Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for revoking authority

An authorization token and time-limited technology, applied in security devices, secure communication devices, computer security devices, etc., can solve the problems of multiple manpower and time costs, low actual efficiency, and increased difficulty in technical implementation, so as to reduce the difficulty of technical implementation, The effect of improving processing efficiency

Active Publication Date: 2020-04-24
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this solution is that every time a permission is revoked, a field update operation needs to be performed on the database. If permissions need to be revoked in batches, the relevant authorization records need to be updated one by one. In the database operating environment, the actual processing efficiency is relatively low
Moreover, the operation logic of "item-by-item update" also needs to consume a lot of manpower and time costs to write and implement. If different authorization records are stored in a sub-database or sub-table, the corresponding data update operation also needs to involve sub-databases or sub-table, resulting in a further increase in the difficulty of technical implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for revoking authority
  • Method and device for revoking authority
  • Method and device for revoking authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be described in detail below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application shall fall within the protection scope of this application.

[0048] For the authorizing party, each permission that has been opened to the authorized party is stored in the database in the form of a data record. Table 1 shows an example of the data structure of a permission record. It should be noted that in this table The field attributes shown are for illustrative purposes only and do not constitute limitations on the scenario itself:

[0049]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method and device for revocation of authority. A permission revocation method includes: determining the authorization record set that needs to be revoked; setting the time-sensitive attribute value for the determined set, so that the set attribute value T 0 be the current moment or a future moment. The technical solution provided by this application can achieve the effect of updating the state of all records in the collection through one modification operation, without updating authorization records one by one, and will not be affected by different storage locations of multiple authorization records, thus effectively improving batch revocation The processing efficiency of permissions reduces the difficulty of technical implementation.

Description

technical field [0001] The present application relates to the technical field of authority control, in particular to a method and device for revoking authority. Background technique [0002] With the development of computer and Internet technology, users can enjoy many convenient functions. With the continuous improvement of user needs, a single functional subject sometimes cannot meet the complex needs of users. In this case, it is necessary for multiple relatively independent functional subjects to cooperate in a certain way to jointly provide services for users. . For example, in order to meet the shopping needs of users, the cooperation of multiple parties such as e-commerce platforms, payment platforms, and logistics platforms is required. [0003] In order to realize the collaboration between originally independent functional subjects, in addition to the necessary data exchange between the functional subjects, it is often necessary for the functional subjects to open...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06F21/62
CPCG06F21/6218H04L9/0891H04L63/068H04L63/0807H04L63/108H04L63/12H04L2463/121H04W12/082G06F16/2386G06F21/31G06F21/30G06F16/00H04L9/08
Inventor 陈栋
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products