[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108696540A - A kind of authorizing secure system and its authorization method - Google Patents

A kind of authorizing secure system and its authorization method Download PDF

Info

Publication number
CN108696540A
CN108696540A CN201810788056.6A CN201810788056A CN108696540A CN 108696540 A CN108696540 A CN 108696540A CN 201810788056 A CN201810788056 A CN 201810788056A CN 108696540 A CN108696540 A CN 108696540A
Authority
CN
China
Prior art keywords
user
level
address
user name
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810788056.6A
Other languages
Chinese (zh)
Inventor
郑美惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Cloud Image Information Technology Co Ltd
Original Assignee
Anhui Cloud Image Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Cloud Image Information Technology Co Ltd filed Critical Anhui Cloud Image Information Technology Co Ltd
Priority to CN201810788056.6A priority Critical patent/CN108696540A/en
Publication of CN108696540A publication Critical patent/CN108696540A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of authorizing secure systems, it is related to network safety filed, including authorizing protection center, the mandate protection center includes command reception end, protect database and certification terminal, described instruction receiving terminal receives the instruction sended over, the protection database is used for storing accessive IP lists and visitor's user name, the certification terminal includes IP verifying ends and identity end, this kind of authorizing secure system can inquire the IP address of visitor, and according to the user name of the list of the IP address of preservation and visitor to determine whether its entrance can be authorized, it effectively prevents extraneous device from entering in database and checks change data.It ensure that the safety of database.

Description

A kind of authorizing secure system and its authorization method
Technical field
The present invention relates to network safety fileds, and in particular to a kind of authorizing secure system and its authorization method.
Background technology:
Network makes the problem of many things become portable, were ignorant of before many be in the world able to know that as long as online is looked into, Be also convenient for people link up, but network bring people it is portable while there is also many security risks, be stored in computer Vital document be accidentally possible to be stolen, distort, it is heavy then be likely to cause huge property loss, in order to reduce this The generation of kind thing, many enterprises are all provided with security firewall, prevent stranger from arbitrarily entering database.
Such as discloses one kind application No. is CN200680015644.1 and in digital content distribution system protect digital content With the authoring system and method for user's integrality.At least one Subscriber Management System is configured as keeping user identification data.With Family authoring system is configured as discretely keeping user authorization data with user identification data.The Subscriber Management System is configured as Identify the user in the request for the extraction digital content for receiving user, and generate an order to SAS Subscriber Authorization System with Authorized user accesses requested digital content.The SAS Subscriber Authorization System is configured as examining when receiving such order and use Family accesses the mandate of requested digital content, if be examined, sends to and the relevant system users of the user One, end is authorized to access requested digital content, but this method does not limit IP address, and there are certain leakages Hole.
Such as application No. is CN201610095765.7 to disclose a kind of office block visitor dynamic authorization system, including integrated Control centre's module, database module, single current gate;It is at least one dynamic with the office block visitor for outer visitor The information exchange medium of state authoring system, the access terminal device of access information, authorization message;It is at least one to be used for another The access of outer visitor and the information exchange medium, access information, authorization message of the office block visitor dynamic authorization system Mobile terminal;At least one interactive interface for portion room personnel, realize the presentation of information of outer visitor, Authorized operation it is interviewed Mobile terminal.The present invention has the characteristics that intelligent reliable, simple operation, is moved in real time by the outer visitor to office block State empowerment management realizes that outer visitor passes in and out stringent monitoring and the related data record of office block, ensure that office block work Normal office work, personal safety, the property safety of personnel, but this method does not limit IP address, there are certain leakages Hole.
Invention content
The purpose of the present invention is to provide a kind of authorizing secure system and its authorization methods, to solve to cause in the prior art The above-mentioned defects.
A kind of authorizing secure system, including protection center is authorized, the mandate protection center includes command reception end, protection Database and certification terminal, described instruction receiving terminal receive the instruction sended over, and the protection database is for storing and can visit Ask IP lists and visitor's user name, the certification terminal includes IP verifying ends and identity end,
S1:Command reception termination receives instruction, and whether decision instruction is effective, is then rejected if illegal command, if Command information is then sent to certification terminal by effective instruction;
S2:The IP address and user name of certification terminal extraction instruction transmitting terminal;
S3:Certification terminal matches IP address with the IP address in protection database, can be visited if IP address is present in It asks in IP lists, then carries out in next step, otherwise the request is rejected;
S4:Certification terminal-pair by IP address carry out user name matching, if there are the user name in visitor's user name, Then be certification by enter in next step, otherwise send " user name mistake please be re-entered " display interface;
S5:Certification is that the user provides identity after passing through, and enters corresponding interface according to identity grade, and to note Lower access record.
Preferably, the addressable IP lists include that level-one access name mono-, di- grade accesses list, three-level accesses list, institute It includes that level-one accesses user, second-level access user, three-level access user to state visitor's user name.
Preferably, the level-one access list is corresponding with level-one access user, second-level access list and second-level access user Corresponding, it is corresponding with three-level access user that three-level accesses list.
Preferably, the level-one access user, second-level access user, three-level access user and possess different identity.
Preferably, the level-one access user, second-level access user, three-level access user and possess different access rights.
Preferably, the user name and IP address can be drawn in visit when user name is continuously wrong three times in the step S4 It asks in blacklist.
Preferably, upper identity can be just added when IP address and access username are in the same rank in the step S5 Mark, is otherwise considered as unauthorized access.
The advantage of the invention is that:This kind of authorizing secure system can inquire the IP address of visitor, and root According to the list of the IP address of preservation and the user name of visitor to determine whether its entrance can be authorized, external set effectively is prevented Change data are checked for entering in database, ensure that the safety of database.
Description of the drawings
Fig. 1 is flow chart of the method for the present invention.
Specific implementation mode
To make the technical means, the creative features, the aims and the efficiencies achieved by the present invention be easy to understand, with reference to Specific implementation mode, the present invention is further explained.
Embodiment 1
As shown in Figure 1, a kind of authorizing secure system, including protection center is authorized, the mandate protection center includes instruction Receiving terminal, protection database and certification terminal, described instruction receiving terminal receive the instruction sended over, and the protection database is used In storing accessive IP lists and visitor's user name, the certification terminal includes IP verifying ends and identity end,
S1:Command reception termination receives instruction, and whether decision instruction is effective, is then rejected if illegal command, if Command information is then sent to certification terminal by effective instruction;
S2:The IP address and user name of certification terminal extraction instruction transmitting terminal;
S3:Certification terminal matches IP address with the IP address in protection database, can be visited if IP address is present in It asks in IP lists, then carries out in next step, otherwise the request is rejected;
S4:Certification terminal-pair by IP address carry out user name matching, if there are the user name in visitor's user name, Then be certification by enter in next step, otherwise send " user name mistake please be re-entered " display interface;
S5:Certification is that the user provides identity after passing through, and enters corresponding interface according to identity grade, and to note Lower access record.
It is worth noting that, visitor's user list includes special user's list and ordinary user's list.
In the present embodiment, special user's list can skip matching and enter directly into database, and obtain The highest permission that database uses.
In the present embodiment, ordinary user's list is through overmatching, and can just enter database after sticking identity In, and obtain corresponding permission according to the identity grade of distribution.
It in the present embodiment, can be by the user name and IP address in the step S4 when user name is continuously wrong three times It draws in and accesses in blacklist.
In addition, upper identity mark can be just added in the step S5 when IP address and access username are in the same rank Know, is otherwise considered as unauthorized access.
Embodiment 2
As shown in Figure 1, a kind of authorizing secure system, including protection center is authorized, the mandate protection center includes instruction Receiving terminal, protection database and certification terminal, described instruction receiving terminal receive the instruction sended over, and the protection database is used In storing accessive IP lists and visitor's user name, the certification terminal includes IP verifying ends and identity end,
S1:Command reception termination receives instruction, and whether decision instruction is effective, is then rejected if illegal command, if Command information is then sent to certification terminal by effective instruction;
S2:The IP address and user name of certification terminal extraction instruction transmitting terminal;
S3:Certification terminal matches IP address with the IP address in protection database, can be visited if IP address is present in It asks in IP lists, then carries out in next step, otherwise the request is rejected;
S4:Certification terminal-pair by IP address carry out user name matching, if there are the user name in visitor's user name, Then be certification by enter in next step, otherwise send " user name mistake please be re-entered " display interface;
S5:Certification is that the user provides identity after passing through, and enters corresponding interface according to identity grade, and to note Lower access record.
It is worth noting that, the addressable IP lists, which include level-one access name mono-, di- grade, accesses list, three-level access name Single, visitor's user name includes that level-one accesses user, second-level access user, three-level access user.
In the present embodiment, the level-one access list is corresponding with level-one access user, and second-level access list is visited with two level Ask that user corresponds to, it is corresponding with three-level access user that three-level accesses list.
In the present embodiment, the level-one access user, second-level access user, three-level access user and possess different identity Mark.
In the present embodiment, the level-one access user, second-level access user, three-level access user and possess different access Permission.
It in the present embodiment, can be by the user name and IP address in the step S4 when user name is continuously wrong three times It draws in and accesses in blacklist.
In addition, upper identity mark can be just added in the step S5 when IP address and access username are in the same rank Know, is otherwise considered as unauthorized access.
Based on above-mentioned, this kind of authorizing secure system can inquire the IP address of visitor, and according to preservation The list of IP address and the user name of visitor effectively prevent extraneous device from entering number to determine whether its entrance can be authorized According to change data are checked in library, the safety of database ensure that.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature Case is realized.Therefore, embodiment disclosed above, all things considered are all merely illustrative, not the only.Institute Have within the scope of the present invention or is included in the invention in the change being equal in the scope of the present invention.

Claims (7)

1. a kind of authorizing secure system, including protection center is authorized, the mandate protection center includes command reception end, protection number According to library and certification terminal, which is characterized in that described instruction receiving terminal receives the instruction sended over, and the protection database is used for Storing accessive IP lists and visitor's user name, the certification terminal include IP verifying ends and identity end, the mandate The authorization method of security system includes the following steps:
S1:Command reception termination receives instruction, and whether decision instruction is effective, is then rejected if illegal command, if effective Command information is then sent to certification terminal by instruction;
S2:The IP address and user name of certification terminal extraction instruction transmitting terminal;
S3:Certification terminal matches IP address with the IP address in protection database, if IP address is present in addressable IP In list, then carries out in next step, otherwise the request is rejected;
S4:Certification terminal-pair by IP address carry out user name matching, if there are the user name in visitor's user name, for Certification sends the display interface of " user name mistake please be re-entered " by entering in next step;
S5:Certification is that the user provides identity after passing through, and enters corresponding interface according to identity grade, and visit writing down Ask record.
2. a kind of authorizing secure system according to claim 1, it is characterised in that:The addressable IP lists include level-one Access name mono-, di- grade accesses list, three-level accesses list, and visitor's user name includes that level-one accesses user, second-level access User, three-level access user.
3. a kind of authorizing secure system according to claim 2, it is characterised in that:The level-one accesses list and is visited with level-one Ask that user corresponds to, second-level access list is corresponding with second-level access user, and it is corresponding with three-level access user that three-level accesses list.
4. a kind of authorizing secure system according to claim 3, it is characterised in that:The level-one accesses user, two level is visited Ask that user, three-level access user and possess different identity.
5. a kind of authorizing secure system according to claim 3, it is characterised in that:The level-one accesses user, two level is visited Ask that user, three-level access user and possess different access rights.
6. a kind of authorizing secure system according to claim 1, it is characterised in that:When user name is continuous in the step S4 When wrong three times, the user name and IP address can be drawn in and be accessed in blacklist.
7. a kind of authorizing secure system according to claim 1, it is characterised in that:When IP address and visit in the step S5 It asks that user name can just be added upper identity in the same rank, is otherwise considered as unauthorized access.
CN201810788056.6A 2018-07-18 2018-07-18 A kind of authorizing secure system and its authorization method Pending CN108696540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810788056.6A CN108696540A (en) 2018-07-18 2018-07-18 A kind of authorizing secure system and its authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810788056.6A CN108696540A (en) 2018-07-18 2018-07-18 A kind of authorizing secure system and its authorization method

Publications (1)

Publication Number Publication Date
CN108696540A true CN108696540A (en) 2018-10-23

Family

ID=63850724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810788056.6A Pending CN108696540A (en) 2018-07-18 2018-07-18 A kind of authorizing secure system and its authorization method

Country Status (1)

Country Link
CN (1) CN108696540A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861982A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 A kind of implementation method and device of authentication
CN111079110A (en) * 2019-11-27 2020-04-28 国网辽宁省电力有限公司电力科学研究院 Power system network security protection method, system and device based on identity recognition
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267339A (en) * 2008-02-28 2008-09-17 华为技术有限公司 User management method and device
US20120167180A1 (en) * 2010-12-22 2012-06-28 Hon Hai Precision Industry Co., Ltd. Cloud server and access management method
CN105512569A (en) * 2015-12-17 2016-04-20 浪潮电子信息产业股份有限公司 Database security reinforcing method and device
CN107360150A (en) * 2017-07-06 2017-11-17 天脉聚源(北京)传媒科技有限公司 A kind of method and device of intelligent logging-on
CN108289098A (en) * 2018-01-12 2018-07-17 百度在线网络技术(北京)有限公司 Right management method and device, server, the medium of distributed file system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267339A (en) * 2008-02-28 2008-09-17 华为技术有限公司 User management method and device
US20120167180A1 (en) * 2010-12-22 2012-06-28 Hon Hai Precision Industry Co., Ltd. Cloud server and access management method
CN105512569A (en) * 2015-12-17 2016-04-20 浪潮电子信息产业股份有限公司 Database security reinforcing method and device
CN107360150A (en) * 2017-07-06 2017-11-17 天脉聚源(北京)传媒科技有限公司 A kind of method and device of intelligent logging-on
CN108289098A (en) * 2018-01-12 2018-07-17 百度在线网络技术(北京)有限公司 Right management method and device, server, the medium of distributed file system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861982A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 A kind of implementation method and device of authentication
CN111079110A (en) * 2019-11-27 2020-04-28 国网辽宁省电力有限公司电力科学研究院 Power system network security protection method, system and device based on identity recognition
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data
CN114640485B (en) * 2020-12-01 2024-04-09 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data

Similar Documents

Publication Publication Date Title
CN104158824B (en) Genuine cyber identification authentication method and system
CN104364790B (en) system and method for implementing multi-factor authentication
CN104184705B (en) Verification method, device, server, subscriber data center and system
CN108696540A (en) A kind of authorizing secure system and its authorization method
US20160182565A1 (en) Location-based network security
CN103731413B (en) A kind of method for handling abnormal login
CN104660562A (en) Method, related device and system for information viewing
CN109005161A (en) A kind of data safety monitoring system and its access monitoring method
CN107026825A (en) A kind of method and system for accessing big data system
US9635017B2 (en) Computer network security management system and method
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN107770192A (en) Identity authentication method and computer-readable recording medium in multisystem
CN106778138A (en) The control method and device of software license limit
CN107454064A (en) A kind of visitor's authentication method and system based on public number
US20120021721A1 (en) Session-controlled-access of client data by support personnel
CN113542201A (en) Access control method and device for Internet service
CN112581103A (en) Safety online conference management method
CN105162763A (en) Method and device for processing communication data
CN113221180A (en) Database security access system and method
CN114244568B (en) Security access control method, device and equipment based on terminal access behavior
CN105847287A (en) Resource access control method based on community local area network and system based on community local area network
CN106941504A (en) A kind of cloud management authority control method and system
CN108270798B (en) Mobile terminal equipment safety management system
CN114363069A (en) Data management system for guaranteeing information network security of colleges and universities
KR20000063739A (en) System and method for monitoring fraudulent use of id and media for storing program source thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181023