Security protection method specific to unauthorized access

An unauthorized access and security prevention technology, applied in the field of enterprise security, can solve the problems of increasing code complexity and coding workload, inconsistent user permissions in the front and back ends, and users being unable to use it, so as to reduce the authorized workload and improve code readability. The effect of reducing code workload

Inactive Publication Date: 2014-04-16
STATE GRID CORP OF CHINA +2
View PDF11 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. The server passes the verification of the user name and password, establishes corresponding session information on the server to record the current user's login status, and displays the corresponding operation interface according to the login user's authority, and hides or hides the menus and buttons that the user cannot use Grayed out, making it unusable for users
[0012] 1. The main body of the background authorization is inconsistent with the front desk. The front desk faces menus and buttons, and the background faces database tables or back-end methods. There is repeated authorization work, and there is a hidden danger of inconsistent user permissions.
[0013] 2. A lot of permission verification codes are added in the background, and the permission verification codes and business codes are mixed together, which increases the code complexity and coding workload, and also increases the hidden danger of bugs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method specific to unauthorized access
  • Security protection method specific to unauthorized access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] A security precaution against unauthorized access, figure 2 It is the implementation schematic diagram of the present invention. The method includes the following steps:

[0031] 1) Determine whether the user is logged in according to the session information of the server. If not logged in, turn to the login interface; if logged in, further check the authority.

[0032] 2) Obtain the login information of the current user from the server session.

[0033] 3) According to the login information of the current user, obtain the permission list that the current user can access from the permission platform, including which menus and which buttons of those menus.

[0034] 4) According to the annotation (Annotation) of the Action method requested by the user, obtain the menu Code and button Code corresponding to the request.

[0035] 5) Check whether the menu Code and button Code requested by the user are in the user's authorization list, if so, pass the authorization check,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection method specific to unauthorized access. The security protection method comprises determining whether a user logins or not according to the server session information and turning to a login interface if the user does not login; performing the authorization check further if the user logins; obtaining the login information of the current user in the server session; obtaining an authorization list from an authorization platform according to the login information of the current user, wherein the current user has access to the authorization list; obtaining a menu code and a button code which are corresponding to a request according to an annotation of an action method of the user request; checking whether the menu code and the button code of the user request are in the authorization list of the user or not and throwing out an unauthorized operation exception if the user request is not in the authorization list; prompting the user that the request is invalid due to the unauthorized operation. The security protection method specific to the unauthorized access is simple and efficient.

Description

technical field [0001] The invention belongs to the field of enterprise security, in particular to a security prevention method for unauthorized access. Background technique [0002] The permission control of enterprise applications often determines which menus and buttons can be used by logged-in users. For unauthorized menus and buttons, the system generally hides or grays them out so that users cannot click them, thereby achieving the purpose of permission control. [0003] Under the J2EE framework, the HTTP protocol is used for communication between the client and the server. The TCP session cannot be maintained between multiple requests of the HTTP protocol, and only the session information in the HTTP header can be used for identification. Illegal HTTP requests reach the possibility of unauthorized operations. [0004] The general attack steps are as follows figure 1 Shown: [0005] 1. The user logs in on the server through the browser, and enters the correct user n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘汉理王全强王青国
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products