Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for managing user purview and judging user operation validity

A technology for managing users and judging permissions, applied in the field of telecommunication network management, can solve the problems of inability to delete permissions, not allowed, etc., to achieve the effect of simple user permissions and convenient operation

Inactive Publication Date: 2008-07-30
ZTE CORP
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] For another example, user A's object authority is BSC1, and then he has the operation authority of "Delete (ObjectClass) BTS", then A can delete all BTS permissions under BSC1, but cannot delete permissions under BSC2, because user A at this time BSC2 is not included in the object authority
[0012] Then the problem arises again: if user A needs to be able to modify the BTS under BSC2, then user A's object permissions must include BSC2, so user A's object list will have "BSC1; BSC2", because user A has "delete BTS" operation authority, so that user A can delete all BTS under BSC2, but maybe user A is not allowed to have the authority to delete BTS under BSC2, that is, user A is granted the operation that user A should not have.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing user purview and judging user operation validity
  • Method for managing user purview and judging user operation validity
  • Method for managing user purview and judging user operation validity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a method for managing user rights. By adding an intermediate layer in the system, that is, adding a role class, the rights of the role class are object rights plus operation rights; the object rights of a role can include one or more objects Members, the operation authority of a role can also include one or more operation members. Therefore, a role has the various operations contained in its operation permissions for each member in its object permissions and its sub-objects. A user may have the authority of one or more roles, that is, the user's authority is the sum of the authority of one or more roles, and a corresponding relationship between the user authority and the roles it has is established.

[0036] Illustrate the inventive method below in conjunction with accompanying drawing:

[0037] As shown in Figure 5, first define two role classes, the object authority of role 1 is BSC1, and the operation authority is: delete BSC, delete B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for managing user authorizations and determining the validity of user operations, wherein, the method of managing user authorizations comprises the following steps: defining the authorization as roles of object authorization plus operation authorization, and user authorizations as the sum of authorization of each role thereof, and building corresponding relations between user authorizations and the roles thereof. The method for determining the validity of user operations includes: a system searches for a user's role from the corresponding relations after user authorizations are defined according to the above method and when the user executes an operation and determines whether the user is authorized for the operation according to role rights; if the user is authorized for the operation, the system permits the user to execute the operation; if the user is not authorized for the operation, the system does not permit the user to execute the operation. The invention has the advantages that the invention is much more convenient for the user to operate, simply realizes the fractionizing of user authorizations and easily determines whether a certain operation is valid when the user executes the operation.

Description

technical field [0001] The invention relates to safety management in the field of telecommunication network management, in particular to a method for effectively managing user rights and judging the legality of user operations. Background technique [0002] The International Telecommunication Union-Telecommunications Standards Sector (ITU-T) defined the TMN (Telecommunications Management Network) framework in 1988. The TMN framework is a reference model for telecommunication management methods. It organizes the network structure; abstracts the operation of each network element object; defines the CMIS protocol (common management protocol) for network management. [0003] According to this agreement, there are 7 types of operations (0peration) on network elements: Create (create), Delete (delete), Get (query), Set (modify), Cancel-Get (cancel query), Action (action), EventReport (event reporting). [0004] The network elements are organized according to the tree structure, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/34H04Q7/38
Inventor 宿文明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products