Method for customizing role authorization in management information system

A management information system and self-definition technology, which is applied in the field of custom role authority in the management information system, can solve the problem of large amount of data in the UserAction table, and achieve the effects of clear design structure, high execution efficiency, and strong reliability

Inactive Publication Date: 2012-04-04
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Operation-based permission design: In this mode, each operation is recorded in the database, and whether the user has the permission for the operation is also recorded in the database. After research, it is found that there are the following problems: if such a design is used directly, the database will The amount of data in the UserAction table is very large, and the design needs to be further optimized to improve efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for customizing role authorization in management information system
  • Method for customizing role authorization in management information system
  • Method for customizing role authorization in management information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The method of the present invention is described in detail below with reference to the accompanying drawings.

[0022] A method for customizing role permissions in the management information system of the present invention, design of permissions based on roles and operations: the present invention is achieved through the following technical solutions:

[0023] (1) Create two tables in the system, user table and permission table. Among them, the user table includes not only user name and password and other necessary information, but also user permission fields, and the permission table includes role names and various permission definition fields. These two tables are associated through the Role field;

[0024] (2) Set a corresponding field in the permission table for each user operation or even each event that requires permission control. A value of "1" means that there is permission to perform this operation, and a value of "0" means that there is no such permission. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for customizing role authorization in a management information system. By the method, the control of fine grit authorization is realized at the level of specific certain operation or even a certain event, the problem about the customization of role authorization in the management information system is solved; when the method is used in the management information system, the customization of role authorization can be conveniently realized and the management of customized authorization is realized, and the method can be effectively applied in both coarse grit authorization and the fine grit authorization aspects, so the universality and the high reliability of an authorization management range are ensured and customized role authorization is conveniently and effectively controlled.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a method for managing user-defined role rights in an information system. Background technique [0002] In recent years, the management information system has continuously developed towards multi-application and multi-user, which puts forward higher requirements in terms of system security, and makes the data security of information system more and more valued by people. People have designed various permission control models to ensure that only authorized users can perform certain important operations or access certain sensitive data and information, resulting in several typical user permission control models: role-based permission design , Operation-based permission design and role-based and operation-based permission design. [0003] Role-based permission design: The most common and relatively simple scheme is implemented using three tables User, UserRole and Role...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/30
Inventor 付正全刘成平刘正伟
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products