CN109672679A - System login method and its interactive system based on double licensing schemes - Google Patents

System login method and its interactive system based on double licensing schemes Download PDF

Info

Publication number
CN109672679A
CN109672679A CN201811583007.5A CN201811583007A CN109672679A CN 109672679 A CN109672679 A CN 109672679A CN 201811583007 A CN201811583007 A CN 201811583007A CN 109672679 A CN109672679 A CN 109672679A
Authority
CN
China
Prior art keywords
user
permission
ordinary
system server
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811583007.5A
Other languages
Chinese (zh)
Inventor
陈绪龙
黄红亮
龚佳鑫
钟虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Jing Bang Software Technology Co Ltd
Original Assignee
Anhui Jing Bang Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Jing Bang Software Technology Co Ltd filed Critical Anhui Jing Bang Software Technology Co Ltd
Priority to CN201811583007.5A priority Critical patent/CN109672679A/en
Publication of CN109672679A publication Critical patent/CN109672679A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses system login methods and its interactive system based on double licensing schemes, are related to communication interaction technical field.The present invention includes ordinary user by accessing system after logging in authentication;System server is also that user sets user property and saves to user information database, for judging user right;User right corresponding with user property is also stored in user information database;User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit does not pass through, ordinary user not can enter correspondence system.The present invention realizes the control for accessing user system by the double authorizations of user, it is accessible according to safety regulation or security strategy control user and oneself authorized resource can only be accessed, the safety for realizing system O&M improves system working efficiency with resource necessary to user is guaranteed.

Description

System login method and its interactive system based on double licensing schemes
Technical field
The invention belongs to communication interaction technical field, more particularly to based on double licensing schemes system login method and its Interactive system.
Background technique
System login authentication is all used to user in many plateform systems and logs in authentication, existing platform or system login When, it is authenticated only with password corresponding with the user name stored in customer data base.General System can all take user to award The mode of power accesses user the control of system to realize, controlling user according to specified safety regulation or security strategy can To access and can only access oneself authorized resource, to guarantee the safe handling of system operatio and data.But it is stepping on After recording platform or system, it is sometimes desirable to different user is distinguished, part system webpage be inconvenient ordinary user's access and Administrator sometimes needs to access all system pages, facilitates management.This will be treated with a certain discrimination, different user is arranged different Permission is imperative.
The present invention provides a kind of system login method and its interactive system based on double licensing schemes, more using security mechanism High double licensing schemes guarantee the operation and data safety of system.
Summary of the invention
The purpose of the present invention is to provide system login methods and its interactive system based on double licensing schemes, pass through user The controls for accessing user system are realized in double authorizations, accessible and only according to safety regulation or security strategy control user Oneself authorized resource can be accessed, safer system maintenance is realized.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
The present invention is the system login method based on double licensing schemes, includes the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
The user's registration specifically includes as follows:
User submits user name, login password to system server;The system server saves user name and logs in close Code is to user information database;The system server is also that user sets user property and saves to user information database, for judging User right;
User right corresponding with user property is also stored in the user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit is not Pass through, then ordinary user not can enter correspondence system;
The permission authentication specifically includes as follows:
The system server obtains user property and user's power according to the user name of ordinary user from user information database Limit;The system server obtains the permission of the access system from the system permission library;The system server judgement Whether user right is higher than the subsystem permission in system permission library;If so, permission authenticates successfully, the system server is returned The page of access system;If it is not, then permission failed authentication, the system server return to the failed authentication page.
Preferably, the access system also includes several different subsystems;The different subsystems are reviewed use respectively Family imparting system permission;System permission corresponding with different sub-systems is stored in the system permission library.
Preferably, the method also includes: user right application and user right changes;
The user right application specifically includes as follows: the ordinary user is by submitting application to prove to system server And it stores into system permission library;The system server is forwarded to corresponding audit of audit user after receiving submission application System;
The user right modification specifically includes as follows: the audit user proves that judgement application proves whether according to application It is qualified;If so, audit user changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, It then returns to ordinary user and applies for that proof is unqualified.
The interactive system of system login method based on double licensing schemes, comprising: system server, user log in end, power Limit audit end;
The user logs in end and registers for ordinary user to system server and logged in by Login Register subsystem; It further includes authority application module that the user, which logs in end,;The authority application module is for submitting application to prove to system service Device;
User information database and system permission library are provided in the system server;The user information database is for saving User information;The user information specifically includes: user name, login password, user property, user right and application prove; The corresponding permission of different sub-systems is stored in the system permission library;
The authentication end is used to be arranged and audit the permission that user audits ordinary user;The authentication end Authentication subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so, User is audited to change the attribute for corresponding to ordinary user and permission and store into user information database;If it is not, then returning to common use Family application proves unqualified.
The invention has the following advantages:
1, the present invention realizes the control for accessing user system by the double authorizations of user, according to safety regulation or safe plan Slightly control user is accessible and can only access oneself authorized resource, that is, the safety of system O&M is realized, with guarantor Resource necessary to user is demonstrate,proved, system working efficiency is improved.
2, the present invention logs in end to system server application permission by user, and by authentication end according to submission Application proves imparting permission, ensure that the safety of each subsystem access authority, while facilitating user management and system resource Distribution reduces overhead.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow chart of the system login method of the invention based on double licensing schemes.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is the system login method based on double licensing schemes, include the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
User's registration specifically includes as follows:
User submits user name, login password to system server;System server saves user name and login password extremely User information database;System server is also that user sets user property and saves to user information database, for judging user right;
User right corresponding with user property is also stored in user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If audit is not Pass through, then ordinary user not can enter correspondence system;
Permission authentication specifically includes as follows:
System server obtains user property and user right according to the user name of ordinary user from user information database;System System server obtains the permission of access system from system permission library;System server judges whether user right is higher than system power Limit the subsystem permission in library;If so, permission authenticates successfully, the page of system server backward reference system;If it is not, then permission Failed authentication, system server return to the failed authentication page.
Wherein, access system also includes several different subsystems;Different sub-systems are reviewed user's imparting system respectively Permission;System permission corresponding with different sub-systems is stored in system permission library.
Wherein, method further include: user right application and user right change;
User right application specifically includes as follows: by submitting, application is proved to system server ordinary user and storage is arrived In system permission library;System server is forwarded to the corresponding audit subsystem of audit user after receiving submission application;
User right modification specifically includes as follows: audit user proves that judgement application proves whether qualification according to application;If It is then to audit user to change the attribute for corresponding to ordinary user and permission and store into user information database;If it is not, then returning general General family application proves unqualified.
The interactive system of system login method based on double licensing schemes, comprising: system server, user log in end, power Limit audit end;
User logs in end and registers for ordinary user to system server and logged in by Login Register subsystem;User Logging in end further includes authority application module;Authority application module is for submitting application to prove to system server;
User information database and system permission library are provided in system server;User information database is for saving user's letter Breath;User information specifically includes: user name, login password, user property, user right and application prove;System permission library The corresponding permission of middle storage different sub-systems;
Authentication end is used to be arranged and audit the permission that user audits ordinary user;The authentication at authentication end Subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so, audit user It changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then returning to ordinary user applies for card It is bright unqualified.
The present invention in actual use, when ordinary user by user log in end registration when, transmit user name and Login password is to system server;When system server is that registration user sets attribute and the corresponding permission of the attribute.
When ordinary user's login system access different sub-systems, it is corresponding that system server can compare user property Permission whether meet the system permission of the subsystem demands, if meeting, then system server echoes subsystem and uses to common Family;If not meeting, insufficient permission is echoed.
It is that ordinary user is logged in end and uploaded by user to be applied proving to system service when ordinary user wants application permission Device;System server proves application after receiving ordinary user's application and user information is transferred to authentication end;Audit User is proving whether qualification by the audit application of authentication end;If qualified then to the user attribute and user right It modifies and stores in user information database, ensure that the safety of system while facilitating the management of system resource.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodiment Point, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specific Title is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above method It is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storage In matter.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (4)

1. the system login method based on double licensing schemes, which is characterized in that include the following:
Ordinary user is by accessing system after logging in authentication;
Wherein, user's registration is carried out before ordinary user is logged in first;
The user's registration specifically includes as follows:
User submits user name, login password to system server;The system server saves user name and login password extremely User information database;The system server is also that user sets user property and saves to user information database, for judging user Permission;
User right corresponding with user property is also stored in the user information database;
User is audited to authenticate normal user permission;If audit passes through, ordinary user enters correspondence system;If auditing obstructed It crosses, then ordinary user not can enter correspondence system;
The permission authentication specifically includes as follows:
The system server obtains user property and user right according to the user name of ordinary user from user information database;Institute State the permission that system server obtains the access system from the system permission library;The system server judges that user weighs Whether limit is higher than the subsystem permission in system permission library;If so, permission authenticates successfully, system server backward reference system The page of system;If it is not, then permission failed authentication, the system server return to the failed authentication page.
2. the system login method according to claim 1 based on double licensing schemes, which is characterized in that the access system It also include several different subsystems;The different subsystems are reviewed user's imparting system permission respectively;The system permission System permission corresponding with different sub-systems is stored in library.
3. the system login method according to claim 1 based on double licensing schemes, which is characterized in that the method is also wrapped It includes: user right application and user right change;
The user right application specifically includes as follows: the ordinary user is by submitting application to prove to system server and depositing It stores up in system permission library;The system server is forwarded to the corresponding audit subsystem of audit user after receiving submission application System;
The user right modification specifically includes as follows: the audit user proves that judgement application proves whether to close according to application Lattice;If so, audit user changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then It returns to ordinary user and applies for that proof is unqualified.
4. the interactive system of the system login method based on double licensing schemes as described in claim 1-3 is any one, feature It is, comprising: system server, user log in end, authentication end;
The user logs in end and registers for ordinary user to system server and logged in by Login Register subsystem;It is described It further includes authority application module that user, which logs in end,;The authority application module is for submitting application to prove to system server;
User information database and system permission library are provided in the system server;The user information database is for saving user Information;The user information specifically includes: user name, login password, user property, user right and application prove;It is described The corresponding permission of different sub-systems is stored in system permission library;
The authentication end is used to be arranged and audit the permission that user audits ordinary user;The permission at the authentication end Audit subsystem is proved by obtaining the application of system server transmitting, proves application to judge whether qualification, if so, audit User changes the attribute for corresponding to ordinary user and permission and stores into user information database;If it is not, then returning to ordinary user Shen It please prove unqualified.
CN201811583007.5A 2018-12-24 2018-12-24 System login method and its interactive system based on double licensing schemes Pending CN109672679A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811583007.5A CN109672679A (en) 2018-12-24 2018-12-24 System login method and its interactive system based on double licensing schemes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811583007.5A CN109672679A (en) 2018-12-24 2018-12-24 System login method and its interactive system based on double licensing schemes

Publications (1)

Publication Number Publication Date
CN109672679A true CN109672679A (en) 2019-04-23

Family

ID=66147350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811583007.5A Pending CN109672679A (en) 2018-12-24 2018-12-24 System login method and its interactive system based on double licensing schemes

Country Status (1)

Country Link
CN (1) CN109672679A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120110662A1 (en) * 2010-10-31 2012-05-03 Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. User Indentification with Capacitive Touchscreen
CN102567675A (en) * 2012-02-15 2012-07-11 合一网络技术(北京)有限公司 User authority management method and system in business system
CN103971200A (en) * 2014-04-29 2014-08-06 上海上讯信息技术股份有限公司 Computer operation and maintenance management method and system
CN105205580A (en) * 2014-06-30 2015-12-30 青岛日日顺物流有限公司 Authority setting method and system
CN105871577A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Method and device for managing resource privilege
CN106685955A (en) * 2016-12-28 2017-05-17 武汉微创光电股份有限公司 Radius-based video monitoring platform security certification method
CN106682487A (en) * 2016-11-04 2017-05-17 浙江蘑菇加电子商务有限公司 User authority management method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120110662A1 (en) * 2010-10-31 2012-05-03 Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. User Indentification with Capacitive Touchscreen
CN102567675A (en) * 2012-02-15 2012-07-11 合一网络技术(北京)有限公司 User authority management method and system in business system
CN103971200A (en) * 2014-04-29 2014-08-06 上海上讯信息技术股份有限公司 Computer operation and maintenance management method and system
CN105205580A (en) * 2014-06-30 2015-12-30 青岛日日顺物流有限公司 Authority setting method and system
CN105871577A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Method and device for managing resource privilege
CN106682487A (en) * 2016-11-04 2017-05-17 浙江蘑菇加电子商务有限公司 User authority management method and system
CN106685955A (en) * 2016-12-28 2017-05-17 武汉微创光电股份有限公司 Radius-based video monitoring platform security certification method

Similar Documents

Publication Publication Date Title
US8533797B2 (en) Using windows authentication in a workgroup to manage application users
CN110197058B (en) Unified internal control security management method, system, medium and electronic device
CN108292331B (en) Method and system for creating, verifying and managing identities
US10754826B2 (en) Techniques for securely sharing files from a cloud storage
CN103310161B (en) A kind of means of defence for Database Systems and system
CN109670768A (en) Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain
WO2019052496A1 (en) Account authentication method for cloud storage, and server
CN104468553B (en) A kind of method, apparatus and system that public account logs in
CN104754058A (en) Intelligent finance and tax service platform based on SaaS platform
CN102546664A (en) User and authority management method and system for distributed file system
CN104718526A (en) Secure mobile framework
CN110149328A (en) Interface method for authenticating, device, equipment and computer readable storage medium
CN102571873B (en) Bidirectional security audit method and device in distributed system
CN110417820A (en) Processing method, device and the readable storage medium storing program for executing of single-node login system
CN105354482B (en) A kind of single-point logging method and device
CN105049445B (en) A kind of access control method and free-standing access controller
CN109347831A (en) A kind of double authentication safety access system and method based on UKey certification
CN109547432A (en) Multisystem verification method and device, storage medium and electronic equipment
CN110348237A (en) Data managing method and device, storage medium, electronic equipment based on block chain
CN101330474A (en) System and method for managing and controlling consumer authority
CN110830512A (en) Multi-platform unified authentication system based on domain account
CN108667818A (en) The method of cloud device and cloud net end Collaborative Control access rights
CN106375332A (en) Network safe browsing method and device
CN107395577B (en) Large-scale electric power enterprise salary safety coefficient
CN106921616A (en) A kind of single-point logging method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190423

RJ01 Rejection of invention patent application after publication