Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authority control method, device, computer equipment and storage medium

A permission control and permission technology, applied in the field of big data, can solve the problems of weak support for complex permissions and poor scalability of hierarchical management.

Active Publication Date: 2022-03-18
太平金融科技服务(上海)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the permission control system of the current application system is basically single-layer management based on roles or even directly based on users. The scalability of layered management is poor, and the ability to support permission control of complex permissions is weak.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method, device, computer equipment and storage medium
  • Authority control method, device, computer equipment and storage medium
  • Authority control method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0064] The authority control method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. Wherein the terminal 102 sends a user login request to the server 104, and the login request carries a user ID, so that the server 104 can read the user role corresponding to the user ID, and obtain the role authority corresponding to the user role, so that the server 104 can Combine the horizontal data dimension and the vertical data dimension to obtain the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to an authority control method, device, computer equipment and storage medium. The method includes: receiving a user login request that carries a user identity; reading the user role corresponding to the user identity, and obtaining the role permissions corresponding to the user role; Merge the data dimension and the vertical data dimension to obtain the user permission list; receive the user data read request; obtain the corresponding data according to the user data read request; and perform permission control on the obtained data based on the user permission list, Output data in the corresponding range. This method can be used to achieve complex permission control.

Description

technical field [0001] The present application relates to the technical field of big data, in particular to an authority control method, device, computer equipment and storage medium. Background technique [0002] With the development of big data technology, business analysis based on big data is more and more widely used in business management and intelligent decision-making, especially in the financial field. [0003] In traditional technologies, platform access is based on a role-based access control model or an object-based access control model. For example, the role-based access control model system defines different roles according to scenarios, and each role can perform certain functions. Different users are given corresponding roles according to their job functions and responsibilities. When a user is added as a member of a role, the user can realize the functions of the role. According to the different roles, each subject object can only perform the access function...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 金婕
Owner 太平金融科技服务(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products