User permission management method and system

A technology of user rights and management methods, applied in the field of computer web application systems, to achieve controllability, solve management problems, and clear management rights

Active Publication Date: 2014-09-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The object of the present invention is to propose a user authority manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission management method and system
  • User permission management method and system
  • User permission management method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the following describes the specific implementation, methods, steps, The characteristics and effects are described in detail below.

[0025] The foregoing and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of the preferred embodiment with reference to the drawings. Through the description of the specific embodiments, the technical means and effects of the present invention to achieve the predetermined purpose can be understood more deeply and concretely. However, the accompanying drawings are only for reference and explanation, and are not used to describe the present invention. limit.

[0026] The user authority management method and system proposed by the present invention are mainly used to perform user authority management on a computer Web applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user permission management method and a user permission management system, which aim to solve the problem of complex user permission management. The user permission management method comprises the following steps that primary account numbers are created for all two-stage systems by a client end of a first-stage system administrator; the primary account numbers are respectively sent to client ends of two-stage system administrators of all of the two-stage systems by the client end of the first-stage system administrator, permissions of the client ends of all of the two-stage system administrators are set, and the permissions of the client ends of all of the two-stage system administrators include creation or management of respective two-stage system users and role assignment of the respective two-stage system users; the client ends of all of the two-stage system administrators are used for creating or managing the respective two-stage system users and assigning roles for the respective two-stage system users under the corresponding primary account numbers. By using the user permission management method provided by the invention, in the conditions of multiple users and complex user permissions, hierarchical management is realized, so that the administration authority is clear, and the problem of complex user permission management can be preferably solved.

Description

technical field [0001] The invention relates to the technical field of computer web application systems, in particular to a user authority management method and system. Background technique [0002] Nowadays, most computer web application systems use authentication and user authorization to protect resources from safe operation. Identity verification refers to checking whether the identity information is consistent with the system information, and generally adopts the user name + password method. User authorization refers to checking whether a verified user is allowed to operate a specific resource, usually checking whether the user has relevant roles or relevant permissions, and then performing a comprehensive comparison. [0003] Identity verification in the system is relatively easy to implement, and the difficulty lies in how to carry out effective authorization. At present, the most commonly used mode is RBAC (Role-Based Access Control, role-based access control). The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/30
CPCG06F21/41G06F2221/2141
Inventor 吴春颖
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products