Method and device for authenticating user operation permission

An operation authority and user technology, applied in the computer field, can solve the problems such as the inability to ensure the transactionality of the distributed cache for multiple operations and the bloated program code, and achieve the effect of ensuring consistency and accurate identification.

Active Publication Date: 2018-02-02
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology ensures that users only access their own cached content when they want it or cannot use them easily due to its ability to verify how much work has been done on different parts of the system without revealing any sensitive details about what happened during these transactions.

Problems solved by technology

This patented technical problem addressed by the present inventors relates to managing complex interfaces between different parts within a computer network or other type of organization without compromising their security level for users with access rights.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authenticating user operation permission
  • Method and device for authenticating user operation permission
  • Method and device for authenticating user operation permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0025] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0026] figure 1 It shows an exemplary system architecture 100 to which embodiments of the method for authenticating a user's operation authority or the embodiment of an apparatus for authenticating a user's operation authority can be applied.

[0027] Such as figure 1 As show

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a method and a device for authenticating user operation permission. One specific embodiment of the method comprises the following steps: pushing permission data to a distributed cache in response to an operation request of a user; creating operation tasks for operations performed on the distributed cache; adding the operation tasks into a task list saved on a relational database; executing the following task processing steps: finding an executable operation task; processing the found operation task according to a task status, and modifying the task status of a successfully-processed operation task to execution success; determining whether an executable operation task exists in the task list or not, and if not, reading the permission data from the distributed cacheto determine whether the user has operation permission or not; and if the executable operation task exists, continuing the task processing step. Through the mode of execution, the problem that the transactional characteristic of repeated operations cannot be ensured in the distributed cache is solved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products