User permission setting method and system convenient for permission change

A technology of user permissions and permissions, applied in the field of computer networks, can solve the problems of cumbersome operations for changing user permissions, achieve friendly user experience, avoid cumbersome configuration, and ensure system information security

Pending Publication Date: 2022-04-08
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a user authority setting method and system that facilitate authority change, to solve the problem of cumbersome operations in the process of changing user authority in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission setting method and system convenient for permission change
  • User permission setting method and system convenient for permission change
  • User permission setting method and system convenient for permission change

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art. Additionally, in some instances, well-known methods and techniques have not been shown in detail in order not to obscure the understanding of this description.

[0035] The embodiment of the present invention proposes a user authority setting method that facilitates authority change, generates a sub-password based on the original password, and associates the sub-password with the system authority, and then realizes the free combination of the corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user permission setting method and system convenient for permission change. The user permission setting method convenient for permission change comprises the following steps: constructing a plurality of sub-passwords by adopting a permutation and combination algorithm based on characters in an original password corresponding to a user name, and associating at least one permission for each sub-password; obtaining a current user login password and a current user name, and obtaining a plurality of sub-passwords corresponding to the current user name based on the current user name; and matching the current user login password with a plurality of sub-passwords corresponding to the current user name to determine the authority owned by the current user login password. By the adoption of the method and device, when the user needs to conduct permission switching, the user only needs to reselect the sub-password combination to construct the user login password for login, free switching can be achieved, tedious configuration during permission adjustment every time is avoided, and more convenient and friendly user experience can be brought to the system while system information safety is guaranteed.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method and system for setting user authority which is convenient for authority change. Background technique [0002] With the rapid development of Internet technology, for the sake of system security and convenient management, authority management is an indispensable function of every WEB application. At present, the most popular authority design model is RBAC model, role-based access control, its basic idea Yes, various permissions for system operations are not directly granted to specific users, but a role set is established between the user set and the permission set. Each role corresponds to a corresponding set of permissions. Once a user is assigned an appropriate role, the user has all the operational permissions of the role. The advantage of this is that it is not necessary to assign permissions every time a user is created, as long as the user is assigned th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/31
Inventor 赵云飞姚竞聪
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products