Method for implementing subscriber authority management based on role function mapping table

A technology of user authority and mapping table, applied in the direction of user identity/authority verification, etc., can solve the problems of prolonging the engineering cycle, complicating the system development work, and unfavorable maintenance work.

Inactive Publication Date: 2009-08-05
XIAMEN YAXON NETWORKS CO LTD
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this mode, the business processing logic is stored in the client program of the workstation. Since the business processing logic of users with different identities is different, if the corresponding app

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing subscriber authority management based on role function mapping table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A preferred embodiment of the present invention is as follows:

[0019] 1. Permission definition method:

[0020] (1) Roughly divide the system functions into modules, and then subdivide various sub-functions in each module. The modules and the sub-functions in the modules define an extensible expression "module + sub-function", which is an authorized Functional objects, for the functional objects allowed to be defined by the system, form a set of functional objects of the system. When specifically applied in a computer system, assign a unique identifier to the module: a double-byte unsigned integer module_id, assign a unique identifier to the sub-function of the module: a double-byte unsigned integer subfunc_id , then the function identifier of the module sub-function in the global sense can be represented by a 4-byte unsigned integer func_id=(module_id<<16)|subfunc_id, since the double-byte unsigned integer can represent up to 65535, so the available The number of m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing user right management based on a role-to-function mapping table, roughly divides system functions into modules, subdivides the modules into various sub functions, and defines a module plus sub functions as an functional object that can be authorized, thus leading the connection between all the functions to be clearly expressed and easily extending new functional objects according to certain rules; simultaneously the user right management method adopts a four-bytes integer to define the functional object that can be authorized, thus solving the problem of lacking ID.

Description

technical field [0001] The invention relates to a method for realizing user authority management based on a role-function mapping table. technical background [0002] Generally, the function of user authority control is involved in the modern human-computer interaction client system. For the application system using C / S mode, that is, data processing (definition, query and update) is managed centrally by the database server and system application is realized by the client program. In this mode, the business processing logic is stored in the client program of the workstation. Since the business processing logic of users with different identities is different, if the corresponding application program is developed for each type of user, the system development will undoubtedly be Complicating the work and prolonging the project cycle is also not conducive to future maintenance work. In response to this situation, in the actual development process, the client program of a busin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 时宜陈晓冰曹辉标谢燕玲杨思超
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products