WO2010148549A1 - System for identifying a user and its maintaining method - Google Patents

System for identifying a user and its maintaining method Download PDF

Info

Publication number
WO2010148549A1
WO2010148549A1 PCT/CN2009/072387 CN2009072387W WO2010148549A1 WO 2010148549 A1 WO2010148549 A1 WO 2010148549A1 CN 2009072387 W CN2009072387 W CN 2009072387W WO 2010148549 A1 WO2010148549 A1 WO 2010148549A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
event
mercury
user
information
Prior art date
Application number
PCT/CN2009/072387
Other languages
French (fr)
Chinese (zh)
Inventor
盛永祥
邢益涛
Original Assignee
Sheng Yongxiang
Xing Yitao
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sheng Yongxiang, Xing Yitao filed Critical Sheng Yongxiang
Priority to CN2009801604665A priority Critical patent/CN102576359A/en
Priority to PCT/CN2009/072387 priority patent/WO2010148549A1/en
Publication of WO2010148549A1 publication Critical patent/WO2010148549A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Definitions

  • the wood problem to be solved by the firm is to provide users with different methods and methods that can overcome the above-mentioned shortcomings of existing users.
  • This provides users with a separate file, its event mercury file, each operating file of the mercury user, the information of the user in the mercury, as well as the event index file, the event index file event mercury file and the file phase, the index event mercury file The operations in the file and the information in the file.
  • the event index file event in the user's different operations, the user does not provide the corresponding event,
  • event mercury file event mercury the event mercury file event index file phase as well, the event mercury content, its operational information, the case operation, the operation of the same time or the operation.
  • the event mercury content near reference documents and reference documents, when the reference information of the mercury operator is required, the reference file Y, when the reference information of the mercury operator is not needed, the reference file, the reference file in the event mercury file reference file is not .
  • file events make the file event index file phase as well as event information, where the operation may have problems, methods, and considerations.
  • event mercury file, file or event index file is stored on the user system or on the memory.
  • This approach provides a user-independent approach in which mercury users are treated differently, the mercury files of the household phase, and the information in the mercury file are used by the user.
  • the index file enables the event index file to event mercury files as well as the file phase to index each event in the event mercury file as well as the information in the file.
  • the event index file event mercury file uses the event mercury to make the event index file file and the event content description .
  • event mercury file utilizes event mercury to make the event mercury file event index file as well as the use of event mercury content that is not mercury operated, operational lifetime, and operational events.
  • the reference file is not used in the user to store the reference information when the operation is performed.
  • the reference file is special, Special means that there is no reference file in the operation.
  • the mercury, image, or fingerprint information of the users of the mercury users in the reference document as well as the occurrences, the number of returns, the number of illegal operations, and the effort.
  • the user controls the main controller 101, the system 103, the user 105, the user interface 107, 109, the dice 11, the system 113, the external communication 115, the storage 117, and the security 119.
  • the main controller 101 controls the user's system.
  • the system 103 is not the same as the user.
  • User 105 is more specific than the user's unique fingerprint, , or iris, identity, etc., and the user's operation is legal.
  • the user interface 107 is an interaction between the user and the user, and is user-friendly.
  • Xunzi 11 provides a system for users to use.
  • the system 113 is within the user's own system.
  • External communication 115 is for external communication, for example, the main and information exchange of GPRS.
  • Storage 117 is the number of storage users and systems. Among them, the number of users, the number of users, the number of users, the number of users, the number of users, the number of users, the number of users, and the number of users. In each, information is useful. In this example, the number of uses and the number of years of use, as well as the present and the same, have a reference role.
  • Security 119 is the number in this book to prevent theft.
  • step 1100 the user firstly goes through 113 lines.
  • step 1101 the user operates, the example, and the operation. Unified user
  • step 1102 the completion of the operation 109 will complete the operation to operate the mercury file. If the operation is illegal, in step 1103, the operation fails, and the operation fails to operate the mercury file, and the user is born in the failure file.
  • System 113 households warning
  • step 1301 when the system is slightly lower but still working, in step 1301, the user
  • step 1302 the obscenity line 109 completes the operation of the mercury operation desired by the user, and the household is created in the operation file. If the operation is illegal, in step 1303, the operation fails, but the mercury fails to operate, and the user is born with the failure file. From 113
  • step 1201 the user's operation in the Nakajima document, mercury
  • step 1202 the user is prompted to exit the operation. In the above, it is especially important to provide the most direct and powerful support for each user's birthday.
  • the event mercury file 2200 in the mercury user's separate operation file 2300, is user-specific information.
  • Event Index File 2100 Event Mercury File 2200 and File 2300, for each event in the Index Event Mercury File 2200 and File 2300 and their information.
  • References 2201 Reference information for mercury operation.
  • the event mercury file 2200, the file 2300, the reference file 2201, or the event index file 2100 are stored on the user system or stored on the memory.
  • the event mercury file 2200 can be
  • the file 2300, the reference file 2201, or the event index file 2100 are collectively stored in the storage 117 of the user, and the event mercury file 2200, the event index file may also be included therein.
  • 2100 and reference file 2201 are stored in the storage 117 of the user, and the file 2300 is stored in each of the files 2300, that is, the file 2300 may not be stored in the user system, but the file 2300 is stored on each of the files 2300.
  • Event Index File 2100 Three Events, Events, and Events Events are the only code within the user's operating system.
  • the event makes the event mercury file 2200 event index file 2100 phase.
  • the event section describes the rest of the event, such as low ( owe - ow), high ( owe - g ), and timeout (T e- ).
  • the event is a code assigned by the user to the action that may occur in the system, which causes the file 2300 event index file 2100 to be phased.
  • Events and events User-specific operations Mercury content in operation 2000 No.
  • Event Mercury Document 2200 Two-part event and event Mercury content.
  • the event is the internal code of the operation assigned by the user in the user system.
  • Event Mercury content Hume Mercury Operational information such as operation, operation, operation, etc.
  • the reference file and the reference file reference file indicate that the reference file information of the operation is stored in the file in the storage 117.
  • the reference file Y is valid at this time.
  • Mercury is not required for phase information, reference documents, and reference documents at this time.
  • the event mercury content may not include the reference file.
  • the reference information of the mercury event is needed, the address of the reference document of the reference mercury reference information, when the reference information of the mercury event is not needed, the reference file Special, special means that there is no reference file in the operation.
  • File 2300 Two parts of event and event information.
  • the event causes the file 2300 event index file 2100 to be phased.
  • the event information provides information on possible operations, problems, methods, and precautions.
  • Reference file 2201 Two-part reference file and reference file information. reference document The operation in the reference file event mercury file 2200 is not performed.
  • the reference information is the reference information of the operation of the mercury, the user information of the operation, the information such as mercury and mercury images of the user, the occurrence of the situation, the temperature, the arbitrarily returned, the illegal operation and the effort.
  • Ev 006 finds the event information of Ev 006 in file 2300, the information step of the device or the device device.
  • Mercury Document 2200 mercury was used for the rest of the operation.
  • event index file 2100 can be found in the event mercury file 2200 operating in Hume.
  • references 4, 4 are the flow of the method for explaining the user's uniqueness.
  • the user is not unified.
  • the user is not the first one. Whether it is managed, or by the user's identity, is it qualified. Management does not and the user each, in step 3002, exits the mercury failure operation.
  • step 3003 the information in each of the event mercury file 2200 and the reference file 2201.
  • step 3004 or the information in each file 2300.
  • the information can be a household device or a display device. Therefore, it is basically possible to initially locate the obstacles.
  • step 3005, use 2000.
  • the information provided in each section. Is it in step 3006. If not, go back to step 3005.
  • step 3006, the stack is opened.
  • step 3007 the mercury operation phase information and the operation in the example, the identity, the same, appear.
  • the methods are equal in each.
  • the user can be disassembled, and the mercury and the information provided by the user in the middle phase can be quickly used to solve the problem of the user and the matters to be noticed, thereby greatly improving the efficiency and the work. .

Abstract

A system for identifying a user and its maintaining method are provided. The system for identifying a user includes: an event recording file which is used to record every operation of the system for identifying a user; a maintaining data file which is used to present the maintaining information of the system for identifying a user; and an event index file, the event index file is associated with the event recording file and the maintaining data file and is used to index every operation of the event recording file and the maintaining information of the maintaining data file.

Description

用戶 別 統及其 方法  User system and method
木領域 Wood field
本 涉及 用戶 別 統, 特別是 用戶 別 統及其 。 背景 木  This is related to the user, especially the user and its system. Background
近年未, 用戶 別 統 泛用于身份 別及 管理中。 例 , 在 或門禁 統中, 通 用戶 而決定是否 門鎖。 在更高 的 中, 通 用戶 未判定使用者的使用 。 例 , 在某些重要 統中, 只有通 用戶 的 才有 統做出修 。 而在送神 統中的 介問題是, 何 用戶 別 統 。  In recent years, users have not been used in identity and management. For example, in the OR gate system, the user decides whether to lock the door. In the higher, the user does not determine the user's use. For example, in some important systems, only the users can make repairs. The problem in sending the gods is that the user is not unified.
通常 各的 需要花費大量的 同和精力。例 在用戶 別 統 障 , 了找出 障的 休原因, 打 通常 測試 多 可能的 障 原因, 然 找到 障的 原因。 然而, 需要花 費大量的 同, 有時甚至需要花費 周甚至 周的 同, 效率低下。 而且 通常需要將用戶 別 統 換下未, 帶到研究室中 。在 打 有 限,而需要 的用戶 別 統有多 的情況下,十分不利于提高 效率。 內容  Usually each requires a lot of effort and effort. In the case of the user, the obstacles are found, and the reason for the obstacle is usually tested, and the cause of the obstacle is found. However, it takes a lot of the same, and sometimes it takes weeks or even weeks to be inefficient. And it is often necessary to replace the user with the user and bring it to the lab. In the case of limited restrictions and the need for a large number of users, it is not conducive to efficiency. Content
本 所要解決的 木問題是提供 用戶 別 統及其 方法,其 可克服現有用戶 別 統現存的上述不足。 本 提供 用戶 別 統, 其 事件 汞文件, 于 汞用戶 別 統的每 介操作 文件, 于 汞用戶 別 統的 信息 以及, 事件索引文件, 事件索引文件 事件 汞文件以及 文件相 , 于索引事件 汞文件中的操作以及 文件中的 信息。  The wood problem to be solved by the firm is to provide users with different methods and methods that can overcome the above-mentioned shortcomings of existing users. This provides users with a separate file, its event mercury file, each operating file of the mercury user, the information of the user in the mercury, as well as the event index file, the event index file event mercury file and the file phase, the index event mercury file The operations in the file and the information in the file.
本 的 方式, 事件索引文件 事件 , 于用戶 別 統中 的每 介操作, 用戶 別 統 提供 相 的事件 , 使得事件索引文件 事件 汞文件相 事件 汞 , 于使得事 件索引文件 文件相 以及, 事件 , 于 羊描述 操 作的 休內容。 In this way, the event index file event, in the user's different operations, the user does not provide the corresponding event, The event index file event mercury file phase events mercury, so that the event index file file phase as well as the event, the sheep describe the operation of the Hugh content.
本 的 方式, 事件 汞文件 事件 汞 , 使得事 件 汞文件 事件索引文件相 以及, 事件 汞內容, 其 于操作 的信息, 例 操作 、 操作的 生時同或操作的 。  This way, the event mercury file event mercury, the event mercury file event index file phase as well, the event mercury content, its operational information, the case operation, the operation of the same time or the operation.
本 的 方式, 用戶 別 統近 參考文件, 于存儲操 作 生時的參考信息。  In this way, the user does not refer to the reference file for reference information when storing the operation.
本 的 方式,事件 汞內容近 參考文件 以及參 考文件 , 需要 汞操作 生的參考信息時, 參考文件 Y, 不需要 汞操作 生的參考信息時, 參考文件 , 參考文件 于將事件 汞文件 參考文件 未。  In this way, the event mercury content near reference documents and reference documents, when the reference information of the mercury operator is required, the reference file Y, when the reference information of the mercury operator is not needed, the reference file, the reference file in the event mercury file reference file is not .
本 的 方式, 事件 汞內容近 參考文件 , 需要 汞操作 生的參考信息時, 參考文件 汞參考信息的參考文件 的地址, 不需要 汞事件 生的參考信息時, 參考文件 特 殊 , 特殊 表示 于 操作不存在參考文件。  This method, the event mercury content near reference document, the reference information of the mercury reference information when the reference information is needed, the reference file of the mercury reference information is not required, the reference file is special, the special indication is not in operation There is a reference file.
本 的 方式, 參考文件 用戶 別 統的使用者的汞 、 像、 或指紋信息, 以及出現 的 、 溫度、 返 的數 、 非法操作的數 和行力。  In this way, refer to the user's mercury, image, or fingerprint information, as well as the number of occurrences, temperature, number of returns, number of illegal operations, and effort.
本 的 方式, 文件 事件 , 使得 文件 事件索引文件相 以及, 事件 信息, 其中 操 作可能存在的 問題、 方法以及 注意事項。  This way, file events, make the file event index file phase as well as event information, where the operation may have problems, methods, and considerations.
本 的 方式, 事件 汞文件、 文件或事件索引文 件存儲在用戶 別 統上或者 同存儲在 存儲器上。  In this way, the event mercury file, file or event index file is stored on the user system or on the memory.
本 近提供 用戶 別 統的 方法, 其中 汞用戶 別 統 的每 介操作, 戶生相 的 汞文件 以及, 利用 汞文件中的信息 用 戶 別 統 。  This approach provides a user-independent approach in which mercury users are treated differently, the mercury files of the household phase, and the information in the mercury file are used by the user.
本 的 方式,利用事件 汞文件 汞用戶 別 統的每 介操作 利用 文件提供用戶 別 統的 信息 以及, 利用事件 索引文件,使事件索引文件 事件 汞文件以及 文件相 , 以索 引事件 汞文件中的每 介操作以及 文件中的 信息。 In this way, the use of the event mercury file mercury user is used to provide users with information and use events. The index file enables the event index file to event mercury files as well as the file phase to index each event in the event mercury file as well as the information in the file.
本 的 方式, 在事件索引文件中 利用事件 未 用 戶 別 統中 的每 介操作, 使得事件索引文件 事件 汞文件相 利用事件 汞 而使得事件索引文件 文件相 以及, 利用事件 未 羊描述 操作的 休內容。  In this way, in the event index file, the event is not used in each user operation, so that the event index file event mercury file uses the event mercury to make the event index file file and the event content description .
本 的 方式, 在事件 汞文件中 利用事件 汞 使得 事件 汞文件 事件索引文件相 以及, 利用事件 汞內容未 汞操作 的 、 操作的 生時同以及操作的事件 。  This approach, in the event mercury file, utilizes event mercury to make the event mercury file event index file as well as the use of event mercury content that is not mercury operated, operational lifetime, and operational events.
本 的 方式,在用戶 別 統中利用參考文件未存儲操作 生時的參考信息。  In this way, the reference file is not used in the user to store the reference information when the operation is performed.
本 的 方式,在事件 汞內容中利用參考文件 以及 參考文件 未 參考文件, 需要 汞操作 生的參考信息時, 參考文 件 Y, 不需要 汞操作 生的參考信息時, 參考文件  This is the way to use reference documents and reference documents in the event mercury content. If you need reference information for mercury operations, refer to document Y, when you do not need reference information for mercury operations, reference documents.
, 且利用參考文件 將事件 汞文件 參考文件 未。 本 的 方式, 在事件 汞內容中利用參考文件 未 參考文件, 需要 汞操作 生的參考信息時, 參考文件 汞參 考信息的參考文件的地址, 不需要 汞事件 生的參考信息時, 參考文件 特殊 , 特殊 表示 于 操作不存在參考文件。 本 的 方式,在參考文件中近 汞用戶 別 統的使用者 的汞 、 像、 或指紋信息, 以及出現 的 情況、 返 的 數 、 非法操作的數 和行力。  And use the reference file to event the mercury file reference file. In this way, when the reference document is not used in the event mercury content, the reference information of the mercury reference information is required, and the reference file of the mercury reference information is not required, the reference file is special, Special means that there is no reference file in the operation. In this way, the mercury, image, or fingerprint information of the users of the mercury users in the reference document, as well as the occurrences, the number of returns, the number of illegal operations, and the effort.
本 的 方式, 在 文件中 利用事件 使得 文件 事件索引文件相 以及, 利用事件 信息, 汞 操作可能存在的問題、 方法以及 注意事項。  In this way, the use of events in the file makes the file event index file and, with event information, possible problems, methods, and considerations for mercury operations.
本 的 方式, 將事件 汞文件、 文件或事件索引 文件存儲在用戶 別 統上或者 同存儲在 存儲器上。 說明 1 了用戶 別 統的In this way, the event mercury file, file or event index file is stored on the user system or stored in the memory. Description 1 User's unique
2 了用戶 別 統 的流程 2 User-specific processes
3 了 本 的 的 休 3 of the rest of this
4是 本 利用 各 的方法 休 方式  4 is the way to use each method
參考 1, 因 1示出了用戶 別 統的 。 用戶 別 統 主控制器 101、 統 103、 用戶 105、 用戶界面 107、 109、 屯子 11、 統 113、 外部通信 115、 存儲 117 以及安全 119。 其中, 主控制器 101 于控制 用戶 別 統的 。 統 103 于 功用戶 別 統。 用戶 105 比 用戶的特有特 例 指紋、 、 或虹膜、 身份 、 等未 用戶, 而 用戶的操作是否合法。 用戶界面 107是用戶占用戶 別 統的交互 , 通 用戶友好 統。 Reference 1, because 1 shows the user's different. The user controls the main controller 101, the system 103, the user 105, the user interface 107, 109, the dice 11, the system 113, the external communication 115, the storage 117, and the security 119. The main controller 101 controls the user's system. The system 103 is not the same as the user. User 105 is more specific than the user's unique fingerprint, , or iris, identity, etc., and the user's operation is legal. The user interface 107 is an interaction between the user and the user, and is user-friendly.
109 于用戶 別 統的 休操作, 例 。 屯子 11 于提供用戶 別 統的 統 。 統 113 于用戶 別 統內部的自 。 外部通信 115 于 外部 通信, 例 通 GPRS 同 中的主和 信息交換。 存儲 117 于存儲用戶數 及 統 。 其中, 統 例 本 各信息, 例 本 信息、 本 各信息以及本 使用的次數等 用戶數 例 本 用戶數量、特 數量、本 各 成 數量 等。在 各 , 有 信息是有用的。 例 在 本 , 本 的使用次數和使用 年限以及本 的 和 同 具有參考作用。安全 119則 于 本 中的數 , 防止 被 盜用。  109 The rest of the user's operation, for example. Xunzi 11 provides a system for users to use. The system 113 is within the user's own system. External communication 115 is for external communication, for example, the main and information exchange of GPRS. Storage 117 is the number of storage users and systems. Among them, the number of users, the number of users, the number of users, the number of users, the number of users, the number of users, the number of users, and the number of users. In each, information is useful. In this example, the number of uses and the number of years of use, as well as the present and the same, have a reference role. Security 119 is the number in this book to prevent theft.
參考 1和 2, 因 2示出了本 用戶 別 統 的流程 。 在 統 103將用戶 別 統 , 在步驟 1100中, 用戶 別 統 首先通 統 113 行自 。 統內部 切 常 ,在步驟1101 中, 用戶 操作, 例 , 操作。 統通 用戶  Refer to 1 and 2, because 2 shows the flow of this user. In the system 103, the user is separated, and in step 1100, the user firstly goes through 113 lines. Internally, in step 1101, the user operates, the example, and the operation. Unified user
105 此用戶是否有 操作 且 操作是否 , 也即 是否合法。 操作合法時, 在步驟 1102中, 統通迷行 109完 成 操作 將 操作 汞到 的 志文件。 操作不合法時, 在步驟 1103 中, 操作失敗 操作, 然 將 失敗操作 汞到 的 志文 件中, 戶生 于 失敗操作的 志文件。 統 113戶生警告 105 Is this user operating and operating, ie is it legal. When the operation is legal, in step 1102, the completion of the operation 109 will complete the operation to operate the mercury file. If the operation is illegal, in step 1103, the operation fails, and the operation fails to operate the mercury file, and the user is born in the failure file. System 113 households warning
, 例 統 略低但仍可 工作時, 在步驟 1301 中, 通 用戶 , when the system is slightly lower but still working, in step 1301, the user
105 用戶是否有 操作 且 操作是否 ,也即 操作是否合法。 操作合法時, 在步驟 1302中, 通迷行 109完 成用戶所希望的操作 汞 操作, 戶生 于 操作的 志文件。 操 作不合法時, 在步驟 1303 中, 操作失敗 操作, 然 汞 失敗操作, 戶生 于 失敗操作的 志文件。 統自 113  105 Whether the user has an operation and the operation is correct, that is, whether the operation is legal. When the operation is legal, in step 1302, the obscenity line 109 completes the operation of the mercury operation desired by the user, and the household is created in the operation file. If the operation is illegal, in step 1303, the operation fails, but the mercury fails to operate, and the user is born with the failure file. From 113
而不能 工作時,例 低而 常工作時,在步驟1201 中, 用戶的操作 在 中戶生 志文件, 汞 When it is not working, when the case is low and often working, in step 1201, the user's operation in the Nakajima document, mercury
汞未能 的用戶操作。 在步驟 1202中, 提示用戶 , 退出 操作。 在上述 中, 尤其重要的是, 用戶 別 統的每 介操作戶生日 汞相 , 的 提供最直接最有力的支持。 Mercury failed to operate by the user. In step 1202, the user is prompted to exit the operation. In the above, it is especially important to provide the most direct and powerful support for each user's birthday.
在 2的說明中提及,用戶 別 統 于 統中的每 介操作戶生 日志文件 汞相 。 參考 3, 因 3示出了相 志文件的 休 方式。 在本 中, 相 志文件組成 堆 , 此  As mentioned in the description of 2, the user does not know the mercury content of each user log file in the system. Refer to 3, because 3 shows the way in which the documents are closed. In this book, the documents are composed of heaps, this
2000 的相 例 事件索引文件2100、 事件 汞文件2200、 文件2300以及參考文件2201。 其中, 事件 汞文件2200, 于 汞 用戶 別 統的每 介操作 文件 2300, 于 用戶 別 統的 信息。事件索引文件2100 事件 汞文件2200以及 文件2300 相 , 于索引事件 汞文件2200及 文件2300中的每 介操作 及其 信息。 參考文件 2201 于 汞 操作的相 參考信息。 在 本 的 方式中, 事件 汞文件 2200、 文件 2300、 參考文件 2201或事件索引文件2100存儲在用戶 別 統上或者 同存儲在 存儲 器上。 在本 的另 介 方式中, 可以將事件 汞文件 2200、 Phase 2000 of the event index file 2100, event mercury file 2200, file 2300, and reference file 2201. Among them, the event mercury file 2200, in the mercury user's separate operation file 2300, is user-specific information. Event Index File 2100 Event Mercury File 2200 and File 2300, for each event in the Index Event Mercury File 2200 and File 2300 and their information. References 2201 Reference information for mercury operation. In this manner, the event mercury file 2200, the file 2300, the reference file 2201, or the event index file 2100 are stored on the user system or stored on the memory. In this alternative, the event mercury file 2200 can be
文件 2300、 參考文件 2201或事件索引文件 2100共同存儲在用戶 別 統的存儲 117 中, 也可以將其中的事件 汞文件 2200、 事件索引文件 2100和參考文件2201存儲在用戶 別 統的存儲 117中, 而將 文件2300存儲在 于 的 各上,即 文件2300可以不存 儲用戶 別 統中, 而 在有需要 存儲 文件 2300的 各上 得 文件2300 The file 2300, the reference file 2201, or the event index file 2100 are collectively stored in the storage 117 of the user, and the event mercury file 2200, the event index file may also be included therein. 2100 and reference file 2201 are stored in the storage 117 of the user, and the file 2300 is stored in each of the files 2300, that is, the file 2300 may not be stored in the user system, but the file 2300 is stored on each of the files 2300.
事件索引文件2100 三部分 事件 、 事件 以及事件 事件 是用戶 別 統 用戶 統中的 操作分配的 統內唯 代碼。 事件 使得事件 汞文件2200 事件索引文件2100相 。 事件 部 分 羊 描述了 事件的 休內容, 例 低 ( owe - ow)、 高 ( owe - g )、 超時 (T e- )。 事件 是用戶 別 統 力 統中可能出現的 的措施分配的代碼, 其使得 文件 2300 事件索引文件2100相 。 事件 以及事件 將用戶 別 統的 操作 2000中 操作的 汞內容 未。  Event Index File 2100 Three Events, Events, and Events Events are the only code within the user's operating system. The event makes the event mercury file 2200 event index file 2100 phase. The event section describes the rest of the event, such as low ( owe - ow), high ( owe - g ), and timeout (T e- ). The event is a code assigned by the user to the action that may occur in the system, which causes the file 2300 event index file 2100 to be phased. Events and events User-specific operations Mercury content in operation 2000 No.
事件 汞文件 2200 兩部分 事件 以及事件 汞內容。 事件 是是用戶 別 統 用戶 統中的 操作分配的 統內唯 代碼。事件 汞內容 休 汞了 操作的 休信息, 例 操作 、 操作時同、 操 作用戶等。此外,在事件 汞內容中近 參考文件 和參考文件 參考文件 指示了 操作的參考文件信息存儲在存儲 117中的 文件中 需要 汞 操作的相 參考信息時, 參考文件 Y, 此時 參考文件 有效。 沒有相 信息需要 汞 , 參考文件 , 此 時參考文件 。 在 本 的另 介 方式中, 事件 汞內容中 也可不包 參考文件 , 需要 汞事件 生的參考信息時, 參考文件 汞參考信息的參考文件的地址, 不需要 汞事件 生的參考 信息時, 參考文件 特殊 , 特殊 表示 于 操作不 存在參考文件。  Event Mercury Document 2200 Two-part event and event Mercury content. The event is the internal code of the operation assigned by the user in the user system. Event Mercury content Hume Mercury Operational information, such as operation, operation, operation, etc. In addition, in the event mercury content, the reference file and the reference file reference file indicate that the reference file information of the operation is stored in the file in the storage 117. When the reference information of the mercury operation is required, the reference file Y is valid at this time. Mercury is not required for phase information, reference documents, and reference documents at this time. In this alternative mode, the event mercury content may not include the reference file. When the reference information of the mercury event is needed, the address of the reference document of the reference mercury reference information, when the reference information of the mercury event is not needed, the reference file Special, special means that there is no reference file in the operation.
文件2300 兩部分 事件 和事件 信息。 事件 使得 文件2300 事件索引文件2100相 。 事件 信息 則 休提供了 操作的可能存在的 、 問題、 方法以及 注意事 項等內容。  File 2300 Two parts of event and event information. The event causes the file 2300 event index file 2100 to be phased. The event information provides information on possible operations, problems, methods, and precautions.
參考文件2201 兩部分 參考文件 以及參考文件信息。 參考文件 使得 操作的參考文件 事件 汞文件2200中的操作 未。 參考文件信息則 休 汞了 操作的參考信息, 例 操作的用戶信 息, 用戶汞 、 汞像等信息以及出現 候的情況, 、 溫度等 情況、 統中任意 返 的 、 非法操作的 和行力。 Reference file 2201 Two-part reference file and reference file information. reference document The operation in the reference file event mercury file 2200 is not performed. The reference information is the reference information of the operation of the mercury, the user information of the operation, the information such as mercury and mercury images of the user, the occurrence of the situation, the temperature, the arbitrarily returned, the illegal operation and the effort.
參考 2及 3,例 在 本 的用戶 別 統的 介 方式中, 首先 統自 且 例 低,此 統戶生 介 例 35, 汞到事件索引文件 2100的事件 中。 在事件索引文件 2100 的事件 部分 羊描述 操作的內容, 例 Powe - ow。 且在 事件 部分中 的事件 。 事件 可以在 文件 2300中 找到 操作的 信息。 本 的 , 文件2300以及事件 是預先固化在 統中的。 即, 事先假定 于 操作(例 低),其 的事件 分配 Ev 006 統中 低 , 統將 操作 的事件  References 2 and 3, in this user's different media, first and foremost, the case is low, this is the case of the household account 35, mercury to the event index file 2100. In the event section of the event index file 2100, the sheep describes the contents of the operation, for example Powe - ow. And the event in the event section. Events The information for the action can be found in file 2300. This, file 2300 and events are pre-cured in the system. That is, it is assumed in advance that the operation (case is low), its event is assigned Ev 006, and the event will be operated.
Ev 006, 然 到 文件2300中 找到Ev 006 的事件 信息, 可 戶裝置或 示器裝置 出的 信息 步 。 而在事件 汞文件 2200中 汞了 操作的 休內容。 在有需要 , 事件索引文件2100中的事件 可以 找到事件 汞文件2200中 操 作的 休 汞。 Ev 006, then find the event information of Ev 006 in file 2300, the information step of the device or the device device. In the event Mercury Document 2200, mercury was used for the rest of the operation. In the event of an event, event index file 2100 can be found in the event mercury file 2200 operating in Hume.
參考 4, 4是說明本 的用戶 別 統的 方法的流程 。 在 步驟3000中 用戶 別 統的 。在步驟3001中, 用戶 別 統首先 的 。 例 由管理 , 或者由用 戶 別 統 的身份, 是否由資格 。 管 理 沒有 且用戶 各 , 在步驟 3002 中, 退出 汞此失敗 操作。 各  References 4, 4 are the flow of the method for explaining the user's uniqueness. In step 3000, the user is not unified. In step 3001, the user is not the first one. Whether it is managed, or by the user's identity, is it qualified. Management does not and the user each, in step 3002, exits the mercury failure operation. Each
或用戶 各 身份 允許 , 在步驟 3003 中, 各的 中事件 汞文件2200以及參考文件2201中的信 息。 在步驟3004中, 或 各 文件2300中的信息。在此, 信息可 戶裝置 或 示器裝置 。 此 , 基本 可以初步 各 障 所在, 在步驟3005中, 利用 2000 中提供的相 信息 各的 。在步驟3006中 是否 。 不通 則返 步驟3005, 。 在步驟3006中 成堆打通 , 在步驟 3007 中, 汞 操作相 信息以及 中 的操作, 例 身份、 同、 出現 。 方法、 各中 的相 等。 在另 介 方式中, 也可以沒有步驟 3004, 可以在 得了 2000中的事件 汞文件2200及參考文件2201中的內容 , 直接 。 Or the user's identity allows, in step 3003, the information in each of the event mercury file 2200 and the reference file 2201. In step 3004, or the information in each file 2300. Here, the information can be a household device or a display device. Therefore, it is basically possible to initially locate the obstacles. In step 3005, use 2000. The information provided in each section. Is it in step 3006. If not, go back to step 3005. In step 3006, the stack is opened. In step 3007, the mercury operation phase information and the operation in the example, the identity, the same, appear. The methods are equal in each. In another mode, there may be no step 3004, and the contents of the event mercury file 2200 and the reference file 2201 in 2000 may be directly obtained.
使用 本 的 和 方法, 將用戶 別 統拆卸, 通 用戶 別 統中 中相 操作的 汞和提供的信息,可 以快速 用戶 別 統的 障所在 方法及 中 注意的事項, 大大提高了 效率, 了 的工作 。  By using the method and the method, the user can be disassembled, and the mercury and the information provided by the user in the middle phase can be quickly used to solve the problem of the user and the matters to be noticed, thereby greatly improving the efficiency and the work. .

Claims

要 求 Claim
1. 用戶 別 統, 其特 在于, 所述用戶 別 統 1. The user is different, and the user is different.
事件 汞文件, 于 汞所述用戶 別 統的每 介操作  Event mercury file, for each user of mercury
文件, 于 汞所述用戶 別 統的 信息 以及 事件索引文件,所述事件索引文件 所述事件 汞文件以及所述 文件相 , 于索引所述事件 汞文件中的操作以及所述 文件 中的 信息。  The file, the user-specific information in the mercury, and the event index file, the event index file, the event mercury file, and the file, the operation in the index mercury file, and the information in the file.
2. 要求 1所述的用戶 別 統, 其特 在于, 所述事件索引 文件  2. The user specified in claim 1 is characterized in that the event index file
事件 , 于所述用戶 別 統中 的每 介操作, 所述用戶 別 統 提供 相 的事件 ,所述事件 使得所述事件索引文件 所述 事件 汞文件相  An event, in the user operation, the user separately provides an event, the event causing the event index file to be
事件 汞 , 于使得所述事件索引文件 所述 文件相 以及  Event mercury, which causes the file in the event index file to be
事件 , 于 羊描述 操作的 休內容。  The event, the description of the operation of the sheep.
3. 要求 2所述用戶 別 統, 其特 在于, 所述事件 汞文 件  3. The user of claim 2 is characterized in that the event mercury file
所述事件 汞 , 使得所述事件 汞文件 所述事件索引文件相 以及  The event mercury causes the event mercury file to be described in the event index file as well
事件 汞內容, 其 于操作的信息, 例 操作 、 所述操作的 同或所述操作的  Event mercury content, information about its operation, operation of the operation, operation of the same or operation of the operation
4. 要求 3所述的用戶 別 統, 其特 在于, 所述用戶 別 統近 參考文件, 于存儲所述操作 的參考信息。  4. The user of claim 3 is characterized in that the user is not in close proximity to the reference file for storing the reference information of the operation.
5. 要求 4所述用戶 別 統, 其特 在于, 所述事件 汞內 容近 參考文件 以及參考文件 , 需要 汞操作 生的所述參 考信息 , 所述參考文件 Y, 不需要 汞操作 生的所述參 考信息 , 所述參考文件 , 所述參考文件 于將所述事 件 汞文件 所述參考文件 未。 6. 要求 4所述的用戶 別 統, 其特 在于, 所述事件 汞 內容近 參考文件 , 需要 汞操作 生的所述參考信息 , 所述參 考文件 汞參考信息的參考文件的地址, 不需要 汞事件 生 的所述參考信息 , 所述參考文件 特殊 , 所述特殊 表示 于 操作不存在參考文件。 5. The user of claim 4 is characterized in that: the event mercury content near reference file and the reference file require the reference information of the mercury operator, and the reference file Y does not require the reference information of the mercury operation. The reference file, the reference file is not referenced in the event mercury file. 6. The user of claim 4 is characterized in that: the event mercury content near reference file requires the reference information of the mercury operator, and the address of the reference file of the reference document mercury reference information does not require a mercury event. The reference information, the reference file is special, and the special representation indicates that the reference file does not exist in the operation.
7. 要求 4所述用戶 別 統, 其特 在于, 所述參考文件 所述用戶 別 統的使用者的汞 、 像、 或指紋信息, 以及出現 的 、 溫度、 返 的數 、 非法操作的數 和行力。  7. The user of claim 4 is characterized in that the reference file describes the mercury, image, or fingerprint information of the user of the user, and the number of occurrences, temperature, number of returns, illegal operation, and effort. .
8. 要求 2所述的用戶 別 統, 其特 在于, 所述  8. The user defined in claim 2, wherein the
文件 File
所述事件 , 使得所述 文件 所述事件索引文件相 以及  The event, causing the event index file of the file to be
事件 信息, 其中包括 操作可能存在的 、 方法以及 注意事項。  Event information, including possible actions, methods, and considerations for the operation.
9. 要求 1所述用戶 別 統, 其特 在于, 所述事件 汞文 件、 文件或事件索引文件存儲在所述用戶 別 統上或者 同存儲 在 存儲器上。  9. The user of claim 1 is characterized in that the event mercury file, file or event index file is stored on the user system or stored in the memory.
10. 用戶 別 統的 方法, 其特 在于,  10. a user-independent method, which is characterized in that
汞所述用戶 別 統的每 介操作, 戶生相 的 汞文件 以及 利用所述 汞文件中的信息 所述用戶 別 統 。  The mercury user's separate operations, the mercury file of the household phase, and the use of the information in the mercury file describe the user.
11. 要求 10所述的用戶 別 統的 方法, 其特 在于 利用事件 汞文件 汞所述用戶 別 統的每 介操作  11. The user-specific method described in claim 10, which is characterized by the use of the event mercury file mercury for each user-specific operation
利用 文件提供所述用戶 別 統的 信息 以及  Using files to provide information about the user's uniqueness and
利用事件索引文件,使所述事件索引文件 所述事件 汞文件以及所述 文件相 ,以索引所述事件 汞文件中的所述每 介操作以及所 述 文件中的 信息。 Using the event index file, the event index file describes the event mercury file and the file phase to index each of the operations in the event mercury file and the information in the file.
2. 要求 的用戶 別 統的維 方法, 其特 在于, 在所述事件索引文件中  2. The required user-specific dimension method, in particular, in the event index file
利用事件 未 所述用戶 別 統中 的所述每 介操作, 使得 所述事件索引文件 所述事件 汞文件相 Utilizing the events described in the user not described in the event, so that The event index file describes the event mercury file phase
利用事件 汞 而使得所述事件索引文件 所述 文件相 以及  Using the event mercury to make the file of the event index file
利用事件 未 羊描述 操作的 休內容。  Use the event to describe the rest of the operation.
13. 要求 12所述的用戶 別 統的 方法, 其特 在于, 在所述事件 汞文件中  13. The user-specific method of claim 12, characterized in that in the event mercury file
利用所述事件 汞 使得所述事件 汞文件 所述事件索引文件相 以及  Utilizing the event mercury to cause the event mercury file to be
利用事件 汞內容未 汞操作的 、所述操作的 同以及所述操 作的事件 。  Utilizing the event that the mercury content is not mercury operated, the same as the operation, and the event of the operation.
14. 要求 13所述的用戶 別 統的 方法, 其特 在于, 在所述用戶 別 統中利用參考文件未存儲操作 的參考信息。  14. The user-defined method of claim 13 is characterized in that the reference file is not used in the user system to store reference information of the operation.
15. 要求 14所述的用戶 別 統的 方法, 其特 在于, 在事件 汞內容中利用參考 以及參考文件 未 參考文件, 需要 汞操作 生的所述參考信息 , 所述參考文件 Y, 不需要 汞操作 生的所述參考信息 , 所述參考文件 , 且利用所述參考文件 將 事件 汞文件 所述參考文件 未。  15. The method of claim 14, wherein the reference to the event mercury content and the reference file are not referenced, the reference information of the mercury operator is required, and the reference file Y does not require a mercury operation. The reference information, the reference file, and the reference file is used to refer to the event mercury file as the reference file.
16. 要求 14所述的用戶 別 統的 方法, 其特 在于, 在事件 汞內容中利用參考 未 參考文件, 需要 汞操作 生 的所述參考信息 , 所述參考文件 汞參考信息的參考文件的地 址, 不需要 汞事件 生的所述參考信息 , 所述參考文件  16. The method of claim 14, wherein the reference to the unreferenced file in the event mercury content requires the reference information of the mercury operator, the reference file reference address of the mercury reference information, The reference information required for a mercury event, the reference file
特殊 , 所述特殊 表示 于 操作不存在參考文件。  Special, the special means that there is no reference file in the operation.
17. 要求 14所述的用戶 別 統的 方法, 其特 在于, 在所述參考文件中近 汞用戶 別 統的使用者的汞 、 像、 或指紋 信息, 以及出現 的 情況、 返 的數 、 非法操作的數 和行 力。  17. The user-defined method of claim 14, wherein the mercury, image, or fingerprint information of the user of the near-mercury user in the reference file, and the occurrence, the number of returns, and the illegal operation Number and effort.
18. 要求 12所述的用戶 別 統的 方法, 其特 在于, 在所述 文件中  18. The user-specific method of claim 12, characterized in that in the file
利用所述事件 使得所述 文件 所述事件索引文件相 以及 Using the event to cause the event index file of the file to as well as
利用事件 信息, 汞 操作可能存在的問題、 方法以及 注意事項。  Use event information, possible problems with mercury operations, methods, and considerations.
19. 要求 10所述的用戶 別 統的 方法, 其特 在于, 將所述事件 汞文件、 文件或事件索引文件存儲在所述用戶 別 統上或者 同存儲在 存儲器上。  19. The user-defined method of claim 10, wherein the event mercury file, file or event index file is stored on the user system or on the memory.
PCT/CN2009/072387 2009-06-22 2009-06-22 System for identifying a user and its maintaining method WO2010148549A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009801604665A CN102576359A (en) 2009-06-22 2009-06-22 System for identifying a user and its maintaining method
PCT/CN2009/072387 WO2010148549A1 (en) 2009-06-22 2009-06-22 System for identifying a user and its maintaining method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/072387 WO2010148549A1 (en) 2009-06-22 2009-06-22 System for identifying a user and its maintaining method

Publications (1)

Publication Number Publication Date
WO2010148549A1 true WO2010148549A1 (en) 2010-12-29

Family

ID=43385859

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/072387 WO2010148549A1 (en) 2009-06-22 2009-06-22 System for identifying a user and its maintaining method

Country Status (2)

Country Link
CN (1) CN102576359A (en)
WO (1) WO2010148549A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1632779A (en) * 2003-12-24 2005-06-29 华为技术有限公司 A data storage method and apparatus
US20050256871A1 (en) * 2004-05-14 2005-11-17 Semerdzhiev Krasimir P Multi-level version format
CN1877573A (en) * 2005-06-10 2006-12-13 华夏科技股份有限公司 Multilayer database system structure
US7421441B1 (en) * 2005-09-20 2008-09-02 Yahoo! Inc. Systems and methods for presenting information based on publisher-selected labels

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1632779A (en) * 2003-12-24 2005-06-29 华为技术有限公司 A data storage method and apparatus
US20050256871A1 (en) * 2004-05-14 2005-11-17 Semerdzhiev Krasimir P Multi-level version format
CN1877573A (en) * 2005-06-10 2006-12-13 华夏科技股份有限公司 Multilayer database system structure
US7421441B1 (en) * 2005-09-20 2008-09-02 Yahoo! Inc. Systems and methods for presenting information based on publisher-selected labels

Also Published As

Publication number Publication date
CN102576359A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
US8892905B2 (en) Method and apparatus for performing selective encryption/decryption in a data storage system
US7590868B2 (en) Method and apparatus for managing encrypted data on a computer readable medium
US8681994B2 (en) Systems and methods for document control using public key encryption
CN101533452B (en) Method for protecting cipher of USB interface
US20080183771A1 (en) System and method for managing files
US20190236284A1 (en) Enabling and validating data encryption
US20100017446A1 (en) File system configuration method and apparatus for data security and for accessing same, and storage device accessed by same
US20070283346A1 (en) System and method for remote management and facilitating installation and registration of software
CN100517276C (en) Data safe memory method and device
US20040103284A1 (en) System and method for archiving authenticated research and development records
US8799677B2 (en) Encrypted search database device, encrypted search data adding/deleting method and adding/deleting program
US20140115672A1 (en) Storing and Accessing Licensing Information in Operating System-Independent Storage
US20110071994A1 (en) Method and system to securely store data
US20150227733A1 (en) Automatic login system and automatic login method
KR20080053824A (en) Approching control system to the file server
KR100975133B1 (en) Security management system for portable memory devices and security management method using the same
US9223515B2 (en) Devices and methods for device-mapping connectivity hub
US20120173886A1 (en) Electronic device with a file authorization management function and method thereof
EP1752879A1 (en) File management device, file management method, file management program, and computer-readable recording medium containing the file management program
WO2010148549A1 (en) System for identifying a user and its maintaining method
US20140075577A1 (en) File security control system and method
US8498622B2 (en) Data processing system with synchronization policy
US20070198801A1 (en) Method of setting a storage device
CN110826099A (en) Safe storage method and system suitable for embedded real-time operating system
CN102265281B (en) The method of the suggestion read list of numerical data is provided to main process equipment

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980160466.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09846349

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09846349

Country of ref document: EP

Kind code of ref document: A1