CN115913752A - User authority control method, device, equipment and storage medium - Google Patents

User authority control method, device, equipment and storage medium Download PDF

Info

Publication number
CN115913752A
CN115913752A CN202211558255.0A CN202211558255A CN115913752A CN 115913752 A CN115913752 A CN 115913752A CN 202211558255 A CN202211558255 A CN 202211558255A CN 115913752 A CN115913752 A CN 115913752A
Authority
CN
China
Prior art keywords
user
target
historical
authority
target user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211558255.0A
Other languages
Chinese (zh)
Inventor
叶梓哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vtron Group Co Ltd
Original Assignee
Vtron Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vtron Group Co Ltd filed Critical Vtron Group Co Ltd
Priority to CN202211558255.0A priority Critical patent/CN115913752A/en
Publication of CN115913752A publication Critical patent/CN115913752A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, equipment and a storage medium for controlling user authority, wherein the establishment time of a target user is obtained by responding to a request instruction initiated by a system for carrying out authority control on the target user; judging whether the target user is a new user or not based on the creation time; if the target user is a new user, determining a first user corresponding to the target user, and realizing the authority control of the target user by using the first user; if the target user is not the new user, determining the target user as a historical user; and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority. The scheme determines a new user and a historical user, and the first user is used for carrying out authority control on the new user, so that the new user can be prevented from having the authority which the new user does not own, and the target operation authority of the historical user can be determined, so that the historical user can be ensured not to have behaviors such as override operation and the like, and the normal operation of the system can be ensured.

Description

User authority control method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for controlling user permissions.
Background
In the cloud platform system, all users in the cloud platform system need to be controlled and managed, including but not limited to controlling the permissions of the users, that is, each user can only view and operate resources belonging to the user, for example, some resources only allow high-level users to operate and use the resources.
However, some malicious users may forcibly view remote resources without permission or perform override operation on resources that high-level users can enjoy in the process of using the system, thereby destroying the normal operation of the cloud platform system.
Disclosure of Invention
In view of this, the present application provides a method, an apparatus, a device and a storage medium for controlling user permissions, which are used to solve the problem that some malicious users may force to view remote resources without permissions or perform override operations on resources that high-level users can enjoy in the process of using the system, thereby destroying the normal operation of the cloud platform system.
To achieve the above object, the proposed solution is as follows:
in a first aspect, a method for controlling user rights includes:
responding to a request instruction for carrying out authority control on a target user initiated by a system, and acquiring the creation time of the target user;
judging whether the target user is a new user or not based on the creation time;
if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user;
if the target user is not the newly-built user, determining the target user as a historical user;
and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority.
Preferably, the determining whether the target user is a newly-built user based on the creation time includes:
acquiring current time;
if the time interval between the current time and the creation time is smaller than a first preset time interval, the target user is a new user;
and if the time interval between the current time and the creation time is not smaller than the first preset time interval, the target user is not a new user.
Preferably, the determining a first user corresponding to the target user and utilizing the first user to implement the authority control on the target user includes:
acquiring a target user type of the target user;
selecting users with the same user type as the target user type from the system as first users;
acquiring the role authority of the first user;
and giving the role authority to the target user so as to realize authority control on the target user.
Preferably, the method further comprises the following steps:
responding to a request instruction for carrying out on-demand operation on the established remote resources, which is initiated by the history user, and acquiring the user level of the history user and a level threshold corresponding to the remote resources;
if the user level is not less than the level threshold, acquiring the data stream of the allopatric resource;
and calling a stream service of the system to push the data stream to the historical user so that the historical user can carry out on-demand operation on the allopatric resources.
Preferably, the method further comprises the following steps:
responding to a request instruction for carrying out on-demand operation on the established remote resources initiated by the historical user, and judging whether the remote resources contain sharing permission;
if the remote resources do not contain sharing authority, updating the target operation authority;
if the remote resource contains the sharing authority, acquiring the data stream of the remote resource;
and calling a stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
Preferably, the method further comprises the following steps:
obtaining a historical reputation score of the historical user;
if the historical reputation score is smaller than a first preset threshold value, acquiring a historical operation record of the historical user;
and adjusting the target operation authority based on the historical operation record.
In a second aspect, a device for controlling user rights includes:
the system comprises a creation time acquisition module, a permission control module and a permission control module, wherein the creation time acquisition module is used for responding to a request instruction for carrying out permission control on a target user initiated by a system and acquiring the creation time of the target user;
the first judgment module is used for judging whether the target user is a newly-built user or not based on the creation time;
the new user control module is used for determining a first user corresponding to the target user and realizing authority control on the target user by utilizing the first user if the target user is the new user;
the historical user determining module is used for determining the target user as a historical user if the target user is not a new user;
and the historical user control module is used for determining the target operation authority of the historical user and realizing the authority control of the historical user according to the target operation authority.
Preferably, the method comprises the following steps:
the current time acquisition module is used for acquiring current time;
a newly-built user determining module, configured to determine that the target user is a newly-built user if a time interval between the current time and the creation time is smaller than a first preset time interval;
and the non-new user determining module is used for determining that the target user is not a new user if the time interval between the current time and the creation time is not less than the first preset time interval.
In a third aspect, a control device for user rights includes a memory and a processor;
the memory is used for storing programs;
the processor is configured to execute the program to implement the steps of the user right control method according to the first aspect.
In a fourth aspect, a storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the method of controlling user rights according to the first aspect.
According to the technical scheme, the method and the device for controlling the authority of the target user acquire the creation time of the target user by responding to a request instruction for controlling the authority of the target user initiated by a system; judging whether the target user is a newly-built user or not based on the creation time; if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user; if the target user is not the new user, determining the target user as a historical user; and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority. The scheme firstly determines whether a target user is a new user or a historical user, and if the target user is the new user, the first user corresponding to the new user is directly determined, so that the new user is subjected to authority control according to the first user, the new user can be prevented from having authority which the new user does not own, and for the historical user, the target operation authority needs to be determined, so that the historical user can be ensured not to have behaviors such as override operation and the like, and the normal operation of the system is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is an alternative flowchart of a method for controlling user permissions according to an embodiment of the present application;
fig. 2 is an alternative flowchart of another user right control method provided in the embodiment of the present application;
fig. 3 is an alternative flowchart of another user right control method provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of a control apparatus for user permissions according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a control device for user rights according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
In the cloud platform system, all users in the cloud platform system need to be controlled and managed, including but not limited to controlling the permissions of the users, that is, each user can only view and operate resources belonging to the user, for example, some resources only allow high-level users to operate and use the resources.
However, some malicious users will force to view remote resources without permission or perform override operation on resources that high-level users can enjoy in the process of using the system, thereby damaging the normal operation of the cloud platform system.
The embodiment of the invention provides a method for controlling user permission, which can be applied to various computer terminals or intelligent terminals, wherein the execution main body of the method can be a processor or a server of the computer terminal or the intelligent terminal, and a flow chart of the method is shown in figure 1, and specifically comprises the following steps:
s1: and responding to a request instruction for performing authority control on a target user initiated by a system, and acquiring the creation time of the target user.
In the application, the system can be a cloud platform system, the cloud platform system can perform hierarchical independent management on users, and the cloud platform system comprises a super manager, a platform manager and common users. The super administrator can only operate the authority of the platform level, and the common users of the platform can only enter the system through the platform administrator to perform authority management, which aims to realize independent management of the platform.
In addition, the target user may be all users in the cloud platform system, and then in response to a request instruction for performing authority control on the target user initiated by the system, the creation time of the target user is first obtained.
S2: and judging whether the target user is a new user or not based on the creation time.
It is understood that what the target user is can be determined by the creation time of the target user, such as a newly established user or a user who has been established for a long time.
S3: and if the target user is the new user, determining a first user corresponding to the target user, and realizing the authority control of the target user by using the first user.
If the target user is a newly-built user, any authority is not given to the target user at this time, so that the role authority of the existing user can be directly reused, a first user corresponding to the target user is determined, then the role authority of the first user is obtained, and the role authority of the first user is given to the target user, so that the authority control of the target user is realized.
S4: and if the target user is not the new user, determining the target user as a historical user.
S5: and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority.
If the target user is determined to be the historical user, the target operation authority of the historical user can be directly obtained, and the authority control of the historical user is realized by using the target operation authority.
According to the technical scheme, the method and the device for controlling the authority of the target user acquire the creation time of the target user by responding to a request instruction for controlling the authority of the target user, which is initiated by a system; judging whether the target user is a new user or not based on the creation time; if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user; if the target user is not the new user, determining the target user as a historical user; and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority. The scheme firstly determines whether a target user is a new user or a historical user, and if the target user is the new user, the first user corresponding to the new user is directly determined, so that the new user is subjected to authority control according to the first user, the new user can be prevented from having authority which the new user does not own, and for the historical user, the target operation authority needs to be determined, so that the historical user can be ensured not to have behaviors such as override operation and the like, and the normal operation of the system is ensured.
In the method provided in the embodiment of the present invention, a process for determining whether the target user is a newly created user based on the creation time is shown in fig. 2, and the specific description is as follows:
s21: and acquiring the current time.
S22: and if the time interval between the current time and the creation time is smaller than a first preset time interval, the target user is a new user.
S23: and if the time interval between the current time and the creation time is not smaller than the first preset time interval, the target user is not a new user.
It can be understood that if the current time is short from the creation time of the target user, which indicates that the target user has just been created, the current time can be divided into new user ranks; similarly, if the current time is longer than the creation time of the target user, the target user can be divided into historical users.
The following describes in detail a process of determining a first user corresponding to the target user and implementing authority control of the target user by using the first user in the present application.
Acquiring a target user type of the target user; selecting users with the same user type as the target user type from the system as first users; acquiring the role authority of the first user; and giving the role authority to the target user so as to realize authority control on the target user.
Optionally, in addition to determining the first user corresponding to the target user, a new authority role may be reestablished for the target user, and then a corresponding authority is added to the resource owned by the target user. The authorities can be divided into the authorities of the user group and the authorities of the independent users, and after the user group authorities are owned, no matter how many users are added in the user group, the corresponding authorities can be owned, so that the users who add unified authorities in batches can use and manage conveniently.
It can be understood that after logging in the cloud platform system, a user can only view some resource lists configured during creation, including allopatric resources, and the resource lists can be updated in real time along with independent management of other users, and can also be added to the operable allopatric resource list of the current user in real time along with the logging in of other users in the permission list. Optionally, when a history user initiates a request instruction for performing a request operation on an established remote resource, the method for controlling user permission provided in the embodiment of the present application may include:
responding to a request instruction for carrying out on-demand operation on the established remote resources, which is initiated by the history user, and acquiring the user level of the history user and a level threshold corresponding to the remote resources; if the user level is not less than the level threshold, acquiring the data stream of the allopatric resource; and calling a stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
Preferably, the above steps may further include:
responding to a request instruction for carrying out on-demand operation on the established remote resources initiated by the historical user, and judging whether the remote resources contain sharing permission; if the remote resources do not contain sharing authority, updating the target operation authority; if the remote resource contains the sharing authority, acquiring the data stream of the remote resource; and calling a stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
Optionally, the method for controlling user permission provided in the embodiment of the present application may further include:
obtaining a historical reputation score of the historical user; if the historical reputation score is smaller than a first preset threshold value, acquiring a historical operation record of the historical user; and adjusting the target operation authority based on the historical operation record.
In one example, a high-level user may adjust the rights owned by a history user after logging in, and feed back the adjusted rights to the history user in real time, such as closing the on-demand rights of a resource in another place of the history user, or closing all the on-demand rights of the history user.
In one example, as shown in fig. 3, a super administrator (system administrator) can only directly manage a platform administrator, and cannot perform operations such as addition, modification, or deletion of permissions on an ordinary user, and the platform administrator can modify resource permissions of the ordinary user or disable on-demand resources of the ordinary user, so as to update a resource list of the ordinary user. It can be understood that both the new user and the historical user belong to common users. Then, a common user acquires remote resources through the cloud platform, if the remote resources are on-demand resources, whether the on-demand resources contain on-demand permission is judged, if yes, streaming service of the cloud platform is called, streaming data of the on-demand resources are sent to the user, and if the on-demand is successful, the streaming data are played; if the request authority is not included, the request fails; if the user with higher level forbids the on-demand resource in the on-demand process, the on-demand is finished.
Corresponding to the method described in fig. 1, an embodiment of the present invention further provides a device for controlling user permissions, which is used to implement the method in fig. 1 specifically, the device for controlling user permissions provided in the embodiment of the present invention may be introduced in a computer terminal or various mobile devices, with reference to fig. 4, as shown in fig. 4, the device may include:
a creation time obtaining module 10, configured to obtain creation time of a target user in response to a request instruction for performing authority control on the target user initiated by a system;
a first judging module 20, configured to judge whether the target user is a new user based on the creation time;
the newly-built user control module 30 is configured to, if the target user is a newly-built user, determine a first user corresponding to the target user, and implement permission control on the target user by using the first user;
a historical user determining module 40, configured to determine the target user as a historical user if the target user is not a new user;
and the historical user control module 50 is used for determining the target operation authority of the historical user and realizing the authority control of the historical user according to the target operation authority.
According to the technical scheme, the method and the device for controlling the authority of the target user acquire the creation time of the target user by responding to a request instruction for controlling the authority of the target user, which is initiated by a system; judging whether the target user is a new user or not based on the creation time; if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user; if the target user is not the new user, determining the target user as a historical user; and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority. The scheme firstly determines whether a target user is a new user or a historical user, and if the target user is the new user, the first user corresponding to the new user is directly determined, so that the new user is subjected to authority control according to the first user, the new user can be prevented from having authority which the new user does not own, and for the historical user, the target operation authority needs to be determined, so that the historical user can be ensured not to have behaviors such as override operation and the like, and the normal operation of the system is ensured.
In one example, the first determining module 20 may include:
the current time acquisition module is used for acquiring current time;
the newly-built user determining module is used for determining that the target user is a newly-built user if the time interval between the current time and the creation time is smaller than a first preset time interval;
and the non-newly-built user determining module is used for determining that the target user is not a newly-built user if the time interval between the current time and the creation time is not smaller than the first preset time interval.
In one example, the newly created user control module 30 may include:
the target user type acquisition module is used for acquiring the target user type of the target user;
the first user selection module is used for selecting users with the same user type as the target user type from the system as first users;
the role authority acquiring module is used for acquiring the role authority of the first user;
and the giving module is used for giving the role authority to the target user so as to realize the authority control of the target user.
In one example, the apparatus may include:
a level threshold obtaining module, configured to respond to a request instruction for performing on-demand operation on an established remote resource, initiated by the history user, and obtain a user level of the history user and a level threshold corresponding to the remote resource;
a first data stream obtaining module, configured to obtain a data stream of the remote resource if the user level is not less than the level threshold;
and the pushing module is used for calling the stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
In one example, the apparatus may further include:
the permission judging module is used for responding to a request instruction for carrying out on-demand operation on the established remote resources initiated by the historical user and judging whether the remote resources contain sharing permission;
the updating module is used for updating the target operation authority if the remote resources do not contain the sharing authority;
a second data stream acquisition module, configured to acquire a data stream of the remote resource if the remote resource includes a sharing right;
and the pushing module is used for calling the stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
In one example, the apparatus may further include:
the historical reputation score acquisition module is used for acquiring the historical reputation score of the historical user;
the historical operation record acquisition module is used for acquiring the historical operation record of the historical user if the historical reputation score is smaller than a first preset threshold value;
and the adjusting module is used for adjusting the target operation authority based on the historical operation record.
Furthermore, the embodiment of the application provides a control device of user authority. Optionally, fig. 5 is a block diagram illustrating a hardware structure of a user authority control device, and referring to fig. 5, the hardware structure of the user authority control device may include: at least one processor 01, at least one communication interface 02, at least one memory 03 and at least one communication bus 04.
In the embodiment of the present application, the number of the processor 01, the communication interface 02, the memory 03 and the communication bus 04 is at least one, and the processor 01, the communication interface 02 and the memory 03 complete mutual communication through the communication bus 04.
The processor 01 may be a central processing unit CPU, or an Application Specific Integrated Circuit ASIC, or one or more Integrated circuits configured to implement embodiments of the present invention, etc.
The memory 03 may include a high-speed RAM memory, and may further include a non-volatile memory (non-volatile memory) or the like, for example, at least one disk memory.
The storage stores a program, the processor can call the program stored in the storage, and the program is used for executing the following control method of user authority, comprising the following steps:
responding to a request instruction for carrying out authority control on a target user initiated by a system, and acquiring the creation time of the target user;
judging whether the target user is a newly-built user or not based on the creation time;
if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user;
if the target user is not the newly-built user, determining the target user as a historical user;
and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority.
Alternatively, the detailed function and the extended function of the program may refer to the description of the control method of the user authority in the method embodiment.
The embodiment of the present application further provides a storage medium, where the storage medium may store a program suitable for being executed by a processor, and when the program runs, the control method controls a device where the storage medium is located to execute the following user rights, where the control method includes:
responding to a request instruction for carrying out authority control on a target user initiated by a system, and acquiring the creation time of the target user;
judging whether the target user is a new user or not based on the creation time;
if the target user is a newly-built user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user;
if the target user is not the newly-built user, determining the target user as a historical user;
and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority.
1 the storage medium may in particular be a computer-readable storage medium, which may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk or a ROM.
Alternatively, the detailed function and the extended function of the program may refer to the description of the control method of the user authority in the method embodiment.
In addition, functional modules in the embodiments of the present disclosure may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a live broadcast device, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for controlling user authority is characterized by comprising the following steps:
responding to a request instruction for carrying out authority control on a target user initiated by a system, and acquiring the creation time of the target user;
judging whether the target user is a new user or not based on the creation time;
if the target user is a new user, determining a first user corresponding to the target user, and realizing authority control on the target user by using the first user;
if the target user is not the new user, determining the target user as a historical user;
and determining the target operation authority of the historical user, and realizing the authority control of the historical user according to the target operation authority.
2. The method of claim 1, wherein the determining whether the target user is a new user based on the creation time comprises:
acquiring current time;
if the time interval between the current time and the creation time is smaller than a first preset time interval, the target user is a new user;
and if the time interval between the current time and the creation time is not smaller than the first preset time interval, the target user is not a new user.
3. The method of claim 1, wherein the determining a first user corresponding to the target user and utilizing the first user to implement the authority control for the target user comprises:
acquiring a target user type of the target user;
selecting users with the same user type as the target user type from the system as first users;
acquiring the role authority of the first user;
and giving the role authority to the target user so as to realize authority control on the target user.
4. The method of claim 1, further comprising:
responding to a request instruction for carrying out on-demand operation on established remote resources initiated by the historical user, and acquiring the user level of the historical user and a level threshold value corresponding to the remote resources;
if the user level is not less than the level threshold, acquiring the data stream of the allopatric resource;
and calling a stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
5. The method of claim 1, further comprising:
responding to a request instruction for carrying out on-demand operation on the established remote resources initiated by the historical user, and judging whether the remote resources contain sharing permission;
if the remote resources do not contain sharing authority, updating the target operation authority;
if the remote resource contains the sharing authority, acquiring the data stream of the remote resource;
and calling a stream service of the system to push the data stream to the historical user so as to enable the historical user to carry out on-demand operation on the allopatric resource.
6. The method of claim 1, further comprising:
obtaining a historical reputation score of the historical user;
if the historical reputation score is smaller than a first preset threshold value, acquiring a historical operation record of the historical user;
and adjusting the target operation authority based on the historical operation record.
7. An apparatus for controlling user authority, comprising:
the system comprises a creation time acquisition module, a permission control module and a permission control module, wherein the creation time acquisition module is used for responding to a request instruction for carrying out permission control on a target user initiated by a system and acquiring the creation time of the target user;
the first judgment module is used for judging whether the target user is a new user or not based on the creation time;
the new user control module is used for determining a first user corresponding to the target user and realizing authority control on the target user by utilizing the first user if the target user is the new user;
the historical user determining module is used for determining the target user as a historical user if the target user is not a new user;
and the historical user control module is used for determining the target operation authority of the historical user and realizing the authority control of the historical user according to the target operation authority.
8. The apparatus of claim 7, comprising:
the current time acquisition module is used for acquiring current time;
the newly-built user determining module is used for determining that the target user is a newly-built user if the time interval between the current time and the creation time is smaller than a first preset time interval;
and the non-new user determining module is used for determining that the target user is not a new user if the time interval between the current time and the creation time is not less than the first preset time interval.
9. A control device for user rights, comprising a memory and a processor;
the memory is used for storing programs;
the processor, which is configured to execute the program, implements the steps of the method for controlling user rights according to any one of claims 1 to 6.
10. A storage medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of a method for controlling the authorization of a user according to any one of claims 1 to 6.
CN202211558255.0A 2022-12-06 2022-12-06 User authority control method, device, equipment and storage medium Pending CN115913752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211558255.0A CN115913752A (en) 2022-12-06 2022-12-06 User authority control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211558255.0A CN115913752A (en) 2022-12-06 2022-12-06 User authority control method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115913752A true CN115913752A (en) 2023-04-04

Family

ID=86479439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211558255.0A Pending CN115913752A (en) 2022-12-06 2022-12-06 User authority control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115913752A (en)

Similar Documents

Publication Publication Date Title
US8875261B2 (en) Rules driven multiple passwords
CN109104412B (en) Account authority management method, account authority management system and computer readable storage medium
US9075955B2 (en) Managing permission settings applied to applications
CN107579966B (en) Control method, device and system for remotely accessing intranet and terminal equipment
CN103577735B (en) A kind of multi-user system quick registration and the method and system of switching
CN110519306B (en) Equipment access control method and device of Internet of things
CN103473502A (en) Method and system for acquiring Root rights of android-based mobile terminal
CN107104958B (en) Method for managing private cloud equipment, private cloud, public cloud equipment and storage device
CN104284027A (en) Authority management method and authority management system for terminal
CN111049711B (en) Device control right sharing method and device, computer device and storage medium
CN106022108A (en) Synchronous management method and terminal device
CA2830880C (en) Managing permission settings applied to applications
WO2022174709A1 (en) Access control method, terminal, and storage medium
CN104322031A (en) Implementing policies for an enterprise network using policy instructions that are executed through a local policy framework
CN103248613A (en) Method and device for controlling network access of application program
CN110741617B (en) Resource updating method and device, computer equipment and storage medium
CN109657485B (en) Authority processing method and device, terminal equipment and storage medium
CN104079437A (en) Method and terminal for achieving authority management and control
CN109314711B (en) Open authorization method, device and terminal
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium
CN115913752A (en) User authority control method, device, equipment and storage medium
CN102377589A (en) Right management control method and terminal
CN109784035B (en) Installation process tracking processing method and device
CN115174177B (en) Rights management method, device, electronic apparatus, storage medium, and program product
CN115694943A (en) Behavior-based dynamic mandatory access control method, system and medium for operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination