CN102930189A - Role authority limiting method and system - Google Patents
Role authority limiting method and system Download PDFInfo
- Publication number
- CN102930189A CN102930189A CN2012103889884A CN201210388988A CN102930189A CN 102930189 A CN102930189 A CN 102930189A CN 2012103889884 A CN2012103889884 A CN 2012103889884A CN 201210388988 A CN201210388988 A CN 201210388988A CN 102930189 A CN102930189 A CN 102930189A
- Authority
- CN
- China
- Prior art keywords
- authority
- user
- controller
- request message
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a role authority limiting method and system. The defects that the conventional authority control method cannot flexibly control and distribute authorities of the system can be overcome. The role authority limiting method comprises the following steps of: establishing an authority set for a controller and a controller method; combining authorities in the authority set into an authority control set; distributing users to corresponding roles, and generating a corresponding list of the users and the roles; associating the corresponding list and the authority control set, so as to form an association relation of the corresponding list and the authority control set; and when a user requests for using a function point, judging whether the user has the corresponding authority or not according to the association relation. The role authority limiting method and system provided by the embodiment of the invention can be used for carrying out authority control on any controller in an mvc (Model View Controller) and any method in the controller.
Description
Technical field
The present invention relates to a kind of system control technology, relate in particular to a kind of role-security control method and system.
Background technology
Nowadays, business administration mostly is to assist by computing machine to carry out, and it is extremely important that the aspect that ensures information safety also just becomes.The authority of enterprise's different stage is different, thereupon is that enterprise is also more and more stricter to the requirement of control of authority in the use system of institute.
At present control of authority method relatively more commonly used is had the control of authority of function point and the control of authority of displaying contents, yet these two kinds of methods can not be controlled to the authority of system very neatly and distribute.
The control of authority of function point can realize flexibly based on role's management, takes the principle of function point addition corresponding to role to deal with the control of authority requirement of various function points.If but the subfunction point is arranged under the function point, this original control of authority based on function point is just very clumsy, especially in the time of need to joining in the control of authority in the face of the function point of originally not listing control of authority in, for example in an enterprise script not being had the content changing of concerning security matters is concerning security matters, the thing followed is exactly control of authority, the function of this part of original system as check, the function such as download all added authority.In the face of this situation, the authority control method of original function point need to be write code again, and redesign has affected original code structure, poor stability, and security reduces.
The control of authority of displaying contents is that the data message that users different under identical function point presents is different.The now control of authority of displaying contents is generally complicated a lot of than the control of authority of function point, is relatively more difficult so the control of authority of displaying contents will accomplish to carry out neatly self-defined control, generally need to carry out according to the situation of reality the customization of control of authority.The control of authority of displaying contents is to utilize a method or function to carry out different contents according to the parameter difference that receives to show.The drawback of this mode is exactly system need to add new demonstration control of authority the time clearly, and the slip-stick artist just must revise original design, causes the test again of original function needs, and also confusion relatively of the structure of code.
Summary of the invention
Technical matters to be solved by this invention is to overcome the deficiency that can not control and distribute the authority of system neatly the method for control of authority at present.
In order to solve the problems of the technologies described above, the application provides a kind of role-security control method, comprising:
For controller and method thereof are set up the authority set;
With the synthetic control of authority set of the bundle of permissions in the authority set;
User assignment in corresponding role, is generated user and role's corresponding table;
Described corresponding table and described control of authority set are carried out related, is formed the incidence relation that described corresponding table and described control of authority are gathered;
When the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judge.
Preferably, set up the authority set for controller and method thereof, comprising:
Controller and method thereof are registered in the database;
For the controller and the method thereof that are registered in the described database are set up described authority set.
Preferably, when the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judges, comprising:
When the user uses function point in request, the parameter that the web address in the request message that the acquisition user sends when described function point is used in request comprises;
According to related controller and the method thereof of described gain of parameter described request message;
Obtain the combination of the corresponding controller of described user and method thereof according to described incidence relation;
Judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
Preferably, judge that according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof, comprising:
Judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
When judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
Preferably, the method comprises:
After whether the acquisition user has the judged result of corresponding authority, described judged result is fed back to described user.
The application also provides a kind of role-security control system, comprising:
Set up module, be set to controller and method thereof and set up the authority set;
Composite module is set to the synthetic control of authority set of the bundle of permissions in the authority set;
Distribution module is set to user assignment in corresponding role, generates user and role's corresponding table;
Relating module is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered;
Judge module is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
Preferably, the described module of setting up comprises:
Registering unit is set to controller and method thereof are registered in the database;
Set up the unit, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
Preferably, described judge module comprises:
The first acquiring unit is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request;
Second acquisition unit is set to according to related controller and the method thereof of described gain of parameter described request message;
The 3rd acquiring unit is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof;
Judging unit is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
Preferably, described judging unit comprises:
The first judgment sub-unit is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
The second judgment sub-unit, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
Preferably, this system comprises:
Feedback module, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
Compared with prior art, the application's embodiment can carry out control of authority to the method in any controller and any controller in the model-view-controller (mvc).The application's embodiment is mainly used in the system that adopts the mvc Design Mode, strengthens the system manager to the control of role-security.The application's embodiment can control any function point of system, thereby reaches the flexible control to user's operation, and the purpose of keeping system information security is a kind of powerful authority control method.
Other features and advantages of the present invention will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in instructions, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of instructions, jointly is used for explaining the present invention with embodiments of the invention, is not construed as limiting the invention.
Fig. 1 is the schematic flow sheet of the role-security control method of the embodiment of the present application.
Fig. 2 is the schematic flow sheet of middle step S150 embodiment illustrated in fig. 1.
Fig. 3 is the composition synoptic diagram of the role-security control system of the embodiment of the present application.
Embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the application technology means solve technical matters to the present invention whereby, and the implementation procedure of reaching technique effect can fully understand and implements according to this.Need to prove that only otherwise consist of conflict, each embodiment among the present invention and each feature among each embodiment can mutually combine, formed technical scheme is all within protection scope of the present invention.
In addition, can in the computer system such as one group of computer executable instructions, carry out in the step shown in the process flow diagram of accompanying drawing; And, although there is shown logical order in flow process, in some cases, can carry out step shown or that describe with the order that is different from herein.
As shown in Figure 1, the role-security control method of the embodiment of the present application mainly comprises following content.
S110 for controller and method thereof are set up the authority set, includes a plurality of authorities in each authority set.
The application's embodiment is registered to controller and method thereof in the database, for the controller and the method thereof that are registered in the database are set up a plurality of authority set.Controller and method thereof are in the process of system development, and constantly registration enters database.The content of authority set is the various combination of controller and method thereof.According to controller and the method thereof in the different rights set, can filter user to the access of resource, satisfy different rights user's distinctiveness demand, thereby realize the control of authority to system's operational blocks which partition system.
S120 gathers the synthetic control of authority of the bundle of permissions in the authority set according to demand.
Different authorities is placed in the set, generates a control of authority set of satisfying the control of authority requirement.Be scattered authority in the authority set that S110 sets up, according to the demand of function authority gathered and be divided into one by one control of authority set.
S130, according to system manager's demand with user assignment in corresponding role, generate user and role's corresponding table.Preserve a plurality of roles in this correspondence table, each role can be to should there being a plurality of users, and each user corresponding role only.
S140 carries out user and role's corresponding table and control of authority set related, forms the incidence relation of corresponding table and control of authority set.Control of authority set and corresponding table are carried out related, thereby can be by the role as intermediary, controller and method thereof are distributed to user among the corresponding role, the different different controls of authority of role's correspondence are gathered.
S150, the user is when the function point of request use system, and whether system can have corresponding authority to the user according to above-mentioned incidence relation is judged, obtains the judged result whether user has corresponding authority, and judged result is fed back to the user.
So far, the application's embodiment has namely realized very safe resource control, in the situation of the normal operation of assurance system, has reduced the possibility to " intrusion " of program code, under the prerequisite that does not affect the normal exploitation of slip-stick artist, can join control of authority in the process of business processing.
Among the application's the embodiment, whether the user is had authority is judged, then whether the authority whether certain role is arranged according to role inquiry user corresponding to user exactly search authority set corresponding to role according to the role, searched current function and can be used in the authority set.If in the authority set, then the active user can access; If do not exist, then the active user does not have authority.These conditions are changed into corresponding Get parameter, and carry out combination with the parameter of importing into, make it become a new Get parameter statement.
The application's embodiment, above-mentioned steps S150 mainly comprise following content as shown in Figure 2.
S151 receives the request message that the user sends, and obtains the quantity of the parameter that comprises in web address in this request message and this web address.Parameter in the web address is by Fu Hao ﹠amp; Separate.
S152 if the number of parameters in the web address greater than one, then turns S153, otherwise turns S154.
S153, each parameter in the taking-up web address also deposits in the default array; Turn S155.
S154 takes out this parameter in the web address, this parameter is deposited among first member of default array; Turn S155.
S155 according to the parameter of preserving in the array, obtains related controller and the method thereof of request message that this user sends.If member's number is one in the default array, then adds the method for an acquiescence as second member of array, and these methods and controller are deposited in the array.
S156 according to the only sign of the employed user of logging in system by user, searches from user and role's corresponding table and obtains the role corresponding with this user.
S157, the incidence relation according to correspondence table and privilege feature set obtains the combination of the corresponding controller of user and method thereof.
S158 judges that according to the corresponding controller of user among the S157 whether the user has the authority of the related controller of this request message among the S155, then turns S159, otherwise turns S161.
S159 judges according to the corresponding method of user among the S157 whether the user has the authority of the related method of this request message among the S155, if any then turning S160, otherwise turns S161.
S160, the information that can continue to carry out to user feedback.
S161 haves no right to use the information of this function to user feedback.
As shown in Figure 3, the role-security control system of the embodiment of the present application mainly comprises and sets up module 310, composite module 320, distribution module 330, relating module 340 and judge module 350.
Set up module 310, be set to controller and method thereof and set up the authority set.
Composite module 320 and is set up module 310 and is linked to each other, and is set to the synthetic control of authority set of the bundle of permissions in the authority set.
Distribution module 330 is set to user assignment in corresponding role, generates user and role's corresponding table.
Relating module 340 links to each other with composite module 320 and distribution module 330, is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered.
Judge module 350 links to each other with relating module 340, is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
As shown in Figure 3, the above-mentioned module 310 of setting up comprises registering unit 311 and sets up unit 312.
Registering unit 311 is set to controller and method thereof are registered in the database.
Set up unit 312, link to each other with composite module 320 and registering unit 311, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
As shown in Figure 3, above-mentioned judge module 350 comprises the first acquiring unit 351, second acquisition unit 352, the 3rd acquiring unit 353 and judging unit 354.
The first acquiring unit 351 is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request.
Second acquisition unit 352 links to each other with the first acquiring unit 351, is set to according to related controller and the method thereof of described gain of parameter described request message.
The 3rd acquiring unit 353 links to each other with relating module 340 and the first acquiring unit 351, is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof.
Judging unit 354 links to each other with second acquisition unit 352 and the 3rd acquiring unit 353, is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
As shown in Figure 3, above-mentioned judging unit 354 comprises the first judgment sub-unit 354a and the second judgment sub-unit 354b.
The first judgment sub-unit 354a links to each other with second acquisition unit 352 and the 3rd acquiring unit 353, is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message.
The second judgment sub-unit 354b, link to each other with second acquisition unit 352 and the first judgment sub-unit 354a, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
As shown in Figure 3, this system can also comprise:
Feedback module 360 links to each other with the second judgment sub-unit 354b of judging unit 354 in the judge module 350, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
The application's embodiment adopts the control of authority technology of mvc, has remedied the defective of traditional control of authority technology, has realized the fully control time to system, has avoided the secondary development to original system, has reduced implementation cost.The application's embodiment can also satisfy the demand that the client carries out control of authority to each function point of system flexible and efficiently, and extendability is strong.The application's embodiment has strengthened the dirigibility of system manager to function privilege control, thereby has improved Security of the system and reliability.
Those skilled in the art should be understood that, each step in above-mentioned the embodiment of the present application method and each ingredient in the system, partly or entirely can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and be carried out by calculation element, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Although the disclosed embodiment of the present invention as above, the embodiment that described content just adopts for the ease of understanding the present invention is not to limit the present invention.Technician in any the technical field of the invention; under the prerequisite that does not break away from the disclosed spirit and scope of the present invention; can do any modification and variation in the details that reaches of implementing in form; but scope of patent protection of the present invention still must be as the criterion with the scope that appending claims was defined.
Claims (10)
1. a role-security control method is characterized in that, comprising:
For controller and method thereof are set up the authority set;
With the synthetic control of authority set of the bundle of permissions in the authority set;
User assignment in corresponding role, is generated user and role's corresponding table;
Described corresponding table and described control of authority set are carried out related, is formed the incidence relation that described corresponding table and described control of authority are gathered;
When the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judge.
2. method according to claim 1 is characterized in that, sets up the authority set for controller and method thereof, comprising:
Controller and method thereof are registered in the database;
For the controller and the method thereof that are registered in the described database are set up described authority set.
3. method according to claim 1 is characterized in that, when the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judges, comprising:
When the user uses function point in request, the parameter that the web address in the request message that the acquisition user sends when described function point is used in request comprises;
According to related controller and the method thereof of described gain of parameter described request message;
Obtain the combination of the corresponding controller of described user and method thereof according to described incidence relation;
Judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
4. method according to claim 3 is characterized in that, judges that according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof, comprising:
Judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
When judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
5. method according to claim 1 is characterized in that, the method comprises:
After whether the acquisition user has the judged result of corresponding authority, described judged result is fed back to described user.
6. a role-security control system is characterized in that, comprising:
Set up module, be set to controller and method thereof and set up the authority set;
Composite module is set to the synthetic control of authority set of the bundle of permissions in the authority set;
Distribution module is set to user assignment in corresponding role, generates user and role's corresponding table;
Relating module is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered;
Judge module is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
7. system according to claim 6 is characterized in that, the described module of setting up comprises:
Registering unit is set to controller and method thereof are registered in the database;
Set up the unit, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
8. system according to claim 6 is characterized in that, described judge module comprises:
The first acquiring unit is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request;
Second acquisition unit is set to according to related controller and the method thereof of described gain of parameter described request message;
The 3rd acquiring unit is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof;
Judging unit is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
9. system according to claim 8 is characterized in that, described judging unit comprises:
The first judgment sub-unit is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
The second judgment sub-unit, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
10. system according to claim 6 is characterized in that, this system comprises:
Feedback module, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210388988.4A CN102930189B (en) | 2012-10-12 | 2012-10-12 | A kind of role-security control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210388988.4A CN102930189B (en) | 2012-10-12 | 2012-10-12 | A kind of role-security control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102930189A true CN102930189A (en) | 2013-02-13 |
CN102930189B CN102930189B (en) | 2015-09-09 |
Family
ID=47644986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210388988.4A Active CN102930189B (en) | 2012-10-12 | 2012-10-12 | A kind of role-security control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102930189B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573480A (en) * | 2015-02-10 | 2015-04-29 | 国家电网公司 | Permission processing method and system |
CN106295311A (en) * | 2016-08-05 | 2017-01-04 | 北京智能管家科技有限公司 | A kind of system authority control method and device |
CN107257337A (en) * | 2017-06-15 | 2017-10-17 | 重庆扬讯软件技术股份有限公司 | A kind of shared authority control method of multiterminal and its system |
CN107895125A (en) * | 2017-12-06 | 2018-04-10 | 深圳市智享未来科技有限公司 | One kind management menu and operating right customizing method |
CN109495514A (en) * | 2018-12-29 | 2019-03-19 | 南方电网科学研究院有限责任公司 | Mutual role help system and method based on edge termination |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020026592A1 (en) * | 2000-06-16 | 2002-02-28 | Vdg, Inc. | Method for automatic permission management in role-based access control systems |
CN102339367A (en) * | 2010-07-27 | 2012-02-01 | 中兴通讯股份有限公司 | Method and device for controlling permission |
-
2012
- 2012-10-12 CN CN201210388988.4A patent/CN102930189B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020026592A1 (en) * | 2000-06-16 | 2002-02-28 | Vdg, Inc. | Method for automatic permission management in role-based access control systems |
CN102339367A (en) * | 2010-07-27 | 2012-02-01 | 中兴通讯股份有限公司 | Method and device for controlling permission |
Non-Patent Citations (2)
Title |
---|
周益宏等: ""ASP.NET MVC中基于AOP和RBAC的权限控制实现方法"", 《现代计算机(专业版)》, vol. 2010, no. 07, 31 July 2010 (2010-07-31), pages 206 - 209 * |
齐迎春: ""基于MVC模式的网络教学资源库平台的设计与实现"", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》, vol. 2012, no. 3, 31 March 2012 (2012-03-31) * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573480A (en) * | 2015-02-10 | 2015-04-29 | 国家电网公司 | Permission processing method and system |
CN106295311A (en) * | 2016-08-05 | 2017-01-04 | 北京智能管家科技有限公司 | A kind of system authority control method and device |
CN107257337A (en) * | 2017-06-15 | 2017-10-17 | 重庆扬讯软件技术股份有限公司 | A kind of shared authority control method of multiterminal and its system |
CN107895125A (en) * | 2017-12-06 | 2018-04-10 | 深圳市智享未来科技有限公司 | One kind management menu and operating right customizing method |
CN109495514A (en) * | 2018-12-29 | 2019-03-19 | 南方电网科学研究院有限责任公司 | Mutual role help system and method based on edge termination |
Also Published As
Publication number | Publication date |
---|---|
CN102930189B (en) | 2015-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102625939B (en) | System and method for managing electronic assets | |
US9621572B2 (en) | Storage appliance and threat indicator query framework | |
CN102891897B (en) | Webpage sharing method and server and client | |
CN102930189A (en) | Role authority limiting method and system | |
EP3190765A1 (en) | Sensitive information processing method, device, server and security determination system | |
CN106095869A (en) | Advertisement information processing method, subscriber equipment, background server and system | |
DE102014113430A1 (en) | Distributed data storage using authorization tokens | |
CN105721420A (en) | Access authority control method and reverse agent server | |
DE202020005715U1 (en) | Dynamic masking of shared data objects | |
US10891357B2 (en) | Managing the display of hidden proprietary software code to authorized licensed users | |
CN104301311B (en) | The method and apparatus of DNS screen data contents | |
CN104579726A (en) | Method and device for managing network resource use permission of user | |
US11882154B2 (en) | Template representation of security resources | |
CN111475803A (en) | Background authority management system and management method | |
DE202015009262U1 (en) | OPTIMIZED HOSTED APPLICATIONS | |
CN107315784A (en) | A kind of data access method and browser | |
CN102724328B (en) | Read client refreshes method, system and device after a while | |
CN106502757A (en) | A kind of plug-in management method and device | |
US9965536B2 (en) | Replication description model for data distribution | |
CN106790160B (en) | Security level identification and method of calibration and device | |
CN110493175A (en) | A kind of information processing method, electronic equipment and storage medium | |
US20090106273A1 (en) | Autonomic generation of profiles in a content management system | |
Luo et al. | Clustering and tailoring user session data for testing web applications | |
Mucchetti et al. | Google data studio | |
CN105430008A (en) | Computing pool application method, computing pool application system, cloud management platform, server and authentication platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |