Controlling method of business operations competence and generating method of relational database

A technology of business operation and operation authority, applied in the computer field, can solve problems such as hidden dangers of system stability and workload of major system revisions, achieve the effect of enriching authority control strategies, meeting the needs of business dynamic changes, and ensuring stability

Inactive Publication Date: 2007-05-23
HUAWEI TECH CO LTD
View PDF0 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] It can be seen that although this solution can achieve data record-level authority control, using this technical solution, different business restriction logics need to be implemented independently, and the same business application points also need to be controlled by themselves
When the data permissions of the business are changed, the system code needs to be modified, causing the system to have to face a huge modification workload, unable to meet the business needs in a timely and fast manner, and at the same time bring great hidden dangers to the stability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling method of business operations competence and generating method of relational database
  • Controlling method of business operations competence and generating method of relational database
  • Controlling method of business operations competence and generating method of relational database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Fig. 1 is a schematic flow diagram of the business operation authority control method of this embodiment, as shown in the figure, this method is based on the authority in the relational database, the business operation object (corresponding function), and the subsystem, personnel and Corresponding relationship of role, carry out authority control, this method comprises the following steps:

[0049] Step 101: start.

[0050] The business system is in a waiting state, waiting for the user to input business operations.

[0051] Step 102: The user applies for executing a business operation.

[0052] The user submits a business operation application to the business system. The business operation can be the control of static objects such as menus, buttons, and interfaces, or data record-level operations such as querying, deleting, and updating business system data.

[0053] Step 103: Judging whether the business operation is a business operation with controlled authority, i...

Embodiment 2

[0100] This embodiment specifically introduces a method for generating a relational database for authority control. FIG. 3 is a schematic flow chart of a method for generating a relational database for authority control in this embodiment. As shown in the figure, the method includes the following steps:

[0101] Step 301: Define permissions.

[0102] Define the authority of the structure shown in Table 4, define the domain of semantic information in the authority, and use the semantic information as the authority control item, which becomes the inherent attribute of the authority. The semantic information includes constants, internal input objects, external input objects, logical operations and other custom information.

[0103] In order to facilitate the system to identify semantic objects, the following pre-definitions are made for each type of semantic objects:

[0104] First: For custom constant objects and internal objects, use specific prefixes (for example, "@" and "#"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the computer field, and the invention discloses a business operational authority control method, the relational database generation method. The business operational authority control method in the invention includes: identification of user business operations and business operational targets; according to the said users and the business operational target information, to determine whether the said user has operational right to the said business operational targets, and if ownership, executing the said business operations according to the semantic information of the said operational right; otherwise, refused to execute the said business operations. The invention not only implements the fine-grained right control of user's business operation, but also makes right control more flexible.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method for controlling business operation authority and a method for generating a relational database used for authority control. Background technique [0002] In order to ensure the security of the business system, rights management is usually used to control the business operations that users can perform in the business system. Through the authority control strategy, the corresponding authority configuration and authentication are performed on the operable system, and corresponding authorization is performed on different types of users. Through authentication, users can only perform authorized operations and access authorized data. [0003] At present, most business systems adopt the role-based access control (RBAC) strategy, which converges permissions through roles, that is, first assigns and manages permissions according to roles, so as to facilitate the configuration of permissio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F17/30G06F21/30
Inventor 韦思宁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products