CN101860436A - Technology for accurately controlling system user data authority - Google Patents

Technology for accurately controlling system user data authority Download PDF

Info

Publication number
CN101860436A
CN101860436A CN200910081725A CN200910081725A CN101860436A CN 101860436 A CN101860436 A CN 101860436A CN 200910081725 A CN200910081725 A CN 200910081725A CN 200910081725 A CN200910081725 A CN 200910081725A CN 101860436 A CN101860436 A CN 101860436A
Authority
CN
China
Prior art keywords
authority
user
management
information
management group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910081725A
Other languages
Chinese (zh)
Inventor
汤海京
苏红泼
孙涛
陈杉杉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING BOYUESHIJI TECHNOLOGY Co Ltd
Original Assignee
BEIJING BOYUESHIJI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BOYUESHIJI TECHNOLOGY Co Ltd filed Critical BEIJING BOYUESHIJI TECHNOLOGY Co Ltd
Priority to CN200910081725A priority Critical patent/CN101860436A/en
Publication of CN101860436A publication Critical patent/CN101860436A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a technology for accurately controlling system user data authority, which comprises the following steps that: firstly, database table information, an authority table, a management group table and a user table are established; then a management end completes the settings of user authority by calling the program of a server side; and after different authorities of users register, the authorities of controlled system data are different. The invention enables a web application program to be safely and effectively enjoyed by authorized users, and unauthorized illegal users can not overstep the user authorities.

Description

The technology of one accurately controlling system user data authority
Technical field
The present invention relates to the technology of an accurately controlling system user data authority, the particularly a kind of ava of employing technology and realize the method for an accurately controlling system user data authority based on the web service routine mode of http agreement.
Background technology
Rights management is to compare the key link in the Web application item, because being each computer, browser all possesses, if do not set up Rights Management System, one " disabled user " can be easy by all functions in the browser access Web application item so.Therefore need Rights Management System to carry out authority and detect, allow the function of can normally legal use having authorized, and those undelegated disabled users are kept outside of the door through the user that authorizes.Invent out the technology of an accurately controlling system user data authority for this reason.
Summary of the invention
Technical problem to be solved by this invention provides a kind of ava of employing technology and realizes the method for an accurately controlling system user data authority based on the web service routine mode of ht tp agreement.
The technology of an accurately controlling system user data authority of the present invention, this method comprises following step at least:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
The technology of an accurately controlling system user data authority of the present invention is set up database table information, authority list, and management group table, subscriber's meter the steps include:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
The technology of an accurately controlling system user data authority of the present invention, the setting that management end is finished user right by the program of invoking server end the steps include:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
The technology of an accurately controlling system user data authority of the present invention, after user's login of different rights, the authority of the system data of being controlled is inequality, the steps include:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
The technology of an accurately controlling system user data authority that the present invention relates to, utilize the java technology and realize an accurately controlling system user data authority based on the web service routine of http agreement, make in the WEB application program and can not run off user right to unauthorized illegal users can safe and effectively enjoying through the user who authorizes.
Embodiment
Key step of the present invention is as follows:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
Above-mentioned steps 1 is set up database table information, authority list, and management group table, the concrete steps of subscriber's meter are as follows:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
Above-mentioned steps 2 management ends are finished user right by the program of invoking server end the concrete steps of setting are as follows:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
After the user of the above-mentioned steps 3 different rights login, the authority of the system data of being controlled is that inequality concrete steps are as follows:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
Utilize the java technology and realize an accurately controlling system user data authority when above-mentioned technical scheme is implemented based on the web service routine of http agreement, make in the WEB application program and can not run off user right to unauthorized illegal users can safe and effectively enjoying through the user who authorizes.
It should be noted last that above embodiment is only in order to explanation and unrestricted technical scheme described in the invention; Therefore, although this specification has been described in detail the present invention with reference to the above embodiments,, those of ordinary skill in the art should be appreciated that still and can make amendment or replacement to the present invention with being equal to; And all do not break away from the technical scheme and the improvement thereof of the spirit and scope of the present invention, and it all should be encompassed in the middle of the claim scope of the present invention.

Claims (4)

1. the technology of an accurately controlling system user data authority, it is characterized in that: this method comprises following step at least:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
2. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: set up database table information, and authority list, management group table, subscriber's meter the steps include:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
3. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: management end is finished the setting of user right by the program of invoking server end, the steps include:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
4. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: after user's login of different rights, the authority of the system data of being controlled is inequality, the steps include:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
CN200910081725A 2009-04-08 2009-04-08 Technology for accurately controlling system user data authority Pending CN101860436A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910081725A CN101860436A (en) 2009-04-08 2009-04-08 Technology for accurately controlling system user data authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910081725A CN101860436A (en) 2009-04-08 2009-04-08 Technology for accurately controlling system user data authority

Publications (1)

Publication Number Publication Date
CN101860436A true CN101860436A (en) 2010-10-13

Family

ID=42946108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910081725A Pending CN101860436A (en) 2009-04-08 2009-04-08 Technology for accurately controlling system user data authority

Country Status (1)

Country Link
CN (1) CN101860436A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663044A (en) * 2012-03-28 2012-09-12 福建榕基软件股份有限公司 Method and device for creating search base and method and device for full-text search with authorities
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission
CN104598777A (en) * 2013-10-31 2015-05-06 南京思润软件有限公司 Rights management method based on B/S framework
CN105718812A (en) * 2014-12-05 2016-06-29 上海赞越软件服务中心 User-based bidirectional authority management mechanism
WO2017114210A1 (en) * 2015-12-31 2017-07-06 阿里巴巴集团控股有限公司 Apparatus and method for security control of data processing system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663044A (en) * 2012-03-28 2012-09-12 福建榕基软件股份有限公司 Method and device for creating search base and method and device for full-text search with authorities
CN104598777A (en) * 2013-10-31 2015-05-06 南京思润软件有限公司 Rights management method based on B/S framework
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission
CN105718812A (en) * 2014-12-05 2016-06-29 上海赞越软件服务中心 User-based bidirectional authority management mechanism
WO2017114210A1 (en) * 2015-12-31 2017-07-06 阿里巴巴集团控股有限公司 Apparatus and method for security control of data processing system
CN106934300A (en) * 2015-12-31 2017-07-07 阿里巴巴集团控股有限公司 The safety control and method of a kind of data handling system

Similar Documents

Publication Publication Date Title
US9372964B2 (en) Software license control
EP2620893B1 (en) Role-based access control permissions
US10325095B2 (en) Correlating a task with a command to perform a change ticket in an it system
CN107483491A (en) The access control method of distributed storage under a kind of cloud environment
US8578452B2 (en) Method for securely creating a new user identity within an existing cloud account in a cloud computing system
CN100495421C (en) Authentication protection method based on USB device
TW201229932A (en) Physically secured authorization for utility applications
CN105262780B (en) A kind of authority control method and system
CN102571873B (en) Bidirectional security audit method and device in distributed system
WO2006017756A3 (en) Method and system for controlling access to a wireless client device
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN101860436A (en) Technology for accurately controlling system user data authority
CN104219232B (en) Method for controlling file security of block distributed file system
CN102546672A (en) Out-of-band authorization safety reinforcement method for cloud computing platform
CN103970540B (en) Key Functions secure calling method and device
CN105046125A (en) OA system application access method based on leveling system
CN102571874B (en) On-line audit method and device in distributed system
CN107147665B (en) Application method of the beam-based alignment model in industrial 4.0 systems
CN102411689B (en) Method for controlling authority of database administrator
CN106933605A (en) A kind of intelligent progress recognizing control method and system
CN101860517A (en) Method for precisely controlling system user authority
CN109245880B (en) Hadoop component safety reinforcement method
CN103391187B (en) A kind of method of cloud storage security control
CN102801743A (en) SAP safety sensitive information system based on many-sided authorization and dynamic password
CN101281569A (en) Method for using network edition software protecting equipment to control software client terminal quantity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101013