Unlock instant, AI-driven research and patent intelligence for your innovation.

System permission design method based on modularization

A technology of system permissions and design methods, applied in software design, software engineering design, calculation, etc., can solve problems affecting the normal use of other functional modules, and achieve the effect of flexible deployment

Pending Publication Date: 2021-04-13
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most enterprise business systems on the market are controlled through traditional permission design. In general, new modules will be embedded in the overall system project framework. When adding business modules, R&D personnel often need to go online for the entire system. The online process It will inevitably affect the normal use of other functional modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System permission design method based on modularization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] In the modularized system authority design method of the present invention, modules are set in the system, and different authority signs are customized in the set modules to set the authority control of corresponding modules, and each module references the corresponding authority signs to realize authority control . During the development process of each module, reference to the corresponding permission identifier can facilitate the realization of permission control.

[0026] Based on module classification and module identification, the function module menu is launched, and the system can be expanded without re-release of code. Function-level authority control of the menu is realized by configuring the menu authority. Modules are groupings of menus, and module management is to manage menu directories and menu permissions. The menu directory includes a first-level menu and a second-level menu. The module management can operate the "menu", and the menu can set the URL ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system permission design method based on modularization, and belongs to the technical field of system permission design. According to the modularization-based system permission design method, the modules are set in the system, different permission identifiers are customized in the set modules to set permission control of the corresponding modules, and the modules quote the corresponding permission identifiers to realize permission control. According to the system permission design method based on modularization, online deployment of an overall framework is not needed, flexible expansion can be achieved through background configuration, good usability and preciseness are achieved, and good application and popularization value is achieved.

Description

technical field [0001] The invention relates to the technical field of system authority design, and specifically provides a system authority design method based on modularization. Background technique [0002] Generally speaking, the business processing supported by the enterprise business system and the large amount of data to be processed are important resources of the enterprise, and we should give them special protection. In order to prevent illegal users from using the system and legal users from illegally accessing the system, it is necessary to take certain protective measures for the enterprise application system. Reasonable user rights management is an effective means, which can greatly reduce the security risk of the application system. [0003] System rights management generally means that according to the security rules or security policies set by the system, users can access and only access the resources they are authorized to, no more, no less. Rights manageme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/20G06F8/38G06F21/62G06F16/955
CPCG06F8/20G06F8/38G06F21/6218G06F16/9566
Inventor 肖峰
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD