User permission management method and device

A technology of user authority and management method, applied in the field of user authority management method and device, can solve the problems of low information security of intelligent terminals and no information acquisition authority setting, etc., so as to improve security, solve low security, and realize security management and control. Effect

Active Publication Date: 2018-11-13
北京易代储科技有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a user authority management method and device to sol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission management method and device
  • User permission management method and device
  • User permission management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0057]It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a user permission management method and device. The user permission management method and device comprises the following steps: configuring preset user permission according to a first user identity; receiving an operation request instruction of the first user; judging whether the operation request instruction satisfies the preset user permission; and configuring the operation permission of the first user if the operation request instruction satisfies the preset user permission. Through the user permission management method disclosed by the application, the technical problem that the intelligent terminal is low in information security and free from information acquisition permission setting is solved.

Description

technical field [0001] The present application relates to the technical field of database authority management, in particular, to a user authority management method and device. Background technique [0002] At present, with the widespread use of smart terminals, a large amount of business secret information and private information of enterprises or users are stored in the smart terminals, so the information security of smart terminals has become a concern. A commonly used authentication method for management applications and information is to set an account and a corresponding password, and implement information encryption through verification of the account and password. When using the terminal, the user enters the account number and password in the login box. As long as the background verification is correct, the terminal will open all operation permissions, which may easily cause the leakage of private information. Especially in the warehouse management database, it is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/321H04L63/08H04L63/10
Inventor 杨洪兵孟俊良陈宗宪汪堃李琛杨鹤高仑赵庆峰刘蕴慧赵媛宁张小龙
Owner 北京易代储科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products