Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for controlling authority

A technology for controlling authority and authority, applied in the computer field, can solve the problems of system embezzlement, inability to guarantee user data security, etc., and achieve the effect of improving data security

Active Publication Date: 2021-07-16
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these systems usually do not have a permission control mechanism, which makes these systems easy to be stolen by other illegal users, and the security of user data cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling authority
  • Method and device for controlling authority
  • Method and device for controlling authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] figure 1 It shows an exemplary system architecture 100 to which embodiments of the method for controlling permissions or the apparatus for controlling permissions of the present application can be applied.

[0035] like figure 1 As shown, the system architecture 100...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method and device for controlling authority. A specific implementation of the method includes: receiving an operation request sent by a user, wherein the operation request includes a request type identifier, a deep learning model identifier, a user identifier and a dynamic password, wherein the dynamic password has an expiration time; based on the user identifier and the expiration time, determine whether the dynamic password is legal and not expired; in response to determining that the dynamic password is legal and not expired, then based on the request type identification, determine whether the user has the deep learning model indicated by the deep learning model identification The permission to perform the operation indicated by the operation request; in response to determining that the user has the permission, perform the operation on the deep learning model, and return the operation result to the user. This embodiment improves data security.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to the field of Internet technology, and in particular to a method and device for controlling authority. Background technique [0002] There are currently many open source systems for managing deep learning models that help simplify the complexity of deep learning program development. However, these systems usually do not have a permission control mechanism, which leads to these systems being easily stolen by other illegal users, and the security of user data cannot be guaranteed. Contents of the invention [0003] The purpose of the present application is to propose an improved method and device for controlling permissions, so as to solve the technical problems mentioned in the background technology section above. [0004] In the first aspect, the embodiment of the present application provides a method for controlling permissions, the method includes: receiving an op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCG06F21/31G06F21/45G06F2221/2141G06F2221/2151H04L9/3226H04L9/3297
Inventor 孙家元张发恩周恺王倩刘昆肖远昊徐东泽许天涵刘岚
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD