Authority processing method and related equipment

A processing method and permission technology, applied in the direction of digital data protection, etc., can solve problems such as illegal access to databases, hidden dangers of data security, etc.

Inactive Publication Date: 2019-05-28
SHENZHEN INTELLIFUSION TECHNOLOGIES CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since a large amount of sensitive information is stored in the database, unauthorized or unknown connection requests in most cases mean illegal acce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority processing method and related equipment
  • Authority processing method and related equipment
  • Authority processing method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0026] Each will be described in detail below.

[0027] The terms "first", "second", "third" and "fourth" in the specification and claims of the present application and the drawings are used to distinguish different objects, rather than to describe a specific order . Furthermore, the terms "include" and "have", as well as any variations thereof, are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority processing method and related equipment. The method is applied to first service equipment included in a data access system, the data access system further comprises second service equipment and a first terminal, the method comprises the steps that a first access request which is sent by the first terminal and carries a user identifier of the first terminal is received, and the first access request is used for requesting to access data of a target type; obtaining a first access parameter set associated with the target type; sending a parameter filtering request carrying the first access parameter set, the user identifier and the target type to the second service equipment; receiving a second access parameter set sent by the second service device for theparameter filtering request, the second access parameter being obtained by the second service device filtering the first access parameter set based on a target permission rule, and the target permission rule being associated with the user identifier and the target type; And allowing the first terminal to access the target type of data associated with the second access parameter set. According to the embodiment of the invention, authority management of data access is realized.

Description

technical field [0001] The present application relates to the field of data access technology, in particular to a permission processing method and related equipment. Background technique [0002] With the continuous development of information technology, databases are no longer just used to store and manage data, but can also be used to share their information for multiple users. Since a large amount of sensitive information is stored in the database, unauthorized or unknown connection requests in most cases mean illegal access to the database, which brings great hidden dangers to data security. Therefore, how to manage the authority of the database is very necessary of. Contents of the invention [0003] Embodiments of the present application provide a permission processing method and related equipment, which implement permission management for data access. [0004] In the first aspect, the embodiment of the present application provides a permission processing method, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 梁志锋钟斌石小华
Owner SHENZHEN INTELLIFUSION TECHNOLOGIES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products