CN102467642A - Permission control method and device for application software - Google Patents

Permission control method and device for application software Download PDF

Info

Publication number
CN102467642A
CN102467642A CN201010548051XA CN201010548051A CN102467642A CN 102467642 A CN102467642 A CN 102467642A CN 201010548051X A CN201010548051X A CN 201010548051XA CN 201010548051 A CN201010548051 A CN 201010548051A CN 102467642 A CN102467642 A CN 102467642A
Authority
CN
China
Prior art keywords
authority
user
role
permission levels
application software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010548051XA
Other languages
Chinese (zh)
Other versions
CN102467642B (en
Inventor
侯存军
谢浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201010548051.XA priority Critical patent/CN102467642B/en
Publication of CN102467642A publication Critical patent/CN102467642A/en
Application granted granted Critical
Publication of CN102467642B publication Critical patent/CN102467642B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a permission control method for application software. The permission control method comprises the following steps of: determining the permission level of user permission of the application software in every permission type; recording the determined permission type and the permission level thereof by researching a pre-established permission mapping relation, wherein the permission mapping relation comprises mapping every permission type to an identity (ID) and mapping every permission level in every permission type to a numerical value; and logging in and using the application software through the recorded ID and numerical value. The invention also provides a permission control device for the application software. Through the permission control method and the permission control device for the application software, the permission control of the application software can be conveniently and quickly set and modified in the software development and maintenance processes.

Description

The authority control method and the device that are used for application software
Technical field
The present invention relates to the applied software development field, in particular to authority control method that is used for application software and device.
Background technology
Usually, the user of application software is through " user " login application software, and to use in the application software the function that the user was opened, the user is the identity that in the application software user is provided with, and gives the user to using certain authority of partial function in the software.Plurality of applications software allows the multi-user to login multi-user's use; And for different users authorize different authorities so that different users can to carry out different operation normally necessary, it is extremely important therefore how different users to be carried out corresponding control of authority.
General authority control method is: the authority that directly writes down each user and had; For example record format is literature record " user qq can open operation, can not delete resource "; When logining, the user directly checks user's logon rights; The user then directly carries out the user when using a certain functional module whether this module is had rights of using inspection, then allows to use through checking, and authentication failed is then refused login or used.
The defective of prior art is, when application program need increase function, need revise the code about user's authority, and repeated workload is big in the development, and increases the test job amount, brings the hidden danger of makeing mistakes to software.
Summary of the invention
The present invention aims to provide a kind of authority control method and device that is used for application software, to solve the inflexible problem of prior art control of authority.
In an embodiment of the present invention, a kind of authority control method that is used for application software is provided, has comprised: the Permission Levels of authority in each authority kind of confirming the user of application software; Through searching in advance authority kind and the Permission Levels thereof that the permissions mapping relation record of setting up is confirmed, wherein, the permissions mapping relation comprises each authority kind is mapped to an ID, and each Permission Levels in each authority kind are mapped to a numerical value; Adopt the ID and the Numerical Control of record that the login of using software is used.
In an embodiment of the present invention, a kind of control of authority device that is used for application software is provided, has comprised: determination module, user's the authority that is used for confirming application software is at the Permission Levels of each authority kind; Logging modle; Be used for definite authority kind and the Permission Levels thereof of permissions mapping relation record through searching foundation in advance; Wherein, permissions mapping relation comprises each authority kind is mapped to an ID, and each Permission Levels in each authority kind are mapped to a numerical value; Control module is used to adopt the ID of record and Numerical Control that the login of using software is used.
The authority control method that is used for application software and the device of the above embodiment of the present invention; Because adopt the ID of regularization and the authority that numerical value comes recording user; So solved the inflexible problem of prior art control of authority, reached the effect that the control of authority in the modification application program can conveniently promptly be set in the software development maintenance process.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 shows the process flow diagram according to the authority control method of the embodiment of the invention;
Fig. 2 shows the data file that writes down authority according to the preferred embodiment of the invention;
Fig. 3 shows the process flow diagram that carries out control of authority according to the preferred embodiment of the invention;
Fig. 4 shows the process flow diagram of authority control method according to the preferred embodiment of the invention;
Fig. 5 shows the control of authority schematic representation of apparatus according to the embodiment of the invention.
Embodiment
Below with reference to accompanying drawing and combine embodiment, specify the present invention.
Fig. 1 shows the process flow diagram according to the authority control method of the embodiment of the invention, comprising:
Step S10 confirms the user's of application software the Permission Levels of authority in each authority kind;
Step S20; Through searching definite authority kind and the Permission Levels of setting up in advance thereof of permissions mapping relation record; Wherein, permissions mapping relation comprises each authority kind is mapped to an ID, and each Permission Levels in each authority kind are mapped to a numerical value;
Step S30 adopts the ID of record and Numerical Control that the login of using software is used.
The authority that prior art directly writes down each user and had; And adopt the ID of regularization and the authority that numerical value comes recording user in the present embodiment; So solved the inflexible problem of prior art control of authority, reached the effect that the control of authority in the modification application program can conveniently promptly be set in the software development maintenance process.
Can set up a permissions mapping relation table in advance, as shown in the table:
Module ID
Use operation 1
Revise operation 2
The deletion resource 11
The operation supervise and control management 12
In addition, for the module that increases newly in the application software, the judgement of authority will be carried out modify when increasing functional module in the prior art, so it is lower and the probability of makeing mistakes is bigger under this kind mode, to carry out the general efficiency ratio of exploitation of application software.And can be when even the current user of application software relate to some authority kind or some Permission Levels wherein in the present embodiment; The upgrading of application software, maintenance for ease; Predetermined various authority kinds of definition and the Permission Levels that comprised thereof; Increase, can conveniently make amendment during change such as minimizing with the user in the convenient software, role, functional module, and do not influence active user's use habit and control requirement; If application software need increase the role, then only need definition role's attribute, the authority of each functional module of being had get final product, write down the affiliated role of this user when increasing this role's user later on again and get final product.The permissions mapping relation is preserved with database or data file, can use for retrieval.
Fig. 2 shows the data file that writes down authority according to the preferred embodiment of the invention.Like figure, qq is a user name, and " operator's group " is its role, " 1,0 of back; 2,2; 4,0; 5,0; 6,0; 7,0; 8,0 " authority information for writing down, in the character "; " separate various authorities, per two numerals are one group in the character string of separating, the kind of previous digitized representation authority (being ID); like " revising operation, deletion resource, usage flag " etc., the rank of the digitized representation authority of back, score value in other words; can open operation as 0 minute, can not delete resource, then user qq can use operation; can not delete resource, and user " administrator " can delete resource etc.
In the control of authority process, when the user need use application software software, at first need login, carry out identity checks according to user's name, password during login, if the user does not exist or password mistake then provide prompting and refusal login.Login user is logined through authentication after the software, when application software initiated, at first reads the role under this user, and the authority that reads this role again and had is according to role have each module to the authority loading application software of each module.Read in this role at first successively and had check level other and than the functional module of checking the authority that rank is high.Then; To have successively above-mentioned authority module loading, be shown in the interface; Module for not having authority does not fully then load; The module that needs just to have an authority after some operation for the user then only loads but is not presented in the interface, when having carried out showing when corresponding operation refreshes the interface later on again.The module user who in the interface, is shown can operate, and when carrying out a certain operation, at first reads the affiliated role of this user; Read the authority of this role again for this function; For the function that can only check, demonstrate the information that the user can check, interface operable is not provided.For the module that has operating right, the rank of decision operation authority at first, if having the operating right of highest level, then all operations all passes through checking, if not, then forbid the operation of lack of competence.For the data of submitting to before the user self, the user can make amendment, check, for the data of other users' submissions; The authority that then needs further inspection user if do not have the authority of modification, then provides prompting and refusal modification when revising; Other operations are proceeded, if having the authority of modification in interface before returning; Then accept the operation submitted to and handle, processing procedure is carried out record.
Preferred embodiment with Fig. 3 is an example below, introduces the user in detail and logins after the application software, the operation of being carried out is carried out the practical implementation process of the inspection of authority.At first define several users, role, Permission Levels and operation, wherein, user1, user2, user3, user4 are respectively the user of 4 different role; Role, the role that can carry out Job Operations that viewer, operator, admin represent respectively to check, have the role who uses and revise authority to all modules and operation; Module1, module2, module3 are respectively three different functional, and operation1, operation2 are two operations, and be as shown in Figure 3, comprises the steps:
S300, viewer role have the authority of checking of module1, module2 module, and operator has the rights of using of these two modules and the rights of using of operation1; Admin then has all authorities;
S301, judge whether the classification of role viewer, operator, admin meets the requirement of carrying out control of authority, judge that back this kind classification can satisfy current control of authority requirement, thus continuation S302, otherwise need make amendment;
S302, user1 is distributed viewer role, user2 distributes operator role, and user3 distributes admin role, continues S303 then;
Can the authority that S303, judgement user user1, user2, user3, user4 are distributed satisfy the requirement of carrying out control of authority; Can satisfy and then continue S305, otherwise go to S301;
S304, redistribute the authority of role viewer, need this role can have the right to use of a module module1 or module2 at least, go to S300 then;
S305, distribute weights for user user1, user2, user3, user4 for the authority of module module1, module2, module3; User user1 is 0 for the weights of module1; User user2 is 1 user user3 for the weights of module3 for the weights of module2 is 2, continues S306;
The corresponding separately data of S306, the user with above distribution, role, authority are carried out record, continue S307;
S307, user user1, user2, user3 login in client separately, and whether judges has the authority of login, like user3; The reader role is admin, has this authority, then continues S 308; If, not pointing out the user to change identity logins again;
S308, user user1, user2, user3 login successfully, carry out operation separately, create new user like user user3, continue S309;
Whether S309, judges user3 have the authority of creating new user, and the role who reads user3 is admin, have all authorities, so checking is passed through, continue S310, otherwise verify and can not pass through, and provide to go to S308 after the user is changed in prompting;
The operation that S310, acceptance are submitted to is created new user and is accomplished, other processing of continued, and submit job is given system, continues S311;
S311, the processing of submitting to, the recording processing data are returned result and are given the user, refresh the interface;
Other users' the various interfaces and the processing procedure of operation are identical with top user right control procedure;
So far, each user of system, role's control of authority is accomplished.
Preferably, step S10 comprises: confirm the role that the user is affiliated; Confirm the Permission Levels of role in each authority kind, with the Permission Levels of authority in each authority kind as the user.In application software, stipulated role's authority usually, defined the user through the role.This preferred embodiment is directly confirmed the role under the user, thereby confirms user's authority quickly and easily.
Preferably; Confirm that the Permission Levels of role in each authority kind comprise: confirm the Permission Levels of role in each authority kind through searching the role-map relation of setting up in advance; Wherein, the role-map relation comprises the Permission Levels of each role in each authority kind of application software.Can each role's permissions mapping relation be listed in the table in advance, can table look-up like this and just can confirm user right, further improved efficient.
Preferably, the numerical value of the ID of employing database or each authority kind of file logging and user's the Permission Levels of authority in each authority kind.The data of recording user, role and authority can directly deposit in the database, and the form that also can save as file directly is stored in the computer disk, and file layout can be the XML form, also can be the User Defined form.Database and data file can make things convenient for the retrieval in the control of authority to use.
Preferably, in mapping relations, Permission Levels are high more, and the numerical value that is shone upon is big more.Preferably, this method also comprises: with all numerical value additions of user; According to confirming user's rank with the size of value.Carry out in the prior art need carrying out complicated calculations when authority is judged the stack judgement of particularly carrying out multiple condition, increase system burden, system responses is slack-off, software ease for use variation.And in this preferred embodiment because numerical values recited and the Permission Levels of mapping height is directly related, thus can through after the addition with the value size intuitively clear and definite user authority just, conveniently to user's management.
Fig. 4 shows the process flow diagram of user authority control method according to the preferred embodiment of the invention, may further comprise the steps:
Step 41 is classified the role;
Step 42 is distributed the role to the user;
Step 43 is confirmed user's authority kind and Permission Levels thereof according to user's role, comprising:
Step 431, the mapping of weights kind;
Step 432, the role-security mapping;
Step 44 is carried out corresponding control of authority according to the permissions data of record.
Fig. 5 shows the control of authority schematic representation of apparatus according to the embodiment of the invention, comprising:
Determination module 10, user's the authority that is used for confirming application software is at the Permission Levels of each authority kind;
Logging modle 20; Be used for definite authority kind and the Permission Levels thereof of permissions mapping relation record through searching foundation in advance; Wherein, permissions mapping relation comprises each authority kind is mapped to an ID, and each Permission Levels in each authority kind are mapped to a numerical value;
Control module 30 is used to adopt the ID of record and Numerical Control that the login of using software is used.
This device can conveniently promptly be provided with the effect of revising the control of authority in the application program in the software development maintenance process.
Preferably, determination module 10 comprises: role's determination module is used for the role who confirms that the user is affiliated; The role-map module is used for confirming the Permission Levels of role in each authority kind, with the Permission Levels of authority in each authority kind as the user.This preferred embodiment is directly confirmed the role under the user, thereby confirms user's authority quickly and easily.
Preferably, the numerical value of the ID of logging modle 20 employing databases or each authority kind of file logging and user's the Permission Levels of authority in each authority kind.Database and data file can make things convenient for the retrieval in the control of authority to use.
Preferably, this device also comprises: summation module, be used for all numerical value additions with the user, and wherein, in mapping relations, Permission Levels are high more, and the numerical value that is shone upon is big more; The weights module, the size that is used for basis and value is confirmed user's rank.In this preferred embodiment because numerical values recited and the Permission Levels of mapping height is directly related, so can through after the addition with the value size intuitively clear and definite user authority just, conveniently to user's management.
From above description, can find out; The above embodiments of the present invention make that each user's control of authority process is able to simplify; The data that reduce the control of authority process read, and for the increase of application module in the software, have also reduced the complexity to the control of authority of new module simultaneously; And through user, role, permissions data are unified record; Improve Authority Verification speed, thereby improved the speed that software carries out control of authority, can adapt to the often requirement of variation of user in the software development, role, functional module.
Obviously; It is apparent to those skilled in the art that above-mentioned each module of the present invention or each step can realize that they can concentrate on the single calculation element with the general calculation device; Perhaps be distributed on the network that a plurality of calculation element forms; Alternatively, they can be realized with the executable program code of calculation element, carried out by calculation element thereby can they be stored in the memory storage; Perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an authority control method that is used for application software is characterized in that, comprising:
Confirm the user's of said application software the Permission Levels of authority in each authority kind;
Through searching permissions mapping relation record said definite authority kind and the Permission Levels of setting up in advance thereof; Wherein, Said permissions mapping relation comprises each said authority kind is mapped to an ID, and each Permission Levels in each said authority kind are mapped to a numerical value;
Adopt the ID and the Numerical Control of said record that the login of said application software is used.
2. method according to claim 1 is characterized in that, confirms that the user's of said application software the Permission Levels of authority in each authority kind comprise:
Confirm the role that said user is affiliated;
Confirm the Permission Levels of said role in each said authority kind, with the Permission Levels of authority in each authority kind as said user.
3. method according to claim 2 is characterized in that, confirms that the Permission Levels of said role in each said authority kind comprise:
Confirm the Permission Levels of said role in each said authority kind through searching the role-map relation of setting up in advance, wherein, said role-map relation comprises the Permission Levels of each role in each said authority kind of said application software.
4. method according to claim 1 is characterized in that, the numerical value of the ID of employing database or each said authority kind of file logging and said user's the Permission Levels of authority in each said authority kind.
5. method according to claim 1 is characterized in that, in said mapping relations, said Permission Levels are high more, and the numerical value that is shone upon is big more.
6. method according to claim 5 is characterized in that, also comprises:
All said numerical value additions with said user;
Confirm said user's rank according to said and size value.
7. a control of authority device that is used for application software is characterized in that, comprising:
Determination module, user's the authority that is used for confirming said application software is at the Permission Levels of each authority kind;
Logging modle; Be used for through searching permissions mapping relation record said definite the authority kind and the Permission Levels thereof of foundation in advance; Wherein, Said permissions mapping relation comprises each said authority kind is mapped to an ID, and each Permission Levels in each said authority kind are mapped to a numerical value;
Control module is used to adopt the ID of said record and Numerical Control that the login of said application software is used.
8. device according to claim 7 is characterized in that, said determination module comprises: role's determination module is used for the role who confirms that said user is affiliated;
The role-map module is used for confirming the Permission Levels of said role in each said authority kind, with the Permission Levels of authority in each authority kind as said user.
9. device according to claim 7 is characterized in that, the numerical value of the ID of said logging modle employing database or each said authority kind of file logging and said user's the Permission Levels of authority in each said authority kind.
10. device according to claim 7 is characterized in that, also comprises:
Summation module is used for all the said numerical value additions with said user, and wherein, in said mapping relations, said Permission Levels are high more, and the numerical value that is shone upon is big more;
The weights module is used for confirming according to said and size value said user's rank.
CN201010548051.XA 2010-11-17 2010-11-17 Permission control method and device for application software Expired - Fee Related CN102467642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010548051.XA CN102467642B (en) 2010-11-17 2010-11-17 Permission control method and device for application software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010548051.XA CN102467642B (en) 2010-11-17 2010-11-17 Permission control method and device for application software

Publications (2)

Publication Number Publication Date
CN102467642A true CN102467642A (en) 2012-05-23
CN102467642B CN102467642B (en) 2015-02-25

Family

ID=46071268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010548051.XA Expired - Fee Related CN102467642B (en) 2010-11-17 2010-11-17 Permission control method and device for application software

Country Status (1)

Country Link
CN (1) CN102467642B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638444A (en) * 2011-06-10 2012-08-15 吴东辉 Network terminal type construction method and network terminal type construction system for application software
CN102750473A (en) * 2012-06-01 2012-10-24 中兴通讯股份有限公司 Authority control method and authority control device
CN103906054A (en) * 2012-12-28 2014-07-02 上海农业信息有限公司 Method and system for authorization of software function modules of internet of things
CN104091131A (en) * 2014-07-09 2014-10-08 北京智谷睿拓技术服务有限公司 Method and device for determining relation between application programs and authorities
CN104090967A (en) * 2014-07-16 2014-10-08 北京智谷睿拓技术服务有限公司 Application program recommending method and device
CN104156467A (en) * 2014-08-22 2014-11-19 北京智谷睿拓技术服务有限公司 API recommendation method and API recommendation device
CN105046165A (en) * 2015-07-10 2015-11-11 沈文策 Network project platform hierarchy right control method
CN106897629A (en) * 2015-12-21 2017-06-27 北京奇虎科技有限公司 The control method and terminal of terminal applies
CN107679417A (en) * 2017-10-09 2018-02-09 郑州云海信息技术有限公司 A kind of method and system of user's operating right management
CN107844698A (en) * 2017-09-30 2018-03-27 平安科技(深圳)有限公司 Financial APP authority setting method, device, equipment and storage medium
CN108363912A (en) * 2018-02-28 2018-08-03 苏州国芯科技有限公司 A kind of close guarantor's method and device of program code
CN112148597A (en) * 2020-09-16 2020-12-29 北京基调网络股份有限公司 Method for eliminating iOS device authorization dialog box, test method and storage medium
CN113536243A (en) * 2021-07-09 2021-10-22 益世信息技术(杭州)有限公司 Enterprise internal software use management system based on authority analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070185875A1 (en) * 2006-02-09 2007-08-09 International Business Machines Corporation Extensible role based authorization for manageable resources
CN101208702A (en) * 2005-06-06 2008-06-25 甲骨文国际公司 Architecture for computer-implemented authentication and authorization
CN101256605A (en) * 2006-08-31 2008-09-03 埃森哲环球服务有限公司 Enterprise entitlement framework
CN101859352A (en) * 2009-04-09 2010-10-13 北京书生国际信息技术有限公司 Method, system, application software and platform software for controlling authority

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101208702A (en) * 2005-06-06 2008-06-25 甲骨文国际公司 Architecture for computer-implemented authentication and authorization
US20070185875A1 (en) * 2006-02-09 2007-08-09 International Business Machines Corporation Extensible role based authorization for manageable resources
CN101256605A (en) * 2006-08-31 2008-09-03 埃森哲环球服务有限公司 Enterprise entitlement framework
CN101859352A (en) * 2009-04-09 2010-10-13 北京书生国际信息技术有限公司 Method, system, application software and platform software for controlling authority

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638444A (en) * 2011-06-10 2012-08-15 吴东辉 Network terminal type construction method and network terminal type construction system for application software
CN102750473A (en) * 2012-06-01 2012-10-24 中兴通讯股份有限公司 Authority control method and authority control device
CN103906054B (en) * 2012-12-28 2017-04-12 上海农业信息有限公司 Method and system for authorization of software function modules of internet of things
CN103906054A (en) * 2012-12-28 2014-07-02 上海农业信息有限公司 Method and system for authorization of software function modules of internet of things
CN104091131A (en) * 2014-07-09 2014-10-08 北京智谷睿拓技术服务有限公司 Method and device for determining relation between application programs and authorities
CN104090967A (en) * 2014-07-16 2014-10-08 北京智谷睿拓技术服务有限公司 Application program recommending method and device
CN104090967B (en) * 2014-07-16 2017-08-25 北京智谷睿拓技术服务有限公司 Application program recommends method and recommendation apparatus
CN104156467B (en) * 2014-08-22 2018-05-29 北京智谷睿拓技术服务有限公司 API recommends method and API recommendation apparatus
CN104156467A (en) * 2014-08-22 2014-11-19 北京智谷睿拓技术服务有限公司 API recommendation method and API recommendation device
CN105046165A (en) * 2015-07-10 2015-11-11 沈文策 Network project platform hierarchy right control method
CN106897629A (en) * 2015-12-21 2017-06-27 北京奇虎科技有限公司 The control method and terminal of terminal applies
CN107844698A (en) * 2017-09-30 2018-03-27 平安科技(深圳)有限公司 Financial APP authority setting method, device, equipment and storage medium
CN107844698B (en) * 2017-09-30 2020-05-29 平安科技(深圳)有限公司 Method, device and equipment for setting authority of financial APP and storage medium
CN107679417A (en) * 2017-10-09 2018-02-09 郑州云海信息技术有限公司 A kind of method and system of user's operating right management
CN107679417B (en) * 2017-10-09 2021-01-12 苏州浪潮智能科技有限公司 Method and system for managing user operation authority
CN108363912A (en) * 2018-02-28 2018-08-03 苏州国芯科技有限公司 A kind of close guarantor's method and device of program code
CN112148597A (en) * 2020-09-16 2020-12-29 北京基调网络股份有限公司 Method for eliminating iOS device authorization dialog box, test method and storage medium
CN113536243A (en) * 2021-07-09 2021-10-22 益世信息技术(杭州)有限公司 Enterprise internal software use management system based on authority analysis
CN113536243B (en) * 2021-07-09 2022-03-25 益世信息技术(杭州)有限公司 Enterprise internal software use management system based on authority analysis

Also Published As

Publication number Publication date
CN102467642B (en) 2015-02-25

Similar Documents

Publication Publication Date Title
CN102467642A (en) Permission control method and device for application software
CN102112990B (en) Granting least privilege access for computing processes
CN103793424B (en) database data migration method and system
US8959578B2 (en) Techniques for project lifecycle staged-based access control
CN100492324C (en) Partition access control system and method for controlling partition access
CN101366040B (en) Management of user access to objects
US8904551B2 (en) Control of access to files
US20210019434A1 (en) Cloud-based data access control
CN111259378B (en) Multi-tenant management system and implementation method thereof
CN101208702A (en) Architecture for computer-implemented authentication and authorization
CN107370604B (en) A kind of more granularity access control methods under big data environment
CN104717389A (en) Information processing apparatus, method of controlling the same, and storage medium
AU4997899A (en) System and method for selectively defining access to application features
CN105184144A (en) Multi-system privilege management method
US20210182413A1 (en) Detection of sensitive database information
CN110727930B (en) Authority control method and device
CN111460496A (en) Permission configuration method based on user role, electronic device and storage medium
CN110532279A (en) Big data platform authority control method, device, computer equipment and storage medium
CN115037743A (en) Tenant user management in cloud database operations
US20100268413A1 (en) Electronic technical logbook
CN113255000A (en) Data access control method and device, electronic equipment and readable storage medium
CN109241119A (en) Trans-departmental data sharing method and system
CN107911443A (en) A kind of session information processing method, device, server and readable storage medium storing program for executing
CN116957254A (en) Enterprise resource allocation processing method and device, electronic equipment and storage medium
CN101198928A (en) A computer system, integrable software component and software application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150225

Termination date: 20191117

CF01 Termination of patent right due to non-payment of annual fee