[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109617926A - Control method, device and the storage medium of service authority - Google Patents

Control method, device and the storage medium of service authority Download PDF

Info

Publication number
CN109617926A
CN109617926A CN201910088879.2A CN201910088879A CN109617926A CN 109617926 A CN109617926 A CN 109617926A CN 201910088879 A CN201910088879 A CN 201910088879A CN 109617926 A CN109617926 A CN 109617926A
Authority
CN
China
Prior art keywords
token
service
service authority
authority
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910088879.2A
Other languages
Chinese (zh)
Inventor
梁波
陆翠婷
成红来
姚佳文
梅志锋
温志景
何玉龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Namoto Technology Co Ltd
Original Assignee
Guangdong Namoto Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Namoto Technology Co Ltd filed Critical Guangdong Namoto Technology Co Ltd
Priority to CN201910088879.2A priority Critical patent/CN109617926A/en
Publication of CN109617926A publication Critical patent/CN109617926A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of control method of service authority, the control method of the service authority obtains the corresponding token information of the operation requests, target service and user information the following steps are included: in the business operation request for receiving terminal transmission;When the token information is effective, the corresponding target roles type of the user information is obtained;Obtain the corresponding service authority of the target roles type;In service authority permission corresponding comprising the target service, the corresponding data of the target service are obtained, the data are sent to the terminal.The invention also discloses the control device of service authority and storage mediums.Only need to be the corresponding character types of user configuration when carrying out authority configuration since client obtains service authority according to character types, without to each with permission is separately configured per family, it is easy to operate.

Description

Control method, device and the storage medium of service authority
Technical field
The present invention relates to the control method of the communications field more particularly to service authority, device and storage mediums.
Background technique
With the webization of software, the business of more and more enterprises carries out service management by the software systems of webization, In order to guarantee the safety of business data, need to carry out authority configuration to the various businesses in software systems.
Currently, needing in the business operation progress authority configuration to enterprise to each each use logged in Family carries out authority configuration respectively, cumbersome.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of control method of service authority, device and storage mediums, it is intended to solve It certainly needs to carry out authority configuration, cumbersome technical problem respectively to each each user logged in.
To achieve the above object, the present invention provides a kind of control method of service authority, the controlling party of the service authority Method the following steps are included:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained According to the data are sent to the terminal.
Preferably, described in the business operation request for receiving terminal transmission, obtain the corresponding order of the operation requests After the step of board information, target service and user information, further includes:
When there is token matched with the token information, determine that the token information is effective.
Preferably, the control method of the service authority further include:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, obtain the corresponding user information of the logging request and The physical address of the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.
Preferably, described when the verification information is matched with the verification information prestored, it is corresponding to obtain the logging request User information and the terminal physical address, after the step of generating token according to the user information and physical address, Further include:
When the user information has been associated with token, the user information correlation is updated using the token of the generation Token;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
Preferably, the control method of the service authority further include:
When not receiving the corresponding access request of the user information in preset duration, the user information correlation is deleted Token.
Preferably, described in service authority permission corresponding comprising the target service, obtain the target industry The data of business, the step of data are sent to the terminal include:
In service authority permission corresponding comprising the target service, the target is obtained from service database The corresponding data of business;
The data are sent to the terminal.
In addition, to achieve the above object, the present invention also provides a kind of control device of service authority, the service authority Control device includes: memory, processor and is stored in the operational authority that can be run on the memory and on the processor The control program of limit realizes as above described in any item business when the control program of the service authority is executed by the processor The step of control method of permission.
In addition, to achieve the above object, the present invention also provides a kind of storage medium, being stored with business on the storage medium The control program of permission realizes as above described in any item operational authorities when the control program of the service authority is executed by processor The step of control method of limit.
Control method, device and the storage medium for a kind of service authority that the embodiment of the present invention proposes, server are receiving When the business operation sent to terminal is requested, the corresponding token information of the operation requests, target service and user information are obtained, When the token information is effective, the corresponding target roles type of the user information is obtained, the target roles type is obtained Corresponding service authority obtains the target service pair in service authority permission corresponding comprising the target service The data are sent to the terminal by the data answered.Since client obtains service authority according to character types, permission is being carried out Only need to be user configuration corresponding character types when configuration, without to each with permission, operation side are separately configured per family Just.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the control method first embodiment of service authority of the present invention;
Fig. 3 is the flow diagram of the control method second embodiment of service authority of the present invention;
Fig. 4 is the flow diagram of the control method 3rd embodiment of service authority of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained According to the data are sent to the terminal.
It is cumbersome due to, needing to carry out authority configuration respectively to each each user logged in the prior art.
The present invention provides a solution, since client obtains service authority according to character types, matches carrying out permission Only need to be user configuration corresponding character types when setting, without to each with permission is separately configured per family, it is easy to operate.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe the control program of module, Subscriber Interface Module SIM and service authority.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, carries out with background server Data communication;User interface 1003 is mainly used for connecting client (user terminal), carries out data communication with client;And processor 1001 can be used for calling the control program of the service authority stored in memory 1005, and execute following operation:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target are obtained Business and user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding number of the target service is obtained According to the data are sent to the terminal.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold The following operation of row:
When there is token matched with the token information, determine that the token information is effective.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold The following operation of row:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, obtain the corresponding user information of the logging request and The physical address of the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.Further, Processor 1001 can call the control program of the service authority stored in memory 1005, also execute following operation:
When the user information has been associated with token, the user information correlation is updated using the token of the generation Token;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold The following operation of row:
When not receiving the corresponding access request of the user information in preset duration, the user information correlation is deleted Token.
Further, processor 1001 can call the control program of the service authority stored in memory 1005, also hold The following operation of row:
In service authority permission corresponding comprising the target service, the target is obtained from service database The corresponding data of business;
The data are sent to the terminal.
According to above scheme, server obtains the operation requests in the business operation request for receiving terminal transmission It is corresponding to obtain the user information when the token information is effective for corresponding token information, target service and user information Target roles type obtains the corresponding service authority of the target roles type, includes the target industry in the service authority When corresponding permission of being engaged in, the corresponding data of the target service are obtained, the data are sent to the terminal.Due to client root Service authority is obtained according to character types, only need to be the corresponding character types of user configuration when carrying out authority configuration, be not necessarily to It is easy to operate to each with permission is separately configured per family.
It is the flow diagram of the control method first embodiment of service authority of the present invention, the business referring to Fig. 2, Fig. 2 The control method of permission includes:
Step S10 obtains the corresponding token letter of the operation requests in the business operation request for receiving terminal transmission Breath, target service and user information;
The control method of service authority provided by the invention is mainly used for permission control field, particularly for different role User carries out service authority control when business operation.The terminal that the control method of service authority provided by the invention is related to includes But be not limited to mobile phone, tablet computer and computer etc., relevant application system is pre-loaded in the terminal, including but not limited to APP or Web page system etc..
After terminal login system, when needing to carry out business operation, corresponding business operation is hit based on system page millet cake, to Server sends business operation request.When terminal to server sends business operation request, which carries token information, mesh Mark business (i.e. the business of terminal request operation) i.e. current whole user information, wherein when the token information is that terminal logs in It is generated by server and feeds back to terminal.When server receives the business operation request of terminal transmission, obtains the operation and ask Ask corresponding token information, target service and user information.
In the present invention, the user information includes the account information of user and the character types of user, the character types It can be configured according to actual needs, for example, in dress enterprise management system, the character types such as settable administrative staff, designer. And different character types are configured with different permissions, for example, the administrative staff can be configured to root user, administrative staff's Service authority include can create the character types of child user (such as designer etc.), and the settable user type from user for Service authority;The service authority of designer includes that the service authorities such as can create, modify to self-designed scheme.Role The corresponding relationship of type and service authority is stored in the database of server.When creating new user, need to carry out new user When authority configuration, only it need to possess the corresponding business of the character types to the corresponding character types of new user setting, the new user Permission.
Step S20 obtains the corresponding target roles type of the user information when the token information is effective;
After server obtains the corresponding token information of the operation requests, target service and user information, institute is first determined whether Whether effective state token information, when the token information is effective, then the terminal is in logging state.Login authentication passes through, Server, which is let pass, carries out next step operation, carries out Authority Verification, obtains the corresponding target roles type of the user information.It logs in State is judged by token information, and when server determines that the token information is effective, then present terminal, which is in, logs in shape State, when the token information is invalid, then present terminal is in and is not logged in state.Whether token information, which effectively judges, specifically may be used Are as follows: after server gets the token information, inquire database in the presence or absence of with the matched token of the token information, when When in the presence of token matched with the token information, determine that the token information is effective, when be not present and the token information When the token matched, then determine that the token information is invalid.
When determining that the token information is invalid, illustrates that present terminal is in and be not logged in state, then server is anti-to terminal Error message is presented, to remind user terminal to be currently at the state of being not logged in;And login interface is sent to terminal, so that terminal jumps To login interface.When determining that the token information is effective, illustrating that present terminal is in logging state, then server is let pass, into The permission of row next step judges that server obtains the corresponding target roles type of the user information.
Step S30 obtains the corresponding service authority of the target roles type;
After server gets the corresponding target roles type of the user information, further according to being stored in database The corresponding relationship of character types and service authority obtains the corresponding service authority of the target roles.
Step S40 obtains the target service pair in service authority permission corresponding comprising the target service The data are sent to the terminal by the data answered.
Then, server judge the corresponding service authority of the target roles whether include terminal request target service pair The permission answered then is said when the corresponding permission of the target service that the corresponding service authority of the target roles includes terminal request The user that bright terminal logs in has the operating right of the target service, and Authority Verification passes through, and server, which is let pass, to be entered in next step Operation, obtains the corresponding data of the target service, and the data are sent to the terminal, for described from database Terminal is shown.When the corresponding service authority of the target roles does not include the corresponding permission of target service of terminal request When, illustrate that the user that terminal logs in does not have the corresponding operating right of the target service, server haves no right to grasp to the feedback The prompting message of work.
Technical solution provided in this embodiment obtains the corresponding token information of the operation requests, target service and user Information obtains the corresponding target roles type of the user information, obtains the target roles when the token information is effective The corresponding service authority of type obtains the target industry in service authority permission corresponding comprising the target service It is engaged in corresponding data, the data is sent to the terminal.Since client obtains service authority according to character types, carrying out It only need to be user configuration corresponding character types when authority configuration, without, with permission is separately configured per family, being grasped to each Facilitate.
It further, is the flow diagram of the control method first embodiment of service authority of the present invention referring to Fig. 3, Fig. 3, Based on first embodiment, the control method of the service authority further include:
Step S50 when receiving the logging request of terminal, obtains the corresponding verification information of the logging request;
Step S60 obtains the corresponding use of the logging request when the verification information is matched with the verification information prestored The physical address of family information and the terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token are sent to the terminal by step S70.
In the present embodiment, when terminal logs in, the address of user information and terminal that server is logged according to terminal, which generates, to be enabled Board, the token have validity period, and before the deadline, terminal can access server based on token, test without inputting login again Demonstrate,prove information.
Specifically, when server receives the logging request of terminal, the corresponding verification information of the logging request, example are obtained Such as the user account and password of login, then judges whether the verification information is correct, that is, judge the verification information and prestore Verification information whether match, when the verification information is matched with the verification information prestored, server obtains the login and asks The physical address of corresponding user information and the terminal is sought, is then generated and is enabled according to the user information and the physical address Board.For example, encryption and combination terminal can be carried out by Message Digest 55 (Message-Digest Algorithm, MD5) Location generates, to guarantee the unicity of token.After generating token, server stores token and user information correlation, and will be described Token is sent to terminal, for terminal storage.When subsequent terminal initiates access request and business operation request, no longer needs to input and test Information is demonstrate,proved, and can directly be verified by token, the specific same first embodiment of verification mode, details are not described herein.Wherein, The token is interim token, is provided with validity period, and when being more than validity period, the token is deleted/destroyed to server, when token pin After ruining, i.e. there is no the matched token of token information carried in terminal request, then orders entrained by terminal request in server Board information is invalid, determines that terminal is in and is not logged in state, needs to re-enter verification information login.
In order to guarantee the safety of user account, the limitation that a settable user information can only log in a terminal Condition, when other terminals are by the user information login service device, the newly-generated token of server by utilizing updates the use The token of family information association.Specifically, server is stepped on described in acquisition when the verification information is matched with the verification information prestored The physical address of corresponding user information and the terminal is requested in record, is generated and is enabled according to the user information and the physical address Bridge queen, further judges whether the user information is associated with token, when the user information correlation has token, using described The token of generation updates the token of the user information correlation, so that it is guaranteed that a user information same time can only be an end It is logged on end, guarantees the safety of user account.When the user information is not associated token, server is then directly by the order Board and the user information correlation store.Meanwhile the token is sent to the terminal by server.
Further, user after login, may exist and forget the case where logging off, when user forgets to log off There are biggish security risks.Therefore, in the present embodiment, it is corresponding that server does not receive the user information in preset duration Access request when, delete the token of the user information correlation.When to forget to log off after the user logs, continue not When accessing duration and being more than preset duration, the token failure stored in terminal, terminal needs access or when business operations, need Again it logs in, has further ensured the account safety of user.It is understood that the preset duration can according to the actual situation certainly Row setting, is not particularly limited herein.
In the present embodiment, when server receives the logging request of terminal, the corresponding verifying letter of the logging request is obtained Breath obtains the corresponding user information of the logging request and described when the verification information is matched with the verification information prestored The physical address of terminal generates token according to the user information and the physical address, the token and the user is believed Associated storage is ceased, and the token is sent to the terminal.So that terminal accesses server when token is effective again It is easy to operate without validation information.
It further, is the flow diagram of the control method 3rd embodiment of service authority of the present invention referring to Fig. 4, Fig. 4, Based on first or second embodiments, the refinement step of the step S40 includes:
Step S41 is obtained from service database in service authority permission corresponding comprising the target service The corresponding data of the target service;
The data are sent to the terminal by step S42.
In the present embodiment, verification information data in system (such as login authentication information, character types, token, role class Type and the corresponding relationship of service authority etc.) and the corresponding data of business operation stored respectively with different databases.Storage verifying Log type, Key-Value database, such as Redis database can be used in the verification information database of information;Storage service operation Relevant database, such as mySQL database can be used in the service database of corresponding data.
Server obtains the corresponding token letter of the operation requests in the business operation request for receiving terminal transmission Breath, target service and user information;Then inquiring and authenticating information database, whether effective, described if verifying the token information When token information is effective, determines that terminal is in and step on state, login authentication passes through;Then the corresponding target of the user information is obtained Character types obtain the corresponding service authority of the target roles type, include the target service pair in the service authority When the permission answered, determine that operating right of the user with the target service that terminal logs in, Authority Verification pass through.Work as login When verifying and Authority Verification pass through, server ability query traffic data library obtains the corresponding data of the target service, then The data are sent to the terminal.When login authentication or Authority Verification are obstructed out-of-date, server is directly fed back to terminal Error message, without query traffic data library.
Verification information data and business datum are utilized respectively verification information database by technical solution provided in this embodiment It is stored with service database, server only when login authentication and Authority Verification pass through, is just obtained from service database The data are sent to the terminal by the corresponding data of the target service.To reduce the inquiry time of service database Number, improves the operational efficiency of program.
In addition, to achieve the above object, the embodiment of the present invention also provides a kind of control device of service authority, the business The control device of permission includes: memory, processor and is stored on the memory and can run on the processor The control program of service authority, the control program of the service authority realize any embodiment as above when being executed by the processor The step of control method of the service authority.
In addition, to achieve the above object, the embodiment of the present invention also provides a kind of storage medium, which is characterized in that described to deposit It is stored with the control program of service authority on storage media, is realized when the control program of the service authority is executed by processor as above The step of control method of service authority described in any embodiment.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (8)

1. a kind of control method of service authority, which is characterized in that the control method of the service authority the following steps are included:
In the business operation request for receiving terminal transmission, the corresponding token information of the operation requests, target service are obtained And user information;
When the token information is effective, the corresponding target roles type of the user information is obtained;
Obtain the corresponding service authority of the target roles type;
In service authority permission corresponding comprising the target service, the corresponding data of the target service are obtained, it will The data are sent to the terminal.
2. the control method of service authority as described in claim 1, which is characterized in that described in the industry for receiving terminal transmission When operation requests of being engaged in, after the step of obtaining the corresponding token information of the operation requests, target service and user information, also wrap It includes:
When there is token matched with the token information, determine that the token information is effective.
3. the control method of service authority as described in claim 1, which is characterized in that the control method of the service authority is also Include:
When receiving the logging request of terminal, the corresponding verification information of the logging request is obtained;
When the verification information is matched with the verification information prestored, the corresponding user information of the logging request and described is obtained The physical address of terminal generates token according to the user information and the physical address;
The token and the user information correlation are stored, and the token is sent to the terminal.
4. the control method of service authority as claimed in claim 3, which is characterized in that described by the token and the user Information association storage, and the step of token is sent to the terminal includes:
When the user information has been associated with token, the order of the user information correlation is updated using the token of the generation Board;
When the user information is not associated token, the token and the user information correlation are stored;
The token is sent to the terminal.
5. the control method of service authority as described in any one of claims 1-3, which is characterized in that the control of the service authority Method processed further include:
When not receiving the corresponding access request of the user information in preset duration, the order of the user information correlation is deleted Board.
6. the control method of service authority as described in any one of claims 1-3, which is characterized in that described in the operational authority When limiting permission corresponding comprising the target service, the data of the target service are obtained, the data are sent to the end The step of end includes:
In service authority permission corresponding comprising the target service, the target service is obtained from service database Corresponding data;
The data are sent to the terminal.
7. a kind of control device of service authority, which is characterized in that the control device of the service authority includes: memory, place Reason device and the control program for being stored in the service authority that can be run on the memory and on the processor, the operational authority The control such as service authority described in any one of claims 1 to 6 is realized when the control program of limit is executed by the processor The step of method.
8. a kind of storage medium, which is characterized in that be stored with the control program of service authority, the business on the storage medium The controlling party such as service authority described in any one of claims 1 to 6 is realized when the control program of permission is executed by processor The step of method.
CN201910088879.2A 2019-01-28 2019-01-28 Control method, device and the storage medium of service authority Pending CN109617926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910088879.2A CN109617926A (en) 2019-01-28 2019-01-28 Control method, device and the storage medium of service authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910088879.2A CN109617926A (en) 2019-01-28 2019-01-28 Control method, device and the storage medium of service authority

Publications (1)

Publication Number Publication Date
CN109617926A true CN109617926A (en) 2019-04-12

Family

ID=66021427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910088879.2A Pending CN109617926A (en) 2019-01-28 2019-01-28 Control method, device and the storage medium of service authority

Country Status (1)

Country Link
CN (1) CN109617926A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784457A (en) * 2019-10-17 2020-02-11 中诚信征信有限公司 Service access method and device
CN110968568A (en) * 2019-12-04 2020-04-07 常熟理工学院 Database management system
CN112182530A (en) * 2020-10-14 2021-01-05 北京安石科技有限公司 Method and device for controlling operating system permission through master control system
CN112231653A (en) * 2020-10-15 2021-01-15 北京明略昭辉科技有限公司 Permission determination method and device, storage medium and electronic device
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN112464212A (en) * 2020-03-30 2021-03-09 上海汇招信息技术有限公司 Data authority control reconstruction method based on mature complex service system
CN112633970A (en) * 2020-12-16 2021-04-09 海通安恒科技股份有限公司 Intelligent purchasing platform
CN113158154A (en) * 2020-01-07 2021-07-23 纬创资通股份有限公司 Mobile device, verification terminal device and identity verification method
CN113297629A (en) * 2021-05-26 2021-08-24 杭州安恒信息技术股份有限公司 Authentication method, device, system, electronic equipment and storage medium
CN113958108A (en) * 2020-11-25 2022-01-21 广州三叠纪元智能科技有限公司 Electric box control method, electric box, server and storage medium
WO2023185386A1 (en) * 2022-03-28 2023-10-05 腾讯科技(深圳)有限公司 Service data processing method and apparatus, device, storage medium and program product

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220289A (en) * 2013-04-15 2013-07-24 北京京东尚科信息技术有限公司 Resource verification system and resource verification method based on web application
CN103312722A (en) * 2013-07-04 2013-09-18 河北科技大学 Control design method for fine-grained mandatory access
US20150180872A1 (en) * 2013-12-20 2015-06-25 Cube, Co. System and method for hierarchical resource permissions and role management in a multitenant environment
CN105227315A (en) * 2015-08-31 2016-01-06 青岛海尔智能家电科技有限公司 A kind of Web application authentication method, server and system thereof
CN105518642A (en) * 2013-08-20 2016-04-20 三星电子株式会社 System, apparatus, and method for sharing electronic device
CN106302492A (en) * 2016-08-23 2017-01-04 唐山新质点科技有限公司 A kind of access control method and system
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
CN107862198A (en) * 2017-11-17 2018-03-30 浪潮软件股份有限公司 One kind accesses verification method, system and client
CN108667797A (en) * 2017-03-28 2018-10-16 罗德施瓦兹两合股份有限公司 System for sending audio and/or video data and the method accessed for authorizing secure
CN109104412A (en) * 2018-07-13 2018-12-28 万翼科技有限公司 Account right management method, management system and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220289A (en) * 2013-04-15 2013-07-24 北京京东尚科信息技术有限公司 Resource verification system and resource verification method based on web application
CN103312722A (en) * 2013-07-04 2013-09-18 河北科技大学 Control design method for fine-grained mandatory access
CN105518642A (en) * 2013-08-20 2016-04-20 三星电子株式会社 System, apparatus, and method for sharing electronic device
US20150180872A1 (en) * 2013-12-20 2015-06-25 Cube, Co. System and method for hierarchical resource permissions and role management in a multitenant environment
CN105227315A (en) * 2015-08-31 2016-01-06 青岛海尔智能家电科技有限公司 A kind of Web application authentication method, server and system thereof
CN106302492A (en) * 2016-08-23 2017-01-04 唐山新质点科技有限公司 A kind of access control method and system
CN108667797A (en) * 2017-03-28 2018-10-16 罗德施瓦兹两合股份有限公司 System for sending audio and/or video data and the method accessed for authorizing secure
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
CN107862198A (en) * 2017-11-17 2018-03-30 浪潮软件股份有限公司 One kind accesses verification method, system and client
CN109104412A (en) * 2018-07-13 2018-12-28 万翼科技有限公司 Account right management method, management system and computer readable storage medium

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784457A (en) * 2019-10-17 2020-02-11 中诚信征信有限公司 Service access method and device
CN110784457B (en) * 2019-10-17 2022-08-19 中诚信征信有限公司 Service access method and device
CN110968568A (en) * 2019-12-04 2020-04-07 常熟理工学院 Database management system
CN110968568B (en) * 2019-12-04 2023-08-18 常熟理工学院 Database management system
CN113158154B (en) * 2020-01-07 2024-06-04 纬创资通股份有限公司 Mobile device, authentication terminal device, and authentication method
CN113158154A (en) * 2020-01-07 2021-07-23 纬创资通股份有限公司 Mobile device, verification terminal device and identity verification method
CN112464212A (en) * 2020-03-30 2021-03-09 上海汇招信息技术有限公司 Data authority control reconstruction method based on mature complex service system
CN112182530A (en) * 2020-10-14 2021-01-05 北京安石科技有限公司 Method and device for controlling operating system permission through master control system
CN112231653A (en) * 2020-10-15 2021-01-15 北京明略昭辉科技有限公司 Permission determination method and device, storage medium and electronic device
CN113958108A (en) * 2020-11-25 2022-01-21 广州三叠纪元智能科技有限公司 Electric box control method, electric box, server and storage medium
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN112633970A (en) * 2020-12-16 2021-04-09 海通安恒科技股份有限公司 Intelligent purchasing platform
CN113297629A (en) * 2021-05-26 2021-08-24 杭州安恒信息技术股份有限公司 Authentication method, device, system, electronic equipment and storage medium
CN113297629B (en) * 2021-05-26 2023-03-14 杭州安恒信息技术股份有限公司 Authentication method, device, system, electronic equipment and storage medium
WO2023185386A1 (en) * 2022-03-28 2023-10-05 腾讯科技(深圳)有限公司 Service data processing method and apparatus, device, storage medium and program product

Similar Documents

Publication Publication Date Title
CN109617926A (en) Control method, device and the storage medium of service authority
US12045372B2 (en) Securing access to confidential data using a blockchain ledger
US11727400B2 (en) Telecommunication system and method for settling session transactions
CN111771194B (en) System and method for generating and maintaining a non-variable digital conference record within a distributed network node
CN110516474B (en) User information processing method and device in blockchain network, electronic equipment and storage medium
CN110569658B (en) User information processing method and device based on blockchain network, electronic equipment and storage medium
KR102002509B1 (en) Privite blockchain system including notarizing center and notarial method thereof
US7266702B2 (en) Method and system for managing security material and services in a distributed database system
US7703142B1 (en) Software license authorization system
CN111183426A (en) System and method for block chain based notification
CN109670768A (en) Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain
CN109194673A (en) Authentication method, system, equipment and storage medium based on authorized user message
US20150248286A1 (en) System and methods for remote maintenance in an electronic network with multiple clients
US20200082065A1 (en) Context-based access controls
US9037849B2 (en) System and method for managing network access based on a history of a certificate
KR102116235B1 (en) Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
TW201516733A (en) System and method for verifying changes to UEFI authenticated variables
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
CN110149328A (en) Interface method for authenticating, device, equipment and computer readable storage medium
WO2019011187A1 (en) Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account
CN107832602B (en) Unified electronic seal system based on identification
CN111414612A (en) Security protection method and device for operating system mirror image and electronic equipment
US11343107B2 (en) System for method for secured logging of events
CN111178896B (en) Bus taking payment method, device and storage medium
CN105379176A (en) System and method for validating SCEP certificate enrollment requests

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Shop 1, self-made, 4 / F, commercial building 9, Meiju building materials City, north of Lvjing West Road, Shiwan Town, Chancheng District, Foshan City, Guangdong Province

Applicant after: Guangdong taojia Building Decoration Engineering Co.,Ltd.

Address before: Shop 1, self-made, 4 / F, commercial building 9, Meiju building materials City, north of Lvjing West Road, Shiwan Town, Chancheng District, Foshan City, Guangdong Province

Applicant before: GUANGDONG TAOJIA TECHNOLOGY CO.,LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412

RJ01 Rejection of invention patent application after publication