Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for managing authority

A technology of authority management and authority table, which is applied in the direction of electronic digital data processing, instruments, digital data authentication, etc., can solve the problems of inconvenient management, excessive classification, and high complexity of authority management, so as to reduce complexity and improve convenience Effect

Active Publication Date: 2013-05-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the traditional active defense system has too many classifications and inconsistent management in the authority management of the entire system, resulting in high complexity and inconvenient management of authority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for managing authority
  • Method and system for managing authority
  • Method and system for managing authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solution of the rights management method and system will be described in detail below in combination with specific embodiments and accompanying drawings, so as to make it more clear.

[0048] Firstly, any active defense system can be abstracted into a kind of authority management. Such as file management, the active defense system needs to pay attention to the modification and deletion of system core files or user-defined core files. The operation can be abstracted as an operation performed by the operation subject on the operation object. For example, if a process performs a delete operation on a file, the operation subject is the process, the operation object is the file, and the operation method is delete. The present invention is mainly used for authority management in active defense systems, but is not limited thereto.

[0049] Such as figure 1 As shown, in one embodiment, a rights management method includes the following steps:

[0050] Step S110...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for managing authority. The method for managing the authority includes steps of acquiring an operation request; inquiring a preliminarily created authority list according to the operation request and returning a corresponding processing result; and executing corresponding operation according to the processing result. The method and the system for managing the authority have the advantages that the preliminarily created authority list is inquired according to the operation request to obtain the corresponding processing result, the corresponding operation is executed according to the processing result, various resources and various operations do not need to be managed in a classified manner, a unified management mode is adopted, the complexity of authority management is reduced, and the management convenience is improved.

Description

【Technical field】 [0001] The present invention relates to rights management, in particular to a rights management method and system. 【Background technique】 [0002] The traditional active defense system is to control the various resources of the entire Windows (mainly the four resources of the system files, registry, process, and network) to a certain extent. The main function is to create a dynamic simulation anti-virus system, which automatically and accurately Identify new viruses, monitor and report program behavior, automatically extract feature values ​​to achieve multiple protections, and visualize monitoring information. [0003] However, the traditional active defense system has too many classifications and inconsistent management in the authority management of the entire system, resulting in high complexity and inconvenient management of authority. 【Content of invention】 [0004] Based on this, it is necessary to provide a rights management method, which can red...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/6218G06F21/57G06F21/604
Inventor 王宇王斌
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More