Creating method of authorization of multilevel menu

A technology for establishing methods and menus, applied in special data processing applications, instruments, digital data authentication, etc., and can solve problems such as increasing work difficulty, tedious work, and reducing work efficiency.

Inactive Publication Date: 2013-05-15
ZHENJIANG YIHAI SOFTWARE
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When it is necessary to add, delete, or modify some system permissions in the database, it is necessary to change the structure of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technical solutions of the present invention are described in detail below through examples, but the protection scope of the present invention is not limited to the examples.

[0015] Database security management is realized by assigning menu operation rights to users. Information about users and their operable menus needs to be kept in database tables. The relevant tables and their main fields are as follows:

[0016] ① User table, used to save the user's login name, password, ID number.

[0017] ②Menu data table, including menu names, levels, types, user ID numbers, permissions and other related information at all levels.

[0018] ③ User permission table, which uses a data combination of 0 or 1 to represent the permissions of various users.

[0019] The operable menus of each user in the application system should not be static, but should change with the change of their permissions, that is, the application system provides an interface that enables users to cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a creating method of authorization of a multilevel menu, and relates to the field of security protection of a computer system. The method particularly comprises the following steps: 1) establishing a user table which comprises names, codes and identification (ID) numbers of all users; 2) establishing a menu data table which comprises names, series and types of each level of menus, the ID numbers of the users, and authorization; 3) establishing a user authorization table, wherein data combination with 0 or 1 is used for showing authorization of each user; 4) establishing a tree-shaped structural image, wherein each node is formed by reading attributes of a cascading menu in the menu data table; and 5) selecting each node in the tree-shaped structural image by the users, and forming self-authorization. After the self-authorization is stored, a system writes the ID numbers of the users and the authorization into the user authorization table and the menu data table. The creating method of the authorization of the multilevel menu can flexibly aim at that the users customize operable menus and improve operation speed when the system performs administrative operation.

Description

technical field [0001] The invention relates to the field of computer system security protection, in particular to a method for creating multi-level menu authority. Background technique [0002] For any kind of computer system, the security of information is very important. With the continuous development of information technology, network technology and database technology, database security has increasingly become the focus and focus of people's attention. Users operate the data in the database through the database application system, and ensuring the security of the data in the database is a problem that must be considered by the database application system. Therefore, it is necessary to control the user's operating authority in the database application system. [0003] At present, many management systems use the database method to manage the distribution of system permissions, for example: record various system permissions defined through attribute fields in the databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F17/30
Inventor 庄健
Owner ZHENJIANG YIHAI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products