Unlock instant, AI-driven research and patent intelligence for your innovation.

Access authority management method, device and equipment based on .net

A technology of access rights management and authority, applied in the fields of electrical digital data processing, instruments, digital data authentication, etc., can solve the problems of data leakage and easy to be stolen by external parties, and achieve the effect of ensuring security

Active Publication Date: 2021-04-02
XIAMEN HYMAKE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Because .net-based programs have rich code runtime information, information including specific source code classes, methods, and attributes is extremely easy to be stolen by outsiders
Although the code obfuscation technology can be used to prevent the program from being maliciously modified, it is still impossible to prevent the third party from obtaining the program data through code injection, which will lead to the important code in the program being used by the third-party program code and resulting in data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authority management method, device and equipment based on .net
  • Access authority management method, device and equipment based on .net
  • Access authority management method, device and equipment based on .net

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the implementation manners in the present invention, all other implement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access permission management method based on .net. The method comprises the steps of obtaining current thread execution stack information of an access program; analyzing whether the current thread execution stack information has a calling permission; if the calling authority exists, reading code signature information of a program set corresponding to the access program,otherwise, stopping the operation of the access program or prompting that the operation is abnormal; and verifying whether the code signature information is in a preset white list, and if yes, continuing to execute the access program. It can be ensured that a program code method is prevented from being maliciously used by a third-party program during program running, and safety of program codes and data is ensured.

Description

technical field [0001] The invention relates to the technical field of software processing, in particular to a .net-based access authority management method, device and equipment. Background technique [0002] Because .net-based programs have rich code runtime information, information such as classes, methods, and attributes of specific source codes is extremely easy to be stolen by outsiders. Although the code obfuscation technology can be used to prevent the program from being maliciously modified, it is still impossible to prevent the third party from obtaining the program data through code injection, which will cause important codes in the program to be used by the third-party program code and cause data leakage. [0003] Therefore, it is necessary to propose a simpler, more effective and more secure way to protect the management of access rights based on executable programs under .NET. Contents of the invention [0004] In view of this, the object of the present inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06F21/44
CPCG06F21/52G06F21/44G06F2221/2141Y02D10/00
Inventor 刘炳元金季岚黄建新
Owner XIAMEN HYMAKE TECH