CN105069331A - Computer binary code format based permission control method - Google Patents
Computer binary code format based permission control method Download PDFInfo
- Publication number
- CN105069331A CN105069331A CN201510481289.8A CN201510481289A CN105069331A CN 105069331 A CN105069331 A CN 105069331A CN 201510481289 A CN201510481289 A CN 201510481289A CN 105069331 A CN105069331 A CN 105069331A
- Authority
- CN
- China
- Prior art keywords
- authority
- control method
- computer
- code
- computer binary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 10
- 239000007795 chemical reaction product Substances 0.000 claims description 9
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000005034 decoration Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a computer binary code format based permission control method. Binary encoding rules are reasonably combined and applied to ensure that each subscriber can produce a corresponding permission code composed of computer binary encoding formats, and only a front end decoding rule is needed to guarantee the consistency with a service terminal, so that the control of front end functions or display can be implemented very easily. The computer binary code format based permission control method adopts simple encoding and storage modes to solve the problem that a conventional permission control system is not suitable for use on a specific person.
Description
Technical Field
The invention relates to a permission control method based on a computer binary coding format.
Background
Traditional rights control is typically applied to office system management. A conventional authorization system generally includes a role ID and a function ID, where one role ID may correspond to a plurality of function IDs, and each user may have one role ID. This results in different roles having to be created first, in order to assign different functions to different users. Not for setting permissions for a single user.
Disclosure of Invention
The invention aims to provide a privilege control method based on a computer binary coding format, which is characterized in that binary coding rules are reasonably combined and applied to enable each user to generate corresponding privilege codes, the privilege codes consist of the computer binary coding format, and the control on the front-end function or display can be very easily realized only by ensuring the consistency of the decoding rule of the front end and the server.
In order to achieve the above object, the technical solution of the present invention is to design a method for controlling authority based on a binary code format of a computer, comprising the following steps:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
Preferably, the decoding rules of the front-end product are server-side consistent.
The invention has the advantages and beneficial effects that: the privilege code is composed of the computer binary coding format, and the control of the front-end function or display can be very easily realized only by ensuring the decoding rule of the front end and the consistency of the server. The invention adopts simple coding and storage modes to solve the problem that the traditional authority control system is not suitable for being applied to a specific person.
Detailed Description
The following further describes embodiments of the present invention with reference to examples. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The technical scheme of the specific implementation of the invention is as follows:
a permission control method based on a computer binary coding format comprises the following steps:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
The decoding rules of the front-end product are consistent with the server side.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the technical principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (2)
1. The authority control method based on the computer binary coding format is characterized by comprising the following steps of:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
2. The computer binary code format-based entitlement control method of claim 1 wherein the decoding rules of the front-end product are server-side contingent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510481289.8A CN105069331A (en) | 2015-08-07 | 2015-08-07 | Computer binary code format based permission control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510481289.8A CN105069331A (en) | 2015-08-07 | 2015-08-07 | Computer binary code format based permission control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105069331A true CN105069331A (en) | 2015-11-18 |
Family
ID=54498694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510481289.8A Pending CN105069331A (en) | 2015-08-07 | 2015-08-07 | Computer binary code format based permission control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105069331A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105512515A (en) * | 2015-11-30 | 2016-04-20 | 上海爱数信息技术股份有限公司 | Method for controlling display of function modules based on permission masks |
CN106650483A (en) * | 2015-11-04 | 2017-05-10 | 广东华邦云计算股份有限公司 | Data authority storage and search method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040139023A1 (en) * | 2002-03-05 | 2004-07-15 | Zhongyang Huang | Method for implementing mpeg-21 ipmp |
EP1619571A1 (en) * | 2004-07-19 | 2006-01-25 | Sony Deutschland GmbH | Method for providing protected audio/video content |
CN101833614A (en) * | 2009-03-10 | 2010-09-15 | 上海盈哲信息科技有限公司 | Piece-protection digital resource right control method |
CN103238150A (en) * | 2010-11-02 | 2013-08-07 | 谷歌公司 | Realtime synchronized document editing by multiple users for blogging |
-
2015
- 2015-08-07 CN CN201510481289.8A patent/CN105069331A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040139023A1 (en) * | 2002-03-05 | 2004-07-15 | Zhongyang Huang | Method for implementing mpeg-21 ipmp |
EP1619571A1 (en) * | 2004-07-19 | 2006-01-25 | Sony Deutschland GmbH | Method for providing protected audio/video content |
CN101833614A (en) * | 2009-03-10 | 2010-09-15 | 上海盈哲信息科技有限公司 | Piece-protection digital resource right control method |
CN103238150A (en) * | 2010-11-02 | 2013-08-07 | 谷歌公司 | Realtime synchronized document editing by multiple users for blogging |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106650483A (en) * | 2015-11-04 | 2017-05-10 | 广东华邦云计算股份有限公司 | Data authority storage and search method and device |
CN105512515A (en) * | 2015-11-30 | 2016-04-20 | 上海爱数信息技术股份有限公司 | Method for controlling display of function modules based on permission masks |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20030071395A (en) | System for protecting and managing digital contents | |
CN109525653B (en) | Multi-user sharing method and system for intelligent equipment | |
CN103144447B (en) | Based on 3D printer family expenses system and its implementation of cloud platform | |
CN106878736A (en) | A kind of method and apparatus of coding and decoding video | |
PH12014502530A1 (en) | Social platform with enhanced privacy and integrated customization features | |
MXPA04000999A (en) | Encrypted data delivery system. | |
CN205353936U (en) | Data interaction system based on VR equipment | |
MY200899A (en) | Permission Management And Resource Control Method And Apparatus | |
CN105069331A (en) | Computer binary code format based permission control method | |
CN103051638A (en) | Multimedia data encryption method and multimedia data encryption distributing system | |
CN118199916B (en) | Screen projection control method and device for LED video wall, electronic equipment and medium | |
CN205071410U (en) | Controlling means of LED intelligence lamp | |
CN103475923A (en) | Television with remote control function defined by user and remote control | |
CN106055222A (en) | System and method for terminal multi-user switching | |
CN104613308B (en) | A kind of filling machine on-line correction method based on hand-held correcting unit | |
CN109684868A (en) | The authority setting method of ACL multi-tenant system | |
CN105426772A (en) | Method for securely storing root key required by encryption and authentication in FLASH | |
CN103279501B (en) | In batches to the method and apparatus that adds anti-importing coded lock in swf file | |
Graham et al. | “Buffy contrast adaptation” with a single Gabor patch | |
CN204991100U (en) | But LED display screen control system of locking | |
CN106534263A (en) | Industrial design service platform | |
CN209710240U (en) | A kind of image generation system and digital signage system | |
Bárcenas | Jon the Cynic: Dog Philosophy 101 | |
CN106210319A (en) | Smart mobile phone management system | |
CN105491408B (en) | A kind of unified payment platform applied to Intelligent set top box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151118 |
|
WD01 | Invention patent application deemed withdrawn after publication |