Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authority adding method, device, and system, and authority addition requesting method and device

A technology for adding requests and authentication requests, applied in the computer field, can solve the problem of complex and single user rights adding process, and achieve the effect of improving efficiency and convenience

Active Publication Date: 2016-08-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the confidentiality of enterprise information, when existing enterprises manage user permissions, they need to manually add permissions for users who apply in the background of the enterprise server. Authorization of permissions, only qualified users can add permissions, each company has an independent backend server, such as a company has multiple branches, each branch often has a different backend server, users can send multiple When an enterprise or multiple branches apply for permissions, they need to send permission application requests to multiple background servers and submit user information. The process of adding user permissions is complicated and single

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority adding method, device, and system, and authority addition requesting method and device
  • Authority adding method, device, and system, and authority addition requesting method and device
  • Authority adding method, device, and system, and authority addition requesting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] figure 1 It is an application environment diagram for the operation of the methods of permission addition and permission addition request in an embodiment. Such as figure 1 As shown, the application environment includes a terminal 110, a rights management server 120, and an enterprise background server 130, and they communicate through a network.

[0048] The terminal 110 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but is not limited thereto. The terminal 110 can send data to the authority management server 120 through the network, such as user information, or data sent by the authority management server 120, etc., and the authority management server 120 can respond to the enterprise group authority authentication request sent by the terminal 110, the enterprise group join request etc. The rights management server 120 performs authentication and verification of user rights, and generates rights addition requests correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authority adding method, device, and system, and an authority addition requesting method and device. The authority adding method comprises steps of: receiving a first enterprise group authority authentication request sent by a terminal corresponding to a first user, wherein the first enterprise group authority authentication request carries user information corresponding to the first user and the first user is a user in a public group; acquiring an authority verification condition corresponding to the first enterprise group and determining whether the first user is a target user satisfying the authority verification condition according to the user information; and if yes, sending an authority adding request to an enterprise background server corresponding to the first enterprise group, wherein the authority adding request carries the user information corresponding to the target user in order that the enterprise background server adds a first enterprise group authority corresponding to the target user according to the authority adding request. The authority adding method enhances convenience in user authority addition to the enterprise group.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and system for adding rights and requesting rights adding. Background technique [0002] With the development of computer technology, more and more enterprises implement internal management through computer network technology, such as managing employee accounts, sharing information within the enterprise, etc. Online management through the network can improve the efficiency of information communication and collaboration. [0003] Due to the confidentiality of enterprise information, when the existing enterprise manages the user's authority, it needs to manually add authority for the user who applied for it in the background of the enterprise server. Authorization of permissions, only qualified users can add permissions, each company has an independent backend server, such as a company has multiple branches, each branch often has a different backend serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/104H04L63/20
Inventor 李龙黄丽
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products