Permission expansion control system and method thereof

A technology for extending control and authority, applied in instruments, digital data authentication, electrical digital data processing, etc. It can solve the problems of cumbersome loss, and achieve the effect of easy expansion and infinite expansion.

Inactive Publication Date: 2010-11-24
上海三零卫士信息安全有限公司
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The latter is prec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission expansion control system and method thereof
  • Permission expansion control system and method thereof
  • Permission expansion control system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] The present invention can effectively control the permissions involved in different business requirements, can infinitely expand different business permissions, can meet the customization needs of different users to the greatest extent, quickly and flexibly design permissions, and add them to the application system in a timely manner middle. Users can also edit, delete, and index the current design permissions.

[0077] see figure 1 , the present invention discloses a permission extension control system, the system includes a permission setting unit 11 , a permission editing unit 12 , a binary number adjustment unit 13 , and an execution judging unit 14 .

[0078] The authority setting unit 11 is used to set the user's authority, and set the authority involved in different business requirements, so as to expand different business authority. Each authority of the user is set by a binary number of several digits. Whether each authority is selected is set by the value o...

Embodiment 2

[0094] In this embodiment, the extensible authority control of the system of the present invention is based on the binary carry principle, a design idea of ​​dynamically expanding the number of authority bits to achieve unlimited expansion of authority levels. This technology is to solidify this design idea with php code and apply it to realize it.

[0095] The design idea of ​​extensible access control is the mapping of the idea of ​​binary digits. The binary number is a combination of 0 and 1. Therefore, it can also be designed to define unchecked (unauthorized) as 0 and checked (authorized) as 1.

[0096] In the system of the present invention, the specific operations of specific applications are separated one by one, and these independent operations will be defined as a constant in the code. The binary digit corresponding to this constant is called the permission bit, as shown in the table 1. In Table 1, permission bits for certain application operations are defined.

[...

Embodiment 3

[0102] In this embodiment, different business permissions are set according to different applications, and the system administrator (or system management authorized user) authorizes the business operation of the user by checking. After the authorization operation is completed, the authorized user will have the business operation authority, such as image 3 shown.

[0103] This embodiment takes the contract management application as an example:

[0104] For example, put image 3 If it is checked, it means that the corresponding user has (authorized) the permission. If it is not checked, it means that the corresponding user does not have (not authorized) the permission. The permissions that admin has under this application are:

[0105] -Module: means that admin has been authorized and has the permission to enter the application (contract management);

[0106] -Create a contract: means that admin has been authorized and has the authority to create a contract;

[0107] -Edit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission expansion control system and a method thereof. The system is composed of a permission setting unit and a permission editing unit, wherein the permission setting unit is used for setting user permissions and setting permissions relative to different business requirements so as to expand different business permissions; and the permission editing unit is used for editing permissions in the system, including permission addition, permission deletion and permission alteration. The permission expansion control system and the method thereof disclosed by the invention can conveniently and rapidly expand user permissions, can add, delete and alter permissions, and is easy for operation, understanding and expansion. The permission control method in the invention is realized by adopting the principle that forward carry increment is performed from a low permission bit to a high permission bit, namely, permission bit distribution can be performed based on the expansion principle from a low position to a high position according to new application operation, thus realizing infinite expansion of customized permissions.

Description

technical field [0001] The invention belongs to the technical field of computer software, and relates to an authority setting system, in particular to an authority extension control system; at the same time, the invention also relates to an authority extension control method of the authority extension control system. Background technique [0002] Authority control is an indispensable link in the 3A certification system standard, which are Authentication, Authorization, and Accounting: [0003] Authentication: verify the user's identity and available network services; [0004] Authorization: open network services to users based on authentication results; [0005] Accounting: Record the user's usage of various network services and provide it to the billing system. [0006] Permission design is an important part of many systems, mainly used to control functions and processes. This description describes the basic design of several common permission design schemes. There are ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/31
Inventor 李沁涛傅鹰盛益君张建军李成斌
Owner 上海三零卫士信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products