CN102930189A - Role authority limiting method and system - Google Patents

Role authority limiting method and system Download PDF

Info

Publication number
CN102930189A
CN102930189A CN2012103889884A CN201210388988A CN102930189A CN 102930189 A CN102930189 A CN 102930189A CN 2012103889884 A CN2012103889884 A CN 2012103889884A CN 201210388988 A CN201210388988 A CN 201210388988A CN 102930189 A CN102930189 A CN 102930189A
Authority
CN
China
Prior art keywords
authority
user
controller
request message
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103889884A
Other languages
Chinese (zh)
Other versions
CN102930189B (en
Inventor
魏星德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Software Co Ltd
Original Assignee
China Standard Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Software Co Ltd filed Critical China Standard Software Co Ltd
Priority to CN201210388988.4A priority Critical patent/CN102930189B/en
Publication of CN102930189A publication Critical patent/CN102930189A/en
Application granted granted Critical
Publication of CN102930189B publication Critical patent/CN102930189B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a role authority limiting method and system. The defects that the conventional authority control method cannot flexibly control and distribute authorities of the system can be overcome. The role authority limiting method comprises the following steps of: establishing an authority set for a controller and a controller method; combining authorities in the authority set into an authority control set; distributing users to corresponding roles, and generating a corresponding list of the users and the roles; associating the corresponding list and the authority control set, so as to form an association relation of the corresponding list and the authority control set; and when a user requests for using a function point, judging whether the user has the corresponding authority or not according to the association relation. The role authority limiting method and system provided by the embodiment of the invention can be used for carrying out authority control on any controller in an mvc (Model View Controller) and any method in the controller.

Description

A kind of role-security control method and system
Technical field
The present invention relates to a kind of system control technology, relate in particular to a kind of role-security control method and system.
Background technology
Nowadays, business administration mostly is to assist by computing machine to carry out, and it is extremely important that the aspect that ensures information safety also just becomes.The authority of enterprise's different stage is different, thereupon is that enterprise is also more and more stricter to the requirement of control of authority in the use system of institute.
At present control of authority method relatively more commonly used is had the control of authority of function point and the control of authority of displaying contents, yet these two kinds of methods can not be controlled to the authority of system very neatly and distribute.
The control of authority of function point can realize flexibly based on role's management, takes the principle of function point addition corresponding to role to deal with the control of authority requirement of various function points.If but the subfunction point is arranged under the function point, this original control of authority based on function point is just very clumsy, especially in the time of need to joining in the control of authority in the face of the function point of originally not listing control of authority in, for example in an enterprise script not being had the content changing of concerning security matters is concerning security matters, the thing followed is exactly control of authority, the function of this part of original system as check, the function such as download all added authority.In the face of this situation, the authority control method of original function point need to be write code again, and redesign has affected original code structure, poor stability, and security reduces.
The control of authority of displaying contents is that the data message that users different under identical function point presents is different.The now control of authority of displaying contents is generally complicated a lot of than the control of authority of function point, is relatively more difficult so the control of authority of displaying contents will accomplish to carry out neatly self-defined control, generally need to carry out according to the situation of reality the customization of control of authority.The control of authority of displaying contents is to utilize a method or function to carry out different contents according to the parameter difference that receives to show.The drawback of this mode is exactly system need to add new demonstration control of authority the time clearly, and the slip-stick artist just must revise original design, causes the test again of original function needs, and also confusion relatively of the structure of code.
Summary of the invention
Technical matters to be solved by this invention is to overcome the deficiency that can not control and distribute the authority of system neatly the method for control of authority at present.
In order to solve the problems of the technologies described above, the application provides a kind of role-security control method, comprising:
For controller and method thereof are set up the authority set;
With the synthetic control of authority set of the bundle of permissions in the authority set;
User assignment in corresponding role, is generated user and role's corresponding table;
Described corresponding table and described control of authority set are carried out related, is formed the incidence relation that described corresponding table and described control of authority are gathered;
When the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judge.
Preferably, set up the authority set for controller and method thereof, comprising:
Controller and method thereof are registered in the database;
For the controller and the method thereof that are registered in the described database are set up described authority set.
Preferably, when the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judges, comprising:
When the user uses function point in request, the parameter that the web address in the request message that the acquisition user sends when described function point is used in request comprises;
According to related controller and the method thereof of described gain of parameter described request message;
Obtain the combination of the corresponding controller of described user and method thereof according to described incidence relation;
Judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
Preferably, judge that according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof, comprising:
Judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
When judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
Preferably, the method comprises:
After whether the acquisition user has the judged result of corresponding authority, described judged result is fed back to described user.
The application also provides a kind of role-security control system, comprising:
Set up module, be set to controller and method thereof and set up the authority set;
Composite module is set to the synthetic control of authority set of the bundle of permissions in the authority set;
Distribution module is set to user assignment in corresponding role, generates user and role's corresponding table;
Relating module is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered;
Judge module is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
Preferably, the described module of setting up comprises:
Registering unit is set to controller and method thereof are registered in the database;
Set up the unit, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
Preferably, described judge module comprises:
The first acquiring unit is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request;
Second acquisition unit is set to according to related controller and the method thereof of described gain of parameter described request message;
The 3rd acquiring unit is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof;
Judging unit is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
Preferably, described judging unit comprises:
The first judgment sub-unit is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
The second judgment sub-unit, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
Preferably, this system comprises:
Feedback module, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
Compared with prior art, the application's embodiment can carry out control of authority to the method in any controller and any controller in the model-view-controller (mvc).The application's embodiment is mainly used in the system that adopts the mvc Design Mode, strengthens the system manager to the control of role-security.The application's embodiment can control any function point of system, thereby reaches the flexible control to user's operation, and the purpose of keeping system information security is a kind of powerful authority control method.
Other features and advantages of the present invention will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in instructions, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of instructions, jointly is used for explaining the present invention with embodiments of the invention, is not construed as limiting the invention.
Fig. 1 is the schematic flow sheet of the role-security control method of the embodiment of the present application.
Fig. 2 is the schematic flow sheet of middle step S150 embodiment illustrated in fig. 1.
Fig. 3 is the composition synoptic diagram of the role-security control system of the embodiment of the present application.
Embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the application technology means solve technical matters to the present invention whereby, and the implementation procedure of reaching technique effect can fully understand and implements according to this.Need to prove that only otherwise consist of conflict, each embodiment among the present invention and each feature among each embodiment can mutually combine, formed technical scheme is all within protection scope of the present invention.
In addition, can in the computer system such as one group of computer executable instructions, carry out in the step shown in the process flow diagram of accompanying drawing; And, although there is shown logical order in flow process, in some cases, can carry out step shown or that describe with the order that is different from herein.
As shown in Figure 1, the role-security control method of the embodiment of the present application mainly comprises following content.
S110 for controller and method thereof are set up the authority set, includes a plurality of authorities in each authority set.
The application's embodiment is registered to controller and method thereof in the database, for the controller and the method thereof that are registered in the database are set up a plurality of authority set.Controller and method thereof are in the process of system development, and constantly registration enters database.The content of authority set is the various combination of controller and method thereof.According to controller and the method thereof in the different rights set, can filter user to the access of resource, satisfy different rights user's distinctiveness demand, thereby realize the control of authority to system's operational blocks which partition system.
S120 gathers the synthetic control of authority of the bundle of permissions in the authority set according to demand.
Different authorities is placed in the set, generates a control of authority set of satisfying the control of authority requirement.Be scattered authority in the authority set that S110 sets up, according to the demand of function authority gathered and be divided into one by one control of authority set.
S130, according to system manager's demand with user assignment in corresponding role, generate user and role's corresponding table.Preserve a plurality of roles in this correspondence table, each role can be to should there being a plurality of users, and each user corresponding role only.
S140 carries out user and role's corresponding table and control of authority set related, forms the incidence relation of corresponding table and control of authority set.Control of authority set and corresponding table are carried out related, thereby can be by the role as intermediary, controller and method thereof are distributed to user among the corresponding role, the different different controls of authority of role's correspondence are gathered.
S150, the user is when the function point of request use system, and whether system can have corresponding authority to the user according to above-mentioned incidence relation is judged, obtains the judged result whether user has corresponding authority, and judged result is fed back to the user.
So far, the application's embodiment has namely realized very safe resource control, in the situation of the normal operation of assurance system, has reduced the possibility to " intrusion " of program code, under the prerequisite that does not affect the normal exploitation of slip-stick artist, can join control of authority in the process of business processing.
Among the application's the embodiment, whether the user is had authority is judged, then whether the authority whether certain role is arranged according to role inquiry user corresponding to user exactly search authority set corresponding to role according to the role, searched current function and can be used in the authority set.If in the authority set, then the active user can access; If do not exist, then the active user does not have authority.These conditions are changed into corresponding Get parameter, and carry out combination with the parameter of importing into, make it become a new Get parameter statement.
The application's embodiment, above-mentioned steps S150 mainly comprise following content as shown in Figure 2.
S151 receives the request message that the user sends, and obtains the quantity of the parameter that comprises in web address in this request message and this web address.Parameter in the web address is by Fu Hao ﹠amp; Separate.
S152 if the number of parameters in the web address greater than one, then turns S153, otherwise turns S154.
S153, each parameter in the taking-up web address also deposits in the default array; Turn S155.
S154 takes out this parameter in the web address, this parameter is deposited among first member of default array; Turn S155.
S155 according to the parameter of preserving in the array, obtains related controller and the method thereof of request message that this user sends.If member's number is one in the default array, then adds the method for an acquiescence as second member of array, and these methods and controller are deposited in the array.
S156 according to the only sign of the employed user of logging in system by user, searches from user and role's corresponding table and obtains the role corresponding with this user.
S157, the incidence relation according to correspondence table and privilege feature set obtains the combination of the corresponding controller of user and method thereof.
S158 judges that according to the corresponding controller of user among the S157 whether the user has the authority of the related controller of this request message among the S155, then turns S159, otherwise turns S161.
S159 judges according to the corresponding method of user among the S157 whether the user has the authority of the related method of this request message among the S155, if any then turning S160, otherwise turns S161.
S160, the information that can continue to carry out to user feedback.
S161 haves no right to use the information of this function to user feedback.
As shown in Figure 3, the role-security control system of the embodiment of the present application mainly comprises and sets up module 310, composite module 320, distribution module 330, relating module 340 and judge module 350.
Set up module 310, be set to controller and method thereof and set up the authority set.
Composite module 320 and is set up module 310 and is linked to each other, and is set to the synthetic control of authority set of the bundle of permissions in the authority set.
Distribution module 330 is set to user assignment in corresponding role, generates user and role's corresponding table.
Relating module 340 links to each other with composite module 320 and distribution module 330, is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered.
Judge module 350 links to each other with relating module 340, is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
As shown in Figure 3, the above-mentioned module 310 of setting up comprises registering unit 311 and sets up unit 312.
Registering unit 311 is set to controller and method thereof are registered in the database.
Set up unit 312, link to each other with composite module 320 and registering unit 311, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
As shown in Figure 3, above-mentioned judge module 350 comprises the first acquiring unit 351, second acquisition unit 352, the 3rd acquiring unit 353 and judging unit 354.
The first acquiring unit 351 is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request.
Second acquisition unit 352 links to each other with the first acquiring unit 351, is set to according to related controller and the method thereof of described gain of parameter described request message.
The 3rd acquiring unit 353 links to each other with relating module 340 and the first acquiring unit 351, is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof.
Judging unit 354 links to each other with second acquisition unit 352 and the 3rd acquiring unit 353, is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
As shown in Figure 3, above-mentioned judging unit 354 comprises the first judgment sub-unit 354a and the second judgment sub-unit 354b.
The first judgment sub-unit 354a links to each other with second acquisition unit 352 and the 3rd acquiring unit 353, is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message.
The second judgment sub-unit 354b, link to each other with second acquisition unit 352 and the first judgment sub-unit 354a, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
As shown in Figure 3, this system can also comprise:
Feedback module 360 links to each other with the second judgment sub-unit 354b of judging unit 354 in the judge module 350, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
The application's embodiment adopts the control of authority technology of mvc, has remedied the defective of traditional control of authority technology, has realized the fully control time to system, has avoided the secondary development to original system, has reduced implementation cost.The application's embodiment can also satisfy the demand that the client carries out control of authority to each function point of system flexible and efficiently, and extendability is strong.The application's embodiment has strengthened the dirigibility of system manager to function privilege control, thereby has improved Security of the system and reliability.
Those skilled in the art should be understood that, each step in above-mentioned the embodiment of the present application method and each ingredient in the system, partly or entirely can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and be carried out by calculation element, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Although the disclosed embodiment of the present invention as above, the embodiment that described content just adopts for the ease of understanding the present invention is not to limit the present invention.Technician in any the technical field of the invention; under the prerequisite that does not break away from the disclosed spirit and scope of the present invention; can do any modification and variation in the details that reaches of implementing in form; but scope of patent protection of the present invention still must be as the criterion with the scope that appending claims was defined.

Claims (10)

1. a role-security control method is characterized in that, comprising:
For controller and method thereof are set up the authority set;
With the synthetic control of authority set of the bundle of permissions in the authority set;
User assignment in corresponding role, is generated user and role's corresponding table;
Described corresponding table and described control of authority set are carried out related, is formed the incidence relation that described corresponding table and described control of authority are gathered;
When the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judge.
2. method according to claim 1 is characterized in that, sets up the authority set for controller and method thereof, comprising:
Controller and method thereof are registered in the database;
For the controller and the method thereof that are registered in the described database are set up described authority set.
3. method according to claim 1 is characterized in that, when the user uses function point in request, according to described incidence relation whether the user is had corresponding authority and judges, comprising:
When the user uses function point in request, the parameter that the web address in the request message that the acquisition user sends when described function point is used in request comprises;
According to related controller and the method thereof of described gain of parameter described request message;
Obtain the combination of the corresponding controller of described user and method thereof according to described incidence relation;
Judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
4. method according to claim 3 is characterized in that, judges that according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof, comprising:
Judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
When judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
5. method according to claim 1 is characterized in that, the method comprises:
After whether the acquisition user has the judged result of corresponding authority, described judged result is fed back to described user.
6. a role-security control system is characterized in that, comprising:
Set up module, be set to controller and method thereof and set up the authority set;
Composite module is set to the synthetic control of authority set of the bundle of permissions in the authority set;
Distribution module is set to user assignment in corresponding role, generates user and role's corresponding table;
Relating module is set to described corresponding table and described control of authority set are carried out related, forms the incidence relation that described corresponding table and described control of authority are gathered;
Judge module is set to the user when function point is used in request, according to described incidence relation whether the user is had corresponding authority and judges.
7. system according to claim 6 is characterized in that, the described module of setting up comprises:
Registering unit is set to controller and method thereof are registered in the database;
Set up the unit, the controller and the method thereof that are set to be registered in the described database are set up described authority set.
8. system according to claim 6 is characterized in that, described judge module comprises:
The first acquiring unit is set to the user when function point is used in request, the parameter that the web address in the request message that the acquisition user sends comprises when described function point is used in request;
Second acquisition unit is set to according to related controller and the method thereof of described gain of parameter described request message;
The 3rd acquiring unit is set to obtain according to described incidence relation the combination of the corresponding controller of described user and method thereof;
Judging unit is set to judge according to the combination of the corresponding controller of described user and method thereof whether described user has the authority of the related controller of described request message and method thereof.
9. system according to claim 8 is characterized in that, described judging unit comprises:
The first judgment sub-unit is set to judge according to the corresponding controller of described user whether described user has the authority of the related controller of described request message;
The second judgment sub-unit, be set to when judging described user according to the corresponding controller of described user and have the authority of the related controller of described request message, judge according to the corresponding method of described user whether described user has the authority of the related method of described request message.
10. system according to claim 6 is characterized in that, this system comprises:
Feedback module, be set to obtain judged result that whether user have corresponding authority after, described judged result is fed back to described user.
CN201210388988.4A 2012-10-12 2012-10-12 A kind of role-security control method and system Active CN102930189B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210388988.4A CN102930189B (en) 2012-10-12 2012-10-12 A kind of role-security control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210388988.4A CN102930189B (en) 2012-10-12 2012-10-12 A kind of role-security control method and system

Publications (2)

Publication Number Publication Date
CN102930189A true CN102930189A (en) 2013-02-13
CN102930189B CN102930189B (en) 2015-09-09

Family

ID=47644986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210388988.4A Active CN102930189B (en) 2012-10-12 2012-10-12 A kind of role-security control method and system

Country Status (1)

Country Link
CN (1) CN102930189B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573480A (en) * 2015-02-10 2015-04-29 国家电网公司 Permission processing method and system
CN106295311A (en) * 2016-08-05 2017-01-04 北京智能管家科技有限公司 A kind of system authority control method and device
CN107257337A (en) * 2017-06-15 2017-10-17 重庆扬讯软件技术股份有限公司 A kind of shared authority control method of multiterminal and its system
CN107895125A (en) * 2017-12-06 2018-04-10 深圳市智享未来科技有限公司 One kind management menu and operating right customizing method
CN109495514A (en) * 2018-12-29 2019-03-19 南方电网科学研究院有限责任公司 Mutual role help system and method based on edge termination

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026592A1 (en) * 2000-06-16 2002-02-28 Vdg, Inc. Method for automatic permission management in role-based access control systems
CN102339367A (en) * 2010-07-27 2012-02-01 中兴通讯股份有限公司 Method and device for controlling permission

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026592A1 (en) * 2000-06-16 2002-02-28 Vdg, Inc. Method for automatic permission management in role-based access control systems
CN102339367A (en) * 2010-07-27 2012-02-01 中兴通讯股份有限公司 Method and device for controlling permission

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周益宏等: ""ASP.NET MVC中基于AOP和RBAC的权限控制实现方法"", 《现代计算机(专业版)》, vol. 2010, no. 07, 31 July 2010 (2010-07-31), pages 206 - 209 *
齐迎春: ""基于MVC模式的网络教学资源库平台的设计与实现"", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》, vol. 2012, no. 3, 31 March 2012 (2012-03-31) *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573480A (en) * 2015-02-10 2015-04-29 国家电网公司 Permission processing method and system
CN106295311A (en) * 2016-08-05 2017-01-04 北京智能管家科技有限公司 A kind of system authority control method and device
CN107257337A (en) * 2017-06-15 2017-10-17 重庆扬讯软件技术股份有限公司 A kind of shared authority control method of multiterminal and its system
CN107895125A (en) * 2017-12-06 2018-04-10 深圳市智享未来科技有限公司 One kind management menu and operating right customizing method
CN109495514A (en) * 2018-12-29 2019-03-19 南方电网科学研究院有限责任公司 Mutual role help system and method based on edge termination

Also Published As

Publication number Publication date
CN102930189B (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN102625939B (en) System and method for managing electronic assets
US9621572B2 (en) Storage appliance and threat indicator query framework
CN102891897B (en) Webpage sharing method and server and client
CN102930189A (en) Role authority limiting method and system
EP3190765A1 (en) Sensitive information processing method, device, server and security determination system
CN106095869A (en) Advertisement information processing method, subscriber equipment, background server and system
DE102014113430A1 (en) Distributed data storage using authorization tokens
CN105721420A (en) Access authority control method and reverse agent server
DE202020005715U1 (en) Dynamic masking of shared data objects
US10891357B2 (en) Managing the display of hidden proprietary software code to authorized licensed users
CN104301311B (en) The method and apparatus of DNS screen data contents
CN104579726A (en) Method and device for managing network resource use permission of user
US11882154B2 (en) Template representation of security resources
CN111475803A (en) Background authority management system and management method
DE202015009262U1 (en) OPTIMIZED HOSTED APPLICATIONS
CN107315784A (en) A kind of data access method and browser
CN102724328B (en) Read client refreshes method, system and device after a while
CN106502757A (en) A kind of plug-in management method and device
US9965536B2 (en) Replication description model for data distribution
CN106790160B (en) Security level identification and method of calibration and device
CN110493175A (en) A kind of information processing method, electronic equipment and storage medium
US20090106273A1 (en) Autonomic generation of profiles in a content management system
Luo et al. Clustering and tailoring user session data for testing web applications
Mucchetti et al. Google data studio
CN105430008A (en) Computing pool application method, computing pool application system, cloud management platform, server and authentication platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant