CN106096384A - A kind of data processing method and device - Google Patents
A kind of data processing method and device Download PDFInfo
- Publication number
- CN106096384A CN106096384A CN201610425831.2A CN201610425831A CN106096384A CN 106096384 A CN106096384 A CN 106096384A CN 201610425831 A CN201610425831 A CN 201610425831A CN 106096384 A CN106096384 A CN 106096384A
- Authority
- CN
- China
- Prior art keywords
- password
- data access
- access rights
- data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention provides a kind of data processing method and device, and described method includes: in response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, the data access authority that different passwords is corresponding is different;Input the operation of first password in response to user, according to the corresponding relation of the password preserved with data access authority, obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority.The password that the present invention can be different arranges different data access authorities, improves the safety of data, and provided the user more abundant, apply flexibly.
Description
Technical field
The present embodiments relate to field of computer technology, be specifically related to a kind of data processing method and device.
Background technology
In prior art, in order to realize the identification to user identity and checking, user is needed to input user name in client
And password, server end the username and password submitted user to is verified, checks that the user name that user submits to is corresponding
The password that password preserves with server end is the most consistent, if unanimously, it is determined that user is validated user;If it is inconsistent,
Determine that user is illegal user, then can refuse user's login.After user logins successfully, then can enjoy corresponding service.
At present, the such as application such as Web bank, E-mail address, online game, online payment, microblogging is all that this login mechanism of use is
User provides service.
But, when the username and password of user account is revealed or is stolen, existing login method can not be protected
The safety of card user account.Additionally, username and password is one to one in prior art, user can not be for same
, there is the defect that motility is the strongest in the authority that account setup is different.
Summary of the invention
Embodiments providing a kind of data processing method and device, it is different close to be that same account is arranged
Code, and corresponding different authority, effectively protect user profile, property safety, and improve the motility that user uses.
To this end, the embodiment of the present invention following technical scheme of offer:
First aspect, embodiments provides a kind of data processing method, including:
In response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, different passwords
Corresponding data access authority is different;
The operation of first password is inputted in response to user, according to the corresponding relation of the password preserved with data access authority,
Obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority.
Further, the described corresponding relation according to the password and the data access authority that preserve, obtain first close with described
The data access authority that code is corresponding, performs the operation corresponding with described data access authority and includes:
When receiving data access request, if data access rights corresponding to described first password is limited to full access right
Time, show the total data content corresponding with full access right;
When receiving data access request, if data access rights corresponding to described first password is limited to part access rights
Time, show the part data content corresponding with part access rights.
Further, described when receiving data access request, if the data access authority that described first password is corresponding
During for full access right, show that the total data content corresponding with full access right includes:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses
During authority, show that the part data content corresponding with part access rights includes:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name;
The amount of described part fund is by user setup.
Further, described when receiving data access request, if the data access authority that described first password is corresponding
During for full access right, show that the total data content corresponding with full access right includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely
During authority, show whole associated person information to user;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses
During authority, show that the part data content corresponding with part access rights includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses
During authority, show the part associated person information corresponding with described part authority.
Further, described when receiving data access request, if the data access authority that described first password is corresponding
During for full access right, show that the total data content corresponding with full access right includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely
When asking authority, show the icon of the whole application corresponding with full access right;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses
During authority, show that the part data content corresponding with part access rights includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits
When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described method also includes:
Display user interface;Wherein, the user interface that different passwords is corresponding is identical, or, different passwords is corresponding
User interface is different.
Further, described method also includes:
When described first password is default alarm cipher, send warning message.
Further, described password includes at least two password, and one of them password in described at least two password is only
In default time span effectively or only in default login times effectively.
Second aspect, embodiments provides a kind of data processing equipment, including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Its
In, the data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access rights in response to user
The corresponding relation of limit, obtains the data access authority corresponding with described first password, performs corresponding with described data access authority
Operation.
Further, described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access that described first password is corresponding
When authority is full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access that described first password is corresponding
When authority is part access rights, show the part data content corresponding with part access rights.
Further, described first processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name.
Described second processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name;
The amount of described part fund is by user setup.
Further, described first processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely
During authority, show whole associated person information to user;
Described second processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses
During authority, show the part associated person information corresponding with described part authority.
Further, described first processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely
When asking authority, show the icon of the whole application corresponding with full access right;
Described second processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits
When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described processing unit specifically includes:
Show the user interface that the data access authority corresponding with first password is corresponding;Wherein, different pieces of information access rights
Corresponding user interface is different.
Further, described device also includes:
Alarm unit, for when described first password is default alarm cipher, sends warning message.
Further, described arrange unit specifically for:
Preserving at least two password, one of them password in described at least two password is only in default time span
Effectively or only in default login times effectively.
The embodiment of the present invention provide data processing method and device, can in response to the request of user, arrange two or
Plural password, and preserve the corresponding relation of password and password with data access authority;Wherein, different passwords is corresponding
Data access authority is different.When user uses first password to log in, corresponding with data access authority according to the password preserved
Relation, obtains the data access authority corresponding with described first password, performs the operation corresponding with described data access authority.This
The password that invention can be different arranges different data access authorities, improves the safety of data, and has provided the user more
Add abundant, apply flexibly.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments described in invention, for those of ordinary skill in the art, on the premise of not paying creative work,
Other accompanying drawing can also be obtained according to these accompanying drawings.
The data processing method flow chart that Fig. 1 provides for one embodiment of the invention;
Fig. 2 is the block diagram according to a kind of data processing equipment shown in an exemplary embodiment.
Detailed description of the invention
Embodiments providing a kind of data processing method and device, the password that can be different arranges different power
Limit, effectively protects user profile, property safety, and improves the motility that user uses.
For the technical scheme making those skilled in the art be more fully understood that in the present invention, real below in conjunction with the present invention
Execute the accompanying drawing in example, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described enforcement
Example is only a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, this area is common
The every other embodiment that technical staff is obtained under not making creative work premise, all should belong to present invention protection
Scope.
See Fig. 1, the data processing method flow chart provided for one embodiment of the invention.As it is shown in figure 1, may include that
S101, in response to the operation that arranges of user, preserves the corresponding relation of password and data access authority;Wherein, different
Data access authority corresponding to password different.
S102, inputs the operation of first password in response to user, corresponding with data access authority according to the password preserved
Relation, obtains the data access authority corresponding with described first password, performs the operation corresponding with described data access authority.
When implementing, user can arrange two or more password, and arranges difference for different passwords
Authority.The data processing equipment that the embodiment of the present invention provides, can preserve password and data in response to the operation that arranges of user
The corresponding relation of access rights.
In some embodiments, if relating to use user name to carry out logging in or the scene of data access, one is also entered
Step preserves the corresponding relation of user name and at least two password, and, described password and the corresponding relation of data access authority.Also
That is, for same account, two or more password can be set, data access authority corresponding to each password is not
With.
In some embodiments, the data processing equipment that the present invention provides can input the behaviour of password in response to user
Make, according to the corresponding relation of the password preserved with data access authority, obtain the data access authority corresponding with described password, hold
The operation that row is corresponding with described data access authority.
In some embodiments, the described corresponding relation according to the password preserved with data access authority, obtain and institute
State the data access authority that first password is corresponding, perform the operation corresponding with described data access authority and include: when receiving number
During according to access request, if data access rights corresponding to described first password is limited to full access right, shows and access completely
The total data content that authority is corresponding;When receiving data access request, if the data access rights that described first password is corresponding
When being limited to part access rights, show the part data content corresponding with part access rights.
In some embodiments, described when receiving data access request, if the data that described first password is corresponding
When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving money
When gold inquiry and/or fund allocation request, if data access rights corresponding to described first password is limited to full access right, permit
Family allowable is inquired about and/or processes whole funds account corresponding to corresponding with described user name;Described when receiving data visit
When asking request, if data access rights corresponding to described first password is limited to part access rights, show and part access rights
Corresponding part data content includes: when receiving fund inquiry and/or fund allocation request, if described first password is corresponding
Data access rights when being limited to part access rights, it is allowed to user's inquiry and/or process the account institute corresponding with described user name
Corresponding part fund;The amount of described part fund is by user setup.Illustrate, such as, at the bank field, can arrange
Main password and secondary password.Wherein, use main password can log in the account with full access right, such as, can inquire institute
State the whole funds under account, it is possible to carry out corresponding operation process for described whole funds, operation etc. of such as transferring accounts.Again
As, use secondary password with the account of login user, but the part fund inquiring under the account of user can be merely able to, and for institute
State part fund and carry out corresponding operation process.Wherein, the amount of part fund can be arranged by user or system.This set
The mode of putting with the fund security of effective guarantee user, and can provide data processing method flexibly.Illustrate, if user's quilt
Kidnapping, the freedom of person of user is limited, and is often forced bank card and password are informed kidnapper, causes the big of user's fund
Amount loss.According to the method for the present invention, user can inform kidnapper's pair password, makes kidnapper be merely able to the number corresponding to secondary password
Operating according to the part fund under access rights, the limit of described part fund can be set by the user, so that user
Monetary losses controlled.Further, if judging, when the first password that user inputs is default alarm cipher, report to be triggered
The transmission of alarming information.This mode is particularly suitable for above-mentioned sight, and user can pre-set secondary password, when system is sent out
When existing user uses secondary password login, automatically trigger warning, such that it is able to send warning message to public security system so that public security
System is scouted in advance or intervenes, and effectively protects the personal safety of user.
In some embodiments, it is also possible to a more weak secondary password of intensity is set.Described secondary password can log in, but
Without any data access authority, it is served only for finding illegally to log in.Illustrate, if running into lawless person to use exhaustive violence of Denging
When cracking attack, the password that generally intensity is weak during cracking first is cracked.Weak close of intensity as described in lawless person uses
Code logs in, then data processing equipment judges when described password is alarm cipher, directly triggers to attack and reports to the police, i.e. sends alarm signal
Breath.When implementing, described warning message can point out server to occur in that illegal login, it is also possible to prompting user occurs in that non-
Method logs in.
In some embodiments, described when receiving data access request, if the data that described first password is corresponding
When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving visiting
When asking the request of contact person, if data access rights corresponding to described first password is limited to full access right, show to user
All associated person informations;It is described when receiving data access request, if data access rights corresponding to described first password is limited to
During part access rights, show that the part data content corresponding with part access rights includes: access contact person's when receiving
During request, if data access rights corresponding to described first password is limited to part access rights, show and described part authority pair
The part associated person information answered.
Illustrate, can be the multiple login password of same account setup, authorize different for different login passwords
Authority.Such as, user needs to log in the immediate communication tools such as such as QQ in public sometimes, but worries that password is revealed
The leakage of personal information can be caused.At this moment, can be by arranging different secondary password logins to obtain different data access rights
Limit.Such as, the most main password login, it can be seen that all associated person informations of packet;If using secondary close in public
Code 1 logs in, it can be seen that be grouped into the associated person information of household;If using secondary password 2 to log in public, it can be seen that point
Group is the associated person information etc. of affiliate.Concrete arranging can be the most flexibly, is not defined at this.
Illustrate again, when mobile phone unlocks, different unlocking pins can be set, thus give different data accesses
Authority.Such as, using that main password is unlocked it can be seen that whole associated person informations, use that secondary password is unlocked is permissible
See part associated person information.Described unlocking pin may refer to stricture of vagina password, it is also possible to is numerical ciphers, it is also possible to is that gesture is close
Code.Illustrating, can arrange right hand forefinger is main password, and right hand middle finger is secondary password etc..
In some embodiments, described when receiving data access request, if the data that described first password is corresponding
When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving exhibition
When showing the request of application interface, if data access rights corresponding to described first password is limited to full access right, show with complete
The icon of whole application that full access rights are corresponding;It is described when receiving data access request, if described first password is corresponding
Data access rights when being limited to part access rights, show that the part data content corresponding with part access rights includes: when connecing
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part access rights, hidden
Hide the icon at certain applications interface, show the icon of the certain applications corresponding with described part access rights.
Illustrate, in the prior art, existed and the application of secret protection can be set be not displayed, only user
During input password, the method that the application being hidden can be checked.But the defect of this method is that user to input every time
Password, can see the application being hidden, and inconvenient.The method that the application present invention provides, can be set using main password
During unblock, the icon of whole application of display user;And when using secondary password to unlock, some application are hidden and are not displayed.
So, when user's mobile phone uses mobile phone, the icon of all application can be shown;And other people are when using the mobile phone of user,
Can use secondary password login, the application that user is not intended to be seen by other people will be hidden, and effectively protect the data of user
Privacy.
In some embodiments, described method also includes: display user interface, wherein, and the use that different passwords is corresponding
Interface, family is identical.When implementing, the different pieces of information access rights that different passwords is corresponding, but use different passwords to step on
During record, the user interface of displaying is all identical, so so that the setting of user data access rights can not be by stranger
Perception, improves experience.Such as Net silver logs in, and the user interface after main password logs in secondary password n is the most identical, is simply seen
The amount of money authority arrived is different.And main password is set, the step of secondary password can be placed on bank counter and carry out.
In other embodiments, when using different password logins, the user interface of displaying is different.Illustrate,
If user inputs first password, then obtain the data access authority corresponding with first password, show the number corresponding with first password
According to the user interface that access rights are corresponding;Wherein, the user interface that different pieces of information access rights are corresponding is different.
In some embodiments, one of them password at least two password of user setup is only in the default time
In length effectively or only in default login times effectively.Illustrating, certain secondary password was served only within certain period
Use, or can only be used for logging in finite number of time, exceeding the time limit or beyond no longer valid after rationally logging in number of times.So for one
A little application scenarios needing interim open authority, eliminate the potential safety hazard after password diffusion.
Data processing method to the present invention has carried out introducing in detail above, it should be noted that these are only example
Property explanation, be not intended as limitation of the present invention.
See Fig. 2, the data processing equipment schematic diagram provided for one embodiment of the invention.
A kind of data processing equipment 200, including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Its
In, the data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access rights in response to user
The corresponding relation of limit, obtains the data access authority corresponding with described first password, performs corresponding with described data access authority
Operation.
Further, described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access that described first password is corresponding
When authority is full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access that described first password is corresponding
When authority is part access rights, show the part data content corresponding with part access rights.
Further, described first processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name.
Described second processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding
During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name;
The amount of described part fund is by user setup.
Further, described first processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely
During authority, show whole associated person information to user;
Described second processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses
During authority, show the part associated person information corresponding with described part authority.
Further, described first processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely
When asking authority, show the icon of the whole application corresponding with full access right;
Described second processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits
When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described device also includes:
Interface display unit, is used for showing user interface;Wherein, the user interface that different passwords is corresponding is identical, or,
The user interface that different passwords is corresponding is different.
Further, described device also includes:
Alarm unit, for when described first password is default alarm cipher, sends warning message.
Further, described arrange unit specifically for:
Preserving at least two password, one of them password in described at least two password is only in default time span
Effectively or only in default login times effectively.
Wherein, the setting of apparatus of the present invention each unit or module is referred to the method shown in Fig. 1 and realizes, and does not goes to live in the household of one's in-laws on getting married at this
State.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention
Its embodiment.It is contemplated that contain any modification, purposes or the adaptations of the present invention, these modification, purposes or
Person's adaptations is followed the general principle of the present invention and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to a reality
Body or operation separate with another entity or operating space, and deposit between not necessarily requiring or imply these entities or operating
Relation or order in any this reality.And, term " includes ", " comprising " or its any other variant are intended to
Comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that those are wanted
Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment
Intrinsic key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that
Including process, method, article or the equipment of described key element there is also other identical element.The present invention can be by calculating
Described in the general context of the computer executable instructions that machine performs, such as program module.Usually, program module includes holding
Row particular task or realize the routine of particular abstract data type, program, object, assembly, data structure etc..Can also divide
Cloth computing environment puts into practice the present invention, in these distributed computing environment, by connected long-range by communication network
Processing equipment performs task.In a distributed computing environment, program module may be located at this locality including storage device
With in remote computer storage medium.
Each embodiment in this specification all uses the mode gone forward one by one to describe, identical similar portion between each embodiment
Dividing and see mutually, what each embodiment stressed is the difference with other embodiments.Real especially for device
For executing example, owing to it is substantially similar to embodiment of the method, so describing fairly simple, relevant part sees embodiment of the method
Part illustrate.Device embodiment described above is only schematically, wherein said illustrates as separating component
Unit can be or may not be physically separate, the parts shown as unit can be or may not be
Physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Can be according to the actual needs
Select some or all of module therein to realize the purpose of the present embodiment scheme.Those of ordinary skill in the art are not paying
In the case of creative work, i.e. it is appreciated that and implements.The above is only the detailed description of the invention of the present invention, it should refer to
Go out, for those skilled in the art, under the premise without departing from the principles of the invention, it is also possible to make some
Improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.
Claims (10)
1. a data processing method, it is characterised in that including:
In response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, different passwords is corresponding
Data access authority different;
Input the operation of first password in response to user, according to the corresponding relation of the password preserved with data access authority, obtain
The data access authority corresponding with described first password, performs the operation corresponding with described data access authority.
Method the most according to claim 1, it is characterised in that described right according to the password and the data access authority that preserve
Should be related to, obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority
Including:
When receiving data access request, if data access rights corresponding to described first password is limited to full access right,
Show the total data content corresponding with full access right;
When receiving data access request, if data access rights corresponding to described first password is limited to part access rights,
Show the part data content corresponding with part access rights.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described
When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right
Including:
When receiving fund inquiry and/or fund allocation request, if data access rights corresponding to described first password has been limited to
During full access rights, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights
Time, show that the part data content corresponding with part access rights includes:
When receiving fund inquiry and/or fund allocation request, if data access rights corresponding to described first password is limited to portion
When dividing access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name;Described
The amount of part fund is by user setup.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described
When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right
Including:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to full access right
Time, show whole associated person information to user;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights
Time, show that the part data content corresponding with part access rights includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part access rights
Time, show the part associated person information corresponding with described part authority.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described
When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right
Including:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to complete access right
In limited time, the icon of the whole application corresponding with full access right is shown;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights
Time, show that the part data content corresponding with part access rights includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part access right
In limited time, the icon of hidden parts application, show the icon of the certain applications corresponding with described part access rights.
Method the most according to claim 1, it is characterised in that described method also includes:
Display user interface;Wherein, the user interface that different passwords is corresponding is identical, or, the user that different passwords is corresponding
Interface is different.
Method the most according to claim 1, it is characterised in that described method also includes:
When described first password is default alarm cipher, send warning message.
Method the most according to claim 1, it is characterised in that described password includes at least two password, described at least two
One of them password in individual password only in default time span effectively or only in default login times effectively.
9. a data processing equipment, it is characterised in that including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Wherein,
The data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access authority in response to user
Corresponding relation, obtains the data access authority corresponding with described first password, performs the behaviour corresponding with described data access authority
Make.
Device the most according to claim 9, it is characterised in that described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access authority that described first password is corresponding
During for full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access authority that described first password is corresponding
During for part access rights, show the part data content corresponding with part access rights.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610425831.2A CN106096384A (en) | 2016-06-15 | 2016-06-15 | A kind of data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610425831.2A CN106096384A (en) | 2016-06-15 | 2016-06-15 | A kind of data processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096384A true CN106096384A (en) | 2016-11-09 |
Family
ID=57236049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610425831.2A Pending CN106096384A (en) | 2016-06-15 | 2016-06-15 | A kind of data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096384A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107180173A (en) * | 2017-04-27 | 2017-09-19 | 上海与德科技有限公司 | unlocking method and device |
CN108052828A (en) * | 2017-12-26 | 2018-05-18 | 广东欧珀移动通信有限公司 | Generation method, device, terminal and the storage medium of record screen file |
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
CN113704812A (en) * | 2021-07-16 | 2021-11-26 | 杭州医康慧联科技股份有限公司 | Dynamic configuration method for user access browsing authority |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN103049685A (en) * | 2013-01-23 | 2013-04-17 | 天津三星光电子有限公司 | User multi-code management system and method |
CN105590368A (en) * | 2014-10-22 | 2016-05-18 | 蒋兴佩 | Method for starting alarm by using emergency password based on password input terminal |
-
2016
- 2016-06-15 CN CN201610425831.2A patent/CN106096384A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN103049685A (en) * | 2013-01-23 | 2013-04-17 | 天津三星光电子有限公司 | User multi-code management system and method |
CN105590368A (en) * | 2014-10-22 | 2016-05-18 | 蒋兴佩 | Method for starting alarm by using emergency password based on password input terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107180173A (en) * | 2017-04-27 | 2017-09-19 | 上海与德科技有限公司 | unlocking method and device |
CN108052828A (en) * | 2017-12-26 | 2018-05-18 | 广东欧珀移动通信有限公司 | Generation method, device, terminal and the storage medium of record screen file |
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
CN113704812A (en) * | 2021-07-16 | 2021-11-26 | 杭州医康慧联科技股份有限公司 | Dynamic configuration method for user access browsing authority |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Soomro et al. | Social media-related cybercrimes and techniques for their prevention | |
CN110226165A (en) | Pass through updatable data structure detection electronic penetration person | |
US20140211944A1 (en) | System and method of protecting, storing and decrypting keys over a computerized network | |
CN106104563A (en) | The technology of network security is provided by the account just opened on time | |
CN102160059A (en) | Authorization of server operations | |
CN105432056A (en) | Secure hybrid file-sharing system | |
CN105827574B (en) | A kind of file access system, method and device | |
CN106411823B (en) | A kind of access control method and relevant device based on CDN | |
CN106612259A (en) | Identity recognition method and device, service information processing method and device and biological feature information processing method and device | |
CN105357196A (en) | Network login method and system | |
CN106096384A (en) | A kind of data processing method and device | |
CN106302332B (en) | Access control method, the apparatus and system of user data | |
US9443093B2 (en) | Policy enforcement delays | |
US11275842B2 (en) | Systems and methods for evaluating security of third-party applications | |
CN109587103A (en) | For executing the method, apparatus and cloud system of the application in cloud system | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
Ezekiel | Hackers, spies, and stolen secrets: Protecting law firms from data theft | |
CN106295423A (en) | A kind of method for exhibiting data and client | |
Dakpa et al. | Study of phishing attacks and preventions | |
US10963582B1 (en) | Apparatus and method for enabling owner authorized monitored stewardship over protected data in computing devices | |
Kovalchuk et al. | The dark web worldwide 2020: anonymous vs safety | |
CN107181589A (en) | A kind of fort machine private key management method and device | |
KR101158336B1 (en) | Virtual space system and method for managing access of personal information database | |
CN102655496A (en) | Logging method, system and device | |
CN105827597A (en) | Method for managing internet account number and password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |
|
RJ01 | Rejection of invention patent application after publication |