CN110909328A - Authority configuration method and device, electronic equipment and storage medium - Google Patents

Authority configuration method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110909328A
CN110909328A CN201911144354.2A CN201911144354A CN110909328A CN 110909328 A CN110909328 A CN 110909328A CN 201911144354 A CN201911144354 A CN 201911144354A CN 110909328 A CN110909328 A CN 110909328A
Authority
CN
China
Prior art keywords
authority
feature
role
weight
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911144354.2A
Other languages
Chinese (zh)
Other versions
CN110909328B (en
Inventor
袁香宇
林浩生
王博
尹雪枫
张康龙
郭强
聂双燕
吕沙沙
王肖
纪风
刘旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911144354.2A priority Critical patent/CN110909328B/en
Publication of CN110909328A publication Critical patent/CN110909328A/en
Application granted granted Critical
Publication of CN110909328B publication Critical patent/CN110909328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the field of authority configuration, in particular to an authority configuration method, an authority configuration device, electronic equipment and a storage medium, and solves the problem that in the prior art, target authority characteristics corresponding to a role to be configured cannot be automatically generated. The method comprises the following steps: the role model of the role to be configured is obtained, the role model comprises authority features and a weight of the authority features, the weight of the authority features included by the role model is compared with a preset threshold, when the weight of the authority features is larger than the preset threshold, the authority features corresponding to the weight of the authority features are used as target authority features of the role to be configured, and the authority configuration is carried out on the role to be configured according to the target authority features.

Description

Authority configuration method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of permission configuration, and in particular, to a permission configuration method and apparatus, an electronic device, and a storage medium.
Background
In a traditional authority configuration method, when an enterprise employee needs to access business data stored in an office management system, the business data in the office management system needs to be divided into different authority features, a role to which the enterprise employee belongs in an enterprise organization framework is taken as a role to be configured, a target authority feature corresponding to the role to be configured is manually screened out from a plurality of authority features based on the operation of a super administrator of the office management system, and authority configuration is performed on the role to be configured according to the target authority feature, so that the enterprise employee corresponding to the role to be configured can access the office management system according to the obtained target authority feature. However, with the general increase of the enterprise scale, the business data stored in the office management system of the enterprise is more and more, and the division of the business data is more and more detailed, when the roles to be configured are too many or the authority features selectable by each role to be configured are too many, the workload of manually performing authority configuration on each role to be configured one by a super administrator of the office management system is huge, and the situation of mismatch or missing configuration is easy to occur, thereby causing immeasurable loss for the enterprise. Therefore, the problem that the target authority characteristics corresponding to the roles to be configured cannot be automatically generated exists in the prior art.
Disclosure of Invention
In order to solve the above problem, the present application provides a method and an apparatus for configuring a right, an electronic device, and a storage medium.
In a first aspect, the present application provides a permission configuration method, including:
obtaining a role model of a role to be configured, wherein the role model comprises authority features and weight values of the authority features;
comparing the weight of the authority feature with a corresponding preset threshold, and taking the authority feature corresponding to the weight of the authority feature as the target authority feature of the role to be configured when the weight of the authority feature is greater than the preset threshold;
and carrying out authority configuration on the role to be configured according to the target authority characteristics.
According to an embodiment of the present application, optionally, in the permission configuration method, when the role model includes at least one permission feature group and each permission feature group includes at least one permission feature, the step of comparing the weight of the permission feature with a corresponding preset threshold, and when the weight of the permission feature is greater than the preset threshold, taking the permission feature corresponding to the weight of the permission feature as the target permission feature of the role to be configured includes:
and comparing the weight of each authority feature group with a preset feature group threshold value, and taking all authority features included in the authority feature group as target authority features of the role to be configured when the weight of the authority feature group is greater than the preset feature group threshold value.
According to an embodiment of the present application, optionally, in the authority configuration method, the step of taking all authority features included in the authority feature group as target authority features of the role to be configured includes:
and comparing the weight of each authority feature in the authority feature group with a corresponding preset threshold respectively, and taking the authority feature as the target authority feature of the role to be configured when the weight of the authority feature is greater than the preset threshold.
According to an embodiment of the present application, optionally, in the permission configuration method, a manner of obtaining the weight of the permission feature includes:
obtaining the times of taking the authority characteristics as target authority characteristics;
obtaining an initial weight of the authority feature;
and obtaining the weight of the authority feature according to the times and the initial weight.
According to an embodiment of the present application, optionally, in the permission configuration method, the step of obtaining the weight of the permission feature according to the number of times and the initial weight includes:
calculating the product of the times and a preset characteristic value corresponding to the authority characteristic;
and adding the product and the initial weight to obtain the weight of the authority feature.
According to an embodiment of the present application, optionally, in the authority configuration method, the step of performing authority configuration on the role to be configured according to the target authority feature includes:
and when the identity information included by the role to be configured belongs to one of a plurality of preset identity information in the role model of the role to be configured, performing authority configuration on the role to be configured according to the target authority characteristics.
According to an embodiment of the present application, optionally, in the permission configuration method, when the target permission characteristics of the role to be configured are multiple, the method further includes:
and sequencing the target authority features according to the sequence of the weights of the target authority features of the roles to be configured from high to low so as to generate an authority feature list and display the authority feature list.
In a second aspect, the present application provides an authority configuration apparatus, comprising:
the role model configuration module is used for configuring a role model of a role to be configured, wherein the role model comprises authority features and weight values of the authority features;
the operation module is used for comparing the weight of the authority features included by the role model with a corresponding preset threshold value, and taking the authority features corresponding to the weight of the authority features as target authority features of the role to be configured when the weight of the authority features is larger than the preset threshold value;
and the configuration module is used for carrying out authority configuration on the role to be configured according to the target authority characteristics.
In a third aspect, the present application provides a storage medium storing a computer program, which is executable by one or more processors and is operable to implement the method for configuring a right in any one of the first aspect.
In a fourth aspect, the present application provides an electronic device, including a memory and a processor, where the memory stores a storage medium capable of being executed by the processor, and when the storage medium is executed by the processor, the storage medium implements the method for configuring rights in any one of the above first aspects.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects: the method comprises the steps of obtaining a role model of a role to be configured, comparing a weight corresponding to authority features included by the role model with a preset threshold, taking the authority features corresponding to the weight of the authority features as target authority features of the role to be configured when the weight of the authority features is larger than the preset threshold, and configuring the authority of the role to be configured according to the target authority features, so that the problem that the target authority features corresponding to the role to be configured cannot be automatically generated is solved.
Drawings
The scope of the present disclosure will be better understood from the following detailed description of exemplary embodiments, when read in conjunction with the accompanying drawings. Wherein the included drawings are:
fig. 1 is a flowchart of a permission configuration method according to an embodiment of the present application;
fig. 2 is a flowchart of a permission configuration method according to a second embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Referring to fig. 1, an embodiment of the present application provides a method for configuring permissions, where the method includes steps S110 to S130.
Step S110, a role model of the role to be configured is obtained.
The role model comprises authority features and weight values of the authority features.
It can be understood that the permission configuration method is applied to an enterprise system, and specifically, in this embodiment, the permission configuration method is applied to a big data platform in the enterprise system, where the enterprise system uses big data components and a big data framework to construct the big data platform, and uses the big data platform to process huge enterprise data included in the enterprise system. Based on the input of the enterprise system super manager, the big data platform obtains the role information to be configured, and searches the role model corresponding to the role to be configured from the database, wherein the role information to be configured comprises the corresponding user information, and the user information comprises but is not limited to: the system comprises a user name, a name of a department where the user is located, a name of a job title of the user, a mobile phone number of the user and a user mailbox; all authority features related to the role to be configured and the weight of each authority feature are stored in the role model.
It can be understood that the weight of each authority feature may be set manually, or may be obtained according to a weight calculation rule of a preset authority feature.
In this embodiment, the method for obtaining the weight of the authority feature according to the weight calculation rule of the preset authority feature includes: obtaining the times of taking the authority characteristics as target authority characteristics; obtaining an initial weight of the authority feature; and obtaining the weight of the authority feature according to the times and the initial weight.
Specifically, in this embodiment, obtaining the weight of the authority feature according to the number of times that the authority feature is used as the target authority feature and the initial weight includes: calculating the product of the times and a preset characteristic value corresponding to the authority characteristic; and adding the product and the initial weight to obtain the weight of the authority feature.
It can be understood that the preset feature value is preset by a super administrator according to rules according to the importance degree of the authority feature, and the higher the importance degree of the authority feature is, the larger the preset feature value corresponding to the authority feature is.
And step S120, comparing the weight of the authority feature with a corresponding preset threshold, and when the weight of the authority feature is greater than the preset threshold, taking the authority feature corresponding to the weight of the authority feature as the target authority feature of the role to be configured.
In this embodiment, the number of times that the right feature is selected as the target right feature is large in the previous right configuration process, or the preset feature value is large because the importance degree of the right feature is high, so that when the weight of the right feature is greater than the preset threshold, the right feature corresponding to the weight of the right feature is a common right feature or an important right feature, and the right feature corresponding to the weight of the right feature should be used as the target right feature of the role to be configured.
It can be understood that the preset threshold may be a weight threshold of each permission feature based on operation input by a super administrator before permission configuration is performed on a role to be configured for the first time; or before the authority configuration is carried out on the role to be configured for the first time, the weight calculation rule of the authority feature is input into the role model, so that the role model is trained according to the weight calculation rule of the authority feature, and the weight threshold of the authority feature which is changed along with the change of the authority configuration times is obtained.
It should be noted that the role model in this embodiment may include a plurality of authority features that each exist independently; multiple sets of authority features may also be included, and multiple authority features may also be included in each set of authority features.
In this embodiment, when the role model includes at least one authority feature group and each authority feature group includes at least one authority feature, the step of comparing the weight of the authority feature with a corresponding preset threshold, and when the weight of the authority feature is greater than the preset threshold, taking the authority feature corresponding to the weight of the authority feature as the target authority feature of the role to be configured includes: and comparing the weight of each authority feature group with a preset feature group threshold value, and taking all authority features included in the authority feature group as target authority features of the role to be configured when the weight of the authority feature group is greater than the preset feature group threshold value.
It can be understood that, when the authority features in this embodiment are grouped, the authority features are grouped according to the preset association degree of each authority feature, and therefore, when the weight of the authority feature group is greater than the preset feature group threshold, all the authority features included in the authority feature group can be considered to meet the requirement, and therefore, all the authority features included in the authority feature group can be used as the target authority features of the role to be configured.
In this embodiment, the weight of each authority feature included in the authority feature group is respectively compared with a corresponding preset threshold, so that when the weight of the authority feature is greater than the preset threshold, the authority feature is used as the target authority feature of the role to be configured.
It can be understood that when the weight of the authority feature group meets the preset condition, the authority features in the authority feature group are further evaluated, and the authority features included in the authority feature group can be more accurately selected as the target authority features of the role to be configured.
In this embodiment, when the target authority features of the role to be configured are multiple, the multiple target authority features are sorted according to the order from high to low of the weight of the target authority features of the role to be configured, so as to generate and display an authority feature list.
The authority feature list is generated according to the target authority features and displayed, so that the target authority features in the authority feature list are checked based on the operation of a super administrator, and the target authority features in the authority feature list are deleted or added according to the actual situation, so that the correctness of the target authority features of the automatically generated roles to be configured is ensured, and the personalized requirements of the super administrator are met.
And step S130, performing authority configuration on the role to be configured according to the target authority characteristics.
It can be understood that, after the target permission characteristics corresponding to the roles to be configured are confirmed to be correct based on the operation of the super administrator, permission configuration can be performed on the roles to be configured according to the target permission characteristics.
Specifically, in this embodiment, when it is determined that the identity information included in the role to be configured belongs to one of a plurality of preset identity information in the role model of the role to be configured, the authority configuration is performed on the role to be configured according to the target authority feature.
It can be understood that, before performing permission configuration on the role to be configured, permission verification needs to be performed on the role to be configured, and when the permission verification passes, permission configuration can be performed on the role to be configured based on an operation of a super administrator, so that the role to be configured has the target permission feature, and thus a user corresponding to the role to be configured obtains a read-only permission and a read-write permission for data corresponding to the target permission feature.
Example two
Referring to fig. 2, an embodiment of the present application provides a method for configuring permissions, which is applied to an enterprise system and includes steps S210 to S240.
Step S210: the hypervisor logs into the system to enter the privilege configuration interface.
It can be understood that the super administrator is responsible for adding and deleting roles to be configured in the whole system and configuring the authority for the roles to be configured.
Step S220: and clicking a role adding button based on the operation of a super manager, inputting the name of the corresponding role to be configured, and automatically popping up an authority configuration interface of the role to be configured after clicking and determining.
Specifically, after a super administrator logs in a system, a 'role adding' button is clicked in an authority configuration interface, the name of a role to be added is input, the system interface pops up an authority configuration interface window corresponding to the name of the role to be added, the window contains all authority features in a role model corresponding to the role to be configured, which are found by a large data platform of the system, each authority feature is preceded by a check box, and when the check box is checked, the role to be configured is indicated to have the authority features.
Step S230: and the big data platform of the system receives the name of the role to be configured, obtains the target authority characteristics corresponding to the role to be configured according to algorithm analysis, and automatically selects the target authority characteristics corresponding to the role to be configured in the authority configuration interface.
Specifically, if a super administrator of the system desires to add a role of a 40 th "quality inspector", the name of the role to be configured is set as the "quality inspector", the configuration frequency of the role to be configured is set as the 40 th, the system automatically matches and finds out a role model corresponding to the "quality inspector", and the role model includes preset common authority feature groups of the quality inspector, including a "supplier group" and a "material group"; each authority feature group comprises a plurality of authority features and weights corresponding to the authority features.
For example, the weight of a provider group included in the authority feature group named "provider group" is 16; the plurality of authority features and the weight of each authority feature included in the authority feature group are shown in the following table:
authority features Weight of authority feature
Supplier one 10
Supplier two 15
Supplier three 18
The weight of the material group included in the authority feature group named as the material group is 23; the plurality of authority features and the weight of each authority feature included in the authority feature group are shown in the following table:
authority features Weight of authority feature
Materials group one 20
Materials group two 25
Materials group III 23
The weight of the authority feature in this embodiment is obtained by adding a preset initial weight to the product of the number of times that the authority feature is selected as the target authority feature and the preset feature value in the previous role authority configuration process.
In this embodiment, based on the pre-training of the character model, a preset feature group threshold of an authority feature group included in the character model can be obtained. When target permission recommendation needs to be carried out on the role to be configured, whether the weight of the permission feature group exceeds the preset feature group threshold value or not is judged, and when the weight of the permission feature group exceeds the preset feature group threshold value, all permission features included in the permission feature group are used as target permission features corresponding to the role.
For example, when the preset feature group threshold of the provider authority feature group of the 40 th quality inspector is 15, the system determines that the weight 16 of the provider group is greater than the preset feature group threshold 15 of the provider authority feature group, so that all authority features included in the provider group are automatically used as the target authority features corresponding to the quality inspector; when the preset feature group threshold of the material group authority feature group of the 40 th quality inspector is 22, the system judges that the weight 23 of the material group is greater than the preset feature group threshold 22 of the material group authority feature group, so that all authority features included in the material group are automatically used as target authority features corresponding to the 40 th quality inspector; in summary, the target authority characteristics of the 40 th quality inspector include: supplier one, supplier two, supplier three, material group one, material group two and material group three.
It can be understood that the preset threshold of each authority feature in the role model corresponding to the role to be configured can be obtained based on the pre-training of the role model. And when the target authority recommendation needs to be carried out on the role to be configured, judging whether the weight of the authority feature exceeds the preset threshold, and when the weight of the authority feature exceeds the preset threshold, taking the authority feature as the target authority feature corresponding to the role.
For example, when the preset threshold of the provider authority feature of the 40 th quality inspector is 16, the system determines that the weight 10 of the first authority feature provider is smaller than the preset threshold 16 of the provider authority feature; the weight 15 of the second authority feature supplier is smaller than a preset threshold 16 of the authority feature of the supplier; the weight 18 of the third authority feature weight supplier is greater than the preset threshold 16 of the supplier authority feature, so the system automatically takes the third authority as the target authority feature corresponding to the quality inspector. When the preset threshold value of the authority feature of the material group of the 40 th quality inspector is 21, the system judges that the weight 20 of the first authority feature material group is smaller than the preset threshold value 21 of the authority feature of the material group; the value 25 of the authority characteristic right material group II is greater than the preset threshold value 21 of the authority characteristic of the material group; and the weight 23 of the permission characteristic material group III is greater than the preset threshold 21 of the permission characteristics of the material group, so that the system automatically takes the material group II and the material group III as the target permission characteristics corresponding to the 40 th quality inspector. In summary, the target authority characteristics of the 40 th quality inspector include: supplier three, material group two, and material group three.
Step S240: and the super administrator confirms that the automatically recommended target permission characteristics are correct in check, clicks a confirmation button, and successfully adds the role to be configured into the system so as to complete permission configuration of the role to be configured.
It can be understood that after the big data platform of the system automatically analyzes the target permission feature corresponding to the role to be configured, the target feature may be automatically confirmed: and automatically generating an authority feature list in an authority configuration interface of the system, displaying all target authority features corresponding to the role to be configured in the authority feature list, and automatically checking in check boxes of all the target authority features of the authority feature list, thereby completing the authority configuration of the role to be configured.
Or the super administrator can manually confirm the automatically selected target authority characteristics according to actual needs: and after checking and adjusting the automatically selected target permission characteristics, the super administrator clicks a determination button to complete permission configuration of the role to be configured. For example, when the target authority characteristics of the 40 th quality inspector are shown in the authority characteristic list as follows: when the third supplier, the first material group and the third material group are used, the super administrator considers that the role to be configured should not have the permission of the third material group, so that the checking of the third material group is cancelled, then the determining button is clicked, and the permission characteristics including the third supplier and the first material group are configured for the 40 th quality inspector.
Preferably, in this embodiment, a mode of automatically confirming the target feature is adopted.
EXAMPLE III
The embodiment of the present application further provides a permission configuration device, where the device includes:
the role model configuration module is used for configuring the role model of the role to be configured, wherein the role model comprises authority features and weight values of the authority features.
Since the obtaining module is similar to the implementation principle of step S110 in fig. 1, it will not be further described here.
And the operation module is used for comparing the weight of the authority features included by the role model with a corresponding preset threshold value, and taking the authority features corresponding to the weight of the authority features as the target authority features of the role to be configured when the weight of the authority features is greater than the preset threshold value.
Since the operation module is similar to the implementation principle of step S120 in fig. 1, it will not be further described here.
And the configuration module is used for carrying out authority configuration on the role to be configured according to the target authority characteristics.
Since the configuration module is similar to the implementation principle of step S130 in fig. 1, no further description is made here.
Example four
The embodiment of the application provides a storage medium, and a computer program stored in the storage medium can be executed by one or more processors and can be used for realizing the permission configuration method in the first embodiment.
Wherein the storage medium includes, but is not limited to: flash memory, hard disk, multimedia card, card type memory (e.g., SD or DX memory, etc.), Random Access Memory (RAM), Static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, server, App application mall, etc., having stored thereon a computer program which, when executed by a processor, implements the method steps of:
obtaining a role model of a role to be configured, wherein the role model comprises authority features and weight values of the authority features;
comparing the weight of the authority feature with a corresponding preset threshold, and taking the authority feature corresponding to the weight of the authority feature as the target authority feature of the role to be configured when the weight of the authority feature is greater than the preset threshold;
and carrying out authority configuration on the role to be configured according to the target authority characteristics.
The specific embodiment process of the above method steps can be referred to as embodiment one, and the detailed description of this embodiment is not repeated herein.
EXAMPLE five
The embodiment of the present application provides an electronic device, which may be a mobile phone, a computer, a tablet computer, or the like, and includes a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, implements the permission configuration method as described in the first embodiment.
Wherein, the processor is used for executing all or part of the steps in the authority configuration method as in the first embodiment. The memory is used to store various types of data, which may include, for example, instructions for any application or method in the electronic device, as well as application-related data.
In summary, the present application provides a permission configuration method, an apparatus, an electronic device and a storage medium, the method obtains a role model corresponding to a to-be-configured role, wherein the role model includes permission features and weights of the permission features, compares the weights of the permission features included in the role model with a preset threshold, so that when the weights of the permission features are greater than the preset threshold, the permission features corresponding to the weights of the permission features are used as target permission features of the to-be-configured role, and performs permission configuration on the to-be-configured role according to the target permission features, thereby solving the problem that the target permission features corresponding to the to-be-configured role cannot be automatically generated in the prior art, achieving the purpose of automatically performing permission configuration on the to-be-configured role, and also avoiding the occurrence of mismatch and missing configuration for human operations, the efficiency of permission configuration of the roles to be configured is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Although the embodiments disclosed in the present application are described above, the descriptions are only for the convenience of understanding the present application, and are not intended to limit the present application. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims.

Claims (10)

1. A method for configuring rights, the method comprising:
obtaining a role model of a role to be configured, wherein the role model comprises authority features and weight values of the authority features;
comparing the weight of the authority feature with a corresponding preset threshold, and taking the authority feature corresponding to the weight of the authority feature as the target authority feature of the role to be configured when the weight of the authority feature is greater than the preset threshold;
and carrying out authority configuration on the role to be configured according to the target authority characteristics.
2. The permission configuration method according to claim 1, wherein when the role model includes at least one permission feature group and each permission feature group includes at least one permission feature, the step of comparing the weight of the permission feature with a corresponding preset threshold, and when the weight of the permission feature is greater than the preset threshold, taking the permission feature corresponding to the weight of the permission feature as the target permission feature of the role to be configured includes:
and comparing the weight of each authority feature group with a preset feature group threshold value, and taking all authority features included in the authority feature group as target authority features of the role to be configured when the weight of the authority feature group is greater than the preset feature group threshold value.
3. The permission configuration method according to claim 2, wherein the step of using all permission features included in the permission feature group as the target permission features of the role to be configured comprises:
and comparing the weight of each authority feature in the authority feature group with a corresponding preset threshold respectively, and taking the authority feature as the target authority feature of the role to be configured when the weight of the authority feature is greater than the preset threshold.
4. The permission configuration method according to claim 1, wherein the manner of obtaining the weight of the permission feature comprises:
obtaining the times of taking the authority characteristics as target authority characteristics;
obtaining an initial weight of the authority feature;
and obtaining the weight of the authority feature according to the times and the initial weight.
5. The permission configuration method according to claim 4, wherein the step of obtaining the weight of the permission feature according to the number of times and the initial weight comprises:
calculating the product of the times and a preset characteristic value corresponding to the authority characteristic;
and adding the product and the initial weight to obtain the weight of the authority feature.
6. The permission configuration method according to claim 1, wherein the step of performing permission configuration on the to-be-configured role according to the target permission characteristics comprises:
and when the identity information included by the role to be configured belongs to one of a plurality of preset identity information in the role model of the role to be configured, performing authority configuration on the role to be configured according to the target authority characteristics.
7. The permission configuration method according to claim 1, wherein when the target permission characteristics of the role to be configured are plural, the method further comprises:
and sequencing the target authority features according to the sequence of the weights of the target authority features of the roles to be configured from high to low so as to generate an authority feature list and display the authority feature list.
8. An authority configuration apparatus, characterized in that the apparatus comprises:
the role model configuration module is used for configuring a role model corresponding to the role to be configured, wherein the role model comprises authority features and weight values of the authority features;
the operation module is used for comparing the weight of the authority features included by the role model with a corresponding preset threshold value, and taking the authority features corresponding to the weight of the authority features as target authority features of the role to be configured when the weight of the authority features is larger than the preset threshold value;
and the configuration module is used for carrying out authority configuration on the role to be configured according to the target authority characteristics.
9. A storage medium storing a computer program executable by one or more processors for implementing a rights configuration method as claimed in any one of claims 1 to 7.
10. An electronic device, comprising a memory and a processor, wherein the memory stores a storage medium capable of being executed by the processor, and the storage medium implements the rights configuration method as claimed in any one of claims 1 to 7 when executed by the processor.
CN201911144354.2A 2019-11-20 2019-11-20 Authority configuration method and device, electronic equipment and storage medium Active CN110909328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911144354.2A CN110909328B (en) 2019-11-20 2019-11-20 Authority configuration method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911144354.2A CN110909328B (en) 2019-11-20 2019-11-20 Authority configuration method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110909328A true CN110909328A (en) 2020-03-24
CN110909328B CN110909328B (en) 2021-11-23

Family

ID=69818006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911144354.2A Active CN110909328B (en) 2019-11-20 2019-11-20 Authority configuration method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110909328B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281259A (en) * 2013-05-20 2013-09-04 中国科学院信息工程研究所 Inter-domain access control method based on dynamic self regulation
CN104598778A (en) * 2013-10-30 2015-05-06 ***通信集团江苏有限公司 Permission dispatching method and device
CN105893835A (en) * 2016-03-30 2016-08-24 广州杰赛科技股份有限公司 Operation authority control method and device
CN106650414A (en) * 2016-12-28 2017-05-10 广州杰赛科技股份有限公司 User authority management method and system
CN106997440A (en) * 2017-04-10 2017-08-01 中经汇通电子商务有限公司 A kind of role access control method
WO2017166654A1 (en) * 2016-03-31 2017-10-05 乐视控股(北京)有限公司 Resource management method and device
CN108549797A (en) * 2018-03-26 2018-09-18 安徽笛申科技有限公司 A kind of user and user group and the System right management method of role

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281259A (en) * 2013-05-20 2013-09-04 中国科学院信息工程研究所 Inter-domain access control method based on dynamic self regulation
CN104598778A (en) * 2013-10-30 2015-05-06 ***通信集团江苏有限公司 Permission dispatching method and device
CN105893835A (en) * 2016-03-30 2016-08-24 广州杰赛科技股份有限公司 Operation authority control method and device
WO2017166654A1 (en) * 2016-03-31 2017-10-05 乐视控股(北京)有限公司 Resource management method and device
CN106650414A (en) * 2016-12-28 2017-05-10 广州杰赛科技股份有限公司 User authority management method and system
CN106997440A (en) * 2017-04-10 2017-08-01 中经汇通电子商务有限公司 A kind of role access control method
CN108549797A (en) * 2018-03-26 2018-09-18 安徽笛申科技有限公司 A kind of user and user group and the System right management method of role

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ZHENGHONGLIU等: "Study on Role-Based Access Control with Time Constraint", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=6128284》 *
ZHENHAI MU等: "Enterprise Rights Management System Based on RBAC Model", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=8806578》 *
郭翠娟等: "网络电话管理***中的信任度权限分配方法TD-RABC", 《天津工业大学学报》 *

Also Published As

Publication number Publication date
CN110909328B (en) 2021-11-23

Similar Documents

Publication Publication Date Title
US12003393B2 (en) Parallel computational framework and application server for determining path connectivity
US10887177B2 (en) Calculating trust scores based on social graph statistics
US20220239574A1 (en) Systems and methods for social graph data analytics to determine connectivity within a community
US9922134B2 (en) Assessing and scoring people, businesses, places, things, and brands
AU2021205017B2 (en) Processing data utilizing a corpus
US20140122294A1 (en) Determining a characteristic group
US11720825B2 (en) Framework for multi-tenant data science experiments at-scale
CN107622197B (en) Equipment identification method and device, and weight calculation method and device for equipment identification
CN112307297B (en) User identification unification method and system based on priority rule
CN115796889A (en) Data processing method suitable for trading platform
CN113010791B (en) Search result display processing method and device and computer readable storage medium
CN110909328B (en) Authority configuration method and device, electronic equipment and storage medium
US8832110B2 (en) Management of class of service
US11797576B2 (en) Sensitivity-based database processing and distributed storage
WO2023098601A1 (en) Fingerprint-based data classificication
US20240020340A1 (en) Identity-aware data management
CN115408712A (en) View creation method and device and related product
CN115185843A (en) Statistical form testing method and device, storage medium and equipment
CN115905957A (en) User information merging method, device, equipment, storage medium and program product
CN117474662A (en) Money laundering risk assessment method, money laundering risk assessment device, electronic equipment and storage medium
CN115471269A (en) Marketing activity creating method and device
CN113486219A (en) Method and device for processing data, electronic equipment and storage medium
CN114997925A (en) Passenger group classification method and device
CN115599762A (en) Data processing method, device, equipment and storage medium
CN115564521A (en) Bidding information detection method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant