Unlock instant, AI-driven research and patent intelligence for your innovation.

Permission assignment method and system based on product configuration

A technology of authority allocation and products, applied in the field of information security, can solve problems such as reducing data security, and achieve the effect of improving security

Inactive Publication Date: 2015-04-29
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to address the problem of reducing data security when the existing data management is applied to production data, and provide a product-based permission assignment method that can improve data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission assignment method and system based on product configuration
  • Permission assignment method and system based on product configuration
  • Permission assignment method and system based on product configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] Such as figure 1 As shown in FIG. 1 , it is a flowchart of a method for assigning rights based on product configuration in an embodiment. The method of assigning rights based on product configuration includes:

[0051] Step 102, acquiring user information and products selected by the user.

[0052] First, the user registers an account through the client and fills in the user information. The user information includes user name, title, job number, phone number, contact information, etc. Obtain the user information obtained after the user logs in through the registered account. Then, get ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a permission assignment method and system based on product configuration. The method comprises the following steps: acquiring user information and a product selected by a user; acquiring a corresponding permission according to the user information and the product; assigning the configuration data of the product according to the corresponding permission. According to the permission assignment method based on the product configuration, the permission is determined according to the user information and the product, and corresponding configuration data is allocated according to the permission; since the user information and the product are combined, and different permissions can be implemented even for the same user specific to different products, the data security is enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for assigning rights based on product configuration. Background technique [0002] In the production test of the developed product, because there are many types of products and a lot of production data involved, if effective management and maintenance are not carried out, it is easy to be modified or deleted by operators with different permissions, resulting in more serious consequences. There are mainly three traditional data management methods, one is the autonomous access control model, which directly assigns permissions to users, which has high flexibility, but the security level is low; the other is the mandatory access control model, which sets a certain security level for the object, through Granting a permission level to the subject determines which security-level resources the subject can access. The model has high security but low flexibility; the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/30
Inventor 刘永升卢伟龚再进韩文旭
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD