Supercharge Your Innovation With Domain-Expert AI Agents!

Permission control method and device based on role and cloud function, equipment and medium

A technology of authority control and role, which is applied in the computer field, can solve problems such as limitations of authority control methods, and achieve the effect of flexible authority control methods

Pending Publication Date: 2020-12-18
SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides an authority control method, device and medium based on roles and cloud functions, which are used to solve the limitation of the existing ERP system authority control method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission control method and device based on role and cloud function, equipment and medium
  • Permission control method and device based on role and cloud function, equipment and medium
  • Permission control method and device based on role and cloud function, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The relevant permissions of the enterprise resource planning system (ERP, Enterprise Resource Planning) are managed together with the launch of the project. Therefore, after the ERP system is launched, the control of the relevant permissions of the ERP system should be strictly formulated to ensure the security of relevant data access and Safe to operate. At the same time, different roles can be set for different corporate positions.

[0055] There are generally three types of access control methods in an enterprise environment:

[0056] 1. Autonomous access control is a control strategy that limits permissions on the basis of confirming the identity of the subject and the group to which it belongs.

[0057] 2. Mandatory authority control means that the system forces the subject to obey the authority control policy formulated in advance.

[0058] 3. Role-based authority control, mainly by dividing users into roles consistent with their organizations, to reduce the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a role and cloud function-based permission control method and device, equipment and a medium, and the method comprises the steps: receiving a performance function transmitted by a user, analyzing the performance function through the cloud function, and determining a function permission needing to be triggered; querying a role set containing the function permission; verifying whether the organization of the user has the roles in the role set or not; and if it is verified that the organization of the user has the roles in the role set, executing the performance function.According to the embodiment of the invention, the purpose of triggering all function authorities can be achieved through the cloud function, and the authority control method can be more flexible in combination with roles.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a role-based and cloud function-based authority control method, device and medium. Background technique [0002] The relevant permissions of the enterprise resource planning system (ERP, Enterprise Resource Planning) are managed together with the launch of the project. Therefore, after the ERP system is launched, the control of the relevant permissions of the ERP system should be strictly formulated to ensure the security of relevant data access and Safe to operate. [0003] Existing ERP systems cannot directly obtain all permissions in the system, and are limited to the simplest addition, deletion, modification, and query permissions when controlling user permissions. Therefore, the existing ERP system permission control methods have limitations. Contents of the invention [0004] In view of this, the embodiments of the present application provide a role-based and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/10G06F21/31G06F21/45
CPCG06F21/31G06F21/45G06Q10/103
Inventor 施福元
Owner SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More