Role access control-based information system data storage layer and building method

A technology of role access control and data storage layer, which is applied in digital data authentication, electronic digital data processing, special data processing applications, etc., and can solve problems such as leaks

Inactive Publication Date: 2011-04-06
SANDA UNIVERSITY
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, more and more work needs to use various information systems, and the security of information systems has attracted more and more attention. For example, in the access control of information systems, it is necessary to pay attention to its security. There are various users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role access control-based information system data storage layer and building method
  • Role access control-based information system data storage layer and building method
  • Role access control-based information system data storage layer and building method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments, and will be described by applying the present invention to a graduate management system.

[0025] refer to figure 1 , figure 1 An information system data storage layer 100 based on role access control is shown, including a user data table 101, a role data table 102, and a user-role relationship data table 103, which will be introduced in sequence below:

[0026] The user data table 101 is used to store the user name, password, login times and student number or job number of the registered user of the information system, as shown in Table 1. The user data table 101 is used to implement user registration, user addition, and user deletion of the information system, and the number of user logins stored in the user data table 101 is incremented by one each time the user logs into the information system once.

[0027] Table 1 - User...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a role access control-based information system data storage layer and a building method. User name, password and login times of information system registered users are stored through a user data table; a plurality of roles with access authorities of different levels are stored through a role data table; and a matching relationship between the users and the roles is stored through a user and role relationship data table. The data tables of the data storage layer are called by an information system to realize modification of system user information and matching between the users and the roles and further fulfill the purpose of endowing and controlling the access authorities of the users.

Description

technical field [0001] The present invention relates to a data storage technology of a data information system, and more specifically relates to an information system data storage layer and a building method based on role access control. Background technique [0002] At present, more and more work needs to use various information systems, and the security of information systems has attracted more and more attention. For example, in the access control of information systems, it is necessary to pay attention to its security. There are various users of different levels in the system, and specific users can only access specific data, and if the security measures are not in place, users may access data that they should not access, resulting in accidents such as leaks, which may give Countries and companies have caused irreparable losses. [0003] It can be seen that the user access to the information system requires the design of relevant security policies, so as to achieve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F17/30G06F21/31
Inventor 潘毅民沙洁
Owner SANDA UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products