Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Authority configuring method and apparatus

A permission configuration and permission technology, applied in the network field, can solve the problems of not being able to batch grant a group of user permissions, heavy workload of user permissions, and low authorization efficiency, so as to achieve seamless integration, facilitate configuration and management, and improve settings efficiency effect

Active Publication Date: 2008-04-09
XINHUASAN INFORMATION TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problems of this method are as follows: the administrator user needs to authorize ordinary users one by one, and cannot grant permissions to a group of users in batches
If there are a large number of users, the workload of granting user permissions is very heavy, and the authorization efficiency is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority configuring method and apparatus
  • Authority configuring method and apparatus
  • Authority configuring method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The core idea of ​​a permission configuration method in the present invention is to establish a user group permission inheritance mechanism, grant the user group domain permissions and carry out permission inheritance, so that the user group has the permissions of all devices under this domain at the same time; Permissions, each user in the user group can inherit the permissions of the user group.

[0055] A permission configuration method among the present invention is shown in Figure 1, comprises the following steps:

[0056] Step s101, adding a user group to a specific domain according to predetermined rules.

[0057] Step s102 , granting the authority of the specific domain where the user group is located. According to the principle of authority inheritance, the user group inherits the authority of all devices in the specific domain and / or all devices in the subdomains of the specific domain.

[0058] The user group referred to here refers to a collection of specif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access configuration method, which comprises adding a user group to a specific domain according to the predetermined rules; and granting access to the specific domain wherein the user group locates, wherein the user group inherits all the equipments in the specific domain and / or the access of all the equipment in the specific domain. The invention also discloses an access configuration device. By using the invention, according to a user group access inheritance mechanism, when granting the user group domain access, the user group has to simultaneously own the access of all the equipments in the specific domain, so as to facilitate configuration and management. In addition, the user group-based access inheritance mechanism needs not to respectively configure access to each user in the user group, so as to improve the configuration efficiency of the access.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method and device for configuring rights. Background technique [0002] In the IP (Internet Protocol, Internet Protocol) field, with the wide application of IP-based services and the increase in the number of devices, it brings a lot of inconvenience to management and maintenance. Therefore, it is imminent to solve the problem of user rights management in large-scale IP systems. User rights refer to the records of what operations a user can perform on a certain domain and devices under the domain. Different users have different user rights. Wherein, domain refers to a logical concept in the system, and the system can be logically divided into different domains according to regions, and domains further include top-level domains and subdomains. The top-level domain is a relative concept, which belongs to the highest domain in the system; subdomains can be set under the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 梁丽娜
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products