Data permission control method and device

A technology of data rights and control methods, applied in the field of electronic information, can solve the problem of inability to manage certain types of data rights, and achieve the effect of enhancing stability and robustness, simple addition and removal methods, and reducing complexity

Pending Publication Date: 2021-03-09
航天精一(广东)信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology helps prevent unauthorized access or manipulation of sensitive personal data during its use on an internet website without compromising their privacy. By monitoring specific forms of input from users who are accessing this site (Hibernating), they cannot directly manipulate them for granted purposes like sending emails). They also allow other people with different levels of authorization to see what others' requests were made beforehand instead of relying solely upon default settings provided through custom interfaces. Overall, these technical features improve security measures against attacks such as man-invasive viruses and worms.

Problems solved by technology

This patented describes two technical problem addressed by current systems where authorization controls have limitations such as requiring direct granting of privileged functions like menus or databases with limited functionality. These restrictions limit usability when accessing sensitive content due to lack of authorized rights.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data permission control method and device
  • Data permission control method and device
  • Data permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the protection scope of the present invention.

[0023] It should be understood that the step numbers used herein are only for convenience of description, and are not intended to limit the sequence of execution of the steps.

[0024] It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to limit the present invention. As used in this specification and the appended claims, the

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data permission control method and device, and relates to the technical field of electronic information. The method comprises the steps of obtaining an SQL statement; segmenting the SQL statement with the defined data permission strategy to obtain a plurality of SQL statement segments; traversing the SQL statement segments one by one, and judging whether the SQL statementsegments starting from select are first elements after segmentation or not; if not, segmenting the SQL statement segment again; if yes, analyzing the table names of the SQL statement segments, and screening out the SQL statement segments of which the table names define the data permission strategy; replacing the table name of the SQL statement segment of which the table name defines the data permission strategy with the select statement to which the permission condition is added to obtain a plurality of changed SQL statement segments; and reconnecting the changed SQL statement segment to obtain a target SQL statement segment. According to the method, the SQL statement generated by Hibernate is intercepted and modified to achieve data authority management, authority management is carried out on a certain type of data, and a user can only inquire and manage user information of a department where the user is located.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 航天精一(广东)信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products