Accurate authority management system

A permission management and permission technology, which is applied in electrical digital data processing, instruments, digital data authentication, etc., to achieve flexible permission configuration and execution process, improve operational efficiency, and facilitate review.

Inactive Publication Date: 2017-06-27
柳州得实科技有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a precise authority management system. The technical problem to be solved is: the current RBAC-based authority management methods mostly focus on the control of functional authority, and the control of data authority is not flexible enough or too complicated. As a result, the configuration and management process of permissions is complicated, which increases the difficulty for users to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accurate authority management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0016] Such as figure 1 As shown, a precise authority management system includes user unit, session unit, role unit, administrator unit and function authority unit;

[0017] The user unit is respectively connected with the session unit and the role unit, transmits the session data of the user to the session unit, receives the role configuration sent by the role unit, and the user unit is used to log in the corresponding authority system of the authority management device, record the identity data, and send the session Data and receiving role configuration;

[0018] The session unit is connected to the role unit, receives the session data of the user unit, and sends activation role data to the role unit, for interac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of authority management, in particular to an accurate authority management system. The accurate authority management system comprises a user unit, a session unit, a character unit, a manager unit, a function authority unit and a data record unit, wherein the user unit is connected with each of the session unit and the character unit; the session unit is connected with the character unit; the character unit is connected with each of the manager unit and the function authority unit; and the data record unit is connected with the session unit. Compared with the prior art, the accurate authority management system has the advantages of realizing the logic separation between users and access authorities and the authority separation between functions and data, enabling the configuration and management of the authorities to be more simple, and reducing the using difficulty of the users.

Description

technical field [0001] The invention relates to the technical field of authority management, in particular to an accurate authority management system. Background technique [0002] IT information system is a complex human-computer interaction system, in which every specific link may be threatened by security. It is very important to build a robust authority management system to ensure the security of the information system. Access control is a defense against unauthorized use of resources. The basic goal is to limit the access rights of the access subject (user, process, service, etc.) to the access object (file, system, etc.), so that the computer system can be used within the legal scope. There are generally three types of access control strategies: autonomous access control methods, mandatory access control methods, and role-based access control methods (RBAC) (Role-Based Access Control, which refers to role-based access control). Among them, both the autonomous type a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/31
CPCG06F21/604G06F21/31
Inventor 唐华
Owner 柳州得实科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products