CN107679422A - Role-security management method, terminal device and storage medium based on various dimensions - Google Patents
Role-security management method, terminal device and storage medium based on various dimensions Download PDFInfo
- Publication number
- CN107679422A CN107679422A CN201711007329.0A CN201711007329A CN107679422A CN 107679422 A CN107679422 A CN 107679422A CN 201711007329 A CN201711007329 A CN 201711007329A CN 107679422 A CN107679422 A CN 107679422A
- Authority
- CN
- China
- Prior art keywords
- authority
- role
- mark
- user
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of role-security management method based on various dimensions, comprises the following steps, S1:Database is established, into S2 steps;S2:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operating function authority list, range of management authority list, data area authority list and data level of confidentiality authority list, role corresponding to each user is revested, and corresponding relation is stored in role's table, into S3 steps;S3:User logs in, and according to corresponding extent of competence in corresponding role's acquisition operating function authority list, range of management authority list, data area authority list and data level of confidentiality authority list in role's table.The present invention is by having carried out the management of various dimensions to role-security, inherently solve the application management in different business post and the different rights requirement of data, also the System right management work of enterprise application system administrative staff is very easy to, improves Information Security requirement of the user to system.
Description
Technical field
The present invention relates to System right management technical field, specifically a kind of role-security manager based on various dimensions
Method, terminal device and storage medium.
Background technology
With continuous improvement of the enterprise to application system safety requirements, traditional single management model based on menu function
The practical application of enterprise can not be met, in enterprise practical application, application of function and data permission to system require more next
It is higher, enterprise's application and data how effectively, are subtly managed, a set of flexible role-security management system how is designed, is
One urgent problem.
At present, the role-security management method of enterprise management system, is mainly managed by establishing role's corresponding authority,
These authorities mainly include corresponding function menu and administrative unit is managed control, have the following disadvantages:
1. existing administrative unit is all to be managed control by relationship between superior and subordinate, many business posies are present in different
Mechanism of administrative unit, the existing administration authority based on organizational level is not suitable for the rights management in business post.
2. existing right management method is managed mainly for System menu, different business department logarithm is not suitable for
Required according to the different management of authority.
The content of the invention
In order to solve the above problems, the present invention provides a kind of role-security management method based on various dimensions, terminal device
And storage medium, the management of various dimensions has been carried out to role-security, has inherently solved the application management in different business post
With the different rights requirement of data, the System right management work of enterprise application system administrative staff is also very easy to, is carried
Information Security requirement of the high user to system.
A kind of role-security management method based on various dimensions of the present invention, comprises the following steps:
S1:Database is established, the database includes:
One user's table for being used to preserve user profile;
One role's table for being used to preserve Role Information;
One operating function authority list for being used to preserve operating function authority information;
One range of management authority list for being used for preservation management scope authority information;
One data area authority list for being used to preserve data area authority information;
One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;
Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operation
Function privilege table includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority
Know;The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data
The mark of level of confidentiality authority;
The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user
The mark of corresponding at least one role;
The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, its
In, the mark of the corresponding at least one operating function authority of mark of a role;
The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, its
In, the mark of the corresponding at least one range of management authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, its
In, the mark of the corresponding at least one data area authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, its
In, the mark of the corresponding at least one data level of confidentiality authority of mark of a role;
Into S2 steps;
S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operation
In function privilege table, range of management authority list, data area authority list and data level of confidentiality authority list, it is corresponding to revest each user
Role, and corresponding relation is stored in role's table, into S3 steps;
S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating work according to corresponding role in role's table
Corresponding extent of competence in energy authority list, range of management authority list, data area authority list and data level of confidentiality authority list.
Further, in S3, extent of competence corresponding to user's acquisition, it is specially:
S31:User logs in;
S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;
S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, management
In scope authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list role mark
Know and the mark of role in the corresponding relation and data level of confidentiality authority list of the mark of data area authority and data level of confidentiality authority
Extent of competence corresponding to the corresponding relation acquisition of mark;
S34:Bind according to menu and operating right information corresponding to the loading of operating function authority, and with user, do not weigh
The menu and operating function button of limit are then without displaying;
S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in pipe
Then associative operation can not be carried out in the range of reason without loading;According to knot of tissue corresponding to the loading of the data area authority of user
Structure data indicate, and are bound with user, are inquired about when data load according to data sign;According to the data level of confidentiality authority of user
System business data field list corresponding to loading, and with user bind, when checking business datum corresponding to list of fields
It is shown;
S36:The extent of competence of correlation is cached in corresponding user cache.
Further, the mark of user is used as using ID;The mark of role is used as using role ID;With operating function authority
Marks of the ID as operating function authority;Mark using range of management permission ID as range of management authority;Weighed with data area
Limit marks of the ID as data area authority;Mark using data level of confidentiality permission ID as data level of confidentiality authority.
A kind of role-security management terminal device based on various dimensions of the present invention, including memory, processor and storage
In the memory and the computer program that can run on the processor, computer program described in the computing device
The step of role-security management methods of the Shi Shixian based on various dimensions.
A kind of computer-readable recording medium of the present invention, the computer-readable recording medium storage have computer program,
The step of role-security management method based on various dimensions is realized when the computer program is executed by processor.
Beneficial effects of the present invention:
The present invention is directed to the data administration authority of business system, proposes the role-security management method of various dimensions, is directed to
Different business posies provides one to the regulatory requirement of various data for enterprise customer's flexible management business data in solution system
Efficient, the fine-grained management method of kind.The present invention contrasts existing Role Management mode, has the characteristics that:
1. the mode of management is different, not only meet to be managed by administrative unit, and incorporate the authority in business post
Management;
2. the data area of management is different, the present invention not only meets to be managed by System menu, and considers data
The management of resource;
3. the mode realized is different, existing rights management mode is all based on carrying out interception control to reference address, this
Invention employs flexible configuration mode, and data permission control is carried out in a manner of code injection.
Brief description of the drawings
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is the schematic flow sheet of extent of competence corresponding to the user of the embodiment of the present invention one obtains;
Fig. 3 is the corresponding relation schematic diagram of the user of the embodiment of the present invention one, role and authority;
Fig. 4 is that the embodiment of the present invention is managed control based on range of management authority to unit department information in system
Schematic diagram;
Fig. 5 is organization schematic diagram of the embodiment of the present invention based on range of management authority;
Fig. 6 is range of management authority signal of the embodiment of the present invention based on the role that vice president is sold under range of management authority
Figure;
Fig. 7 is that data in system different unit department of the embodiment of the present invention based on data area authority are managed
The schematic diagram of control;
Fig. 8 is that the embodiment of the present invention carries out field information based on data area authority to the significant data information in system
Subdivision management control schematic diagram.
Embodiment
To further illustrate each embodiment, the present invention is provided with accompanying drawing.These accompanying drawings are the invention discloses the one of content
Point, it can coordinate the associated description of specification to explain the operation principles of embodiment mainly to illustrate embodiment.Coordinate ginseng
These contents are examined, those of ordinary skill in the art will be understood that other possible embodiments and advantages of the present invention.In figure
Component be not necessarily to scale, and similar element numbers are conventionally used to indicate similar component.
In conjunction with the drawings and specific embodiments, the present invention is further described.
The present invention can efficiently solve the application demand of business system role-security management, meet enterprise's rights management
Practical application needs, while meets the different pieces of information jurisdictions mandate in different posies, has been played greatly in practical business work
Effectiveness, it is with a wide range of applications.
Embodiment one:
Refer to shown in Fig. 1-Fig. 8, the invention provides a kind of role-security management method based on various dimensions,
Method set forth in the present invention comprises the following steps that:
S1:Database is established, the database includes:
One user's table for being used to preserve user profile;
One role's table for being used to preserve Role Information;
One operating function authority list for being used to preserve operating function authority information;
One range of management authority list for being used for preservation management scope authority information;
One data area authority list for being used to preserve data area authority information;
One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;
Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operation
Function privilege table includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority
Know;The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data
The mark of level of confidentiality authority;
Further, the mark of user is used as using ID;The mark of role is used as using role ID;With operating function authority
Marks of the ID as operating function authority;Mark using range of management permission ID as range of management authority;Weighed with data area
Limit marks of the ID as data area authority;Mark using data level of confidentiality permission ID as data level of confidentiality authority.
The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user
The mark of corresponding at least one role;
The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, its
In, the mark of the corresponding at least one operating function authority of mark of a role;
The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, its
In, the mark of the corresponding at least one range of management authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, its
In, the mark of the corresponding at least one data area authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, its
In, the mark of the corresponding at least one data level of confidentiality authority of mark of a role;
Into S2 steps;
S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operation
In function privilege table, range of management authority list, data area authority list and data level of confidentiality authority list, it is corresponding to revest each user
Role, and corresponding relation is stored in role's table,
Specifically, the corresponding relation of user, role and authority is as shown in figure 3, user and role are a pair of N relations, angle
Color and authority are also a pair of N relation, and wherein N is the integer more than or equal to 1, i.e. a user can correspond to multiple angles
Color, a role can correspond to multiple authorities, and authority includes operating function authority, range of management authority, data area authority
With data level of confidentiality authority.
Into S3 steps;
S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating work according to corresponding role in role's table
Corresponding extent of competence in energy authority list, range of management authority list, data area authority list and data level of confidentiality authority list.
Specifically, extent of competence corresponding to user's acquisition, comprises the following steps:
S31:User logs in;
S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;
S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, management
In scope authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list role mark
Know and the mark of role in the corresponding relation and data level of confidentiality authority list of the mark of data area authority and data level of confidentiality authority
Extent of competence corresponding to the corresponding relation acquisition of mark;
S34:Bind according to menu and operating right information corresponding to the loading of operating function authority, and with user, do not weigh
The menu and operating function button of limit are then without displaying;
S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in pipe
Then associative operation can not be carried out in the range of reason without loading;According to knot of tissue corresponding to the loading of the data area authority of user
Structure data indicate, and are bound with user, are inquired about when data load according to data sign;According to the data level of confidentiality authority of user
System business data field list corresponding to loading, and with user bind, when checking business datum corresponding to list of fields
It is shown;
S36:The extent of competence of correlation is cached in corresponding user cache.
Specifically, the present invention includes Role Management and rights management,
1. Role Management:Mainly the role in system is defined and browsed authority information corresponding to role to set
Put, including role illustrate and role belonging to personnel's number.
2. rights management:Mainly include operating function authority, data area authority, range of management authority and data level of confidentiality power
The management of the various dimensions such as limit.Operating function authority is the basic rights management function of existing enterprise's application system, mainly to system
In application of function and feature operation be managed, no longer elaborated in the present invention, the multidimensional to being referred in the present invention below
The role-security management of degree is introduced, mainly including following several respects:
2.1 range of management authorities:Control mainly is managed to unit department information in system, flexibly configurable is not of the same trade or business
The unit department range of management in business post, as shown in Figure 4.For example the organization of company is as shown in figure 5, the role of Zhang San is total
The sale vice president in portion, then by the setting of range of management authority, the range of management authority that Zhang San can view is as shown in Figure 6.
2.2 data area authorities:Control, flexibly configurable mainly are managed to the data of different unit departments in system
The data area in different business post, as shown in Figure 7.For example the role of Zhang San is the sale vice president of general headquarters, then passes through data
The setting of scope authority, the data area that Zhang San can view are the sales data of all sales departments.
2.3 data level of confidentiality authority:The subdivision management that field information is mainly carried out to the significant data information in system controls,
Support different rights requirement of the different posies to data.As shown in Figure 8.
Database design is the core of the present invention, can more completely show the realization approach of the present invention, emphasis storehouse table is main
Including following several respects:
The data list structure of range of management authority list as shown in Table 1,
Code | Title | Remarks |
GLFW_ID | Range of management permission ID | The mark of range of management authority |
ROLE_ID | Role ID | The mark of role |
DEPT_ID | Organization ID | Organization identifies |
Table one
The data list structure of data area authority list as shown in Table 2,
Table two
The data list structure of data level of confidentiality authority list as shown in Table 3,
Table three
Embodiment two:
The present invention also provide a kind of role-security management terminal device based on various dimensions, including memory, processor with
And the computer program that can be run in the memory and on the processor is stored in, calculating described in the computing device
The step in above method embodiment of the embodiment of the present invention, such as the method step of the step shown in Fig. 1-Fig. 2 are realized during machine program
Suddenly.
Further, as an executable scheme, the role-security management terminal device based on various dimensions can be with
It is the computing devices such as desktop PC, notebook, palm PC and cloud server.The role-security based on various dimensions
Management terminal device may include, but be not limited only to, processor, memory.It is it will be understood by those skilled in the art that above-mentioned based on more
The composition structure of the role-security management terminal device of dimension is only based on the role-security management terminal device of various dimensions
Example, do not form the restriction to the role-security management terminal device based on various dimensions, can include than it is above-mentioned more or more
Few part, either combine some parts or different parts, such as the role-security management terminal based on various dimensions
Equipment can also include input-output equipment, network access equipment, bus etc., and the embodiment of the present invention is not limited this.
Further, as an executable scheme, alleged processor can be CPU (Central
Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal
Processor, DSP), it is application specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
Into programmable gate array (Field-Programmable Gate Array, FPGA) or other PLDs, discrete
Door or transistor logic, discrete hardware components etc..General processor can be that microprocessor or the processor also may be used
To be any conventional processor etc., the processor is the control of the role-security management terminal device based on various dimensions
Center, utilize the various pieces of the whole role-security management terminal device based on various dimensions of various interfaces and connection.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization
The various functions of role-security management terminal device based on various dimensions.The memory can mainly include storing program area and deposit
Data field is stored up, wherein, storing program area can storage program area, the application program needed at least one function;Storage data field
It can store and created data etc. are used according to mobile phone.In addition, memory can include high-speed random access memory, may be used also
With including nonvolatile memory, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card,
SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card), at least one disk memory, sudden strain of a muscle
Memory device or other volatile solid-state parts.
The present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has computer
Program, the computer program realizes the above method of embodiment of the present invention when being executed by processor the step of.
If the integrated module/unit of the role-security management terminal device based on various dimensions is with SFU software functional unit
Form realize and be used as independent production marketing or in use, can be stored in a computer read/write memory medium.
Based on such understanding, the present invention realizes all or part of flow in above-described embodiment method, can also pass through computer journey
Sequence instructs the hardware of correlation to complete, and described computer program can be stored in a computer-readable recording medium, the meter
Calculation machine program when being executed by processor, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program bag
Include computer program code, the computer program code can be source code form, object identification code form, executable file or
Some intermediate forms etc..The computer-readable medium can include:Any reality of the computer program code can be carried
Body or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and
Software distribution medium etc..It should be noted that the content that the computer-readable medium includes can be according in jurisdiction
Legislation and the requirement of patent practice carry out appropriate increase and decrease, such as in some jurisdictions, according to legislation and patent practice, meter
Calculation machine computer-readable recording medium does not include electric carrier signal and telecommunication signal.
The present invention a kind of role-security management method, terminal device and storage medium based on various dimensions, by role
Authority has carried out the management of various dimensions, inherently solves the application management in different business post and the different rights of data are wanted
Ask, be also very easy to the System right management work of enterprise application system administrative staff, improve data of the user to system
Security requirement.
Although specifically showing and describing the present invention with reference to preferred embodiment, those skilled in the art should be bright
In vain, do not departing from the spirit and scope of the present invention that appended claims are limited, in the form and details can be right
The present invention makes a variety of changes, and is protection scope of the present invention.
Claims (5)
- A kind of 1. role-security management method based on various dimensions, it is characterised in that:Comprise the following steps:S1:Database is established, the database includes:One user's table for being used to preserve user profile;One role's table for being used to preserve Role Information;One operating function authority list for being used to preserve operating function authority information;One range of management authority list for being used for preservation management scope authority information;One data area authority list for being used to preserve data area authority information;One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operating function Authority list includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority; The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data level of confidentiality The mark of authority;The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user is corresponding The mark of at least one role;The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, wherein, one The mark of the corresponding at least one operating function authority of mark of individual role;The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, wherein, one The mark of the corresponding at least one range of management authority of mark of individual role;The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, wherein, one The mark of the corresponding at least one data area authority of mark of individual role;The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, wherein, one The mark of the corresponding at least one data level of confidentiality authority of mark of individual role;Into S2 steps;S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operating function In authority list, range of management authority list, data area authority list and data level of confidentiality authority list, angle corresponding to each user is revested Color, and corresponding relation is stored in role's table, into S3 steps;S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating function power according to corresponding role in role's table Corresponding extent of competence in limit table, range of management authority list, data area authority list and data level of confidentiality authority list.
- 2. the role-security management method based on various dimensions as claimed in claim 1, it is characterised in that:In S3, user obtains Corresponding extent of competence, it is specially:S31:User logs in;S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, range of management In authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list the mark of role with The mark of the mark of role and data level of confidentiality authority in the corresponding relation and data level of confidentiality authority list of the mark of data area authority Corresponding relation obtain corresponding to extent of competence;S34:Bound according to menu and operating right information corresponding to the loading of operating function authority, and with user, without authority Menu and operating function button are then without displaying;S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in management model Then associative operation can not be carried out in enclosing without loading;According to institutional framework number corresponding to the loading of the data area authority of user Bind according to sign, and with user, inquired about when data load according to data sign;Loaded according to the data level of confidentiality authority of user Corresponding system business data field list, and bound with user, list of fields is carried out corresponding to when checking business datum Displaying;S36:The extent of competence of correlation is cached in corresponding user cache.
- 3. the role-security management method based on various dimensions as claimed in claim 1, it is characterised in that:Use is used as using ID The mark at family;The mark of role is used as using role ID;Mark using operating function permission ID as operating function authority;With management Mark of the scope permission ID as range of management authority;Mark using data area permission ID as data area authority;With number According to mark of the level of confidentiality permission ID as data level of confidentiality authority.
- 4. a kind of role-security management terminal device based on various dimensions, including memory, processor and it is stored in described deposit In reservoir and the computer program that can run on the processor, it is characterised in that:Computer described in the computing device Realized during program such as the step of claim 1-3 methods describeds.
- 5. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists In:Realized when the computer program is executed by processor such as the step of claim 1-3 methods describeds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711007329.0A CN107679422A (en) | 2017-10-25 | 2017-10-25 | Role-security management method, terminal device and storage medium based on various dimensions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711007329.0A CN107679422A (en) | 2017-10-25 | 2017-10-25 | Role-security management method, terminal device and storage medium based on various dimensions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107679422A true CN107679422A (en) | 2018-02-09 |
Family
ID=61142117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711007329.0A Pending CN107679422A (en) | 2017-10-25 | 2017-10-25 | Role-security management method, terminal device and storage medium based on various dimensions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679422A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108616508A (en) * | 2018-03-29 | 2018-10-02 | 北京信安世纪科技股份有限公司 | Based on the role of application system in unification authentication platform reverse authorization method and system |
CN109784016A (en) * | 2018-12-29 | 2019-05-21 | 北京奇安信科技有限公司 | A kind of right management method, system, electronic equipment and medium |
CN109885609A (en) * | 2019-01-31 | 2019-06-14 | 平安科技(深圳)有限公司 | Based on combined data area control method, device and storage medium |
CN110162994A (en) * | 2019-04-16 | 2019-08-23 | 深圳壹账通智能科技有限公司 | Authority control method, system, electronic equipment and computer readable storage medium |
CN110443010A (en) * | 2019-07-22 | 2019-11-12 | 安徽智恒信科技股份有限公司 | One kind permission visual configuration control method, device, terminal and storage medium in information system |
CN110516176A (en) * | 2019-08-30 | 2019-11-29 | 北京东软望海科技有限公司 | Processing method, device, electronic equipment and the readable storage medium storing program for executing of user's request |
CN110727929A (en) * | 2019-10-12 | 2020-01-24 | 北京明略软件系统有限公司 | AOP-based line-level authority control method, device and client |
CN110839090A (en) * | 2019-11-14 | 2020-02-25 | 中国民航信息网络股份有限公司 | Product configuration method and system based on dynamic URL |
CN111062009A (en) * | 2019-12-18 | 2020-04-24 | 国网山东省电力公司泰安供电公司 | Power system information authority management method, system, terminal and storage medium |
CN111274326A (en) * | 2018-12-04 | 2020-06-12 | 北京嘀嘀无限科技发展有限公司 | Feature data importing method, feature data managing and controlling method, feature data importing device, feature data managing and controlling device and electronic equipment |
CN111581650A (en) * | 2020-04-09 | 2020-08-25 | 上海淇毓信息科技有限公司 | Service system authority management method, system and electronic equipment |
CN111651738A (en) * | 2020-04-28 | 2020-09-11 | 中国科学院计算机网络信息中心 | Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device |
CN112100641A (en) * | 2020-11-09 | 2020-12-18 | 成都掌控者网络科技有限公司 | Multi-dimensional authorization method, system, equipment and storage medium |
CN112631793A (en) * | 2020-11-26 | 2021-04-09 | 贝壳技术有限公司 | Personnel data identification generation method and device |
CN112667639A (en) * | 2020-12-31 | 2021-04-16 | 恩亿科(北京)数据科技有限公司 | Authority design method, system, equipment and storage medium based on SaaS multi-tenant |
CN114124524A (en) * | 2021-11-19 | 2022-03-01 | 国云科技股份有限公司 | Cloud platform permission setting method and device, terminal equipment and storage medium |
CN114584380A (en) * | 2022-03-07 | 2022-06-03 | 深圳壹账通智能科技有限公司 | Authority management method, device, equipment and storage medium of multidimensional system platform |
CN115983807A (en) * | 2023-03-20 | 2023-04-18 | 江苏橙智云信息技术有限公司 | Intelligent building permission modular management method based on Internet of things |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102053969A (en) * | 2009-10-28 | 2011-05-11 | 上海宝信软件股份有限公司 | Web ERP (enterprise resource planning) user right management system |
CN104408339A (en) * | 2014-12-18 | 2015-03-11 | 山东钢铁股份有限公司 | Authority management method for information system |
-
2017
- 2017-10-25 CN CN201711007329.0A patent/CN107679422A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102053969A (en) * | 2009-10-28 | 2011-05-11 | 上海宝信软件股份有限公司 | Web ERP (enterprise resource planning) user right management system |
CN104408339A (en) * | 2014-12-18 | 2015-03-11 | 山东钢铁股份有限公司 | Authority management method for information system |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108616508A (en) * | 2018-03-29 | 2018-10-02 | 北京信安世纪科技股份有限公司 | Based on the role of application system in unification authentication platform reverse authorization method and system |
CN111274326A (en) * | 2018-12-04 | 2020-06-12 | 北京嘀嘀无限科技发展有限公司 | Feature data importing method, feature data managing and controlling method, feature data importing device, feature data managing and controlling device and electronic equipment |
CN109784016B (en) * | 2018-12-29 | 2021-06-29 | 奇安信科技集团股份有限公司 | Authority management method, system, electronic device and medium |
CN109784016A (en) * | 2018-12-29 | 2019-05-21 | 北京奇安信科技有限公司 | A kind of right management method, system, electronic equipment and medium |
CN109885609A (en) * | 2019-01-31 | 2019-06-14 | 平安科技(深圳)有限公司 | Based on combined data area control method, device and storage medium |
CN109885609B (en) * | 2019-01-31 | 2024-05-07 | 平安科技(深圳)有限公司 | Data range control method, device and storage medium based on combination |
CN110162994A (en) * | 2019-04-16 | 2019-08-23 | 深圳壹账通智能科技有限公司 | Authority control method, system, electronic equipment and computer readable storage medium |
CN110443010A (en) * | 2019-07-22 | 2019-11-12 | 安徽智恒信科技股份有限公司 | One kind permission visual configuration control method, device, terminal and storage medium in information system |
CN110516176A (en) * | 2019-08-30 | 2019-11-29 | 北京东软望海科技有限公司 | Processing method, device, electronic equipment and the readable storage medium storing program for executing of user's request |
CN110727929A (en) * | 2019-10-12 | 2020-01-24 | 北京明略软件系统有限公司 | AOP-based line-level authority control method, device and client |
CN110727929B (en) * | 2019-10-12 | 2021-07-30 | 北京明略软件系统有限公司 | AOP-based line-level authority control method, device and client |
CN110839090B (en) * | 2019-11-14 | 2022-04-26 | 中国民航信息网络股份有限公司 | Product configuration method and system based on dynamic URL |
CN110839090A (en) * | 2019-11-14 | 2020-02-25 | 中国民航信息网络股份有限公司 | Product configuration method and system based on dynamic URL |
CN111062009A (en) * | 2019-12-18 | 2020-04-24 | 国网山东省电力公司泰安供电公司 | Power system information authority management method, system, terminal and storage medium |
CN111581650A (en) * | 2020-04-09 | 2020-08-25 | 上海淇毓信息科技有限公司 | Service system authority management method, system and electronic equipment |
CN111581650B (en) * | 2020-04-09 | 2024-03-05 | 上海淇毓信息科技有限公司 | Business system authority management method, system and electronic equipment |
CN111651738A (en) * | 2020-04-28 | 2020-09-11 | 中国科学院计算机网络信息中心 | Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device |
CN111651738B (en) * | 2020-04-28 | 2023-06-27 | 中国科学院计算机网络信息中心 | Fine-grained role authority unified management method based on front-end and back-end separation architecture and electronic device |
CN112100641A (en) * | 2020-11-09 | 2020-12-18 | 成都掌控者网络科技有限公司 | Multi-dimensional authorization method, system, equipment and storage medium |
CN112631793A (en) * | 2020-11-26 | 2021-04-09 | 贝壳技术有限公司 | Personnel data identification generation method and device |
CN112667639A (en) * | 2020-12-31 | 2021-04-16 | 恩亿科(北京)数据科技有限公司 | Authority design method, system, equipment and storage medium based on SaaS multi-tenant |
CN114124524A (en) * | 2021-11-19 | 2022-03-01 | 国云科技股份有限公司 | Cloud platform permission setting method and device, terminal equipment and storage medium |
CN114124524B (en) * | 2021-11-19 | 2023-12-29 | 国云科技股份有限公司 | Cloud platform permission setting method and device, terminal equipment and storage medium |
CN114584380A (en) * | 2022-03-07 | 2022-06-03 | 深圳壹账通智能科技有限公司 | Authority management method, device, equipment and storage medium of multidimensional system platform |
CN115983807A (en) * | 2023-03-20 | 2023-04-18 | 江苏橙智云信息技术有限公司 | Intelligent building permission modular management method based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107679422A (en) | Role-security management method, terminal device and storage medium based on various dimensions | |
CN108280365B (en) | Data access authority management method, device, terminal device and storage medium | |
CN104252454B (en) | A kind of data permission control method and system towards cloud computing multi-tenant pattern | |
CN106875110A (en) | Operational indicator layered calculation method and device, distributed computing method and system | |
CN108737325A (en) | A kind of multi-tenant data partition method, apparatus and system | |
CN108053306A (en) | Financial data prediction management method, system, terminal and storage medium | |
CN107784426A (en) | Post distribution method, device and the equipment of a kind of employee | |
CN109727123A (en) | User's collage-credit data construction method, device and computer readable storage medium | |
CN108255909A (en) | Tables of data backup method and server based on oracle database | |
CN104767761B (en) | A kind of cloud storage platform access control method and device | |
CN107844708A (en) | Towards the data permission control system and its control method of military equipment management business | |
CN107943542A (en) | A kind of configuration information management method, device, computer-readable recording medium and storage control | |
CN108009444A (en) | Authority control method, device and the computer-readable recording medium of full-text search | |
CN108564461A (en) | A kind of resource allocation method, computer readable storage medium and terminal device | |
CN110599273A (en) | Data processing method, data processing device, node equipment and storage medium | |
CN110489394B (en) | Intermediate data processing method and device | |
WO2023078078A1 (en) | Unified data security labeling framework | |
CN107729577A (en) | A kind of data search method based on multidimensional Hash table, terminal device and storage medium | |
CN109885609B (en) | Data range control method, device and storage medium based on combination | |
Nikomborirak | The ASEAN Economic Community (AEC): Myths and Realities | |
CN108805324A (en) | A kind of distribution method and its equipment of corporate resources | |
CN108231152A (en) | Medicine prescription result generation method and device | |
CN112132425A (en) | Performance distribution processing method, device, medium and terminal equipment | |
CN107515816A (en) | The method and server of a kind of data statistics | |
CN108683581A (en) | Mail triggering method and device, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180209 |