Method and equipment for managing user permission

A technology for managing users and users, applied in the computer field, can solve a large number of logic judgment codes and other problems, and achieve the effect of increasing flexibility and scalability

Active Publication Date: 2016-09-21
上海佳依佳信息科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One purpose of this application is to provide a method and device for managing user permissions, so as to solve the problem that developers need a large number of logic judgment codes for permission control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for managing user permission
  • Method and equipment for managing user permission
  • Method and equipment for managing user permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The application will be described in further detail below in conjunction with the accompanying drawings.

[0023] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0024] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0025] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a method and equipment for managing user permission. Compared with the prior art, the method comprises the following steps: firstly, obtaining first-time login information of a first user; then, on the basis of the first-time login information of the first user, obtaining and storing association information of all permission controlled elements; successively, according to the association information of all the permission controlled elements, constructing a first permission tree, and obtaining authorization information of the first user for a second user on the basis of the first permission tree; and then, according to the authorization information of the first user for the second user, determining association information of the permission controlled elements of the permission owned by the second user. The method realizes user permission management through a low-coupling, extensible and high-performance way so that a phenomenon that development personnel compile a great quantity of logic decision codes to carry out permission control is avoided. Furthermore, the permission controlled elements can be increased or reduced according to a user instruction so that flexibility and expansibility is improved.

Description

technical field [0001] The present application relates to the computer field, in particular to a technology for managing user rights. Background technique [0002] User permissions can basically be divided into two categories, one is functional permissions, and the other is data permissions. Functional permissions refer to whether a user can use a certain function, and data permissions refer to whether a user can access a certain data item. From a technical point of view, function permissions actually refer to whether users are allowed to access a certain control on the system interface, no matter whether the function on the interface is displayed in the form of menu, button or link, in the final analysis it is a display component (component or widget) , which corresponds to a unique UUID (Universally Unique Identifier, universally unique identifier). Almost all application systems will involve the management of page element permissions, which is an unavoidable function, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45G06F2221/2145G06F2221/2149
Inventor 王晓菁陈怀海杜宇杰
Owner 上海佳依佳信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products