CN107241330A - A kind of right management method and system based on system user group - Google Patents
A kind of right management method and system based on system user group Download PDFInfo
- Publication number
- CN107241330A CN107241330A CN201710425470.6A CN201710425470A CN107241330A CN 107241330 A CN107241330 A CN 107241330A CN 201710425470 A CN201710425470 A CN 201710425470A CN 107241330 A CN107241330 A CN 107241330A
- Authority
- CN
- China
- Prior art keywords
- user
- group
- authority
- keeper
- new
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of right management method based on system user group and system;It the described method comprises the following steps:S1, according to the different rights of user set up multiple user's groups;S2, keeper carry out empowerment management to each user's group respectively;S3, the authority to new user are acquired and verified, and user is added into the corresponding user's group of the authority after the completion of Authority Verification.Method proposed by the present invention is verified without the authority to each user and individually authorized for the user after the completion of checking, is reduced the quantity of keeper's work transaction, is conducive to improving the operating efficiency of keeper;Only the authority of new user need to be acquired and be verified can be added to corresponding user's group by new user, not only reduce the workload of keeper, improve the operating efficiency of keeper, and reduce the stand-by period of user, the operational effect of system is improved, the implementation validity of right management method proposed by the present invention is greatly embodied.
Description
Technical field
The present invention relates to right management method technical field, more particularly to a kind of rights management side based on system user group
Method and system.
Background technology
During application system development, the authority of same class user is largely identical, such as:Student, teacher etc., management
The system operatio authority and system data access rights that member distributes for such user are identical, and the above-mentioned use with identical authority
Family may be collectively referred to as same user's group.System to user when authorizing, and traditional way is that each user is authorized,
This authorization workload when number of users is larger is quite big, not only needs keeper to authorize each user, increases
Add the working frequency of keeper, and needed to take a substantial amount of time, reduce the operational efficiency of system.
A kind of right management method based on system user group proposed by the present invention, emphatically by the user with identical authority
Classification is defined as a group, and all user members then given in user's group progress empowerment management, the user's group have should
Group rights that have been granted;Meanwhile, when increasing a user newly, individually authorized without to Adding User, it is only necessary to by the user
It is added in user's group, the user can possess all permissions of the user's group.
The content of the invention
The technical problem existed based on background technology, the present invention proposes a kind of rights management side based on system user group
Method and system.
Right management method proposed by the present invention based on system user group, comprises the following steps:
S1, according to the different rights of user set up multiple user's groups;
S2, keeper carry out empowerment management to each user's group respectively;
S3, the authority to new user are acquired and verified, and user is added into the authority pair after the completion of Authority Verification
The user's group answered.
Preferably, step S2 is specifically included:
Keeper carries out empowerment management to each user's group respectively, and authorization includes system operatio authority and system
Data access authority.
Preferably, step S3 is specifically included:
Authority and the checking of new user is gathered, after the completion of Authority Verification, the new user is added its authority body by keeper
In the corresponding user's group of part, new user is added into after the user's group, that is, is possessed the user's group and authorized limit.
Rights Management System proposed by the present invention based on system user group, including:
User's group sets up module, for setting up multiple user's groups according to the different rights of user;
Keeper's authorization module, multiple user's groups for setting up module foundation to user's group carry out empowerment management;
User's distribute module, is acquired and verifies for the authority to new user, and will be used after the completion of Authority Verification
Family adds the corresponding user's group of the authority.
Preferably, keeper's authorization module specifically for:
Keeper carries out empowerment management to each user's group respectively, and authorization includes system operatio authority and system
Data access authority.
Preferably, user's distribute module specifically for:
Authority and the checking of new user is gathered, after the completion of Authority Verification, the new user is added its authority body by keeper
In the corresponding user's group of part, new user is added into after the user's group, that is, is possessed the user's group and authorized limit.
The present invention sets up multiple user's groups according to the different rights of user first, and then keeper is respectively to multiple user's groups
Empowerment management is carried out, when there is new user, system is acquired and verified to the authority of the new user, after the completion of Authority Verification
It can learn which user's group the user belongs to, then the user is added to corresponding user's group, the user is added into above-mentioned
After user's group, that is, possess all permissions that the user's group is awarded.Method proposed by the present invention is without the power to each user
Limit is verified and individually authorized for the user after the completion of checking, is reduced the quantity of keeper's work transaction, is conducive to carrying
The operating efficiency of high keeper;Meanwhile, when to new user carry out Authority Verification when, only the authority of new user need to be acquired and
New user can be added to corresponding user's group by checking, without individually being authorized to user again, not only reduce management
The workload of member, improves the operating efficiency of keeper, and reduces the stand-by period of user, improves the operation effect of system
Really, the implementation validity of right management method proposed by the present invention is greatly embodied.
Brief description of the drawings
Fig. 1 is a kind of step schematic diagram of the right management method based on system user group;
Fig. 2 is a kind of structural representation of the Rights Management System based on system user group.
Embodiment
As shown in Figure 1 and Figure 2, Fig. 1, Fig. 2 for a kind of right management method based on system user group proposed by the present invention and
System.
Reference picture 1, the right management method proposed by the present invention based on system user group, comprises the following steps:
S1, according to the different rights of user set up multiple user's groups;System gathers the different rights of different user first, so
Multiple different user's groups are set up according to above-mentioned different rights afterwards, each corresponding user's group is a kind of user right identity.
S2, keeper carry out empowerment management to each user's group respectively;
In present embodiment, step S2 is specifically included:
Keeper carries out empowerment management, after keeper is to each user's group mandate, the use to each user's group respectively
It is the authority that its owning user group is authorized that all users, which are respectively provided with keeper, in the group of family;Wherein, authorization is grasped including system
Make authority and system data access rights so that user can conduct interviews and grasp to system on the basis of possessing above-mentioned authority
Make.
S3, the authority to new user are acquired and verified, and user is added into the authority pair after the completion of Authority Verification
The user's group answered.
Step S3 is specifically included:
Authority and the checking of new user is gathered, to examine the new user to belong to the user of any authority, works as Authority Verification
After the completion of, you can know the authority identity of above-mentioned new user, now keeper that the new user is added into its authority identity is corresponding
In user's group, new user is added into after the user's group, that is, is possessed the user's group and authorized limit;In this way, there is new user to access system
During system, keeper only need to be acquired and verify to the authority identity of new user, and new user is added into its authority identity pair
In the user's group answered, new user then possesses the user's group rights that have been granted, and keeper is independent without being carried out to each user
Mandate, not only reduce the task amount of keeper, and accelerate the stability of the operation of system.
Reference picture 2, Fig. 2 is the Rights Management System proposed by the present invention based on system user group, including:
User's group sets up module, for setting up multiple user's groups according to the different rights of user;System gathers difference first
The different rights of user, then set up multiple different user's groups according to above-mentioned different rights, and each user's group is corresponding to be
A kind of user right identity.
Keeper's authorization module, multiple user's groups for setting up module foundation to user's group carry out empowerment management;
Keeper's authorization module specifically for:
Keeper carries out empowerment management, after keeper is to each user's group mandate, the use to each user's group respectively
It is the authority that its owning user group is authorized that all users, which are respectively provided with keeper, in the group of family;Wherein, authorization is grasped including system
Make authority and system data access rights so that user can conduct interviews and grasp to system on the basis of possessing above-mentioned authority
Make.
User's distribute module, is acquired and verifies for the authority to new user, and will be used after the completion of Authority Verification
Family adds the corresponding user's group of the authority.
User's distribute module specifically for:
Authority and the checking of new user is gathered, to examine the new user to belong to the user of any authority, works as Authority Verification
After the completion of, you can know the authority identity of above-mentioned new user, now keeper that the new user is added into its authority identity is corresponding
In user's group, new user is added into after the user's group, that is, is possessed the user's group and authorized limit;In this way, there is new user to access system
During system, keeper only need to be acquired and verify to the authority identity of new user, and new user is added into its authority identity pair
In the user's group answered, new user then possesses the user's group rights that have been granted, and keeper is independent without being carried out to each user
Mandate, not only reduce the task amount of keeper, and accelerate the stability of the operation of system.
Present embodiment sets up multiple user's groups according to the different rights of user first, and then keeper is used multiple respectively
Family group carries out empowerment management, and when there is new user, system is acquired and verified to the authority of the new user, complete in Authority Verification
It can learn which user's group the user belongs to after, then the user is added to corresponding user's group, the user is added into
After above-mentioned user's group, that is, possess all permissions that the user's group is awarded.Method proposed by the present invention is without to each user
Authority verified and individually authorized for the user after the completion of checking, reduce the quantity of keeper's work transaction, favorably
In the operating efficiency for improving keeper;Meanwhile, when carrying out Authority Verification to new user, the authority of new user need to only be adopted
New user can be added to corresponding user's group by collection and checking, without individually being authorized to user again, be not only reduced
The workload of keeper, improves the operating efficiency of keeper, and reduces the stand-by period of user, improves the fortune of system
Row effect, greatly embodies the implementation validity of the right management method of present embodiment proposition.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto,
Any one skilled in the art the invention discloses technical scope in, technique according to the invention scheme and its
Inventive concept is subject to equivalent substitution or change, should all be included within the scope of the present invention.
Claims (6)
1. a kind of right management method based on system user group, it is characterised in that comprise the following steps:
S1, according to the different rights of user set up multiple user's groups;
S2, keeper carry out empowerment management to each user's group respectively;
S3, the authority to new user are acquired and verified, and it is corresponding after the completion of Authority Verification user to be added into the authority
User's group.
2. the right management method according to claim 1 based on system user group, it is characterised in that step S2 is specifically wrapped
Include:
Keeper carries out empowerment management to each user's group respectively, and authorization includes system operatio authority and system data
Access rights.
3. the right management method according to claim 1 based on system user group, it is characterised in that step S3 is specifically wrapped
Include:
Authority and the checking of new user is gathered, after the completion of Authority Verification, the new user is added its authority identity pair by keeper
In the user's group answered, new user is added into after the user's group, that is, is possessed the user's group and authorized limit.
4. a kind of Rights Management System based on system user group, it is characterised in that including:
User's group sets up module, for setting up multiple user's groups according to the different rights of user;
Keeper's authorization module, multiple user's groups for setting up module foundation to user's group carry out empowerment management;
User's distribute module, is acquired and verifies for the authority to new user, and add user after the completion of Authority Verification
Enter the corresponding user's group of the authority.
5. the Rights Management System according to claim 4 based on system user group, it is characterised in that keeper authorizes mould
Block specifically for:
Keeper carries out empowerment management to each user's group respectively, and authorization includes system operatio authority and system data
Access rights.
6. the Rights Management System according to claim 4 based on system user group, it is characterised in that user's distribute module
Specifically for:
Authority and the checking of new user is gathered, after the completion of Authority Verification, the new user is added its authority identity pair by keeper
In the user's group answered, new user is added into after the user's group, that is, is possessed the user's group and authorized limit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710425470.6A CN107241330A (en) | 2017-06-08 | 2017-06-08 | A kind of right management method and system based on system user group |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710425470.6A CN107241330A (en) | 2017-06-08 | 2017-06-08 | A kind of right management method and system based on system user group |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107241330A true CN107241330A (en) | 2017-10-10 |
Family
ID=59986252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710425470.6A Pending CN107241330A (en) | 2017-06-08 | 2017-06-08 | A kind of right management method and system based on system user group |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107241330A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114153902A (en) * | 2021-12-09 | 2022-03-08 | 兴业银行股份有限公司 | Management method and system of credit card big data interactive data insight platform |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159618A (en) * | 2007-11-23 | 2008-04-09 | 杭州华三通信技术有限公司 | Authority configuring method and apparatus |
CN101207639A (en) * | 2007-12-03 | 2008-06-25 | 华为技术有限公司 | Method and apparatus of classifying for user |
CN102571745A (en) * | 2011-11-16 | 2012-07-11 | 烽火通信科技股份有限公司 | User access authority management method aiming at large capacity of objects |
CN105809021A (en) * | 2016-03-04 | 2016-07-27 | 深圳市茁壮网络股份有限公司 | Method and device for distributing user permissions |
CN105991310A (en) * | 2015-02-02 | 2016-10-05 | 中国移动通信集团河北有限公司 | Account authority regulation method and device based on user behavior |
-
2017
- 2017-06-08 CN CN201710425470.6A patent/CN107241330A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159618A (en) * | 2007-11-23 | 2008-04-09 | 杭州华三通信技术有限公司 | Authority configuring method and apparatus |
CN101207639A (en) * | 2007-12-03 | 2008-06-25 | 华为技术有限公司 | Method and apparatus of classifying for user |
CN102571745A (en) * | 2011-11-16 | 2012-07-11 | 烽火通信科技股份有限公司 | User access authority management method aiming at large capacity of objects |
CN105991310A (en) * | 2015-02-02 | 2016-10-05 | 中国移动通信集团河北有限公司 | Account authority regulation method and device based on user behavior |
CN105809021A (en) * | 2016-03-04 | 2016-07-27 | 深圳市茁壮网络股份有限公司 | Method and device for distributing user permissions |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114153902A (en) * | 2021-12-09 | 2022-03-08 | 兴业银行股份有限公司 | Management method and system of credit card big data interactive data insight platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ding et al. | Application of Internet of Things and virtual reality technology in college physical education | |
WO2020216065A1 (en) | Voting method and apparatus in blockchain | |
CN113467927A (en) | Block chain based trusted participant federated learning method and device | |
WO2010145979A1 (en) | Method for registering a mobile radio in a mobile radio network | |
CN103220141B (en) | A kind of protecting sensitive data method and system based on group key strategy | |
EP1449324A1 (en) | Use of a public key key pair in the terminal for authentication and authorisation of the telecommunication user with the network operator and business partners | |
CN105337974A (en) | Account authorization method, account login method, account authorization device and client end | |
CN106485156B (en) | A kind of device and method for files in batch authorization | |
DE112013002539T5 (en) | Validation of mobile units | |
CN107426134A (en) | A kind of access control method based on relation | |
CN109409041A (en) | A kind of server-side safety certifying method and system based on the application of more certificates | |
CN110557276A (en) | Block chain computer room management system based on Fabric architecture | |
DE102020120945A1 (en) | Method for communicating between a large number of charging stations for electric vehicles, based on distributed ledger technology | |
CN107241330A (en) | A kind of right management method and system based on system user group | |
WO2014095001A1 (en) | Reputation system and method | |
EP2458569A1 (en) | Data carrier device with own processor for carrying out a network access program | |
WO2017194332A1 (en) | Improving device authentication using device monitoring data | |
CN106599718A (en) | Control method and device for information access permission | |
CN105335664A (en) | Permission management system based on B/S mode | |
CN101408955A (en) | Method and system determining obligation base on tactic | |
CN106713228A (en) | Cloud platform key management method and system | |
EP2631837B1 (en) | Method for generating a pseudonym with the help of an ID token | |
CN106302479B (en) | A kind of single-point logging method and system for multi-service internet site | |
EP2730050B1 (en) | Method for generating and verifying an electronic pseudonymous signature | |
WO2017186445A1 (en) | Method for the secure interaction of a user with a mobile terminal and a further entity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171010 |
|
RJ01 | Rejection of invention patent application after publication |