Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for assigning computer software user rights

A technology of user rights and allocation methods, which is applied in the direction of program/content distribution protection, digital data authentication, instruments, etc., can solve problems such as weak security, software implementation complexity, and increased workload of software administrators, so as to reduce operational complexity The effect of improving the degree of ease of use

Active Publication Date: 2021-11-09
FENGHUO COMM SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. By configuring the corresponding relationship between roles and interface elements, assign and control permissions for interface elements; the defect of this method is that it only protects software resources from unauthorized users at the interface layer, but cannot prevent users from bypassing the page. Obtain data by directly sending server requests (for example, using tools such as postman), which has weak security
[0005] 2. Permission allocation and control for the API interface. When the user does not have the authority to operate the interface of a certain API interface, a response to insufficient authority is given; although this method meets security, it exposes the interface elements that the user does not have the right to use. Not friendly enough for users
The disadvantage of this method is that it needs to be authorized twice independently, which greatly increases the workload of the software administrator to assign permissions to the role, the ease of use is poor, and the software implementation complexity is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for assigning computer software user rights
  • Method and system for assigning computer software user rights
  • Method and system for assigning computer software user rights

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0055] The computer software user authority distribution method provided by the embodiment of the present invention includes:

[0056] (1) Construct a tree-like interface element model for the interface elements in the software according to the dependency relationship between each interface element, and each interface element is a node in the tree-like interface element model. For example refer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer software security, and discloses a computer software authority distribution method and system, which constructs a tree-like interface element model for the interface elements of the software according to the dependency relationship between each interface element, and assigns the dependent The API interface is bound to the nodes of the model; when authorizing a role, associate several nodes in the interface element model that are not the root node of the tree with the role; derive indirect permission nodes and associate them according to the direct permission nodes associated with the role to the role; the union of all direct permission nodes and indirect permission nodes associated with the role is used as the interface element permission of the role; API interface permissions are generated according to all direct permission nodes and indirect permission nodes associated with the role; when receiving the user's use The request of the software, according to the interface element permissions of the user role, only displays the interface elements that the user has the right to see; when making a request to the server, the server performs authentication according to the API interface permissions of the user role.

Description

technical field [0001] The invention belongs to the technical field of computer software security, and discloses a computer software user authority distribution method and system. Background technique [0002] Computer software, especially management software, usually requires different permissions assigned to different user roles. Permissions generally include two types: one is the visibility permissions of interface elements, for example, for different roles, you can see different operation buttons on the interface; the other is API interface access permissions, for example, different roles have the right to call The HTTP / HTTPS interface is different; the API interface here refers to the data request initiated by the client to the server. In the Web system, it refers to the HTTP(S) request initiated from the browser to the Web server; The request initiated by the background; in the mobile terminal, it refers to the request initiated from the mobile APP to the server backg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/31
CPCG06F21/12G06F21/31G06F2221/2141
Inventor 王若舟
Owner FENGHUO COMM SCI & TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More