Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User access authorization control method, device and system and medium

A control method and access rights technology, applied in the direction of digital data authentication, etc., can solve problems that are not conducive to improving user login verification efficiency and login efficiency, the number of logged-in users and access time restrictions, etc.

Inactive Publication Date: 2019-04-19
BEIJING QIANXIN TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing methods only judge based on whether the user has access rights, and do not limit the number of logged-in users and access time, which is not conducive to improving the verification efficiency and login efficiency of user login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access authorization control method, device and system and medium
  • User access authorization control method, device and system and medium
  • User access authorization control method, device and system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Other aspects, advantages and salient features of the present disclosure will become apparent to those skilled in the art from the following detailed description of exemplary embodiments of the present disclosure in conjunction with the accompanying drawings.

[0021] In this disclosure, the terms "include" and "comprising" and their derivatives mean to include but not to limit; the term "or" is inclusive, meaning and / or.

[0022] In this specification, the various embodiments described below to describe the principles of the present disclosure are illustrative only and should not be construed in any way to limit the scope of the disclosure. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present disclosure as defined by the claims and their equivalents. The following description includes numerous specific details to aid in understanding, but these should be cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user access authorization control method, which comprises the following steps that: S1, a list and a counter are set, the list is used for recording login information of a user with access authority, and the counter is used for recording the number of the users with the access authority; S2, when a login user is newly added, if the newly added login user is a legal user and the counter is smaller than a preset threshold value, login information of the newly added login user is recorded by the list, the value of the counter is updated, otherwise, the newly added login user is enabled to have no access permission; And S3, when any login user has no operation within the preset time, the login user exits.

Description

technical field [0001] The present disclosure relates to a method, device, system and medium for controlling user access authorization. Background technique [0002] In threat intelligence business and other big data business batch request scenarios, there are many scenarios that restrict multi-user login and access to special permissions. Users with different roles and permissions need to return different business data, while limiting query volume and concurrent data to control cloud business data. issued. [0003] Existing methods only judge based on whether the user has access rights, without limiting the number of logged-in users and access time, which is not conducive to improving the verification efficiency and login efficiency of user login. Contents of the invention [0004] In view of the above problems, the present disclosure provides a method, device, and system medium for controlling user access authorization. By judging the legitimacy of the newly added logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 白敏罗炳聪
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products