Supercharge Your Innovation With Domain-Expert AI Agents!

Authority visual configuration control method and device in an information system, terminal and storage medium

A technology of configuration control and information system, which is applied in the directions of instruments, digital data authentication, electronic digital data processing, etc., and can solve problems such as process redundancy, low efficiency of authority configuration, and inconvenient operation.

Active Publication Date: 2019-11-12
安徽智恒信科技股份有限公司
View PDF13 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the current permission configuration that requires the technical developers of the system to modify the code adjustments in the background, resulting in low efficiency of permission configuration, redundant processes, and inconvenient operation during system operation, the present invention provides a permission visualization system in the information system. Configuration control method, device, terminal and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority visual configuration control method and device in an information system, terminal and storage medium
  • Authority visual configuration control method and device in an information system, terminal and storage medium
  • Authority visual configuration control method and device in an information system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Here is an explanation of some technical terms:

[0056] Directives: Directives are special features prefixed with v-. The responsibility of the directive is to react to the HTML element with its associated effects when the value of the expression changes.

[0057] HTML elements: HTML uses "markup" (markup, also known as tag) to annotate text, pictures, and other content for display in a web browser. HTML markup contains some special "elements" such as , , , > , , , , , , , , , , > , , , , , , , Wait.

[0058] Vuex: Vuex is a state management pattern developed specifically for Vue.js applications.

[0059] Routing: Routing (Router) is to find a program or module that can handle this URL according to the URL.

[0060] Bit operation: All the numbers in the program are stored in binary form in the computer memory; bit operation is to directly operate on the binary bits of the integer...

Embodiment 2

[0083] The difference from Embodiment 1 lies in that the representation method of the permission is stored in a binary value. Further define the identification and text description of N kinds of permissions in the data dictionary, sort the N kinds of permissions, and the attribute value of the i-th permission is 2 i ;According to the checked permission, assign a value to the permission attribute value of the corresponding role, and convert the permission attribute value into a binary expression; if the i-th value in the expression is 1, it means that the role has the i-th permission .

[0084] Specifically, for example, you need to configure N permissions, define the identifiers and text descriptions of N permissions in the data dictionary, sort the N permissions, and represent each permission in binary, for example, a role has the first to nth The value of each permission can be expressed as: 2 0 +2 1 +2 2 ...2 n , its corresponding binary representation is 111....

Embodiment 3

[0094] Such as Figure 3-5 As shown, on the basis of Embodiment 1, this embodiment further provides a method for displaying an authority configuration interface, and the steps of the method include:

[0095] S202: Receive current user login information;

[0096] Specifically, the user here refers to a user who has permission to assign permissions, and is generally a super administrator of the system.

[0097] S204: Display the permission control in the first area 1000 of the software interface;

[0098] Such as Figure 5 , when the super administrator of the system logs in, all authority controls are displayed in the first area 1000 of the software interface, and the authority controls include a third control and a fourth control;

[0099] Further, the first area 1000 of the software interface includes a third area and a fourth area, and a third control is displayed in the third area 3000; the third control includes a routing menu, such as "system management",...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authority visual configuration control method and device in an information system, a terminal and a storage medium, and belongs to the technical field of computer application. The method includes: firstly, configuring an authority control and an authority configuration identification control in an information system; then constructing a mapping relationship between the user and the role; in response to an operation on an authority configuration identification control, configuring an authority to a role in a visual manner, and synchronously forming an authority data table corresponding to each user. Non-technical personnel can perform visual permission configuration on the page, and a demand side or an actual manager of the system can perform visual and convenientpermission configuration, so that the technical personnel can be separated from the bitter sea of permission management and concentrate on the development of service functions, and the problem of inconvenience in permission configuration in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a method, device, terminal and storage medium for visual configuration and control of rights in an information system. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful data rights management mechanism in recent years, and it is considered as an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of data resources in roles, and users can indirectly access database resources by being assigned different roles . In the method of user rights management, a user can be authorized to have multiple roles, and a role can be composed of multiple users; each role can have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30
CPCG06F21/30G06F2221/2141
Inventor 程跃斌甘松云李羊尹程程
Owner 安徽智恒信科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More