A method and system for control access rights of resource

A technology of permission control and resource access, applied in transmission systems, electrical components, etc., can solve the problem that multimedia resources cannot achieve single access permission control, and achieve the effects of improving user experience, high load, and improving security.

Inactive Publication Date: 2018-12-18
GUANGDONG MICROCLOUD TECH INC
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Constructing multimedia resources in the business layer of the web server cannot achieve effective authority control fo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for control access rights of resource
  • A method and system for control access rights of resource
  • A method and system for control access rights of resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described in detail below in conjunction with the drawings.

[0063] A resource access authority control method, including:

[0064] S1. The web front end sends a request for obtaining verification information to the web server.

[0065] The web front end may be a browser, application software, or an application program on a mobile device.

[0066] The request for obtaining verification information includes request information, user identity information, and requested resource information.

[0067] The request information is used to inform the web server of the user's request;

[0068] The user identity information includes account number, password, mobile phone number, email address, user identity information, and other information used to authenticate the user identity, and the user identity information is one, two or more of the above information; User identity information is used to authenticate the user's identity to determine the user's...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource access authority control method, belonging to the network authority management field. The method comprises the following steps: S1, a web front end sends a request for obtaining verification information to a web server; 2, after receiving the request for obtaining the verification information, the web server sends a preset request to the file server; 3, after receiving that preset request, the file server generates authentication information and access control information; S4, the file server writes the resources requested by the web front end, the authentication information and the access control information into the self-cache; S5, the authentication information is sent to the web front end; 6, the web front end sends the authentication information andthe resource request information to the file server; S7, the file server verifies the resource request information, and provides the requested resource to the web front end if the verification is passed. The invention mainly solves the problem that the construction of multimedia resources in the service layer of the web server can not realize the single access effective authority control, and realizes the access frequency control and the access time control of the network resources.

Description

Technical field [0001] The invention relates to the field of network authority management, in particular to a method and system for controlling resource access authority. Background technique [0002] With the development of the Internet, users can conveniently browse various multimedia resources such as pictures, audios, and videos. [0003] Access to some multimedia resources requires permission. For example, some multimedia resources such as video materials of teaching content and some databases may only be accessed by users with specific permissions, and these multimedia resources cannot be accessed through links copied by users. In addition, some multimedia resources It needs to be effective for single access, that is, after these multimedia resources are accessed a specified number of times or exceed the specified access time, even users with permissions cannot access them again. [0004] In order to realize the access authority control of multimedia resources, a common practi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/10H04L65/40H04L67/02H04L67/568H04L67/60
Inventor 张天虎
Owner GUANGDONG MICROCLOUD TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products