Method and device for data access permission control, computer equipment and storage medium

A technology of data access and access rights, applied in the computer field, can solve problems such as poor flexibility, achieve the effects of improving completeness, saving data processing resources, and improving the flexibility of rights management

Active Publication Date: 2020-05-22
WEIKUN (SHANGHAI) TECH SERVICE CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach is less flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for data access permission control, computer equipment and storage medium
  • Method and device for data access permission control, computer equipment and storage medium
  • Method and device for data access permission control, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0021] The data access method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the first terminal 110 communicates with the first server 120 through the network; the first terminal 110 communicates with the second server 130 through the network; the second terminal 140 communicates with the first server 120 through the network; the second terminal 140 communicates with the second The two servers 130 communicate through the network. Wherein, different service applications are running on the first terminal 110 ....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for data access permission control, computer equipment and a storage medium. The method comprises the following steps: monitoring a data access instruction triggered based on a service application, wherein the data access instruction carries a user identifier and a data identifier of data to be accessed; determining a role of a target user corresponding to the user identifier in a service application; determining an organization node corresponding to the target user in a preset organization structure tree when determining that the target user hasthe operation authority for the service application according to the role; taking the organization node corresponding to the target user as the organization node of the current level to traverse whether each organization node in the organization structure tree has the access permission to the target data corresponding to the data identifier or not until the organization node of the lowest level isreached; and when one or more low-level organization nodes directly or indirectly connected with the current-level organization node have the access permission to the target data, displaying the target data. By adopting the method, the authority management flexibility can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data access authority control method, device, computer equipment and storage medium. Background technique [0002] With the continuous development of computer technology, various applications continue to emerge. Users can install various types of applications, such as personal applications or enterprise applications, on computer devices according to their own needs. In order to improve system security, it is necessary to control the user's access behavior and data operation in the application. Traditional access control is mainly based on roles: security managers define various roles according to needs, and set appropriate access rights, and users are assigned to different roles according to their responsibilities and seniority, and complete user rights by assigning and canceling roles. grant and revoke. However, this approach is less flexible. Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/45G06F16/901
CPCG06F21/33G06F21/45G06F16/9027
Inventor 林常春
Owner WEIKUN (SHANGHAI) TECH SERVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products