Data access right control method
A technology of data access and authority control, applied in the direction of digital data protection, digital data authentication, etc., can solve the problems of unclear logic, heavy workload, complicated use, etc., and achieve the effect of convenient expansion, quality improvement, and convenient expansion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0040] The data access authority control method of the present invention includes the following steps:
[0041] a) Establish a data model
[0042] Abstract data into data types and data objects. The data type describes a collection of data with the same attributes. The data type in the system may be a database table or object entity type, or it may be a virtual type (abstract data collection);
[0043] The data object is an instance of a type, or a record in the database;
[0044] b) Establish an inheritance system between data types
[0045] First establish the root type, all data types directly or indirectly inherit the root type; the inheritance relationship between data types is also established according to the different nature;
[0046] c) Establish a user model
[0047] As attached figure 1 As shown, the user model is used to describe and limit the scope of users, including users, roles, user organizations and related objects related to users that can affect users' access to data...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 