CN106096384A - A kind of data processing method and device - Google Patents

A kind of data processing method and device Download PDF

Info

Publication number
CN106096384A
CN106096384A CN201610425831.2A CN201610425831A CN106096384A CN 106096384 A CN106096384 A CN 106096384A CN 201610425831 A CN201610425831 A CN 201610425831A CN 106096384 A CN106096384 A CN 106096384A
Authority
CN
China
Prior art keywords
password
data access
access rights
data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610425831.2A
Other languages
Chinese (zh)
Inventor
付仲平
袁永贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing WatchData System Co Ltd
Beijing WatchSmart Technologies Co Ltd
Original Assignee
Beijing WatchSmart Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchSmart Technologies Co Ltd filed Critical Beijing WatchSmart Technologies Co Ltd
Priority to CN201610425831.2A priority Critical patent/CN106096384A/en
Publication of CN106096384A publication Critical patent/CN106096384A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of data processing method and device, and described method includes: in response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, the data access authority that different passwords is corresponding is different;Input the operation of first password in response to user, according to the corresponding relation of the password preserved with data access authority, obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority.The password that the present invention can be different arranges different data access authorities, improves the safety of data, and provided the user more abundant, apply flexibly.

Description

A kind of data processing method and device
Technical field
The present embodiments relate to field of computer technology, be specifically related to a kind of data processing method and device.
Background technology
In prior art, in order to realize the identification to user identity and checking, user is needed to input user name in client And password, server end the username and password submitted user to is verified, checks that the user name that user submits to is corresponding The password that password preserves with server end is the most consistent, if unanimously, it is determined that user is validated user;If it is inconsistent, Determine that user is illegal user, then can refuse user's login.After user logins successfully, then can enjoy corresponding service. At present, the such as application such as Web bank, E-mail address, online game, online payment, microblogging is all that this login mechanism of use is User provides service.
But, when the username and password of user account is revealed or is stolen, existing login method can not be protected The safety of card user account.Additionally, username and password is one to one in prior art, user can not be for same , there is the defect that motility is the strongest in the authority that account setup is different.
Summary of the invention
Embodiments providing a kind of data processing method and device, it is different close to be that same account is arranged Code, and corresponding different authority, effectively protect user profile, property safety, and improve the motility that user uses.
To this end, the embodiment of the present invention following technical scheme of offer:
First aspect, embodiments provides a kind of data processing method, including:
In response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, different passwords Corresponding data access authority is different;
The operation of first password is inputted in response to user, according to the corresponding relation of the password preserved with data access authority, Obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority.
Further, the described corresponding relation according to the password and the data access authority that preserve, obtain first close with described The data access authority that code is corresponding, performs the operation corresponding with described data access authority and includes:
When receiving data access request, if data access rights corresponding to described first password is limited to full access right Time, show the total data content corresponding with full access right;
When receiving data access request, if data access rights corresponding to described first password is limited to part access rights Time, show the part data content corresponding with part access rights.
Further, described when receiving data access request, if the data access authority that described first password is corresponding During for full access right, show that the total data content corresponding with full access right includes:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses During authority, show that the part data content corresponding with part access rights includes:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name; The amount of described part fund is by user setup.
Further, described when receiving data access request, if the data access authority that described first password is corresponding During for full access right, show that the total data content corresponding with full access right includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely During authority, show whole associated person information to user;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses During authority, show that the part data content corresponding with part access rights includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses During authority, show the part associated person information corresponding with described part authority.
Further, described when receiving data access request, if the data access authority that described first password is corresponding During for full access right, show that the total data content corresponding with full access right includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely When asking authority, show the icon of the whole application corresponding with full access right;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part and accesses During authority, show that the part data content corresponding with part access rights includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described method also includes:
Display user interface;Wherein, the user interface that different passwords is corresponding is identical, or, different passwords is corresponding User interface is different.
Further, described method also includes:
When described first password is default alarm cipher, send warning message.
Further, described password includes at least two password, and one of them password in described at least two password is only In default time span effectively or only in default login times effectively.
Second aspect, embodiments provides a kind of data processing equipment, including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Its In, the data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access rights in response to user The corresponding relation of limit, obtains the data access authority corresponding with described first password, performs corresponding with described data access authority Operation.
Further, described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access that described first password is corresponding When authority is full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access that described first password is corresponding When authority is part access rights, show the part data content corresponding with part access rights.
Further, described first processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name.
Described second processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name; The amount of described part fund is by user setup.
Further, described first processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely During authority, show whole associated person information to user;
Described second processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses During authority, show the part associated person information corresponding with described part authority.
Further, described first processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely When asking authority, show the icon of the whole application corresponding with full access right;
Described second processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described processing unit specifically includes:
Show the user interface that the data access authority corresponding with first password is corresponding;Wherein, different pieces of information access rights Corresponding user interface is different.
Further, described device also includes:
Alarm unit, for when described first password is default alarm cipher, sends warning message.
Further, described arrange unit specifically for:
Preserving at least two password, one of them password in described at least two password is only in default time span Effectively or only in default login times effectively.
The embodiment of the present invention provide data processing method and device, can in response to the request of user, arrange two or Plural password, and preserve the corresponding relation of password and password with data access authority;Wherein, different passwords is corresponding Data access authority is different.When user uses first password to log in, corresponding with data access authority according to the password preserved Relation, obtains the data access authority corresponding with described first password, performs the operation corresponding with described data access authority.This The password that invention can be different arranges different data access authorities, improves the safety of data, and has provided the user more Add abundant, apply flexibly.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments described in invention, for those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawing can also be obtained according to these accompanying drawings.
The data processing method flow chart that Fig. 1 provides for one embodiment of the invention;
Fig. 2 is the block diagram according to a kind of data processing equipment shown in an exemplary embodiment.
Detailed description of the invention
Embodiments providing a kind of data processing method and device, the password that can be different arranges different power Limit, effectively protects user profile, property safety, and improves the motility that user uses.
For the technical scheme making those skilled in the art be more fully understood that in the present invention, real below in conjunction with the present invention Execute the accompanying drawing in example, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described enforcement Example is only a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under not making creative work premise, all should belong to present invention protection Scope.
See Fig. 1, the data processing method flow chart provided for one embodiment of the invention.As it is shown in figure 1, may include that
S101, in response to the operation that arranges of user, preserves the corresponding relation of password and data access authority;Wherein, different Data access authority corresponding to password different.
S102, inputs the operation of first password in response to user, corresponding with data access authority according to the password preserved Relation, obtains the data access authority corresponding with described first password, performs the operation corresponding with described data access authority.
When implementing, user can arrange two or more password, and arranges difference for different passwords Authority.The data processing equipment that the embodiment of the present invention provides, can preserve password and data in response to the operation that arranges of user The corresponding relation of access rights.
In some embodiments, if relating to use user name to carry out logging in or the scene of data access, one is also entered Step preserves the corresponding relation of user name and at least two password, and, described password and the corresponding relation of data access authority.Also That is, for same account, two or more password can be set, data access authority corresponding to each password is not With.
In some embodiments, the data processing equipment that the present invention provides can input the behaviour of password in response to user Make, according to the corresponding relation of the password preserved with data access authority, obtain the data access authority corresponding with described password, hold The operation that row is corresponding with described data access authority.
In some embodiments, the described corresponding relation according to the password preserved with data access authority, obtain and institute State the data access authority that first password is corresponding, perform the operation corresponding with described data access authority and include: when receiving number During according to access request, if data access rights corresponding to described first password is limited to full access right, shows and access completely The total data content that authority is corresponding;When receiving data access request, if the data access rights that described first password is corresponding When being limited to part access rights, show the part data content corresponding with part access rights.
In some embodiments, described when receiving data access request, if the data that described first password is corresponding When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving money When gold inquiry and/or fund allocation request, if data access rights corresponding to described first password is limited to full access right, permit Family allowable is inquired about and/or processes whole funds account corresponding to corresponding with described user name;Described when receiving data visit When asking request, if data access rights corresponding to described first password is limited to part access rights, show and part access rights Corresponding part data content includes: when receiving fund inquiry and/or fund allocation request, if described first password is corresponding Data access rights when being limited to part access rights, it is allowed to user's inquiry and/or process the account institute corresponding with described user name Corresponding part fund;The amount of described part fund is by user setup.Illustrate, such as, at the bank field, can arrange Main password and secondary password.Wherein, use main password can log in the account with full access right, such as, can inquire institute State the whole funds under account, it is possible to carry out corresponding operation process for described whole funds, operation etc. of such as transferring accounts.Again As, use secondary password with the account of login user, but the part fund inquiring under the account of user can be merely able to, and for institute State part fund and carry out corresponding operation process.Wherein, the amount of part fund can be arranged by user or system.This set The mode of putting with the fund security of effective guarantee user, and can provide data processing method flexibly.Illustrate, if user's quilt Kidnapping, the freedom of person of user is limited, and is often forced bank card and password are informed kidnapper, causes the big of user's fund Amount loss.According to the method for the present invention, user can inform kidnapper's pair password, makes kidnapper be merely able to the number corresponding to secondary password Operating according to the part fund under access rights, the limit of described part fund can be set by the user, so that user Monetary losses controlled.Further, if judging, when the first password that user inputs is default alarm cipher, report to be triggered The transmission of alarming information.This mode is particularly suitable for above-mentioned sight, and user can pre-set secondary password, when system is sent out When existing user uses secondary password login, automatically trigger warning, such that it is able to send warning message to public security system so that public security System is scouted in advance or intervenes, and effectively protects the personal safety of user.
In some embodiments, it is also possible to a more weak secondary password of intensity is set.Described secondary password can log in, but Without any data access authority, it is served only for finding illegally to log in.Illustrate, if running into lawless person to use exhaustive violence of Denging When cracking attack, the password that generally intensity is weak during cracking first is cracked.Weak close of intensity as described in lawless person uses Code logs in, then data processing equipment judges when described password is alarm cipher, directly triggers to attack and reports to the police, i.e. sends alarm signal Breath.When implementing, described warning message can point out server to occur in that illegal login, it is also possible to prompting user occurs in that non- Method logs in.
In some embodiments, described when receiving data access request, if the data that described first password is corresponding When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving visiting When asking the request of contact person, if data access rights corresponding to described first password is limited to full access right, show to user All associated person informations;It is described when receiving data access request, if data access rights corresponding to described first password is limited to During part access rights, show that the part data content corresponding with part access rights includes: access contact person's when receiving During request, if data access rights corresponding to described first password is limited to part access rights, show and described part authority pair The part associated person information answered.
Illustrate, can be the multiple login password of same account setup, authorize different for different login passwords Authority.Such as, user needs to log in the immediate communication tools such as such as QQ in public sometimes, but worries that password is revealed The leakage of personal information can be caused.At this moment, can be by arranging different secondary password logins to obtain different data access rights Limit.Such as, the most main password login, it can be seen that all associated person informations of packet;If using secondary close in public Code 1 logs in, it can be seen that be grouped into the associated person information of household;If using secondary password 2 to log in public, it can be seen that point Group is the associated person information etc. of affiliate.Concrete arranging can be the most flexibly, is not defined at this.
Illustrate again, when mobile phone unlocks, different unlocking pins can be set, thus give different data accesses Authority.Such as, using that main password is unlocked it can be seen that whole associated person informations, use that secondary password is unlocked is permissible See part associated person information.Described unlocking pin may refer to stricture of vagina password, it is also possible to is numerical ciphers, it is also possible to is that gesture is close Code.Illustrating, can arrange right hand forefinger is main password, and right hand middle finger is secondary password etc..
In some embodiments, described when receiving data access request, if the data that described first password is corresponding When access rights are full access right, show that the total data content corresponding with full access right includes: when receiving exhibition When showing the request of application interface, if data access rights corresponding to described first password is limited to full access right, show with complete The icon of whole application that full access rights are corresponding;It is described when receiving data access request, if described first password is corresponding Data access rights when being limited to part access rights, show that the part data content corresponding with part access rights includes: when connecing When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part access rights, hidden Hide the icon at certain applications interface, show the icon of the certain applications corresponding with described part access rights.
Illustrate, in the prior art, existed and the application of secret protection can be set be not displayed, only user During input password, the method that the application being hidden can be checked.But the defect of this method is that user to input every time Password, can see the application being hidden, and inconvenient.The method that the application present invention provides, can be set using main password During unblock, the icon of whole application of display user;And when using secondary password to unlock, some application are hidden and are not displayed. So, when user's mobile phone uses mobile phone, the icon of all application can be shown;And other people are when using the mobile phone of user, Can use secondary password login, the application that user is not intended to be seen by other people will be hidden, and effectively protect the data of user Privacy.
In some embodiments, described method also includes: display user interface, wherein, and the use that different passwords is corresponding Interface, family is identical.When implementing, the different pieces of information access rights that different passwords is corresponding, but use different passwords to step on During record, the user interface of displaying is all identical, so so that the setting of user data access rights can not be by stranger Perception, improves experience.Such as Net silver logs in, and the user interface after main password logs in secondary password n is the most identical, is simply seen The amount of money authority arrived is different.And main password is set, the step of secondary password can be placed on bank counter and carry out.
In other embodiments, when using different password logins, the user interface of displaying is different.Illustrate, If user inputs first password, then obtain the data access authority corresponding with first password, show the number corresponding with first password According to the user interface that access rights are corresponding;Wherein, the user interface that different pieces of information access rights are corresponding is different.
In some embodiments, one of them password at least two password of user setup is only in the default time In length effectively or only in default login times effectively.Illustrating, certain secondary password was served only within certain period Use, or can only be used for logging in finite number of time, exceeding the time limit or beyond no longer valid after rationally logging in number of times.So for one A little application scenarios needing interim open authority, eliminate the potential safety hazard after password diffusion.
Data processing method to the present invention has carried out introducing in detail above, it should be noted that these are only example Property explanation, be not intended as limitation of the present invention.
See Fig. 2, the data processing equipment schematic diagram provided for one embodiment of the invention.
A kind of data processing equipment 200, including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Its In, the data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access rights in response to user The corresponding relation of limit, obtains the data access authority corresponding with described first password, performs corresponding with described data access authority Operation.
Further, described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access that described first password is corresponding When authority is full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access that described first password is corresponding When authority is part access rights, show the part data content corresponding with part access rights.
Further, described first processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for full access right, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name.
Described second processing unit specifically for:
When receiving fund inquiry and/or fund allocation request, if the data access authority that described first password is corresponding During for part access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name; The amount of described part fund is by user setup.
Further, described first processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to access completely During authority, show whole associated person information to user;
Described second processing unit specifically for:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part and accesses During authority, show the part associated person information corresponding with described part authority.
Further, described first processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to visit completely When asking authority, show the icon of the whole application corresponding with full access right;
Described second processing unit specifically for:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part and visits When asking authority, the icon of hidden parts application interface, show the icon of the certain applications corresponding with described part access rights.
Further, described device also includes:
Interface display unit, is used for showing user interface;Wherein, the user interface that different passwords is corresponding is identical, or, The user interface that different passwords is corresponding is different.
Further, described device also includes:
Alarm unit, for when described first password is default alarm cipher, sends warning message.
Further, described arrange unit specifically for:
Preserving at least two password, one of them password in described at least two password is only in default time span Effectively or only in default login times effectively.
Wherein, the setting of apparatus of the present invention each unit or module is referred to the method shown in Fig. 1 and realizes, and does not goes to live in the household of one's in-laws on getting married at this State.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention Its embodiment.It is contemplated that contain any modification, purposes or the adaptations of the present invention, these modification, purposes or Person's adaptations is followed the general principle of the present invention and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to a reality Body or operation separate with another entity or operating space, and deposit between not necessarily requiring or imply these entities or operating Relation or order in any this reality.And, term " includes ", " comprising " or its any other variant are intended to Comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that those are wanted Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment Intrinsic key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that Including process, method, article or the equipment of described key element there is also other identical element.The present invention can be by calculating Described in the general context of the computer executable instructions that machine performs, such as program module.Usually, program module includes holding Row particular task or realize the routine of particular abstract data type, program, object, assembly, data structure etc..Can also divide Cloth computing environment puts into practice the present invention, in these distributed computing environment, by connected long-range by communication network Processing equipment performs task.In a distributed computing environment, program module may be located at this locality including storage device With in remote computer storage medium.
Each embodiment in this specification all uses the mode gone forward one by one to describe, identical similar portion between each embodiment Dividing and see mutually, what each embodiment stressed is the difference with other embodiments.Real especially for device For executing example, owing to it is substantially similar to embodiment of the method, so describing fairly simple, relevant part sees embodiment of the method Part illustrate.Device embodiment described above is only schematically, wherein said illustrates as separating component Unit can be or may not be physically separate, the parts shown as unit can be or may not be Physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Can be according to the actual needs Select some or all of module therein to realize the purpose of the present embodiment scheme.Those of ordinary skill in the art are not paying In the case of creative work, i.e. it is appreciated that and implements.The above is only the detailed description of the invention of the present invention, it should refer to Go out, for those skilled in the art, under the premise without departing from the principles of the invention, it is also possible to make some Improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. a data processing method, it is characterised in that including:
In response to the operation that arranges of user, preserve the corresponding relation of password and data access authority;Wherein, different passwords is corresponding Data access authority different;
Input the operation of first password in response to user, according to the corresponding relation of the password preserved with data access authority, obtain The data access authority corresponding with described first password, performs the operation corresponding with described data access authority.
Method the most according to claim 1, it is characterised in that described right according to the password and the data access authority that preserve Should be related to, obtain the data access authority corresponding with described first password, perform the operation corresponding with described data access authority Including:
When receiving data access request, if data access rights corresponding to described first password is limited to full access right, Show the total data content corresponding with full access right;
When receiving data access request, if data access rights corresponding to described first password is limited to part access rights, Show the part data content corresponding with part access rights.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right Including:
When receiving fund inquiry and/or fund allocation request, if data access rights corresponding to described first password has been limited to During full access rights, it is allowed to user inquires about and/or processes whole funds account corresponding to corresponding with described user name;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights Time, show that the part data content corresponding with part access rights includes:
When receiving fund inquiry and/or fund allocation request, if data access rights corresponding to described first password is limited to portion When dividing access rights, it is allowed to user inquires about and/or processes part fund account corresponding to corresponding with described user name;Described The amount of part fund is by user setup.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right Including:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to full access right Time, show whole associated person information to user;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights Time, show that the part data content corresponding with part access rights includes:
When receiving the request accessing contact person, if data access rights corresponding to described first password is limited to part access rights Time, show the part associated person information corresponding with described part authority.
Method the most according to claim 2, it is characterised in that described when receiving data access request, if described When the data access rights that one password is corresponding is limited to full access right, show the total data content corresponding with full access right Including:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to complete access right In limited time, the icon of the whole application corresponding with full access right is shown;
It is described when receiving data access request, if data access rights corresponding to described first password is limited to part access rights Time, show that the part data content corresponding with part access rights includes:
When receiving the request showing application interface, if data access rights corresponding to described first password is limited to part access right In limited time, the icon of hidden parts application, show the icon of the certain applications corresponding with described part access rights.
Method the most according to claim 1, it is characterised in that described method also includes:
Display user interface;Wherein, the user interface that different passwords is corresponding is identical, or, the user that different passwords is corresponding Interface is different.
Method the most according to claim 1, it is characterised in that described method also includes:
When described first password is default alarm cipher, send warning message.
Method the most according to claim 1, it is characterised in that described password includes at least two password, described at least two One of them password in individual password only in default time span effectively or only in default login times effectively.
9. a data processing equipment, it is characterised in that including:
Unit is set, for the operation that arranges in response to user, preserves the corresponding relation of password and data access authority;Wherein, The data access authority that different passwords is corresponding is different;
Processing unit, for inputting the operation of first password, according to the password preserved and data access authority in response to user Corresponding relation, obtains the data access authority corresponding with described first password, performs the behaviour corresponding with described data access authority Make.
Device the most according to claim 9, it is characterised in that described processing unit specifically includes:
First processing unit, is used for when receiving data access request, if the data access authority that described first password is corresponding During for full access right, show the total data content corresponding with full access right;
Second processing unit, is used for when receiving data access request, if the data access authority that described first password is corresponding During for part access rights, show the part data content corresponding with part access rights.
CN201610425831.2A 2016-06-15 2016-06-15 A kind of data processing method and device Pending CN106096384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610425831.2A CN106096384A (en) 2016-06-15 2016-06-15 A kind of data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610425831.2A CN106096384A (en) 2016-06-15 2016-06-15 A kind of data processing method and device

Publications (1)

Publication Number Publication Date
CN106096384A true CN106096384A (en) 2016-11-09

Family

ID=57236049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610425831.2A Pending CN106096384A (en) 2016-06-15 2016-06-15 A kind of data processing method and device

Country Status (1)

Country Link
CN (1) CN106096384A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
CN108052828A (en) * 2017-12-26 2018-05-18 广东欧珀移动通信有限公司 Generation method, device, terminal and the storage medium of record screen file
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment
CN113704812A (en) * 2021-07-16 2021-11-26 杭州医康慧联科技股份有限公司 Dynamic configuration method for user access browsing authority

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881228A (en) * 2005-06-14 2006-12-20 华为技术有限公司 Method for controlling system account right
CN103049685A (en) * 2013-01-23 2013-04-17 天津三星光电子有限公司 User multi-code management system and method
CN105590368A (en) * 2014-10-22 2016-05-18 蒋兴佩 Method for starting alarm by using emergency password based on password input terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881228A (en) * 2005-06-14 2006-12-20 华为技术有限公司 Method for controlling system account right
CN103049685A (en) * 2013-01-23 2013-04-17 天津三星光电子有限公司 User multi-code management system and method
CN105590368A (en) * 2014-10-22 2016-05-18 蒋兴佩 Method for starting alarm by using emergency password based on password input terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
CN108052828A (en) * 2017-12-26 2018-05-18 广东欧珀移动通信有限公司 Generation method, device, terminal and the storage medium of record screen file
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment
CN113704812A (en) * 2021-07-16 2021-11-26 杭州医康慧联科技股份有限公司 Dynamic configuration method for user access browsing authority

Similar Documents

Publication Publication Date Title
Soomro et al. Social media-related cybercrimes and techniques for their prevention
CN110226165A (en) Pass through updatable data structure detection electronic penetration person
US20140211944A1 (en) System and method of protecting, storing and decrypting keys over a computerized network
CN106104563A (en) The technology of network security is provided by the account just opened on time
CN102160059A (en) Authorization of server operations
CN105432056A (en) Secure hybrid file-sharing system
CN105827574B (en) A kind of file access system, method and device
CN106411823B (en) A kind of access control method and relevant device based on CDN
CN106612259A (en) Identity recognition method and device, service information processing method and device and biological feature information processing method and device
CN105357196A (en) Network login method and system
CN106096384A (en) A kind of data processing method and device
CN106302332B (en) Access control method, the apparatus and system of user data
US9443093B2 (en) Policy enforcement delays
US11275842B2 (en) Systems and methods for evaluating security of third-party applications
CN109587103A (en) For executing the method, apparatus and cloud system of the application in cloud system
CN107040520A (en) A kind of cloud computing data-sharing systems and method
Ezekiel Hackers, spies, and stolen secrets: Protecting law firms from data theft
CN106295423A (en) A kind of method for exhibiting data and client
Dakpa et al. Study of phishing attacks and preventions
US10963582B1 (en) Apparatus and method for enabling owner authorized monitored stewardship over protected data in computing devices
Kovalchuk et al. The dark web worldwide 2020: anonymous vs safety
CN107181589A (en) A kind of fort machine private key management method and device
KR101158336B1 (en) Virtual space system and method for managing access of personal information database
CN102655496A (en) Logging method, system and device
CN105827597A (en) Method for managing internet account number and password

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161109

RJ01 Rejection of invention patent application after publication