Time-limited user temporary role management method and device

A role management and temporary technology, applied in the direction of computer security devices, electronic digital data processing, instruments, etc., to achieve the effect of highlighting substantive features, wide application prospects, and simple structure

Active Publication Date: 2020-10-02
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem of system users' demand for temporary permissions, a time-limited user temporary rol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-limited user temporary role management method and device
  • Time-limited user temporary role management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0048] Such as figure 1 As shown, the embodiment of the present invention provides a time-limited user temporary role management method, including the following steps:

[0049] Step 1: Receive the user's request for temporary permission and process it, including:

[0050] SS11: Receive the user's request for temporary permission;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a time-limited user temporary role management method and device, and the method comprises the following steps: 1, receiving and processing a request of a user for requesting temporary permission, specifically including the steps: receiving the request of the user for applying for the temporary permission, after a request of a user for applying for the temporary permission isreceived, obtaining a user ID and use time for applying for the temporary permission; 2, when the survival time of the temporary role of the user expires, deleting the expired temporary role entry from the temporary role table. According to the invention, the survival time attribute of the temporary role can realize a mechanism of automatically deleting the expired temporary role, so the automation of temporary role management is achieved. Meanwhile, after the temporary role is expired, the user does not continue to have additional temporary permission, so the system security is ensured.

Description

technical field [0001] The invention relates to the technical field of system user role and authority management, in particular to a time-limited user temporary role management method and device. Background technique [0002] Generally, the types of user roles in the system are fixed, and the user permissions corresponding to each user role are also relatively fixed. The user's role type is stored in the user table (user_table) as an attribute of the user, as the basic role of the user. In some scenarios, users may need additional permissions or combinations of permissions. [0003] The traditional solutions generally include: one is to give the user a higher-level role, which contains additional permissions required by the user, but in this way the user may obtain other additional permissions that the user does not need, which puts the system at risk; the other is to create a role for the user. A new role that contains the required additional permissions and existing perm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 李晓静
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products