Permission allocation method and device

A permission allocation and permission technology, applied in the Internet field, can solve problems such as unreasonable methods of hierarchical permission allocation

Active Publication Date: 2019-07-05
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method and device for assigning rights to solve the problem in the prior art that the method for assigning rights to a system with a complex hierarchical structure is unreasonable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission allocation method and device
  • Permission allocation method and device
  • Permission allocation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, it is a flow chart of the rights assignment method provided in the embodiment of this application, including the following steps:

[0032] S101: When a login request is received, determine the management level of the login user in the management system.

[0033] In the specific implementation process, when creating an account for the user, the user's management level can be specified, and the corresponding relationship between the user account and the management level can be established. Account information determines the administrative level of the logged-in user.

[0034] S102: Determine the management area set and management organization set corresponding to the login user according to the management level of the login user and the pre-established correspondence between management users at all levels and the management area set and management organization set.

[0035] Among them, the corresponding relationship between management users an...

Embodiment 2

[0051] The embodiment of this application mainly proposes a hierarchical and domain-specific authorization method based on the improved RBAC model to realize the fine distribution of rights when users are associated with multiple organizations and multiple regions, impose strict security policies, and meet flexible and complex system authorization requirements , to optimize the process of authorizing users, mainly divided into the following steps:

[0052] Design multi-level users and RBAC models.

[0053] Specifically, users are divided into super management users, management users, and ordinary users. Among them, a super management user can create new management users and organizations; any management user can create multiple management users and multiple common users, and any newly created Administrative users can create new administrative users and multiple ordinary users to establish multi-level users; ordinary users are associated with institutions, institution areas, ro...

Embodiment 3

[0087] Based on the same inventive concept, the embodiment of the present application also provides a permission distribution device corresponding to the permission distribution method. Since the problem-solving principle of the device is similar to the permission distribution method of the embodiment of the application, the implementation of the device can refer to the method The implementation of this method will not be repeated here.

[0088] Such as Figure 8 As shown, it is a structural diagram of the authority allocation device provided by the embodiment of this application, including:

[0089] A level determination module 801, configured to determine the management level of the login user in the management system when a login request is received;

[0090] The resource determination module 802 is configured to determine the management area set and the management area set corresponding to the login user according to the management level of the login user and the pre-esta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of Internet, in particular to an authority distribution method and device, and aims to solve the problem that an authority distribution method for a systemwith a relatively complex hierarchical structure is unreasonable in the prior art. The authority distribution method provided by the embodiment of the invention is applied to a management system comprising multiple levels of management users, and comprises the following steps: when receiving a login request, determining the management level of the login user in the management system; determininga management area set and a management mechanism set corresponding to the login user according to the management level of the login user and the established corresponding relationship between each level of management user and the management area set and the management mechanism set; receiving a request of a new user, the request carrying attribute information of the new user, the attribute information at least comprising a management mechanism, a management area and authority description information; and distributing permission to the new user according to the attribute information of the newuser and the management mechanism set and the management area set corresponding to the login user.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a method and device for assigning rights. Background technique [0002] At present, in the field of access control, the role-based access control (Role-Based Access Control, RBAC) model is most commonly used. The RBAC model realizes the logical separation of users and permissions by introducing the concept of roles, and then supports the responsibilities of technical personnel and business personnel. The separation of users, users obtain permissions by obtaining roles, so as to realize the management and control of user permissions. [0003] In the prior art, when using the RBAC model, the association process between users and roles needs to be completed centrally by the system administrator, that is, the system administrator is responsible for assigning permissions to each role in the system. This method is suitable for the organization of the system The stru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/102
Inventor 杨丽李露汪树岩姜华丰
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products