Unlock instant, AI-driven research and patent intelligence for your innovation.

User authority control method and device

A technology of user rights and control methods, applied in the server field, can solve problems such as heavy workload, reliance on manual operation, and manual error-prone

Active Publication Date: 2020-07-17
ZHENGZHOU APUS DIGITAL CLOUD INFORMATION TECH CO LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of an embodiment of this specification is to provide a user authority control method and device to solve the problem that the user authority control method in the prior art mainly relies on manual operation, and the work A large amount of manual error-prone problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority control method and device
  • User authority control method and device
  • User authority control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the following will describe the technical solutions in one or more embodiments of this specification in conjunction with the drawings in one or more embodiments of this specification The technical solution is clearly and completely described, and obviously, the described embodiments are only a part of the embodiments in this specification, rather than all the embodiments. Based on one or more embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this document.

[0024] figure 1 A schematic flow diagram of a method for controlling user rights provided by an embodiment of this specification. This method can be applied to background servers that perform rights management, such as figure 1 As shown, the process inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One embodiment of the invention provides a user permission control method and device. The method comprises the steps of firstly obtaining permission description information in a code of a target application program, and then generating a first corresponding relation table between user role information and target operation execution permission information according to executable user role information corresponding to target user operation; acquiring a pre-created second corresponding relation table between the user role information and the user identifier; and finally, after a trigger request of the target user for the target application operation is obtained, judging whether the target user can execute the corresponding operation or not according to the trigger request, the first corresponding relation table, the second corresponding relation table and execution condition information corresponding to the target user operation so as to perform permission control on the target user. By means of the embodiment, the automation degree of authority control over the user can be improved, manual operation is reduced, and the manual workload and the error rate are reduced.

Description

technical field [0001] This document relates to the technical field of servers, and in particular to a user authority control method and device. Background technique [0002] Many applications in current Internet technology rely on back-end servers to provide services remotely. In order to ensure the data security of the service and avoid information risks, the back-end servers of many applications will check and control the permissions of the users who use the applications. [0003] The flow of the user authority control method provided by the prior art is as follows: the operation and maintenance personnel of the application program manually design the user authority management scheme according to the requirements of the application program, manually enter the user authority management scheme in the authority management background, and the user authority management scheme is manually entered. Schemes are used to represent the actions that individual users can perform whil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 朱传奇李涛
Owner ZHENGZHOU APUS DIGITAL CLOUD INFORMATION TECH CO LTD