Authority verification method based on user management

A technology of user management and verification method, which is applied in the direction of digital data authentication, etc., can solve the problems that platform administrators cannot manage tenant business, and achieve the effects of improving data visualization, reducing system management complexity, and increasing uniqueness and security

Inactive Publication Date: 2019-08-23
陕西中达公路技术服务有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Platform administrator under the SaaS platform: responsible for the daily maintenance and management of the platform, including user log management, tenant account review, tenant status management, tenant fee management, and tenant authority management. It should be noted that the platform administrator cannot specific business management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority verification method based on user management
  • Authority verification method based on user management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] see figure 2, the present invention supports the operating environment for the operation of the entire system through the underlying support of IaaS, uses server clusters as data storage, and uses technologies such as storage virtualization and network virtualization to realize ultra-large-scale data storage; and has good access control, Features such as load balancing, storage expansion, and disaster recovery, as well as configurable and custom features; and applications that support multi-tenant and multi-user roles.

[0056] Based on the services of the PaaS layer, the processes and components required by the service model of the system are constructed, and the business process services in the field of traffic engineering are constructed through the combination of micro-services, so as to realize the rapid connection of tools and data display.

[0057] Service components in this architecture include:

[0058] Cloud storage components: use virtualization and other t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority verification method based on user management, which can define roles of each user, generate a cascade mapping relation of the user roles, extract operation authority of the user roles based on a working process and record the operation authority in a user authority definition file. Therefore, the system generates a mapping relation based on the user role, the workflow and the authority, and the data resources and the authority of the role are corresponding in the system. The method is used for increasing the uniqueness and security of user authority distribution, so that the system has the capability of data personalized display, the data visualization of the system is improved, the data management flexibility is improved, the method can be applied to various system architectures in an intermediate service layer manner, and the system management complexity is reduced.

Description

technical field [0001] The invention belongs to the field of user management, and in particular relates to a permission verification method based on user management. Background technique [0002] The current various management systems have a relatively simple way of managing user rights, user verification, and information display. With the continuous development of big data and cloud computing, system users are paying more and more attention to data and demand for customization. Traditional The login method and information display cannot meet the needs of personalized and customized data display, the method of data processing is single, and the management of user rights is difficult. [0003] Traditional management systems manage user roles and permissions as follows: [0004] User classification: system users, super users, administrator users, visitor users, etc. [0005] System permissions: that is, the use or access permissions for different users to use system resource...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/31G06F21/45
Inventor 严肖
Owner 陕西中达公路技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products