Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority management method and device based on distributed authority set and storage medium

A technology of authority management and authority set, applied in data processing applications, electronic digital data processing, instruments, etc., can solve problems such as cumbersome operations, complicated authority management, hidden safety hazards, etc., and achieve the effect of overcoming complexity

Inactive Publication Date: 2020-06-19
GUANGDONG KAMFU TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the increase in the number of information systems used, the authority management between multiple systems will become more and more complicated
[0004] The current situation exposes the following problems that need to be solved urgently: 1) Efficiency. Operations such as permission activation, modification, and deletion are all manual single-point operations. When multi-information systems operate with multiple permissions, they need to use the respective permission management of different information systems Function, cumbersome operation, and low labor efficiency; 2) Uniformity, the permissions of multiple information systems in an enterprise are usually managed by multiple departments, and the management is fragmented, and employees need to apply to multiple parties when changing multiple permissions; 3) Rationality , due to the cooperation of multiple information systems, the completion of a certain transaction requires multiple permissions of multiple information systems, but the relationship between each permission is not clear, and it usually occurs in actual work that the operation cannot be performed due to insufficient permissions and needs to be interrupted Or suspend to re-apply for permissions; 4) Security, it is impossible to easily obtain all the permissions of an employee in the enterprise, and due to the complexity of permission management, there may be security holes in management, and some personnel may be given inappropriate sensitive permissions , resulting in a safety hazard
The above problems directly lead to the confusion and even loss of control of the authority management of various information systems, which in turn leads to low efficiency and risks in the use of information systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority management method and device based on distributed authority set and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] like figure 1 A method for rights management based on a distributed permission set is shown, and the method includes:

[0023] Step 1, take users, roles, objects and actions as the management elements of user rights, and store them on different nodes on the distributed network respectively. The nodes are correspondingly user nodes, role nodes, object nodes and action nodes, and roles are predefined - The relationship between permissions, assigning predefined roles to users;

[0024] Step 2, setting up user nodes, which redundantly store user information, wherein the user information includes user IDs and corresponding node data, and the user is obtained according to the node address in the node data when performing authority verification have the authority;

[0025] Step 3: Set role nodes, divide roles and set role relationships at different levels, divide role sets into compatible role sets and exclusive role sets, and assign role identities to users;

[0026] Step ...

Embodiment 2

[0036]This embodiment further provides that each information system is independent of each other and is indispensable for the completion of a transaction. How to efficiently and controllably manage the authority of each information system is the first problem encountered. The current practice is usually to use the independent authority management function of each information system to manage authority. For example, the change of authority a can only be operated in the authority management function inside system A, and the change of authority b can only be performed in system B. To operate the rights management function, when a person needs to apply for rights a and b, the rights management personnel can only go to systems A and B to operate in turn. As the number of information systems used increases, the rights management between multiple systems will become more and more complicated.

[0037] Based on this, this proposal provides a permission allocation system, which include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission management method based on a distributed permission set. A user, a role, an object and an action are used as management elements of user permission and are respectively stored on different nodes on a distributed network, the nodes are correspondingly user nodes, role nodes, object nodes and action nodes, a role-permission relationship is predefined, and the predefined role is given to the user; when the user needs to carry out authority identification; the method comprises the following steps: acquiring user information of a user from user nodes, acquiringnode addresses of other nodes from the user information, the node addresses comprising role nodes, action nodes and object nodes, and acquiring roles, actions and objects corresponding to the user, the actions only corresponding to the roles, and the objects only corresponding to the actions. The authority of the user is separated, and the problem that in the prior art, centralized authority management is disordered and even out of control, and consequently the use efficiency of an information system is low is solved.

Description

technical field [0001] The present invention relates to the field of authority management, in particular to a method, device and storage medium for authority management based on distributed authority sets. Background technique [0002] With the development of human society and economy and the continuous progress of science and technology, Internet + information technology has achieved unprecedented development. In life and work, the use of various information systems provides convenience and efficiency and other benefits. The efficient operation of the information system is inseparable from the good and reasonable management of the information system use rights. In fact, there are various use roles in an information system, and each role may have different use requirements. For the sake of efficiency and security and other factors, it is necessary to design different usage rights, but in fact, each existing information system will have its own rights management function, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/62G06Q10/10
CPCG06F21/32G06F21/6218G06F2221/2141G06Q10/103
Inventor 马俊涛任香
Owner GUANGDONG KAMFU TECH CO LTD