Unlock instant, AI-driven research and patent intelligence for your innovation.

Information access authority control method

A technology of authority control and information access, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of large cost of management system, complex content authority, and dependence on secondary development, and achieve the effect of reducing implementation costs

Active Publication Date: 2011-02-16
杭州新中大科技股份有限公司
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Content permissions are relatively complex, so it is difficult to allow users to flexibly customize according to their needs
Enterprises have different management systems, so if there is no filtering method for content permissions that can be flexibly customized, they can only rely on the secondary development of software manufacturers, which will bring huge costs to the implementation of the management system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] Embodiment: the present invention comprises the following steps: (1) registering the table object of the content authority; (2) setting the filter rule of the content authority and saving the filter rule in the database; (3) assigning the above filter rule to the user who needs the above content authority; (4) The program in the relevant business point filters the data according to the registered table object and the filtering rules input by the user and feeds back to the user, that is, analyzes the three necessary conditions determined in the first three steps, converts the first three conditions into SQL statements, and compares them with the The incoming SQL statements are merged to make it a new SQL statement. This algorithm is actually a kind of "hijacking" of the business layer code. It is very simple to implement and has minimal intrusiveness to the program code. Programmers apply permission filtering to business in the normal development process.

[0022] In ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is mainly applied to an information management system, relates to a method for carrying out authority control on any item or batch of records of any table, enhances the authority control flexibility of an operator to achieve the purpose of information security and is a supplement for the authority control of the information management system. The method comprises the following realization steps of: (1) registering the table object of content authority; (2) setting the filtering rule of the content authority and saving the filtering rule into a database; (3) endowing a user needing the content authority with the filtering rule; and (4) filtering data and feeding the data back to the user through a program in a related service point according to the registered table object and the filtering rule input by the user. The invention is quite simple to realize, has less invasion for program codes and can be used for applying authority filtration to a service under the condition of not influencing the normal development flow of a programmer.

Description

technical field [0001] The invention relates to a method for controlling access authority of information, which is a method for controlling the authority of any one or a batch of records in any table, which is mainly used in the information management system to enhance the flexibility of operator authority control, so as to achieve The purpose of information security is to supplement the authority control of information management system. Background technique [0002] The 21st century is the era of information technology. Rapidly developing computer technology has already entered the field of enterprise management, assisting in the management of production materials and production plans of enterprises, and even providing important references for decision-making of enterprise development strategies. Computer-aided enterprise management makes all kinds of small and medium-sized enterprises grow stronger and stronger, and gradually develop into large enterprises or even super l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F21/00G06F21/62
Inventor 李伯鸣叶俊强
Owner 杭州新中大科技股份有限公司