CN115037501A - Authority management system and method of BI tool - Google Patents

Authority management system and method of BI tool Download PDF

Info

Publication number
CN115037501A
CN115037501A CN202210375444.8A CN202210375444A CN115037501A CN 115037501 A CN115037501 A CN 115037501A CN 202210375444 A CN202210375444 A CN 202210375444A CN 115037501 A CN115037501 A CN 115037501A
Authority
CN
China
Prior art keywords
authority
user
target
subsystem
core
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210375444.8A
Other languages
Chinese (zh)
Other versions
CN115037501B (en
Inventor
朱建华
郑恩平
朱建福
田宏彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huayizhixin Technology Co ltd
Original Assignee
Shenzhen Huayizhixin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huayizhixin Technology Co ltd filed Critical Shenzhen Huayizhixin Technology Co ltd
Priority to CN202210375444.8A priority Critical patent/CN115037501B/en
Priority claimed from CN202210375444.8A external-priority patent/CN115037501B/en
Publication of CN115037501A publication Critical patent/CN115037501A/en
Application granted granted Critical
Publication of CN115037501B publication Critical patent/CN115037501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a system and a method for managing authority of a BI tool, wherein the system comprises an authority configuration subsystem, an administrator subsystem, a primary user subsystem, a secondary user subsystem and a functional module subsystem; the functional module subsystem comprises a plurality of system functional modules; the administrator subsystem is provided with an authority distribution module and a user management module, wherein the user management module is used for creating users by administrator users and dividing the users into primary users and secondary users; the authority distribution module is used for distributing corresponding function authority to the user; the first-level user subsystem is provided with an authority check module which is used for displaying an authority list corresponding to a first-level user, marking a part or all of the authority list as a core authority according to the selection operation of the first-level user, inquiring whether intersection related to the core authority exists between other second-level users and the first-level user after marking is finished, and displaying the second-level user if the intersection related to the core authority exists between the other second-level users and the first-level user.

Description

Authority management system and method of BI tool
Technical Field
The invention relates to the technical field of information, in particular to a permission management system and method of a Business Intelligence (BI) tool.
Background
The BI is business intelligence, is a set of complete solution scheme, is used for effectively integrating the existing data in the enterprise, quickly and accurately providing reports and providing decision basis, and helps the enterprise make intelligent business operation decisions. The concept of commercial intelligence was first introduced in 1996. Business intelligence was defined at the time as a class of technologies and applications that consisted of data warehouses (or data marts), query reporting, data analysis, data mining, data backup and recovery, etc., with the goal of helping enterprise decisions.
When the BI tool is used, an administrator (which may be one or more persons) needs to enter an administrator account to create various users and assign corresponding function permissions, and after the corresponding users log in the BI tool system, the corresponding functions can be used. In practical applications, it is found that when an administrator assigns functional rights to a user, a part of users may be assigned wrong functional rights due to misoperation, system bug or other reasons, so that the user can use functional rights that are not used, especially some important functions, such as financial data functions. The situation is difficult to be discovered in time for large enterprises with many employees unless the large enterprises are examined one by an administrator, which is time-consuming and labor-consuming.
Disclosure of Invention
In view of the above, it is a first object of the present invention to provide a rights management system of a BI tool, which can timely find out about the case where an important function right is wrongly assigned.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a permission management system of a BI tool comprises a permission configuration subsystem, an administrator subsystem, a primary user subsystem, a secondary user subsystem and a functional module subsystem;
the functional module subsystem comprises a plurality of system functional modules;
the authority configuration subsystem is used for configuring function authorities for each system function module and responding to the distribution operation of the authority distribution module to open corresponding function authorities to the user subsystem;
the administrator subsystem is provided with an authority distribution module and a user management module, wherein the user management module is used for creating users by administrator users and dividing the users into primary users and secondary users; the authority distribution module is used for distributing corresponding function authorities to the users, and each function authority corresponds to one function module;
the first-level user subsystem is provided with an authority duplication checking module which is used for displaying an authority list corresponding to a first-level user, marking a part or all of the authority list as a core authority according to the selection operation of the first-level user, inquiring whether intersection related to the core authority exists between other second-level users and the first-level user after marking is finished, and displaying the second-level user if the intersection related to the core authority exists.
Preferably, the function module subsystem is further configured to configure at least one authority target for each function module, and one authority target corresponds to one function authority;
when the authority distribution module distributes the function authority, at least one authority mark is generated for the first-level user and the second-level user according to the authority lists distributed by the first-level user and the second-level user, and one function authority corresponds to one authority mark; the authority mark comprises user information, authority information and a target address of a corresponding primary user or a corresponding secondary user, and the target address points to an authority target;
the authority duplication checking module is also used for marking the authority mark corresponding to the core authority of the primary user as a core authority mark;
the authority target collects the information of all the authority targets pointed by the authority target, inquires whether a core authority target exists, if so, continuously inquires whether other common authority targets with the same authority as the core authority target exist, and if so, sends all the information contained in the common authority targets to the primary user corresponding to the core authority targets;
the primary user subsystem receives user information associated with the common rights object from the rights object to which the core rights object points.
Preferably, after the authority mark is generated, the contained information is sent to the corresponding authority target, and the authority target generates the target record according to the received information.
Preferably, the permission duplication checking module is further configured to send a prompt message to the management user subsystem according to the marking operation of the primary user for the displayed secondary user, and report to the permission configuration subsystem if no feedback message of the management user for the prompt message is received within a preset time;
and the permission configuration subsystem is configured to automatically remove all part or all functional permissions of the other types of secondary users after receiving the reported information.
It is a second object of the present invention to provide a rights management method of a BI tool that can timely find out about the case where an important function right is erroneously assigned.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a method of rights management for a BI tool, comprising:
displaying a corresponding authority list to a first-level user;
according to the selection operation of the primary user, marking a part or all of the authority list as core authorities;
and inquiring whether the intersection related to the core authority exists between other secondary users and the primary user, and if so, displaying the secondary user.
Preferably, the method for querying whether there is crossing of core rights includes:
configuring at least one authority target for each functional module, wherein one authority target corresponds to one function authority;
generating at least one authority mark for the first-level user and the second-level user according to the distributed authority lists of the first-level user and the second-level user, wherein one authority corresponds to one authority mark; the authority mark comprises user information, authority information and a target address of a corresponding primary user or a corresponding secondary user, and the target address points to an authority target;
marking the authority mark corresponding to the core authority of the primary user as a core authority mark;
the authority target collects the information of all the authority targets pointed by the authority target, inquires whether a core authority target exists, if so, continuously inquires whether other common authority targets with the same authority as the core authority target exist, and if so, sends all the information contained in the common authority targets to the primary user corresponding to the core authority targets;
the primary user subsystem receives user information associated with the common rights object from the rights object to which the core rights object points.
Preferably, after the authority mark is generated, the contained information is sent to the corresponding authority target at a preset frequency, and the authority target generates a target record according to the received information; and the authority target also sends the target record to a primary user corresponding to the core authority mark.
Preferably, when the core authority is determined, the mark of the core authority cannot be released within a preset time.
Preferably, according to the marking operation of the primary user for the displayed secondary user, sending a prompt message to the management user subsystem; if the feedback information of the management user aiming at the prompt information is not received within the preset time, the primary user subsystem reports the information to the authority management subsystem, and after the authority management subsystem receives the reported information, all the authorities of the other types of secondary users are automatically removed.
The technical effects of the invention are mainly reflected in the following aspects:
1. by utilizing the unique relationship between the authority mark and the authority target, the primary user can timely find the user with the core authority crossed with the primary user, and report the user;
2. the administrative user need not participate, and the primary user can be found in the daily use of the BI tool.
Drawings
FIG. 1 is a block diagram of a rights management system of the BI tool in an embodiment;
FIG. 2 is a schematic diagram illustrating query core rights intersection in an embodiment.
Reference numerals: 100. a rights configuration subsystem; 200. an administrator subsystem; 300. a primary user subsystem; 400. a secondary user subsystem; 500. and a functional module subsystem.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
The first embodiment,
Referring to fig. 1, the present embodiment provides a rights management system of a BI tool, which includes a rights configuration subsystem 100, an administrator subsystem 200, a primary user subsystem 300, a secondary user subsystem 400, and a function module subsystem 500.
Functional module subsystem 500 includes a number of system functional modules such as financial data modules, sales data modules, personnel data modules, inventory data modules, contract data modules, and the like.
The administrator subsystem 200 is configured with an authority assignment module and a user management module, where the user management module is used for creating users for administrator users and dividing the users into primary users and secondary users, where the primary users may be approved by an administrator after being applied by corresponding users in the system, or may be set in the administrator subsystem 200 directly by the administrator. The authority distribution module is used for distributing corresponding function authorities for the users, and each function authority corresponds to one function module.
The authority configuration subsystem 100 is used to configure function authority for each system function module, and when configuring function authority, the function module subsystem 500 further configures at least one authority target for each function module, that is: one authority target corresponds to one function authority. The authorization target can be understood as a data table with a target address (for the targeted reception of data). In addition, after the permission assignment module completes assignment of the function permission, the permission configuration subsystem 100 opens corresponding function permission to the user subsystem in response to the assignment operation of the permission assignment module, and a corresponding user can log in the primary user subsystem 300 or the secondary user subsystem 400 to use a corresponding system function. And meanwhile, when the function authority is distributed, the authority distribution module generates at least one authority mark for the primary user according to the authority lists distributed by the primary user and the secondary user, and one function authority corresponds to one authority mark. The authority mark comprises user information, authority information and a target address (used for directionally sending data) of a corresponding primary user or secondary user, and the target address points to an authority target. As a preferable setting, after the authority mark is generated, the contained information is sent to the corresponding authority target, and after receiving the information, the authority target generates the target record according to the information, that is: the authority target registers all the received information in the form.
The primary user subsystem 300 is configured with an authority duplication checking module, and the authority duplication checking module is used for displaying an authority list corresponding to the primary user. After the primary user logs in the system, the primary user can check the own authority list, and the primary user subsystem 300 marks part or all of the authority list as core authorities according to the selection operation of the primary user. After the marking is finished, the authority check module generates a plurality of marking requests by using each marked core authority and the user information, and then sends the marking requests to the authority distribution module, and after the authority distribution module receives the marking requests, the corresponding authority mark is marked as the core authority mark according to the user information and the authority information contained in each marking request.
After collecting the information of the authority targets pointed by the authority targets, the authority targets inquire whether the core authority targets exist in the information; if yes, continuously inquiring whether other common authority targets with the same authority as the core authority target exist, namely: and comparing the authority information of other non-core authority marks with the authority information of the core authority mark, and if the other non-core authority marks are the same as the authority information of the core authority mark, determining that the non-core authority marks are the same. If the common authority mark exists, all information contained in the common authority mark, including user information and authority information, is sent to a first-level user corresponding to the core authority mark, namely: after the primary user logs in the subsystem, the primary user subsystem 300 displays the received user information and the corresponding specific authority.
In addition, the authority check and duplication module is also configured to send prompt information to the management user subsystem according to the marking operation of the primary user on the displayed secondary user, generally, the management user can see the prompt information by logging in the management user subsystem, if the authority is distributed by an administrator, the prompt information is confirmed to pass, if not, the refusal confirmation is carried out, and meanwhile, the management user subsystem returns the corresponding confirmation result to the authority check and duplication module. If the rejection confirmation is carried out, the administrator redistributes the authority to the corresponding secondary user through the authority distribution module.
If the authority check module does not receive feedback information of the management user for the prompt information within the preset time, the authority check module reports the feedback information to the authority configuration subsystem 100; the permission configuration subsystem 100 is configured to automatically release all or part of the function permissions of the other types of secondary users after receiving the report information, and the normal function permissions can be restored by the operation of an administrator after the release.
The following, this embodiment, with reference to fig. 2, describes the principle of the above scheme in detail: as shown in fig. 2, the function module subsystem 500 provides A, B, C, D, E five functions, corresponding to five authority targets, where the user list includes N users, where N5 is a primary user, and 1-10 are secondary users, each user has the same or different function authority, and each user further has at least one authority label, and each authority label points to a corresponding authority target a, b, c, d, e. The user No. N5 marks part of the function rights as core rights in the system, and corresponds to the rights target e. If the user 7 obtains the authority of the function E for various reasons, the user 7 also has an authority label pointing to the authority target E, and the authority target E registers the authority labels of the user 7 and the user N5 in the table at the same time. Because the authority mark of the user No. N5 is the core authority mark, the authority target e is triggered, the authority target e sends the information contained in the authority mark of the user No. 7 to the user No. N5, and the user No. N5 can know other secondary users with core authority crossed with the user No. N5.
Example II,
The present embodiment provides a method for managing permissions of a BI tool based on the first embodiment, including:
s10, displaying a corresponding authority list to the primary user;
s20, according to the selection operation of the first-level user, marking a part or all of the authority list as the core authority;
s30, inquiring whether the cross of the core authority exists between other secondary users and the primary user, and if so, showing the secondary user.
In this step, the method for querying whether there is a crossing of the core rights includes:
s31, configuring at least one authority target for each function module, wherein one authority target corresponds to one function authority;
s32, generating at least one authority mark for the first-level user and the second-level user according to the distributed authority lists of the first-level user and the second-level user, wherein one authority corresponds to one authority mark; the authority mark comprises user information, authority information and a target address of a corresponding primary user or a corresponding secondary user, and the target address points to an authority target. After the authority mark is generated, sending the contained information to the corresponding authority target at a preset frequency, and generating a target record according to the received information by the authority target; the authority target also sends the target record to the primary user corresponding to the core authority mark.
S33, marking the authority mark corresponding to the core authority of the primary user as a core authority mark, wherein as a preferable mode, when the core authority is determined, the mark of the core authority cannot be removed within a preset time.
S34, the authority target collects the information of all the authority targets pointed by the authority target, and inquires whether a core authority target exists, if so, continuously inquires whether other common authority targets with the same authority as the core authority target exist, and if so, sends all the user information associated with the common authority targets to the primary user corresponding to the core authority targets;
s35, the primary user subsystem 300 receives the user information associated with the common rights object from the rights object pointed to by the core rights object.
S40, sending prompt information to the management user subsystem according to the marking operation of the primary user to the displayed secondary user; if the feedback information of the management user aiming at the prompt information is not received within the preset time, the primary user subsystem 300 reports the information to the authority management subsystem, and after the authority management subsystem receives the reported information, all the authorities of the other types of secondary users are automatically removed.
It is understood that the above are only exemplary embodiments of the present invention, and other embodiments of the present invention may be made by using equivalent or equivalent alternatives, which fall within the scope of the present invention.

Claims (9)

1. A authority management system of a BI tool is characterized by comprising an authority configuration subsystem, an administrator subsystem, a primary user subsystem, a secondary user subsystem and a functional module subsystem;
the functional module subsystem comprises a plurality of system functional modules;
the authority configuration subsystem is used for configuring function authorities for each system function module and responding to the distribution operation of the authority distribution module to open corresponding function authorities to the user subsystem;
the administrator subsystem is provided with an authority distribution module and a user management module, wherein the user management module is used for creating users by administrator users and dividing the users into primary users and secondary users; the authority distribution module is used for distributing corresponding function authorities to the users, and each function authority corresponds to one function module;
the first-level user subsystem is provided with an authority duplication checking module which is used for displaying an authority list corresponding to a first-level user, marking a part or all of the authority list as a core authority according to the selection operation of the first-level user, inquiring whether intersection related to the core authority exists between other second-level users and the first-level user after marking is finished, and displaying the second-level user if the intersection related to the core authority exists.
2. The system of claim 1, wherein the function module subsystem is further configured to configure at least one authority target for each function module, and each authority target corresponds to a function authority;
when the authority distribution module distributes the function authority, at least one authority mark is generated for the first-level user and the second-level user according to the distributed authority lists of the first-level user and the second-level user, and one function authority corresponds to one authority mark; the authority mark comprises user information, authority information and a target address of a corresponding primary user or a corresponding secondary user, and the target address points to an authority target;
the authority check module is also used for marking the authority mark corresponding to the core authority of the primary user as a core authority mark;
the authority target collects the information of all the authority targets pointed by the authority target, inquires whether a core authority target exists, if so, continuously inquires whether other common authority targets with the same authority as the core authority target exist, and if so, sends all the information contained in the common authority targets to the primary user corresponding to the core authority targets;
and the primary user subsystem receives user information associated with the common authority target from the authority target pointed by the core authority target.
3. The system of claim 2, wherein the authority token, after being generated, sends the included information to the corresponding authority target, and the authority target generates the target record based on the received information.
4. The privilege management system of a BI tool as claimed in claim 2, wherein the privilege check module is further configured to send a prompt message to the management user subsystem according to the marking operation of the primary user for the displayed secondary user, and report to the privilege configuration subsystem if no feedback information of the management user for the prompt message is received within a preset time;
and the permission configuration subsystem is configured to automatically remove all part or all functional permissions of the other types of secondary users after receiving the reported information.
5. A method for managing authority of BI tools is characterized by comprising the following steps:
displaying a corresponding authority list to a first-level user;
according to the selection operation of the primary user, marking a part or all of the authority list as core authorities;
and inquiring whether the intersection related to the core authority exists between other secondary users and the primary user, and if so, displaying the secondary user.
6. The method of claim 5, wherein the step of querying whether there is a crossing of core permissions comprises:
configuring at least one authority target for each functional module, wherein one authority target corresponds to one function authority;
generating at least one authority mark for the primary user and the secondary user according to the distributed authority lists of the primary user and the secondary user, wherein one authority corresponds to one authority mark; the authority mark comprises user information, authority information and a target address of a corresponding primary user or a corresponding secondary user, and the target address points to an authority target;
marking the authority mark corresponding to the core authority of the primary user as a core authority mark;
the authority target collects the information of all the authority targets pointed by the authority target, inquires whether a core authority target exists, if so, continuously inquires whether other common authority targets with the same authority as the core authority target exist, and if so, sends all the information contained in the common authority targets to the primary user corresponding to the core authority targets;
and the primary user subsystem receives user information associated with the common authority target from the authority target pointed by the core authority target.
7. The method of claim 6, wherein the authority token sends the included information to the corresponding authority target at a predetermined frequency after being generated, and the authority target generates the target record according to the received information; and the authority target also sends the target record to a primary user corresponding to the core authority mark.
8. The BI tool rights management method of claim 7, wherein the core rights are not marked until a predetermined time after the core rights are determined.
9. The method of claim 6, wherein a prompt is sent to the management user subsystem according to the marking operation of the primary user on the displayed secondary user; if the feedback information of the management user aiming at the prompt information is not received within the preset time, the primary user subsystem reports the feedback information to the authority management subsystem, and after the authority management subsystem receives the reported information, all the authorities of the other types of secondary users are automatically removed.
CN202210375444.8A 2022-04-11 Permission management system and method for BI tool Active CN115037501B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210375444.8A CN115037501B (en) 2022-04-11 Permission management system and method for BI tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210375444.8A CN115037501B (en) 2022-04-11 Permission management system and method for BI tool

Publications (2)

Publication Number Publication Date
CN115037501A true CN115037501A (en) 2022-09-09
CN115037501B CN115037501B (en) 2024-06-28

Family

ID=

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140020118A1 (en) * 2011-04-15 2014-01-16 Huawei Device Co., Ltd Authorization Method and Terminal Device
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN107689949A (en) * 2017-03-31 2018-02-13 平安科技(深圳)有限公司 Data base authority management method and system
CN107968771A (en) * 2016-10-20 2018-04-27 成都鼎桥通信技术有限公司 Right management method and device based on photovoltaic management system
CN110147657A (en) * 2019-04-17 2019-08-20 深圳壹账通智能科技有限公司 A kind of user right configuration method and device
CN110727930A (en) * 2019-10-12 2020-01-24 北京推想科技有限公司 Authority control method and device
CN111428212A (en) * 2020-04-15 2020-07-17 上海嘉银金融科技股份有限公司 Data visualization system and data authority management method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140020118A1 (en) * 2011-04-15 2014-01-16 Huawei Device Co., Ltd Authorization Method and Terminal Device
CN107968771A (en) * 2016-10-20 2018-04-27 成都鼎桥通信技术有限公司 Right management method and device based on photovoltaic management system
CN107689949A (en) * 2017-03-31 2018-02-13 平安科技(深圳)有限公司 Data base authority management method and system
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN110147657A (en) * 2019-04-17 2019-08-20 深圳壹账通智能科技有限公司 A kind of user right configuration method and device
CN110727930A (en) * 2019-10-12 2020-01-24 北京推想科技有限公司 Authority control method and device
CN111428212A (en) * 2020-04-15 2020-07-17 上海嘉银金融科技股份有限公司 Data visualization system and data authority management method thereof

Similar Documents

Publication Publication Date Title
JP5201904B2 (en) Distributed user confirmation / profile management system and method
CN104486346B (en) A kind of springboard machine system
EP2135157B1 (en) Method and apparatus for managing printing devices in a local area network
CA2445220C (en) Air traffic information display system
CN105225190A (en) The large data sharing platform of a kind of warehouse logistics
CN102708699A (en) WebGIS (Web Geographic Information System)-based traffic light fault supervision system
CN102169562A (en) Method and system for processing project plans
Carlson Information security management: understanding ISO 17799
WO2006078466A2 (en) User education and management system and method
CN101753989A (en) Method and device for collocating information in lot in video monitoring system
CN110796329A (en) Asset transaction monitoring method
CN101655933A (en) Warehouse network electronic checking and dispatching method
CN111047301B (en) Spacecraft development process management system and method
JP2011076433A (en) System and method for work management
US8042158B2 (en) Management of user authorizations
CN115037501A (en) Authority management system and method of BI tool
CN106487799A (en) Facility information storage system based on cloud platform
CN115037501B (en) Permission management system and method for BI tool
CN105512833A (en) Intelligent transportation operation and maintenance system
US9515884B2 (en) System and method for evaluating coverage of services by components of an IT infrastructure
CN113128908A (en) Management method and system for life cycle of infrastructure
CN112766678A (en) Wisdom fire control big data supervise platform
EP3764299B1 (en) Method of delegating data editing authority of product items
CN110866727A (en) Intelligent management system based on enterprise intellectual property service
D'Amico et al. Visualization as an aid for assessing the mission impact of information security breaches'

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant