Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User access authorization management method and system

A technology of access rights and management methods, which is applied in the field of management of user access rights, and can solve the problems of complex business systems that are not optimal and single users

Inactive Publication Date: 2007-10-24
SHANGHAI TRIMAN INFORMATION & TECH
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has certain defects in systems with complex business and complex data
Because, for a system with complex business and complex data, the same user may have different permissions in different business applications, but in the traditional technology, this situation is not distinguished, so that the user can only Log in with a single account and enjoy a single authority, which is not the best solution for systems with complex businesses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access authorization management method and system
  • User access authorization management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention provides a method for managing user access rights. With reference to FIG. 1 , a flowchart of an example 100 of the method is shown. The method 100 includes:

[0030] 102. According to the user's basic attributes, set the user's basic access authority, identification information and verification information. According to an embodiment of the present invention, the method is applied to a public security system. At this time, the basic attributes of the user include name, position, rank, and jurisdiction. The authentication information includes user digital certificates and passwords. According to a requirement in the implementation, the user is required to submit the user digital certificate and password at the same time, and the user digital certificate should meet the requirements of the relevant state departments.

[0031] 104. Establish a database of basic access rights to store the basic access rights of each user. The basic access authority d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed management method for user access right comprises: according to use basic attribution, selecting user basic right, ID message and certification message; building a database for the basic access right; setting user right according to special application; receiving user log-on request, certifying user ID and certification message; obtaining application class relative to this user, and accordingly determining user access strategy; and completing the access. This invention is fit to complex business application.

Description

technical field [0001] The present invention relates to a management technology of user access authority, and more specifically, relates to a management method and system of user access authority. Background technique [0002] The management of users' access rights to a system is very important for any computer system. In the traditional management of user access rights, it is managed through a single account, that is, for an account, a fixed authority is given, as long as the account can pass certain verification procedures, such as digital certificates or passwords. class, you can successfully log in and obtain the corresponding permissions. However, this method has certain defects in systems with complex business and complex data. Because, for a system with complex business and complex data, the same user may have different permissions in different business applications, but in the traditional technology, this situation is not distinguished, so that the user can only L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王伟高建强王占宏李绍锟
Owner SHANGHAI TRIMAN INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products