Unlock instant, AI-driven research and patent intelligence for your innovation.

Command authority allocation method

A technology of authority assignment and command, applied in electrical components, transmission systems, etc., can solve problems such as inability to effectively manage user operation authority

Active Publication Date: 2017-11-21
SHENZHEN FORWARD IND CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A method of assigning command permissions that cannot effectively manage user operation permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Command authority allocation method
  • Command authority allocation method
  • Command authority allocation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to an embodiment of the present invention, a module-based method for assigning rights to network device CLI is provided, such as figure 1 shown, including the following steps:

[0041] S1: Create a command tree root node, and create a mode node for each configuration mode under the command tree root node.

[0042] The schema node is a child node of the root node of the tree. Mode nodes include: privileged mode, global configuration mode, interface configuration mode, etc.

[0043] S2: Add the first command, and use the keyword of the command as the keyword of the node.

[0044] The argument to the command also acts as a node. For example: command "ip route A.B.C.D / M IFNAME" where: "ip" and "route" are the keywords of the command, which will never change when entering the configuration command, and "A.B.C.D / M" and "IFNAME" are the commands respectively The ip parameter and the interface name parameter of , the ip parameter and the interface name parameter c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a command authority allocation method. According to the method, one mode node is created for each configuration mode under a command tree root node; a command in each configuration mode is a sub-tree for configuring the mode node, when a command tree is built, the first key word of the command is a sub-node of a corresponding mode node, and the sequence of key words in the command is embodied through a parent-child node relationship in the command tree; and authorities of the node comprise which module the node belongs to and a specific authority value in the module. Through adoption of the method, the command authority can be controlled in two aspects such as the module and the authority in the module. When an administrator allocates users, the administrator designates a module with authorities and a specific authority value of the module for the user, so that accurate control is realized.

Description

technical field [0001] The invention belongs to the field of network equipment, and in particular relates to a command authority distribution method. Background technique [0002] With the rapid development of the Internet, Internet services are increasing day by day. Many government departments, large enterprises and institutions will use network equipment such as routers and switches. The use of network equipment is accompanied by network security issues. Using the command line interface (command line interface (CLI for short) to configure network devices that are not limited enough in terms of management rights. Many devices generally have two levels of permissions. By default, there is only viewing permission, and all commands can be operated after entering the password, which is quite dangerous. [0003] In the prior art, different command tree views are generated for users of different levels. It can very precisely control the commands viewed by users of different le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/104H04L63/105
Inventor 陈朝阳赵荣方李振华
Owner SHENZHEN FORWARD IND CO LTD