Permission configuration method and equipment

A permission configuration and permission technology, applied in the computer field, can solve the problems of lack of testing standards and difficult manual maintenance by testers, and achieve the effect of simplifying the product development and release process.

Pending Publication Date: 2022-01-14
上海云轴信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing permission configuration schemes only control all permissions in the code. For example, if Zhang San has xxx permissions, he can see the xxx page. This method can still be practiced in small-scale software, but when the code expands to When there are more than on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission configuration method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0044] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0045] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0046] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static rando...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a permission configuration method and equipment. The method comprises: distinguishing views of page controlled elements of default user interfaces of different user identities of a user in a visual mode; if a certain page controlled element is in a set of permissible page controlled elements of a certain user, displaying the page controlled element when the user interface of the user is rendered; and if a certain page controlled element is in the set of the permissible page controlled elements of a certain user, intercepting the page controlled element when the user interface of the user is rendered, namely, not displaying the page controlled element. According to the method, the configuration policy and the software codes are decoupled in a visual mode, a development tester or a product manager can edit the set of the permissible page controlled elements under the user interface corresponding to each user identity of the preset user of the system online before and after sales, the set can take effect without repackaging after modification, and the product development and release process is greatly simplified.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for configuring rights. Background technique [0002] The cloud computing software provides multiple versions such as community version, stand-alone trial version, and enterprise version, and supports access by Admin and ordinary users. The project management in the enterprise version supports the creation of projects, and has various preset roles such as project leader and project user. Under each permission system, the pages that users can access are different. These differences are not only reflected in the pages, but also in buttons, table columns, display fields, charts, etc. [0003] Existing permission configuration schemes only control all permissions in the code. For example, if Zhang San has xxx permissions, he can see the xxx page. This method can still be practiced in small-scale software, but when the code expands to When there are more than one million ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/36
CPCG06F21/629G06F21/36G06F2221/2141
Inventor 张矗钱朝坤段愚
Owner 上海云轴信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products