CN114944944A - Permission allocation method and device based on JSON data and computer equipment - Google Patents

Permission allocation method and device based on JSON data and computer equipment Download PDF

Info

Publication number
CN114944944A
CN114944944A CN202210481471.3A CN202210481471A CN114944944A CN 114944944 A CN114944944 A CN 114944944A CN 202210481471 A CN202210481471 A CN 202210481471A CN 114944944 A CN114944944 A CN 114944944A
Authority
CN
China
Prior art keywords
role
authority
permission
network environment
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210481471.3A
Other languages
Chinese (zh)
Inventor
刘超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Blue Ocean Online Technology Co ltd
Original Assignee
Beijing Blue Ocean Online Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Blue Ocean Online Technology Co ltd filed Critical Beijing Blue Ocean Online Technology Co ltd
Priority to CN202210481471.3A priority Critical patent/CN114944944A/en
Publication of CN114944944A publication Critical patent/CN114944944A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a permission distribution method, a permission distribution device and computer equipment based on JSON data, which belong to the technical field of computers, and the distribution method comprises the following steps: acquiring a role creating request, and identifying the current network environment of the role creating request; based on the role creating request, creating a corresponding new role; identifying the permission level of the new role, and judging whether the current network environment has an old role with the same permission level as the new role; and if so, carrying out authority distribution on the new role according to the authority type of the old role. The method and the device have the effects of improving distribution efficiency and improving user experience.

Description

Permission allocation method and device based on JSON data and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for right assignment based on JSON data, and a computer device.
Background
With the continuous development of the internet, the technical opening of packaging a series of services as data interfaces is now becoming a future strategy of each large internet company in the current internet era.
At present, enterprise informatization becomes an important guarantee for realizing sustainable development of brands and improving market competitiveness, and a Management Information System (MIS) is an important means for enterprise informatization. For the management information system, the management of the user authority is one of the most basic functions, and provides a comprehensive and flexible authority management function for the user, so that operators in different departments, different posts and even different levels have different system operation authorities, each operator can perform its own function, and the safety and responsibility traceability of the system are ensured.
In view of the above-described related art, the inventors found that: when authority allocation is carried out, the authority allocation is tedious, and the user experience is poor.
Disclosure of Invention
In order to improve experience, the application provides a permission distribution method and device based on JSON data and computer equipment.
In a first aspect, the method for right assignment based on JSON data provided in the present application adopts the following technical scheme:
a permission distribution method based on JSON data comprises the following steps:
acquiring a role creating request, and identifying the current network environment of the role creating request;
based on the role creating request, creating a corresponding new role;
identifying the permission level of the new role, and judging whether the current network environment has an old role with the permission level same as that of the new role;
and if so, distributing the authority to the new role according to the authority type of the old role.
By adopting the technical scheme, when a user creates a new role, the current network environment of the user is identified, then an old role before the current network environment is obtained, the permission level of the new role is compared with the permission level of the old role, if the permission levels belong to the same level, permission is distributed to the new role according to the permission type of the old role, permission does not need to be added one by one, distribution efficiency is improved, and the improvement of the experience feeling of the user is facilitated.
Preferably, if so, after assigning the authority to the new role according to the authority type of the old role, the method further includes:
if not, distributing general authority to the new role; wherein the permission types include general permission and special permission.
By adopting the technical scheme, the authority comprises the general authority and the special authority, when the current network environment does not have the role with the same authority level as the new role, the general authority is allocated to the new role, and then the corresponding special authority is allocated according to actual needs, so that the method is more practical.
Preferably, if not, after assigning a general right to the new role, the method further includes:
and acquiring the authority distribution result of the new role, and adding the authority distribution result to the tree graph through the node relation.
Preferably, the acquiring all rights of the new role and adding the result of the rights to the tree graph through the node relationship includes:
identifying tree nodes of the permission tree graph, and establishing corresponding permission nodes on the tree graph based on the permission level of the new role;
acquiring all permissions of roles, and creating a permission graph on the permission node;
and acquiring the distributed authority of the new role, and checking corresponding authority on the authority graph based on the distributed authority.
By adopting the technical scheme, the data is added to the dendrogram through the node relation, the dendrogram is perfected, and the subsequent checking and changing are convenient.
Preferably, if not, after assigning a general right to the new role, the method further includes:
acquiring a transfer request of a current role; and identifying a target network environment of the transfer request;
identifying a target network environment needing to be transferred, and transferring the current role to the target network environment;
deleting the authority node of the current role in the current network environment, and judging whether the target network environment has a target role with the same authority level as the current role;
and if so, distributing the authority to the current role according to the authority type of the target role.
Preferably, the identifying a target network environment to be transferred and transferring the current role to the target network environment includes:
judging whether the current network environment and the target network environment belong to a correlation network;
if yes, judging whether the target network environment is in a transferable state;
and if so, transferring the current role to the target network environment.
By adopting the technical scheme, a plurality of subsidiaries can be arranged under the main company, when personnel among the subsidiaries are mobilized, the subsidiaries belonging to the same main company are identified, so that the authority of the personnel can be directly transferred among the subsidiaries, the main company does not need to be reported and mobilized by the main company, the flow can be reduced, and the experience of a user is improved.
In a second aspect, the present application provides a permission allocation apparatus based on JSON data, which adopts the following technical scheme:
a permission distribution device based on JSON data comprises:
an acquisition identification module: the network environment recognition system comprises a network environment recognition module, a role creation module and a role recognition module, wherein the network environment recognition module is used for acquiring a role creation request and recognizing the current network environment of the role creation request;
an acquisition module: the method comprises the steps of obtaining an administrator role creation request;
a creation module: the role creating device is used for creating a corresponding new role based on the role creating request;
an identification and judgment module: the system is used for identifying the permission level of the new role and judging whether the current network environment has an old role with the permission level same as that of the new role;
a distribution module: and if so, carrying out authority distribution on the new role according to the authority type of the old role.
By adopting the technical scheme, when a user creates a new role, the current network environment of the user is identified, then an old role before the current network environment is obtained, the permission level of the new role is compared with the permission level of the old role, and if the permission levels belong to the same level, permission is distributed to the new role according to the permission type of the old role, so that the permission does not need to be added one by one, the distribution efficiency is improved, and the user experience is improved.
In a third aspect, the present application provides a computer device, which adopts the following technical solution:
a computer device comprising a memory and a processor, the memory having stored thereon a computer program which can be loaded by the processor and which performs the method of any of the above.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium storing a computer program that can be loaded by a processor and executed to perform any of the methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. when a user creates a new role, the permission level of the new role is compared with the permission level of the old role, and if the permission levels belong to the same level, permission is distributed to the new role according to the permission type of the old role, so that the distribution efficiency can be improved, and the experience of the user can be improved;
2. when the personnel among the subsidiaries are mobilized, the authority of the personnel can be directly transferred among the subsidiaries, the process can be reduced, and the experience of the user is improved.
Drawings
Fig. 1 is a flowchart of a permission assignment method based on JSON data in an embodiment of the present application;
FIG. 2 is a diagram of a rights tree in an embodiment of the present application;
fig. 3 is a block diagram of a structure of a permission assignment device based on JSON data in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to fig. 1-3 and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The embodiment of the application discloses a permission allocation method based on JSON data. Referring to fig. 1, the rights assignment method includes the steps of:
s1: a role creation request is obtained, and a current network environment of the role creation request is identified.
Specifically, the role creation request is a request for creating a role for an administrator, and the current network environment is the current login company. An administrator can log in the server through the account password to manage the authority of the company, for example, the administrator of company A logs in the server to manage the authority, and at the moment, the current network environment is company A; and C, the administrator of the company B logs in the server to carry out authority management, and the current network environment is the company B.
S2: and creating a corresponding new role based on the role creation request.
Specifically, according to the role creation request of the administrator, a corresponding new role is created on the personnel architecture table and the authority tree diagram.
S3: and identifying the permission level of the new role, and judging whether the current network environment has an old role with the permission level same as that of the new role.
For example, the role includes a common employee, a supervisor and a manager, wherein, the authority level of the common employee is level i, the authority level of the supervisor is level ii, the authority level of the manager is level iii, and the authority levels are: class III > class II > class I.
The new role can be an employee newly recruited by the company, and can also be an old employee of which the post level is not changed, and the old role is an old employee of which the post level is not changed.
For example, company a has employee a1, employee a2, employee a3, and employee a4, where employee a1, employee a2, and employee a3 are general employees, the authority levels of employee a1, employee a2, and employee a3 are level i, the authority level of employee a4 is level ii, and at this time, if company a recruits an employee a5 newly, employee a5 is in a new role, and employee a1, employee a2, employee a3, and employee a4 are in an old role; alternatively, employee a 1's post is changed from a normal employee to a supervisor, at which point employee a1 is in the new role and employee a2, employee a3, and employee a4 are in the old role.
The current network environment is company a, for example, if the post of the newly recruited employee a5 is a normal employee or a supervisor, and at this time, company a has a normal employee or a supervisor post, company a has an old role with the same authority level as the new role; if the post of the newly recruited employee a5 is manager and the previous company A has no employees on the manager post, company A does not have an old role with the same privilege level as the new role.
S4: and if so, distributing the authority to the new role according to the authority type of the old role.
For example, the types of permissions for a common employee are: inquiring and modifying; the supervisor authority types are: inquiring, modifying and distributing; the authority types of the manager are as follows: inquiring, modifying, adding, deleting and transferring; if the post of the newly recruited employee a5 is a common employee, performing authority distribution to the employee a5 according to the authority type of the common employee, that is, the authority type of the employee a5 includes: inquiring and modifying; if the post of the newly recruited employee a5 is a supervisor, authority assignment is performed to employee a5 according to the authority type of the supervisor, that is, the authority types of employee a5 are: querying, modifying and distributing.
Optionally, after step S4, that is, if yes, after assigning the authority to the new role according to the authority type of the old role, the method includes:
s5: if not, the new role is assigned with a general authority.
Specifically, the authority types include a general authority and a special authority, for example, the authority of a general employee is the general authority, i.e., the authority is inquired and modified into the general authority, and the authority is allocated, added and deleted into the special authority. When the company A does not have an old role with the same authority level as the new role, the common authority is allocated to the new role, and then the administrator allocates the special authority according to the post level of the new role.
Optionally, after step S5, that is, if no, after assigning a general right to the new role, the method includes:
s6: and acquiring the authority distribution result of the new role, and adding the authority distribution result to the tree graph through the node relation.
Specifically, the authority node of the new role is added to the corresponding node on the tree graph according to the authority level, and the authority node shows the authority of the new role, so that an administrator can know and change the authority conveniently.
Optionally, in step S6, obtaining the permission assignment result of the new role, and adding the permission assignment result to the tree graph through a node relationship, where the method includes:
s61: and identifying tree nodes of the authority tree graph, and establishing corresponding authority nodes on the tree graph based on the authority level of the new role.
S62: and acquiring all permissions of the roles, and creating a permission graph on the permission node.
S63: and acquiring the distributed authority of the new role, and checking corresponding authority on the authority graph based on the distributed authority.
Referring to fig. 2, for example, if the new role is zhang san, and the post level of zhang san is a manager, at this time, by identifying all tree nodes of the tree graph, and the level of authority same as the authority level of zhang san is level iii, an authority node is added at this level, the name of the authority node is zhang san, then an authority graph is generated under zhang san, all authorities are shown on the authority graph, a selection box is arranged in front of the authority, and checking is performed on the selection box to indicate that the authority is possessed; and finally, checking on a corresponding selection frame according to the assigned permission of Zhang III, wherein the administrator can also manually check and cancel the checking so as to adjust the permission of the role.
Optionally, after step S5, that is, if no, after assigning a general right to the new role, the method includes:
s7: acquiring a transfer request of a current role; and identifies a target network environment for the transfer request.
S8: and identifying a target network environment needing to be transferred, and transferring the current role to the target network environment.
S9: and deleting the authority node of the current role in the current network environment, and judging whether the target network environment has a target role with the same authority level as the current role.
S10: and if so, carrying out authority distribution on the current role according to the authority type of the target role.
For example, company H has subsidiary H1 and subsidiary H2, and subsidiary H1 is associated with subsidiary H2 by labeling subsidiary H1 with subsidiary H2. The employee lee four of the subsidiary h1 needs to tune to the subsidiary h2, at this time, the subsidiary h1 is the current network environment, the subsidiary h2 is the target network environment, and lee four is the current role.
For example, the post level after the fourth regulation is manager, the post level of the fifth regulation of the employee of the subsidiary company h2 is manager, and after the fourth regulation is transferred to the subsidiary company h2, the authority node of the fourth regulation in the subsidiary company h1 is deleted, the authority of the fourth regulation is distributed according to the authority type of the fifth regulation, and the authority node of the fourth regulation is generated in the subsidiary company h 2.
Optionally, in step S8, identifying a target network environment that needs to be transferred, and transferring the current role to the target network environment includes:
s81: and judging whether the current network environment and the target network environment belong to the associated network.
S82: if yes, judging whether the target network environment is in a transferable state.
S83: and if so, transferring the current role to the target network environment.
Specifically, the marks of the current network environment and the target network environment are identified, if the marks are the same, the marks belong to the associated network, and if the marks are different, the marks do not belong to the associated network.
Where the network environment includes both transferable and non-transferable states, for example, a person of subsidiary h1 mobilizes to subsidiary h2, at which point the administrator of subsidiary h2 changes the state of subsidiary h2 to a transferable state and can be set to accept that company's transfer. The administrator of the subsidiary h1 selects the corresponding employee and drags the corresponding employee to the corresponding area, so that the corresponding employee can be transferred to the subsidiary h2, and the batch operation can be carried out.
Referring to fig. 3, an embodiment of the present application further discloses a permission assignment device based on JSON data, including:
an acquisition identification module: the network environment recognition system is used for acquiring a role creating request and recognizing the current network environment of the role creating request;
an acquisition module: the method comprises the steps of obtaining an administrator role creation request;
a creation module: the role creating device is used for creating a corresponding new role based on the role creating request;
an identification and judgment module: the system is used for identifying the permission level of the new role and judging whether the current network environment has an old role with the permission level same as that of the new role;
a distribution module: and if so, performing authority distribution on the new role according to the authority type of the old role.
For specific limitation of the JSON-data-based permission allocation device, refer to the above limitation on the JSON-data-based permission allocation method, and details are not described herein again. The modules in the JSON data-based permission allocation device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The embodiment of the application also discloses computer equipment which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute the JSON data-based permission allocation method.
The embodiment of the application also discloses a computer readable storage medium, which stores a computer program capable of being loaded by a processor and executing the JSON data-based permission allocation method.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, the computer program can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink), DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
A processor in the present application may include one or more processing cores. The processor executes the various functions of the present application and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, invoking data stored in the memory, and so on. The Processor may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Central Processing Unit (CPU), a controller, a microcontroller, and a microprocessor. It is understood that the electronic devices for implementing the above processor functions may be other devices, and the embodiments of the present application are not limited in particular.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules, so as to perform all or part of the functions described above.

Claims (9)

1. A permission distribution method based on JSON data is characterized by comprising the following steps:
acquiring a role creating request, and identifying the current network environment of the role creating request;
based on the role creating request, creating a corresponding new role;
identifying the permission level of the new role, and judging whether the current network environment has an old role with the same permission level as the new role;
and if so, distributing the authority to the new role according to the authority type of the old role.
2. The JSON data-based permission allocation method according to claim 1, wherein if so, after performing permission allocation to the new role according to the permission type of the old role, the method further comprises:
if not, distributing general authority to the new role; wherein the permission types include general permission and special permission.
3. The JSON data-based permission assignment method according to claim 2, wherein if not, after assigning a general permission to the new role, the method further comprises:
and acquiring the authority distribution result of the new role, and adding the authority distribution result to the tree graph through the node relation.
4. The JSON data-based permission distribution method according to claim 2, wherein the obtaining all permissions of the new role and adding permission results to the dendrogram through node relationships comprises:
identifying tree nodes of the authority tree graph, and establishing corresponding authority nodes on the tree graph based on the authority level of the new role;
acquiring all permissions of roles, and creating a permission graph on the permission node;
and acquiring the distributed authority of the new role, and checking corresponding authority on the authority graph based on the distributed authority.
5. The JSON data-based permission assignment method according to claim 2, wherein if not, after assigning a general permission to the new role, the method further comprises:
acquiring a transfer request of a current role; and identifying a target network environment of the transfer request;
identifying a target network environment needing to be transferred, and transferring the current role to the target network environment;
deleting the authority node of the current role in the current network environment, and judging whether the target network environment has a target role with the same authority level as the current role;
and if so, distributing the authority to the current role according to the authority type of the target role.
6. The JSON data-based permission assignment method according to claim 5, wherein the identifying a target network environment to be transferred and transferring the current role to the target network environment comprises:
judging whether the current network environment and the target network environment belong to the associated network;
if yes, judging whether the target network environment is in a transferable state;
and if so, transferring the current role to the target network environment.
7. An authority allocation apparatus based on JSON data, comprising:
an acquisition identification module: the network environment recognition system comprises a network environment recognition module, a role creation module and a role recognition module, wherein the network environment recognition module is used for acquiring a role creation request and recognizing the current network environment of the role creation request;
an acquisition module: the method comprises the steps of obtaining an administrator role creation request;
a creation module: the role creating device is used for creating a corresponding new role based on the role creating request;
an identification and judgment module: the system is used for identifying the permission level of the new role and judging whether the current network environment has an old role with the permission level same as that of the new role;
a distribution module: and if so, performing authority distribution on the new role according to the authority type of the old role.
8. A computer device comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes the method according to any one of claims 1 to 6.
9. A computer-readable storage medium, characterized in that a computer program is stored which can be loaded by a processor and which executes a method according to any one of claims 1 to 6.
CN202210481471.3A 2022-05-05 2022-05-05 Permission allocation method and device based on JSON data and computer equipment Pending CN114944944A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210481471.3A CN114944944A (en) 2022-05-05 2022-05-05 Permission allocation method and device based on JSON data and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210481471.3A CN114944944A (en) 2022-05-05 2022-05-05 Permission allocation method and device based on JSON data and computer equipment

Publications (1)

Publication Number Publication Date
CN114944944A true CN114944944A (en) 2022-08-26

Family

ID=82908167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210481471.3A Pending CN114944944A (en) 2022-05-05 2022-05-05 Permission allocation method and device based on JSON data and computer equipment

Country Status (1)

Country Link
CN (1) CN114944944A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104412A (en) * 2018-07-13 2018-12-28 万翼科技有限公司 Account right management method, management system and computer readable storage medium
CA3070896A1 (en) * 2017-07-24 2019-01-31 Chengdu Qianniucao Information Technology Co., Ltd. Method for setting permission of user in information exchange unit in system
CN110941839A (en) * 2019-11-18 2020-03-31 中国经济信息社有限公司 User authority management method and system, equipment and storage medium
CN111460496A (en) * 2020-03-30 2020-07-28 招商局金融科技有限公司 Permission configuration method based on user role, electronic device and storage medium
CN111460500A (en) * 2020-03-31 2020-07-28 贵州电网有限责任公司 Authority management method of network resources
CN111475825A (en) * 2020-03-27 2020-07-31 杭州数梦工场科技有限公司 Role authority setting method and device
CN111709046A (en) * 2020-06-23 2020-09-25 中国平安财产保险股份有限公司 User permission data configuration method, device, equipment and storage medium
US20200389463A1 (en) * 2017-04-22 2020-12-10 Chengdu Qianniucao Information Technology Co., Ltd, Permission granting method and system based on one-to-one correspondence between roles and users
CN112187748A (en) * 2020-09-15 2021-01-05 中信银行股份有限公司 Cross-network access control management method and device and electronic equipment
CN112307444A (en) * 2020-10-30 2021-02-02 平安数字信息科技(深圳)有限公司 Role creation method, role creation device, computer equipment and storage medium
WO2021137757A1 (en) * 2019-12-31 2021-07-08 Envision Digital International Pte. Ltd. Authority management method and apparatus, and electronic device, and storage medium thereof
CN113505996A (en) * 2021-07-13 2021-10-15 上海数禾信息科技有限公司 Authority management method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200389463A1 (en) * 2017-04-22 2020-12-10 Chengdu Qianniucao Information Technology Co., Ltd, Permission granting method and system based on one-to-one correspondence between roles and users
CA3070896A1 (en) * 2017-07-24 2019-01-31 Chengdu Qianniucao Information Technology Co., Ltd. Method for setting permission of user in information exchange unit in system
CN109104412A (en) * 2018-07-13 2018-12-28 万翼科技有限公司 Account right management method, management system and computer readable storage medium
CN110941839A (en) * 2019-11-18 2020-03-31 中国经济信息社有限公司 User authority management method and system, equipment and storage medium
WO2021137757A1 (en) * 2019-12-31 2021-07-08 Envision Digital International Pte. Ltd. Authority management method and apparatus, and electronic device, and storage medium thereof
CN111475825A (en) * 2020-03-27 2020-07-31 杭州数梦工场科技有限公司 Role authority setting method and device
CN111460496A (en) * 2020-03-30 2020-07-28 招商局金融科技有限公司 Permission configuration method based on user role, electronic device and storage medium
CN111460500A (en) * 2020-03-31 2020-07-28 贵州电网有限责任公司 Authority management method of network resources
CN111709046A (en) * 2020-06-23 2020-09-25 中国平安财产保险股份有限公司 User permission data configuration method, device, equipment and storage medium
CN112187748A (en) * 2020-09-15 2021-01-05 中信银行股份有限公司 Cross-network access control management method and device and electronic equipment
CN112307444A (en) * 2020-10-30 2021-02-02 平安数字信息科技(深圳)有限公司 Role creation method, role creation device, computer equipment and storage medium
CN113505996A (en) * 2021-07-13 2021-10-15 上海数禾信息科技有限公司 Authority management method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PENG GAO;XIAODONG LI;ZHIGANG JIN;HANHUI ZHU;NAN ZHANG: "Role-Based Authority Control in Management Information System under the Background of Internet", 《CIPAE 2020: PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTERS, INFORMATION PROCESSING AND ADVANCED EDUCATION》, pages 64 *
董向文: "基于RBAC权限模型实现医院计算机信息管理的研究", 《计算机测量与控制》, vol. 28, no. 8, pages 223 - 227 *

Similar Documents

Publication Publication Date Title
CN112615849B (en) Micro-service access method, device, equipment and storage medium
CN110297672B (en) Page dynamic generation method and device, computer equipment and storage medium
CN107403106B (en) Database fine-grained access control method based on terminal user
CN110290112B (en) Authority control method and device, computer equipment and storage medium
CN108965388B (en) Operation and maintenance auditing method and device
CN109104412B (en) Account authority management method, account authority management system and computer readable storage medium
CN110138669B (en) Interface access processing method and device, computer equipment and storage medium
CN111191221A (en) Method and device for configuring authority resources and computer readable storage medium
CN110008665B (en) Authority control method and device for blockchain
CN110532025B (en) Data processing method, device and equipment based on micro-service architecture and storage medium
CN112528251B (en) User account authority management method, device, equipment and readable medium
CN110839014B (en) Authentication method, authentication device, computer equipment and readable storage medium
CN108156175B (en) Method for accessing shared storage information under cloud computing platform
CN112328982A (en) Data access control method, device, equipment and storage medium
CN112288400A (en) Multi-system data interaction method and device, computer equipment and storage medium
GB2529721A (en) Temporary authorizations to access a computing system based on user skills
CN113949579B (en) Website attack defense method and device, computer equipment and storage medium
CN111130991A (en) Instant messaging information processing method and device, computer equipment and storage medium
CN114090976A (en) Authority management method, device, electronic equipment and storage medium
CN113660229A (en) Multi-system single sign-on method, device, equipment and medium based on RPA
CN114944944A (en) Permission allocation method and device based on JSON data and computer equipment
CN113742369B (en) Data authority management method, system and storage medium
CN110543465A (en) directory operation method and device, computer equipment and storage medium
CN113296657B (en) Dangerous authority management method, device, equipment and storage medium of android system
CN111814174B (en) Data access control method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240607