User permission management method and system
A technology of user rights and management methods, applied in the field of user rights management methods and systems, to achieve the effect of reducing system pressure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0070] Such as figure 1 Shown is a work flow chart of a user rights management method of the present invention, including:
[0071] Step S101, comprising: in response to a user login request including a user account, a user password and a session identifier, acquiring a password list related to the user account, the password list including a plurality of verification passwords;
[0072] Step S102, including: if the user password is consistent with any one of the verification passwords in the password list, allowing the user indicated by the session identifier to log in, and using the verification password consistent with the user password as the user verify password;
[0073] Step S103 includes: if the user authentication password is associated with at least one authority in the preset authority list, using the authority associated ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com