Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and a system for controlling user data reading and writing security rights based on roles and resources

A technology of authority control and user data, applied in the computer field, it can solve the problems of difficult to satisfy the filtering of data records, no detailed authority control, and heavy workload.

Active Publication Date: 2019-03-26
珠海伟诚科技股份有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] 1) The authority control is not comprehensive, and does not cover the authority control of various channels and entrances such as reports, work order processes, HQL, and API interfaces;
[0019] 2) There is no refinement to the permission control of different combinations of database table CRUD (addition, deletion, modification and query);
[0020] 3) Permissions are directly authorized to users instead of roles. This authorization method is not flexible. When it comes to daily changes such as user resignation and job transfer, the system authorization adjustment is cumbersome and complicated, and the workload is heavy;
[0021] 4) It is difficult to meet complex data record filtering by only using simple field filtering conditions and their combinations of "and" or "or". Multiple other field values ​​in the level association table for multi-level association query filtering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and a system for controlling user data reading and writing security rights based on roles and resources
  • Method and a system for controlling user data reading and writing security rights based on roles and resources
  • Method and a system for controlling user data reading and writing security rights based on roles and resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The idea, specific structure and technical effects of the present invention will be clearly and completely described below in conjunction with the embodiments and accompanying drawings, so as to fully understand the purpose, scheme and effect of the present invention.

[0040] It should be noted that, unless otherwise specified, when a feature is called "fixed" or "connected" to another feature, it can be directly fixed and connected to another feature, or indirectly fixed and connected to another feature. on a feature. In addition, descriptions such as up, down, left, and right used in the present disclosure are only relative to the mutual positional relationship of the components of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. Also, unless defined otherwise, all technical and scientific terms used herein have...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The technical proposal of the invention comprises a method and a system for controlling user data reading and writing security rights based on roles and resources, which are used for realizing the following functions: controlling application program rights, including executing corresponding security rights control on database table level, field level and record level data at the front and back ends of the application program; controlling user data reading and writing security rights based on roles and resources. Work order data permission control, including work order administrator role, workorder adding permission, work order content viewing permission, work order content modifying permission and content operation permission to implement corresponding permission security control; Reporting permission control, including the addition of permission assertions to the report file, is used to determine access and / or modified objects, and to perform access control based on the determinationresults. The invention has the advantages that the user-defined matching can flexibly define various complicated fields or report screening conditions; Flexible and changeable table level, field level and record level omni-directional matrix permission control can be realized.

Description

technical field [0001] The invention relates to a method and system for controlling user data read-write security rights based on roles and resources, and belongs to the field of computers. Background technique [0002] Role-Based Access Control (RBAC: Role-Based Access Control) as a promising replacement of traditional access control (voluntary access, mandatory access) has received widespread attention. In RBAC, permissions are associated with roles, and users gain the permissions of those roles by becoming members of the appropriate roles. This greatly simplifies the management of permissions. In an organization, roles are created to accomplish various tasks, and users are assigned corresponding roles according to their responsibilities and qualifications. Users can be easily assigned from one role to another. Roles can be given new permissions according to new requirements and system integration, and permissions can also be withdrawn from a role as needed. Character-t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/31G06F21/45
Inventor 刘玉成李文帅贺承明陈金活
Owner 珠海伟诚科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products