Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User permission control method and system

A technology of user rights and control methods, applied in the Internet field, can solve the problems of lack of user rights distinction, reducing the accuracy of user rights control, and inability to distinguish rights and so on.

Active Publication Date: 2020-04-07
BEIJING GRIDSUM TECH CO LTD
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the user performs the operation corresponding to the role authority, the authority of other functional modules will be involved, and this method cannot distinguish the authority of any functional module owned by any user, so it cannot determine whether the user has the authority to operate the function
It can be seen that the existing technology lacks the distinction of user rights, which reduces the accuracy of user rights control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission control method and system
  • User permission control method and system
  • User permission control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0060] In this application, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, but also includes no Other elements clearly listed, or also include elements inherent to this process, method, article or equipment. If there are no more restrictions, the element defined by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authority control method and system, and the method comprises the steps: determining a user authority of a user based on the pre-established relations between the user authority of an application to which the user belongs and a tenant authority set, and further determining whether the user has an operation authority for the current application operation or not based on the user authority. The tenant permission set comprises a tenant permission subset, a role permission subset corresponding to any user and a function package permission subset corresponding to any user. Whether the user has the operation authority for the current application operation or not is determined based on the user authority and the affiliation relationship of the tenant authority subset, the role authority subset and the function package authority subset in the tenant authority set, so that the user authority is distinguished, and the accuracy of user authority control is improved.

Description

Technical field [0001] The present invention relates to the field of Internet technology, in particular to a method and system for controlling user permissions. Background technique [0002] With the rapid progress of Internet technology, many small and medium-sized enterprises rely on the Internet to achieve rapid development. Among them, software as a service (Software as a Service, SaaS) as a new application model, it sells the various functions of the software to users in the form of lease, and users only need to obtain what they need at a lower cost. Software services have reduced the economic burden of users and are well received by most SMEs. In the software-as-a-service application model, its core advantage is the use of multi-tenancy. Further, in order to meet the usage requirements of different tenants, software as a service needs to divide functions according to the usage rights of different tenants, and configure corresponding business services for different tenants...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 吴财田健曹荣权
Owner BEIJING GRIDSUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products