Permission processing method and device and permission control method and device

A processing method and permission control technology, applied in the field of data processing, can solve problems such as cumbersome configuration process, error-prone, and high system intrusion

Inactive Publication Date: 2019-11-15
KOUBEI SHANGHAI INFORMATION TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the many concepts involved in the Apache Shiro framework and the cumbersome configuration process, the cost of use is very high
3. Adopt the Spring Security security framework, whic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission processing method and device and permission control method and device
  • Permission processing method and device and permission control method and device
  • Permission processing method and device and permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0098] In the following description, many specific details are explained in order to fully understand this application. However, this application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotion without violating the connotation of this application. Therefore, this application is not limited by the specific implementation disclosed below.

[0099] This application provides a permission processing method, device and electronic equipment. This application also relates to a permission control method, device and electronic equipment. This application also relates to another permission processing method, device and electronic equipment. Detailed descriptions are given in the following embodiments one by one.

[0100] For ease of understanding, first, the system environment of the service subscription system for deploying the permission processing method is given. The dish subscription system or the take...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority processing method. The method comprises the steps of selecting target role information for a target user; establishing a target user role corresponding relationship between the target user and the target role information; obtaining a role function corresponding relationship between role information and function point information, with the role information beingused for representing classification information of users having the same permission, and the function point information being used for representing permission of using a service function; and according to the role corresponding relationship of the target user and the role function corresponding relationship, obtaining the permission of the target user to use the service function. By adopting themethod, authority control with finer authority granularity is provided.

Description

technical field [0001] The present application relates to the technical field of data processing, and specifically relates to a method and device for processing rights. The present application also relates to a permission control method and device. Background technique [0002] With the development of Internet technology, service subscription via the Internet is becoming more and more common. The server system that provides services in the form of service subscription is a service subscription system, which is generally constructed using the JAVA language. A service subscription system often involves multiple users. For example, a service subscription system involves a subscriber who subscribes to a service, a service provider who provides a service, a delivery party, an administrator who manages the system, and an operator who maintains the system. Therefore, how to ensure that each type of user in the JAVA construction system can normally use various functions in the sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/958G06F21/31
CPCG06F21/31G06F16/958
Inventor 李爽
Owner KOUBEI SHANGHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products