US20220191034A1 (en) Technologies for trust protocol with immutable chain storage and invocation tracking
US11841961B2 (en) Management of computing secrets
US11153299B2 (en) Secure data transport using trusted identities
US11646878B2 (en) Distributing encrypted data objects with encryption information as metadata
CN117118640A (zh) 一种数据处理方法、装置、计算机设备以及可读存储介质
US9501658B1 (en) Avoiding file content reading using machine information
US20220376924A1 (en) Header for conveying trustful client address
US11177945B1 (en) Controlling access to encrypted data
US11146558B2 (en) Stateless multi-party authorization system in web applications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20921563

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.01.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20921563

Country of ref document: EP

Kind code of ref document: A1