CN105069331A - Computer binary code format based permission control method - Google Patents

Computer binary code format based permission control method Download PDF

Info

Publication number
CN105069331A
CN105069331A CN201510481289.8A CN201510481289A CN105069331A CN 105069331 A CN105069331 A CN 105069331A CN 201510481289 A CN201510481289 A CN 201510481289A CN 105069331 A CN105069331 A CN 105069331A
Authority
CN
China
Prior art keywords
authority
control method
computer
code
computer binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510481289.8A
Other languages
Chinese (zh)
Inventor
王世华
薛斌
廖志民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Zen-Yield Technologies Co Ltd
Original Assignee
Suzhou Zen-Yield Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Zen-Yield Technologies Co Ltd filed Critical Suzhou Zen-Yield Technologies Co Ltd
Priority to CN201510481289.8A priority Critical patent/CN105069331A/en
Publication of CN105069331A publication Critical patent/CN105069331A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a computer binary code format based permission control method. Binary encoding rules are reasonably combined and applied to ensure that each subscriber can produce a corresponding permission code composed of computer binary encoding formats, and only a front end decoding rule is needed to guarantee the consistency with a service terminal, so that the control of front end functions or display can be implemented very easily. The computer binary code format based permission control method adopts simple encoding and storage modes to solve the problem that a conventional permission control system is not suitable for use on a specific person.

Description

Permission control method based on computer binary coding format
Technical Field
The invention relates to a permission control method based on a computer binary coding format.
Background
Traditional rights control is typically applied to office system management. A conventional authorization system generally includes a role ID and a function ID, where one role ID may correspond to a plurality of function IDs, and each user may have one role ID. This results in different roles having to be created first, in order to assign different functions to different users. Not for setting permissions for a single user.
Disclosure of Invention
The invention aims to provide a privilege control method based on a computer binary coding format, which is characterized in that binary coding rules are reasonably combined and applied to enable each user to generate corresponding privilege codes, the privilege codes consist of the computer binary coding format, and the control on the front-end function or display can be very easily realized only by ensuring the consistency of the decoding rule of the front end and the server.
In order to achieve the above object, the technical solution of the present invention is to design a method for controlling authority based on a binary code format of a computer, comprising the following steps:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
Preferably, the decoding rules of the front-end product are server-side consistent.
The invention has the advantages and beneficial effects that: the privilege code is composed of the computer binary coding format, and the control of the front-end function or display can be very easily realized only by ensuring the decoding rule of the front end and the consistency of the server. The invention adopts simple coding and storage modes to solve the problem that the traditional authority control system is not suitable for being applied to a specific person.
Detailed Description
The following further describes embodiments of the present invention with reference to examples. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The technical scheme of the specific implementation of the invention is as follows:
a permission control method based on a computer binary coding format comprises the following steps:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
The decoding rules of the front-end product are consistent with the server side.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the technical principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (2)

1. The authority control method based on the computer binary coding format is characterized by comprising the following steps of:
1) coding and sequencing the existing functions by using a computer binary rule at a server side, and defining a coding rule; the rationale in the rules is: "0" means off, "1" means on;
2) creating an authority attribute for each user, wherein the authority attribute comprises an authority code which is a string of codes consisting of computer binaries;
3) when a user uses a front-end product, the system firstly returns an authority code corresponding to the user according to the user identification, and the front-end product judges the display or shadow hiding of the function according to the authority code and a decoding rule;
wherein,
the authority code is set according to the following steps: firstly, listing all functions to be controlled, arranging the functions according to a binary principle of 0 or 1, closing 0 marks, hiding 1 marks, and enabling each function to be controlled to correspond to one 0 or 1, and then stringing the 0 or 1 together to form the authority code.
2. The computer binary code format-based entitlement control method of claim 1 wherein the decoding rules of the front-end product are server-side contingent.
CN201510481289.8A 2015-08-07 2015-08-07 Computer binary code format based permission control method Pending CN105069331A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510481289.8A CN105069331A (en) 2015-08-07 2015-08-07 Computer binary code format based permission control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510481289.8A CN105069331A (en) 2015-08-07 2015-08-07 Computer binary code format based permission control method

Publications (1)

Publication Number Publication Date
CN105069331A true CN105069331A (en) 2015-11-18

Family

ID=54498694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510481289.8A Pending CN105069331A (en) 2015-08-07 2015-08-07 Computer binary code format based permission control method

Country Status (1)

Country Link
CN (1) CN105069331A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512515A (en) * 2015-11-30 2016-04-20 上海爱数信息技术股份有限公司 Method for controlling display of function modules based on permission masks
CN106650483A (en) * 2015-11-04 2017-05-10 广东华邦云计算股份有限公司 Data authority storage and search method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139023A1 (en) * 2002-03-05 2004-07-15 Zhongyang Huang Method for implementing mpeg-21 ipmp
EP1619571A1 (en) * 2004-07-19 2006-01-25 Sony Deutschland GmbH Method for providing protected audio/video content
CN101833614A (en) * 2009-03-10 2010-09-15 上海盈哲信息科技有限公司 Piece-protection digital resource right control method
CN103238150A (en) * 2010-11-02 2013-08-07 谷歌公司 Realtime synchronized document editing by multiple users for blogging

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139023A1 (en) * 2002-03-05 2004-07-15 Zhongyang Huang Method for implementing mpeg-21 ipmp
EP1619571A1 (en) * 2004-07-19 2006-01-25 Sony Deutschland GmbH Method for providing protected audio/video content
CN101833614A (en) * 2009-03-10 2010-09-15 上海盈哲信息科技有限公司 Piece-protection digital resource right control method
CN103238150A (en) * 2010-11-02 2013-08-07 谷歌公司 Realtime synchronized document editing by multiple users for blogging

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650483A (en) * 2015-11-04 2017-05-10 广东华邦云计算股份有限公司 Data authority storage and search method and device
CN105512515A (en) * 2015-11-30 2016-04-20 上海爱数信息技术股份有限公司 Method for controlling display of function modules based on permission masks

Similar Documents

Publication Publication Date Title
KR20030071395A (en) System for protecting and managing digital contents
CN109525653B (en) Multi-user sharing method and system for intelligent equipment
CN103144447B (en) Based on 3D printer family expenses system and its implementation of cloud platform
CN106878736A (en) A kind of method and apparatus of coding and decoding video
PH12014502530A1 (en) Social platform with enhanced privacy and integrated customization features
MXPA04000999A (en) Encrypted data delivery system.
CN205353936U (en) Data interaction system based on VR equipment
MY200899A (en) Permission Management And Resource Control Method And Apparatus
CN105069331A (en) Computer binary code format based permission control method
CN103051638A (en) Multimedia data encryption method and multimedia data encryption distributing system
CN118199916B (en) Screen projection control method and device for LED video wall, electronic equipment and medium
CN205071410U (en) Controlling means of LED intelligence lamp
CN103475923A (en) Television with remote control function defined by user and remote control
CN106055222A (en) System and method for terminal multi-user switching
CN104613308B (en) A kind of filling machine on-line correction method based on hand-held correcting unit
CN109684868A (en) The authority setting method of ACL multi-tenant system
CN105426772A (en) Method for securely storing root key required by encryption and authentication in FLASH
CN103279501B (en) In batches to the method and apparatus that adds anti-importing coded lock in swf file
Graham et al. “Buffy contrast adaptation” with a single Gabor patch
CN204991100U (en) But LED display screen control system of locking
CN106534263A (en) Industrial design service platform
CN209710240U (en) A kind of image generation system and digital signage system
Bárcenas Jon the Cynic: Dog Philosophy 101
CN106210319A (en) Smart mobile phone management system
CN105491408B (en) A kind of unified payment platform applied to Intelligent set top box

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151118

WD01 Invention patent application deemed withdrawn after publication