Permission control method and device, storage medium and electronic equipment

A technology of permission control and permission configuration, applied in the computer field, which can solve the problems of low storage and usage efficiency, etc.

Inactive Publication Date: 2020-09-22
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In a traditional Saas system, a user is associated with multiple roles, and a role is associated with multiple permissions. When storing a user's permission content in the system, this association relationship needs to be stored in the form of relational data, and an association relationship occupies a part of the storage space. With the enrichment of the system's business content and the increase of users, a large amount of storage space is required to store this kind of relational data, and a large amount of relational data needs to be read and authenticated when invoking permissions, resulting in the system's storage of user permissions, Inefficient use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission control method and device, storage medium and electronic equipment
  • Permission control method and device, storage medium and electronic equipment
  • Permission control method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0033] This disclosure relates to binary digital algorithms. According to the commonly used data representation mode in the computer field, in this disclosure, if there is no special explanation, "valid character" can be understood as the character "1", and "invalid character" can be understood as the character "0". However, this way of understanding should not limit the present disclosure. Those skilled in the art should know that when implementing the solution of the present disclosure, the "valid character" can also be "0", and correspondingly, the "invalid character" can also be "1".

[0034] The permission control method adopted by the traditional Saas ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a permission control method and device, a storage medium and electronic equipment, and the method comprises the steps: obtaining an authority character string corresponding toa user, wherein each character position of the authority character string corresponds to one permission; and determining an effective position in the permission character string, the permission corresponding to the effective position being the permission owned by the user.

Description

technical field [0001] The present disclosure relates to the technical field of computers, and in particular, to a permission control method and device, a storage medium, and electronic equipment. Background technique [0002] Saas (Software-as-a-Service, software service) usually provides services for hundreds of different customers based on a set of standard software systems. This requires SaaS services to support the isolation of data and configurations between different tenants, so as to ensure the security and privacy of each tenant's data, as well as the user's personalized requirements for interfaces, business logic, and data structures. Among them, in order to prevent the service content between users from interfering with each other, "permissions" are used to restrict the accessible content of users, that is to say, the user's permissions determine the resources that users can access and the operations that users can perform . Therefore, the storage of permissions...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06F2221/2141
Inventor 李刚
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products