Authority management method and device based on distributed authority set and storage medium
A technology of authority management and authority set, applied in data processing applications, electronic digital data processing, instruments, etc., can solve problems such as cumbersome operations, complicated authority management, hidden safety hazards, etc., and achieve the effect of overcoming complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] like figure 1 A method for rights management based on a distributed permission set is shown, and the method includes:
[0023] Step 1, take users, roles, objects and actions as the management elements of user rights, and store them on different nodes on the distributed network respectively. The nodes are correspondingly user nodes, role nodes, object nodes and action nodes, and roles are predefined - The relationship between permissions, assigning predefined roles to users;
[0024] Step 2, setting up user nodes, which redundantly store user information, wherein the user information includes user IDs and corresponding node data, and the user is obtained according to the node address in the node data when performing authority verification have the authority;
[0025] Step 3: Set role nodes, divide roles and set role relationships at different levels, divide role sets into compatible role sets and exclusive role sets, and assign role identities to users;
[0026] Step ...
Embodiment 2
[0036]This embodiment further provides that each information system is independent of each other and is indispensable for the completion of a transaction. How to efficiently and controllably manage the authority of each information system is the first problem encountered. The current practice is usually to use the independent authority management function of each information system to manage authority. For example, the change of authority a can only be operated in the authority management function inside system A, and the change of authority b can only be performed in system B. To operate the rights management function, when a person needs to apply for rights a and b, the rights management personnel can only go to systems A and B to operate in turn. As the number of information systems used increases, the rights management between multiple systems will become more and more complicated.
[0037] Based on this, this proposal provides a permission allocation system, which include...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
