Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization processing method and device

A processing method and permission technology, applied in the field of communication, can solve problems such as inability to carry out memory, cache, and inflexible authorization methods, and achieve the effect of optimal permission storage, flexible authorization methods, and intuitive permission display

Active Publication Date: 2020-02-14
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Through the above steps, the role authorization method in the related technology solves the problem of massive resources and operation authorization by establishing an operation set and a resource set, but there are also some problems in the above method, for example, 1. When the resource changes, it cannot automatically Obtain or cancel operation permissions, for example: when resources are added, the added resources cannot automatically obtain permissions, and the resource set must be manually modified to add new resources to the resource set; when resources are deleted, the deleted resources cannot automatically cancel permissions, The resource set must be manually modified to delete resources from the resource set; 2. It is impossible to visually display the permissions granted by each resource on the resource tree
Because the operation set is granted to the resource set instead of a single resource, it is impossible to visually display the operation set granted to each resource on the resource tree; 3. When the number of resources is huge, such as when the number of resources reaches 100,000, Each resource set needs to persist a large amount of data
Once the number of resource sets is large, the entire data volume becomes very large, basically unable to cache in memory, and must be read through the database, resulting in low authentication efficiency
[0009] Therefore, in related technologies, at least one of the following problems exists when performing role authorization: the authorization method is not flexible, the permission display is not intuitive, and the problem of a huge number of permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization processing method and device
  • Authorization processing method and device
  • Authorization processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0044] In this embodiment, an authorization processing method is provided, figure 2 is a flowchart of an authorization processing method according to an embodiment of the present invention, such as figure 2 As shown, the process includes the following steps:

[0045] Step S202, organizing the resource nodes to be authorized into a tree structure or a hierarchical structure;

[0046] Step S204, specifying and authorizing the operation set selected from the resource nodes to be authorized;

[0047] Step S206 , inheriting the operation set of the authorized resource node to the subordinate nodes of the resource node in the tree structure or hierarchical structure that has been designated and author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an authorization processing method and apparatus. The method comprises: organizing resource nodes to be authorized into a tree structure or a hierarchical structure; performing appointed authorization on an operation set selected from the resource nodes to be authorized; and subordinate nodes of the resource nodes subjected to appointed authorization in the tree structure or the hierarchical structure inheriting the operation set of the authorized resource nodes. By the means of the present invention, at least one of the following problems, such as an inflexible authorization method, non-visual authority displaying and a large authority quantity during role authorization in the relevant art is solved, so that the effects of providing a flexible authorization method, visual authority displaying and better authority storage method are achieved.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authorization processing method and device. Background technique [0002] In the telecommunications network management system, access control for users generally adopts role-based access control (RBAC for short), that is, permissions are assigned to roles, and users have the permissions of the role by associating with a role. . When a user logs in to the system, since the user is associated with a certain role, only the resources restricted by the role can be allowed to operate, so as to achieve the purpose of access control. The process of creating roles and associating roles to users is called authorization. The RBAC model provides the flexibility of permission control. Permissions are abstracted to roles, and users are no longer directly granted permissions, but are granted permissions through roles. Users and roles form a many-to-many mapping relationship. For the grant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCG06F21/30
Inventor 龙卉孙向东黄媛媛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products