Unlock instant, AI-driven research and patent intelligence for your innovation.

Rights processing method, device, terminal device and storage medium

A processing method and permission configuration technology, applied in the computer field, can solve the problems of waste of manpower and material resources, repeated design, etc., and achieve the effect of reducing development cost and improving development efficiency.

Active Publication Date: 2021-10-22
GUANGZHOU HUYA INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, many business modules implement authority management on user operations by embedding authentication authority codes in the business logic, but this method will lead to repeated design of different business modules in a background management system , development and debugging problems, resulting in a waste of manpower and material resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rights processing method, device, terminal device and storage medium
  • Rights processing method, device, terminal device and storage medium
  • Rights processing method, device, terminal device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flow chart of the rights processing method provided in Embodiment 1 of the present application. The method can be executed by a rights processing device, wherein the device can be implemented by software and / or hardware, and generally can be integrated on a hardware platform, and specifically includes the following steps :

[0042] S110. When receiving the service request sent by the requesting end, determine the rights configuration component corresponding to the requesting end from the first storage area.

[0043] The embodiment of this application can be applied in the background management system. The background management system can be a system for managing the user interaction website. The user interaction website can receive the user's input information and return the corresponding interaction information according to the user's input information. website.

[0044] A user interaction website generally includes different functional modules, and ...

Embodiment 2

[0062] figure 2 It is a flow chart of the rights processing method provided in Embodiment 2 of the present application. The method can be executed by a rights processing device, wherein the device can be implemented by software and / or hardware, and can generally be integrated on a hardware platform, and specifically includes the following steps :

[0063] S120. When receiving the service request sent by the requesting end, determine the rights configuration component corresponding to the requesting end from the first storage area.

[0064] S121. Call the authority configuration component to configure service authority for the service request.

[0065] S122. Return the service authority to the requesting end as a request response.

[0066] For specific implementation manners of the above operations, reference may be made to the relevant description above, and details are not repeated here.

[0067] S123. Write the service request and the service right into a storage queue. ...

Embodiment 3

[0076] image 3 It is a flow chart of the rights processing method provided in Embodiment 2 of the present application. The method can be executed by a rights processing device, wherein the device can be implemented by software and / or hardware, and can generally be integrated on a hardware platform, and specifically includes the following steps :

[0077] S130. When receiving the service request sent by the requesting end, determine the rights configuration component corresponding to the requesting end from the first storage area.

[0078] S131. Call the authority configuration component to configure service authority for the service request.

[0079] S132. Return the service authority to the requesting end as a request response.

[0080] For specific implementation manners of the above operations, reference may be made to the relevant description above, and details are not repeated here.

[0081] S133. Determine whether the service request and the service authority meet th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a permission processing method, device, terminal equipment and storage medium. The method includes: when receiving the service request sent by the requesting terminal, determining the permission corresponding to the requesting terminal from the first storage area A configuration component; calling the authority configuration component to configure service authority for the service request; returning the service authority as a request response to the requesting end. Through the above technical solution, different business modules can obtain the corresponding authority configuration components from the first storage area, and through the authority configuration components to configure authority for business requests, it is not necessary to modify the algorithm logic of the business module itself. Business modules perform unified authority management to improve system development efficiency and reduce development costs.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technologies, and in particular, to a rights processing method, device, terminal device and storage medium. Background technique [0002] The background management system includes business modules for different businesses, and many business modules need to manage user operation permissions, for example, judgment on user operation restrictions. In the prior art, many business modules implement authority management on user operations by embedding authentication authority codes in the business logic, but this method will lead to repeated design of different business modules in a background management system , development and debugging problems, resulting in a waste of manpower and material resources. Contents of the invention [0003] Embodiments of the present application provide a permission processing method, device, terminal equipment, and storage medium, which can perform u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 蔡旭森
Owner GUANGZHOU HUYA INFORMATION TECH CO LTD