Unlock instant, AI-driven research and patent intelligence for your innovation.

User authorization management system and method

A user authority and management system technology, applied in the computer field, can solve the problem that role-based access control cannot meet the needs of actual application scenarios, and achieve the effects of guaranteed information and data resource security, reasonable authority management process, and flexible authority configuration

Inactive Publication Date: 2017-12-22
上海最会保网络科技有限公司
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is that the existing role-based access control cannot meet the needs of more and more changing actual application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authorization management system and method
  • User authorization management system and method
  • User authorization management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 2 It is a schematic diagram of Embodiment 1 of the user rights management system of the present invention, as shown in figure 2 As shown, the user rights management system in this embodiment includes a database, a role query unit, a function rights query unit and a data rights query unit.

[0042] Database, including user role association table, role function authority association table and role data authority association table.

[0043] The user role association table is used to save the corresponding relationship between users and roles.

[0044] The role function permission association table is used to store the corresponding relationship between roles and function permissions, wherein the function permission is used to determine executable functions.

[0045] The role data permission association table is used to save the corresponding relationship between roles and data permissions, where the data permission is used to determine the data that is allowed t...

Embodiment 2

[0050] image 3 It is a schematic diagram of Embodiment 2 of the user rights management system of the present invention, as shown in image 3 As shown, the user rights management system in this embodiment includes a database, a role query unit, a function rights query unit and a data rights query unit.

[0051] The database, in addition to the user role association table, role function authority association table and role data authority association table in Embodiment 1, also includes user table, role table, function authority table, data authority table, function operation table, and object information table These six basic information tables.

[0052] combine Figure 5 As shown, the improved model of role-based access control (RBAC), including users, roles, functional permissions, data permissions, operations and operation objects, corresponds to the user table, role table, functional permission table, data permission table, Function operation table and object information...

Embodiment 3

[0068] Figure 4 is a schematic diagram of Embodiment 3 of the user rights management system of the present invention, as shown in Figure 4 As shown, the user authority management system of the present embodiment includes a database (including user table, role table, function authority table, data authority table, function operation table, object information table, user role association table, role function authority association table and role data permission association table), role query unit, function permission query unit and data permission query unit. These are similar to those in Embodiment 2, and will not be repeated here.

[0069] In this embodiment, the database also includes a user function permission attribute table, a user data permission attribute table and a resource table; the functional unit also includes a resource extraction unit and an execution unit.

[0070] The user function permission attribute table is used to save the function permission and functi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authorization management system and method. The user authorization management system comprises a database which comprises a user role association table where corresponding relationships of users and roles are saved, a role function authorization association table where corresponding relationships of roles and function authorization are saved and a role data authorization association table where corresponding relationships of roles and data authorization are saved; the function authorization is used for determining executable functions; the data authorization is used for determining accessible data; a role query unit is used for inquiring the user role association table and obtaining roles corresponding to online users; a function authorization query unit is used for inquiring the role function authorization association table according to the roles corresponding to online users to verify whether functions requested by online users are executable or not; a data autorization query unit is used for inquiring the role data authorization association table according to the roles corresponding to online users to obtain data authorization corresponding to online users when the functions requested by online users are executable.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a user authority management system and method. Background technique [0002] With the development of computer technology and Internet technology, the world today has entered the era of big data. Enterprises and governments are paying more and more attention to informatization construction and data sharing, and how to ensure information and data security has also received special attention. [0003] Enterprises and governments usually provide external or internal access to various services and data resources through websites or application software. If no effective authority management mechanism is established, once a user accesses services, data or resources outside the scope of his authority, it will undoubtedly bring great security risks. Therefore, it is necessary to restrict each user to only access the authorized data and resources through the rights management f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/28G06F21/6218
Inventor 麦林盛运林李心语黄涛彭庭坤王鹏杨一
Owner 上海最会保网络科技有限公司