Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System construction method and device, retrieval method and device, medium and equipment

A construction method and permission technology, applied in the computer field, can solve the problems of cumbersome implementation, complex configuration, heavy Spring Security framework, etc.

Active Publication Date: 2020-09-25
南京医基云医疗数据研究院有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the Spring Security framework provided by related technologies is too heavy. If the flexible configuration of external persistence of permission configuration is to be realized, the corresponding implementation is very cumbersome and the configuration is relatively complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System construction method and device, retrieval method and device, medium and equipment
  • System construction method and device, retrieval method and device, medium and equipment
  • System construction method and device, retrieval method and device, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art.

[0065] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details, or other methods, components, means, steps, etc. may be employed. In other instances, well-known methods, ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a construction method and device of a permission access control system, a retrieval method and device of permission access, a computer readable medium and electronic equipment,and relates to the technical field of computers. The construction method of the authority access control system comprises the following steps: acquiring an authority point list, and splitting resourceaddress information of a target authority point into a plurality of components to obtain a component set corresponding to the target authority point; taking the components in the component set as nodes to establish a prefix tree; and obtaining a role list, and adding the target role to the target node of the prefix tree according to the permission identifier of the target role to obtain the permission access control system. According to the technical scheme, flexible configuration of permission points or roles is facilitated, and the expandability is improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, in particular, to a method and device for constructing a rights access control system, a method and device for retrieving rights access, a computer-readable medium and electronic equipment. Background technique [0002] Permission access control generally means that according to the security rules or security policies set by the system, users can access and only access the resources they are authorized to. For example, after setting permissions for an API, only authorized users can have access to the above-mentioned API. Specifically, for role-based access control (Role-Based Access Control, RBAC for short), the Java language implementation scheme includes Spring Security, which can be easily integrated with the more popular web application framework Spring. For example, Spring Security can provide a security framework for declarative security access control solutions for Spring-based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F16/955
CPCG06F16/955G06F21/604G06F2221/2141
Inventor 王磊王晓川张荣
Owner 南京医基云医疗数据研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products