Authority visual configuration control method and device in an information system, terminal and storage medium
A technology of configuration control and information system, which is applied in the directions of instruments, digital data authentication, electronic digital data processing, etc., and can solve problems such as process redundancy, low efficiency of authority configuration, and inconvenient operation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] Here is an explanation of some technical terms:
[0056] Directives: Directives are special features prefixed with v-. The responsibility of the directive is to react to the HTML element with its associated effects when the value of the expression changes.
[0057] HTML elements: HTML uses "markup" (markup, also known as tag) to annotate text, pictures, and other content for display in a web browser. HTML markup contains some special "elements" such as , , , > , , , , , , , , , , > , , , , , , , Wait.
[0058] Vuex: Vuex is a state management pattern developed specifically for Vue.js applications.
[0059] Routing: Routing (Router) is to find a program or module that can handle this URL according to the URL.
[0060] Bit operation: All the numbers in the program are stored in binary form in the computer memory; bit operation is to directly operate on the binary bits of the integer...
Embodiment 2
[0083] The difference from Embodiment 1 lies in that the representation method of the permission is stored in a binary value. Further define the identification and text description of N kinds of permissions in the data dictionary, sort the N kinds of permissions, and the attribute value of the i-th permission is 2 i ;According to the checked permission, assign a value to the permission attribute value of the corresponding role, and convert the permission attribute value into a binary expression; if the i-th value in the expression is 1, it means that the role has the i-th permission .
[0084] Specifically, for example, you need to configure N permissions, define the identifiers and text descriptions of N permissions in the data dictionary, sort the N permissions, and represent each permission in binary, for example, a role has the first to nth The value of each permission can be expressed as: 2 0 +2 1 +2 2 ...2 n , its corresponding binary representation is 111....
Embodiment 3
[0094] Such as Figure 3-5 As shown, on the basis of Embodiment 1, this embodiment further provides a method for displaying an authority configuration interface, and the steps of the method include:
[0095] S202: Receive current user login information;
[0096] Specifically, the user here refers to a user who has permission to assign permissions, and is generally a super administrator of the system.
[0097] S204: Display the permission control in the first area 1000 of the software interface;
[0098] Such as Figure 5 , when the super administrator of the system logs in, all authority controls are displayed in the first area 1000 of the software interface, and the authority controls include a third control and a fourth control;
[0099] Further, the first area 1000 of the software interface includes a third area and a fourth area, and a third control is displayed in the third area 3000; the third control includes a routing menu, such as "system management",...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com