CN109672679A - System login method and its interactive system based on double licensing schemes - Google Patents
System login method and its interactive system based on double licensing schemes Download PDFInfo
- Publication number
- CN109672679A CN109672679A CN201811583007.5A CN201811583007A CN109672679A CN 109672679 A CN109672679 A CN 109672679A CN 201811583007 A CN201811583007 A CN 201811583007A CN 109672679 A CN109672679 A CN 109672679A
- Authority
- CN
- China
- Prior art keywords
- user
- permission
- ordinary
- system server
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses system login methods and its interactive system based on double licensing schemes, are related to communication interaction technical field.The present invention includes ordinary user by accessing system after logging in authentication;System server is also that user sets user property and saves to user information database, for judging user right;User right corresponding with user property is also stored in user information database;User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit does not pass through, ordinary user not can enter correspondence system.The present invention realizes the control for accessing user system by the double authorizations of user, it is accessible according to safety regulation or security strategy control user and oneself authorized resource can only be accessed, the safety for realizing system O&M improves system working efficiency with resource necessary to user is guaranteed.
Description
Technical field
The invention belongs to communication interaction technical field, more particularly to based on double licensing schemes system login method and its
Interactive system.
Background technique
System login authentication is all used to user in many plateform systems and logs in authentication, existing platform or system login
When, it is authenticated only with password corresponding with the user name stored in customer data base.General System can all take user to award
The mode of power accesses user the control of system to realize, controlling user according to specified safety regulation or security strategy can
To access and can only access oneself authorized resource, to guarantee the safe handling of system operatio and data.But it is stepping on
After recording platform or system, it is sometimes desirable to different user is distinguished, part system webpage be inconvenient ordinary user's access and
Administrator sometimes needs to access all system pages, facilitates management.This will be treated with a certain discrimination, different user is arranged different
Permission is imperative.
The present invention provides a kind of system login method and its interactive system based on double licensing schemes, more using security mechanism
High double licensing schemes guarantee the operation and data safety of system.
Summary of the invention
The purpose of the present invention is to provide system login methods and its interactive system based on double licensing schemes, pass through user
The controls for accessing user system are realized in double authorizations, accessible and only according to safety regulation or security strategy control user
Oneself authorized resource can be accessed, safer system maintenance is realized.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
The present invention is the system login method based on double licensing schemes, includes the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
The user's registration specifically includes as follows:
User submits user name, login password to system server;The system server saves user name and logs in close
Code is to user information database;The system server is also that user sets user property and saves to user information database, for judging
User right;
User right corresponding with user property is also stored in the user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit is not
Pass through, then ordinary user not can enter correspondence system;
The permission authentication specifically includes as follows:
The system server obtains user property and user's power according to the user name of ordinary user from user information database
Limit;The system server obtains the permission of the access system from the system permission library;The system server judgement
Whether user right is higher than the subsystem permission in system permission library;If so, permission authenticates successfully, the system server is returned
The page of access system;If it is not, then permission failed authentication, the system server return to the failed authentication page.
Preferably, the access system also includes several different subsystems;The different subsystems are reviewed use respectively
Family imparting system permission;System permission corresponding with different sub-systems is stored in the system permission library.
Preferably, the method also includes: user right application and user right changes;
The user right application specifically includes as follows: the ordinary user is by submitting application to prove to system server
And it stores into system permission library;The system server is forwarded to corresponding audit of audit user after receiving submission application
System;
The user right modification specifically includes as follows: the audit user proves that judgement application proves whether according to application
It is qualified;If so, audit user changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not,
It then returns to ordinary user and applies for that proof is unqualified.
The interactive system of system login method based on double licensing schemes, comprising: system server, user log in end, power
Limit audit end;
The user logs in end and registers for ordinary user to system server and logged in by Login Register subsystem;
It further includes authority application module that the user, which logs in end,;The authority application module is for submitting application to prove to system service
Device;
User information database and system permission library are provided in the system server;The user information database is for saving
User information;The user information specifically includes: user name, login password, user property, user right and application prove;
The corresponding permission of different sub-systems is stored in the system permission library;
The authentication end is used to be arranged and audit the permission that user audits ordinary user;The authentication end
Authentication subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so,
User is audited to change the attribute for corresponding to ordinary user and permission and store into user information database;If it is not, then returning to common use
Family application proves unqualified.
The invention has the following advantages:
1, the present invention realizes the control for accessing user system by the double authorizations of user, according to safety regulation or safe plan
Slightly control user is accessible and can only access oneself authorized resource, that is, the safety of system O&M is realized, with guarantor
Resource necessary to user is demonstrate,proved, system working efficiency is improved.
2, the present invention logs in end to system server application permission by user, and by authentication end according to submission
Application proves imparting permission, ensure that the safety of each subsystem access authority, while facilitating user management and system resource
Distribution reduces overhead.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow chart of the system login method of the invention based on double licensing schemes.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is the system login method based on double licensing schemes, include the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
User's registration specifically includes as follows:
User submits user name, login password to system server;System server saves user name and login password extremely
User information database;System server is also that user sets user property and saves to user information database, for judging user right;
User right corresponding with user property is also stored in user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit is not
Pass through, then ordinary user not can enter correspondence system;
Permission authentication specifically includes as follows:
System server obtains user property and user right according to the user name of ordinary user from user information database;System
System server obtains the permission of access system from system permission library;System server judges whether user right is higher than system power
Limit the subsystem permission in library;If so, permission authenticates successfully, the page of system server backward reference system;If it is not, then permission
Failed authentication, system server return to the failed authentication page.
Wherein, access system also includes several different subsystems;Different sub-systems are reviewed user's imparting system respectively
Permission;System permission corresponding with different sub-systems is stored in system permission library.
Wherein, method further include: user right application and user right change;
User right application specifically includes as follows: by submitting, application is proved to system server ordinary user and storage is arrived
In system permission library;System server is forwarded to the corresponding audit subsystem of audit user after receiving submission application;
User right modification specifically includes as follows: audit user proves that judgement application proves whether qualification according to application;If
It is then to audit user to change the attribute for corresponding to ordinary user and permission and store into user information database;If it is not, then returning general
General family application proves unqualified.
The interactive system of system login method based on double licensing schemes, comprising: system server, user log in end, power
Limit audit end;
User logs in end and registers for ordinary user to system server and logged in by Login Register subsystem;User
Logging in end further includes authority application module;Authority application module is for submitting application to prove to system server;
User information database and system permission library are provided in system server;User information database is for saving user's letter
Breath;User information specifically includes: user name, login password, user property, user right and application prove;System permission library
The corresponding permission of middle storage different sub-systems;
Authentication end is used to be arranged and audit the permission that user audits ordinary user;The authentication at authentication end
Subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so, audit user
It changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then returning to ordinary user applies for card
It is bright unqualified.
The present invention in actual use, when ordinary user by user log in end registration when, transmit user name and
Login password is to system server;When system server is that registration user sets attribute and the corresponding permission of the attribute.
When ordinary user's login system access different sub-systems, it is corresponding that system server can compare user property
Permission whether meet the system permission of the subsystem demands, if meeting, then system server echoes subsystem and uses to common
Family;If not meeting, insufficient permission is echoed.
It is that ordinary user is logged in end and uploaded by user to be applied proving to system service when ordinary user wants application permission
Device;System server proves application after receiving ordinary user's application and user information is transferred to authentication end;Audit
User is proving whether qualification by the audit application of authentication end;If qualified then to the user attribute and user right
It modifies and stores in user information database, ensure that the safety of system while facilitating the management of system resource.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodiment
Point, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specific
Title is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above method
It is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storage
In matter.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment
All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,
It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention
Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only
It is limited by claims and its full scope and equivalent.
Claims (4)
1. the system login method based on double licensing schemes, which is characterized in that include the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
The user's registration specifically includes as follows:
User submits user name, login password to system server;The system server saves user name and login password extremely
User information database;The system server is also that user sets user property and saves to user information database, for judging user
Permission;
User right corresponding with user property is also stored in the user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If auditing obstructed
It crosses, then ordinary user not can enter correspondence system;
The permission authentication specifically includes as follows:
The system server obtains user property and user right according to the user name of ordinary user from user information database;Institute
State the permission that system server obtains the access system from the system permission library;The system server judges that user weighs
Whether limit is higher than the subsystem permission in system permission library;If so, permission authenticates successfully, system server backward reference system
The page of system;If it is not, then permission failed authentication, the system server return to the failed authentication page.
2. the system login method according to claim 1 based on double licensing schemes, which is characterized in that the access system
It also include several different subsystems;The different subsystems are reviewed user's imparting system permission respectively;The system permission
System permission corresponding with different sub-systems is stored in library.
3. the system login method according to claim 1 based on double licensing schemes, which is characterized in that the method is also wrapped
It includes: user right application and user right change;
The user right application specifically includes as follows: the ordinary user is by submitting application to prove to system server and depositing
It stores up in system permission library;The system server is forwarded to the corresponding audit subsystem of audit user after receiving submission application
System;
The user right modification specifically includes as follows: the audit user proves that judgement application proves whether to close according to application
Lattice;If so, audit user changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then
It returns to ordinary user and applies for that proof is unqualified.
4. the interactive system of the system login method based on double licensing schemes as described in claim 1-3 is any one, feature
It is, comprising: system server, user log in end, authentication end;
The user logs in end and registers for ordinary user to system server and logged in by Login Register subsystem;It is described
It further includes authority application module that user, which logs in end,;The authority application module is for submitting application to prove to system server;
User information database and system permission library are provided in the system server;The user information database is for saving user
Information;The user information specifically includes: user name, login password, user property, user right and application prove;It is described
The corresponding permission of different sub-systems is stored in system permission library;
The authentication end is used to be arranged and audit the permission that user audits ordinary user;The permission at the authentication end
Audit subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so, audit
User changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then returning to ordinary user Shen
It please prove unqualified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811583007.5A CN109672679A (en) | 2018-12-24 | 2018-12-24 | System login method and its interactive system based on double licensing schemes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811583007.5A CN109672679A (en) | 2018-12-24 | 2018-12-24 | System login method and its interactive system based on double licensing schemes |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109672679A true CN109672679A (en) | 2019-04-23 |
Family
ID=66147350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811583007.5A Pending CN109672679A (en) | 2018-12-24 | 2018-12-24 | System login method and its interactive system based on double licensing schemes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109672679A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120110662A1 (en) * | 2010-10-31 | 2012-05-03 | Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. | User Indentification with Capacitive Touchscreen |
CN102567675A (en) * | 2012-02-15 | 2012-07-11 | 合一网络技术(北京)有限公司 | User authority management method and system in business system |
CN103971200A (en) * | 2014-04-29 | 2014-08-06 | 上海上讯信息技术股份有限公司 | Computer operation and maintenance management method and system |
CN105205580A (en) * | 2014-06-30 | 2015-12-30 | 青岛日日顺物流有限公司 | Authority setting method and system |
CN105871577A (en) * | 2015-01-22 | 2016-08-17 | 阿里巴巴集团控股有限公司 | Method and device for managing resource privilege |
CN106685955A (en) * | 2016-12-28 | 2017-05-17 | 武汉微创光电股份有限公司 | Radius-based video monitoring platform security certification method |
CN106682487A (en) * | 2016-11-04 | 2017-05-17 | 浙江蘑菇加电子商务有限公司 | User authority management method and system |
-
2018
- 2018-12-24 CN CN201811583007.5A patent/CN109672679A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120110662A1 (en) * | 2010-10-31 | 2012-05-03 | Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. | User Indentification with Capacitive Touchscreen |
CN102567675A (en) * | 2012-02-15 | 2012-07-11 | 合一网络技术(北京)有限公司 | User authority management method and system in business system |
CN103971200A (en) * | 2014-04-29 | 2014-08-06 | 上海上讯信息技术股份有限公司 | Computer operation and maintenance management method and system |
CN105205580A (en) * | 2014-06-30 | 2015-12-30 | 青岛日日顺物流有限公司 | Authority setting method and system |
CN105871577A (en) * | 2015-01-22 | 2016-08-17 | 阿里巴巴集团控股有限公司 | Method and device for managing resource privilege |
CN106682487A (en) * | 2016-11-04 | 2017-05-17 | 浙江蘑菇加电子商务有限公司 | User authority management method and system |
CN106685955A (en) * | 2016-12-28 | 2017-05-17 | 武汉微创光电股份有限公司 | Radius-based video monitoring platform security certification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8533797B2 (en) | Using windows authentication in a workgroup to manage application users | |
CN110197058B (en) | Unified internal control security management method, system, medium and electronic device | |
CN108292331B (en) | Method and system for creating, verifying and managing identities | |
US10754826B2 (en) | Techniques for securely sharing files from a cloud storage | |
CN103310161B (en) | A kind of means of defence for Database Systems and system | |
CN109670768A (en) | Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain | |
WO2019052496A1 (en) | Account authentication method for cloud storage, and server | |
CN104468553B (en) | A kind of method, apparatus and system that public account logs in | |
CN104754058A (en) | Intelligent finance and tax service platform based on SaaS platform | |
CN102546664A (en) | User and authority management method and system for distributed file system | |
CN104718526A (en) | Secure mobile framework | |
CN110149328A (en) | Interface method for authenticating, device, equipment and computer readable storage medium | |
CN102571873B (en) | Bidirectional security audit method and device in distributed system | |
CN110417820A (en) | Processing method, device and the readable storage medium storing program for executing of single-node login system | |
CN105354482B (en) | A kind of single-point logging method and device | |
CN105049445B (en) | A kind of access control method and free-standing access controller | |
CN109347831A (en) | A kind of double authentication safety access system and method based on UKey certification | |
CN109547432A (en) | Multisystem verification method and device, storage medium and electronic equipment | |
CN110348237A (en) | Data managing method and device, storage medium, electronic equipment based on block chain | |
CN101330474A (en) | System and method for managing and controlling consumer authority | |
CN110830512A (en) | Multi-platform unified authentication system based on domain account | |
CN108667818A (en) | The method of cloud device and cloud net end Collaborative Control access rights | |
CN106375332A (en) | Network safe browsing method and device | |
CN107395577B (en) | Large-scale electric power enterprise salary safety coefficient | |
CN106921616A (en) | A kind of single-point logging method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190423 |
|
RJ01 | Rejection of invention patent application after publication |