Authority scheduling method and device

A dispatching method and a dispatching device technology, applied in the direction of digital data authentication, etc., to achieve the effect of minimizing and optimizing dispatching and reducing workload

Active Publication Date: 2018-03-23
CHINA MOBILE GROUP JIANGSU
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above permission scheduling obviously violates the principle of permission minimization and optimal permission scheduling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority scheduling method and device
  • Authority scheduling method and device
  • Authority scheduling method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as figure 1 As shown, this embodiment provides a permission scheduling method, the method including:

[0080] Step S110: Obtain permission information including permission usage frequency;

[0081] Step S120: Calculate the authority scheduling factor according to the authority information and the preset functional relationship;

[0082] Step S130: Comparing the authority scheduling factor with a preset threshold to obtain a comparison result;

[0083] Step S140: Scheduling the authority according to the preset scheduling instruction mapped to the comparison result.

[0084] The permission scheduling includes permission scheduling behaviors such as permission recall and permission propagation, and the permission propagation is an authorization form of permissions.

[0085] Specifically, when the permission a corresponding to the account A has not been used for a long time, it means that the frequency of use of the permission a is low, and the permission a can be ...

Embodiment 2

[0090] Permission sensitivity represents the importance of permissions. Specifically, such as the payment change permission and user identity change permission corresponding to the account, the sensitivity is high, such as the sensitivity of applying for service activation is low; the higher the sensitivity, the information The more important, the higher the security required.

[0091] Account levels generally include ordinary accounts, management accounts, and super accounts. Super accounts have higher authority than management accounts, and management accounts have higher authority than ordinary accounts.

[0092] For different accounts and different permissions, depending on the conditions set for recall or dissemination according to the frequency of use of permissions, more optimal permission scheduling can be achieved. Therefore, on the basis of the previous embodiment, this embodiment further includes Added permission sensitivity and user level to better schedule permiss...

Embodiment 3

[0098] This embodiment is based on Embodiment 1 or Embodiment 2, and specifically designed for authority recall and authority propagation. Specifically: the authority scheduling factor is a recall factor for authority recall or a propagation factor for authority replication between accounts in the first specified group.

[0099] Taking account B and its corresponding authority b as an example, when the authority scheduling factor is the recall factor, compare the recall factor with the preset threshold (at this time, the preset threshold is the recall threshold), and judge according to the comparison result Whether to recall the permission b corresponding to account B; specifically, when the recall factor is not less than the recall threshold, the permission b is recalled, and account B can no longer use permission b; when the recall factor is smaller than the recall threshold, the permission b is not recalled , account B can continue to use permission b.

[0100] In the abov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a permission dispatching method and device, and relates to the technical field of permission control. The permission dispatching method and device is designed for solving the problems of a traditional static setting permission dispatching method that administrators have large workloads and the permission can not realize optimized and minimized dispatching. The method comprises the following steps: obtaining permission information which comprises permission use frequency; according to relationship between the permission information and a preset function, calculating a permission dispatching factor; and comparing the permission dispatching factor with a preset threshold value to obtain a comparison result, and dispatching the permission according to a preset dispatching instruction mapped by the comparison result. The permission dispatching method and device realizes the intellectualization of the permission dispatching, causes the distribution and the recall of the permission to be simpler, more conforms to user requirements and improves information security.

Description

technical field [0001] The present invention relates to the technical field of authority control, in particular to a method and device for authority scheduling. Background technique [0002] In the business support system, different accounts are assigned different permissions. The current permission scheduling is mainly realized by static preset configuration through the mapping relationship of "account-role-permission". The account administrator authorizes different accounts based on the roles corresponding to the accounts. Usually, the same type of role accounts have the same permissions, as for individual special accounts, it is manually set by the administrator. [0003] Although the existing technology has completed the scheduling of different account permissions, the following problems exist in the actual application process: [0004] First, in the existing permission scheduling method, once the occasionally used permission is authorized, it can be used at any time ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 陆浩蒋小雨王鑫张蔷陈劼刘波
Owner CHINA MOBILE GROUP JIANGSU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products