Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority control method and device for application program, storage medium and computer equipment

An application program and permission control technology, applied in the computer field, can solve problems such as waste of enterprise resources, different functions, and threats to enterprise information security, so as to achieve the effect of improving security and avoiding amplification

Active Publication Date: 2019-05-03
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although this way of granting different application permissions to different computers improves enterprise information security to a certain extent, different users using the same computer may engage in different jobs, so the functions of various applications they need to use in their work are also different. different
However, in the prior art method, as long as the computer has authority for a certain application program, any user will be able to use all the functions of the application program on the computer, no matter whether the function used by the user is the function required by the user for work. , which is obviously unreasonable. Giving enterprise users redundant functions not only wastes enterprise resources, but more importantly, poses a threat to enterprise information security.
[0004] However, there is no method for solving the above technical problems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method and device for application program, storage medium and computer equipment
  • Authority control method and device for application program, storage medium and computer equipment
  • Authority control method and device for application program, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0028] In this embodiment, an application permission control method is provided, such as figure 1 As shown, the method includes:

[0029] Step 101, when a user logs in to a terminal device, obtain the user's login information.

[0030] In order to ensure the information security of terminal equipment, restrict the use of terminal equipment by different users, and control the user's use authority within a reasonable range, when a user logs in to a terminal equipment, obtain the user's login information, which can be the user's employee number, etc. Determine the information of the unique user identity, so as to obtain the user's permission information based on the user's login information to ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application program authority control method and device, a storage medium and computer equipment, and the method comprises the steps: obtaining login information of a user when the user logs in terminal equipment; According to the login information, obtaining authority information of the user from an intranet authority management server; Intercepting an application program execution request of the terminal equipment; Obtaining permission information of the application program from an intranet permission management server according to the application program executionrequest; And processing the process corresponding to the intercepted application program execution request according to the authority information of the user and the authority information of the application program. According to the application, the user can be prevented from calling various processes of the application program in the equipment at will to carry out over-range operation, the permission of the user and the application program is prevented from being amplified, the permission of the user for using the terminal equipment is controlled, and thus the security of enterprise information is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device, a storage medium, and a computer device for controlling the authority of an application program. Background technique [0002] At present, in the process of controlling and managing employees' computer use rights, enterprises usually manage computers so that different computers have different rights. [0003] Although this way of granting different application permissions to different computers improves enterprise information security to a certain extent, different users using the same computer may engage in different jobs, so the functions of various applications they need to use in their work are also different. different. However, in the prior art method, as long as the computer has authority for a certain application program, any user will be able to use all the functions of the application program on the computer, no matter whether the funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/105H04L63/1416H04L63/1441
Inventor 陈俊儒刘明吴亚峰谢文聪
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD