Information access authority control method
A technology of authority control and information access, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of large cost of management system, complex content authority, and dependence on secondary development, and achieve the effect of reducing implementation costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0021] Embodiment: the present invention comprises the following steps: (1) registering the table object of the content authority; (2) setting the filter rule of the content authority and saving the filter rule in the database; (3) assigning the above filter rule to the user who needs the above content authority; (4) The program in the relevant business point filters the data according to the registered table object and the filtering rules input by the user and feeds back to the user, that is, analyzes the three necessary conditions determined in the first three steps, converts the first three conditions into SQL statements, and compares them with the The incoming SQL statements are merged to make it a new SQL statement. This algorithm is actually a kind of "hijacking" of the business layer code. It is very simple to implement and has minimal intrusiveness to the program code. Programmers apply permission filtering to business in the normal development process.
[0022] In ste...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More