Right setting method and device

A permission configuration and permission technology, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of heavy workload and slow response, achieve the effect of achieving flexibility and improving the efficiency of permission setting

Active Publication Date: 2019-01-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the management rights or access rights are basically manually set by the system administrator. However, se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Right setting method and device
  • Right setting method and device
  • Right setting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0035] Rights management is an important means to ensure information security. Rights management refers to the security rules or security policies set by the system, so that users can access and only access resources authorized by themselves based on their own account information. Generally speaking, enterprises will set up a small number of system administrators, and configure everyone's permissions through the system administrators. However, this permission setting method will cause the problems of heavy workload and slow response.

[0036] In order to solve this problem, an embodiment of the present application provides a permission setting method, which can be applied to a business that includes at least two levels, and each level of business is set with management permissions and readable permi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application disclose a right setting method and device. The method is applied to a service including at least two layers, and the service in each layer is provided with a management right and a readable right. The method comprises the following steps: obtaining the right of the user to the service for each level of the service; Determining that the user has a first rightconfiguration qualification and a second right configuration qualification for the service when the user has a management right for the service, The first right configuration qualification being qualification of a whitelist capable of setting a readable right of the service, The second right configuration qualification being qualification to set a whitelist of readable rights and/or a whitelist of management rights of a service at a next level of the service. By adopting the embodiment of the present application, the flexibility of the right setting can be realized and the efficiency of the right setting can be improved.

Description

technical field [0001] The present invention relates to the technical field of computer applications, in particular to a permission setting method and device. Background technique [0002] In enterprise management, authority management is the most important means to ensure information security. A small number of system administrators are set up in general enterprise management systems, and the system administrators set up different modules, pages, reports and even data ranks for the enterprise system. Among them, the management rights or access rights are basically manually set by the system administrator. However, setting the management rights by a small number of system administrators will result in heavy workload and slow response. Contents of the invention [0003] The embodiment of the present application provides a permission setting method and device, which is applied to services containing at least two levels, separates the management authority and readable author...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45G06Q10/10
CPCG06F21/45G06Q10/10G06F2221/2141
Inventor 曾凡万志颖史晓茸李家昌阮华何瑞
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products