Unlock instant, AI-driven research and patent intelligence for your innovation.

Access authority management method and device

An access authority management and access authority technology, which is applied in the field of access authority management methods and devices, can solve the problems of low flexibility of access authority management, and achieve the effect of high flexibility

Active Publication Date: 2021-07-16
BEIJING MEDICAL CROSS THE CLOUD TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides an access rights management method and device to solve the technical problem of low flexibility of access rights management in the existing RBAC technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authority management method and device
  • Access authority management method and device
  • Access authority management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] Step S711: Determine the target role of the user and the target resource to be accessed. The target role of the user is the fifth sub-role, the target resource is the fifth resource, and the fifth sub-role is determined as the current role.

[0075] Step S712: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the fifth sub-role has the access authority to the fifth resource and the sixth resource, so the current role has the authority to access the target resource.

[0076] Step S713: Confirm that the user has the right to access the target resource, so as to ensure that the user can access the target resource.

Embodiment 2

[0078] Step S721: Determine the current role of the user and the target resource to be accessed. The target role of the user is the fifth sub-role, the target resource is the first resource, and the fifth sub-role is determined as the current role.

[0079] Step S732: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the fifth sub-role only has the access right to the fifth resource and the sixth resource, so the current role does not have the right to access the target resource.

[0080] Step S723: According to the authority relationship, determine whether the current role has sub-roles. according to figure 2 It can be seen that the current role has no sub-roles.

[0081] Step S724: Confirm that the user does not have the right to access the target resource.

Embodiment 3

[0083] Step S731: Determine the current role of the user and the target resource to be accessed. The target role of the user is the second sub-role, the target resource is the fifth resource, and the second sub-role is determined as the current role.

[0084] Step S732: According to the pre-established authority relationship between the user and the resource, determine whether the current role has the authority to access the target resource. according to figure 2 It can be seen that the second sub-role only has the direct access right to the eighth resource, so the current role does not have the right to access the target resource.

[0085] Step S733: According to the authority relationship, determine whether the current role has sub-roles. according to figure 2 It can be seen that the current role has a fifth sub-role.

[0086] Step S734: Select one of the sub-roles as the current sub-role of the current character. At this point, the fifth subrole can be selected as th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of authority management, and provides an access authority management method and device, and the method comprises the steps: obtaining a target role of a user and a target resource needing to be accessed, and determining the target role as a current role; determining whether the current role has the permission to access the target resource or not according to a pre-established permission relationship between the user and the resource; if the current role does not have the permission to access the target resource, obtaining a current sub-role of the current role; judging whether the current sub-role has the authority of accessing the target resource or not; and if the current sub-role has the permission to access the target resource, confirming that the user has the permission to access the target resource. When the access permission of a certain role is modified, the access permission of the role at the upper level is correspondingly modified, the access authority of each role does not need to be modified one by one, and the flexibility is higher.

Description

technical field [0001] The invention belongs to the technical field of authority management, and in particular relates to an access authority management method and device. Background technique [0002] Currently, a common access rights management function may be implemented based on a role-based access control (Role-Based Access Control, RBAC for short) technology. In RBAC technology, permissions are assigned to roles, and roles are assigned to a user, and the user has the permissions of the meta-operations of the role. Among them, the meta-operation is the smallest authority management unit. [0003] In order to check whether the user has the permission to perform the meta-operation when the user requests to perform a certain meta-operation (such as requesting to access a certain network resource), according to the RBAC technology, the user will be assigned a role identifier, so that the user can follow up according to the user's The role identifier determines the user's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 金奇彬
Owner BEIJING MEDICAL CROSS THE CLOUD TECH CO LTD