Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission processing method and device and permission control method and device

A processing method and permission control technology, applied in the field of data processing, can solve problems such as cumbersome configuration process, error-prone, and high system intrusion

Inactive Publication Date: 2019-11-15
KOUBEI SHANGHAI INFORMATION TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the many concepts involved in the Apache Shiro framework and the cumbersome configuration process, the cost of use is very high
3. Adopt the Spring Security security framework, which is based on Spring AOP and Servlet filters, which is highly intrusive to the system, and the configuration process is generally defined in the form of strings, which is prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission processing method and device and permission control method and device
  • Permission processing method and device and permission control method and device
  • Permission processing method and device and permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0099] The present application provides a permission processing method, device and electronic equipment. The present application also relates to a permission control method, device and electronic equipment. The present application also relates to another permission processing method, device and electronic equipment. Each will be described in detail in the following examples.

[0100] For ease of understanding, the system environment of the service subscription system deploying the authorization processing method is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authority processing method. The method comprises the steps of selecting target role information for a target user; establishing a target user role corresponding relationship between the target user and the target role information; obtaining a role function corresponding relationship between role information and function point information, with the role information beingused for representing classification information of users having the same permission, and the function point information being used for representing permission of using a service function; and according to the role corresponding relationship of the target user and the role function corresponding relationship, obtaining the permission of the target user to use the service function. By adopting themethod, authority control with finer authority granularity is provided.

Description

technical field [0001] The present application relates to the technical field of data processing, and specifically relates to a method and device for processing rights. The present application also relates to a permission control method and device. Background technique [0002] With the development of Internet technology, service subscription via the Internet is becoming more and more common. The server system that provides services in the form of service subscription is a service subscription system, which is generally constructed using the JAVA language. A service subscription system often involves multiple users. For example, a service subscription system involves a subscriber who subscribes to a service, a service provider who provides a service, a delivery party, an administrator who manages the system, and an operator who maintains the system. Therefore, how to ensure that each type of user in the JAVA construction system can normally use various functions in the sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/958G06F21/31
CPCG06F21/31G06F16/958
Inventor 李爽
Owner KOUBEI SHANGHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products