Management system and method for user safety authority limit

A technology for security management and user permissions, applied in the direction of preventing unauthorized use of memory, etc., can solve the problems of single access control, poor scalability, and insufficient flexibility, and achieve a security and scalability guarantee. Effect

Inactive Publication Date: 2004-03-31
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF1 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This patented technology provides a method of access control to system resources, but sometimes the system requires not only a single access control, but also needs to control the corresponding operations. For example, for a project management system, it is necessary to control each project For related operation permissions, the above method seems to be powerless to manage and control from the perspective of limiting system resources, because the number o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management system and method for user safety authority limit
  • Management system and method for user safety authority limit
  • Management system and method for user safety authority limit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] As shown in FIG. 1 , it is a hardware architecture diagram of the user rights security management system of the present invention. A plurality of client computers 10 are connected via a network 11 to a distributed application server 12 ; the distributed application server 12 is connected to a database 14 via a connection 13 . Wherein, the network 11 is an electronic network, which may be Intranet, Internet or other types of networks. The connection 13 is a database connection, such as an open database connection (Open Database Connectivity, ODBC), or a Java database connection (Java Database Connectivity, JDBC). The client computer 10 provides the user with an interactive user interface, through which the user sets the user ID and password, user authority settings and sends various operation requests. The distributed application program server 12 stores a series of software program devices (as shown in the second figure), which are used for encrypting and decrypting us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The user authority safety management system and method, wherein the system comprises a plurality of client end computers, a distributed application program server and a data base, the user calls the application program device for proceeding operation definition and role definition through the user interface on the client end computer, and store the information into the database. The invention realizes the user authority control based the system operation, thus guaranteeing the expandability of the system.

Description

【Technical field】 [0001] The present invention relates to a system and method for protecting computer system security, in particular to a system and method for restricting user access and operation by setting user rights. 【Background technique】 [0002] For any kind of computer information system, the security of the system is very important. There are many methods for enhancing the security of computer information systems in the prior art, including access control lists, group control, user IDs and passwords, and the like. Each method has its advantages and disadvantages. The access control table method is to list all permissions and the permissions allowed by the user in a table, and use this as a basis to judge whether a user's access is legal. The disadvantage of this method is the lack of flexibility in maintaining user permissions. Group control is to define the permissions of each group first, and then add users to the corresponding groups according to the needs of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 李忠一叶建发姜志强
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products