Unlock instant, AI-driven research and patent intelligence for your innovation.

Linux-based user identifier uniqueness implementation method and device, equipment and medium

A user identification and implementation method technology, applied in the computer field, can solve problems such as increasing data leakage, identity theft, program or file theft or abuse, and endangering computer system security.

Inactive Publication Date: 2022-07-22
北京凝思软件股份有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when creating a new user or modifying a user, the deleted and used user ID may be actively or passively reused by the current system, and the user ID reused by the current system loses its uniqueness. If the files are not cleared from the current system at the same time when the user is deleted, then newly created users with the same user ID can access these files, which may lead to the theft or abuse of some specific programs or files, increasing data leakage, identity Risks such as embezzlement, thereby endangering the current system security of the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux-based user identifier uniqueness implementation method and device, equipment and medium
  • Linux-based user identifier uniqueness implementation method and device, equipment and medium
  • Linux-based user identifier uniqueness implementation method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present application will be further described in detail below with reference to the accompanying drawings.

[0066]figure 1 This is a schematic flowchart of a method for realizing uniqueness of a user identifier based on Linux provided by an embodiment of the present application.

[0067] like figure 1 As shown, the main flow of the method is described as follows (steps S101-S106):

[0068] Step S101, in response to the user's user account creation instruction, determine whether the user ID creation instruction includes a specified user ID;

[0069] Step S102, if yes, then judge whether the specified user ID has a usage record based on a preset user ID database;

[0070] Step S103, if there is no usage record, then create a user account based on the specified user ID, and store the specified user ID in the user ID database, and update the user ID database;

[0071] Step S104, if there is a usage record, then determine whether there is an available user ID;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a Linux-based user identifier uniqueness implementation method, device and equipment and a medium, which are applied to the technical field of computers, and the method comprises the following steps: in response to a user account creation instruction of a user, judging whether the user identifier creation instruction contains a specified user identifier; if yes, whether the specified user identifier has a use record or not is judged based on a preset user identifier database; if not, creating a user account based on the specified user identifier; if yes, whether an available user identifier exists or not is judged; if yes, creating a user account based on the available user identifier, or generating prompt information for prompting the user with the available user identifier; if not, exiting; and if not, executing the step of judging whether the available user identifier exists. The application has the effect of realizing the uniqueness of the user identifier.

Description

technical field [0001] The present application relates to the technical field of computers, and in particular, to a Linux-based method, apparatus, device and medium for realizing uniqueness of user identifiers. Background technique [0002] In the existing Linux operating system, when a user is deleted during the current system life cycle, the user ID is also immediately deleted from the current system. However, when creating a new user or modifying a user, the deleted and used user ID may be actively or passively reused by the current system, and the user ID reused by the current system loses its uniqueness. If the deleted user's important files or other If the files are not deleted from the current system at the same time when the user is deleted, the newly created users with the same user ID can access these files, which may lead to the theft or abuse of some specific programs or files, increasing data leakage, identity Theft and other risks, thereby jeopardizing the cur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F16/23
CPCG06F11/1469G06F16/2358G06F16/2365
Inventor 田春生张新栋傅朝崙张国栋
Owner 北京凝思软件股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More