Unlock instant, AI-driven research and patent intelligence for your innovation.

Rights policy configuration method, device and computer-readable storage medium

A strategy configuration and strategy technology, applied in the Internet field, can solve the problems of low configuration stability and low configuration efficiency, and achieve the effect of improving configuration efficiency, improving operation stability, and solving low configuration efficiency.

Active Publication Date: 2020-04-21
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a permission policy configuration method and a permission policy configuration device with high configuration efficiency and high stability; to solve the problem of low configuration efficiency and low configuration stability of the existing permission policy configuration method and configuration device technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rights policy configuration method, device and computer-readable storage medium
  • Rights policy configuration method, device and computer-readable storage medium
  • Rights policy configuration method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Referring to the drawings, wherein like reference numerals represent like components, the principles of the present invention are exemplified when implemented in a suitable computing environment. The following description is based on illustrated specific embodiments of the invention, which should not be construed as limiting other specific embodiments of the invention not described in detail herein.

[0026] In the following description, specific embodiments of the present invention are described with reference to steps and symbols for operations performed by one or more computers, unless otherwise stated. Accordingly, it will be understood that the steps and operations, which at times are referred to as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured form. This manipulation transforms the data or maintains it at a location in the computer's memory system that can reconfigure or ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authority strategy configuration method. The method comprises the following steps: acquiring an access authority configuration information, and based on the access authorityconfiguration information, generating at least one access authority preparatory strategy; acquiring access authority traffic information, and according to the access authority traffic information, performing strategy running for the access authority preparatory strategy in a preset sandbox environment, thereby obtaining preparatory strategy running results; screening the preparatory strategy running results through a preset threshold value, thereby obtaining a corresponding access authority strategy; on a corresponding data access system, performing configuration operations for the access authority strategy. The invention also provides an authority strategy configuration device. According to the method and the device provided by the invention, the corresponding access authority preparatorystrategy is generated based on the access authority configuration information and the access authority traffic information, moreover, all the access authority preparatory strategies are screened in the preset sandbox environment, configuration efficiency of the access authority preparatory strategies is improved greatly, and running stability of the configured access authority preparatory strategies is improved.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a permission policy configuration method, device and computer-readable storage medium. Background technique [0002] With the development of science and technology, people have higher and higher requirements for data access. In order to meet people's various data access requirements, existing data service providers will provide various data access rights to restrict data access and control traffic. . For example, by configuring data access rights policies to control different users' access rights to different data resources. [0003] In the existing data permission policy configuration method, after the data service provider creates the access permission policy, it will directly authorize the corresponding account or customer; If the change does not meet expectations, etc.), the user can apply to change the authorized access policy. The changed access policy is a new version...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/53
CPCG06F21/53H04L63/105H04L63/205
Inventor 袁哲
Owner TENCENT TECH (SHENZHEN) CO LTD