User authority management method and device, computer equipment and storage medium

A technology of user rights and management methods, applied in electrical digital data processing, instruments, digital data authentication, etc., can solve the problems of complicated operation and slow response speed, and achieve the effect of simplifying operation steps, improving efficiency, and narrowing the search range.

Active Publication Date: 2019-12-20
浙江大搜车软件技术有限公司
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the deletion of permissions, the search scope is relatively large, and when only part of the corresponding permissions of the roles need to be deleted, the operation is complicated and cumbersome, and the response speed is slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority management method and device, computer equipment and storage medium
  • User authority management method and device, computer equipment and storage medium
  • User authority management method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0057] The user rights management method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. After the server 104 receives the permission deletion request sent by the terminal 102, it obtains the user identification carried in the permission deletion request, and then obtains the preset deletion permission set corresponding to the user identification. When it is determined that the permission to be deleted belongs to the preset deletion permiss...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user permission management method and device, computer equipment and a storage medium. The method comprises the following steps: receiving an authority deletion request sentby a terminal, wherein the authority deletion request carries a user identifier and an authority to be deleted; obtaining a preset deletion permission set corresponding to the user identifier, and judging whether the permission to be deleted belongs to the preset deletion permission set or not; if yes, acquiring a corresponding role set according to the user identification, and roles in the roleset are single-permission roles corresponding to the user identification; and deleting the to-be-deleted role corresponding to the to-be-deleted permission from the role set to obtain a deleted role set, and obtaining a first target permission corresponding to the user identifier according to roles in the deleted role set. The permission to be deleted can be quickly deleted, and permission management efficiency is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a user rights management method, device, computer equipment and storage medium. Background technique [0002] At present, in order to prevent the circulation of core business processes outside the system, it is necessary to assign appropriate permissions to users of each business system in a timely manner. The existing permission configuration method uses the RBAC model (Role-Based Access Control, role-based permission access control ) for permission control. However, with the progress of the project, sometimes the user's position has not changed, but the corresponding permissions have changed. At this time, some permissions of the user in the system need to be deleted. It is necessary to first delete the permissions of the user in the permission center. Search for roles, and then delete the roles corresponding to users. When only some of the permissions correspondi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30
CPCG06F21/30G06F2221/2141
Inventor 鲍贤玮
Owner 浙江大搜车软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products