Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authority list security control method

A technology of security control and authority, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of authority list loopholes, no security control means, etc., to improve encryption, ensure uniqueness, and avoid possibility Effect

Active Publication Date: 2020-12-01
成都掌控者网络科技有限公司
View PDF17 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The permission list in the traditional system is generally stored and displayed many-to-many based on the mapping relationship between the role number and the function list number. The storage and display are all in plain text without any security control means; when the attacker performs unauthorized operations , there is no need to attack the most difficult account security, just forge the corresponding mapping relationship to achieve overreach. For data operation and maintenance members, there are obvious loopholes in the existing permission list

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority list security control method
  • Authority list security control method
  • Authority list security control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] This embodiment provides a permission list security control method, such as figure 1 As shown, including the rights list encryption method, the rights list encryption method includes the following steps:

[0043] The server receives the authorization request, device serial number and requester ID sent by the requesting end;

[0044] The server generates the serialized character code of the permission request interface according to the authorization request sent by the requesting end, and stores the serialized character code of the permission request interface, device serial number and requester ID as the original text of the permission list, and then sends the authorization request and the original text of the permission list to authorized end;

[0045] The server judges whether the authorization request information, function list, authorizer ID and first time stamp sent by the authorizer are received; if so, the server stores the function list, authorizer ID and first...

Embodiment 2

[0052] This embodiment provides a permission list security control method, such as figure 1 As shown, including the rights list encryption method, the rights list encryption method includes the following steps:

[0053] The server receives the authorization request, device serial number and requester ID sent by the requesting end;

[0054] The server generates the serialized character code of the permission request interface according to the authorization request sent by the requesting end, and stores the serialized character code of the permission request interface, device serial number and requester ID as the original text of the permission list, and then sends the authorization request and the original text of the permission list to authorized end;

[0055] The server judges whether the authorization request information, function list, authorizer ID and first time stamp sent by the authorizer are received; if so, the server stores the function list, authorizer ID and first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of authority control, and aims to provide an authority list security control method which comprises an authority list encryption method. The authority listencryption method comprises the following steps: receiving an authorization request, an equipment serial number and a requester ID sent by a request end; generating an authority request interface serialized character code according to the authorization request sent by the request end, storing the authority request interface serialized character code, the equipment serial number and the requesterID as authority list original texts, and then sending the authorization request and the authority list original texts to an authorization end; judging whether authorization request passing information, a function list, an authorizer ID and a first timestamp sent by the authorization end are received or not; if yes, storing the function list, the authorizer ID and the first timestamp in the authority list original texts, and if not, performing no action; and generating an authority list abstract according to the authority list original texts. The method can avoid plaintext exposure of authoritylists.

Description

technical field [0001] The invention relates to the technical field of authority control, in particular to a security control method for a authority list. Background technique [0002] The permission list in the traditional system is generally stored and displayed many-to-many based on the mapping relationship between the role number and the function list number. The storage and display are all in plain text without any security control means; when the attacker performs unauthorized operations , there is no need to attack the most difficult account security, just forge the corresponding mapping relationship to achieve overreach. For data operation and maintenance members, there are obvious loopholes in the existing permission list. Contents of the invention [0003] The present invention aims to solve the above-mentioned technical problems at least to a certain extent, and the present invention provides a security control method for a permission list. [0004] The technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45G06F2221/2141
Inventor 陈霖张采荣冯佳邱艳谢英亮司云霄
Owner 成都掌控者网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products