User authorization management system and method
A user authority and management system technology, applied in the computer field, can solve the problem that role-based access control cannot meet the needs of actual application scenarios, and achieve the effects of guaranteed information and data resource security, reasonable authority management process, and flexible authority configuration
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] figure 2 It is a schematic diagram of Embodiment 1 of the user rights management system of the present invention, as shown in figure 2 As shown, the user rights management system in this embodiment includes a database, a role query unit, a function rights query unit and a data rights query unit.
[0042] Database, including user role association table, role function authority association table and role data authority association table.
[0043] The user role association table is used to save the corresponding relationship between users and roles.
[0044] The role function permission association table is used to store the corresponding relationship between roles and function permissions, wherein the function permission is used to determine executable functions.
[0045] The role data permission association table is used to save the corresponding relationship between roles and data permissions, where the data permission is used to determine the data that is allowed t...
Embodiment 2
[0050] image 3 It is a schematic diagram of Embodiment 2 of the user rights management system of the present invention, as shown in image 3 As shown, the user rights management system in this embodiment includes a database, a role query unit, a function rights query unit and a data rights query unit.
[0051] The database, in addition to the user role association table, role function authority association table and role data authority association table in Embodiment 1, also includes user table, role table, function authority table, data authority table, function operation table, and object information table These six basic information tables.
[0052] combine Figure 5 As shown, the improved model of role-based access control (RBAC), including users, roles, functional permissions, data permissions, operations and operation objects, corresponds to the user table, role table, functional permission table, data permission table, Function operation table and object information...
Embodiment 3
[0068] Figure 4 is a schematic diagram of Embodiment 3 of the user rights management system of the present invention, as shown in Figure 4 As shown, the user authority management system of the present embodiment includes a database (including user table, role table, function authority table, data authority table, function operation table, object information table, user role association table, role function authority association table and role data permission association table), role query unit, function permission query unit and data permission query unit. These are similar to those in Embodiment 2, and will not be repeated here.
[0069] In this embodiment, the database also includes a user function permission attribute table, a user data permission attribute table and a resource table; the functional unit also includes a resource extraction unit and an execution unit.
[0070] The user function permission attribute table is used to save the function permission and functi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


