A method, device, terminal and storage medium for visual configuration control of rights in an information system

A technology of authority configuration and information system, which is applied in the direction of instruments, electronic digital data processing, digital data authentication, etc., can solve the problems of process redundancy, inconvenient operation, and low efficiency of authority allocation, and achieve the effect of ensuring security

Active Publication Date: 2022-05-03
安徽智恒信科技股份有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the current permission configuration that requires the technical developers of the system to modify the code adjustments in the background, resulting in low efficiency of permission configuration, redundant processes, and inconvenient operation during system operation, the present invention provides a permission visualization system in the information system. Configuration control method, device, terminal and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, terminal and storage medium for visual configuration control of rights in an information system
  • A method, device, terminal and storage medium for visual configuration control of rights in an information system
  • A method, device, terminal and storage medium for visual configuration control of rights in an information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Here is an explanation of some technical terms:

[0055] Directives: Directives are special features prefixed with v-. The responsibility of the directive is to react to the HTML element with its associated effects when the value of the expression changes.

[0056] HTML elements: HTML uses "markup" (markup, also known as tag) to annotate text, pictures, and other content for display in a web browser. HTML markup contains some special "elements" such as , , , > , , , , , , , , , , > , , , , , , , Wait.

[0057] Vuex: Vuex is a state management pattern developed specifically for Vue.js applications.

[0058] Routing: Routing (Router) is to find a program or module that can handle this URL according to the URL.

[0059] Bit operation: All the numbers in the program are stored in binary form in the computer memory; bit operation is to directly operate on the binary bits of the integer...

Embodiment 2

[0083] The difference from Embodiment 1 lies in that the representation method of the permission is stored in a binary value. Further define the identification and text description of N kinds of permissions in the data dictionary, sort the N kinds of permissions, and the attribute value of the i-th permission is 2 i ;According to the checked permission, assign a value to the permission attribute value of the corresponding role, and convert the permission attribute value into a binary expression; if the i-th value in the expression is 1, it means that the role has the i-th permission .

[0084] Specifically, for example, you need to configure N permissions, define the identifiers and text descriptions of N permissions in the data dictionary, sort the N permissions, and represent each permission in binary, for example, a role has the first to nth The value of each permission can be expressed as: 2 0 +2 1 +2 2 ...2 n , its corresponding binary representation is 111....

Embodiment 3

[0094] This embodiment provides a terminal, including a processor, an input device, an output device, and a memory, the processor, the input device, the output device, and the memory are connected in sequence, and the memory is used to store a computer program, and the computer program includes a program Instructions, the processor is configured to call the program instructions to execute the method described in Embodiment 1-2.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device, a terminal and a storage medium for visual configuration control of rights in an information system, and belongs to the technical field of computer applications. First configure the authority control and the authority configuration identification control in the information system; then build the mapping relationship between the user and the role; by responding to the operation of the authority configuration identification control, configure the authority in the role in a visual way, and form synchronously The authority data table corresponding to each user; it allows non-technical personnel to perform visual authority configuration on the page, and truly allows the demand side of the system or the actual management personnel to perform intuitive and convenient authority configuration, thereby separating technical personnel from authority management. Concentrate on the development of business functions after bitterness, which solves the problem of inconvenient permission configuration in the existing technology.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a method, device, terminal and storage medium for visual configuration and control of rights in an information system. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful data rights management mechanism in recent years, and it is considered as an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of data resources in roles, and users can indirectly access database resources by being assigned different roles . In the method of user rights management, a user can be authorized to have multiple roles, and a role can be composed of multiple users; each role can have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/30
CPCG06F21/30G06F2221/2141
Inventor 程跃斌甘松云李羊尹程程
Owner 安徽智恒信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products