Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User account login method and device based on role mode

A technology of user account and login method, applied in the field of user account login method and device based on role mode, can solve the problems of easy error and poor usability, and achieve the effects of improving usability, reducing management risk and improving experience

Active Publication Date: 2019-08-30
ZHEJIANG UNIVIEW TECH
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a user account login method and device based on role mode, which overcomes the technical problems of poor usability and error-prone in the prior art, which only has fixed authority for each user account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User account login method and device based on role mode
  • User account login method and device based on role mode
  • User account login method and device based on role mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments, and the following embodiments do not constitute a limitation of the present invention.

[0030] like figure 1 As shown, a user account login method based on role mode, including:

[0031] Step S1, setting user accounts for the users, assigning permissions owned by the user accounts, creating role models for the user accounts, and assigning permissions owned by each role model.

[0032] This embodiment takes a video surveillance system as an example, and it is also applicable to other application systems.

[0033] On the server side of the video surveillance system, user accounts are first set up for users. Assuming that the video surveillance system supports ten users, ten user accounts are generated, and each user account includes a user name and a password. Same as the prior art, each user account will be set with c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user account login method and device based on a role mode. By setting different role modes for the user account, the user is allowed to log in with the different role modes under the same user account, unconscious deletion / change configuration operation which may occur by the user in a high-permission state is prevented, and unpredictable risks which may be caused by theunconscious deletion / change configuration operation are avoided. Meanwhile, the server has a self-learning capability and can learn the common login address and the operation habit of the user, and when the user operates the high-permission service by using the IP or operates the high-permission service by using the common IP, the operation can be forbidden, and an alarm can be given out. According to the method and the device, the user experience is improved, the management risk is reduced, and the usability is improved.

Description

technical field [0001] The invention belongs to the technical field of user authority management, and in particular relates to a user account login method and device based on a role model. Background technique [0002] With the rapid development of the Internet, various application systems have been widely popularized in all walks of life, such as video surveillance systems, company internal financial systems, process management systems, and so on. In these application systems, different permissions are assigned to each user. There are super administrator users with the highest authority, ordinary administrator users who can configure, and operator users who can only view and input. [0003] The binding relationship between traditional user accounts and permissions is completely controlled by the server, and the legality of user account operations is calculated by the permissions configured on the server when creating user accounts. However, some users don't want the situat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/30
CPCG06F21/30
Inventor 张佳瑞周迪
Owner ZHEJIANG UNIVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products