CN111898143A - Dynamic authority management method, device and terminal - Google Patents

Dynamic authority management method, device and terminal Download PDF

Info

Publication number
CN111898143A
CN111898143A CN202010686718.6A CN202010686718A CN111898143A CN 111898143 A CN111898143 A CN 111898143A CN 202010686718 A CN202010686718 A CN 202010686718A CN 111898143 A CN111898143 A CN 111898143A
Authority
CN
China
Prior art keywords
management
authority
dynamic
field
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010686718.6A
Other languages
Chinese (zh)
Other versions
CN111898143B (en
Inventor
程洪彬
连守财
潘胜逖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jinher Software Co Ltd
Original Assignee
Beijing Jinher Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jinher Software Co Ltd filed Critical Beijing Jinher Software Co Ltd
Priority to CN202010686718.6A priority Critical patent/CN111898143B/en
Publication of CN111898143A publication Critical patent/CN111898143A/en
Application granted granted Critical
Publication of CN111898143B publication Critical patent/CN111898143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a dynamic authority management method, a device and a terminal, wherein the dynamic authority management method comprises the steps of establishing a dynamic authority range table, wherein the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing the management range of the manager; and acquiring login information of the manager, matching the login information with the identity field, and granting management authority to the manager according to a matching result. The method and the system can dynamically change the management authority of the administrator along with the change of the management range of the service mark field storage administrator, meet the control of the service data range under different scenes, realize the continuous expansion of the service by expanding the management range of the service mark field storage administrator, and have strong flexibility.

Description

Dynamic authority management method, device and terminal
Technical Field
The application belongs to the technical field of authority management, and particularly relates to a dynamic authority management method, a dynamic authority management device and a terminal.
Background
The authority management means that users can access and only can access self authorized resources according to the security rules or security policies set by the system. Service systems created by low-code platforms often involve control of data ranges, and the data ranges of services viewed by different users after entering the system are different. Therefore, how to control the data range is an important aspect of authority management, for example, with an examination module created by a low-code platform, a teacher in class a sees the examination paper in class a, and cannot see the examination paper in class B; the major annual supervisor can not see the test paper of two major shifts when seeing the test paper of one major shift.
The traditional data range control method is based on an organization hierarchy structure, for example, managers in property companies control and manage personnel information in the companies according to the hierarchy relationship of the companies, managers of each company and each unit in the property management building manage the personnel information of the company, and the management of the authority of each company and each unit is completely independent. However, in special cases, the requirement of authority management cannot be satisfied based on the organization hierarchy, for example, in a special period, a manager in a government department or a property company needs to acquire the management authority of all persons in the property management building, rather than acquiring the management authority of only the person in the company. Therefore, the traditional data range control method has insufficient flexibility, is not easy to expand, and cannot meet the requirement of dynamic authority management.
Disclosure of Invention
In order to overcome the problems that the traditional data range control method is not enough in flexibility, is not easy to expand and cannot meet the requirements of dynamic authority management at least to a certain extent, the application provides a dynamic authority management method, a device and a terminal.
In a first aspect, the present application provides a dynamic rights management method, including:
creating a dynamic authority range table, wherein the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing a management range of the manager;
and acquiring login information of a manager, matching the login information with the identity field, and granting management authority to the manager according to a matching result.
Further, the service marking field stores a service data table, and the granting of the management authority to the administrator according to the matching result includes:
searching a corresponding service data table according to the matching result;
and granting the management authority of the manager to the corresponding service data table.
Further, the dynamic range of authority table further includes:
a hierarchy field for defining a hierarchy data management authority of an administrator.
Further, the granting of the management authority of the administrator to the corresponding service data table includes:
the business data table comprises a hierarchy field, and the hierarchy field in the dynamic authority range table is matched according to the hierarchy field of the business data table;
screening the service data in the service data table according to the matching result;
and granting the management authority of the administrator to the screened business data.
Further, the method also comprises the following steps:
establishing a service system;
acquiring service data in the service data table according to the service system;
and/or the presence of a gas in the gas,
and updating the service data in the service data table according to the service system.
Furthermore, the number of the hierarchy fields is multiple, and the hierarchy fields are expanded according to the service types.
Furthermore, the number of the service data tables is multiple, and the number of the service data tables corresponds to the number of the management services and is increased along with the increase of the number of the management services.
Further, the identity field includes:
administrator name and administrator account number.
In a second aspect, the present application provides a dynamic rights management device, comprising:
the system comprises a creating module, a dynamic authority range table and a management module, wherein the creating module is used for creating the dynamic authority range table, the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing a management range of the manager;
and the authorization module is used for acquiring login information of a manager, matching the login information with the identity field and granting management authority to the manager according to a matching result.
In a third aspect, the present application provides a terminal, comprising:
a processor; and
a memory having computer readable instructions stored thereon which, when executed by the processor, implement the dynamic rights management method of any one of the first aspects.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
the dynamic authority management method, the device and the terminal provided by the embodiment of the invention have the advantages that the dynamic authority range table is created, the dynamic authority range table comprises the identity field and the service mark field, the identity field is used for storing the identity information of a manager, the service mark field is used for storing the management range of the manager, the login information of the manager is obtained, the login information is matched with the identity field, the manager is granted with the management authority according to the matching result, the management authority of the manager can be dynamically changed along with the change of the management range of the manager stored in the service mark field, the control of the service data range under different scenes is met, the continuous expansion of the service is realized by expanding the management range of the manager stored in the service mark field, and the flexibility is strong.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart of a dynamic rights management method according to an embodiment of the present application.
Fig. 2 is a flowchart of a dynamic rights management method according to another embodiment of the present application.
Fig. 3 is a flowchart of another dynamic rights management method according to an embodiment of the present application.
Fig. 4 is a functional block diagram of a dynamic rights management device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart of a dynamic rights management method according to an embodiment of the present application, and as shown in fig. 1, the dynamic rights management method includes:
s11: creating a dynamic authority range table, wherein the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing a management range of the manager;
s12: and acquiring login information of the manager, matching the login information with the identity field, and granting management authority to the manager according to a matching result.
In some embodiments, the identity field comprises: administrator name and administrator account number.
The traditional data range control method is based on an organization hierarchical structure, once the organization hierarchical structure is formed and is not easy to change, the hierarchical structure comprises different types of hierarchical data, the hierarchy, class hierarchy, administrative division hierarchy, garden hierarchy and the like can be organized, authority management of the hierarchical data is independent, and therefore the traditional data range control method is not flexible enough, cannot be changed along with scene change, is not easy to expand and cannot meet requirements of dynamic authority management.
In the embodiment, a dynamic authority range table is created, the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, the service marking field is used for storing a management range of the manager, login information of the manager is obtained, the login information is matched with the identity field, the manager is granted with management authority according to a matching result, the management authority of the manager can be dynamically changed along with the change of the management range of the service marking field storage manager, the control of service data ranges under different scenes is met, continuous expansion of services is achieved by expanding the management range of the service marking field storage manager, and the flexibility is strong.
An embodiment of the present invention provides another dynamic rights management method, which is shown in a flowchart in fig. 2, and includes:
s21: the service mark field stores a service data table, and the corresponding service data table is searched according to the matching result;
the service data table is, for example, a bayonet service data table, as shown in table 1:
TABLE 1 service data sheet
Figure RE-GDA0002651063990000051
S22: and granting the management authority of the corresponding business data table to the manager.
In some embodiments, the dynamic range of authority table further comprises: and the hierarchy field is used for limiting the hierarchy data management authority of the administrator. The dynamic range of authority table is shown in table 2:
TABLE 2 dynamic Range of Authority Table
Figure RE-GDA0002651063990000061
As shown in fig. 3, the granting of the management authority of the service data table corresponding to the manager includes:
s221: matching the hierarchy field in the dynamic authority range table according to the hierarchy field of the service data table;
s222: screening the service data in the service data table according to the matching result;
s223: and granting the management authority of the manager to the screened business data.
For example, lie III is a worker on the upper street, and originally, he only has the personnel management authority of the working unit where he is, and in a special period, he needs to be responsible for the authority management of the personnel who enter and exit the upper street, but the authority limit of the original organization level cannot meet the authority management requirement.
The dynamic authority range control of lie III is realized by expanding a service system:
step 1, creating a dynamic authority range table, and inputting Li III information as shown in a table 2;
step 2, a service system for bayonet management is established by using a low-code platform: people entering the building need to fill in relevant conditions of the people;
for example, the name, the mobile phone number, the body temperature, whether the user goes through the designated area or not, and the system can automatically store the region information into the system according to the status value of the current building to serve as the condition for screening and matching.
Step 3, the user enters a service system managed by the checkpoint after scanning the two-dimensional code through the intelligent terminal, fills in a checkpoint entering and exiting personnel information form, stores a record in a checkpoint service data table in a database at the moment, and stores information of administrative areas of the building in Level1-Level6 as shown in table 1.
Step 4, storing the 'Bayonet service data table' into a service marking field corresponding to the Lisan identity field in the dynamic authority range table;
step 5, Li III is a worker on the street on the ground, and the worker manages the data in the bayonet management system, but only views the data of the street on the ground with the address; the range managed by the user is imported into a dynamic authority range table, and level1-level6 records the administrative region managed by the user.
And 6, checking the information of the personnel entering and exiting the Lisanchi entrance system, matching the data values in the level1-level6 of the Bayonet business data table with the data values in the level1-level6 of the dynamic authority range table by the system, and filtering the information of the personnel entering and exiting the upper street Bayonet with authority.
Through the steps, the authority of the manager can be adjusted according to the application scene, and dynamic authority distribution of the manager is achieved.
In some embodiments, further comprising:
establishing a service system;
acquiring service data in a service data table according to a service system;
or, updating the service data in the service data table according to the service system.
For example, a service system managed by a card port is created, and a card port service data table is obtained, wherein the card port service data table comprises service data such as a card punching building, a card punching person name, an account number, whether a designated area is visited or not, and the like.
As an optional implementation manner of the present invention, the number of the hierarchy fields is multiple, and the hierarchy fields are expanded according to the service type.
For example, if score management service is added, a school field, an age field, a class field and the like are added to the level field, and management authority of a manager is screened out according to the level field.
The business data tables correspond to the business system, for example, the score query system comprises score recording business tables, the number of the business data tables is multiple, the number of the business data tables corresponds to the number of the management business, and the business data tables are increased along with the increase of the number of the management business.
Therefore, other service systems are expanded subsequently, as long as the corresponding level fields are included, the authorization mechanism can still support, and the dynamic authority management of the change amount of the system can be reduced to adapt to different application scenarios.
In the embodiment, the purpose of controlling the service data range by the manager in different scenes is met by dynamically adjusting the level field and the association between the level field and the service data table, and the flexibility of authority allocation is improved.
An embodiment of the present invention provides a dynamic rights management device, as shown in a functional structure diagram of fig. 4, where the dynamic rights management device includes:
the creating module 41 is configured to create a dynamic permission range table, where the dynamic permission range table includes an identity field and a service tag field, the identity field is used to store identity information of a manager, and the service tag field is used to store a management range of the manager;
and the authorization module 42 is used for acquiring login information of the manager, matching the login information with the identity field, and granting management authority to the manager according to a matching result.
In the embodiment, a dynamic authority range table is created through a creation module, the dynamic authority range table comprises an identity field and a service mark field, the identity field is used for storing identity information of a manager, the service mark field is used for storing a management range of the manager, an authorization module acquires login information of the manager, the login information is matched with the identity field, the manager is granted with management authority according to a matching result, the management authority of the manager can be dynamically changed along with the change of the management range of the service mark field storage manager, the control of service data ranges under different scenes is met, and the continuous expansion of services is realized by expanding the management range of the service mark field storage manager, so that the flexibility is strong.
An embodiment of the present invention provides a terminal, including: a processor; and
a memory having computer readable instructions stored thereon which, when executed by the processor, implement a dynamic rights management method as in any one of the above embodiments.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
It should be noted that the present invention is not limited to the above-mentioned preferred embodiments, and those skilled in the art can obtain other products in various forms without departing from the spirit of the present invention, but any changes in shape or structure can be made within the scope of the present invention with the same or similar technical solutions as those of the present invention.

Claims (10)

1. A dynamic rights management method, comprising:
creating a dynamic authority range table, wherein the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing a management range of the manager;
and acquiring login information of a manager, matching the login information with the identity field, and granting management authority to the manager according to a matching result.
2. The dynamic authority management method according to claim 1, wherein the service flag field stores a service data table, and the granting of the management authority to the manager according to the matching result comprises:
searching a corresponding service data table according to the matching result;
and granting the management authority of the manager to the corresponding service data table.
3. The dynamic rights management method of claim 2 wherein the dynamic rights range table further comprises:
a hierarchy field for defining a hierarchy data management authority of an administrator.
4. The dynamic authority management method according to claim 3, wherein the granting of the management authority of the administrator to the corresponding service data table includes:
the business data table comprises a hierarchy field, and the hierarchy field in the dynamic authority range table is matched according to the hierarchy field of the business data table;
screening the service data in the service data table according to the matching result;
and granting the management authority of the administrator to the screened business data.
5. The dynamic rights management method according to any of claims 1 to 4, further comprising:
establishing a service system;
acquiring service data in the service data table according to the service system;
and/or the presence of a gas in the gas,
and updating the service data in the service data table according to the service system.
6. The dynamic rights management method of claim 3 wherein the number of the hierarchy fields is multiple, and the hierarchy fields are extended according to the type of service.
7. The dynamic privilege management method according to claim 2, wherein the number of the service data tables is multiple, and the number of the service data tables corresponds to the number of the management services and increases with the increase of the number of the management services.
8. The dynamic rights management method of claim 1 wherein the identity field comprises:
administrator name and administrator account number.
9. A dynamic rights management device, comprising:
the system comprises a creating module, a dynamic authority range table and a management module, wherein the creating module is used for creating the dynamic authority range table, the dynamic authority range table comprises an identity field and a service marking field, the identity field is used for storing identity information of a manager, and the service marking field is used for storing a management range of the manager;
and the authorization module is used for acquiring login information of a manager, matching the login information with the identity field and granting management authority to the manager according to a matching result.
10. A terminal, comprising:
a processor; and
a memory having stored thereon computer readable instructions which, when executed by the processor, implement the dynamic rights management method of any of claims 1-8.
CN202010686718.6A 2020-07-16 2020-07-16 Dynamic authority management method, device and terminal Active CN111898143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010686718.6A CN111898143B (en) 2020-07-16 2020-07-16 Dynamic authority management method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010686718.6A CN111898143B (en) 2020-07-16 2020-07-16 Dynamic authority management method, device and terminal

Publications (2)

Publication Number Publication Date
CN111898143A true CN111898143A (en) 2020-11-06
CN111898143B CN111898143B (en) 2024-04-16

Family

ID=73189610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010686718.6A Active CN111898143B (en) 2020-07-16 2020-07-16 Dynamic authority management method, device and terminal

Country Status (1)

Country Link
CN (1) CN111898143B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102903029A (en) * 2012-09-27 2013-01-30 广东亿迅科技有限公司 Domain-partitioned authorization method for cloud computing resources
KR20140007244A (en) * 2012-07-09 2014-01-17 (주)에스티이지 It service management method and system, recording medium therefor
US20150363478A1 (en) * 2008-07-11 2015-12-17 Michael N. Haynes Systems, Devices, and/or Methods for Managing Data
US20170329957A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
CN109816218A (en) * 2019-01-04 2019-05-28 深圳壹账通智能科技有限公司 Management of enterprise operation method, apparatus, computer equipment and storage medium
CN110197058A (en) * 2019-04-15 2019-09-03 杭州恩牛网络技术有限公司 Unified internal control method for managing security, system, medium and electronic equipment
CN110213246A (en) * 2019-05-16 2019-09-06 南瑞集团有限公司 A kind of wide area multiple-factor identity authorization system
CN110457539A (en) * 2019-06-10 2019-11-15 平安科技(深圳)有限公司 List data processing method, device, electric terminal and storage medium
CN110474897A (en) * 2019-08-06 2019-11-19 合肥泓泉档案信息科技有限公司 A kind of file permission management system
CN111107044A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Data security management method and information management platform

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363478A1 (en) * 2008-07-11 2015-12-17 Michael N. Haynes Systems, Devices, and/or Methods for Managing Data
KR20140007244A (en) * 2012-07-09 2014-01-17 (주)에스티이지 It service management method and system, recording medium therefor
CN102903029A (en) * 2012-09-27 2013-01-30 广东亿迅科技有限公司 Domain-partitioned authorization method for cloud computing resources
US20170329957A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
CN111107044A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Data security management method and information management platform
CN109816218A (en) * 2019-01-04 2019-05-28 深圳壹账通智能科技有限公司 Management of enterprise operation method, apparatus, computer equipment and storage medium
CN110197058A (en) * 2019-04-15 2019-09-03 杭州恩牛网络技术有限公司 Unified internal control method for managing security, system, medium and electronic equipment
CN110213246A (en) * 2019-05-16 2019-09-06 南瑞集团有限公司 A kind of wide area multiple-factor identity authorization system
CN110457539A (en) * 2019-06-10 2019-11-15 平安科技(深圳)有限公司 List data processing method, device, electric terminal and storage medium
CN110474897A (en) * 2019-08-06 2019-11-19 合肥泓泉档案信息科技有限公司 A kind of file permission management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
卓彦君: "基于工作流技术的办公审批系统的设计与实现", 信息科技, no. 4, 15 April 2018 (2018-04-15), pages 63 - 74 *

Also Published As

Publication number Publication date
CN111898143B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CA2599518C (en) Enterprise entitlement framework
Abzug et al. Nonprofit boards: Crucibles of expertise or symbols of local identities?
Eloff et al. Information security management: a new paradigm
US7870156B2 (en) Organizational reference data and entitlement system with entitlement generator
US20140130140A1 (en) Security in a geo-spatial environment
US20140123247A1 (en) Nextdoor neighbor connect
US8631504B2 (en) Document security within a business enterprise
JP5192821B2 (en) System and method for maintaining business continuity
CN111858615B (en) Database table generation method, system, computer system and readable storage medium
JP2011048843A (en) System and method for corporate-wide policy management
CN113821777B (en) Authority control method and device, computer equipment and storage medium
Voutssas Long‐term digital information preservation: challenges in Latin America
US20070162320A1 (en) Document security within a business enterprise
Wandl et al. Investigating functional mix in Europe's dispersed urban areas
CN111898143A (en) Dynamic authority management method, device and terminal
US20230083054A1 (en) System and method for sql server resources and permissions analysis in identity management systems
CN113255000A (en) Data access control method and device, electronic equipment and readable storage medium
CN107729097A (en) Displayed page collocation method and relevant device
CN109992996B (en) Data query control method and device and storage medium
CN109615570B (en) Education portal management system and management method based on social network
CN116594536A (en) Node processing method and device related to organization architecture, electronic equipment and storage medium
US8290979B1 (en) Software architecture for access control based on hierarchical characteristics
DE112022003063T5 (en) DATA GOVERNANCE SYSTEMS AND PROCEDURES
Koteshwariah et al. A fuzzy version of generalized DBSCAN clustering algorithm
JP2004318245A (en) Information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant