CN107679422A - Role-security management method, terminal device and storage medium based on various dimensions - Google Patents

Role-security management method, terminal device and storage medium based on various dimensions Download PDF

Info

Publication number
CN107679422A
CN107679422A CN201711007329.0A CN201711007329A CN107679422A CN 107679422 A CN107679422 A CN 107679422A CN 201711007329 A CN201711007329 A CN 201711007329A CN 107679422 A CN107679422 A CN 107679422A
Authority
CN
China
Prior art keywords
authority
role
mark
user
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711007329.0A
Other languages
Chinese (zh)
Inventor
蔡淋强
朱建梅
林文楷
曾超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201711007329.0A priority Critical patent/CN107679422A/en
Publication of CN107679422A publication Critical patent/CN107679422A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of role-security management method based on various dimensions, comprises the following steps, S1:Database is established, into S2 steps;S2:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operating function authority list, range of management authority list, data area authority list and data level of confidentiality authority list, role corresponding to each user is revested, and corresponding relation is stored in role's table, into S3 steps;S3:User logs in, and according to corresponding extent of competence in corresponding role's acquisition operating function authority list, range of management authority list, data area authority list and data level of confidentiality authority list in role's table.The present invention is by having carried out the management of various dimensions to role-security, inherently solve the application management in different business post and the different rights requirement of data, also the System right management work of enterprise application system administrative staff is very easy to, improves Information Security requirement of the user to system.

Description

Role-security management method, terminal device and storage medium based on various dimensions
Technical field
The present invention relates to System right management technical field, specifically a kind of role-security manager based on various dimensions Method, terminal device and storage medium.
Background technology
With continuous improvement of the enterprise to application system safety requirements, traditional single management model based on menu function The practical application of enterprise can not be met, in enterprise practical application, application of function and data permission to system require more next It is higher, enterprise's application and data how effectively, are subtly managed, a set of flexible role-security management system how is designed, is One urgent problem.
At present, the role-security management method of enterprise management system, is mainly managed by establishing role's corresponding authority, These authorities mainly include corresponding function menu and administrative unit is managed control, have the following disadvantages:
1. existing administrative unit is all to be managed control by relationship between superior and subordinate, many business posies are present in different Mechanism of administrative unit, the existing administration authority based on organizational level is not suitable for the rights management in business post.
2. existing right management method is managed mainly for System menu, different business department logarithm is not suitable for Required according to the different management of authority.
The content of the invention
In order to solve the above problems, the present invention provides a kind of role-security management method based on various dimensions, terminal device And storage medium, the management of various dimensions has been carried out to role-security, has inherently solved the application management in different business post With the different rights requirement of data, the System right management work of enterprise application system administrative staff is also very easy to, is carried Information Security requirement of the high user to system.
A kind of role-security management method based on various dimensions of the present invention, comprises the following steps:
S1:Database is established, the database includes:
One user's table for being used to preserve user profile;
One role's table for being used to preserve Role Information;
One operating function authority list for being used to preserve operating function authority information;
One range of management authority list for being used for preservation management scope authority information;
One data area authority list for being used to preserve data area authority information;
One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;
Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operation Function privilege table includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority Know;The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data The mark of level of confidentiality authority;
The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user The mark of corresponding at least one role;
The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, its In, the mark of the corresponding at least one operating function authority of mark of a role;
The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, its In, the mark of the corresponding at least one range of management authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, its In, the mark of the corresponding at least one data area authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, its In, the mark of the corresponding at least one data level of confidentiality authority of mark of a role;
Into S2 steps;
S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operation In function privilege table, range of management authority list, data area authority list and data level of confidentiality authority list, it is corresponding to revest each user Role, and corresponding relation is stored in role's table, into S3 steps;
S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating work according to corresponding role in role's table Corresponding extent of competence in energy authority list, range of management authority list, data area authority list and data level of confidentiality authority list.
Further, in S3, extent of competence corresponding to user's acquisition, it is specially:
S31:User logs in;
S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;
S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, management In scope authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list role mark Know and the mark of role in the corresponding relation and data level of confidentiality authority list of the mark of data area authority and data level of confidentiality authority Extent of competence corresponding to the corresponding relation acquisition of mark;
S34:Bind according to menu and operating right information corresponding to the loading of operating function authority, and with user, do not weigh The menu and operating function button of limit are then without displaying;
S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in pipe Then associative operation can not be carried out in the range of reason without loading;According to knot of tissue corresponding to the loading of the data area authority of user Structure data indicate, and are bound with user, are inquired about when data load according to data sign;According to the data level of confidentiality authority of user System business data field list corresponding to loading, and with user bind, when checking business datum corresponding to list of fields It is shown;
S36:The extent of competence of correlation is cached in corresponding user cache.
Further, the mark of user is used as using ID;The mark of role is used as using role ID;With operating function authority Marks of the ID as operating function authority;Mark using range of management permission ID as range of management authority;Weighed with data area Limit marks of the ID as data area authority;Mark using data level of confidentiality permission ID as data level of confidentiality authority.
A kind of role-security management terminal device based on various dimensions of the present invention, including memory, processor and storage In the memory and the computer program that can run on the processor, computer program described in the computing device The step of role-security management methods of the Shi Shixian based on various dimensions.
A kind of computer-readable recording medium of the present invention, the computer-readable recording medium storage have computer program, The step of role-security management method based on various dimensions is realized when the computer program is executed by processor.
Beneficial effects of the present invention:
The present invention is directed to the data administration authority of business system, proposes the role-security management method of various dimensions, is directed to Different business posies provides one to the regulatory requirement of various data for enterprise customer's flexible management business data in solution system Efficient, the fine-grained management method of kind.The present invention contrasts existing Role Management mode, has the characteristics that:
1. the mode of management is different, not only meet to be managed by administrative unit, and incorporate the authority in business post Management;
2. the data area of management is different, the present invention not only meets to be managed by System menu, and considers data The management of resource;
3. the mode realized is different, existing rights management mode is all based on carrying out interception control to reference address, this Invention employs flexible configuration mode, and data permission control is carried out in a manner of code injection.
Brief description of the drawings
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is the schematic flow sheet of extent of competence corresponding to the user of the embodiment of the present invention one obtains;
Fig. 3 is the corresponding relation schematic diagram of the user of the embodiment of the present invention one, role and authority;
Fig. 4 is that the embodiment of the present invention is managed control based on range of management authority to unit department information in system Schematic diagram;
Fig. 5 is organization schematic diagram of the embodiment of the present invention based on range of management authority;
Fig. 6 is range of management authority signal of the embodiment of the present invention based on the role that vice president is sold under range of management authority Figure;
Fig. 7 is that data in system different unit department of the embodiment of the present invention based on data area authority are managed The schematic diagram of control;
Fig. 8 is that the embodiment of the present invention carries out field information based on data area authority to the significant data information in system Subdivision management control schematic diagram.
Embodiment
To further illustrate each embodiment, the present invention is provided with accompanying drawing.These accompanying drawings are the invention discloses the one of content Point, it can coordinate the associated description of specification to explain the operation principles of embodiment mainly to illustrate embodiment.Coordinate ginseng These contents are examined, those of ordinary skill in the art will be understood that other possible embodiments and advantages of the present invention.In figure Component be not necessarily to scale, and similar element numbers are conventionally used to indicate similar component.
In conjunction with the drawings and specific embodiments, the present invention is further described.
The present invention can efficiently solve the application demand of business system role-security management, meet enterprise's rights management Practical application needs, while meets the different pieces of information jurisdictions mandate in different posies, has been played greatly in practical business work Effectiveness, it is with a wide range of applications.
Embodiment one:
Refer to shown in Fig. 1-Fig. 8, the invention provides a kind of role-security management method based on various dimensions,
Method set forth in the present invention comprises the following steps that:
S1:Database is established, the database includes:
One user's table for being used to preserve user profile;
One role's table for being used to preserve Role Information;
One operating function authority list for being used to preserve operating function authority information;
One range of management authority list for being used for preservation management scope authority information;
One data area authority list for being used to preserve data area authority information;
One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;
Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operation Function privilege table includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority Know;The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data The mark of level of confidentiality authority;
Further, the mark of user is used as using ID;The mark of role is used as using role ID;With operating function authority Marks of the ID as operating function authority;Mark using range of management permission ID as range of management authority;Weighed with data area Limit marks of the ID as data area authority;Mark using data level of confidentiality permission ID as data level of confidentiality authority.
The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user The mark of corresponding at least one role;
The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, its In, the mark of the corresponding at least one operating function authority of mark of a role;
The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, its In, the mark of the corresponding at least one range of management authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, its In, the mark of the corresponding at least one data area authority of mark of a role;
The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, its In, the mark of the corresponding at least one data level of confidentiality authority of mark of a role;
Into S2 steps;
S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operation In function privilege table, range of management authority list, data area authority list and data level of confidentiality authority list, it is corresponding to revest each user Role, and corresponding relation is stored in role's table,
Specifically, the corresponding relation of user, role and authority is as shown in figure 3, user and role are a pair of N relations, angle Color and authority are also a pair of N relation, and wherein N is the integer more than or equal to 1, i.e. a user can correspond to multiple angles Color, a role can correspond to multiple authorities, and authority includes operating function authority, range of management authority, data area authority With data level of confidentiality authority.
Into S3 steps;
S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating work according to corresponding role in role's table Corresponding extent of competence in energy authority list, range of management authority list, data area authority list and data level of confidentiality authority list.
Specifically, extent of competence corresponding to user's acquisition, comprises the following steps:
S31:User logs in;
S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;
S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, management In scope authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list role mark Know and the mark of role in the corresponding relation and data level of confidentiality authority list of the mark of data area authority and data level of confidentiality authority Extent of competence corresponding to the corresponding relation acquisition of mark;
S34:Bind according to menu and operating right information corresponding to the loading of operating function authority, and with user, do not weigh The menu and operating function button of limit are then without displaying;
S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in pipe Then associative operation can not be carried out in the range of reason without loading;According to knot of tissue corresponding to the loading of the data area authority of user Structure data indicate, and are bound with user, are inquired about when data load according to data sign;According to the data level of confidentiality authority of user System business data field list corresponding to loading, and with user bind, when checking business datum corresponding to list of fields It is shown;
S36:The extent of competence of correlation is cached in corresponding user cache.
Specifically, the present invention includes Role Management and rights management,
1. Role Management:Mainly the role in system is defined and browsed authority information corresponding to role to set Put, including role illustrate and role belonging to personnel's number.
2. rights management:Mainly include operating function authority, data area authority, range of management authority and data level of confidentiality power The management of the various dimensions such as limit.Operating function authority is the basic rights management function of existing enterprise's application system, mainly to system In application of function and feature operation be managed, no longer elaborated in the present invention, the multidimensional to being referred in the present invention below The role-security management of degree is introduced, mainly including following several respects:
2.1 range of management authorities:Control mainly is managed to unit department information in system, flexibly configurable is not of the same trade or business The unit department range of management in business post, as shown in Figure 4.For example the organization of company is as shown in figure 5, the role of Zhang San is total The sale vice president in portion, then by the setting of range of management authority, the range of management authority that Zhang San can view is as shown in Figure 6.
2.2 data area authorities:Control, flexibly configurable mainly are managed to the data of different unit departments in system The data area in different business post, as shown in Figure 7.For example the role of Zhang San is the sale vice president of general headquarters, then passes through data The setting of scope authority, the data area that Zhang San can view are the sales data of all sales departments.
2.3 data level of confidentiality authority:The subdivision management that field information is mainly carried out to the significant data information in system controls, Support different rights requirement of the different posies to data.As shown in Figure 8.
Database design is the core of the present invention, can more completely show the realization approach of the present invention, emphasis storehouse table is main Including following several respects:
The data list structure of range of management authority list as shown in Table 1,
Code Title Remarks
GLFW_ID Range of management permission ID The mark of range of management authority
ROLE_ID Role ID The mark of role
DEPT_ID Organization ID Organization identifies
Table one
The data list structure of data area authority list as shown in Table 2,
Table two
The data list structure of data level of confidentiality authority list as shown in Table 3,
Table three
Embodiment two:
The present invention also provide a kind of role-security management terminal device based on various dimensions, including memory, processor with And the computer program that can be run in the memory and on the processor is stored in, calculating described in the computing device The step in above method embodiment of the embodiment of the present invention, such as the method step of the step shown in Fig. 1-Fig. 2 are realized during machine program Suddenly.
Further, as an executable scheme, the role-security management terminal device based on various dimensions can be with It is the computing devices such as desktop PC, notebook, palm PC and cloud server.The role-security based on various dimensions Management terminal device may include, but be not limited only to, processor, memory.It is it will be understood by those skilled in the art that above-mentioned based on more The composition structure of the role-security management terminal device of dimension is only based on the role-security management terminal device of various dimensions Example, do not form the restriction to the role-security management terminal device based on various dimensions, can include than it is above-mentioned more or more Few part, either combine some parts or different parts, such as the role-security management terminal based on various dimensions Equipment can also include input-output equipment, network access equipment, bus etc., and the embodiment of the present invention is not limited this.
Further, as an executable scheme, alleged processor can be CPU (Central Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal Processor, DSP), it is application specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Into programmable gate array (Field-Programmable Gate Array, FPGA) or other PLDs, discrete Door or transistor logic, discrete hardware components etc..General processor can be that microprocessor or the processor also may be used To be any conventional processor etc., the processor is the control of the role-security management terminal device based on various dimensions Center, utilize the various pieces of the whole role-security management terminal device based on various dimensions of various interfaces and connection.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization The various functions of role-security management terminal device based on various dimensions.The memory can mainly include storing program area and deposit Data field is stored up, wherein, storing program area can storage program area, the application program needed at least one function;Storage data field It can store and created data etc. are used according to mobile phone.In addition, memory can include high-speed random access memory, may be used also With including nonvolatile memory, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card), at least one disk memory, sudden strain of a muscle Memory device or other volatile solid-state parts.
The present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has computer Program, the computer program realizes the above method of embodiment of the present invention when being executed by processor the step of.
If the integrated module/unit of the role-security management terminal device based on various dimensions is with SFU software functional unit Form realize and be used as independent production marketing or in use, can be stored in a computer read/write memory medium. Based on such understanding, the present invention realizes all or part of flow in above-described embodiment method, can also pass through computer journey Sequence instructs the hardware of correlation to complete, and described computer program can be stored in a computer-readable recording medium, the meter Calculation machine program when being executed by processor, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program bag Include computer program code, the computer program code can be source code form, object identification code form, executable file or Some intermediate forms etc..The computer-readable medium can include:Any reality of the computer program code can be carried Body or device, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and Software distribution medium etc..It should be noted that the content that the computer-readable medium includes can be according in jurisdiction Legislation and the requirement of patent practice carry out appropriate increase and decrease, such as in some jurisdictions, according to legislation and patent practice, meter Calculation machine computer-readable recording medium does not include electric carrier signal and telecommunication signal.
The present invention a kind of role-security management method, terminal device and storage medium based on various dimensions, by role Authority has carried out the management of various dimensions, inherently solves the application management in different business post and the different rights of data are wanted Ask, be also very easy to the System right management work of enterprise application system administrative staff, improve data of the user to system Security requirement.
Although specifically showing and describing the present invention with reference to preferred embodiment, those skilled in the art should be bright In vain, do not departing from the spirit and scope of the present invention that appended claims are limited, in the form and details can be right The present invention makes a variety of changes, and is protection scope of the present invention.

Claims (5)

  1. A kind of 1. role-security management method based on various dimensions, it is characterised in that:Comprise the following steps:
    S1:Database is established, the database includes:
    One user's table for being used to preserve user profile;
    One role's table for being used to preserve Role Information;
    One operating function authority list for being used to preserve operating function authority information;
    One range of management authority list for being used for preservation management scope authority information;
    One data area authority list for being used to preserve data area authority information;
    One data level of confidentiality authority list for being used to preserve data level of confidentiality authority information;
    Wherein, user's table includes:The mark of user;Role's table includes:The mark of role;The operating function Authority list includes:The mark of operating function authority;The range of management authority list includes:The mark of range of management authority; The data area authority list includes:The mark of data area authority;The data level of confidentiality authority list includes:Data level of confidentiality The mark of authority;
    The corresponding relation of mark comprising user and the mark of role in role's table, wherein, the mark of a user is corresponding The mark of at least one role;
    The corresponding relation of mark comprising role and the mark of operating function authority in the operating function authority list, wherein, one The mark of the corresponding at least one operating function authority of mark of individual role;
    The corresponding relation of mark comprising role and the mark of range of management authority in the range of management authority list, wherein, one The mark of the corresponding at least one range of management authority of mark of individual role;
    The corresponding relation of mark comprising role and the mark of data area authority in the data area authority list, wherein, one The mark of the corresponding at least one data area authority of mark of individual role;
    The corresponding relation of mark comprising role and the mark of data level of confidentiality authority in the data level of confidentiality authority list, wherein, one The mark of the corresponding at least one data level of confidentiality authority of mark of individual role;
    Into S2 steps;
    S2:Distribute and authorize to user:Corresponding authority is distributed to each role, and corresponding relation is stored respectively in operating function In authority list, range of management authority list, data area authority list and data level of confidentiality authority list, angle corresponding to each user is revested Color, and corresponding relation is stored in role's table, into S3 steps;
    S3:Extent of competence corresponding to user's acquisition:User logs in, and obtains operating function power according to corresponding role in role's table Corresponding extent of competence in limit table, range of management authority list, data area authority list and data level of confidentiality authority list.
  2. 2. the role-security management method based on various dimensions as claimed in claim 1, it is characterised in that:In S3, user obtains Corresponding extent of competence, it is specially:
    S31:User logs in;
    S32:According to the role corresponding with the corresponding relation acquisition user of the mark of role of the mark of user in role's table;
    S33:According to the corresponding relation of the mark of role in operating function authority list and the mark of operating function authority, range of management In authority list in the corresponding relation of the mark of the mark of role and range of management authority, data area authority list the mark of role with The mark of the mark of role and data level of confidentiality authority in the corresponding relation and data level of confidentiality authority list of the mark of data area authority Corresponding relation obtain corresponding to extent of competence;
    S34:Bound according to menu and operating right information corresponding to the loading of operating function authority, and with user, without authority Menu and operating function button are then without displaying;
    S35:Bound according to organizational information corresponding to the loading of the range of management authority of user, and with user, not in management model Then associative operation can not be carried out in enclosing without loading;According to institutional framework number corresponding to the loading of the data area authority of user Bind according to sign, and with user, inquired about when data load according to data sign;Loaded according to the data level of confidentiality authority of user Corresponding system business data field list, and bound with user, list of fields is carried out corresponding to when checking business datum Displaying;
    S36:The extent of competence of correlation is cached in corresponding user cache.
  3. 3. the role-security management method based on various dimensions as claimed in claim 1, it is characterised in that:Use is used as using ID The mark at family;The mark of role is used as using role ID;Mark using operating function permission ID as operating function authority;With management Mark of the scope permission ID as range of management authority;Mark using data area permission ID as data area authority;With number According to mark of the level of confidentiality permission ID as data level of confidentiality authority.
  4. 4. a kind of role-security management terminal device based on various dimensions, including memory, processor and it is stored in described deposit In reservoir and the computer program that can run on the processor, it is characterised in that:Computer described in the computing device Realized during program such as the step of claim 1-3 methods describeds.
  5. 5. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists In:Realized when the computer program is executed by processor such as the step of claim 1-3 methods describeds.
CN201711007329.0A 2017-10-25 2017-10-25 Role-security management method, terminal device and storage medium based on various dimensions Pending CN107679422A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711007329.0A CN107679422A (en) 2017-10-25 2017-10-25 Role-security management method, terminal device and storage medium based on various dimensions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711007329.0A CN107679422A (en) 2017-10-25 2017-10-25 Role-security management method, terminal device and storage medium based on various dimensions

Publications (1)

Publication Number Publication Date
CN107679422A true CN107679422A (en) 2018-02-09

Family

ID=61142117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711007329.0A Pending CN107679422A (en) 2017-10-25 2017-10-25 Role-security management method, terminal device and storage medium based on various dimensions

Country Status (1)

Country Link
CN (1) CN107679422A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616508A (en) * 2018-03-29 2018-10-02 北京信安世纪科技股份有限公司 Based on the role of application system in unification authentication platform reverse authorization method and system
CN109784016A (en) * 2018-12-29 2019-05-21 北京奇安信科技有限公司 A kind of right management method, system, electronic equipment and medium
CN109885609A (en) * 2019-01-31 2019-06-14 平安科技(深圳)有限公司 Based on combined data area control method, device and storage medium
CN110162994A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Authority control method, system, electronic equipment and computer readable storage medium
CN110443010A (en) * 2019-07-22 2019-11-12 安徽智恒信科技股份有限公司 One kind permission visual configuration control method, device, terminal and storage medium in information system
CN110516176A (en) * 2019-08-30 2019-11-29 北京东软望海科技有限公司 Processing method, device, electronic equipment and the readable storage medium storing program for executing of user's request
CN110727929A (en) * 2019-10-12 2020-01-24 北京明略软件系统有限公司 AOP-based line-level authority control method, device and client
CN110839090A (en) * 2019-11-14 2020-02-25 中国民航信息网络股份有限公司 Product configuration method and system based on dynamic URL
CN111062009A (en) * 2019-12-18 2020-04-24 国网山东省电力公司泰安供电公司 Power system information authority management method, system, terminal and storage medium
CN111274326A (en) * 2018-12-04 2020-06-12 北京嘀嘀无限科技发展有限公司 Feature data importing method, feature data managing and controlling method, feature data importing device, feature data managing and controlling device and electronic equipment
CN111581650A (en) * 2020-04-09 2020-08-25 上海淇毓信息科技有限公司 Service system authority management method, system and electronic equipment
CN111651738A (en) * 2020-04-28 2020-09-11 中国科学院计算机网络信息中心 Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device
CN112100641A (en) * 2020-11-09 2020-12-18 成都掌控者网络科技有限公司 Multi-dimensional authorization method, system, equipment and storage medium
CN112631793A (en) * 2020-11-26 2021-04-09 贝壳技术有限公司 Personnel data identification generation method and device
CN112667639A (en) * 2020-12-31 2021-04-16 恩亿科(北京)数据科技有限公司 Authority design method, system, equipment and storage medium based on SaaS multi-tenant
CN114124524A (en) * 2021-11-19 2022-03-01 国云科技股份有限公司 Cloud platform permission setting method and device, terminal equipment and storage medium
CN114584380A (en) * 2022-03-07 2022-06-03 深圳壹账通智能科技有限公司 Authority management method, device, equipment and storage medium of multidimensional system platform
CN115983807A (en) * 2023-03-20 2023-04-18 江苏橙智云信息技术有限公司 Intelligent building permission modular management method based on Internet of things

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102053969A (en) * 2009-10-28 2011-05-11 上海宝信软件股份有限公司 Web ERP (enterprise resource planning) user right management system
CN104408339A (en) * 2014-12-18 2015-03-11 山东钢铁股份有限公司 Authority management method for information system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102053969A (en) * 2009-10-28 2011-05-11 上海宝信软件股份有限公司 Web ERP (enterprise resource planning) user right management system
CN104408339A (en) * 2014-12-18 2015-03-11 山东钢铁股份有限公司 Authority management method for information system

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616508A (en) * 2018-03-29 2018-10-02 北京信安世纪科技股份有限公司 Based on the role of application system in unification authentication platform reverse authorization method and system
CN111274326A (en) * 2018-12-04 2020-06-12 北京嘀嘀无限科技发展有限公司 Feature data importing method, feature data managing and controlling method, feature data importing device, feature data managing and controlling device and electronic equipment
CN109784016B (en) * 2018-12-29 2021-06-29 奇安信科技集团股份有限公司 Authority management method, system, electronic device and medium
CN109784016A (en) * 2018-12-29 2019-05-21 北京奇安信科技有限公司 A kind of right management method, system, electronic equipment and medium
CN109885609A (en) * 2019-01-31 2019-06-14 平安科技(深圳)有限公司 Based on combined data area control method, device and storage medium
CN109885609B (en) * 2019-01-31 2024-05-07 平安科技(深圳)有限公司 Data range control method, device and storage medium based on combination
CN110162994A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Authority control method, system, electronic equipment and computer readable storage medium
CN110443010A (en) * 2019-07-22 2019-11-12 安徽智恒信科技股份有限公司 One kind permission visual configuration control method, device, terminal and storage medium in information system
CN110516176A (en) * 2019-08-30 2019-11-29 北京东软望海科技有限公司 Processing method, device, electronic equipment and the readable storage medium storing program for executing of user's request
CN110727929A (en) * 2019-10-12 2020-01-24 北京明略软件系统有限公司 AOP-based line-level authority control method, device and client
CN110727929B (en) * 2019-10-12 2021-07-30 北京明略软件系统有限公司 AOP-based line-level authority control method, device and client
CN110839090B (en) * 2019-11-14 2022-04-26 中国民航信息网络股份有限公司 Product configuration method and system based on dynamic URL
CN110839090A (en) * 2019-11-14 2020-02-25 中国民航信息网络股份有限公司 Product configuration method and system based on dynamic URL
CN111062009A (en) * 2019-12-18 2020-04-24 国网山东省电力公司泰安供电公司 Power system information authority management method, system, terminal and storage medium
CN111581650A (en) * 2020-04-09 2020-08-25 上海淇毓信息科技有限公司 Service system authority management method, system and electronic equipment
CN111581650B (en) * 2020-04-09 2024-03-05 上海淇毓信息科技有限公司 Business system authority management method, system and electronic equipment
CN111651738A (en) * 2020-04-28 2020-09-11 中国科学院计算机网络信息中心 Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device
CN111651738B (en) * 2020-04-28 2023-06-27 中国科学院计算机网络信息中心 Fine-grained role authority unified management method based on front-end and back-end separation architecture and electronic device
CN112100641A (en) * 2020-11-09 2020-12-18 成都掌控者网络科技有限公司 Multi-dimensional authorization method, system, equipment and storage medium
CN112631793A (en) * 2020-11-26 2021-04-09 贝壳技术有限公司 Personnel data identification generation method and device
CN112667639A (en) * 2020-12-31 2021-04-16 恩亿科(北京)数据科技有限公司 Authority design method, system, equipment and storage medium based on SaaS multi-tenant
CN114124524A (en) * 2021-11-19 2022-03-01 国云科技股份有限公司 Cloud platform permission setting method and device, terminal equipment and storage medium
CN114124524B (en) * 2021-11-19 2023-12-29 国云科技股份有限公司 Cloud platform permission setting method and device, terminal equipment and storage medium
CN114584380A (en) * 2022-03-07 2022-06-03 深圳壹账通智能科技有限公司 Authority management method, device, equipment and storage medium of multidimensional system platform
CN115983807A (en) * 2023-03-20 2023-04-18 江苏橙智云信息技术有限公司 Intelligent building permission modular management method based on Internet of things

Similar Documents

Publication Publication Date Title
CN107679422A (en) Role-security management method, terminal device and storage medium based on various dimensions
CN108280365B (en) Data access authority management method, device, terminal device and storage medium
CN104252454B (en) A kind of data permission control method and system towards cloud computing multi-tenant pattern
CN106875110A (en) Operational indicator layered calculation method and device, distributed computing method and system
CN108737325A (en) A kind of multi-tenant data partition method, apparatus and system
CN108053306A (en) Financial data prediction management method, system, terminal and storage medium
CN107784426A (en) Post distribution method, device and the equipment of a kind of employee
CN109727123A (en) User's collage-credit data construction method, device and computer readable storage medium
CN108255909A (en) Tables of data backup method and server based on oracle database
CN104767761B (en) A kind of cloud storage platform access control method and device
CN107844708A (en) Towards the data permission control system and its control method of military equipment management business
CN107943542A (en) A kind of configuration information management method, device, computer-readable recording medium and storage control
CN108009444A (en) Authority control method, device and the computer-readable recording medium of full-text search
CN108564461A (en) A kind of resource allocation method, computer readable storage medium and terminal device
CN110599273A (en) Data processing method, data processing device, node equipment and storage medium
CN110489394B (en) Intermediate data processing method and device
WO2023078078A1 (en) Unified data security labeling framework
CN107729577A (en) A kind of data search method based on multidimensional Hash table, terminal device and storage medium
CN109885609B (en) Data range control method, device and storage medium based on combination
Nikomborirak The ASEAN Economic Community (AEC): Myths and Realities
CN108805324A (en) A kind of distribution method and its equipment of corporate resources
CN108231152A (en) Medicine prescription result generation method and device
CN112132425A (en) Performance distribution processing method, device, medium and terminal equipment
CN107515816A (en) The method and server of a kind of data statistics
CN108683581A (en) Mail triggering method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180209