Authority control method, device and system

A technology of authority control and authority, which is applied in the computer field, can solve the problems of complex maintenance of data authority control system, inability to satisfy complex, fine-grained data authority control functions, etc., and achieve the effect of solving complex maintenance

Active Publication Date: 2014-01-22
ALIBABA GRP HLDG LTD
View PDF4 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the problem that the data authority control system of the related technology is complicated to maintain and cannot satisfy the complex and fine-grained data authority control f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method, device and system
  • Authority control method, device and system
  • Authority control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0035] figure 1 is a schematic structural diagram of an authority control system according to an embodiment of the present application.

[0036] Such as figure 1 As shown, the permission control system includes: an application server, which is used to obtain the user information of the logged-in user, and combine the user information with the application data access entry identifier that requires data permission query to obtain data permission verification parameters; the public permission server , for receiving the data permission verification request sent by the application server and carrying the data permission verification parameter, and performing data permission query according to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority control method, device and system. The method includes the steps of obtaining user information of a log-in user, combining the user information with an application data access entry identification needing data authority inquiry so as to obtain a data authority verification parameter, sending a data authority verification request carrying the data authority verification parameter to a public authority server to carry out data authority inquiry so that a data visit rule object corresponding to the application data access entry identification can be obtained, receiving and analyzing the data visit rule object so as to obtain a data authority inquiry condition, and inserting the data authority inquiry condition into an authority inquiry SQL statement corresponding to the application data access entry identification so that a new inquiry statement under the control of data authority can be obtained and a data inquiry result corresponding to the user information can be obtained according to the new inquiry statement. According to the authority control method, management authority service can be independently deployed and uniformly configured, and fine-grained data authority control is achieved.

Description

technical field [0001] The present application relates to the field of computers, and in particular, to a permission control method, device and system. Background technique [0002] In current complex supply chain system clusters, it is necessary to control data permissions for complex user types. When a system has multiple types of users, the system has different requirements for the control of data permissions of different users. For example, a sales process system of an enterprise has different data permission restrictions for users with different positions in the organizational structure of the enterprise. The same The query function is different for sales directors, regional managers, and ordinary sales employees, the result, scope and content of the sales data obtained by query will be different. [0003] In the implementation process of data authority control, when the system function requires simple data, data authority control can be placed in each functional unit ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F17/30
CPCG06F21/6218G06F2221/2141
Inventor 郎中锋周春雷
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products