Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data access authorization protection method

A technology for data access and access rights, applied in the fields of digital data protection, electronic digital data processing, special data processing applications, etc., can solve problems such as confusion in the management of data access rights, and achieve the effect of all-round protection

Inactive Publication Date: 2014-04-02
G CLOUD TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the information management system, the management of data access rights is usually implemented by defining roles, which is convenient for management and very flexible, but has a disadvantage, that is, multiple user rights under the same role are the same. Can view or modify data within each other's scope of management, which can lead to some confusion in the management of data access permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access authorization protection method
  • Data access authorization protection method
  • Data access authorization protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Such as figure 1 As shown, the present invention saves user registration information, data table dictionary, function module information, function module authorization information and data read and write range authorization information in the database; Read and write range access rights; the system displays the corresponding menu and data to the user according to the user’s default permissions; if the user’s corresponding data read and write range is empty, it means that the user has all permissions to the authorized function modules; otherwise, the user can only Authorized functional modules and data read and write operations; super administrators or upper-level administrators can modify the permissions of lower-level administrators or ordinary users at any time. Detailed flow process of the present invention is:

[0041] In the first step, the user sends a registration request to the background management system;

[0042] In the second step, the management system gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access authorization protection method. In the method, the data table record access range of a user is restricted, reading and writing ranges are further restricted separately, and the granularity of data access authorization is refined in combination with functional module access authentication. By adopting the method, the administration authorization of multiple levels of users and the authorization of the users on the data reading and writing ranges in a system can be controlled flexibly, the situation of mess due to operation of multiple users on the same data is avoided effectively, and all-dimensional data protection is realized. The method is suitable for protecting and controlling the reading and writing operation authorization of mass data in a large-sized information management system.

Description

technical field [0001] The invention relates to the technical field of data protection, in particular to a data access right protection method. Background technique [0002] In the information management system, the management of data access rights is usually implemented by defining roles, which is convenient for management and very flexible, but has a disadvantage, that is, multiple user rights under the same role are the same. Data within the scope of each other's management can be viewed or modified, which can lead to some confusion in the management of data access rights. Contents of the invention [0003] The technical problem solved by the present invention is to provide a method for protecting data access rights, which further refines the control of user access data rights by authorizing functional modules combined with data read and write ranges, and realizes all-round protection of data access rights . [0004] The technical scheme that the present invention sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
CPCG06F21/6227G06F16/2358G06F16/2433
Inventor 胡文彬艾建文季统凯
Owner G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products