CN1235151C - Method of control system safety management - Google Patents

Method of control system safety management Download PDF

Info

Publication number
CN1235151C
CN1235151C CN 02150118 CN02150118A CN1235151C CN 1235151 C CN1235151 C CN 1235151C CN 02150118 CN02150118 CN 02150118 CN 02150118 A CN02150118 A CN 02150118A CN 1235151 C CN1235151 C CN 1235151C
Authority
CN
China
Prior art keywords
module
role
operation authority
independent operation
storehouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 02150118
Other languages
Chinese (zh)
Other versions
CN1493995A (en
Inventor
李方宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 02150118 priority Critical patent/CN1235151C/en
Publication of CN1493995A publication Critical patent/CN1493995A/en
Application granted granted Critical
Publication of CN1235151C publication Critical patent/CN1235151C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method of control system safety management and belongs to the technical field of safety of a computer system. The method comprises the following steps: basic operation authority modules of a system are first confirmed; one or a plurality of basic operation authority modules which are confirmed are summarized and combined into an independent operation authority module; one or a plurality of independent operation authority modules are assigned with a role module; the role module is assigned to a safe operation module of the system. When the safe operation module is started for system safety management control, the system parses the role module involved by the safe operation module. After the role module is parsed, an independent operation authority module of the safe operation module is obtained. The method of the present invention uses an authority and role define mechanism, any operation authority of an operator can be smartly collocated, and various operation roles can be conveniently defined by a user. Because the information of the independent operation authority and the independent operation role can be preserved by different methods, the independence is good.

Description

A kind of method of control system safety management
Technical field
The present invention relates to a kind of method of control system safety management, belong to the computer system security technical field.
Background technology
Because authentication, authorization and accounting server (hereinafter to be referred as aaa server) and charging, account system are in telecommunications, the operating importance of enterprise network, the client often requires server software when being easy to learn and use, and higher security and reliability are arranged.
For standard is carried out in management work, strengthen authority restriction simultaneously to different managerial personnel, system must provide perfect security management mechanism.Under the ever-increasing situation of operation equipment, the complexity of management is constantly aggravation also, for can standardized administration work, allow each most its duty of different managerial personnel, do not disturb mutually, unauthorized operation that also can the effective restraint unauthorized personnel simultaneously, integrated access management system (hereinafter to be referred as CAMS) must be used higher safety management strategy, with effective operation of safeguards system.
Limitation management scheme to operating right has much at present, system's using system administration module that has and security of system operational module operating right has been carried out the two-stage division, wherein system management module can be realized all operations authority to system, and system operation only can realize part operation authority (as realizing the authority of end user management), and double-stage operation administration authority two-stage is divided flow process as shown in Figure 1.But because the complicacy of CAMS system is carried multiple business under the framework of platform, therefore simple two-stage delineation of power can not be satisfied requirement of client far away.
The authority organization scheme that also has some and operating system/database to interrelate in addition, for example carry out delineation of power by operations such as reading and writing to database, it is organized into the operating right module of different brackets, and when increasing operational module, operational module is defined as different brackets, limit access profile and the operation rank of operational module with this to data.This implementation method as shown in Figure 2.
This implementation method can limit the read-write operation ability of operational module preferably, but because it is bound mutually with bottom framework (as operating system and database), therefore is subjected to the restriction of first floor system, has limited its dirigibility and portability.But its shortcoming is:
1, because the restriction of classification itself can not be divided each authority module of operation very thin, as previously mentioned, can only realize fuzzy control to the operating right module.For example defined " increase " authority,, just can increase all user data, clearly, lost its due dirigibility as long as have the operational module of this authority so;
2, because authority definition depends on operating system and database, therefore also lost its independence with portable, when native system needs graft procedure system or database, the safety management part will be difficult to continue to use.
Summary of the invention
The objective of the invention is to propose a kind of method of control system safety management, overcome the good dirigibility of shortage of prior art and the shortcoming of independence, with flexible configuration operational administrative authority, and simple to operate.
The method of a kind of control system safety management that the present invention proposes, this method is to realize by the control based on role module, this method comprises following each step:
Step 1: determine the basic operation authority module of system, and an independent operation authority module is merged in one or more determined basic operation authority module conclusions;
Step 2: give a role module with one or more independent operation authority module, and role module is carried out legitimate verification;
Step 3: with the safe operation module of above-mentioned role module imparting system;
Step 4: when the above-mentioned safe operation module of startup was carried out system security management control, system resolved the role module that the safe operation module is comprised, and obtains the independent operation authority module of this safe operation module after the parsing.
When having dependence between the independent operation authority module in the step 1 of said method, promptly when independent operation authority module A depends on independent operation authority module limit B, when a role module has independent operation authority module A, must have independent operation authority module B; In the time of a role module deletion independent operation authority module B, deletion independent operation authority module A.
Further comprise in the step 2 of said method:
Step 21: give leading role's look module with one or more sub-role modules, and leading role's look module is carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.
Also can comprise
Step 22: give leading role's look module with one or more sub-role modules and one or more independent operation authority module, and leading role's look module carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.
Wherein the process that leading role's look module is carried out legitimate verification comprises the steps:
Step 51: at first the role module that is verified with top layer deposits storehouse in;
Step 52: the above-mentioned sub-role module that is verified first lower floor of role module is deposited in the role module formation to be verified of first lower floor;
Step 53: whether the role module formation to be verified of judging first lower floor is empty, if it is empty, judge further then whether this layer is top layer, if then checking finishes, it is legal to be verified role module, and make and be verified role module and withdraw from storehouse, if not top layer then returns to last layer, and the role module of last layer is re-executed this step;
Step 54: if above-mentioned role module formation to be verified is not empty, then from the role module formation to be verified of first lower floor, take out a role module, judge that it is whether in storehouse, if in storehouse, then top layer is verified role module for illegal, otherwise carries out next step;
Step 55: deposit the role module to be verified of first lower floor in storehouse, and change step 52;
Step 56: repeat above-mentioned steps 52~step 55, verify the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until checking.
In the step 4 of said method, the process that system carries out the role module parsing to operator's module comprises the steps:
Step 61: deposit the resolved role module of top layer in storehouse;
Step 62: above-mentioned role module is resolved, in the role module formation to be resolved and overall independent operation authority module storer that deposits the sub-role module that parses and operating right submodule in first lower floor respectively;
Step 63: judge whether the role module formation to be resolved of first lower floor is empty, if it is empty, judge further then whether this layer is the top layer of storehouse, if top layer is then resolved and is finished, and this role module is withdrawed from from storehouse, independent operation authority module in the overall independent operation authority module storer is the independent operation authority module of resolved role module at this moment, if be not top layer, then return to last layer, and the role module of last layer is re-executed this step;
Step 64: if above-mentioned role module formation to be resolved is not empty, then from the role module formation to be resolved of first lower floor, take out a role module, judge that it is whether in storehouse, if in storehouse, then the resolved role module of top layer is invalid, otherwise carries out next step;
Step 65: deposit the role module to be resolved of first lower floor in storehouse, and change step 62;
Step 66: repeating step 62~step 65, resolve the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until resolving.
The method of the control system safety management that the present invention proposes, use the definition mechanism of independent operation authority module and role module, both can dispose any operating right module of safe operation module extremely neatly, can be convenient to all kinds of different operation-roles modules of user definition again.Because the information of independent operation authority module and role module can use distinct methods to preserve, therefore in implementation process, system security management mechanism based on role module has independence, can not rely on specific operation system and database, when system need transplant, this administrative section can not be affected substantially.
Description of drawings
Fig. 1 is a double-stage operation authority schematic flow sheet in the prior art;
Fig. 2 uses other schematic flow sheet of database manipulation authority definition safety management operation level in the prior art;
Fig. 3 is that the role in the inventive method verifies process flow diagram;
Fig. 4 is the role's process of analysis figure in the inventive method;
Fig. 5 is role's proof procedure synoptic diagram;
Fig. 6 is that the inventive method is in the utilization example schematic of Role Management in the CAMS system.
Embodiment
The method of a kind of control system safety management that the present invention proposes, be based on the control of Role Management module, this method is at first determined the basic operation authority module of system, and an independent operation authority module is merged in one or more determined basic operation authority module conclusions; Give a role module with one or more independent operation authority module; Safe operation module with above-mentioned role module imparting system; When the above-mentioned safe operation module of startup was carried out system security management control, system resolved the role module that the safe operation module is comprised, and obtains the independent operation authority module of this safe operation module after the parsing.
When having dependence between the independent operation authority module in the said method, promptly when independent operation authority module A depends on independent operation authority module limit B, when a role module has independent operation authority module A, must have independent operation authority module B; In the time of a role module deletion independent operation authority module B, deletion independent operation authority module A.
One or more sub-role modules can be given leading role's look module in the said method, and leading role's look module is carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.Also can give leading role's look module with one or more sub-role modules and one or more independent operation authority module, and leading role's look module is carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.
Wherein the process that leading role's look module is carried out legitimate verification as shown in Figure 3, at first the role module that is verified with top layer deposits storehouse in; The above-mentioned sub-role module that is verified first lower floor of role module is deposited in the role module formation to be verified of first lower floor; Whether the role module formation to be verified of judging first lower floor is empty, if it is empty, judge further then whether this layer is top layer, if then checking finishes, it is legal to be verified role module, and make and be verified role module and withdraw from storehouse, if not top layer then returns to last layer, and the role module of last layer is re-executed this step; If above-mentioned role module formation to be verified be empty, then from the role module formation to be verified of first lower floor, take out a role module, judge it whether in storehouse, if in storehouse, then top layer is verified role module for illegally, otherwise carries out next step; Deposit the role module to be verified of first lower floor in storehouse, repeat said process, verify the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until checking.
In the inventive method, system carries out process that role module resolves as shown in Figure 4 to the safe operation module, and at first the resolved role module with top layer deposits storehouse in; Above-mentioned role module is resolved, in the role module formation to be resolved and overall independent operation authority module storer that deposits the sub-role module that parses and operating right submodule in first lower floor respectively; Judge whether the role module formation to be resolved of first lower floor is empty, if it is empty, judge further then whether this layer is the top layer of storehouse, if top layer is then resolved and is finished, and this role module is withdrawed from from storehouse, independent operation authority module in the overall independent operation authority module storer is the independent operation authority module of resolved role module at this moment, if be not top layer, then return to last layer, and the role module of last layer is re-executed this step; If above-mentioned role module formation to be resolved be empty, then from the role module formation to be resolved of first lower floor, take out a role module, judge it whether in storehouse, as if in storehouse, then the resolved role module of top layer is invalid, otherwise carries out next step; Deposit the role module to be resolved of first lower floor in storehouse, repeat above-mentioned steps, resolve the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until resolving.
The detailed process of the legitimate verification of leading role's look module can also be able to more clearly understand by detailed process embodiment illustrated in fig. 5, among Fig. 5, the sub-role module of role module A is B1, B2, B3, the sub-role module of role module B1 is C1, C2, the sub-role module of role module B2 is D1, the sub-role module of role module C3 is E1, E2, E3, E4, and other role modules do not have sub-role module.The postorder traversal algorithm that its proof procedure comes down to set may further comprise the steps:
1, deposits role module A in storehouse, deposit sub-role module B1, B2, the B3 of its first lower floor the formation to be verified of in first lower floor;
2, enter first lower floor (this layer has B1, B2, B3) of this layer, B1 is taken out;
3, deposit B1 in storehouse, the role C1 of its first lower floor, C2 are deposited in treat this first lower floor formation to be verified;
4, enter first lower floor (this layer has C1, C2) of this layer, C1 is taken out;
5, the sub-role module formation of C1 is empty, and C1 is not top layer, returns upper strata (B1 place layer);
6, C2 is taken out, and deposit storehouse in, deposit its first time straton role module E1, E2, E3, E4 in this layer formation to be verified;
7, enter this layer first lower floor, E1, E2, E3, the E4 of this layer verified respectively, checking is return upper strata (C2 place layer) after finishing;
8, C2 is withdrawed from storehouse, the role module of this layer empirical tests is intact, and therefore the role module formation of this layer is empty, and this layer is not a top layer simultaneously, therefore returns upper strata (B1 place layer);
9, B1 is withdrawed from storehouse, from the role module formation to be verified of this layer, take out B2, verify;
10, deposit B2 in storehouse, deposit its first time straton role module D1 the formation to be verified of in first lower floor;
11, enter first lower floor (D1 place layer), take out D1, after the checking, return upper strata (B2 place layer);
12, B2 is withdrawed from storehouse, from the role module formation to be verified of this layer, take out B3, verify;
13, after the B3 checking finishes, withdraw from storehouse, this moment, all role module checkings of this layer finished, i.e. the role module formation to be verified of this layer is empty, and this layer is not a top layer simultaneously, therefore returns upper strata (A place layer).
Checking order (being the postorder traversal order of tree): C1->E1->E2->E3->E4->C2->B1->D1->B2->B3->A
Supposing the system is current 10 kinds of basic operations, and it is defined as 10 kinds of independent operation authority module, and called after independent operation authority module 1~independent operation authority module 10 respectively.Carrying out role module when management, independent operation authority module 1~independent operation authority module 3 is being composed given role A, independent operation authority module 4,5 is being composed given role B, and role A, role B are composed to role C simultaneously with independent operation authority module 6; When definition safe operation module, the role who specifies this safe operation module is role C, and then this safe operation module will have independent operation authority module 1~6.If independent operation authority module 5 depends on independent operation authority module 4, then following control should be done by system when carrying out the role module management: when being a role module interpolation independent operation authority module 5, independent operation authority module 4 is added automatically; If instead independent operation authority module 4 is deleted from this role module, then independent operation authority module 5 also will be deleted automatically.
To the management of independent operation authority module, can use unified coding rule that the independent operation authority module is encoded for convenience.When reality was implemented, the purpose of coding was for relevant independent operation authority module is classified, and was convenient to represent and manages dependence between the independent operation authority module.For example: when a role module has the independent operation authority module of " increase ", its independent operation authority module that must have " query page tabulation " is not (if there is the independent operation authority of query page tabulation, then can not enter the page, more can not carry out " increase " and operate); Therefore can followingly encode: use 4 item representation independent operation authority module, " query page tabulation " and the independent operation authority module of " increase " encode preceding 3 identical, and with last position 0 of the independent operation authority module of " query page tabulation " coding, and last position 1 that the independent operation authority module of " increases " is encoded; Be a role when increasing the independent operation authority, after the independent operation authority of " increase " was added, the independent operation authority module of " query page tabulation " that it is similar (front three of coding is identical, and last position is 0) will be increased automatically; The independent operation authority module of then similar with it " increase " also will be deleted automatically if instead the independent operation authority module of " query page tabulation " is deleted from a role module!
Fig. 6 is the utilization example of Role Management in the CAMS system, determine all basic operation modules that native system has earlier, its merging is reduced the independent operation authority module and encode, when carrying out the role module management, the independent operation authority module is composed to corresponding role module, and when increasing the safe operation module, given the safe operation module role module.By among Fig. 6 as can be seen, except the independent operation authority module being composed to the role module, the role module that had defined can also be composed to the new role module, the new role module of this generation is leading role's look module, and the relative role module of giving to leading role's look module is sub-role module.The basic operation authority module only is concerned about when the user uses by defining by program and carrying out encode management which (or which class) administration authority role module comprises.The user uses for convenience, can be in system the big role of several classes of predefine, when the user need increase a new role, only need from the role module tabulation that has defined, to select the role module of needs, and from permissions list, add the extra independent operation authority that needs again, just can constitute new role module easily.At last, when increase or modification safe operation module, by new role module (being leading role's look module) is assigned to the safe operation module, just can make the safe operation module inherit all operations authority that can realize of all independent operation authority module that this role module has.
When setting up role module, role module circular in definition as follows may appear:
Role module Ra comprises role module Rb;
Role module Rb comprises role module Rc;
Role module Rc comprises role module Ra;
When the role module circular in definition occurring, this role module can't be resolved goes out, and promptly this role module is invalid.Therefore when setting up role module, must check the legitimacy of role module.Give the safe operation module with role module, when making this safe operation module enter system, system will resolve its role module, legal role module must resolvedly be one group of independent operation authority set, the independent operation authority set that obtains after the parsing, an attribute that can be used as the safe operation module is saved, and carries out Authority Verification when safe operation module executive system attended operation.
For the CAMS system, because it is based on the application program of webpage, so the Authority Verification mode is the verification mode based on webpage: if the verification passes, then can continue accession page; Otherwise directly change the miscue information page over to.By this mode, can be easily the operating right of each safe operation module be managed.In addition, because the method for the control system safety management based on role module described herein does not rely on particular platform or database, in the time of therefore need transplanting, realize that each module of safety management control method needs to do any change hardly in system.

Claims (6)

1, a kind of method of control system safety management, this method are to realize by the control based on role module, it is characterized in that this method comprises following each step:
Step 1: determine the basic operation authority module of system, and an independent operation authority module is merged in one or more determined basic operation authority module conclusions;
Step 2: give a role module with one or more independent operation authority module, and role module is carried out legitimate verification;
Step 3: with the safe operation module of above-mentioned role module imparting system;
Step 4: when the above-mentioned safe operation module of startup was carried out system security management control, system resolved the role module that the safe operation module is comprised, and obtains the independent operation authority module of this safe operation module after the parsing.
2, the method for claim 1, when it is characterized in that having dependence between the independent operation authority module in the described step 1, promptly when independent operation authority module A depends on independent operation authority module limit B, when a role module has independent operation authority module A, must have independent operation authority module B; In the time of a role module deletion independent operation authority module B, deletion independent operation authority module A.
3, the method for claim 1 is characterized in that described step 2 further comprises:
Step 21: give leading role's look module with one or more sub-role modules, and leading role's look module is carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.
4, the method for claim 1 is characterized in that described step 2 further comprises:
Step 22: give leading role's look module with one or more sub-role modules and one or more independent operation authority module, and leading role's look module carried out legitimate verification, legal leading role's look module has all independent operation authority module of sub-role module.
5,, it is characterized in that wherein the process of leading role's look module being carried out legitimate verification comprises the steps: as claim 3 or 4 described methods
Step 51: at first the role module that is verified with top layer deposits storehouse in;
Step 52: the above-mentioned sub-role module that is verified first lower floor of role module is deposited in the role module formation to be verified of first lower floor;
Step 53: whether the role module formation to be verified of judging first lower floor is empty, if it is empty, judge further then whether this layer is top layer, if then checking finishes, it is legal to be verified role module, and make and be verified role module and withdraw from storehouse, if not top layer then returns to last layer, and the role module of last layer is re-executed this step;
Step 54: if above-mentioned role module formation to be verified is not empty, then from the role module formation to be verified of first lower floor, take out a role module, judge that it is whether in storehouse, if in storehouse, then top layer is verified role module for illegal, otherwise carries out next step;
Step 55: deposit the role module to be verified of first lower floor in storehouse, and change step 52;
Step 56: repeating step 52~step 55, verify the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until checking.
6, the method for claim 1 is characterized in that in the step 4, and the process that system carries out the role module parsing to the safe operation module comprises the steps:
Step 61: deposit the resolved role module of top layer in storehouse;
Step 62: above-mentioned role module is resolved, in the role module formation to be resolved and overall independent operation authority module storer that deposits the sub-role module that parses and independent operation authority submodule in first lower floor respectively;
Step 63: judge whether the role module formation to be resolved of first lower floor is empty, if it is empty, judge further then whether this layer is the top layer of storehouse, if top layer is then resolved and is finished, and this role module is withdrawed from from storehouse, independent operation authority module in the overall independent operation authority module storer is the independent operation authority module of resolved role module at this moment, if be not top layer, then return to last layer, and the role module of last layer is re-executed this step;
Step 64: if above-mentioned role module formation to be resolved is not empty, then from the role module formation to be resolved of first lower floor, take out a role module, judge that it is whether in storehouse, if in storehouse, then the resolved role module of top layer is invalid, otherwise carries out next step;
Step 65: deposit the role module to be resolved of first lower floor in storehouse, and change step 62;
Step 66: repeating step 62~step 65, resolve the following ground floor of top layer, the second layer, the 3rd layer or the like successively, finish until resolving.
CN 02150118 2002-11-02 2002-11-02 Method of control system safety management Expired - Fee Related CN1235151C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02150118 CN1235151C (en) 2002-11-02 2002-11-02 Method of control system safety management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02150118 CN1235151C (en) 2002-11-02 2002-11-02 Method of control system safety management

Publications (2)

Publication Number Publication Date
CN1493995A CN1493995A (en) 2004-05-05
CN1235151C true CN1235151C (en) 2006-01-04

Family

ID=34233876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02150118 Expired - Fee Related CN1235151C (en) 2002-11-02 2002-11-02 Method of control system safety management

Country Status (1)

Country Link
CN (1) CN1235151C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220114265A1 (en) * 2020-10-08 2022-04-14 Google Llc Unified viewing of roles and permissions in a computer data processing system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100401223C (en) * 2005-04-28 2008-07-09 中国科学院软件研究所 Strategy and method for realizing minimum privilege control in safety operating system
CN100391160C (en) * 2005-07-22 2008-05-28 上海华为技术有限公司 Method for setting user's power in communication system
CN100459519C (en) * 2005-10-28 2009-02-04 华为技术有限公司 Method for controlling power of data management
CN104462888A (en) * 2014-12-25 2015-03-25 遵义国正科技有限责任公司 User authority management system in passenger transportation management information system
CN104657656B (en) * 2015-03-06 2017-11-14 中国银行股份有限公司 A kind of manipulation method of controlling security and device based on banking system
CN110019365A (en) * 2017-12-21 2019-07-16 天津数观科技有限公司 A method of data processing sequence is generated using stack

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220114265A1 (en) * 2020-10-08 2022-04-14 Google Llc Unified viewing of roles and permissions in a computer data processing system

Also Published As

Publication number Publication date
CN1493995A (en) 2004-05-05

Similar Documents

Publication Publication Date Title
CN1258921C (en) Distributive video interactive system and its data recording and accessing method
Tatti et al. The long and the short of it: summarising event sequences with serial episodes
EP2064637B1 (en) Method for dynamic secure management of an authenticated relational table in a database
CN101042699A (en) Safety search engine system based on accessing control
CN1959693A (en) Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
CN1564992A (en) Application level access privilege to a storage area on a computer device
CN101075873A (en) Method and system for inputting content
CN1932816A (en) Full text search system based on ciphertext
CN1776679A (en) Stacked file systems and methods
CN101075281A (en) Method for logining BIOS based on fingerprint verification
CN1851724A (en) Business data operation coutrol method and business system
CN1870551A (en) Distribution type group communication management system and method for setting group
CN1235151C (en) Method of control system safety management
CN101075239A (en) Composite searching method and system
CN1845119A (en) Storage and management of authentication information and method and system for proxy authentication
CN101079037A (en) Chinese character library updating method and system
CN1510575A (en) High-efficient administration method for database connection
CN1645372A (en) Universal constraining realizing method for real-time internal memory database
CN1904824A (en) Method and system of establishing culture sensitive control element for global application
CN1668003A (en) Method for filling-in user data automatically using fingerprint identification
CN1633080A (en) Method for implementing log in network management system
CN1825306A (en) XML data storage and access method based on relational database
CN101076055A (en) Method for converting toll-ticket format
CN1459716A (en) Automatic checking device of printed-wiring board designing and its method
CN1773453A (en) System constituting method based on data definition

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060104

Termination date: 20151102

EXPY Termination of patent right or utility model