Data permission configuration method and device, electronic device and storage medium

A technology of data permissions and configuration methods, applied in the computer field, can solve problems such as system, poor user experience, long development cycle, etc., to achieve the effect of flexible configuration and cost avoidance

Inactive Publication Date: 2020-01-17
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the traditional method of improving the flexible configuration of data permissions is to use hard-coding to meet the individual needs of different data access, but the hard-cod

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data permission configuration method and device, electronic device and storage medium
  • Data permission configuration method and device, electronic device and storage medium
  • Data permission configuration method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] In order to make the objectives, technical solutions, and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present disclosure.

[0026] reference figure 1 , figure 1 This is a schematic diagram of the architecture of the data permission configuration system provided by the embodiments of the present disclosure. Such as figure 1 As shown, the data authority configuration system provided by the embodiment of the present disclosure includes a user termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data permission configuration method and a device, electronic equipment and a storage medium. The method comprises the steps of extracting at least one feature field from target category data; generating field rule attribute information corresponding to the target category data according to the at least one feature field; and sending the field rule attribute information to the to-be-authorized user terminal, thereby enabling the to-be-authorized user terminal to configure data permission information according to the field rule attribute information. The field rule attribute information is obtained according to the feature fields in the data, and then the field rule attribute information is sent to the to-be-authorized user terminal to complete permission configuration, so that the flexible configuration of the permission of the user terminal to access the data is realized, and the problems of high hard coding cost, long period, vulnerability and poor user experience are avoided.

Description

technical field [0001] Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a data permission configuration method, device, electronic device, and storage medium. Background technique [0002] In enterprise information systems, setting permissions on data has always been a very important link. Specific users access specific data through permission settings, and query or edit the obtained data. At present, the setting of data permissions is usually user-centered, and the starting point of authorization is the user. The general processing method is to let the administrator set up a role, and then configure users into the role to achieve the purpose of configuring specific data permissions for specific users. However, usually a user may need to access multiple data, especially for a certain type of data, which requires flexible configuration of the user's data permissions. [0003] At present, the traditional method of improv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45G06F21/62
CPCG06F21/45G06F21/62
Inventor 郑海波
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products