Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission management system based on RBAC

A permission management and permission technology, applied in the transmission system, electrical components, etc., can solve the problems of complexity, increasing the difficulty of user use, complex permission configuration and management process, etc., to achieve flexible support, simplify the permission configuration process, and improve operational efficiency Effect

Inactive Publication Date: 2014-09-17
GUILIN CHANGHAI TECH CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most RBAC-based authority management methods focus on the control of functional authority, and the implementation of data authority control is not flexible enough or too complicated, which leads to complex authority configuration and management processes and increases the difficulty of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission management system based on RBAC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples are only used to explain the present invention, but not to limit the scope of the present invention.

[0019] like figure 1 As shown, an RBAC-based rights management system is characterized in that: comprising a user unit, a session unit, a role unit, a data authority unit and a functional authority unit;

[0020] The user unit is respectively connected with the session unit and the role unit, transmits the session data of the user to the session unit, receives the role configuration sent by the role unit, and the user unit is used to log in to the authority system corresponding to the authority management device, record the identity data, and send the session. Data and receiving role configuration;

[0021] The conversation unit is connected with the role unit, receives the conversation data of the user unit, and sends the activation r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of permission management, in particular to a permission management system based on RBAC. The permission management system comprises a user unit, a conversation unit, a role unit, a data permission unit and a function permission unit. Compared with the prior art, logic separation between a user and access permission is achieved, permission separation of a function and data is achieved, configuration and management of the permission are simpler, and the use difficulty of the user is reduced.

Description

technical field [0001] The invention relates to the technical field of authority management, in particular to an authority management system based on RBAC. Background technique [0002] IT information system is a complex human-computer interaction system, in which every specific link may be threatened by security. It is very important to build a robust authority management system to ensure the security of the information system. Access control is a defense against unauthorized use of resources. The basic goal is to limit the access rights of the access subject (user, process, service, etc.) to the access object (file, system, etc.), so that the computer system can be used within the legal scope. There are generally three types of access control policies: discretionary access control methods, mandatory access control methods, and role-based access control methods (RBAC) (Role-Based Access Control, which refers to role-based access control). Among them, both the autonomous ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 周海波郑兆妙孙枕涟
Owner GUILIN CHANGHAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products