A permission setting method and device

A permission and algorithm technology, applied in the field of data communication, can solve the problems of system administrators spending a lot of time, the permission setting process is rigid, and the response speed is slow, so as to save labor costs, respond quickly, and save resources.

Active Publication Date: 2020-09-08
GUANGDONG POWER GRID CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that the existing permission setting process is relatively rigid, like an assembly line operation, and the system administrator needs to spend a lot of time on permission setting, which is inefficient and slow in response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission setting method and device
  • A permission setting method and device
  • A permission setting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] see figure 1 , figure 1 It is a schematic flowchart of a permission setting method provided by an embodiment of the present invention. Among them, such as figure 1 As shown, the permission setting method may include the following steps:

[0049] S101. Acquire user identity information and user authority information corresponding to the user identity information.

[0050] In this embodiment, a correspondence table of user identity information and user authority information can be input, and the correspondence table includes a plurality of user identity information and user authority information corresponding to each user identity information, which can be obtained one by one from the correspondence table For one user identity information and its corresponding user authority information, step S101 to step S104 are repeatedly executed until the authority corresponding to all user identity information in the corresponding table is set as the user authority information co...

Embodiment 2

[0061] see figure 2 , figure 2 It is a schematic flowchart of a permission setting method provided by an embodiment of the present invention. Among them, such as figure 2 As shown, the permission setting method may include the following steps:

[0062] S201. Determine whether the interface output by the display screen includes the operation interface of the authority setting system, if yes, perform steps S204 to S208; if not, perform steps S202 to S208.

[0063] The execution subject of the permission setting method described in this embodiment may be a computer device with a display screen, a terminal device with a display screen, a wearable device with a display screen, etc., which is not limited in this embodiment.

[0064] S202. The image identification of the permission setting system included in the interface output by the preset image recognition algorithm and the model recognition display screen.

[0065] S203. Open the operation interface of the authority setti...

Embodiment 3

[0106] see image 3 , image 3 It is a schematic structural diagram of a permission setting device provided by an embodiment of the present invention. Among them, such as image 3 As shown, the permission setting device includes:

[0107] The acquiring module 310 is configured to acquire user identity information and user authority information corresponding to the user identity information.

[0108] The recognition module 320 is configured to recognize the permission setting picture logo included in the operation interface of the permission setting system.

[0109] The opening module 330 is configured to open the authority setting interface according to the authority setting picture identification.

[0110] A search module 340, configured to search the authority setting block corresponding to the user identity information in the authority setting interface.

[0111] The authority setting module 350 is configured to set the authority corresponding to the user identity info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a permission setting method and device, comprising: obtaining user identity information and user permission information corresponding to the user identity information; identifying the permission setting picture logo included in the operation interface of the permission setting system, and opening the permission setting picture logo according to the permission setting picture logo Authority setting interface; search the authority setting block corresponding to the user identity information in the authority setting interface; set the authority corresponding to the user identity information as the authority corresponding to the user authority information in the authority setting block. The authority setting method and device provided by the present invention can automatically set the user authority, has fast response speed and high efficiency, is beneficial to saving resources, and further facilitates lean management of enterprises.

Description

technical field [0001] The present invention relates to the technical field of data communication, in particular to a permission setting method and device. Background technique [0002] At present, in order to prevent the circulation of core business processes outside the system, it is necessary to assign appropriate permissions to each business system user in a timely manner. The existing permission setting method uses the system administrator to manually search for the permissions to be set on the permission setting interface according to the permission application form. user, and then manually set the user's permissions. However, in practice, it is found that the existing permission setting process is relatively rigid, like an assembly line operation, and the system administrator needs to spend a lot of time on permission setting, which is inefficient and slow in response. Contents of the invention [0003] In view of the above problems, the present invention provides ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06K9/62G06T7/13G06T5/00G06N3/04G06N3/08
CPCG06F21/36G06N3/084G06T5/002G06T7/13G06N3/045G06F18/22
Inventor 黄科陈广清李子龙李志华丘丹陈智明汤平瑜王远雄叶嘉铮张嘉慧丘美景蔡上
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products