CN113297545A - Anti-theft management method used in software development process - Google Patents

Anti-theft management method used in software development process Download PDF

Info

Publication number
CN113297545A
CN113297545A CN202110533917.8A CN202110533917A CN113297545A CN 113297545 A CN113297545 A CN 113297545A CN 202110533917 A CN202110533917 A CN 202110533917A CN 113297545 A CN113297545 A CN 113297545A
Authority
CN
China
Prior art keywords
manager
developer
level
software development
development
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110533917.8A
Other languages
Chinese (zh)
Inventor
林士杰
雷龙生
庄冰冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Bo Net Science And Technology Co ltd
Original Assignee
Shenzhen Bo Net Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Bo Net Science And Technology Co ltd filed Critical Shenzhen Bo Net Science And Technology Co ltd
Priority to CN202110533917.8A priority Critical patent/CN113297545A/en
Publication of CN113297545A publication Critical patent/CN113297545A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses an anti-theft management method used in a software development process, which particularly relates to the field of computer application and comprises the following steps: s1, respectively registering identity information of a manager and a developer, and setting corresponding authorities of the manager and the developer through an authority module; and S2, after acquiring the authority, the manager selects the software development project and manages the authority of the developer through the development resource library. According to the method, managers and developers are graded, the managers in the same grade manage the developers in the same grade, and the authorities of the managers and the developers are set by the authority modules respectively, so that the developers cannot acquire the project resources of the development resource library, and the managers in different grades acquire the project resources of the development resource library differently, so that the developers can be prevented from leaking the project resources of the development resource library, and the leakage of the project resources of the development resource library by the managers is reduced.

Description

Anti-theft management method used in software development process
Technical Field
The invention relates to the technical field of computer application, in particular to an anti-theft management method used in a software development process.
Background
Software development is the process of building a software system or software parts in a system according to the requirements of a software developer. In the process of software development, stages of software requirement design, software model design, software code writing, software testing and the like are usually involved, and different software developers often perform the stages in different software development stages. Software development is the process of building a software system or software parts in a system according to user requirements. Software development is a system engineering that includes requirement capture, requirement analysis, design, implementation, and testing. Software is typically implemented in a programming language. Development is typically possible using software development tools. Software is divided into system software and application software, and includes not only programs that can be run on a computer, but files related to these programs are also generally considered to be part of the software. The general process of the software design idea and method includes the algorithm and method for designing the function and implementation of the software, the overall structural design and module design of the software, programming and debugging, program joint debugging and testing, and writing and submitting the program.
However, in actual use, in the software development process, software development project resources are easy to be stolen by developers, so that company information is leaked, and therefore an anti-theft management method used in the software development process is provided.
Disclosure of Invention
In order to overcome the above-mentioned drawbacks of the prior art, embodiments of the present invention provide an anti-theft management method for software development process, so as to solve the problems mentioned in the above background art.
In order to achieve the purpose, the invention provides the following technical scheme: an anti-theft management method used in a software development process comprises the following steps:
s1, respectively registering identity information of a manager and a developer, and setting corresponding authorities of the manager and the developer through an authority module;
s2, after acquiring the authority, the manager selects the software development project and manages the authority of the developer through the development resource library;
s3, when software development is carried out by developers, identity authentication is needed, after the authentication is successful, managers carry out secondary authentication on the authority of the developers, and after the secondary authentication is successful, the developers obtain corresponding development projects;
s4, after acquiring the corresponding development project, when needing to look up the data in the development resource library, needing to apply corresponding authority to the manager, after the manager authorizes, the developer enters the database in the development resource library;
s5, an information pushing module and a login duration counting module are arranged in the development resource library, the information pushing module is used for pushing the specific contents browsed by the developers to the managers, and meanwhile, the login duration of the developers is counted by the aid of the duration counting module;
s6, the developer develops the software according to the data, and after the software development is completed, the developer displays the software to a manager through a display module;
and S7, testing the displayed software by the manager, and upgrading the manager of the corresponding development project and the authority of the developer after the software is tested successfully.
Further, the permission setting mode of the manager in step S1 is to divide the level of the manager, and the manager is divided into a first-level manager, a second-level manager, and a third-level manager according to the completion condition of the development project of the manager.
Further, the permission setting mode of the developer in step S1 is to divide the level of the developer into a first-level developer, a second-level developer and a third-level developer in sequence according to the completion condition of the development project of the developer, and the first-level developer, the second-level developer and the third-level developer are managed by a first-level manager, a second-level manager and a third-level manager respectively.
Further, the development resource library in step S2 is divided into a resource library and a database, the resource library is used for storing resources of software development projects, the database is used for storing related knowledge data of software development, the administrator can obtain the authority of the resource library and the database through the authority module, and the developer can only obtain the authority of the database through the authority module.
Further, in step S2, after obtaining the authority, the manager selects the software development project with the corresponding level according to the level of the manager, and manages the developer with the corresponding level according to the level of the manager.
Furthermore, the grades of the software development projects are divided according to resources in a development resource library, the software development projects formulated by the resources with low development difficulty are listed as first-level software development projects, the software development projects formulated by the resources with medium development difficulty are listed as second-level software development projects, the software development projects formulated by the resources with high development difficulty are listed as third-level software development projects, and the third-level software development projects are displayed to managers of corresponding grades through the authority modules.
Further, in the step S7, the manager tests the software through the corresponding testing module.
Further, the authority upgrading method of the administrator and the developer in the step S7 specifically includes:
s71, when the levels of the managers and the developers are first level, the number of completed first-level software development projects exceeds ten, and the managers and the developers promote to second level;
and S72, when the level of the managers and the developers is two levels, the number of completed second-level software development projects exceeds twenty, and the managers and the developers promote to three levels.
The invention has the technical effects and advantages that:
according to the method and the system, managers and developers are graded, the managers in the same grade manage the developers in the same grade, and the authorities of the managers and the developers are respectively set by the authority modules, so that the developers cannot acquire the project resources of the development resource library, and meanwhile, the managers in different grades acquire the project resources of the development resource library differently, so that the project resources contacted by the managers in different grades are different, the leakage of the project resources of the development resource library by the developers can be avoided, and the leakage of the project resources of the development resource library by the managers can be reduced.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides an anti-theft management method used in a software development process, which comprises the following steps:
s1, respectively registering identity information of a manager and a developer, and setting corresponding authorities of the manager and the developer through an authority module;
the permission setting mode of the manager in the step S1 is to divide the level of the manager, and divide the manager into a first-level manager, a second-level manager and a third-level manager in sequence according to the completion condition of the development project of the manager;
the permission setting mode of the developer in the step S1 is to divide the developer into classes, and the classes are divided into a first-class developer, a second-class developer and a third-class developer in sequence according to the completion condition of the development project of the developer, and the first-class developer, the second-class developer and the third-class developer are managed by a first-class manager, a second-class manager and a third-class manager respectively;
s2, after acquiring the authority, the manager selects the software development project and manages the authority of the developer through the development resource library;
the development resource library in the step S2 is divided into a resource library and a database, the resource library is used for storing resources of software development projects, the database is used for storing related knowledge data of software development, the administrator can obtain the authority of the resource library and the database through the authority module, and the developer can only obtain the authority of the database through the authority module;
in step S2, after obtaining the authority, the manager selects the software development project of the corresponding level according to the level of the manager, registers personal information of the manager, and manages the developer of the corresponding level according to the level of the manager;
the level of the software development project is divided according to the resources in the development resource library, the software development project formulated by the resources with low development difficulty is listed as a first-level software development project, the software development project formulated by the resources with medium development difficulty is listed as a second-level software development project, the software development project formulated by the resources with high development difficulty is listed as a third-level software development project, and the third-level software development project is displayed to the manager with the corresponding level through the authority module;
s3, when software development is carried out by developers, identity authentication is needed, after the authentication is successful, managers carry out secondary authentication on the authority of the developers, and after the secondary authentication is successful, the developers obtain corresponding development projects;
s4, after acquiring the corresponding development project, when needing to look up the data in the development resource library, needing to apply corresponding authority to the manager, after the manager authorizes, the developer enters the database in the development resource library;
s5, an information pushing module and a login duration counting module are arranged in the development resource library, the information pushing module is used for pushing the specific contents browsed by the developers to the managers, and meanwhile, the login duration of the developers is counted by the aid of the duration counting module;
s6, the developer develops the software according to the data, and after the software development is completed, the developer displays the software to a manager through a display module;
s7, testing the displayed software by a manager, and upgrading the manager of the corresponding development project and the authority of the developer after the software is successfully tested;
in the step S7, the manager tests the software through the corresponding test module;
the authority upgrading method of the manager and the developer in the step S7 specifically includes:
s71, when the levels of the managers and the developers are first level, the number of completed first-level software development projects exceeds ten, and the managers and the developers promote to second level;
and S72, when the level of the managers and the developers is two levels, the number of completed second-level software development projects exceeds twenty, and the managers and the developers promote to three levels.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (8)

1. An anti-theft management method used in a software development process is characterized by comprising the following steps:
s1, respectively registering identity information of a manager and a developer, and setting corresponding authorities of the manager and the developer through an authority module;
s2, after acquiring the authority, the manager selects the software development project and manages the authority of the developer through the development resource library;
s3, when software development is carried out by developers, identity authentication is needed, after the authentication is successful, managers carry out secondary authentication on the authority of the developers, and after the secondary authentication is successful, the developers obtain corresponding development projects;
s4, after acquiring the corresponding development project, when needing to look up the data in the development resource library, needing to apply corresponding authority to the manager, after the manager authorizes, the developer enters the database in the development resource library;
s5, an information pushing module and a login duration counting module are arranged in the development resource library, the information pushing module is used for pushing the specific contents browsed by the developers to the managers, and meanwhile, the login duration of the developers is counted by the aid of the duration counting module;
s6, the developer develops the software according to the data, and after the software development is completed, the developer displays the software to a manager through a display module;
and S7, testing the displayed software by the manager, and upgrading the manager of the corresponding development project and the authority of the developer after the software is tested successfully.
2. The anti-theft management method for software development process according to claim 1, characterized in that: the permission setting mode of the manager in the step S1 is specifically to divide the level of the manager, and the manager is divided into a first-level manager, a second-level manager, and a third-level manager in sequence according to the completion condition of the development project of the manager.
3. The anti-theft management method for software development process according to claim 2, characterized in that: the permission setting mode of the developer in step S1 is to divide the developer into classes, and sequentially divide the developer into a first-class developer, a second-class developer and a third-class developer according to the completion condition of the development project of the developer, and the first-class developer, the second-class developer and the third-class developer are managed by a first-class manager, a second-class manager and a third-class manager respectively.
4. The anti-theft management method for software development process according to claim 3, characterized in that: the development resource library in the step S2 is divided into a resource library and a database, the resource library is used for storing resources of software development projects, the database is used for storing related knowledge data of software development, the administrator can obtain the authority of the resource library and the database through the authority module, and the developer can only obtain the authority of the database through the authority module.
5. The anti-theft management method for software development process according to claim 4, characterized in that: in step S2, after obtaining the authority, the manager selects the software development project of the corresponding level according to the level of the manager, registers personal information of the manager, and manages the developer of the corresponding level according to the level of the manager.
6. The anti-theft management method for software development process according to claim 5, characterized in that: the level of the software development project is divided according to resources in a development resource library, the software development project formulated by the resources with low development difficulty is listed as a first-level software development project, the software development project formulated by the resources with medium development difficulty is listed as a second-level software development project, the software development project formulated by the resources with high development difficulty is listed as a third-level software development project, and the third-level software development project is displayed to a manager with a corresponding level through an authority module.
7. The anti-theft management method for software development process according to claim 1, characterized in that: in the step S7, the manager tests the software through the corresponding test module.
8. The method according to claim 1, wherein the authority upgrading mode of the manager and the developer in step S7 is specifically as follows:
s71, when the levels of the managers and the developers are first level, the number of completed first-level software development projects exceeds ten, and the managers and the developers promote to second level;
and S72, when the level of the managers and the developers is two levels, the number of completed second-level software development projects exceeds twenty, and the managers and the developers promote to three levels.
CN202110533917.8A 2021-05-17 2021-05-17 Anti-theft management method used in software development process Pending CN113297545A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110533917.8A CN113297545A (en) 2021-05-17 2021-05-17 Anti-theft management method used in software development process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110533917.8A CN113297545A (en) 2021-05-17 2021-05-17 Anti-theft management method used in software development process

Publications (1)

Publication Number Publication Date
CN113297545A true CN113297545A (en) 2021-08-24

Family

ID=77322454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110533917.8A Pending CN113297545A (en) 2021-05-17 2021-05-17 Anti-theft management method used in software development process

Country Status (1)

Country Link
CN (1) CN113297545A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283894A (en) * 2014-10-28 2015-01-14 用友软件股份有限公司 Method and device for managing service usage right
CN105046125A (en) * 2015-08-18 2015-11-11 浙江中烟工业有限责任公司 OA system application access method based on leveling system
CN110472928A (en) * 2019-07-16 2019-11-19 安徽嘉亨软件开发有限公司 A kind of software development management system
CN110598387A (en) * 2019-08-23 2019-12-20 安徽嘉亨软件开发有限公司 Control system for software developer
US20200076819A1 (en) * 2018-08-28 2020-03-05 Cobalt Iron, Inc. Dynamic authorization control system and method
CN112347443A (en) * 2020-12-10 2021-02-09 麟州(巨野)孵化器有限公司 Anti-theft management method used in software development process

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283894A (en) * 2014-10-28 2015-01-14 用友软件股份有限公司 Method and device for managing service usage right
CN105046125A (en) * 2015-08-18 2015-11-11 浙江中烟工业有限责任公司 OA system application access method based on leveling system
US20200076819A1 (en) * 2018-08-28 2020-03-05 Cobalt Iron, Inc. Dynamic authorization control system and method
CN110472928A (en) * 2019-07-16 2019-11-19 安徽嘉亨软件开发有限公司 A kind of software development management system
CN110598387A (en) * 2019-08-23 2019-12-20 安徽嘉亨软件开发有限公司 Control system for software developer
CN112347443A (en) * 2020-12-10 2021-02-09 麟州(巨野)孵化器有限公司 Anti-theft management method used in software development process

Similar Documents

Publication Publication Date Title
Memon Automatically repairing event sequence-based GUI test suites for regression testing
US8151248B1 (en) Method and system for software defect management
CN111522734B (en) Software function testing method and device, electronic equipment and storage medium
CN111897721B (en) Automatic testing method of API (application program interface) and storage medium
Brown et al. Software testing
CN111274136B (en) Onboard software test management system and test process management method
Anand et al. Testing resource allocation for software with multiple versions
Zheng et al. Dappscan: building large-scale datasets for smart contract weaknesses in dapp projects
Benzel Analysis of a kemel verification
CN113297545A (en) Anti-theft management method used in software development process
Santos-Neto et al. Requirements for information systems model-based testing
Paul End-to-end integration testing
CN111258556A (en) Software development management system
Motan et al. Android app testing: A model for generating automated lifecycle tests
Cheh et al. Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery
Oladimeji et al. Levels of testing
CN115982055B (en) Test method special for java language development program
Liu et al. An automatic testing platform for object-oriented software based on code coverage
Elliott et al. A process for developing safe software
CN113094281B (en) Test method and device for hybrid App
CN117195183B (en) Data security compliance risk assessment system
Haller The test data challenge for database-driven applications.
Zhai et al. Implementation and automatic testing for security enhancement of linux based on least privilege
CN115374008A (en) Information system defect testing method and device based on decision tree and electronic equipment
CN118152276A (en) Operating system testing method and device based on grading strategy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210824

RJ01 Rejection of invention patent application after publication