CN118051936A - Control method and device of access authority of intelligent system, electronic equipment and medium - Google Patents
Control method and device of access authority of intelligent system, electronic equipment and medium Download PDFInfo
- Publication number
- CN118051936A CN118051936A CN202410368792.1A CN202410368792A CN118051936A CN 118051936 A CN118051936 A CN 118051936A CN 202410368792 A CN202410368792 A CN 202410368792A CN 118051936 A CN118051936 A CN 118051936A
- Authority
- CN
- China
- Prior art keywords
- access
- user equipment
- controlling
- attribute
- intelligent system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000004590 computer program Methods 0.000 claims description 7
- 238000007726 management method Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a control method, a device, electronic equipment and a medium of an intelligent system access right; wherein the method comprises the following steps: receiving an access request of first user equipment; responding to an access request of first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence; and controlling the access right of the first user equipment based on the access attribute of the first user equipment. The invention divides the authority of the access user of the intelligent system, and effectively avoids the problem that the security of the system resource is affected by the wrong access.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, an electronic device, and a medium for controlling access rights of an intelligent system.
Background
The intelligent system (INTELLIGENCE SYSTEM) is a computer system capable of generating human intelligent behaviors, can run on a traditional computer in a self-organization and self-adaption mode, can run on a new generation computer in a self-organization and self-adaption mode, and achieves intelligent management.
In the related art, a system user can access, browse and download information in the intelligent system by logging in a personal account, however, in the prior art, the system user can access most content information in the intelligent system, so that the intelligent system has higher security.
Disclosure of Invention
In order to solve the technical problems, the invention provides a control method, a device, electronic equipment and a medium for access rights of an intelligent system.
In a first aspect, the present invention provides a method for controlling access rights of an intelligent system, including:
receiving an access request of first user equipment;
Responding to an access request of the first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence;
and controlling the access authority of the first user equipment based on the access attribute of the first user equipment.
Optionally, when the access attribute of the first user equipment is external access;
the controlling the access right of the first user equipment based on the access attribute of the first user equipment includes:
obtaining an access type corresponding to an access request of the first user equipment, wherein the access type comprises physical access and information access;
and controlling the access right of the first user equipment based on the access type corresponding to the access request of the first user equipment.
Optionally, the controlling the access right of the first user device based on the access type corresponding to the access request of the first user device includes:
When the access type is the physical access, controlling the access authority of the first user equipment to be a first level authority;
and determining the access data corresponding to the access request of the first user equipment as first-level data corresponding to the first-level authority.
Optionally, the controlling the access right of the first user device based on the access type corresponding to the access request of the first user device includes:
When the access type is the information access, controlling the access authority of the first user equipment to be a second level authority;
And determining the access data corresponding to the access request of the first user equipment as second-level data corresponding to the second-level authority.
Optionally, the first class data includes machine room data.
Optionally, the second level data includes: information management system, host information, network device, and database information.
Optionally, when the access attribute of the first user equipment is internal access;
the controlling the access right of the first user equipment based on the access attribute of the first user equipment includes:
Acquiring a target access level of the first user equipment;
and controlling the access data corresponding to the access request of the first user equipment to be third grade data corresponding to the target access grade.
In a second aspect, the present invention provides a control device for access rights of an intelligent system, including:
The receiving module is used for receiving an access request of the first user equipment;
The access attribute is used for describing the corresponding relation between the access personnel and the intelligent system, and the corresponding relation is external correspondence or internal correspondence;
and the control module is used for controlling the access authority of the first user equipment based on the access attribute of the first user equipment.
Optionally, when the access attribute of the first user equipment is external access;
the control module is specifically used for:
obtaining an access type corresponding to an access request of the first user equipment, wherein the access type comprises physical access and information access;
and controlling the access right of the first user equipment based on the access type corresponding to the access request of the first user equipment.
Optionally, the control module is specifically configured to:
When the access type is the physical access, controlling the access authority of the first user equipment to be a first level authority;
and determining the access data corresponding to the access request of the first user equipment as first-level data corresponding to the first-level authority.
Optionally, the control module is specifically configured to:
When the access type is the information access, controlling the access authority of the first user equipment to be a second level authority;
And determining the access data corresponding to the access request of the first user equipment as second-level data corresponding to the second-level authority.
Optionally, the first class data includes machine room data.
Optionally, the second level data includes: information management system, host information, network device, and database information.
Optionally, when the access attribute of the first user equipment is internal access;
the control module is specifically used for:
Acquiring a target access level of the first user equipment;
and controlling the access data corresponding to the access request of the first user equipment to be third grade data corresponding to the target access grade.
In a third aspect, the present invention also provides an electronic device, including:
one or more processors;
Storage means for storing one or more programs,
When the one or more programs are executed by the one or more processors, the one or more processors implement the method for controlling access rights of an intelligent system according to any one of the embodiments of the present invention.
In a fourth aspect, the present invention further provides a computer readable storage medium, on which a computer program is stored, where the program when executed by a processor implements a method for controlling access rights of an intelligent system according to any one of the embodiments of the present invention.
In the embodiment of the invention, the access request of the first user equipment can be received; responding to an access request of first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence; and controlling the access right of the first user equipment based on the access attribute of the first user equipment. Therefore, the authority division is carried out on the access users of the intelligent system, and the problem that the security of system resources is affected by misoperation access is effectively avoided.
Drawings
Fig. 1 is a schematic flow chart of a method for controlling access rights of an intelligent system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a control device for access rights of an intelligent system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the invention will be more clearly understood, a further description of the invention will be made. It should be noted that, without conflict, the embodiments of the present invention and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention; the terms "comprising" and "having" and any variations thereof in the description and claims of the invention and in the description of the drawings are intended to cover a non-exclusive inclusion.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of the phrase "an embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: there are three cases, a, B, a and B simultaneously. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
Furthermore, the terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order, and may be used to improve one or more of these features either explicitly or implicitly.
In the description of the present invention, unless otherwise indicated, the meaning of "plurality" means two or more (including two), and similarly, "plural sets" means two or more (including two).
The invention provides a control method, a device, electronic equipment and a medium of intelligent system access authority, which can receive an access request of first user equipment; responding to an access request of first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence; and controlling the access right of the first user equipment based on the access attribute of the first user equipment. Therefore, the authority division is carried out on the access users of the intelligent system, and the problem that the security of system resources is affected by misoperation access is effectively avoided.
The control method of the intelligent system access authority of the invention can be executed by the electronic equipment or the client installed in the electronic equipment. The electronic device may be a controller, a tablet computer, a mobile phone, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), a smart television, a display screen, a high definition television, a 4K television, a smart speaker, a smart projector, or the like, and the specific type of the electronic device is not limited in the present invention.
The invention is not limited to the type of the operating system of the electronic device. For example, an Android system, a Linux system, a Windows system, an iOS system, and the like.
In order to make the person skilled in the art better understand the solution of the present invention, the technical solution of the embodiment of the present invention will be clearly and completely described below with reference to the accompanying drawings.
See in particular fig. 1.
Fig. 1 is a flow chart of a method for controlling access rights of an intelligent system according to an embodiment of the present invention. The method of the embodiment can be executed by a control device of the access authority of the intelligent system, and the device can be realized in a hardware/software mode and can be configured in electronic equipment. The control method of the intelligent system access right in any embodiment of the invention can be realized. As shown in fig. 1, the method specifically includes the following steps:
s110, receiving an access request of first user equipment.
The first user equipment is electronic equipment on which a user of the intelligent system logs in the intelligent system, and the system user can log in the intelligent system through the first user equipment to access corresponding information resources.
The system user can initiate an access request of the first user equipment to the intelligent system through the first user equipment, and the access request of the first user equipment can comprise identification of resources/contents/information to be accessed, storage positions of the resources/contents/information to be accessed and access requirements. The access requirements may include browsing, downloading, etc., as the invention is not particularly limited in this regard.
S120, responding to an access request of the first user equipment, and acquiring an access attribute of the first user equipment.
The access attribute may be used to describe a correspondence between an accessing person and the intelligent system, where the correspondence is external correspondence or internal correspondence. That is, the access attribute of the first user device can be used to characterize the first user device's relationship to the intelligent system.
For example, when the access attribute of the first user equipment is internal access, it may indicate that the relationship between the first user equipment and the intelligent system is internal, that is, the first user equipment belongs to the internal access equipment of the intelligent system. When the access attribute of the first user equipment is external access, the relationship between the first user equipment and the intelligent system can be indicated to be external, that is, the first user equipment belongs to the external access equipment of the intelligent system.
S130, controlling the access authority of the first user equipment based on the access attribute of the first user equipment.
The access authority of the first user equipment can be controlled according to the access attribute of the first user equipment in the intelligent system, so that accessible resources/information/content of the first user equipment can be effectively controlled to know the access condition of the first user equipment.
In the invention, the access request of the first user equipment can be received; responding to an access request of first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence; and controlling the access right of the first user equipment based on the access attribute of the first user equipment. Therefore, the authority division is carried out on the access users of the intelligent system, and the problem that the security of system resources is affected by misoperation access is effectively avoided.
In some embodiments, when the access attribute of the first user device is external access; controlling access rights of the first user device based on access attributes of the first user device, including: the method comprises the steps of obtaining an access type corresponding to an access request of first user equipment, wherein the access type comprises physical access and information access; and controlling the access authority of the first user equipment based on the access type corresponding to the access request of the first user equipment. Therefore, the access authority of the first user equipment can be conveniently and effectively controlled based on different access types.
The method for controlling the access authority of the first user equipment based on the access type corresponding to the access request of the first user equipment comprises the following steps: when the access type is physical access, controlling the access authority of the first user equipment to be a first level authority; and determining the access data corresponding to the access request of the first user equipment as first-level data corresponding to the first-level authority. Therefore, when knowing that the first user equipment needs to access the resource corresponding to the first level authority, the data to be accessed of the first level authority corresponding to the first user equipment can be effectively determined.
The first class data includes machine room data, which is physical data of the machine room. In addition, the first class data may include office information, etc.
The method for controlling the access authority of the first user equipment based on the access type corresponding to the access request of the first user equipment comprises the following steps: when the access type is information access, controlling the access authority of the first user equipment to be a second-level authority; and determining the access data corresponding to the access request of the first user equipment as second-level data corresponding to the second-level authority. Therefore, when knowing that the first user equipment needs to access the resource corresponding to the second-level authority, the data to be accessed of the second-level authority corresponding to the first user equipment can be effectively determined.
The second level data may include, but is not limited to: information management system, host information, network device, and database information.
In other embodiments, when the access attribute of the first user device is internal access; controlling access rights of the first user device based on access attributes of the first user device, including: acquiring a target access level of first user equipment; and controlling the access data corresponding to the access request of the first user equipment to be the third grade data corresponding to the target access grade. Therefore, when the first user equipment is determined to belong to the internal access, the corresponding system data is correspondingly displayed to the first user equipment.
In addition, when the first user equipment belongs to external access equipment, the access personnel can be divided into temporary access external personnel and non-temporary access external personnel according to the access time and the access property, and the two types of the temporary access external personnel are specifically as follows:
Temporary visiting outsiders refer to outside organizations or individuals who visit temporarily due to business negotiations, visits, communications, providing short-term and infrequent technical support services.
Outside personnel who do not temporarily visit, refer to outside organizations or individuals who work and work due to working in collaborative development, participating in project engineering, providing technical support, after-sales services, service outsourcing or advisory services, and the like.
For the physical access and information access of two external personnel, namely temporary access and non-temporary access, different security management requirements are specified, the department responsible for reception and the person responsible for reception are responsible for the security of the access of the external personnel, and the system has a cautious attitude for accessing sensitive areas such as a machine room. Specific management requirements should include:
Various information security standards and management regulations are complied with. Signing a privacy agreement, signing a security commitment agreement, or specifying relevant content in a contract. The security configuration requirements for its maintenance objectives must be in accordance with the corresponding specifications in the security configuration standard documents of the corresponding network devices, hosts, operating systems, databases, general-purpose applications, etc. When applying access rights, security manager needs to verify the necessity and access mode of the application of access rights, and evaluate the security risk possibly brought by the manager, and take some measures to reduce the risk as much as possible. The application of the access rights is only approved if the risk is acceptable, and the superuser is not given rights as much as possible.
Fig. 2 is a schematic structural diagram of a control device for access rights of an intelligent system according to an embodiment of the present invention; the device is configured in the electronic equipment, and can realize the control method of the access right of the intelligent system according to any embodiment of the invention. The device specifically comprises the following steps:
the receiving module 210 is configured to receive an access request of the first user equipment.
The first user equipment is electronic equipment on which a user of the intelligent system logs in the intelligent system, and the system user can log in the intelligent system through the first user equipment to access corresponding information resources.
The system user can initiate an access request of the first user equipment to the intelligent system through the first user equipment, and the access request of the first user equipment can comprise identification of resources/contents/information to be accessed, storage positions of the resources/contents/information to be accessed and access requirements. The access requirements may include browsing, downloading, etc., as the invention is not particularly limited in this regard.
The obtaining module 220 is configured to obtain, in response to an access request of the first user equipment, an access attribute of the first user equipment, where the access attribute is used to describe a correspondence between an accessing person and an intelligent system, and the correspondence is external correspondence or internal correspondence.
The access attribute may be used to describe a correspondence between an accessing person and the intelligent system, where the correspondence is external correspondence or internal correspondence. That is, the access attribute of the first user device can be used to characterize the first user device's relationship to the intelligent system.
For example, when the access attribute of the first user equipment is internal access, it may indicate that the relationship between the first user equipment and the intelligent system is internal, that is, the first user equipment belongs to the internal access equipment of the intelligent system. When the access attribute of the first user equipment is external access, the relationship between the first user equipment and the intelligent system can be indicated to be external, that is, the first user equipment belongs to the external access equipment of the intelligent system.
A control module 230, configured to control access rights of the first user device based on the access attribute of the first user device.
The access authority of the first user equipment can be controlled according to the access attribute of the first user equipment in the intelligent system, so that accessible resources/information/content of the first user equipment can be effectively controlled to know the access condition of the first user equipment.
In this embodiment, optionally, when the access attribute of the first user device is external access.
The control module 230 is specifically configured to:
Obtaining an access type corresponding to an access request of the first user equipment, wherein the access type comprises physical access and information access; and controlling the access right of the first user equipment based on the access type corresponding to the access request of the first user equipment.
In this embodiment, optionally, the control module 230 is specifically configured to:
When the access type is the physical access, controlling the access authority of the first user equipment to be a first level authority; and determining the access data corresponding to the access request of the first user equipment as first-level data corresponding to the first-level authority.
In this embodiment, optionally, the control module 230 is specifically configured to:
When the access type is the information access, controlling the access authority of the first user equipment to be a second level authority; and determining the access data corresponding to the access request of the first user equipment as second-level data corresponding to the second-level authority.
In this embodiment, optionally, the first class data includes machine room data.
In this embodiment, optionally, the second level data includes: information management system, host information, network device, and database information.
In this embodiment, optionally, when the access attribute of the first user equipment is internal access.
The control module 230 is specifically configured to:
Acquiring a target access level of the first user equipment; and controlling the access data corresponding to the access request of the first user equipment to be third grade data corresponding to the target access grade.
The access request of the first user equipment can be received through the control device of the intelligent system access authority of the embodiment of the invention; responding to an access request of first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence; and controlling the access right of the first user equipment based on the access attribute of the first user equipment. Therefore, the authority division is carried out on the access users of the intelligent system, and the problem that the security of system resources is affected by misoperation access is effectively avoided.
The control device of the access right of the intelligent system provided by the embodiment of the invention can execute the control method of the access right of the intelligent system provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
The embodiment of the invention also provides electronic equipment. Referring specifically to fig. 3, fig. 3 is a basic structural block diagram of the electronic device according to the present embodiment.
The electronic device includes a memory 310 and a processor 320 communicatively coupled to each other via a system bus. It should be noted that only the electronic device having components 310-320 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be understood by those skilled in the art that the electronic device herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device, and the like.
The electronic device may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, and the like. The electronic device can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 310 includes at least one type of readable storage medium including non-volatile memory (non-volatile memory) or volatile memory, such as flash memory (flash memory), hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random access memory (random access memory, RAM), read-only memory (ROM), erasable programmable read-only memory (erasable programmable read-only memory, EPROM), electrically erasable programmable read-only memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-only memory, EEPROM), programmable read-only memory (programmable read-only memory, PROM), magnetic memory, RAM, optical disk, etc., which may include static or dynamic. In some embodiments, the memory 310 may be an internal storage unit of the electronic device, such as a hard disk or a memory of the electronic device. In other embodiments, the memory 310 may also be an external storage device of an electronic device, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, or a flash memory card (FLASH CARD) or the like, which are provided on the electronic device. Of course, memory 310 may also include both internal storage units for electronic devices and external storage devices. In this embodiment, the memory 310 is typically used to store an operating system and various types of application software installed on the electronic device, such as program codes of the above-described methods. In addition, the memory 310 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 320 is generally used to perform the overall operations of the electronic device. In this embodiment, the memory 310 is used for storing program codes or instructions, the program codes include computer operation instructions, and the processor 320 is used for executing the program codes or instructions stored in the memory 310 or processing data, such as the program codes for executing the above-mentioned method.
Herein, the bus may be an industry standard architecture (Industry Standard Architecture, ISA) bus, a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus system may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
Still another embodiment of the present invention provides a computer-readable medium, which may be a computer-readable signal medium or a computer-readable medium. A processor in a computer reads computer readable program code stored in a computer readable medium, such that the processor is capable of performing the functional actions specified in each step or combination of steps in the above-described method; a means for generating a functional action specified in each block of the block diagram or a combination of blocks.
The computer readable medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared memory or semiconductor system, apparatus or device, or any suitable combination of the foregoing, the memory storing program code or instructions, the program code including computer operating instructions, and the processor executing the program code or instructions of the above-described methods stored by the memory.
The definition of the memory and the processor may refer to the description of the foregoing electronic device embodiments, and will not be repeated here.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The functional units or modules in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all or part of the technical solution contributing to the prior art, or in the form of a software product stored in a storage medium, comprising several instructions for causing an electronic device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Yet another embodiment of the invention also provides a computer program product for causing a computer to perform the method of the previous embodiment when the computer program product is run on the computer.
In the above-described embodiments, all or part of the functions may be implemented by software, hardware, or a combination of software and hardware. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present invention are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, hard disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid State Disk (SSD)) or the like.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps other than those listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of first, second, third, etc. does not denote any order, and the words are to be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specifically stated.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. The control method of the access right of the intelligent system is characterized by comprising the following steps:
receiving an access request of first user equipment;
Responding to an access request of the first user equipment, and acquiring an access attribute of the first user equipment, wherein the access attribute is used for describing a corresponding relation between an access person and an intelligent system, and the corresponding relation is external correspondence or internal correspondence;
and controlling the access authority of the first user equipment based on the access attribute of the first user equipment.
2. The method according to claim 1, wherein when the access attribute of the first user device is external access;
the controlling the access right of the first user equipment based on the access attribute of the first user equipment includes:
obtaining an access type corresponding to an access request of the first user equipment, wherein the access type comprises physical access and information access;
and controlling the access right of the first user equipment based on the access type corresponding to the access request of the first user equipment.
3. The method according to claim 2, wherein said controlling the access rights of the first user device based on the access type corresponding to the access request of the first user device comprises:
When the access type is the physical access, controlling the access authority of the first user equipment to be a first level authority;
and determining the access data corresponding to the access request of the first user equipment as first-level data corresponding to the first-level authority.
4. The method according to claim 2, wherein said controlling the access rights of the first user device based on the access type corresponding to the access request of the first user device comprises:
When the access type is the information access, controlling the access authority of the first user equipment to be a second level authority;
And determining the access data corresponding to the access request of the first user equipment as second-level data corresponding to the second-level authority.
5. A method according to claim 3, wherein the first class data comprises machine room data.
6. The method of claim 4, wherein the second level data comprises: information management system, host information, network device, and database information.
7. The method according to claim 1, wherein when the access attribute of the first user device is internal access;
the controlling the access right of the first user equipment based on the access attribute of the first user equipment includes:
Acquiring a target access level of the first user equipment;
and controlling the access data corresponding to the access request of the first user equipment to be third grade data corresponding to the target access grade.
8. An intelligent system access right control device is characterized by comprising:
The receiving module is used for receiving an access request of the first user equipment;
The access attribute is used for describing the corresponding relation between the access personnel and the intelligent system, and the corresponding relation is external correspondence or internal correspondence;
and the control module is used for controlling the access authority of the first user equipment based on the access attribute of the first user equipment.
9. An electronic device, comprising:
one or more processors;
Storage means for storing one or more programs,
When the one or more programs are executed by the one or more processors, the one or more processors implement the method for controlling access rights of an intelligent system according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements a method for controlling access rights of an intelligent system according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410368792.1A CN118051936A (en) | 2024-03-28 | 2024-03-28 | Control method and device of access authority of intelligent system, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410368792.1A CN118051936A (en) | 2024-03-28 | 2024-03-28 | Control method and device of access authority of intelligent system, electronic equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118051936A true CN118051936A (en) | 2024-05-17 |
Family
ID=91046653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410368792.1A Pending CN118051936A (en) | 2024-03-28 | 2024-03-28 | Control method and device of access authority of intelligent system, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118051936A (en) |
-
2024
- 2024-03-28 CN CN202410368792.1A patent/CN118051936A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108427705B (en) | Electronic device, distributed system log query method and storage medium | |
US11588855B2 (en) | Policy approval layer | |
CN109889517B (en) | Data processing method, permission data set creating device and electronic equipment | |
CN108287708B (en) | Data processing method and device, server and computer readable storage medium | |
CN109522751B (en) | Access right control method and device, electronic equipment and computer readable medium | |
US10579814B2 (en) | Monitoring and preventing unauthorized data access | |
CN108681674B (en) | Report module creating method and device, computer device and storage medium | |
CN107770146B (en) | User data authority control method and device | |
CN112055064A (en) | Data synchronization method, device, equipment and storage medium | |
CN108646965B (en) | Service line processing method, terminal device and medium | |
CN113761552A (en) | Access control method, device, system, server and storage medium | |
CN112667638B (en) | Dynamic report generation method and device, terminal equipment and readable storage medium | |
CN114385999A (en) | User authority management method, device, equipment and medium | |
CN113312560A (en) | Group detection method and device and electronic equipment | |
US9348923B2 (en) | Software asset management using a browser plug-in | |
CN113722725A (en) | Resource data acquisition method and system | |
CN110851853B (en) | Data isolation method, device, computer equipment and storage medium | |
CN108241732B (en) | Electronic device, information processing method, and storage medium | |
CN116151631A (en) | Service decision processing system, service decision processing method and device | |
CN118051936A (en) | Control method and device of access authority of intelligent system, electronic equipment and medium | |
CN115543428A (en) | Simulated data generation method and device based on strategy template | |
CN114996577A (en) | Service management method, device, apparatus, storage medium, and program product | |
CN110245016B (en) | Data processing method, system, device and terminal equipment | |
CN114124524A (en) | Cloud platform permission setting method and device, terminal equipment and storage medium | |
CN113434069A (en) | Menu configuration method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |