Unlock instant, AI-driven research and patent intelligence for your innovation.

Loose-leaf switching mechanism of permission roles

A permission and loose-leaf technology, applied in the field of database application system development, to achieve the effect of convenient operation interface

Inactive Publication Date: 2016-05-11
SHANGHAI ZANYUE SOFTWARE SERVICE CENT
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the shortcomings of the existing authority role switching mechanism, the present invention provides an authority loose-leaf mechanism to limit the operating authority of the system modules, and at the same time fully utilizes the perfect user authority management mechanism provided by the authority loose-leaf, using three loose-leaf authority Authorized users log in to the database, and the security that cannot be controlled by the application can be controlled through tab switching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loose-leaf switching mechanism of permission roles
  • Loose-leaf switching mechanism of permission roles
  • Loose-leaf switching mechanism of permission roles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] exist figure 1 In , it shows the user relationship structure diagram of the tab switching mechanism of authority roles. (1) User authentication. The application system maintains a user information table, which includes information such as user name, user password, user module authority, and user authority leaflet. When a user logs in to the system, the user identity verification and permission review are performed through this table, and the user can log in to the database again through the user's permission sheet, and the system administrator can maintain user permissions through the permission sheet module.

[0014] (2) User module authority management. Each system user checks the authority of the system according to the authority of the user table, and the user cannot enter the module without authorization. Of course, there can be multiple levels of modules in the system. When a user has no right to a certain module, he also has no right to the sub-modules of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a loose-leaf switching mechanism of permission roles. The operation permission of a system module is limited; simultaneously, a complete user permission management mechanism provided by a permission loose leaf is sufficiently utilized; permission user login databases having three loose-leaf permissions are adopted; and the security, which cannot be controlled by an application program, can be controlled through loose-leaf switching. According to the embodiment of the invention, practical conditions of system users are analyzed when users log in the system, such that the system users are divided into three permission loose leaves according to use permissions; a loose-leaf switching permission set including three permissions is established for each user; therefore, each system user can access the database login through the permission corresponding to the permission set, which the system user belongs to; on the one hand, the security control complexity and difficulty of the application program can be reduced; and on the other hand, security control can be carried out by sufficiently utilizing a security management mechanism switched through the three loose leaves.

Description

technical field [0001] The invention relates to the technical field of database application system development, in particular to user authority management in the development process. Background technique [0002] Rights management generally refers to the fact that according to the security rules or security policies set by the system, users can access and only access the resources they are authorized to, no more, no less. Rights management appears in almost any system, as long as there is a system with users and passwords. Enterprise IT administrators can generally define roles for the system and assign roles to users. This is the most common role-based access control. From the perspective of control, authority management can be divided into two categories: 1, function-level authority management; 2, data-level authority management. From the perspective of control direction, authority management can also be divided into two categories: 1. Obtain data from the system, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30
CPCG06F21/30
Inventor 叶君玉
Owner SHANGHAI ZANYUE SOFTWARE SERVICE CENT