Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Controlling method of business operations authority

A business operation and authority control technology, applied in the computer field, can solve problems such as large system modification workload and hidden dangers of system stability, and achieve the effect of enriching authority control strategies, meeting the needs of dynamic business changes, and ensuring stability.

Inactive Publication Date: 2009-06-03
HUAWEI TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] It can be seen that although this solution can achieve data record-level authority control, using this technical solution, different business restriction logics need to be implemented independently, and the same business application points also need to be controlled by themselves
When the data permissions of the business are changed, the system code needs to be modified, causing the system to have to face a huge modification workload, unable to meet the business needs in a timely and fast manner, and at the same time bring great hidden dangers to the stability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling method of business operations authority
  • Controlling method of business operations authority
  • Controlling method of business operations authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] figure 1It is a schematic flow diagram of the business operation authority control method in this embodiment. As shown in the figure, this method is based on the authority in the relational database, the business operation object (corresponding function), and the subsystem, personnel and role where the business operation object is located. Corresponding relationship, carry out authority control, this method comprises the following steps:

[0045] Step 101: start.

[0046] The business system is in a waiting state, waiting for the user to input business operations.

[0047] Step 102: The user applies for executing a business operation.

[0048] The user submits a business operation application to the business system. The business operation can be the control of static objects such as menus, buttons, and interfaces, or data record-level operations such as querying, deleting, and updating business system data.

[0049] Step 103: Judging whether the business operation is...

Embodiment 2

[0102] This embodiment specifically introduces the generation method of the relational database used for authority control, image 3 It is a schematic flowchart of a method for generating a relational database for authority control in this embodiment. As shown in the figure, this method includes the following steps:

[0103] Step 301: Define permissions.

[0104] Define the authority of the structure shown in Table 4, define the domain of semantic information in the authority, and use the semantic information as the authority control item, which becomes the inherent attribute of the authority. The semantic information includes constants, internal input objects, external input objects, logical operations and other custom information.

[0105] In order to facilitate the system to identify semantic objects, the following pre-definitions are made for each type of semantic objects:

[0106] First: For custom constant objects and internal objects, use specific prefix identificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the computer field, and the invention discloses a business operational authority control method, the relational database generation method. The business operational authority control method in the invention includes: identification of user business operations and business operational targets; according to the said users and the business operational target information, to determine whether the said user has operational right to the said business operational targets, and if ownership, executing the said business operations according to the semantic information of the said operational right; otherwise, refused to execute the said business operations. The invention not only implements the fine-grained right control of user's business operation, but also makes right control more flexible.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method for controlling business operation rights. Background technique [0002] In order to ensure the security of the business system, rights management is usually used to control the business operations that users can perform in the business system. Through the authority control strategy, the corresponding authority configuration and authentication are performed on the operable system, and corresponding authorization is performed on different types of users. Through authentication, users can only perform authorized operations and access authorized data. [0003] At present, most business systems adopt the role-based access control (RBAC) strategy, which converges permissions through roles, that is, first assigns and manages permissions according to roles, so as to facilitate the configuration of permissions; then By granting a role to a user, the user can obtain the authority of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F17/30G06F21/30
Inventor 韦思宁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products