User permission management method and system

A technology of user rights and management methods, applied in the field of user rights management methods and systems, to achieve the effect of reducing system pressure

Inactive Publication Date: 2016-09-21
LETV HLDG BEIJING CO LTD +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a user authority management method and system for the technical problem of maintaining a huge user account database in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission management method and system
  • User permission management method and system
  • User permission management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0070] Such as figure 1 Shown is a work flow chart of a user rights management method of the present invention, including:

[0071] Step S101, comprising: in response to a user login request including a user account, a user password and a session identifier, acquiring a password list related to the user account, the password list including a plurality of verification passwords;

[0072] Step S102, including: if the user password is consistent with any one of the verification passwords in the password list, allowing the user indicated by the session identifier to log in, and using the verification password consistent with the user password as the user verify password;

[0073] Step S103 includes: if the user authentication password is associated with at least one authority in the preset authority list, using the authority associated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a user rights management method and system, including: in response to a user login request including a user account, a user password, and a session ID, acquiring a password list related to the user account, the password list including a plurality of verification Password; if the user password is consistent with any one of the verification passwords in the password list, the user indicated by the session identifier is allowed to log in, and the verification password consistent with the user password is used as the user verification password; If the user authentication password is associated with at least one authority in the preset authority list, the authority associated with the user authentication password is used as a user authority, and the user authority is assigned to the session identifier. In the embodiment of the present invention, multiple passwords are maintained for the same user account. Since the same user account is used to log in, the system does not need to maintain a large number of user accounts, reducing system pressure.

Description

technical field [0001] The embodiments of the present invention relate to the technical field related to user management, in particular to a method and system for managing user rights. Background technique [0002] When a user logs in to the system, in order to distinguish different users for easy management, the user is generally required to authenticate. [0003] The existing verification method is to require the user to provide the user account and user password. If the user account and user password are consistent with the information stored in the system, the user is allowed to log in, and a certain authority is assigned to the user, so that the user can execute the corresponding authority. operate. [0004] However, the inventor found in the process of implementing the present invention that this user verification method requires different users to set different user accounts, which leads to the maintenance of a very large user account database in the system. Conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/31G06F21/60
CPCH04L63/083G06F21/31G06F21/602H04L63/105
Inventor 吴卫
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products