[go: up one dir, main page]

CN103220289A - Resource verification system and resource verification method based on web application - Google Patents

Resource verification system and resource verification method based on web application Download PDF

Info

Publication number
CN103220289A
CN103220289A CN2013101283605A CN201310128360A CN103220289A CN 103220289 A CN103220289 A CN 103220289A CN 2013101283605 A CN2013101283605 A CN 2013101283605A CN 201310128360 A CN201310128360 A CN 201310128360A CN 103220289 A CN103220289 A CN 103220289A
Authority
CN
China
Prior art keywords
resource
user
response
request
resource set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101283605A
Other languages
Chinese (zh)
Inventor
谭龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Shangke Information Technology Co Ltd
Priority to CN2013101283605A priority Critical patent/CN103220289A/en
Publication of CN103220289A publication Critical patent/CN103220289A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a resource verification system and a resource verification method based on web application. The method comprises the following steps: receiving service requests of a user for resources from a client; judging whether the resources need to be verified or not; responding to that the resources need to be verified, and generating a user own resource set; putting the user own resource set into context data used for resource verification; reading the context data, and matching the resources requested by the user with resources in the user own resource set; and responding to that matching is successful, reading the resources requested by the user in the context data, and executing service operations corresponding to the resources. The resource verification system and the resource verification method based on the web application can carry out web resource verification accurately and uniformly and carry out refining control over resource authorities.

Description

Resource verification system and method based on the web application
Technical field
The present invention relates to web resource verification technique, more specifically, relate to resource verification system and the method used based on Web.
Background technology
In most of enterprise Web is used, all can relate to, and this part content is all very responsive to user's the authentication and the control of authority.And user's identity changes through regular meeting, and its authority relation that has also can be along with changing so.So user's requested resource is authenticated and user's authority relation is carried out real-time management is very important.
Traditional authority control method based on the Web application resource generally all adopts user and resource is done simple checking, and verification mode is comparatively single, can not make a response in real time to user's role or permission modification.
Simultaneously, traditional authority control method based on the Web application resource also exists verifying logic and the too high problem of the service part degree of coupling.And in fact, no matter which kind of carries out the system of resource checking and control of authority, and resource checking and control of authority all can not too much influence the duration of practical business operation, and the web of enterprise that particularly has huge client access amount uses.If it is long to take practical business operation duration, customer satisfaction reduces, and can influence business event greatly.Therefore, web resource checking of using and control of authority want efficient, accurately, the while can not have big influence to the handling duration of practical business.
Summary of the invention
For solving the above problem that exists in the prior art, the invention provides a kind of resource verification method of using based on web, comprising:
Step 1: receive the service request to resource from the user of client;
Step 2: judge whether this resource needs checking;
Step 3: need checking in response to this resource, generate the user according to user profile and have resource set;
Step 4: this user is had the context data that resource set is put into resource checking usefulness;
Step 5: read described context data, the resource that user's requested resource and described user are had in the resource set is complementary;
Step 6: in response to the match is successful, then from described context data, read user's requested resource, carry out this resource corresponding service operation
The present invention also provides a kind of resource verification system of using based on web, comprising:
The unified certification unit, the unified certification unit receives the service request to resource from the user of client, if this resource needs authentication, then generate the user and have resource set, and the user is had the context data that resource set is put into resource checking usefulness according to user profile;
The resource authentication unit, the resource authentication unit needs authentication in response to this resource, and reads described context data, and the resource that user's requested resource and described user are had in the resource set is complementary; And
User behavior and professional performance element, user behavior and professional performance element are operated and carry out this resource corresponding service in response to resource matched success.
System and method of the present invention can carry out web resource checking exactly, uniformly, and to the control that becomes more meticulous of the authority of resource.
The practical business degree of coupling that system and method for the present invention can also make checking of web resource and web use reduces, and has the low invasive to the practical business operation.
Description of drawings
Fig. 1 is the structure chart of system of the present invention;
Fig. 2 is the flow chart of method of the present invention; And
Fig. 3 is the more detailed flow chart of method of the present invention.
Embodiment
Below with reference to Fig. 1 and in conjunction with " Jingdone district cloud storage system " is example, and concrete description is done by the system of invention.
Fig. 1 has shown the structure chart of system of the present invention.System of the present invention comprises: the unified certification unit, the unified certification unit receives the service request to resource from the user of client, if this resource need be verified, and the user is by authentication, then generate the user and have resource set, and the user is had the context data that resource set is put into resource checking usefulness according to user profile; The resource authentication unit, the resource authentication unit needs authentication in response to this resource, and reads described context data, and the resource that user's requested resource and described user are had in the resource set is complementary; And user behavior and professional performance element, user behavior and professional performance element are operated and carry out this resource corresponding service in response to resource matched success.
More specifically, the unified certification unit can comprise blocking module and user authentication module, and certainly, these two modules also can unite two into one.The blocking module interception has comprised user profile and requested resource from the user's of client resource request in this request.Blocking module is tackled this request, and this requested resource is compared with the resource in the resource pool to be verified that sets in advance, and comparative approach is accurately to mate.If user's requested resource is not in resource pool to be verified, showing does not need to carry out the resource checking, the request of this resource directly can be transferred to user behavior and professional performance element, carries out business operation, this processing mode can be simplified the checking to common source, improves systematic function.If blocking module is judged user's requested resource in resource pool to be verified, then show and to carry out the resource checking to this resource.User authentication module generates the user according to subscriber identity information and has resource set, puts into the context data of resource checking usefulness, and transmission corresponding message to resource authentication unit makes the resource authentication unit begin to carry out the resource checking.
The resource authentication unit is in response to need checking from the described resource of unified certification unit judges, read described context data, the resource that user's requested resource and described user are had in the resource set is complementary, if it fails to match, then to the client information that sends that it fails to match, if the match is successful, then send corresponding message to described user behavior and professional performance element.The match is successful in response to described resource authentication unit for user behavior and professional performance element, reads user's requested resource from described context data, carries out this request corresponding service operation, and the result is fed back to client.So just finished one intactly, resource checking uniformly.
Further, in order to increase the accuracy of resource checking, the resource authentication unit has adopted accurate coupling and expression formula coupling.Described resource authentication unit can comprise accurate matching module and expression formula matching module.Accurately matching module reads the user and has resource set, and accurately mates with user's requested resource (resource for example can be URL), and it is legal then to ask as the match is successful, send corresponding message to user behavior and professional performance element to carry out business operation.Further,, carry out the expression formula coupling again, for example utilize regular expression or custom rule to mate by the expression formula matching module if it fails to match.Then return ending message to the requestor as crossing expression formula it fails to match, on the contrary the message that sends then that the match is successful to user behavior and professional performance element to carry out business operation.
Further, in order to guarantee user's legitimacy, before to the resource checking, earlier the user is carried out authentication.Be specially, after blocking module is transferred to user authentication module with user's resource request.User authentication module carries out authenticating user identification according to the context or the session information of described request, and authentication method has multiple, as according to the deciphering after cookie or session in data verification (assignment when session or cookie login success for the user).After authentication was passed through, user authentication module generated the user according to user profile and has resource set, puts into the context data of resource checking usefulness.
Further, in order to guarantee the real-time and accuracy of user and resources relationship, system of the present invention also comprises initialization and Dynamic Maintenance unit.Described initialization and Dynamic Maintenance unit read and load (for example, being loaded in the internal memory) user-role's basic data, role-resources relationship data from perdurable data in the web application initializes.And according to system requirements configure user-role's basic data, role-resources relationship data in real time.For example, in " Jingdone district cloud storage system ", load user-role's basic data, role-resources relationship data when being presented as initialization to internal memory, and pass through " Dynamic Maintenance unit ", and it is come into force in real time in the above data of background maintenance.
More specifically, described initialization and Dynamic Maintenance unit distribute the role for the user in the system, and each role can have certain resource.Distribution method between user-role, the role-resource is according to concrete professional the setting, and the corresponding relation between role-resource can change according to service needed.Each user can have one or more roles, and each role can have one or more resources, and each role's resource can be overlapping.Therefore, each user can have a resource set.User-role's basic data, role-resources relationship data are stored as perdurable data.Certainly, also can not adopt the role is intermediary, directly carries out related with resource the user.
Further, described initialization and Dynamic Maintenance unit can comprise initialization module and Dynamic Maintenance module.Initialization module reads and loads user-role's basic data, role-resources relationship data from the perdurable data storehouse when the web application initializes.Loading can be understood as and transfers in the unified certification unit, also can be loaded in the memory that can visit the unified certification unit, for example, is loaded in the internal memory.The Dynamic Maintenance module is carried out real-time maintenance according to system requirements to user-role's basic data, role-resources relationship data, comprise when user role changes, upgrade user-role's basic data, when the resource of role's correspondence changes, new role-resources relationship data more.For new user by authentication, initialization and Dynamic Maintenance unit distribute the role for this new user, this user's of storage user-role's basic data and role-resources relationship data in perdurable data will be given the unified certification unit at this new user's resource transmission.
Described initialization and Dynamic Maintenance unit are after the user profile of receiving from the unified certification unit, compare with stored user information in the perdurable data storehouse, according to the user in the perdurable data-role's basic data and role-resources relationship data, travel through the role that this existing subscriber has, and the resource that has of this role, give the unified certification unit with the resource transmission that this user has.
User authentication module receives the resource of returning at this user, removes the resource that repeats, thereby the user who produces at this user has resource set.This user has resource set and puts in the context of described request, sends corresponding message to the resource authentication unit.If authentication is not passed through, behind the authentification failure then unified certification unit feedback authentication failure message give client.
Preferably, system of the present invention can also comprise the menu generation unit, and it is communicated by letter with user behavior and professional performance element.The menu generation unit is finished the generation of menu and is fed back to the user.Particularly, after the menu generation unit is received the message that is finished from user behavior and professional performance element, have resource set according to the user in the described context and generate diversified menu structure (tree, tabulation), and response reaches the effect of What You See Is What You Get to the user.
More preferably, described user behavior and professional performance element are finished after user's the concrete behavior or business of resource request, judge whether this user's request is synchronization request, if not synchronization request, be asynchronous request, then return the business operation execution result and give client.If synchronization request then transfers to execution result the menu generation unit.
Follow an example according to the preferred embodiments of the present invention to be: one " Jingdone district cloud storage system " is provided, and this system provides the web service of file storage, backup for the user.This system comprises aforesaid unified certification unit, resource authentication unit, professional performance element, menu generation unit.
Receive user's the resource request of " backup file " when " Jingdone district cloud storage system " after, the unified certification unit of this system judges that at first requested resource is whether in resource pool to be verified.If do not exist, then directly carry out " backup file " operation, if in, the cookie decrypts information that the user is carried then, then and in advance storage user data is mated.Then have resource set, and put into the context of system as the match is successful according to user-role and role-distinctive user of resource information generation user.
Then, the resource authentication unit of " Jingdone district cloud storage system " is according to the resource set in the context of unified certification unit generation, the resource corresponding with user's " backup file " request done accurate coupling, if the match is successful then forward the file that professional performance element backup user uploads to, if it fails to match, the expression formula of continuation and self-defining band asterisk wildcard is mated, also forward professional performance element to as the match is successful, if it fails to match, the information of " backup failure, Authority Verification failure " of then returning is given the requestor.
At last, after the professional performance element of " Jingdone district cloud storage system " executes " backup file " operation, judge at first whether " backup file " is synchronization request, if not then directly the return result give client, if then will forward the menu generation unit to, it generates the menu structure that the user has by back-track algorithm, and and service executing result return to the user of client.
Fig. 2 has shown that the resource of using based on Web of the present invention is verified and the flow chart of authority control method.Described method comprises: the unified request that receives the user to resource.Judge whether this requested resource needs checking.If this requested resource does not need checking, directly carry out this request corresponding service operation and feed back to the user.If this resource needs checking, then generate the user and have resource set according to user profile, user's requested resource and the resource that the user has resource set are complementary, if the match is successful, then carry out this request corresponding service and operate and feed back to the user.
Shown the more detailed flow chart of Fig. 2 as Fig. 3, described method comprises:
Step 100: the user initiates the request to the web resource, receives user's request, judges whether the request of resource needs authentification of user.If requested resource is in resource pool to be verified, then expression needs authentification of user, advances to step 101, carries out business operation otherwise directly jump to step 108.
Step 101: carry out authenticating user identification by request cookie data or session information, and generate the context data that needs when resource is verified, this context data comprises user profile, advances to step 102 then.
Step 102:, advance to step 103 if authentication is passed through.If authentication is not passed through, then jump to step 109.
Step 103: user-role relation data and role-resources relationship data generation authenticated user according to storage in advance have resource set, put into described context data.
Step 104: (for example, URL) having resource set with authenticated user accurately mates according to user's requested resource address.
Step 105: judge whether coupling is successful, if the match is successful, then expression jumps to step 108 and carries out business operation by checking.If coupling is unsuccessful, then forward step 106 to.
Step 106: carry out expression formula (can select regular expression or custom rule for use) coupling: mate according to the type expression resource that user's requested resource address and user have.
Step 107: whether the coupling of determination step 106 is successful, and the match is successful then represents to forward step 108 to and carry out business operation, otherwise forward step 109 to by the resource checking.
Step 108: carry out the operation of user behavior and related service, and forward step 109 to.
Step 109: the decision request type, if be synchronization request, after promptly transmit leg sends data, wait the recipient to beam back the communication mode that next request is just sent out later in response, then advance to step 110, otherwise be back to the user, wait for the next one request that receives the user.
Step 110: have resource collection according to the user who deposits in the described context data,, return to the user with method systematic function menu structures such as backtrackings.
Preferably, in the above-described embodiments, between step 100 and 110, also increased exception handling, if can guarantee to capture abnormal data unusually, and make feedback.If be synchronization request, this method has also added data filter after step 110, guarantee normally returning of system and user's context, constant data, this is in order to ensure normally the returning of system and user's context, constant data, and reduces unusually to using the influence that produces.
With an instantiation concrete an application of the present invention is described below.Use the present invention in a project management system, this project management system is used to manage the life cycle of a plurality of projects.
At first, step 100, the user asks " checking project information ".Whether then: " checking project information " according to the resource judgment in the resource pool to be verified needs checking.If do not need checking, then directly forward step 108 to, carry out " queried for items information ", otherwise forward the context data that step 101 generates checking usefulness to.
Step 101, request is carried to cookie information (when the user logins success under the kind) deciphering on backstage after, generate the context data that user profile is put into checking usefulness, forward step 102 to.
Step 102, according to the context data that step 101 generates, verify whether this user profile exists and legal, generate " authenticated user has resource set " as checking by then forwarding step 103 to, this resource set comprises common resources and expression formula resource, otherwise forwards step 109 to.
Step 103, whole roles that the traversal user has add the resource of role's correspondence to " authenticated user has resource set " then, and remove the resource of repetition, forward step 104 to.
Step 104, travel through the common resources collection that the user has, and the resource in the resource set is accurately compared with " checking project information " seriatim, then forward step 108 to as the match is successful, carry out " queried for items information ", carry out the regular expression coupling otherwise forward step 106 to.
Step 106 travels through the expression formula resource set that the user has, and the resource in the resource set is done the canonical coupling with " checking project information " seriatim, then forwards step 108 to as the match is successful, carries out " queried for items information ".Otherwise forward step 109 to.
Step 108 is carried out " queried for items information " operation, and obtains the corresponding results data.
Step 109, judgement user's request type if be synchronization request, then forwards step 110 to.Otherwise directly return data is given the requestor, waits for user's next one request then.
Step 110, the user resources relation data in based on context generates with back-track algorithm and corresponding to be authorized to menu structure and result data returns to the user in the lump, waits for user's next one request.
In sum, adopt system and method for the present invention to realize resource checking and control of authority that Web uses, can guarantee the handling property of Authority Verification and certification chain, also can guarantee the accuracy of Authority Verification.And the checking of first resource carries out Business Processing again, and business module zero is invaded.The unified resource that the present invention uses web is verified and real-time, fail safe, stability, the extensibility of control of authority improve greatly.
Obviously, those skilled in the art can carry out various changes and modification and the method and the scope that do not break away from the application to the embodiment among the application.Like this, if these in the embodiment of the present application are revised and modification belongs within the scope of the application's claim and equivalent technologies thereof, then the application's embodiment also is intended to comprise these changes and modification interior.

Claims (18)

1. a resource verification method of using based on web is characterized in that, comprising:
Step 1: receive the service request to resource from the user of client;
Step 2: judge whether this resource needs checking;
Step 3: need checking in response to this resource, generate the user according to user profile and have resource set;
Step 4: this user is had the context data that resource set is put into resource checking usefulness;
Step 5: read described context data, the resource that user's requested resource and described user are had in the resource set is complementary; And
Step 6: in response to the match is successful, then from described context data, read user's requested resource, carry out this resource corresponding service operation.
2. the resource verification method of using based on web according to claim 1 is characterized in that described step 3 also comprises:
Step 3-1: need checking in response to this resource, further user identity is authenticated; And
Step 3-2:, generate the user according to user profile and have resource set in response to the authenticating user identification success.
3. the resource verification method of using based on web according to claim 2 is characterized in that cookie that carries by described request or session information come user identity is authenticated in described step 3-1.
4. the resource verification method of using based on web according to claim 1 is characterized in that described step 3 also comprises:
Step 3-3: need checking in response to this resource,, obtain the resource collection of this user's correspondence according to user profile and based on the user-role's basic data and the role-resources relationship data of storing in advance; And
Step 3-4: remove the resource of the repetition in this resource collection, generate the user and have resource set.
5. the resource verification method of using based on web according to claim 1 is characterized in that described step 2 also comprises:
If in the resource pool to be verified that sets in advance, then judging, the described resource of request need authenticate this resource.
6. the resource verification method of using based on web according to claim 1 is characterized in that described step 5 also comprises:
Step 5-1: come the resource that user's requested resource and described user have in the resource set is mated by accurate coupling.
7. the resource verification method of using based on web according to claim 6 is characterized in that described step 5 also comprises:
Step 5-2:, further mate to come the resource that user's requested resource and described user are had in the resource set to mate by expression formula in response to accurately it fails to match.
8. the resource verification method of using based on web according to claim 1 is characterized in that, also comprises after described step 6:
Step 7: be finished in response to described business operation operation, have resource set according to the user in the described context data and generate menu structure, and client given in response.
9. the resource verification system of using based on web according to claim 8 is characterized in that described step 7 also comprises:
Step 7-1: be finished in response to described business operation, judge whether described request is synchronization request;
Step 7-2:, send execution result to described client in response to judging that described request is asynchronous request; And
Step 7-3:, have resource set according to the user in the described context data and generate menu structure, and client is given in response in response to judging that described request is a synchronization request.
10. a resource verification system of using based on web is characterized in that, comprising:
The unified certification unit, the unified certification unit receives the service request to resource from the user of client, if this resource needs authentication, then generate the user and have resource set, and the user is had the context data that resource set is put into resource checking usefulness according to user profile;
The resource authentication unit, the resource authentication unit needs authentication in response to this resource, and reads described context data, and the resource that user's requested resource and described user are had in the resource set is complementary; And
User behavior and professional performance element, user behavior and professional performance element are operated and carry out this resource corresponding service in response to resource matched success.
11. the resource verification system of using based on web according to claim 10 is characterized in that described unified certification unit further comprises:
Need checking in response to this resource, further user identity is authenticated; And
In response to the authenticating user identification success, generate the user according to user profile and have resource set.
12. the resource verification system of using based on web according to claim 11 is characterized in that described unified certification unit comes user identity is authenticated by cookie or session information that described request is carried.
13. the resource verification system of using based on web according to claim 10 is characterized in that, further comprises: store the initialization and the Dynamic Maintenance unit of predefined user-role's basic data and role-resources relationship data,
Wherein, described unified certification unit further comprises:
Need checking in response to this resource,, obtain resource collection from described initialization and Dynamic Maintenance unit at this user according to user profile; And
Remove the resource of the repetition in this resource collection, generate the user and have resource set.
14. the resource verification system of using based on web according to claim 10 is characterized in that described unified certification unit further comprises:
If in the resource pool to be verified that sets in advance, then judging, the described resource of request need authenticate this resource.
15. the resource verification system of using based on web according to claim 10 is characterized in that described resource authentication unit further comprises:
Come the resource that user's requested resource and described user have in the resource set is mated by accurate coupling.
16. the resource verification system of using based on web according to claim 15 is characterized in that described resource authentication unit further comprises:
In response to accurately it fails to match, further mate to come the resource that user's requested resource and described user are had in the resource set to mate by expression formula.
17. the resource verification system of using based on web according to claim 10 is characterized in that, also comprises the menu generation unit, wherein,
Described menu generation unit is finished in response to described business operation operation, have resource set according to the user in the described context data and generate menu structure, and client is given in response.
18. the resource verification system of using based on web according to claim 17 is characterized in that described user behavior and professional performance element further comprise:
Be finished in response to described business operation, judge whether described request is synchronization request;
In response to judging that described request is asynchronous request, send execution result to described client; And
In response to judging that described request is a synchronization request, have resource set according to the user in the described context data and generate menu structure, and client is given in response.
CN2013101283605A 2013-04-15 2013-04-15 Resource verification system and resource verification method based on web application Pending CN103220289A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101283605A CN103220289A (en) 2013-04-15 2013-04-15 Resource verification system and resource verification method based on web application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101283605A CN103220289A (en) 2013-04-15 2013-04-15 Resource verification system and resource verification method based on web application

Publications (1)

Publication Number Publication Date
CN103220289A true CN103220289A (en) 2013-07-24

Family

ID=48817753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101283605A Pending CN103220289A (en) 2013-04-15 2013-04-15 Resource verification system and resource verification method based on web application

Country Status (1)

Country Link
CN (1) CN103220289A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408365A (en) * 2014-12-17 2015-03-11 中国人民解放军国防科学技术大学 Progress authentication method based on password
CN109617926A (en) * 2019-01-28 2019-04-12 广东淘家科技有限公司 Control method, device and the storage medium of service authority

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119274A (en) * 2007-09-12 2008-02-06 杭州华三通信技术有限公司 Method for improving treatment efficiency of SSL gateway and SSL gateway
CN101334792A (en) * 2008-07-10 2008-12-31 中国科学院计算技术研究所 A personalized service recommendation system and method
CN101378400A (en) * 2007-08-30 2009-03-04 国际商业机器公司 Method, server and system for polymerizing desktop application and Web application
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
CN101989974A (en) * 2009-08-04 2011-03-23 西安交大捷普网络科技有限公司 Safety control method for intranet WEB access of security socket layer virtual private network (SSL VPN)
CN102868533A (en) * 2012-09-13 2013-01-09 中科华核电技术研究院有限公司 Method and system for verifying resource access authorization
US20130067568A1 (en) * 2011-09-12 2013-03-14 Oludare V. Obasanjo Resource Access Authorization

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378400A (en) * 2007-08-30 2009-03-04 国际商业机器公司 Method, server and system for polymerizing desktop application and Web application
CN101119274A (en) * 2007-09-12 2008-02-06 杭州华三通信技术有限公司 Method for improving treatment efficiency of SSL gateway and SSL gateway
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
CN101334792A (en) * 2008-07-10 2008-12-31 中国科学院计算技术研究所 A personalized service recommendation system and method
CN101989974A (en) * 2009-08-04 2011-03-23 西安交大捷普网络科技有限公司 Safety control method for intranet WEB access of security socket layer virtual private network (SSL VPN)
US20130067568A1 (en) * 2011-09-12 2013-03-14 Oludare V. Obasanjo Resource Access Authorization
CN102868533A (en) * 2012-09-13 2013-01-09 中科华核电技术研究院有限公司 Method and system for verifying resource access authorization

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408365A (en) * 2014-12-17 2015-03-11 中国人民解放军国防科学技术大学 Progress authentication method based on password
CN104408365B (en) * 2014-12-17 2017-05-24 中国人民解放军国防科学技术大学 Progress authentication method based on password
CN109617926A (en) * 2019-01-28 2019-04-12 广东淘家科技有限公司 Control method, device and the storage medium of service authority

Similar Documents

Publication Publication Date Title
JP7065956B2 (en) Methods and control systems for controlling and / or monitoring equipment
KR102618665B1 (en) Version history management using blockchain
CN110958111B (en) Block chain-based identity authentication mechanism of electric power mobile terminal
WO2022166637A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
CN102170440B (en) Method suitable for safely migrating data between storage clouds
CN101068245B (en) Shared file issuing and downloading method and file sharing control system
CN110324331B (en) Block chain-based identity authentication method for safety and stability control terminal of power system
WO2021018088A1 (en) Trusted authentication method, network device, system and storage medium
CN113157648A (en) Block chain based distributed data storage method, device, node and system
US20230039643A1 (en) Cross-chain collaborative governance system, method and device and storage medium
CN105247529A (en) Synchronizing credential hashes between directory services
CN102426594A (en) Method and system for operating database
CN111492355B (en) Method and control system for controlling and/or monitoring device
CN102868702B (en) System login device and system login method
CN114240433A (en) Data processing method and system based on block chain
WO2021061419A1 (en) Template-based onboarding of internet-connectible devices
CN110910110B (en) Data processing method and device and computer storage medium
EP3542300B1 (en) Method for operating a peer-to-peer application
WO2024244249A1 (en) Data processing method and apparatus based on blockchain, and device and medium
KR20250139331A (en) Data processing methods, devices, equipment, and storage media based on blockchain keys
CN115796871A (en) Resource data processing method and device based on block chain and server
CN113836573B (en) User information processing method and device based on distributed storage
JP2021106323A (en) Anomaly detection system and anomaly detection method
CN115378605A (en) Data processing method and device based on block chain
CN103220289A (en) Resource verification system and resource verification method based on web application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130724