Unlock instant, AI-driven research and patent intelligence for your innovation.

Data access right control method

A technology of data access and authority control, applied in the direction of digital data protection, digital data authentication, etc., can solve the problems of unclear logic, heavy workload, complicated use, etc., and achieve the effect of convenient expansion, quality improvement, and convenient expansion

Active Publication Date: 2014-11-19
INSPUR SOFTWARE CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to meet the above data access requirements, the system often mixes data access control logic and business logic together, resulting in unclear logic, cumbersome and difficult maintenance, and a large workload
[0004] The data access control methods in the prior art usually have the following deficiencies: (1) The abstraction of the data model is not enough: most of them are based on relational databases, relying on database tables to implement, complex and cumbersome to use, and not easy to expand
In a traditional relational database, the same type of data may be stored in different data tables. In this way, when defining data access control, it is necessary to define the same data access control on different tables. It is also very cumbersome to modify and maintain, and many changes are required. place
(2) The abstraction of the permission context model is not enough: Most of them establish several fixed data models, such as users and departments, which make it difficult to modify and expand when the data access control requirements change

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access right control method
  • Data access right control method
  • Data access right control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] The data access authority control method of the present invention includes the following steps:

[0041] a) Establish a data model

[0042] Abstract data into data types and data objects. The data type describes a collection of data with the same attributes. The data type in the system may be a database table or object entity type, or it may be a virtual type (abstract data collection);

[0043] The data object is an instance of a type, or a record in the database;

[0044] b) Establish an inheritance system between data types

[0045] First establish the root type, all data types directly or indirectly inherit the root type; the inheritance relationship between data types is also established according to the different nature;

[0046] c) Establish a user model

[0047] As attached figure 1 As shown, the user model is used to describe and limit the scope of users, including users, roles, user organizations and related objects related to users that can affect users' access to data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access right control method and belongs to the field of data access right control. The data access right control method includes steps of setting up a data model; setting up an inheritance system among data types; setting up a user model; creating a special language for a data access right field; defining data access rights; building data access proxies; judging the rights; feeding results to users through the data access proxies. Compared with the prior art, the data access right control method has the advantages that data access rights are separated from service logics, the control method is realized by the proxies, is transparent, accessible, extendable and transplantable, and has high popularization and application value.

Description

[0001] Technical field [0002] The invention relates to a data access control method, in particular to a data access authority control method. Background technique [0003] In modern software systems, users tend to be diversified, business logic is complex, and requirements for data security and confidentiality are getting higher and higher. Different users access different types of data; for the same type of data, some users can access part of it, or some users can only access certain attributes of the data. In order to meet the above-mentioned data access requirements, the system often mixes data access control logic and business logic together, resulting in unclear logic, cumbersome and difficult maintenance, and heavy workload. [0004] The data access control methods in the prior art usually have the following shortcomings: (1) Insufficient abstraction of the data model: mostly based on relational databases, relying on database tables for implementation, which is complicated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/30
CPCG06F21/60
Inventor 蔡卫卫董玉全魏子重
Owner INSPUR SOFTWARE CO LTD