User authority allocation method and user authority control method

A technology of user rights and allocation methods, which is applied to instruments, digital data authentication, computing, etc., can solve the problems of only support, dependence, and single definition of TomcatRealm rights, and achieve the effects of convenient operation, small modification, and low development and implementation costs

Active Publication Date: 2009-05-27
ALIBABA GRP HLDG LTD
View PDF4 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, Tomcat Realm must be defined in the configuration file of the web server software Tomcat, so it only supports web applications based on the B/S architecture, and relies heavily on the web server software Tomcat, and can only be applied to web applications deploye

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority allocation method and user authority control method
  • User authority allocation method and user authority control method
  • User authority allocation method and user authority control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0054] The invention is applicable to numerous general purpose or special purpose computing device environments or configurations. For example: personal computer, server computer, handheld or portable device, tablet type device, multiprocessor device, distributed computing environment including any of the above devices or devices, etc.

[0055] The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for controlling user rights. The method comprises the following steps: a user role is correspondingly acquired from a preset user role mapping relational table; the resource access right of the role is picked up, and the resource access right is defined by a regular expression, recorded in a right definition file, and marked by an exclusive resource code; the resource access request from the user is intercepted, and the resource code of the resource is acquired; by matching the resource code with the resource access right of the role, if matched, the resource is returned to the user; and if not matched, the resource access request from the user is refused. In the inserting mode, the method can be applied to e various system structural frames; moreover, the method also has the advantages of wide application range, flexible definition, and obvious lowering of system development and operation costs.

Description

technical field [0001] The present invention relates to the field of user authority control, in particular to a method and device for assigning user authority, and a method and device for user authority control. Background technique [0002] In the application system development, it is a very important function to add permission control function to the application system so that different users have different resource access permissions. In the existing technology, the permission control function of the application system is often tightly coupled with each resource access module, that is, adding corresponding permission check codes for each resource access module, mixing program functions and permission checks together, obviously in this In this way, it is difficult to expand and modify the authority control function, and only a single resource type can be protected. [0003] In this case, the existing Tomcat solves the above problems by providing Realm support. Realm is s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/31
Inventor 何崚
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products