Control method and device for information access permission

A technology of information access and access rights, applied in digital data protection, instruments, electronic digital data processing, etc., can solve the problem of multiple user role definitions, achieve the effect of reducing the scale of role settings and facilitating flexible authority management

Active Publication Date: 2017-04-26
THE PEOPLES BANK OF CHINA NAT CLEARING CENT
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of too much definition of user roles in large-scale information systems, and to better adapt to the needs of real enterprise organizational structures, the present invention proposes a control method for information access rights, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and device for information access permission
  • Control method and device for information access permission
  • Control method and device for information access permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of the present invention.

[0050] figure 1 It is a flowchart of a method for controlling information access rights in an embodiment of the present invention. Such as figure 1 As shown, the control method of the information access authority includes:

[0051] S100, creating a user group information table, a dimension permission table, and a user group-dimension permission relationship;

[0052] S200, creating a user information table and establishing a user-user group relationship ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention puts forward a control method and device for information access permission. The method comprises the following steps of creating a user group information table, a dimension permission table and a user group-dimension permission relationship; creating a user information table, and establishing a user-user group relationship and a user-dimension permission relationship; according to a role information table, a role-menu function information table and the created user information table, establishing a user-role relational table, and carrying out user operation permission control according to the user-role relational table; according to the user-user group relationship, the user group-dimension permission relationship and the user-dimension permission relationship, carrying out user data access permission control; and when the user data access permission control is carried out, regulating the user-dimension permission relationship, the user group-dimension permission relationship and the user-user group relationship to regulate the user group and the dimension permission corresponding to the user.

Description

technical field [0001] The invention relates to the field of system authority management, in particular to a method and device for controlling information access authority. Background technique [0002] Information systems generally need to provide services for multiple users, and need to set different permissions for users (such as the use permissions of function menus and buttons), that is, information system user permission management. Among the traditional permission management strategies, the typical one is the RBAC model. The RBAC model does not have an exact definition of the role division standard. When the system complexity is extremely high, the number of roles that need to be defined increases sharply; secondly, it is difficult to meet the needs of flexible authority control, especially when used in large systems; moreover, the RBAC model Consider authority control more from the perspective of software system, ignoring the characteristics of enterprise organizati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/62G06F2221/2141
Inventor 不公告发明人
Owner THE PEOPLES BANK OF CHINA NAT CLEARING CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products