CN101860436A - Technology for accurately controlling system user data authority - Google Patents
Technology for accurately controlling system user data authority Download PDFInfo
- Publication number
- CN101860436A CN101860436A CN200910081725A CN200910081725A CN101860436A CN 101860436 A CN101860436 A CN 101860436A CN 200910081725 A CN200910081725 A CN 200910081725A CN 200910081725 A CN200910081725 A CN 200910081725A CN 101860436 A CN101860436 A CN 101860436A
- Authority
- CN
- China
- Prior art keywords
- authority
- user
- management
- information
- management group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a technology for accurately controlling system user data authority, which comprises the following steps that: firstly, database table information, an authority table, a management group table and a user table are established; then a management end completes the settings of user authority by calling the program of a server side; and after different authorities of users register, the authorities of controlled system data are different. The invention enables a web application program to be safely and effectively enjoyed by authorized users, and unauthorized illegal users can not overstep the user authorities.
Description
Technical field
The present invention relates to the technology of an accurately controlling system user data authority, the particularly a kind of ava of employing technology and realize the method for an accurately controlling system user data authority based on the web service routine mode of http agreement.
Background technology
Rights management is to compare the key link in the Web application item, because being each computer, browser all possesses, if do not set up Rights Management System, one " disabled user " can be easy by all functions in the browser access Web application item so.Therefore need Rights Management System to carry out authority and detect, allow the function of can normally legal use having authorized, and those undelegated disabled users are kept outside of the door through the user that authorizes.Invent out the technology of an accurately controlling system user data authority for this reason.
Summary of the invention
Technical problem to be solved by this invention provides a kind of ava of employing technology and realizes the method for an accurately controlling system user data authority based on the web service routine mode of ht tp agreement.
The technology of an accurately controlling system user data authority of the present invention, this method comprises following step at least:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
The technology of an accurately controlling system user data authority of the present invention is set up database table information, authority list, and management group table, subscriber's meter the steps include:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
The technology of an accurately controlling system user data authority of the present invention, the setting that management end is finished user right by the program of invoking server end the steps include:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
The technology of an accurately controlling system user data authority of the present invention, after user's login of different rights, the authority of the system data of being controlled is inequality, the steps include:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
The technology of an accurately controlling system user data authority that the present invention relates to, utilize the java technology and realize an accurately controlling system user data authority based on the web service routine of http agreement, make in the WEB application program and can not run off user right to unauthorized illegal users can safe and effectively enjoying through the user who authorizes.
Embodiment
Key step of the present invention is as follows:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
Above-mentioned steps 1 is set up database table information, authority list, and management group table, the concrete steps of subscriber's meter are as follows:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
Above-mentioned steps 2 management ends are finished user right by the program of invoking server end the concrete steps of setting are as follows:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
After the user of the above-mentioned steps 3 different rights login, the authority of the system data of being controlled is that inequality concrete steps are as follows:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
Utilize the java technology and realize an accurately controlling system user data authority when above-mentioned technical scheme is implemented based on the web service routine of http agreement, make in the WEB application program and can not run off user right to unauthorized illegal users can safe and effectively enjoying through the user who authorizes.
It should be noted last that above embodiment is only in order to explanation and unrestricted technical scheme described in the invention; Therefore, although this specification has been described in detail the present invention with reference to the above embodiments,, those of ordinary skill in the art should be appreciated that still and can make amendment or replacement to the present invention with being equal to; And all do not break away from the technical scheme and the improvement thereof of the spirit and scope of the present invention, and it all should be encompassed in the middle of the claim scope of the present invention.
Claims (4)
1. the technology of an accurately controlling system user data authority, it is characterized in that: this method comprises following step at least:
Step 1: set up database table information, authority list, management group table, subscriber's meter.
Step 2: management end is finished the setting of user right by the program of invoking server end.
Step 3: after user's login of different rights, the authority of the system data of being controlled is inequality.
2. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: set up database table information, and authority list, management group table, subscriber's meter the steps include:
Step 11: set up authority list, be used to store user's authority information.For example: add, deletion is upgraded etc.
Step 12: set up subscriber's meter, be used to store user's information.For example: Zhang San, Li Si etc.
Step 13: set up management group table, be used to store the management information of user's group.For example: super keeper, keeper, general user etc.
Step 14: set up the permissions mapping table, make between authority list and the management group table and obtain interactive relation.
Step 15: set up personnel's mapping table, person chart and management group table are obtained alternately.
3. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: management end is finished the setting of user right by the program of invoking server end, the steps include:
Step 21: the authority initialization is installed.
Step 22: add management class boundary face, add management group information.
Step 23: add keeper's action.
Step 24: carry out that management group authority being set.
Step 25: add the administrator.
Step 26: administrator right is set.
4. the technology of an accurately controlling system user data authority according to claim 1 is characterized in that: after user's login of different rights, the authority of the system data of being controlled is inequality, the steps include:
Step 31: after user's login of different rights, system assignment distributes for user's authority according to the authority of setting in the user authority management group table.
Step 32: can finish the maintenance of personal information after keeper's login system, for example: revise password etc.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910081725A CN101860436A (en) | 2009-04-08 | 2009-04-08 | Technology for accurately controlling system user data authority |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910081725A CN101860436A (en) | 2009-04-08 | 2009-04-08 | Technology for accurately controlling system user data authority |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101860436A true CN101860436A (en) | 2010-10-13 |
Family
ID=42946108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910081725A Pending CN101860436A (en) | 2009-04-08 | 2009-04-08 | Technology for accurately controlling system user data authority |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101860436A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663044A (en) * | 2012-03-28 | 2012-09-12 | 福建榕基软件股份有限公司 | Method and device for creating search base and method and device for full-text search with authorities |
CN103973503A (en) * | 2014-05-29 | 2014-08-06 | 北京中电普华信息技术有限公司 | Method and system for controlling mobile application permission |
CN104598777A (en) * | 2013-10-31 | 2015-05-06 | 南京思润软件有限公司 | Rights management method based on B/S framework |
CN105718812A (en) * | 2014-12-05 | 2016-06-29 | 上海赞越软件服务中心 | User-based bidirectional authority management mechanism |
WO2017114210A1 (en) * | 2015-12-31 | 2017-07-06 | 阿里巴巴集团控股有限公司 | Apparatus and method for security control of data processing system |
-
2009
- 2009-04-08 CN CN200910081725A patent/CN101860436A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663044A (en) * | 2012-03-28 | 2012-09-12 | 福建榕基软件股份有限公司 | Method and device for creating search base and method and device for full-text search with authorities |
CN104598777A (en) * | 2013-10-31 | 2015-05-06 | 南京思润软件有限公司 | Rights management method based on B/S framework |
CN103973503A (en) * | 2014-05-29 | 2014-08-06 | 北京中电普华信息技术有限公司 | Method and system for controlling mobile application permission |
CN105718812A (en) * | 2014-12-05 | 2016-06-29 | 上海赞越软件服务中心 | User-based bidirectional authority management mechanism |
WO2017114210A1 (en) * | 2015-12-31 | 2017-07-06 | 阿里巴巴集团控股有限公司 | Apparatus and method for security control of data processing system |
CN106934300A (en) * | 2015-12-31 | 2017-07-07 | 阿里巴巴集团控股有限公司 | The safety control and method of a kind of data handling system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9372964B2 (en) | Software license control | |
EP2620893B1 (en) | Role-based access control permissions | |
US10325095B2 (en) | Correlating a task with a command to perform a change ticket in an it system | |
CN107483491A (en) | The access control method of distributed storage under a kind of cloud environment | |
US8578452B2 (en) | Method for securely creating a new user identity within an existing cloud account in a cloud computing system | |
CN100495421C (en) | Authentication protection method based on USB device | |
TW201229932A (en) | Physically secured authorization for utility applications | |
CN105262780B (en) | A kind of authority control method and system | |
CN102571873B (en) | Bidirectional security audit method and device in distributed system | |
WO2006017756A3 (en) | Method and system for controlling access to a wireless client device | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
CN101860436A (en) | Technology for accurately controlling system user data authority | |
CN104219232B (en) | Method for controlling file security of block distributed file system | |
CN102546672A (en) | Out-of-band authorization safety reinforcement method for cloud computing platform | |
CN103970540B (en) | Key Functions secure calling method and device | |
CN105046125A (en) | OA system application access method based on leveling system | |
CN102571874B (en) | On-line audit method and device in distributed system | |
CN107147665B (en) | Application method of the beam-based alignment model in industrial 4.0 systems | |
CN102411689B (en) | Method for controlling authority of database administrator | |
CN106933605A (en) | A kind of intelligent progress recognizing control method and system | |
CN101860517A (en) | Method for precisely controlling system user authority | |
CN109245880B (en) | Hadoop component safety reinforcement method | |
CN103391187B (en) | A kind of method of cloud storage security control | |
CN102801743A (en) | SAP safety sensitive information system based on many-sided authorization and dynamic password | |
CN101281569A (en) | Method for using network edition software protecting equipment to control software client terminal quantity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20101013 |