CN108416230A - A kind of data access method based on data isolation model - Google Patents

A kind of data access method based on data isolation model Download PDF

Info

Publication number
CN108416230A
CN108416230A CN201810246186.7A CN201810246186A CN108416230A CN 108416230 A CN108416230 A CN 108416230A CN 201810246186 A CN201810246186 A CN 201810246186A CN 108416230 A CN108416230 A CN 108416230A
Authority
CN
China
Prior art keywords
data
access
role
data access
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810246186.7A
Other languages
Chinese (zh)
Other versions
CN108416230B (en
Inventor
韩鹏
李国勇
王燕霞
熊黎丽
任杰
李洪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Academy of Science and Technology
Original Assignee
Chongqing Academy of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Academy of Science and Technology filed Critical Chongqing Academy of Science and Technology
Priority to CN201810246186.7A priority Critical patent/CN108416230B/en
Publication of CN108416230A publication Critical patent/CN108416230A/en
Application granted granted Critical
Publication of CN108416230B publication Critical patent/CN108416230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of data access methods based on data isolation model,It distinguishes the service database range that variant hierarchical organization has been isolated using data isolation model,And the access role of corresponding data access rights is established for different data business,For the sub- role of different operation task creation corresponding data access rights,And the data access authority that sub- role has is built using the attaching relation between sub- role and access role,In the organizational hierarchy structure for meeting multi-layer between variant hierarchical organization to the different demands of data traffic management while,Not only ensure the data isolation between the service database range of different levels tissue,And it also can ensure that the access rights authorizing secure between the service database range of different levels tissue,Reach simplified to access rights design in turn and access privilege control security requirement takes into account,To provide better safety guarantee different from the operation task execution under data service.

Description

A kind of data access method based on data isolation model
Technical field
The present invention relates to big data information security management technical fields, and in particular to a kind of number based on data isolation model According to access method.
Background technology
Currently, generation information technology and manufacturing industry depth integration, it is positive to cause new round industry transformation.China's manufacturing industry is wanted Using the intelligence manufacture for being based on " internet+manufacturing industry " as main direction, comprehensive integration level is improved, the development road of conservation culture is walked Road.Information technology Internet-based rapidly develops the IT application process for greatly accelerating manufacturing business.Building waste resource Change is intended to convert building waste and other waste resources to renewable resource by orienting harmlessness disposing, and deep processing is at more Kind end product, creates a kind of new Mode of Circular.Construction refuse resource is related to building full industrial chain, supply chain and valence It is worth chain, the intelligent level for also needing " internet+" to promote resource regeneration, recycle is construction refuse resource item Mesh popularization provides important opportunity and development space.By implementing the ERP system of grouping of the world economy, generation, fortune from building waste Defeated, disposition, the quality surveillance of recycling to terminal regeneration product are digitized management to full industrial chain, carry out in region Building waste Resources Prediction is analyzed, allotment in real time and monitoring, with accurate judgement and holds industry development state, implementation is precisely matched It sets, dynamic management, improves the synthesized competitiveness of full industrial chain.With construction refuse resource industry intelligent development quickening and The development of Internet information technique, the information management system based on Web become the mainstream of enterprise information management system exploitation, Information security issue also becomes focus of attention, and is managed to user right, is one of guarantee information system safety Important means.Access control is for the defensive measure gone beyond one's commission using system resource, it passes through the behavior of user in limitation system And operation, ensure that system resource controllably, is legally used, is a kind of key technology for ensureing enterprise information security.
Access control based roles(Role-based Access Control, RBAC)Model is at present in large-scale quotient The safety access control method of industry system maturation application.It completes authorizing and taking for user right by distributing and cancelling role Disappear, and role's allocation rule is provided.Safety manager defines various roles as needed, and suitable access right is arranged Limit, and user is designated as different roles again according to its responsibility and qualifications and record of service.Authorization due to RBAC models and mandate Model it is easy to maintain efficiently, therefore as the ideal chose of Permission Management Model under open environment.
However, for grouping of the world economy company for the demand of data traffic management, the access control of existing based role Simulation(That is RBAC model)But cannot have good applicability.Since grouping of the world economy company often has the organized layer of multi-layer Level structure, in organizational hierarchy structure between variant hierarchical organization, the not only attaching relation with upper and lower level, and also it is different Not only independence had been emphasized between hierarchical organization but also has emphasized relevance, therefore had also been deposited between the service database range of different levels tissue It in ownership, the relationship of intersection, but needs to have independent, isolation access rights limitation and requires so that ERP system (Enterprise Resource Planning, Enterprise Resources Plan)Rights management have complexity and dynamic;And show RBAC model in be all static, i.e., access of each role in service database range for the control of access rights Permission is, if directly applying existing RBAC model under the ERP system of grouping of the world economy company, to be easy for leading by static settings Cause asks that permission is difficult to adapt to the access rights demand of the service database range of different levels tissue by the role of static cost control, leads Access mechanism is caused rigid or permission granularity occur inadequate(That is rhetorical question permission minimum zone is inadequate);And if to meet variant layer To the different demands of data traffic management between grade tissue, just need to build a large amount of role under existing RBAC model, and Can cause many roles data access authority exist intersect, not only so that role establish workload it is huge, but also be easy because The cross-cutting issue of data access authority between different role and cause role distribute error, cause data access authority distribution improperly Problem is unfavorable for effective control to data isolation and access rights authorizing secure.
Therefore, how the demand for grouping of the world economy company to data traffic management provides applicable data access authority control Scheme, and ensure the data isolation between the service database range of different levels tissue and access rights authorizing secure, It is to have problem to be solved.
Invention content
Aiming at the above shortcomings existing in the prior art, the purpose of the present invention is to provide one kind being based on data isolation model Data access method, to data between variant hierarchical organization in the organizational hierarchy structure to solve how to meet multi-layer The different demands of service management and ensure the data isolation between the service database range of different levels tissue and access right The problem of limiting authorizing secure.
To achieve the above object, the system solution that present invention use can be following:
A kind of data access method based on data isolation model, including:
According to the limitation of the service database range of variant hierarchical organization in the organizational hierarchy structure of data traffic management, structure Data isolation model for distinguishing isolation different business database range, to distinguish isolation using the data isolation model The service database range of variant hierarchical organization;
Limitation requirement according to different data business in data traffic management to data access authority in service database, difference needle Has the access role of corresponding data access rights to each data service structure;Also according to the difference behaviour in different data business Make limitation requirement of the task to data access authority in service database, is directed to respectively in each data service and has execution accordingly Each access role of operation task permission, the data for having execution corresponding operating task that structure belongs to the access role are visited Ask the sub- role of permission;Also, build each access role and its role-security label of sub- role;
In data access, isolation limitation institute is distinguished using the data isolation model according to the hierarchical organization accessed belonging to user The service database range of access, and be the access user configuration phase according to the data service or/and operation task accessed Corresponding role-security label, and then realized according to the corresponding access role of role-security label configured or/and sub- role To accessing the data access authority control of user.
In the above-mentioned data access method based on data isolation model, preferably, the data traffic management Organizational hierarchy structure is tree;
The data access range and all operationss of total data business are corresponded in the root node hierarchical organization of organizational hierarchy structure The data access range of task;Remaining each hierarchical organization, then from the corresponding data of father node hierarchical organization of corresponding hierarchical organization The data access range for the data service that corresponding hierarchical organization is able to access that is screened in business, and is determined in each data service The corresponding data access range of different operation task, and then the corresponding variant data service of determining corresponding hierarchical organization is to data Limitation requirement of the variant operation task to data access profile in access profile and each data service.
In the above-mentioned data access method based on data isolation model, preferably, each access role institute The data access authority having is that the access role accesses minimum data access profile necessary to its corresponding data service Data access authority.
In the above-mentioned data access method based on data isolation model, preferably, each sub- role has The total data access rights of its standby access role belonged to, and it is also equipped at least one access role that it is belonged to institute not The data access authority having.
In the above-mentioned data access method based on data isolation model, preferably, in data access, distinguishing After isolation limits accessed service database range, the role of access role corresponding to the data service first according to access weighs Label is limited, to access the data access authority that user assigns corresponding access role, carries out the permission control of data access;When and Only when the operation task in executing data service and corresponding operating task are activated execution, just appointed according to corresponding operation The role-security label of the corresponding sub- role of business configuration, to access the data access authority that user assigns corresponding sub- role, into The permission of row data access controls;When operation task in data service is finished, then corresponding operation is withdrawn immediately and is appointed The role-security label of the corresponding sub- role of business, revocation access data access authority of the user to corresponding sub- role, and with the son The permission that the data access authority for the access role that role is belonged to carries out data access to accessing user controls.
Compared with the prior art, the invention has the advantages that:
1, the present invention is based on the data access methods of data isolation model, and variant layer has been isolated using the differentiation of data isolation model The service database range of grade tissue, and for different data business establish the access role of corresponding data access rights, be directed to The sub- role of different operation task creation corresponding data access rights, and utilize the attaching relation between sub- role and access role Build the data access authority that sub- role has, in the organizational hierarchy structure for meeting multi-layer variant hierarchical organization it Between to the different demands of data traffic management while, between the service database range for not only ensuring different levels tissue Data isolation, and avoiding the different access role and avoid structure greatly that structure mass data access rights repeat Under the premise of measuring the sub- role that data access authority has intersection, additionally it is possible to ensure the service database range of different levels tissue Between access rights authorizing secure, and then reached to access rights design simplify and access privilege control security requirement Take into account.
2, the present invention is based on the data access methods of data isolation model, additionally it is possible to by executing operation in data service The flexible allocation of the task of data access authority when to(for) access role and sub- role controls so that configures and grasps in system administration Make tasks execution phases to prevent the expansion of user's access permission and generate fraud, for different from the behaviour under data service Better safety guarantee is provided as task execution.
Description of the drawings
Fig. 1 is that the present invention is based on the framework schematic diagrames of the data access method of data isolation model.
Specific implementation mode
Be directed to demand of the grouping of the world economy company to data traffic management, due in the organizational hierarchy structure of its multi-layer it is each not There are different demands to data traffic management between hierarchical organization, for this purpose, the present invention provides one kind being based on data isolation mould The data access method of type, this method comprises the following steps:
Step A:According to the limit of the service database range of variant hierarchical organization in the organizational hierarchy structure of data traffic management System, data isolation model of the structure for distinguishing isolation different business database range, to utilize the data isolation model Distinguish the service database range that variant hierarchical organization is isolated;
Step B:Limitation requirement according to different data business in data traffic management to data access authority in service database, It is directed to the access role that each data service structure has corresponding data access rights respectively;Also according in different data business Limitation requirement of the different operation task to data access authority in service database, is directed to have in each data service respectively and hold Each access role of row corresponding operating task right, structure belong to having for the access role and execute corresponding operating task The sub- role of data access authority;Also, build each access role and its role-security label of sub- role;
Step C:In data access, according to access user belonging to hierarchical organization using the data isolation model distinguish every The service database range accessed from limitation, and according to the data service or/and operation task accessed, used for the access Family configures corresponding role-security label, and then according to the corresponding access role of role-security label or/and son configured Role realizes the data access authority control to accessing user.
In the present invention is based on the data access method of data isolation model, due to distinguishing isolation using data isolation model The service database range of variant hierarchical organization is needed in data access according to the hierarchical organization accessed belonging to user Isolation is distinguished using data isolation model and limits accessed service database range, therefore ensure that the industry of different levels tissue Data isolation between database range of being engaged in.And under the premise of ensuring data isolation, for the number of grouping of the world economy company For service management demand, often there is identical data service in the data traffic management of different levels tissue, only not With hierarchical organization, corresponding service database range is different, therefore identical in the requirement of the data traffic management of different levels tissue The service database object that data service is accessed is different, allows in this way, in the data traffic management of different levels tissue Independent data access control is executed using identical access role for identical data service, there is feasibility;Cause This, when establishing access role, there is no need to distinguish the difference for the service database range for considering different levels tissue, it is only necessary to Limitation requirement of the different data business to data access authority in service database in data traffic management is considered, to be directed to respectively Each data service structure has the access role of corresponding data access rights, that is to say, that is even directed to different levels The service database range of tissue, according to different data business to service database the limitation of data access authority require structure It, can be no longer if the access role for having the data access authority of corresponding data business has existed when building access role It repeats to build;In this way, avoiding to repeat for the data traffic management structure mass data access rights of different levels tissue Different access role.Moreover, in the present invention is based on the data access method of data isolation model, also according to different numbers Limitation requirement according to the different operation task in business to data access authority in service database, is directed to each data industry respectively Have each access role for executing corresponding operating task right in business, construct belong to the access role have execution phase Answer the sub- role of the data access authority of operation task;When it is implemented, can design each sub- role is provided with its institute The total data access rights of the access role of ownership, and it is also equipped with what its at least one access role belonged to did not had Data access authority, certainly, the data access authority that its access role belonged to that every sub- role has does not have is answered When being that the sub- role executes data access authority necessary to its corresponding operation task;Since in this way so that each data industry The relations of distribution of the data access authority of execution different operation task between different sub- roles, which are also more prone to distinguish, in business distinguishes Analysis, and due to can to avoid data access authority repeat different access role largely exist, successively premised on, then utilizing Attaching relation between sub- role and access role builds the data access authority that sub- role has, also just significantly There is asking for the sub- role intersected in the data traffic management structure mass data access rights evaded for different levels tissue Topic.As a result, in data access, isolation is being distinguished using the data isolation model according to the hierarchical organization accessed belonging to user After the accessed service database range of limitation, according to the data service or/and operation task accessed, match to access user Corresponding role-security label is set, it is real further according to the corresponding access role of role-security label configured or/and sub- role Now to the data access authority control of access user, in the organizational hierarchy structure for meeting multi-layer between variant hierarchical organization While to the different demands of data traffic management, the number between the service database range of different levels tissue is not only ensured According to isolation, and avoiding the different access role and avoid structure largely that structure mass data access rights repeat Data access authority exist intersect sub- role under the premise of, additionally it is possible to ensure different levels tissue service database range it Between access rights authorizing secure, and then reached to design access rights and simplify and access privilege control security requirement It takes into account.
In the present invention is based on the data access method of data isolation model, the sequence between above-mentioned step A, step B There is no limit can mutually exchange;Step C then needs to rely on step A and step B and is carried out.
For grouping of the world economy company, in organizational hierarchy structure between variant hierarchical organization, often there are levels The attaching relation of grade, is directed to such organizational hierarchy structure type, and the organizational hierarchy structure of data traffic management should be set It is calculated as tree;And in the root node hierarchical organization of organizational hierarchy structure, it is exactly often the parent company of group company, therefore group The root node hierarchical organization of tissue layer level structure should correspond to the data access range and all operationss task of total data business Data access range;And remaining each hierarchical organization, due to having the attaching relation of upper and lower level with his father's node hierarchical organization, Therefore except remaining each hierarchical organization of root node hierarchical organization, the father node hierarchical organization from corresponding hierarchical organization should be designed as The data access range for the data service that corresponding hierarchical organization is able to access that is screened in corresponding data service, and is determined per number According to the corresponding data access range of different operation task in business, and then determine the corresponding variant data of corresponding hierarchical organization Limitation requirement of the business to the variant operation task in data access profile and each data service to data access profile. Such data access range distinguishes isolation design mode, more disclosure satisfy that grouping of the world economy company to the data of data traffic management every From property regulatory requirement.
In specific implementation, if in order to provide better safety guarantee, such as machine in some cases for task execution The processing etc. of confidential information, the then data access rights having in each access role of design are prescribed a time limit, and the access role can be designed Only have a data access authority of minimum data access profile necessary to accessing its corresponding data service, and remaining demand Data access authority, this can be realized by the sub- role of its ownership.On the other hand, in order to which the data for improving task execution are pacified Full guard, can also be first according to access after distinguishing isolation and limiting accessed service database range in data access Data service corresponding to access role role-security label, assign the data access of corresponding access role to access user Permission carries out the permission control of data access;And if only if the operation task and corresponding operating task in executing data service Be activated execution when, the role-security label of corresponding sub- role is just configured according to corresponding operation task, is assigned to access user The data access authority for giving corresponding sub- role carries out the permission control of data access;Operation task in data service is held When row finishes, then the role-security label of sub- role corresponding to corresponding operation task is withdrawn immediately, revocation accesses user to phase The data access authority for the access role answered the data access authority of sub- role, and belonged to the sub- role to access user into The permission of row data access controls.Since in this way, before executing operation task, the operation times has been executed even if accessing user and possessing The qualification of business can not also obtain actual data access authority, only after operation task is activated, the number of corresponding sub- role It is just really granted to according to access rights and accesses user;And after operation task terminates, the data access authority of corresponding sub- role is then It is retracted immediately so that access user and have the data access authority executed needed for the operation task no longer, and only have and work as The data access authority that access role corresponding to preceding place data service has, i.e. minimum number necessary to the data service According to the data access authority of access profile, in this way since, prevent visit in system administration configuration and operation tasks execution phases It asks the expansion of user right and generates fraud, to provide better peace different from the operation task execution under data service All risk insurance hinders.
In conclusion the present invention is based on the data access method of data isolation model, using data isolation model distinguish every Service database range from variant hierarchical organization, and it is directed to the visit that different data business establishes corresponding data access rights Ask role, for the sub- role of different operation task creation corresponding data access rights, and using sub- role and access role it Between attaching relation build the data access authority that sub- role has, in the organizational hierarchy structure for meeting multi-layer it is each not While between hierarchical organization to the different demands of data traffic management, the business datum of different levels tissue is not only ensured Data isolation between the range of library, and avoid structure mass data access rights repeat different access role and Under the premise of avoiding the sub- role that structure mass data access rights have intersection, additionally it is possible to ensure the industry of different levels tissue Access rights authorizing secure between database range of being engaged in, and then reached and simplified and access rights control is designed to access rights Security requirement processed takes into account;And the present invention is based on the data access methods of data isolation model, additionally it is possible to by data industry The flexible allocation of the business of data access authority when executing operation task in to(for) access role and sub- role controls so that in system Management configuration and operation task execution stage prevent the expansion of user's access permission and generate fraud, to be different from counting Better safety guarantee is provided according to the operation task execution under business.
Finally illustrate, the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although with reference to reality Example is applied to describe the invention in detail, it will be understood by those of ordinary skill in the art that, it can be to the technical side of the present invention Case is modified or replaced equivalently, and without departing from the objective and range of technical solution of the present invention, should all be covered in the present invention Right in.

Claims (5)

1. a kind of data access method based on data isolation model, which is characterized in that including:
According to the limitation of the service database range of variant hierarchical organization in the organizational hierarchy structure of data traffic management, structure Data isolation model for distinguishing isolation different business database range, to distinguish isolation using the data isolation model The service database range of variant hierarchical organization;
Limitation requirement according to different data business in data traffic management to data access authority in service database, difference needle Has the access role of corresponding data access rights to each data service structure;Also according to the difference behaviour in different data business Make limitation requirement of the task to data access authority in service database, is directed to respectively in each data service and has execution accordingly Each access role of operation task permission, the data for having execution corresponding operating task that structure belongs to the access role are visited Ask the sub- role of permission;Also, build each access role and its role-security label of sub- role;
In data access, isolation limitation institute is distinguished using the data isolation model according to the hierarchical organization accessed belonging to user The service database range of access, and be the access user configuration phase according to the data service or/and operation task accessed Corresponding role-security label, and then realized according to the corresponding access role of role-security label configured or/and sub- role To accessing the data access authority control of user.
2. the data access method according to claim 1 based on data isolation model, which is characterized in that the data service The organizational hierarchy structure of management is tree;
The data access range and all operationss of total data business are corresponded in the root node hierarchical organization of organizational hierarchy structure The data access range of task;Remaining each hierarchical organization, then from the corresponding data of father node hierarchical organization of corresponding hierarchical organization The data access range for the data service that corresponding hierarchical organization is able to access that is screened in business, and is determined in each data service The corresponding data access range of different operation task, and then the corresponding variant data service of determining corresponding hierarchical organization is to data Limitation requirement of the variant operation task to data access profile in access profile and each data service.
3. the data access method according to claim 1 based on data isolation model, which is characterized in that each access The data access authority that role has is that the access role accesses minimum data access necessary to its corresponding data service The data access authority of range.
4. the data access method according to claim 1 based on data isolation model, which is characterized in that each sub- angle Color is provided with the total data access rights for the access role that it is belonged to, and is also equipped at least one access angle that it is belonged to The data access authority that color does not have.
5. the data access method according to claim 1 based on data isolation model, which is characterized in that in data access When, after distinguishing isolation and limiting accessed service database range, angle is accessed corresponding to the data service first according to access The role-security label of color carries out the power of data access to access the data access authority that user assigns corresponding access role Limit control;And if only if when the operation task in executing data service and corresponding operating task are activated execution, just according to phase The role-security label of the corresponding sub- role of operation task configuration answered, the data that corresponding sub- role is assigned to access user are visited It asks permission, carries out the permission control of data access;When operation task in data service is finished, then withdraw immediately corresponding Operation task corresponding to sub- role role-security label, revocation accesses data access authority of the user to corresponding sub- role, And the data access authority of the access role belonged to the sub- role carries out the permission control of data access to accessing user.
CN201810246186.7A 2018-03-23 2018-03-23 Data access method based on data isolation model Active CN108416230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810246186.7A CN108416230B (en) 2018-03-23 2018-03-23 Data access method based on data isolation model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810246186.7A CN108416230B (en) 2018-03-23 2018-03-23 Data access method based on data isolation model

Publications (2)

Publication Number Publication Date
CN108416230A true CN108416230A (en) 2018-08-17
CN108416230B CN108416230B (en) 2019-12-20

Family

ID=63132343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810246186.7A Active CN108416230B (en) 2018-03-23 2018-03-23 Data access method based on data isolation model

Country Status (1)

Country Link
CN (1) CN108416230B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460675A (en) * 2018-10-26 2019-03-12 温州博盈科技有限公司 A kind of enterprise information security management method
CN109829331A (en) * 2018-12-28 2019-05-31 金螳螂家装电子商务(苏州)有限公司 A kind of data managing method based on finishing chain employee unified rights
CN110175437A (en) * 2019-04-11 2019-08-27 全球能源互联网研究院有限公司 It is a kind of for access terminal authorization control method, apparatus and host terminal
CN110188517A (en) * 2018-12-14 2019-08-30 浙江宇视科技有限公司 A kind of the user account number login method and device of based role mode
CN110516450A (en) * 2019-07-23 2019-11-29 平安科技(深圳)有限公司 Data acquisition authority control method, electronic device and computer readable storage medium
CN110569657A (en) * 2019-09-10 2019-12-13 北京字节跳动网络技术有限公司 Data access method, device, equipment and storage medium
CN111079182A (en) * 2019-12-18 2020-04-28 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN113407929A (en) * 2021-02-05 2021-09-17 北京理工大学 Access authorization method and system for research and development design resources
CN114567504A (en) * 2022-03-07 2022-05-31 福建天晴在线互动科技有限公司 Dynamic permission cross management method and system based on web architecture

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8181230B2 (en) * 2008-06-30 2012-05-15 International Business Machines Corporation System and method for adaptive approximating of a user for role authorization in a hierarchical inter-organizational model
CN104331776A (en) * 2014-11-18 2015-02-04 国家电网公司 Electric power data application management platform
CN104537488A (en) * 2014-12-29 2015-04-22 中国南方电网有限责任公司 Enterprise-level information system function authority unified management method
CN106407823A (en) * 2016-09-26 2017-02-15 中国科学院计算技术研究所 A multi-granularity and multi-intensity access control method and system
CN107506655A (en) * 2017-08-08 2017-12-22 北京盛华安信息技术有限公司 Data permission distributes the method with access control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8181230B2 (en) * 2008-06-30 2012-05-15 International Business Machines Corporation System and method for adaptive approximating of a user for role authorization in a hierarchical inter-organizational model
CN104331776A (en) * 2014-11-18 2015-02-04 国家电网公司 Electric power data application management platform
CN104537488A (en) * 2014-12-29 2015-04-22 中国南方电网有限责任公司 Enterprise-level information system function authority unified management method
CN106407823A (en) * 2016-09-26 2017-02-15 中国科学院计算技术研究所 A multi-granularity and multi-intensity access control method and system
CN107506655A (en) * 2017-08-08 2017-12-22 北京盛华安信息技术有限公司 Data permission distributes the method with access control

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460675A (en) * 2018-10-26 2019-03-12 温州博盈科技有限公司 A kind of enterprise information security management method
CN110188517A (en) * 2018-12-14 2019-08-30 浙江宇视科技有限公司 A kind of the user account number login method and device of based role mode
CN109829331A (en) * 2018-12-28 2019-05-31 金螳螂家装电子商务(苏州)有限公司 A kind of data managing method based on finishing chain employee unified rights
CN110175437A (en) * 2019-04-11 2019-08-27 全球能源互联网研究院有限公司 It is a kind of for access terminal authorization control method, apparatus and host terminal
CN110516450A (en) * 2019-07-23 2019-11-29 平安科技(深圳)有限公司 Data acquisition authority control method, electronic device and computer readable storage medium
CN110516450B (en) * 2019-07-23 2023-06-20 平安科技(深圳)有限公司 Data acquisition authority management and control method, electronic device and computer readable storage medium
CN110569657A (en) * 2019-09-10 2019-12-13 北京字节跳动网络技术有限公司 Data access method, device, equipment and storage medium
CN110569657B (en) * 2019-09-10 2021-10-29 北京字节跳动网络技术有限公司 Data access method, device, equipment and storage medium
CN111079182A (en) * 2019-12-18 2020-04-28 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN113407929A (en) * 2021-02-05 2021-09-17 北京理工大学 Access authorization method and system for research and development design resources
CN114567504A (en) * 2022-03-07 2022-05-31 福建天晴在线互动科技有限公司 Dynamic permission cross management method and system based on web architecture
CN114567504B (en) * 2022-03-07 2023-08-25 福建天晴在线互动科技有限公司 Dynamic authority cross management method and system based on web architecture

Also Published As

Publication number Publication date
CN108416230B (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN108416230A (en) A kind of data access method based on data isolation model
US8127132B2 (en) Method and apparatus for executing industrial manufacture
CN100565447C (en) The method and the inking device that are used for monitor procedure control and manufacturing information system application program
CN106250782B (en) A kind of data permission control method and device based on SQL statement parsing
CN109981552B (en) Authority distribution method and device
JP5623271B2 (en) Information processing apparatus, authority management method, program, and recording medium
CN110472886A (en) A kind of data governing system based on block chain
CN109308582A (en) A kind of manufacturing execution system framework based on modularization Yu serviceization
US20070079355A1 (en) Data perspectives in controller system and production management systems
US20080208374A1 (en) Testing utilizing controller engine instances
CN105844142A (en) Safe centralized management and control method of database account
CN104125219A (en) Centralized identity and management method aiming at electric power information system
CN106325883A (en) Development method and system for industry business area information system
CN105184144A (en) Multi-system privilege management method
CN110580148B (en) Integration-oriented EPC project management platform
CN106372469A (en) Process-based database permission automated management system meeting international auditing standards
CN109831529A (en) A kind of integrated architecture of cloud chain number
Wu et al. The Internet of Things enabled shop floor scheduling and process control method based on Petri nets
RU2006144646A (en) METHOD FOR DOCUMENT-ORIENTED ADAPTIVE SECURITY MANAGEMENT
CN103942474B (en) Method for controlling permission three-dimensional model system in software project management process
CN102902916A (en) Authority control method universal for application programs
CN116628681A (en) Authority management method and system based on upper computer monitoring control software
CN111966977B (en) Resource management system of IAM platform
CN103984907B (en) Data safety maintenance system based on ERP
CN108874370B (en) Construction method of building financial Internet integrated system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant