Unlock instant, AI-driven research and patent intelligence for your innovation.

A permission control method based on b/s architecture

A technology of permission control and S-architecture, which is applied in program/content distribution protection, instruments, electronic digital data processing, etc., can solve the problems of increasing development and maintenance costs, affecting the normal operation of other modules, and too simple permission control. Improve development efficiency, easy maintenance and expansion, and protect security

Active Publication Date: 2021-06-25
BEIJING CHANGYANG TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The front-end page is rendered by the back-end and parsed by the browser. The front-end and back-end coupling is serious, and the cost of development and maintenance in the later stage of project iteration is greatly increased;
[0005] The back-end modules are mixed, and the coupling between the modules is serious. The change of one module will affect the normal operation of other modules.
[0006] The authority control is too concise, the authority is only divided into menus and functions, and it is impossible to achieve a more detailed authority division

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission control method based on b/s architecture
  • A permission control method based on b/s architecture
  • A permission control method based on b/s architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings. It should be understood that these descriptions are exemplary only and are not intended to limit the scope of the invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.

[0031] Obviously, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0032] In addition, the technical features involved in the different embodiments of the present invention described below can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a permission control method based on B / S architecture, including spring-based custom permission verification, including login permission verification and page permission verification; for current user permission verification, according to different user permission levels, Obtain different data; establish an architecture that decouples the browser side and the server side; implement AOP aspects based on spring custom annotations; modularize the project according to its function, and separate and decouple the functional modules of the project. It is easy to maintain and expand in the later stage, effectively protects the security of information, completely decouples the front-end and back-end, front-end personnel focus on page rendering, and back-end personnel focus on business processing, speeding up the overall response speed, quickly locating problems, and reducing back-end servers Concurrency and load pressure, improve development efficiency, etc.

Description

technical field [0001] The present invention relates to the technical field of B / S architecture, and in particular to an authority control method based on B / S architecture Background technique [0002] With the continuous development of science and technology, B / S architecture has gradually replaced C / S architecture as the mainstream model of software architecture. Management systems in various industries have begun to use B / S-based software architecture models for development. However, B / S architecture However, because of its high coupling, with the continuous growth of the project iteration cycle, the cost of development and maintenance is becoming more and more expensive, so a reasonable B / S architecture-based permission allocation management has become a B / S architecture software project. 's top priority. [0003] Disadvantages of the existing JAVA B / S architecture mode authority management: [0004] The front-end page is rendered by the back-end and parsed by the brow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/12G06F2221/2145
Inventor 夏文昊邢红瑞汪义舟
Owner BEIJING CHANGYANG TECH CO LTD