A data access control method
A technology of data access and authority control, applied in the direction of digital data protection, digital data authentication, etc., can solve the problems of heavy workload, complicated use, unclear logic, etc., and achieve the effect of improving quality, facilitating expansion, and facilitating expansion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0039] The data access authority control method of the present invention comprises the following steps:
[0040] a) Build a data model
[0041] Abstract data into data types and data objects. The data types describe collections of data with the same properties. The data type in the system may be a database table or object entity type, or it may be a virtual type (abstract data collection);
[0042] A data object is an instance of a type, or a record in a database;
[0043] b) Establish an inheritance system between data types
[0044] First establish the root type, and all data types inherit the root type directly or indirectly; the inheritance relationship is also established between data types according to their nature;
[0045] c) Build a user model
[0046] as attached figure 1 As shown, the user model is used to describe and limit the scope of users, including users, roles, organizations to which users belong, and related objects related to users that can affect use...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


