Authorization processing method and device

A processing method and permission technology, applied in the field of communication, can solve the problems of caching, inflexible authorization methods, and inability to perform memory, and achieve the effects of flexible authorization methods, intuitive permission display, and optimal permission storage methods.

Active Publication Date: 2016-07-13
ZTE CORP
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Through the above steps, the role authorization method in the related technology solves the problem of massive resources and operation authorization by establishing an operation set and a resource set, but there are also some problems in the above method, for example, 1. When the resource changes, it cannot automatically Obtain or cancel operation permissions, for example: when resources are added, the added resources cannot automatically obtain permissions, and the resource set must be manually modified to add new resources to the resource set; when resources are deleted, the deleted resources cannot automatically cancel permissions, The resource set must be manually modified to delete resources from the resource set; 2. It is impossible to visually display the permissions granted by each resource on the resource tree
Because the operation set is granted to the resource set instead of a single resource, it is impossible to visually display the operation set granted to each resource on the resource tree; 3. When the number of resources is huge, such as when the number of resources reaches 100,000, Each resource set needs to persist a large amount of data
Once the number of resource sets is large, the entire data volume becomes very large, basically unable to cache in memory, and must be read through the database, resulting in low authentication efficiency
[0009] Therefore, in related technologies, at least one of the following problems exists when performing role authorization: the authorization method is not flexible, the permission display is not intuitive, and the problem of a huge number of permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization processing method and device
  • Authorization processing method and device
  • Authorization processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0044] In this embodiment, an authorization processing method is provided, figure 2 is a flowchart of an authorization processing method according to an embodiment of the present invention, such as figure 2 As shown, the process includes the following steps:

[0045] Step S202, organizing the resource nodes to be authorized into a tree structure or a hierarchical structure;

[0046] Step S204, specifying and authorizing the operation set selected from the resource nodes to be authorized;

[0047] Step S206 , inheriting the operation set of the authorized resource node to the subordinate nodes of the resource node in the tree structure or hierarchical structure that has been designated and author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization processing method and device. The method includes organizing to-be-authorized resource nodes into a tree-shaped structure or a hierarchy structure; performing appointed authorization on an operation set selected from the to-be-authorized resource nodes; letting subordinate nodes of the resource nodes subjected to appointed authorization in the tree-shaped structure or the hierarchy structure inherit the operation set of the authorization resource nodes. In related prior art, at least one among the problems of inflexible authorization method, indirection authority display and huge amount of authorization number exists in role authorization. The invention provides the flexible authorization method, provides direct authority display and achieves preferable authority storage.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authorization processing method and device. Background technique [0002] In the telecommunication network management system, role-based access control (Role-Based Access Control, RBAC for short) is generally used for user access control, that is, the authority is assigned to a role, and the user has the authority of the role by associating with a certain role. When a user logs in to the system, since the user is associated with a certain role, only the resources restricted by the role can be allowed to operate, so as to achieve the purpose of access control. The process of creating roles and associating roles to users is called authorization. The RBAC model provides the flexibility of permission control. Permissions are abstracted to roles, and users are no longer directly granted permissions, but are granted permissions through roles. Users and roles form a many-to-many ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/30
Inventor 龙卉孙向东黄媛媛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products