Authority control method and device, computer equipment and storage medium

A permission control and permission technology, applied in the field of data processing, can solve the problem of low processing efficiency

Active Publication Date: 2019-09-27
PING AN TECH (SHENZHEN) CO LTD
View PDF10 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a permission control method, device, computer equipment, and s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method and device, computer equipment and storage medium
  • Authority control method and device, computer equipment and storage medium
  • Authority control method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] The authority control method provided by this application can be applied in such as figure 1 In the shown application environment, the application environment includes a server and a client, wherein the server and the application client are connected through a network, the network may be a wired network or a wireless network, and the client specifically includes but is not limited to various A personal computer, a notebook computer, a smart phon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority control method and device, computer equipment and a storage medium. The method comprises the following steps: if an authority updating instruction is received, obtaining an address authority table, a role authority table and a to-be-updated authority data table; selecting a first corresponding relation from the address permission table, selecting a second corresponding relation from the role permission table, and performing equivalent correlation of permission types on the selected first corresponding relation and second corresponding relation in the address permission table and the role permission table to obtain a to-be-confirmed address and a corresponding to-be-confirmed role; updating the mapping relation in the authority data table according to the to-be-confirmed role and the to-be-confirmed address and the target identification information; and if the access request of the user to the target address is received, determining the access permission of the user to the target address according to the permission data table, and responding to the access request according to the access permission. According to the technical scheme, the processing efficiency of authority control is effectively improved, and meanwhile the optimization cost is reduced.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to an authority control method, device, computer equipment and storage medium. Background technique [0002] In actual network applications, in order to prevent users from bypassing the restrictions of role permissions by directly entering the access address of the function in the browser without the role permission to access a certain function, it is often set to access Address access interception. [0003] In the prior art, a role-permission relationship table is usually used to configure the correspondence between user roles and accessible addresses, and when accessing an access address is intercepted, it is judged according to the role-permission relationship table whether the user has access authority to the access address . [0004] However, since user roles and accessible addresses can be one-to-one, one-to-many, many-to-one, many-to-many and other correspon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/102
Inventor 侯丽王世汇
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products