Permission configuration method and device

A permission configuration and permission technology, applied in the communication field, can solve problems such as infringement of user privacy information, and achieve the effect of preventing leakage

Active Publication Date: 2017-02-22
GREE ELECTRIC APPLIANCES INC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiments of the present invention provide a permission configuration method and device to solve the technical problem in the prior art that configuration of user permissions causes infringement of user privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission configuration method and device
  • Permission configuration method and device
  • Permission configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] figure 1 It is a schematic flow chart of the permission configuration method provided in Embodiment 1 of the present invention. The method in this embodiment is applicable to the situation where an online business hall configures user permissions. It can be executed by a device for configuring rights, which can be implemented in the form of hardware and / or software, and can generally be applied to an operator's server.

[0019] see figure 1 , the permission configuration method includes:

[0020] S110, when the user logs in to the system, send a private information acquisition request to the user.

[0021] Exemplarily, in the user login system, the system will send a request to the user to obtain the user's private information. So that the user can choose appropriate private information to provide to the system according to the degree of correlation between the private information and the system. The private information may be: user historical operation data and / or ...

Embodiment 2

[0028] figure 2 It is a schematic flow chart of the permission configuration method provided in Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, the reply information is specifically optimized as: the access authority of the third-party system, and correspondingly, the private information will be obtained according to the access authority of the third-party system , the specific optimization is: configure the user's authority according to the user's privacy information.

[0029] Correspondingly, the permission configuration method provided in this embodiment includes:

[0030] S210, when the user logs in to the system, send a private information acquisition request to the user.

[0031] S220. Acquire the private information according to the access authority of the third-party system in the reply information of the private information obtaining request.

[0032] At present, some privacy data chang...

Embodiment 3

[0036] image 3 It is a schematic flow chart of the permission configuration method provided by Embodiment 3 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments. In this embodiment, the reply information is specifically optimized as: the access authority of the third-party system and the designated privacy information. Correspondingly, the The permission to obtain the user's private information is specifically optimized as: obtaining specified private information from a third-party system according to the access permission.

[0037] Correspondingly, the permission configuration method provided in this embodiment includes:

[0038] S310, when the user logs into the system, send a private information acquisition request to the user.

[0039] S320. Acquire designated private information from a third-party system according to the access authority in the reply information of the private information obtaining request.

[0040] Sinc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a permission configuration method and device. The permission configuration method comprises the steps that when a user logs in a system, privacy information is sent to the user to obtain a request; reply information of the request is obtained according to the privacy information to configure a permission of the user; before the privacy information of the user is obtained, the user makes a choice for permitting a system to collect the privacy information of the user or not, and the permission of the user is configured according to the privacy information permitted by the user. While the corresponding operation permission is provided for the user, the privacy right of the user can be protected against invasion, and the privacy of the user can be also prevented from being leaked.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a permission configuration method and device. Background technique [0002] In the prior art, service functions such as phone charge inquiry, bill inquiry, top-up payment, package change and account period change can be provided through the online electronic business hall (E-Care). Usually, the corresponding relationship between roles and user rights can be prefabricated in the system. Different roles correspond to different user rights sets. User rights sets refer to the rights to use business functions. Roles are statically configured for each user. Configure the role for the user, and configure the corresponding permission set for the user. When a user uses a certain service function, judge whether the user can use the service function according to the set of user permissions. However, with the rapid development of network technology, the number of users of on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 谭志凯刘明赖瑜李金燕徐小雨
Owner GREE ELECTRIC APPLIANCES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products