One-to-one authority authorization method and system on user based on roles

An authorization system and role technology, applied in user identity/authority verification, transmission systems, instruments, etc., can solve problems such as loss of system users, increase of authorization, cumbersome and troublesome operations of users, etc., to reduce the probability of authorization errors, The effect of improving efficiency and reliability, and improving the efficiency of authority management

Active Publication Date: 2017-08-29
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF18 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two processing methods not only take a long time to authorize the role in the case of many role permissions, but also are prone to mistakes. The operation of the user is cumbersome and troublesome, and it is also easy to make mistakes and cause losses to the system user.
[0011] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. To associate a new user, it is impossible to accurately determine how to choose the association
[0012] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0013] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-to-one authority authorization method and system on user based on roles
  • One-to-one authority authorization method and system on user based on roles
  • One-to-one authority authorization method and system on user based on roles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0072] [Example 2] A one-to-one authority authorization method for users based on roles, including the following sequential steps:

[0073] S1: Establish roles, each role is an independent individual, not a group / class;

[0074] S2: Associate users with roles, where a role can only be associated with a unique user at the same time period, and a user is associated with one or more roles;

[0075] S3: Authorize the roles established by S1 respectively.

[0076] [Embodiment 3] In order to realize the above authority authorization method, the role-based one-to-one authority authorization system for users should at least include a role establishment unit, a role authorization unit and a user-role association unit;

[0077] The role establishment unit is used to perform role layout according to positions and establish system roles, each role is an independent individual, not a group / category; the composition of the system role is: position name + post number; for example: workshop ...

Embodiment 4

[0080] [Example 4] The following example shows that after employee Zhang San enters a company, the relationship among employees, users and roles is as follows:

[0081] 1. New entry: For new employees, just select the corresponding position number / position number role for the user (employee) to associate, for example: Zhang San joins the company (the company assigns a Zhang San user to Zhang San) , the job content is in the sales department, responsible for the sales of refrigerator products in the Beijing area (the corresponding role is the role of "Sales Engineer 5" under the sales department), then user Zhang San can directly select the role of "Sales Engineer 5" to associate .

[0082] 2. Increase positions: After Zhang San worked for a period of time, the company also arranged for Zhang San to be responsible for the sales of TV products in the Beijing area (the corresponding role is the role of "Sales Engineer 8" under the first sales department) and concurrently as the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a one-to-one authority authorization method and system on a user based on roles. The method comprises the steps of 1, building the roles, wherein each role is an independent individual, and is not in a group and / or a category; 2, authorizing the roles built in the first step separately; 3, associating the user to the roles, wherein in the same time frame, one role can be only associated to sole user, while one user can be associated to one or more roles. According to the one-to-one authority authorization method and system on the user based on the roles, the roles are independent individuals, and are different from those of traditional group and / or category properties, and in the same time frame, one role can be associated to sole user, thus the authority management efficiency in the system using process is sharply improved, dynamic authorization is simpler, more convenient, and clearer, and the efficiency and reliability in authority arrangement are improved.

Description

technical field [0001] The invention relates to a user authority management method of management software systems such as EPR, in particular to a role-based one-to-one authority authorization method and system for users. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful database permission management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users can indirectly access database resources by being assigned different roles. [0003] There are often a large number of tables and views in large-scale application systems, which makes the management and authorization of database resources...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45G06F2221/2145G06F21/604H04L63/102H04L63/105G06F21/30H04L9/32
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products