Rights management method, system and server

A technology of authority management and server, which is applied in the field of information management, can solve problems such as insecurity, and achieve the effect of ensuring security, convenient use, and meeting the requirements of privacy

Inactive Publication Date: 2016-08-10
HISENSE VISUAL TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a rights management method, system and server to solve problems such as insecurity caused by one user account having one right

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rights management method, system and server
  • Rights management method, system and server
  • Rights management method, system and server

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0020] Please refer to figure 1 , which shows a method flowchart of a rights management method provided by an embodiment of the present invention. The rights management method may include the following steps 101-105:

[0021] Step 101, storing a user account, at least two passwords of the user account, and an authority identifier corresponding to each password.

[0022] The user account may be a unique account number assigned by the server to multiple users of the client, and may include letters, numbers and other information. The user account may be a chat application account or any other type of account, which will not be listed here.

[0023] The permission identifier is used to identify multiple users of the same account to distinguish different users. Each password can be configured with a corresponding permission identifier, which can include information composed of letters, numbers and other arbitrary characters.

[0024] Step 103, receiving an access request provide...

no. 2 example

[0028] Please refer to figure 2 , which shows a method flowchart of a rights management method provided by another embodiment of the present invention. figure 2 is in figure 1 improved on the basis of The rights management method may include the following steps 201-227:

[0029] Step 201, storing a user account, at least two passwords of the user account, and an authority identifier corresponding to each password.

[0030] The user account may be a unique account number assigned by the server to multiple users of the client, and may include letters, numbers and other information. The user account may be a chat application account or any other type of account, which will not be listed here.

[0031] The permission identifier is used to identify multiple users of the same account to distinguish different users. Each password can be configured with a corresponding permission identifier, which can include information composed of letters, numbers and other arbitrary character...

no. 3 example

[0081] Please refer to image 3 , which shows a main structural block diagram of a server provided by an embodiment of the present invention. The server includes: a storage module 301, a verification module 303, and a rights control module 305.

[0082] Specifically, the storage module 301 is configured to store a user account, at least two passwords of the user account, and an authorization identifier corresponding to each password.

[0083] The verification module 303 is configured to receive an access request provided by a client user with a user account and password, and verify whether the user account and password match the stored user account and password.

[0084] The authority control module 305 is configured to obtain the stored authority identifier corresponding to the password according to the password provided by the client user if they match, and provide the access resources under the acquired authority identifier to the client user.

[0085] To sum up, the serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method, system and server, and belongs to the field of information management. The method includes the steps of storing a user account, at least two ciphers of the user account and access identifications corresponding to the ciphers, receiving a visit request which is provided by a client user and used for visiting with a user account and a cipher and verifying whether the user account and the cipher are matched with the stored user account and one stored cipher, obtaining the stored access identification corresponding to the cipher according to the cipher provided by the client user if the user account and the cipher are matched with the stored user account and the stored cipher, and providing visiting resources of the obtained access identification for the client user. According to the access control method, system and server, the visiting resources corresponding to each cipher of the same account can be provided for different users of a client for visiting through control, requirements for privacy of each user can be met, use safety of the account is guaranteed, and convenience is brought to the users during use.

Description

technical field [0001] The present invention relates to the technical field of information management, in particular to a rights management method, system and server. Background technique [0002] At present, in an interactive system composed of a client and a server, the server usually controls user account permissions by setting a password and corresponding permissions corresponding to a client user account. When the client user accesses the server, the client enters the user account and password on the login interface provided by the server, clicks to log in, the client will send the user account and password to the server, and the server verifies the account and password, if the verification passes , the server opens the resource corresponding to the permission to the client according to the permission of the client. Take the client user logging in to the chat application provided by the server as an example. The client user enters his account number and password on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31H04L9/14H04L9/32
Inventor 韩涛杨楠楠
Owner HISENSE VISUAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products