CN109617926A - Control method, device and the storage medium of service authority - Google Patents
Control method, device and the storage medium of service authority Download PDFInfo
- Publication number
- CN109617926A CN109617926A CN201910088879.2A CN201910088879A CN109617926A CN 109617926 A CN109617926 A CN 109617926A CN 201910088879 A CN201910088879 A CN 201910088879A CN 109617926 A CN109617926 A CN 109617926A
- Authority
- CN
- China
- Prior art keywords
- token
- service
- service authority
- authority
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of control method of service authority, the control method of the service authority obtains the corresponding token information of the operation requests, target service and user information the following steps are included: in the business operation request for receiving terminal transmission;When the token information is effective, the corresponding target roles type of the user information is obtained;Obtain the corresponding service authority of the target roles type;In service authority permission corresponding comprising the target service, the corresponding data of the target service are obtained, the data are sent to the terminal.The invention also discloses the control device of service authority and storage mediums.Only need to be the corresponding character types of user configuration when carrying out authority configuration since client obtains service authority according to character types, without to each with permission is separately configured per family, it is easy to operate.
Description
Technical field
The present invention relates to the control method of the communications field more particularly to service authority, device and storage mediums.
Background technique
With the webization of software, the business of more and more enterprises carries out service management by the software systems of webization,
In order to guarantee the safety of business data, need to carry out authority configuration to the various businesses in software systems.
Currently, needing in the business operation progress authority configuration to enterprise to each each use logged in
Family carries out authority configuration respectively, cumbersome.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill
Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of control method of service authority, device and storage mediums, it is intended to solve
It certainly needs to carry out authority configuration, cumbersome technical problem respectively to each each user logged in.
To achieve the above object, the present invention provides a kind of control method of service authority, the controlling party of the service authority
Method the following steps are included:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained
Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained
According to the data are sent to the terminal.
Preferably, described in the business operation request for receiving terminal transmission, obtain the corresponding order of the operation requests
After the step of board information, target service and user information, further includes:
When there is token matched with the token information, determine that the token information is effective.
Preferably, the control method of the service authority further include:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, obtain the corresponding user information of the logging request and
The physical address of the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.
Preferably, described when the verification information is matched with the verification information prestored, it is corresponding to obtain the logging request
User information and the terminal physical address, after the step of generating token according to the user information and physical address,
Further include:
When the user information has been associated with token, the user information correlation is updated using the token of the generation
Token;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
Preferably, the control method of the service authority further include:
When not receiving the corresponding access request of the user information in preset duration, the user information correlation is deleted
Token.
Preferably, described in service authority permission corresponding comprising the target service, obtain the target industry
The data of business, the step of data are sent to the terminal include:
In service authority permission corresponding comprising the target service, the target is obtained from service database
The corresponding data of business;
The data are sent to the terminal.
In addition, to achieve the above object, the present invention also provides a kind of control device of service authority, the service authority
Control device includes: memory, processor and is stored in the operational authority that can be run on the memory and on the processor
The control program of limit realizes as above described in any item business when the control program of the service authority is executed by the processor
The step of control method of permission.
In addition, to achieve the above object, the present invention also provides a kind of storage medium, being stored with business on the storage medium
The control program of permission realizes as above described in any item operational authorities when the control program of the service authority is executed by processor
The step of control method of limit.
Control method, device and the storage medium for a kind of service authority that the embodiment of the present invention proposes, server are receiving
When the business operation sent to terminal is requested, the corresponding token information of the operation requests, target service and user information are obtained,
When the token information is effective, the corresponding target roles type of the user information is obtained, the target roles type is obtained
Corresponding service authority obtains the target service pair in service authority permission corresponding comprising the target service
The data are sent to the terminal by the data answered.Since client obtains service authority according to character types, permission is being carried out
Only need to be user configuration corresponding character types when configuration, without to each with permission, operation side are separately configured per family
Just.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the control method first embodiment of service authority of the present invention;
Fig. 3 is the flow diagram of the control method second embodiment of service authority of the present invention;
Fig. 4 is the flow diagram of the control method 3rd embodiment of service authority of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained
Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained
According to the data are sent to the terminal.
It is cumbersome due to, needing to carry out authority configuration respectively to each each user logged in the prior art.
The present invention provides a solution, since client obtains service authority according to character types, matches carrying out permission
Only need to be user configuration corresponding character types when setting, without to each with permission is separately configured per family, it is easy to operate.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, network interface 1004, user interface
1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components.
User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface
1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects
Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe the control program of module, Subscriber Interface Module SIM and service authority.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, carries out with background server
Data communication;User interface 1003 is mainly used for connecting client (user terminal), carries out data communication with client;And processor
1001 can be used for calling the control program of the service authority stored in memory 1005, and execute following operation:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained
Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained
According to the data are sent to the terminal.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold
The following operation of row:
When there is token matched with the token information, determine that the token information is effective.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold
The following operation of row:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, obtain the corresponding user information of the logging request and
The physical address of the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.Further,
Processor 1001 can call the control program of the service authority stored in memory 1005, also execute following operation:
When the user information has been associated with token, the user information correlation is updated using the token of the generation
Token;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold
The following operation of row:
When not receiving the corresponding access request of the user information in preset duration, the user information correlation is deleted
Token.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold
The following operation of row:
In service authority permission corresponding comprising the target service, the target is obtained from service database
The corresponding data of business;
The data are sent to the terminal.
According to above scheme, server obtains the operation requests in the business operation request for receiving terminal transmission
It is corresponding to obtain the user information when the token information is effective for corresponding token information, target service and user information
Target roles type obtains the corresponding service authority of the target roles type, includes the target industry in the service authority
When corresponding permission of being engaged in, the corresponding data of the target service are obtained, the data are sent to the terminal.Due to client root
Service authority is obtained according to character types, only need to be the corresponding character types of user configuration when carrying out authority configuration, be not necessarily to
It is easy to operate to each with permission is separately configured per family.
It is the flow diagram of the control method first embodiment of service authority of the present invention, the business referring to Fig. 2, Fig. 2
The control method of permission includes:
Step S10 obtains the corresponding token letter of the operation requests in the business operation request for receiving terminal transmission
Breath, target service and user information;
The control method of service authority provided by the invention is mainly used for permission control field, particularly for different role
User carries out service authority control when business operation.The terminal that the control method of service authority provided by the invention is related to includes
But be not limited to mobile phone, tablet computer and computer etc., relevant application system is pre-loaded in the terminal, including but not limited to
APP or Web page system etc..
After terminal login system, when needing to carry out business operation, corresponding business operation is hit based on system page millet cake, to
Server sends business operation request.When terminal to server sends business operation request, which carries token information, mesh
Mark business (i.e. the business of terminal request operation) i.e. current whole user information, wherein when the token information is that terminal logs in
It is generated by server and feeds back to terminal.When server receives the business operation request of terminal transmission, obtains the operation and ask
Ask corresponding token information, target service and user information.
In the present invention, the user information includes the account information of user and the character types of user, the character types
It can be configured according to actual needs, for example, in dress enterprise management system, the character types such as settable administrative staff, designer.
And different character types are configured with different permissions, for example, the administrative staff can be configured to root user, administrative staff's
Service authority include can create the character types of child user (such as designer etc.), and the settable user type from user for
Service authority;The service authority of designer includes that the service authorities such as can create, modify to self-designed scheme.Role
The corresponding relationship of type and service authority is stored in the database of server.When creating new user, need to carry out new user
When authority configuration, only it need to possess the corresponding business of the character types to the corresponding character types of new user setting, the new user
Permission.
Step S20 obtains the corresponding target roles type of the user information when the token information is effective;
After server obtains the corresponding token information of the operation requests, target service and user information, institute is first determined whether
Whether effective state token information, when the token information is effective, then the terminal is in logging state.Login authentication passes through,
Server, which is let pass, carries out next step operation, carries out Authority Verification, obtains the corresponding target roles type of the user information.It logs in
State is judged by token information, and when server determines that the token information is effective, then present terminal, which is in, logs in shape
State, when the token information is invalid, then present terminal is in and is not logged in state.Whether token information, which effectively judges, specifically may be used
Are as follows: after server gets the token information, inquire database in the presence or absence of with the matched token of the token information, when
When in the presence of token matched with the token information, determine that the token information is effective, when be not present and the token information
When the token matched, then determine that the token information is invalid.
When determining that the token information is invalid, illustrates that present terminal is in and be not logged in state, then server is anti-to terminal
Error message is presented, to remind user terminal to be currently at the state of being not logged in;And login interface is sent to terminal, so that terminal jumps
To login interface.When determining that the token information is effective, illustrating that present terminal is in logging state, then server is let pass, into
The permission of row next step judges that server obtains the corresponding target roles type of the user information.
Step S30 obtains the corresponding service authority of the target roles type;
After server gets the corresponding target roles type of the user information, further according to being stored in database
The corresponding relationship of character types and service authority obtains the corresponding service authority of the target roles.
Step S40 obtains the target service pair in service authority permission corresponding comprising the target service
The data are sent to the terminal by the data answered.
Then, server judge the corresponding service authority of the target roles whether include terminal request target service pair
The permission answered then is said when the corresponding permission of the target service that the corresponding service authority of the target roles includes terminal request
The user that bright terminal logs in has the operating right of the target service, and Authority Verification passes through, and server, which is let pass, to be entered in next step
Operation, obtains the corresponding data of the target service, and the data are sent to the terminal, for described from database
Terminal is shown.When the corresponding service authority of the target roles does not include the corresponding permission of target service of terminal request
When, illustrate that the user that terminal logs in does not have the corresponding operating right of the target service, server haves no right to grasp to the feedback
The prompting message of work.
Technical solution provided in this embodiment obtains the corresponding token information of the operation requests, target service and user
Information obtains the corresponding target roles type of the user information, obtains the target roles when the token information is effective
The corresponding service authority of type obtains the target industry in service authority permission corresponding comprising the target service
It is engaged in corresponding data, the data is sent to the terminal.Since client obtains service authority according to character types, carrying out
It only need to be user configuration corresponding character types when authority configuration, without, with permission is separately configured per family, being grasped to each
Facilitate.
It further, is the flow diagram of the control method first embodiment of service authority of the present invention referring to Fig. 3, Fig. 3,
Based on first embodiment, the control method of the service authority further include:
Step S50 when receiving the logging request of terminal, obtains the corresponding verification information of the logging request;
Step S60 obtains the corresponding use of the logging request when the verification information is matched with the verification information prestored
The physical address of family information and the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token are sent to the terminal by step S70.
In the present embodiment, when terminal logs in, the address of user information and terminal that server is logged according to terminal, which generates, to be enabled
Board, the token have validity period, and before the deadline, terminal can access server based on token, test without inputting login again
Demonstrate,prove information.
Specifically, when server receives the logging request of terminal, the corresponding verification information of the logging request, example are obtained
Such as the user account and password of login, then judges whether the verification information is correct, that is, judge the verification information and prestore
Verification information whether match, when the verification information is matched with the verification information prestored, server obtains the login and asks
The physical address of corresponding user information and the terminal is sought, is then generated and is enabled according to the user information and the physical address
Board.For example, encryption and combination terminal can be carried out by Message Digest 55 (Message-Digest Algorithm, MD5)
Location generates, to guarantee the unicity of token.After generating token, server stores token and user information correlation, and will be described
Token is sent to terminal, for terminal storage.When subsequent terminal initiates access request and business operation request, no longer needs to input and test
Information is demonstrate,proved, and can directly be verified by token, the specific same first embodiment of verification mode, details are not described herein.Wherein,
The token is interim token, is provided with validity period, and when being more than validity period, the token is deleted/destroyed to server, when token pin
After ruining, i.e. there is no the matched token of token information carried in terminal request, then orders entrained by terminal request in server
Board information is invalid, determines that terminal is in and is not logged in state, needs to re-enter verification information login.
In order to guarantee the safety of user account, the limitation that a settable user information can only log in a terminal
Condition, when other terminals are by the user information login service device, the newly-generated token of server by utilizing updates the use
The token of family information association.Specifically, server is stepped on described in acquisition when the verification information is matched with the verification information prestored
The physical address of corresponding user information and the terminal is requested in record, is generated and is enabled according to the user information and the physical address
Bridge queen, further judges whether the user information is associated with token, when the user information correlation has token, using described
The token of generation updates the token of the user information correlation, so that it is guaranteed that a user information same time can only be an end
It is logged on end, guarantees the safety of user account.When the user information is not associated token, server is then directly by the order
Board and the user information correlation store.Meanwhile the token is sent to the terminal by server.
Further, user after login, may exist and forget the case where logging off, when user forgets to log off
There are biggish security risks.Therefore, in the present embodiment, it is corresponding that server does not receive the user information in preset duration
Access request when, delete the token of the user information correlation.When to forget to log off after the user logs, continue not
When accessing duration and being more than preset duration, the token failure stored in terminal, terminal needs access or when business operations, need
Again it logs in, has further ensured the account safety of user.It is understood that the preset duration can according to the actual situation certainly
Row setting, is not particularly limited herein.
In the present embodiment, when server receives the logging request of terminal, the corresponding verifying letter of the logging request is obtained
Breath obtains the corresponding user information of the logging request and described when the verification information is matched with the verification information prestored
The physical address of terminal generates token according to the user information and the physical address, the token and the user is believed
Associated storage is ceased, and the token is sent to the terminal.So that terminal accesses server when token is effective again
It is easy to operate without validation information.
It further, is the flow diagram of the control method 3rd embodiment of service authority of the present invention referring to Fig. 4, Fig. 4,
Based on first or second embodiments, the refinement step of the step S40 includes:
Step S41 is obtained from service database in service authority permission corresponding comprising the target service
The corresponding data of the target service;
The data are sent to the terminal by step S42.
In the present embodiment, verification information data in system (such as login authentication information, character types, token, role class
Type and the corresponding relationship of service authority etc.) and the corresponding data of business operation stored respectively with different databases.Storage verifying
Log type, Key-Value database, such as Redis database can be used in the verification information database of information;Storage service operation
Relevant database, such as mySQL database can be used in the service database of corresponding data.
Server obtains the corresponding token letter of the operation requests in the business operation request for receiving terminal transmission
Breath, target service and user information;Then inquiring and authenticating information database, whether effective, described if verifying the token information
When token information is effective, determines that terminal is in and step on state, login authentication passes through;Then the corresponding target of the user information is obtained
Character types obtain the corresponding service authority of the target roles type, include the target service pair in the service authority
When the permission answered, determine that operating right of the user with the target service that terminal logs in, Authority Verification pass through.Work as login
When verifying and Authority Verification pass through, server ability query traffic data library obtains the corresponding data of the target service, then
The data are sent to the terminal.When login authentication or Authority Verification are obstructed out-of-date, server is directly fed back to terminal
Error message, without query traffic data library.
Verification information data and business datum are utilized respectively verification information database by technical solution provided in this embodiment
It is stored with service database, server only when login authentication and Authority Verification pass through, is just obtained from service database
The data are sent to the terminal by the corresponding data of the target service.To reduce the inquiry time of service database
Number, improves the operational efficiency of program.
In addition, to achieve the above object, the embodiment of the present invention also provides a kind of control device of service authority, the business
The control device of permission includes: memory, processor and is stored on the memory and can run on the processor
The control program of service authority, the control program of the service authority realize any embodiment as above when being executed by the processor
The step of control method of the service authority.
In addition, to achieve the above object, the embodiment of the present invention also provides a kind of storage medium, which is characterized in that described to deposit
It is stored with the control program of service authority on storage media, is realized when the control program of the service authority is executed by processor as above
The step of control method of service authority described in any embodiment.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (8)
1. a kind of control method of service authority, which is characterized in that the control method of the service authority the following steps are included:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target service are obtained
And user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding data of the target service are obtained, it will
The data are sent to the terminal.
2. the control method of service authority as described in claim 1, which is characterized in that described in the industry for receiving terminal transmission
When operation requests of being engaged in, after the step of obtaining the corresponding token information of the operation requests, target service and user information, also wrap
It includes:
When there is token matched with the token information, determine that the token information is effective.
3. the control method of service authority as described in claim 1, which is characterized in that the control method of the service authority is also
Include:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, the corresponding user information of the logging request and described is obtained
The physical address of terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.
4. the control method of service authority as claimed in claim 3, which is characterized in that described by the token and the user
Information association storage, and the step of token is sent to the terminal includes:
When the user information has been associated with token, the order of the user information correlation is updated using the token of the generation
Board;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
5. the control method of service authority as described in any one of claims 1-3, which is characterized in that the control of the service authority
Method processed further include:
When not receiving the corresponding access request of the user information in preset duration, the order of the user information correlation is deleted
Board.
6. the control method of service authority as described in any one of claims 1-3, which is characterized in that described in the operational authority
When limiting permission corresponding comprising the target service, the data of the target service are obtained, the data are sent to the end
The step of end includes:
In service authority permission corresponding comprising the target service, the target service is obtained from service database
Corresponding data;
The data are sent to the terminal.
7. a kind of control device of service authority, which is characterized in that the control device of the service authority includes: memory, place
Reason device and the control program for being stored in the service authority that can be run on the memory and on the processor, the operational authority
The control such as service authority described in any one of claims 1 to 6 is realized when the control program of limit is executed by the processor
The step of method.
8. a kind of storage medium, which is characterized in that be stored with the control program of service authority, the business on the storage medium
The controlling party such as service authority described in any one of claims 1 to 6 is realized when the control program of permission is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088879.2A CN109617926A (en) | 2019-01-28 | 2019-01-28 | Control method, device and the storage medium of service authority |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088879.2A CN109617926A (en) | 2019-01-28 | 2019-01-28 | Control method, device and the storage medium of service authority |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109617926A true CN109617926A (en) | 2019-04-12 |
Family
ID=66021427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910088879.2A Pending CN109617926A (en) | 2019-01-28 | 2019-01-28 | Control method, device and the storage medium of service authority |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109617926A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784457A (en) * | 2019-10-17 | 2020-02-11 | 中诚信征信有限公司 | Service access method and device |
CN110968568A (en) * | 2019-12-04 | 2020-04-07 | 常熟理工学院 | Database management system |
CN112182530A (en) * | 2020-10-14 | 2021-01-05 | 北京安石科技有限公司 | Method and device for controlling operating system permission through master control system |
CN112231653A (en) * | 2020-10-15 | 2021-01-15 | 北京明略昭辉科技有限公司 | Permission determination method and device, storage medium and electronic device |
CN112364381A (en) * | 2020-11-25 | 2021-02-12 | 广州三叠纪元智能科技有限公司 | Authority management method, electronic box, server and storage medium |
CN112464212A (en) * | 2020-03-30 | 2021-03-09 | 上海汇招信息技术有限公司 | Data authority control reconstruction method based on mature complex service system |
CN112633970A (en) * | 2020-12-16 | 2021-04-09 | 海通安恒科技股份有限公司 | Intelligent purchasing platform |
CN113158154A (en) * | 2020-01-07 | 2021-07-23 | 纬创资通股份有限公司 | Mobile device, verification terminal device and identity verification method |
CN113297629A (en) * | 2021-05-26 | 2021-08-24 | 杭州安恒信息技术股份有限公司 | Authentication method, device, system, electronic equipment and storage medium |
CN113958108A (en) * | 2020-11-25 | 2022-01-21 | 广州三叠纪元智能科技有限公司 | Electric box control method, electric box, server and storage medium |
WO2023185386A1 (en) * | 2022-03-28 | 2023-10-05 | 腾讯科技(深圳)有限公司 | Service data processing method and apparatus, device, storage medium and program product |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220289A (en) * | 2013-04-15 | 2013-07-24 | 北京京东尚科信息技术有限公司 | Resource verification system and resource verification method based on web application |
CN103312722A (en) * | 2013-07-04 | 2013-09-18 | 河北科技大学 | Control design method for fine-grained mandatory access |
US20150180872A1 (en) * | 2013-12-20 | 2015-06-25 | Cube, Co. | System and method for hierarchical resource permissions and role management in a multitenant environment |
CN105227315A (en) * | 2015-08-31 | 2016-01-06 | 青岛海尔智能家电科技有限公司 | A kind of Web application authentication method, server and system thereof |
CN105518642A (en) * | 2013-08-20 | 2016-04-20 | 三星电子株式会社 | System, apparatus, and method for sharing electronic device |
CN106302492A (en) * | 2016-08-23 | 2017-01-04 | 唐山新质点科技有限公司 | A kind of access control method and system |
CN107277038A (en) * | 2017-07-18 | 2017-10-20 | 北京微影时代科技有限公司 | Access control method, device and system |
CN107862198A (en) * | 2017-11-17 | 2018-03-30 | 浪潮软件股份有限公司 | One kind accesses verification method, system and client |
CN108667797A (en) * | 2017-03-28 | 2018-10-16 | 罗德施瓦兹两合股份有限公司 | System for sending audio and/or video data and the method accessed for authorizing secure |
CN109104412A (en) * | 2018-07-13 | 2018-12-28 | 万翼科技有限公司 | Account right management method, management system and computer readable storage medium |
-
2019
- 2019-01-28 CN CN201910088879.2A patent/CN109617926A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220289A (en) * | 2013-04-15 | 2013-07-24 | 北京京东尚科信息技术有限公司 | Resource verification system and resource verification method based on web application |
CN103312722A (en) * | 2013-07-04 | 2013-09-18 | 河北科技大学 | Control design method for fine-grained mandatory access |
CN105518642A (en) * | 2013-08-20 | 2016-04-20 | 三星电子株式会社 | System, apparatus, and method for sharing electronic device |
US20150180872A1 (en) * | 2013-12-20 | 2015-06-25 | Cube, Co. | System and method for hierarchical resource permissions and role management in a multitenant environment |
CN105227315A (en) * | 2015-08-31 | 2016-01-06 | 青岛海尔智能家电科技有限公司 | A kind of Web application authentication method, server and system thereof |
CN106302492A (en) * | 2016-08-23 | 2017-01-04 | 唐山新质点科技有限公司 | A kind of access control method and system |
CN108667797A (en) * | 2017-03-28 | 2018-10-16 | 罗德施瓦兹两合股份有限公司 | System for sending audio and/or video data and the method accessed for authorizing secure |
CN107277038A (en) * | 2017-07-18 | 2017-10-20 | 北京微影时代科技有限公司 | Access control method, device and system |
CN107862198A (en) * | 2017-11-17 | 2018-03-30 | 浪潮软件股份有限公司 | One kind accesses verification method, system and client |
CN109104412A (en) * | 2018-07-13 | 2018-12-28 | 万翼科技有限公司 | Account right management method, management system and computer readable storage medium |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110784457A (en) * | 2019-10-17 | 2020-02-11 | 中诚信征信有限公司 | Service access method and device |
CN110784457B (en) * | 2019-10-17 | 2022-08-19 | 中诚信征信有限公司 | Service access method and device |
CN110968568A (en) * | 2019-12-04 | 2020-04-07 | 常熟理工学院 | Database management system |
CN110968568B (en) * | 2019-12-04 | 2023-08-18 | 常熟理工学院 | Database management system |
CN113158154B (en) * | 2020-01-07 | 2024-06-04 | 纬创资通股份有限公司 | Mobile device, authentication terminal device, and authentication method |
CN113158154A (en) * | 2020-01-07 | 2021-07-23 | 纬创资通股份有限公司 | Mobile device, verification terminal device and identity verification method |
CN112464212A (en) * | 2020-03-30 | 2021-03-09 | 上海汇招信息技术有限公司 | Data authority control reconstruction method based on mature complex service system |
CN112182530A (en) * | 2020-10-14 | 2021-01-05 | 北京安石科技有限公司 | Method and device for controlling operating system permission through master control system |
CN112231653A (en) * | 2020-10-15 | 2021-01-15 | 北京明略昭辉科技有限公司 | Permission determination method and device, storage medium and electronic device |
CN113958108A (en) * | 2020-11-25 | 2022-01-21 | 广州三叠纪元智能科技有限公司 | Electric box control method, electric box, server and storage medium |
CN112364381A (en) * | 2020-11-25 | 2021-02-12 | 广州三叠纪元智能科技有限公司 | Authority management method, electronic box, server and storage medium |
CN112633970A (en) * | 2020-12-16 | 2021-04-09 | 海通安恒科技股份有限公司 | Intelligent purchasing platform |
CN113297629A (en) * | 2021-05-26 | 2021-08-24 | 杭州安恒信息技术股份有限公司 | Authentication method, device, system, electronic equipment and storage medium |
CN113297629B (en) * | 2021-05-26 | 2023-03-14 | 杭州安恒信息技术股份有限公司 | Authentication method, device, system, electronic equipment and storage medium |
WO2023185386A1 (en) * | 2022-03-28 | 2023-10-05 | 腾讯科技(深圳)有限公司 | Service data processing method and apparatus, device, storage medium and program product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109617926A (en) | Control method, device and the storage medium of service authority | |
US12045372B2 (en) | Securing access to confidential data using a blockchain ledger | |
US11727400B2 (en) | Telecommunication system and method for settling session transactions | |
CN111771194B (en) | System and method for generating and maintaining a non-variable digital conference record within a distributed network node | |
CN110516474B (en) | User information processing method and device in blockchain network, electronic equipment and storage medium | |
CN110569658B (en) | User information processing method and device based on blockchain network, electronic equipment and storage medium | |
KR102002509B1 (en) | Privite blockchain system including notarizing center and notarial method thereof | |
US7266702B2 (en) | Method and system for managing security material and services in a distributed database system | |
US7703142B1 (en) | Software license authorization system | |
CN111183426A (en) | System and method for block chain based notification | |
CN109670768A (en) | Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain | |
CN109194673A (en) | Authentication method, system, equipment and storage medium based on authorized user message | |
US20150248286A1 (en) | System and methods for remote maintenance in an electronic network with multiple clients | |
US20200082065A1 (en) | Context-based access controls | |
US9037849B2 (en) | System and method for managing network access based on a history of a certificate | |
KR102116235B1 (en) | Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network | |
TW201516733A (en) | System and method for verifying changes to UEFI authenticated variables | |
CN108259502A (en) | For obtaining the identification method of interface access rights, server-side and storage medium | |
CN110149328A (en) | Interface method for authenticating, device, equipment and computer readable storage medium | |
WO2019011187A1 (en) | Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account | |
CN107832602B (en) | Unified electronic seal system based on identification | |
CN111414612A (en) | Security protection method and device for operating system mirror image and electronic equipment | |
US11343107B2 (en) | System for method for secured logging of events | |
CN111178896B (en) | Bus taking payment method, device and storage medium | |
CN105379176A (en) | System and method for validating SCEP certificate enrollment requests |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Shop 1, self-made, 4 / F, commercial building 9, Meiju building materials City, north of Lvjing West Road, Shiwan Town, Chancheng District, Foshan City, Guangdong Province Applicant after: Guangdong taojia Building Decoration Engineering Co.,Ltd. Address before: Shop 1, self-made, 4 / F, commercial building 9, Meiju building materials City, north of Lvjing West Road, Shiwan Town, Chancheng District, Foshan City, Guangdong Province Applicant before: GUANGDONG TAOJIA TECHNOLOGY CO.,LTD. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190412 |
|
RJ01 | Rejection of invention patent application after publication |