Unlock instant, AI-driven research and patent intelligence for your innovation.

Access permission configuration control method and system

A technology of rights configuration and access rights, applied in the field of network management, which can solve the problems of complex rights configuration and management of enterprise personnel

Inactive Publication Date: 2020-05-22
MEITONGYUNDONG BEIJING TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of network technology, there are more and more business processing systems in enterprises. With the popularization of mobile office and enterprise cloud, people in enterprises usually need to access business processing systems in the intranet through browsers on external networks. Then obtain resource data, and different enterprise personnel have different authority configurations. For large-scale enterprises, the authority configuration management of enterprise personnel is extremely complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access permission configuration control method and system
  • Access permission configuration control method and system
  • Access permission configuration control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] Please refer to figure 1 , figure 2 , image 3 , figure 1 It is a schematic diagram of the composition and structure of an access authority configuration control system provided by an embodiment of the present invention; figure 2 It is a schematic diagram of an expanded composition structure of an access authority configuration control system provided by an embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an access permission configuration control method and system, and the system comprises a permission configuration group construction module which is used for constructing N permission configuration groups, wherein N is a positive integer; a user adding module which is used for adding users with the same permission configuration into the same permission configuration group in the N permission configuration groups; a permission configuration adding module which is used for respectively adding permission configuration to the N permission configuration groups according to the authority configuration of the user; a permission configuration distribution module which is used for distributing the permission configuration of the authority configuration groupwhere the user is located to the user side, so as to control the access permission configuration of the user. According to the invention, the grouped permission configuration management can be carried out on the users, and the users with the same permission configuration are set in the same permission configuration group, so when the users access the network application, the permission configuration can be distributed to the users, the used network access permission configuration is controlled, and the permission configuration of the enterprise personnel is effectively managed, conveniently and quickly.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network management, and in particular to a method and system for controlling configuration of access rights. Background technique [0002] With the continuous development of network technology, there are more and more business processing systems in enterprises. With the popularization of mobile office and enterprise cloud, people in enterprises usually need to access business processing systems in the intranet through browsers on external networks. Then obtain resource data, and different enterprise personnel have different authority configurations. For large-scale enterprises, the authority configuration management of enterprise personnel is extremely complicated. [0003] Therefore, how to provide a technical solution to effectively manage the authority configuration of these enterprise personnel, which is convenient and fast, is a technical problem to be solved urgently by those s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0803H04L63/10
Inventor 陈本峰冀托朱二强
Owner MEITONGYUNDONG BEIJING TECH CO LTD