CN101499906A - Method for implementing subscriber authority management based on role function mapping table - Google Patents

Method for implementing subscriber authority management based on role function mapping table Download PDF

Info

Publication number
CN101499906A
CN101499906A CNA2008100706156A CN200810070615A CN101499906A CN 101499906 A CN101499906 A CN 101499906A CN A2008100706156 A CNA2008100706156 A CN A2008100706156A CN 200810070615 A CN200810070615 A CN 200810070615A CN 101499906 A CN101499906 A CN 101499906A
Authority
CN
China
Prior art keywords
authority
role
user
module
functions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100706156A
Other languages
Chinese (zh)
Inventor
时宜
陈晓冰
曹辉标
谢燕玲
杨思超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yaxon Networks Co Ltd
Original Assignee
Xiamen Yaxon Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yaxon Networks Co Ltd filed Critical Xiamen Yaxon Networks Co Ltd
Priority to CNA2008100706156A priority Critical patent/CN101499906A/en
Publication of CN101499906A publication Critical patent/CN101499906A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method for realizing user right management based on a role-to-function mapping table, roughly divides system functions into modules, subdivides the modules into various sub functions, and defines a module plus sub functions as an functional object that can be authorized, thus leading the connection between all the functions to be clearly expressed and easily extending new functional objects according to certain rules; simultaneously the user right management method adopts a four-bytes integer to define the functional object that can be authorized, thus solving the problem of lacking ID.

Description

A kind of method that realizes user authority management based on role function mapping table
Technical field
The present invention relates to a kind of method that realizes user authority management based on role function mapping table.
Technical background
Usually, all related to the function of user right control in the modern man-machine interaction FTP client FTP.For the application system that adopts C/S model, promptly data processing (definition, inquiry and renewal) is then realized by client program by database server centralized management system applies.Under this pattern, business processing logic is deposited in the client program of work station, because its business processing logic difference of user of different identity, if develop the corresponding application program of working with it for every class user separately, undoubtedly can IT system development effortsIT is complicated and prolong construction period, also be unfavorable for later maintenance work.At this situation, in actual development process, the client program of a business department is designed to universal (being about to all functions concentrates on all over the body) usually, and with the selection authorityization of every function, by control of authority is that the user of different identity gives the operations of identity correspondence with it, shield inexecutable operation calls, realize the division of labour with individual responsibility with this.This implementation has reduced the complexity of system development, has shortened the construction cycle, owing to code is concentrated relatively the maintenance work difficulty is reduced simultaneously, so become current exploitation C/S system a kind of implementation commonly used.Adopt this common-mode to design program, control of authority just becomes the operational management core of system, especially aspect maintaining system safety, play an important role, so control of authority Module Design (the control of authority Module Design should be divided into 3 aspects: authority list structural design, the design of rights management mechanism design and running controlling mechanism) just seems very important with realization.
Summary of the invention
The present invention aims to provide a kind of method that realizes user authority management based on role function mapping table.
The present invention is a kind of to realize that based on role function mapping table the method for user authority management is:
(1) by being module with the systemic-function rough segmentation, in each module, segment various subfunctions then, be unique identifier of module assignment: the signless integer module_id of a double-byte representation, for the subfunction of module is distributed a unique identifier: the signless integer subfunc_id of a double-byte representation finally can will can be defined as functions of modules one 4 byte signless integer:
func_id=(module_id<<16)|subfunc_id
(2) to each functions of modules that defines, define an authority word, use 4 byte signless integers to represent.4 byte signless integers have 32 positions, and the specific authority that each represents this functions of modules is 1 or 0 o'clock, represents respectively this functions of modules is possessed this authority or do not have this authority;
(3) (functions of modules, the control of authority word) may be defined as the authority that defines the competence two tuples of description, a plurality of authority two tuples have been described a plurality of authorities to systemic-function, therefrom can go out role's notion by abstract definition: the role promptly has operand all of one group of authority to system.Can in system, use 4 byte signless integers, name character string to come role of mark, use 4 byte signless integers to identify the role herein.
(4) line item of definition authority list is (functions of modules id, role id, a control of authority word), and a role's authority can be that a plurality of authority line items of designated value are stored by role id;
(5) when the define system subscriber's meter, for each user increases role's Field Definition, when increasing the user in the system, can be directly for this reason the user preserve an assigned role, this user can obtain the entrained system access right of role;
(6) user both can authorize by the role and obtain the role-security control law, also can preserve the user right control law of oneself, and role-security control law and user right control law are referred to as role function mapping table;
(7) when logging in system by user, from storage, load role-security control law (if existence) and privately owned user right control law (if existence), the dynamic systematic function operation entry of authority that client possesses according to the user, promptly generate interface display according to authority, the function that does not possess authority for the user does not provide corresponding feature operation inlet; When the user operates intra vires, when causing to the outer funcall of its extent of competence, can before real calling be taken place, whether verifying authorization satisfies once more;
After adopting a kind of method of the present invention, have following some advantage based on role function mapping table realization user authority management:
(1) be module with the systemic-function rough segmentation, in module, segment various subfunctions then, " module+subfunction " is defined as a delegatable functional object, so definition can be with the contact clarity between each function, also be easier to according to the new functional object of certain rules expansion, otherwise only according to the sequencing storage that increases function, and do not carry out cluster, the function of browse definition will be very chaotic when then authorizing.
(2) in the definition of delegatable functional object, adopt the integer of 4 bytes to express, high-order two bytes are expressed module I D, two bytes of low level are expressed module subfunction ID, two effable ID quantity of byte integer are more, basically in the time of can worrying expansion module and function, the not enough problem of using of ID.
(3) in the definition of control of authority, adopt the integer of 4 bytes, in fact promptly adopt 32 positions to express having or not of control of authority, for certain subfunction in the module, it also is enough that 32 kinds of controls of authority are set.
(4) role, user also select 4 byte integer ID to express, and (functional object ID, role, user ID, control of authority word) as a line item value, inserted in file or the database and form role function mapping table.
Embodiment
A preferred embodiment of the present invention is as follows:
1, authority definition method:
(1) be module with the systemic-function rough segmentation, in each module, segment various subfunctions then, subfunction in module and the module defines a kind of extendible expression " module+subfunction ", it is a delegatable functional object, at the functional object of this system's permission definition, form the functional object set of a system.When specifically being applied in the computer system, be unique identifier of module assignment: the signless integer module_id of a double-byte representation, for the subfunction of module is distributed a unique identifier: the signless integer subfunc_id of a double-byte representation, then the function identifier of module subfunction on global sense can use one 4 byte signless integer to represent func_id=(module_id<<16) | subfunc_id, because double byte signless integer maximum can represent 65535, therefore available module identifier and subfunction identifier quantity are more, substantially do not worry not enough problem of distributing, this advantage yet of the present invention just;
(2) to each functions of modules that defines, define an authority word, use 4 byte signless integers to represent.4 byte signless integers have 32 positions, and the specific authority that each represents this functions of modules is 1 or 0 o'clock, represents respectively this functions of modules is possessed this authority or lack of competence;
(3) according to the operating position of each user to system, the user is divided into the customer group of several types, to form role's notion, with (functional object, role) but binary crelation is defined as an authorization object, be that each System Privileges control word of its complementary definition forms (a functional object, the role, control of authority) tlv triple is preserved with file or database form, a role-security control law of formation system visit; Also can be with (functional object, the user) but binary crelation is defined as an authorization object, be each System Privileges control word (functional object of its complementary definition, the user, control of authority) forms a tlv triple, preserve a user right control law of formation system visit with file or database form;
Control of authority is not a simple subroutine module, but lies in a kind of service mechanism in the whole software program frame.Use, is expressed the data record of identify label that comprises these operating personnel of its record, function code and the set of function privilege control bit for the operating personnel of certain operating right of needs based on " function-role " allocation algorithm.
For example, authority block functions sign indicating number is 0x10001, and authority set is " inquiry, newly-built, revise, deletion, authorize ", and control bit is respectively:
0x00000001 ' inquiry is right to play first
0x00000002 ' plays on the newly-built right side second
0x00000004 ' revises right the 3rd
0x00000008 ' deletion is right to play the 4th
0x00000010 ' authorizes right the 5th
All authorities for user 0x00000001 granted rights block functions.
Promptly in database the storage shape as:
0x00000001 0x00010001 0x0000001F
Record (in like manner authorizing other authorities).
2, authority is authorized process
(1) at first, when the role is authorized, functions of modules all in the system need be presented to the selective use of operator.For this reason, can in computer system, set up one three layers tree data structure, be divided in the ground floor storage system and be what modules, relevant information has the sign Id of the text description and the module of module, what subfunctions the second layer is by being divided in each module stores module, relevant information has the Word message statement and the sign Id of subfunction in module of subfunction, the 3rd layer by comprising what authorities altogether under each module subfunction storage subfunction, relevant information has the Word message statement of subfunction permission bits and the value of subfunction permission bits, this tree data structure can be apparent on the man-machine interface.
For the role id of an appointment, active bank query statement: select*from RolePopedom where role_id=role_id_value, inquiry obtains all related system subfunction authorities of this role from the role-security table, value according to module id, module subfunction id, control of authority position, the place is shown at user-machine interface, specifically refer to when corresponding position is changed to 1 in the control of authority word that certain authority writes down in its module subfunction object, then the check box of this authority correspondence is selected, otherwise does not choose.As figure below, suppose role for role id=1, possess the authority 1 of module 1 neutron function 1:
Figure A200810070615D00061
When choosing certain role to carry out Authorized operation, at first should be this role and load the current authority set that has and be shown to the operator at the user-machine interface place.
When (2) carrying out Authorized operation,, come to constitute for operated role's additions and deletions, the authority of revising the subfunction of each module by the state of authority check box on the change interface.Specifically refer to, when the check box of certain authority correspondence of certain module subfunction selected, then corresponding position is changed to 1 in the control of authority word that this authority writes down in its module subfunction object, otherwise be 0, as click the check box of module 1| subfunction 1| authority 1, cancellation is selected, then in the computer system corresponding with module 1| subfunction 1| authority 1 to be eliminated be 0, expression no longer has this authority, and these operations all can finishing with exclusive disjunction by bit field.After all interface operations were finished, all user-machine interfaces by correspondence of the control of authority word of each functions of modules object that comprises in the character object were provided with success;
(3) the renewal statement that calls database upgrades the control of authority word of each module subfunction of operated role in role-security table RolePopedom;
When (4) increasing the user in the system, can be directly user's assigned role for this reason, can obtain the entrained system access right of role;
(5) user both can preserve the user right control law of oneself, also can authorize by the role and obtain the role-security control law, and role-security control law and user right control law are referred to as role function mapping table.
3, authority application process
(1) at first, when program start, from authorize operating file, load complete authority set;
(2) then, use user to login software,, authorize method in the process, choose function and corresponding authority set thereof by interface alternation, and be saved in the database by authority to other users with authorization privilege;
(3) when the login switching takes place the user,, otherwise load in the role-security table from database if Systems Operator Admin then is its additional complete authority set automatically;
(4) in program, provide several authority query function to verify whether current operator has the operating right of certain sub-authority of certain function, certain function, this needs a precondition to be, current operator logins, and loads the control of authority word of each module subfunction in the role-security table from database.Because different authorities is that step-by-step is authorized in the control of authority word, therefore as long as a control of authority word that only comprises permission bits to be checked of structure subfunction to be verified, utilize step-by-step in the computer system and operation method, the control of authority word step-by-step that loads this module subfunction in the authority set that obtains with current operator with, if the result is non-0, represent that then current operator has this authority;
(5) after logining success as the operator, verifying authorization immediately, the observability of each operation interface in the setting program.A feasible method is, all bind one for each operation interface inlet (as menu, toolbar, button etc.) in the system and concentrated the control of authority word that carries out this correlator function of operating required authority, when the system initialization user-machine interface, after the authority query function that provides in (4) in the use is carried out the authority judgement, the observability of some function user-machine interface is set according to result's (whether authority is arranged).When running need dynamically update the observability of operation interface, need to consider simultaneously whether be that authority allows.

Claims (1)

1, a kind of method based on role function mapping table realization user authority management is characterized in that:
(1) by being module with the systemic-function rough segmentation, the various subfunctions of segmentation in each module are unique identifier of module assignment: the signless integer module_id of a double-byte representation then; For the subfunction of module is distributed a unique identifier: the signless integer subfunc_id of a double-byte representation; Finally can will functions of modules can be defined as one 4 byte signless integer:
func_id=(module_id<<16)|subfunc_id
(2) to each functions of modules that defines, define an authority word, use 4 byte signless integers to represent; 4 byte signless integers have 32 positions, and the specific authority that each represents this functions of modules is 1 or 0 o'clock, represents respectively this functions of modules is possessed this authority or do not have this authority;
(3) (functions of modules, the control of authority word) may be defined as the authority that defines the competence two tuples of description, a plurality of authority two tuples have been described a plurality of authorities to systemic-function, therefrom can go out role's notion by abstract definition: role, the i.e. operand of one group of authority that system is had; Can in system, use 4 byte signless integers, name character string to come role of mark, use 4 byte signless integers to identify the role herein;
(4) line item of definition authority list is (functions of modules id, role id, a control of authority word), and a role's authority can be to specify a plurality of authority line items of 4 byte signless integers to store by role id;
(5) when the define system subscriber's meter, for each user increases role's Field Definition, when increasing the user in the system, can be directly for this reason the user preserve assigned role, this user can obtain the entrained system access right of role;
(6) user both can authorize by the role and obtain the role-security control law, also can preserve the user right control law of oneself, and role-security control law and user right control law are referred to as role function mapping table;
(7) when logging in system by user, from storage, load role-security control law and privately owned user right control law, the dynamic systematic function operation entry of authority that client possesses according to the user, promptly generate interface display according to authority, the function that does not possess authority for the user does not provide corresponding feature operation inlet; When the user operates intra vires, when causing to the outer funcall of its extent of competence, can before real calling be taken place, whether verifying authorization satisfies once more.
CNA2008100706156A 2008-02-02 2008-02-02 Method for implementing subscriber authority management based on role function mapping table Pending CN101499906A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100706156A CN101499906A (en) 2008-02-02 2008-02-02 Method for implementing subscriber authority management based on role function mapping table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100706156A CN101499906A (en) 2008-02-02 2008-02-02 Method for implementing subscriber authority management based on role function mapping table

Publications (1)

Publication Number Publication Date
CN101499906A true CN101499906A (en) 2009-08-05

Family

ID=40946798

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100706156A Pending CN101499906A (en) 2008-02-02 2008-02-02 Method for implementing subscriber authority management based on role function mapping table

Country Status (1)

Country Link
CN (1) CN101499906A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894231A (en) * 2010-07-19 2010-11-24 上海三零卫士信息安全技术有限公司 Permission expansion control system and method thereof
CN102118697A (en) * 2009-12-22 2011-07-06 索尼公司 Wireless communication device, wireless communication method, program, and wireless communication system
CN102196127A (en) * 2010-03-08 2011-09-21 株式会社东芝 Image forming apparatus, authority management method of image forming apparatus, and authority management system of image forming apparatus
CN101739526B (en) * 2009-12-16 2012-04-18 北京佳讯飞鸿电气股份有限公司 Service system-oriented and oriented object-based rights management method
CN102510372A (en) * 2011-09-29 2012-06-20 畅捷通信息技术股份有限公司 Assembly authentication system and assembly authentication method
CN101631116B (en) * 2009-08-10 2012-10-17 中国科学院地理科学与资源研究所 Distributed dual-license and access control method and system
CN102750473A (en) * 2012-06-01 2012-10-24 中兴通讯股份有限公司 Authority control method and authority control device
CN102904877A (en) * 2012-09-11 2013-01-30 曙光信息产业(北京)有限公司 Binary serialization role permission management method based on cloud storage
CN103034790A (en) * 2011-09-30 2013-04-10 上海博泰悦臻网络技术服务有限公司 Service system and user permission activation method
CN103065074A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Uniform Resource Locator (URL) authority control method based on fine granularity
CN103177202A (en) * 2011-12-22 2013-06-26 苏州威世博知识产权服务有限公司 Method and system for realizing consulting authority limit management of patent tree
CN103227750A (en) * 2013-04-26 2013-07-31 华为技术有限公司 Method, device and system for controlling message transmission
CN103399882A (en) * 2013-07-18 2013-11-20 司法部司法鉴定科学技术研究所 Proficiency testing data platform
CN103500298A (en) * 2013-10-12 2014-01-08 彩虹集团公司 Method for achieving authorization distribution based on rule management
CN104050401A (en) * 2013-03-12 2014-09-17 腾讯科技(深圳)有限公司 User permission management method and system
CN104519072A (en) * 2015-01-14 2015-04-15 浪潮(北京)电子信息产业有限公司 Authority control method and device
CN104794378A (en) * 2014-06-05 2015-07-22 合肥星服信息科技有限责任公司 Right control based on multigroup binary digit
CN105512515A (en) * 2015-11-30 2016-04-20 上海爱数信息技术股份有限公司 Method for controlling display of function modules based on permission masks
CN105760192A (en) * 2016-02-03 2016-07-13 北京元心科技有限公司 Registration method and device for service module of system server
CN105787317A (en) * 2016-03-23 2016-07-20 中国电力科学研究院 Permission control method based on multi-layer hierarchy system
CN106570421A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 Authority control method and device
CN106682487A (en) * 2016-11-04 2017-05-17 浙江蘑菇加电子商务有限公司 User authority management method and system
CN106778299A (en) * 2016-12-01 2017-05-31 同方知网(北京)技术有限公司 A kind of multiple users concurrent processing system
CN107895249A (en) * 2017-11-25 2018-04-10 深圳市易达云科技有限公司 A kind of order status rendering method and system
CN108921520A (en) * 2017-08-07 2018-11-30 成都牵牛草信息技术有限公司 Count list operation permission grant method
CN109472127A (en) * 2018-10-11 2019-03-15 北京三快在线科技有限公司 Permission processing method, device, using side apparatus and storage medium
CN110753058A (en) * 2019-10-25 2020-02-04 北京浪潮数据技术有限公司 Cross-platform user permission distribution method, system and related device
US11620394B2 (en) 2020-12-22 2023-04-04 International Business Machines Corporation Allocating multiple database access tokens to a single user
WO2023087278A1 (en) * 2021-11-19 2023-05-25 国云科技股份有限公司 Cloud platform permission setting method and apparatus, terminal device, and storage medium

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631116B (en) * 2009-08-10 2012-10-17 中国科学院地理科学与资源研究所 Distributed dual-license and access control method and system
CN101739526B (en) * 2009-12-16 2012-04-18 北京佳讯飞鸿电气股份有限公司 Service system-oriented and oriented object-based rights management method
CN102118697B (en) * 2009-12-22 2016-12-21 索尼公司 Wireless Telecom Equipment, wireless communications method and wireless communication system
CN102118697A (en) * 2009-12-22 2011-07-06 索尼公司 Wireless communication device, wireless communication method, program, and wireless communication system
CN102196127A (en) * 2010-03-08 2011-09-21 株式会社东芝 Image forming apparatus, authority management method of image forming apparatus, and authority management system of image forming apparatus
CN102196127B (en) * 2010-03-08 2014-03-12 株式会社东芝 Image forming apparatus, authority management method of image forming apparatus, and authority management system of image forming apparatus
CN101894231A (en) * 2010-07-19 2010-11-24 上海三零卫士信息安全技术有限公司 Permission expansion control system and method thereof
CN102510372A (en) * 2011-09-29 2012-06-20 畅捷通信息技术股份有限公司 Assembly authentication system and assembly authentication method
CN102510372B (en) * 2011-09-29 2014-07-23 畅捷通信息技术股份有限公司 Assembly authentication system and assembly authentication method
CN103034790A (en) * 2011-09-30 2013-04-10 上海博泰悦臻网络技术服务有限公司 Service system and user permission activation method
CN103034790B (en) * 2011-09-30 2016-02-24 上海博泰悦臻网络技术服务有限公司 Service system and user right Activiation method thereof
CN103177202A (en) * 2011-12-22 2013-06-26 苏州威世博知识产权服务有限公司 Method and system for realizing consulting authority limit management of patent tree
CN102750473A (en) * 2012-06-01 2012-10-24 中兴通讯股份有限公司 Authority control method and authority control device
CN102904877A (en) * 2012-09-11 2013-01-30 曙光信息产业(北京)有限公司 Binary serialization role permission management method based on cloud storage
CN103065074B (en) * 2012-12-14 2016-03-16 北京思特奇信息技术股份有限公司 A kind of method of carrying out URL control of authority based on fine granularity
CN103065074A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Uniform Resource Locator (URL) authority control method based on fine granularity
CN104050401A (en) * 2013-03-12 2014-09-17 腾讯科技(深圳)有限公司 User permission management method and system
CN104050401B (en) * 2013-03-12 2018-05-08 腾讯科技(深圳)有限公司 Method for managing user right and system
CN103227750A (en) * 2013-04-26 2013-07-31 华为技术有限公司 Method, device and system for controlling message transmission
CN103227750B (en) * 2013-04-26 2016-05-25 华为技术有限公司 Control the methods, devices and systems of message transmissions
CN103399882A (en) * 2013-07-18 2013-11-20 司法部司法鉴定科学技术研究所 Proficiency testing data platform
CN103500298A (en) * 2013-10-12 2014-01-08 彩虹集团公司 Method for achieving authorization distribution based on rule management
CN104794378A (en) * 2014-06-05 2015-07-22 合肥星服信息科技有限责任公司 Right control based on multigroup binary digit
CN104519072A (en) * 2015-01-14 2015-04-15 浪潮(北京)电子信息产业有限公司 Authority control method and device
CN105512515A (en) * 2015-11-30 2016-04-20 上海爱数信息技术股份有限公司 Method for controlling display of function modules based on permission masks
CN105760192A (en) * 2016-02-03 2016-07-13 北京元心科技有限公司 Registration method and device for service module of system server
CN105760192B (en) * 2016-02-03 2019-01-11 北京元心科技有限公司 Registration method and device for service module of system server
CN105787317A (en) * 2016-03-23 2016-07-20 中国电力科学研究院 Permission control method based on multi-layer hierarchy system
CN106570421A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 Authority control method and device
CN106682487A (en) * 2016-11-04 2017-05-17 浙江蘑菇加电子商务有限公司 User authority management method and system
CN106778299A (en) * 2016-12-01 2017-05-31 同方知网(北京)技术有限公司 A kind of multiple users concurrent processing system
CN108921520A (en) * 2017-08-07 2018-11-30 成都牵牛草信息技术有限公司 Count list operation permission grant method
WO2019029501A1 (en) * 2017-08-07 2019-02-14 成都牵牛草信息技术有限公司 Statistical list operation permission authorization method
CN108921520B (en) * 2017-08-07 2021-04-20 成都牵牛草信息技术有限公司 Statistical list operation authority authorization method
US11475142B2 (en) 2017-08-07 2022-10-18 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing operation permission of a statistical list
CN107895249A (en) * 2017-11-25 2018-04-10 深圳市易达云科技有限公司 A kind of order status rendering method and system
CN107895249B (en) * 2017-11-25 2021-02-09 深圳市易达云科技有限公司 Order state presenting method and system
CN109472127A (en) * 2018-10-11 2019-03-15 北京三快在线科技有限公司 Permission processing method, device, using side apparatus and storage medium
CN110753058A (en) * 2019-10-25 2020-02-04 北京浪潮数据技术有限公司 Cross-platform user permission distribution method, system and related device
US11620394B2 (en) 2020-12-22 2023-04-04 International Business Machines Corporation Allocating multiple database access tokens to a single user
WO2023087278A1 (en) * 2021-11-19 2023-05-25 国云科技股份有限公司 Cloud platform permission setting method and apparatus, terminal device, and storage medium

Similar Documents

Publication Publication Date Title
CN101499906A (en) Method for implementing subscriber authority management based on role function mapping table
CN106250782B (en) A kind of data permission control method and device based on SQL statement parsing
CN110443010A (en) One kind permission visual configuration control method, device, terminal and storage medium in information system
CN104376237B (en) A kind of method of controlling security and system for being directed to information in production process
CN101706738B (en) Flow application system
CN102930226B (en) Method for controlling use permission of fine-grained client
US8032573B2 (en) System and method for managing and updating data from a number of sources for a project
CN102231693A (en) Method and apparatus for managing access authority
CN101360123B (en) Network system and management method thereof
CN101197023A (en) Method for establishing visible document file management system facing to minor enterprises
US8346856B2 (en) Client environment creation system, client environment creation method, client environment creation program and storage medium
EP1352321A1 (en) A universal software application
CN110457891A (en) A kind of authority configuration interface display method, device, terminal and storage medium
CN108388604A (en) User right data administrator, method and computer readable storage medium
CN106528150A (en) Development method and development platform of J2EE projects
CN105224299B (en) A kind of universal modeling method based on system meta-model construction system model
CN105678459A (en) Metadatabase-based business flow customization model
CN109885395A (en) A kind of game configuration table load Memory Optimize Method and device
CN106873969A (en) A kind of development approach and development platform of J2EE projects
US20080288532A1 (en) Computer Device for Managing Documents in Multi-User Mode
CN102902916B (en) The authority control method that application program is general
CN107729396A (en) Data Dynamic Query method and device
CN110377323A (en) A kind of block chain DAPP management system
US20100287555A1 (en) Using composite systems to improve functionality
CN102681869B (en) Method and the manufacturing execution system of web bag is updated in manufacturing execution system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20090805