Access control method and device and computer readable storage medium

An access control and access request technology, applied in special data processing applications, digital data authentication, other database retrieval, etc., can solve problems such as complex authority determination, invalid authority definition rules, unclear business resource authority boundary definition rules, etc., to achieve The effect of simplifying the authority judgment process

Pending Publication Date: 2020-06-09
CHINA UNIONPAY
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, management systems usually have the characteristics of "weak account and strong business". However, the existing data permission implementation methods have the following problems: (1) Dynamic authorization leads to complex permission determination, and business resources are usually in various roles or users. Medium dynamic flow; when it is necessary to determine the authority relationship, it is necessary to trace a large number of business scenarios, and the determination logic is complex
(2) Implicit dependencies lead to blurred authority boundaries. In management systems, sometimes there are implicit dependencies on business relationships between business resources, which in turn leads to implicit inheritance on authorization relationships, which leads to the failure of business resources. The authority boundar...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device and computer readable storage medium
  • Access control method and device and computer readable storage medium
  • Access control method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0036] In the present invention, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts or combinations thereof disclosed in the specification, and are not intended to exclude one or multiple other features, numbers, steps, acts, parts, parts or combinations thereof.

[0037] In addition, it should be noted that, in the case of no ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method, device and system and a computer readable storage medium. The method comprises the steps: receiving an access request of a user, the access request comprising user information and a target service resource; determining a resource permission tree of the user according to the user information, and constructing the resource permission tree of each userin advance according to the plurality of service resources, the authorization relationship among the plurality of users and the dependency relationship among the plurality of service resources; a complex permission judgment problem is simplified into a tree structure traversal search problem, so that the permission judgment process is greatly simplified.

Description

technical field [0001] The invention belongs to the field of authority management, and in particular relates to an access control method, device and computer-readable storage medium. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] Rights management generally involves function rights management and data rights management. Among them, functional permissions are usually implemented based on the mature RBAC (role-based access control) mechanism; while there are not many generalized technologies for data permission management, the data permission logic is generally integrated into specific business codes. [0004] At present, management systems usually have the characteristics of "weak account and strong business". However, the existing data permission implementation methods...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F16/901
CPCG06F21/31G06F16/9027
Inventor 王忠钊陈煜周继恩尹祥龙王培林邓昶袁野
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products