Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

High efficiency electronic document permission inheritance and propagation method

An electronic document and permission technology, applied in electronic digital data processing, program/content distribution protection, instruments, etc., can solve the problems of unable to see the upper nodes, unable to function well, unable to configure concisely, etc. The effect of reducing configuration work, simplifying configuration information, and improving efficiency

Active Publication Date: 2016-11-16
厦门天锐科技股份有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method also has the following disadvantages: Since the inheritance mechanism must be propagated from top to bottom, layer by layer, if it is necessary to set a certain document node of a certain layer to have authority for a certain user, and the user When the upper-level nodes or siblings nodes cannot have permissions, the second permission control scheme will not work well
If you inherit from the root node layer by layer, the upper layer nodes and siblings nodes will inevitably continue to have the same permissions. If you do not inherit from the root node and directly set the target node, it will cause the user to fail because the upper layer node is not set. When the upper node cannot be seen, the settings for the target node are meaningless to the user
[0005] To sum up, the existing document access control schemes either cannot be configured concisely, or cannot achieve the purpose of configuration flexibly and conveniently, and inevitably have their own problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High efficiency electronic document permission inheritance and propagation method
  • High efficiency electronic document permission inheritance and propagation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] Such as figure 1 and figure 2 As shown, the present invention provides an efficient electronic document rights inheritance and dissemination method. The method needs to provide a rights configuration module, a rights collection module and a rights filtering module. The method includes the following steps:

[0026] S01: Plan and configure the permissions of the current file structure through the permission configuration module;

[0027] S02: When the system is initialized, the authority collection module collects the existing authority informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a high efficiency electronic document permission inheritance and propagation method; the method needs a permission configuration module, a permission collection module, and a permission filtering module; the method comprises the following steps: using the permission configuration module to plan and allocate the permission of a present file structure; using the permission collection module to collect existing permission information when the system initializes, binding node and permission corresponding information, and storing bound information into the memory; using the permission filtering module to match with a present logging user according to the permission information in the permission collection module, giving the present user with corresponding permission if the matching succeeds, and allowing the node to be invisible to the present user if the matching fails. The method can effectively carry out permission configuration for documents, thus ensuring configuration work of system management personnel; the configuration information is simple and clear, and can be flexibly combined and configured, thus allowing configuration to work in real time.

Description

technical field [0001] The invention relates to the field of computer information systems, in particular to an efficient method for inheriting and disseminating rights of electronic documents. Background technique [0002] The existing permission control schemes for document access are basically divided into two types: one is the access control without inheritance relationship, that is, the administrator configures the access permission one by one for the documents that need to be configured with access permission restrictions, and when judging the current system login When a person has access to a certain document, the system obtains the permission configuration set of the document node and matches it with the current system login person. If the match is successful, it will be released, and if the match fails, it will be filtered to achieve the purpose of permission control; the other is Access rights control with inheritance relationship. When judging whether the current s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/62
CPCG06F21/10G06F21/6209
Inventor 吴鑫水涂高元邱志斌陈雅贤
Owner 厦门天锐科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products