Supercharge Your Innovation With Domain-Expert AI Agents!

Data access authority identification method and device

An access authority and data access technology, applied in the field of computer networks, can solve the problems of increasing data storage redundancy, occupying storage resources, etc., to save storage space, ensure security, and facilitate management.

Active Publication Date: 2017-02-08
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional method increases data storage redundancy and takes up a large amount of storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access authority identification method and device
  • Data access authority identification method and device
  • Data access authority identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] In one embodiment, such as figure 1 As shown, a method for identifying data access rights is provided, and the method includes the following steps 102-112.

[0025] Step 102, obtaining the login name input by the salesman.

[0026] In this embodiment, the login name is a login name pre-created by the server for the salesperson. The login name may be composed of one or more of predetermined digits including numbers, letters, punctuation marks, and special characters. The server may establish a login name database in advance, and store the created login names in the login name database, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data access authority identification method comprising the following steps: obtaining a clerk inputted login name, and determining whether the login name is a registered user name or not; if yes, obtaining an access authority level corresponding to the login name; receiving a clerk data access request, and detecting whether the data access request contains a first data sheet or not; if yes, obtaining the first data sheet corresponding to the data access request; determining whether the clerk access authority level has reached the access authority for accessing the first data sheet or not; if yes, only displaying the data, to which the clerk has the access authority, from the first data sheet. The data access authority identification method allows various data items to be stored in the same data sheet, thus saving storage space, reducing resource occupation, and data management is more convenient; in addition, the invention also provides a data access authority identification device.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method and device for identifying data access rights. Background technique [0002] Generally, data is stored in a data table, and access permissions are set for the table. When faced with a very large amount of data, in order to facilitate data management and maintenance, a large amount of data is usually stored in a data table. When the clerk needs to call the data in the data table, it is necessary to judge whether the clerk has the access right, and if it is judged that the clerk has the access right, then the clerk is allowed to access all the data stored in the data table. [0003] However, in the same data table, some data may not be allowed to be accessed by the salesman. At this time, if the permission to allow access is set for the salesperson, the salesperson will access the data that he does not have the access permission, resulting in data leakage. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/248G06F21/6227G06F2221/2141
Inventor 姜娟赵楚旋易小华黎大庆顾青山
Owner PING AN TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More