Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority management method of security component in security resource pool and related component

A security component and rights management technology, applied in the field of computer networks, can solve problems such as complicated and cumbersome access processes and poor user experience, and achieve the effect of improving user experience and efficiency

Pending Publication Date: 2021-02-09
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, when users access security components based on different roles, users need to log in to the security resource pool with the role of tenant administrator, and then create sub-users and authorize different roles for sub-users. The access process is complicated and cumbersome, and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority management method of security component in security resource pool and related component
  • Authority management method of security component in security resource pool and related component
  • Authority management method of security component in security resource pool and related component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0039] In the permission management method of security components in the security resource pool in the related art, the process of accessing security components (security products) based on different user roles is too cumbersome, and users cannot directly log in to use security products. When creating a user, specify its role information in the securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authority management method for a security component in a security resource pool. The authority management method comprises the steps of judging whether login information ofa specific user is detected or not; if the login information of the specific user is detected, obtaining a role request corresponding to a security component of the target user in a security resourcepool in a user management interface of the specific user; and according to the role request, setting a resource authority corresponding to a role in the role request in a user management interface, and storing the resource permission. According to the method, the corresponding resource authority can be directly set in the user management interface of the specific user according to the role request of the target user without executing the operation of creating the sub-user and authorizing different roles of the sub-user, so that the efficiency of accessing the security component is improved, and the user experience is improved. The invention also provides an authority management device for the security component in the security resource pool, electronic equipment and a storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of computer networks, and in particular to a rights management method, device, electronic equipment and storage medium for security components in a security resource pool. Background technique [0002] The security resource pool is a collection of resources that provide security services in the cloud computing platform. It is downwardly compatible with different cloud platforms and upwardly compatible with different security components. The four aspects of cloud services provide users with comprehensive solutions covering the entire life cycle of cloud security. The security component refers to network security software, which can be activated, used and expanded in the system of the security resource pool. They can provide emerging technologies and concepts such as parallel processing, grid computing, and judgment of unknown virus behavior. Through the abnormal monitoring of software behavior in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06F16/25
CPCG06F21/31G06F21/45G06F16/252
Inventor 温兴磊范渊郑赳
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD