Method and device for inquiring authority

A query method and query device technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of reduced space storage, single inheritance relationship, and inability to adapt to a large number of complex user authority controls, etc., to achieve less The effect of data space

Active Publication Date: 2012-07-04
YONYOU UP INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method reduces space storage and simplifies authorization, but the inheritance relationship is single, and its structure cannot well adapt to a large number of complex user permission control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for inquiring authority
  • Method and device for inquiring authority
  • Method and device for inquiring authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0024] figure 1 It is a flow chart of the authority query method according to the present invention.

[0025] Such as figure 1 As shown, the present invention provides a permission query method, including: step 102, input user information; step 104, according to the user information, find multiple inheritance relationships directly and through the user corresponding to the user All indirectly related business objects and corresponding permissions of all business objects are used as user permissions of the user and business objects corresponding to the user permissions. In this technical solution, multiple inheritance relationships are used to respectively contact users and business objects, which can effectively reduce the space occupied by storing authority data.

[0026] In the above technical solution, it also includes: step 106, expressing the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for inquiring authority. The method comprises the following steps of: (102) inputting user information; and (104) searching all business objects and corresponding authorities of all the business objects as user authority of the users and the business objects corresponding to the user authorities according to the user information, wherein the business objects are indirect contact with users and in indirect contact with the users through a plurality of inheritance relationships corresponding to the users. In the technical scheme, the plurality of inheritance relationships are used for respectively contacting the users and the business objects, which can effectively reduce the space required by storing authority data. The invention also provides a device for inquiring the authority. Through the technical scheme of the invention, the requirement of authority inquiry of the users can be met, and moreover, the space for storing the data can be smaller when the technical scheme is implemented.

Description

technical field [0001] The present invention relates to the field of authority in information management, in particular to a method and device for inquiring about authority. Background technique [0002] Usually in software information systems, in order to prevent non-system users from manipulating information data in the system, or system users from manipulating data not within the scope of authority, and to protect the security and confidentiality of information system data, user authority control is added. At the same time, users can query the corresponding permissions according to their own identities. [0003] One of the usual methods is to authorize the basic data directly on the basis of the user, and use user and permission data to be cross-stored. This method is simple and intuitive, but the amount of stored data is large, takes up space, and authorization is cumbersome. [0004] Or make some simple combinations of basic data to form a specific permission scheme, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/31
Inventor 郑芸
Owner YONYOU UP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products