Nothing Special   »   [go: up one dir, main page]

CN112818391A - Permission control method based on tangent plane programming - Google Patents

Permission control method based on tangent plane programming Download PDF

Info

Publication number
CN112818391A
CN112818391A CN202110105104.9A CN202110105104A CN112818391A CN 112818391 A CN112818391 A CN 112818391A CN 202110105104 A CN202110105104 A CN 202110105104A CN 112818391 A CN112818391 A CN 112818391A
Authority
CN
China
Prior art keywords
service
authority
data
rule
interceptor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110105104.9A
Other languages
Chinese (zh)
Inventor
苟林
杨垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Tianyi Network Service Co ltd
Original Assignee
Sichuan Tianyi Network Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Tianyi Network Service Co ltd filed Critical Sichuan Tianyi Network Service Co ltd
Priority to CN202110105104.9A priority Critical patent/CN112818391A/en
Publication of CN112818391A publication Critical patent/CN112818391A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a permission control method based on tangent plane programming, which comprises the following steps: step 1: determining the service type, and determining the authority service rule which meets the organization, the service data category and the specific attribute of the service data through a service analysis module; step 2: defining an authority field, and limiting the authority field according to the acquired authority service rule; and step 3: outputting a data authority rule based on a specific service object to a section interceptor according to the service requirement determined by the service analysis module; and 4, step 4: implanting different service method types into a designated interceptor, and simultaneously transmitting service method data to a section interceptor; and 5: defining a section interceptor, and realizing service inquiry authority control according to the received service method data and the data authority rules; step 6: and outputting the service data subjected to the authority filtering.

Description

Permission control method based on tangent plane programming
Technical Field
The invention relates to a section, in particular to a permission control method based on section programming.
Background
In a service management information system, access control to system resources (such as menus, functions, data, etc.) based on users, roles, and mechanisms is a basic and important function. "ensuring authorized users to access control the system within the authorized scope" is a necessary requirement for the service management information system. The most common service management information system adopts a privilege model, which is RBAC (Role-Based Access Control), and needs to perform privilege Control on all resources of the system, and system resources can be simply summarized as static resources (function operations, data columns) and dynamic resources (data), which are also called object resources and data resources, respectively. The goal of the RBAC is to exercise right control over all object resources and data resources in the system. The difficulty is access control to dynamic resources (data resources).
Due to the dynamic nature of service data, the data authority control of most systems is realized by transmitting user information (roles, mechanisms and the like) in a data access interface and by sql splicing or injection in an interface method, and the main disadvantages are as follows: 1. the access control code of the authority is complex, and all places needing the authority control need to be added with extra codes and parameters which are irrelevant to the service; 2. the authority access logic is dispersed in the whole system, once the business rule changes, the global situation is possibly influenced, and a large amount of maintenance workload is brought; 3. the service logic is mixed with the authority control code, the complexity of the service module is increased, and unnecessary expenses are brought to system debugging and maintenance.
Disclosure of Invention
The present invention is directed to a method for controlling authority based on tangent plane programming.
A permission control method based on tangent plane programming comprises the following steps:
step 1: determining the service type, and determining the authority service rule which meets the organization, the service data category and the specific attribute of the service data through a service analysis module;
step 2: defining an authority field, and limiting the authority field according to the acquired authority service rule;
and step 3: outputting a data authority rule based on a specific service object to a section interceptor according to the service requirement determined by the service analysis module;
and 4, step 4: implanting different service method types into a designated interceptor, and simultaneously transmitting service method data to a section interceptor;
and 5: defining a section interceptor, and realizing service inquiry authority control according to the received service method data and the data authority rules;
step 6: and outputting the service data subjected to the authority filtering.
The step 2 comprises the following substeps:
s201: limiting the authority field according to a tree-shaped multilevel organizational structure coding rule;
s202: and adding a coding field according to the service data controlled by the authority of the organization.
Preferably, the mechanism code is used as a unique attribute of each mechanism, and lower mechanisms automatically inherit the upper mechanism code and extend the current level code.
Preferably, the conditional rule of the data authority rule in step 3 includes: "=", "! = "," include "," left blur ", and" right blur ".
Step 5 comprises the following substeps:
s501: acquiring a mechanism where a login user is located;
s502: and according to the query service of the user, injecting a data authority rule query condition and querying the service data meeting the condition.
The invention has the beneficial effects that: the method has the advantages that the tangent plane technology is utilized, the permission control codes are separated from the service codes, and business logic writers pay attention to the service logic without paying attention to the access permission of the service data; the dynamic configuration is supported through flexible and simple authority access coding rules, and a user can define the rules to realize the control of service data access under most conditions; and aiming at a specific data access rule, an extended authority control interface is supported, and special service data control is realized through secondary development and other forms.
Drawings
FIG. 1 is a flow chart of the operation of the present invention.
Detailed Description
The invention will be further explained with reference to the drawings.
A permission control method based on tangent plane programming comprises the following steps:
step 1: determining the service type, and determining the authority service rule which meets the organization, the service data category and the specific attribute of the service data through a service analysis module;
step 2: defining an authority field, and limiting the authority field according to the acquired authority service rule;
and step 3: outputting a data authority rule based on a specific service object to a section interceptor according to the service requirement determined by the service analysis module;
and 4, step 4: implanting different service method types into a designated interceptor, and simultaneously transmitting service method data to a section interceptor;
and 5: defining a section interceptor, and realizing service inquiry authority control according to the received service method data and the data authority rules;
step 6: and outputting the service data subjected to the authority filtering.
The step 2 comprises the following substeps:
s201: limiting the authority field according to a tree-shaped multilevel organizational structure coding rule;
s202: and adding a coding field according to the service data controlled by the authority of the organization.
It is to be understood that the organization code is the unique attribute of each organization, and that subordinate organizations automatically inherit the superior organization code and extend the present level code.
It should be understood that the conditional rules of the data authority rules in step 3 include: "=", "! = "," include "," left blur ", and" right blur ".
Step 5 comprises the following substeps:
s501: acquiring a mechanism where a login user is located;
s502: and according to the query service of the user, injecting a data authority rule query condition and querying the service data meeting the condition.
It should be noted that, by changing the service data encoding rule and the permission rule, it can be easily realized that, for example, a user can only view own service data, a user can only view a certain type or certain types of specified service data, a user can only view data in a certain specified time period, and the like, and only different encoding and comparison rules need to be simply realized.
It should be noted that, the rule problem of controlling the access right of the user or the role data through the right rule is to make a coding rule of the service data according to the level of the organization where the user is located, the department where the user is located, or the role to which the user belongs, so as to control the access right of the user through the rule on the basis of meeting the diversity and the dynamic property of the service data.

Claims (5)

1. A permission control method based on tangent plane programming is characterized by comprising the following steps:
step 1: determining the service type, and determining the authority service rule which meets the organization, the service data category and the specific attribute of the service data through a service analysis module;
step 2: defining an authority field, and limiting the authority field according to the acquired authority service rule;
and step 3: outputting a data authority rule based on a specific service object to a section interceptor according to the service requirement determined by the service analysis module;
and 4, step 4: implanting different service method types into a designated interceptor, and simultaneously transmitting service method data to a section interceptor;
and 5: defining a section interceptor, and realizing service inquiry authority control according to the received service method data and the data authority rules;
step 6: and outputting the service data subjected to the authority filtering.
2. The privilege control method based on tangent plane programming as claimed in claim 1, wherein the step 2 comprises the following sub-steps:
s201: limiting the authority field according to a tree-shaped multilevel organizational structure coding rule;
s202: and adding a coding field according to the service data controlled by the authority of the organization.
3. The method as claimed in claim 2, wherein the organization code is a unique attribute of each organization, and the subordinate organization automatically inherits the superior organization code and extends the current level code.
4. The method as claimed in claim 1, wherein the conditional rule of the data right rule in step 3 comprises: "=", "! = "," include "," left blur ", and" right blur ".
5. The method as claimed in claim 1, wherein the step 5 comprises the following sub-steps:
s501: acquiring a mechanism where a login user is located;
s502: and according to the query service of the user, injecting a data authority rule query condition and querying the service data meeting the condition.
CN202110105104.9A 2021-01-26 2021-01-26 Permission control method based on tangent plane programming Pending CN112818391A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110105104.9A CN112818391A (en) 2021-01-26 2021-01-26 Permission control method based on tangent plane programming

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110105104.9A CN112818391A (en) 2021-01-26 2021-01-26 Permission control method based on tangent plane programming

Publications (1)

Publication Number Publication Date
CN112818391A true CN112818391A (en) 2021-05-18

Family

ID=75859340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110105104.9A Pending CN112818391A (en) 2021-01-26 2021-01-26 Permission control method based on tangent plane programming

Country Status (1)

Country Link
CN (1) CN112818391A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113420327A (en) * 2021-06-23 2021-09-21 平安国际智慧城市科技股份有限公司 Data authority control method, system, electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108257A1 (en) * 2003-11-19 2005-05-19 Yohsuke Ishii Emergency access interception according to black list
CN101276271A (en) * 2007-03-29 2008-10-01 北京邮电大学 Method and interceptor system facing to tangent plane programming
CN103412766A (en) * 2013-09-05 2013-11-27 曙光云计算技术有限公司 User right-based data access method and device
CN106529229A (en) * 2015-09-10 2017-03-22 北京国双科技有限公司 Permission data processing method and apparatus
CN106778341A (en) * 2016-12-02 2017-05-31 华北计算技术研究所(中国电子科技集团公司第十五研究所) data right management system and method
CN107317826A (en) * 2017-08-05 2017-11-03 中山大学 A kind of method that java network system rights managements are realized based on blocker
CN109684793A (en) * 2018-12-29 2019-04-26 北京神舟航天软件技术有限公司 A method of data permission management is carried out based on permission domain structure tree
CN111385264A (en) * 2018-12-29 2020-07-07 卓望数码技术(深圳)有限公司 Communication service data access system and method
CN111931133A (en) * 2019-12-26 2020-11-13 长扬科技(北京)有限公司 Permission control method based on B/S architecture

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108257A1 (en) * 2003-11-19 2005-05-19 Yohsuke Ishii Emergency access interception according to black list
CN101276271A (en) * 2007-03-29 2008-10-01 北京邮电大学 Method and interceptor system facing to tangent plane programming
CN103412766A (en) * 2013-09-05 2013-11-27 曙光云计算技术有限公司 User right-based data access method and device
CN106529229A (en) * 2015-09-10 2017-03-22 北京国双科技有限公司 Permission data processing method and apparatus
CN106778341A (en) * 2016-12-02 2017-05-31 华北计算技术研究所(中国电子科技集团公司第十五研究所) data right management system and method
CN107317826A (en) * 2017-08-05 2017-11-03 中山大学 A kind of method that java network system rights managements are realized based on blocker
CN109684793A (en) * 2018-12-29 2019-04-26 北京神舟航天软件技术有限公司 A method of data permission management is carried out based on permission domain structure tree
CN111385264A (en) * 2018-12-29 2020-07-07 卓望数码技术(深圳)有限公司 Communication service data access system and method
CN111931133A (en) * 2019-12-26 2020-11-13 长扬科技(北京)有限公司 Permission control method based on B/S architecture

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113420327A (en) * 2021-06-23 2021-09-21 平安国际智慧城市科技股份有限公司 Data authority control method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US9411977B2 (en) System and method for enforcing role membership removal requirements
CN100492357C (en) Systems and methods that optimize row level database security
US20100262625A1 (en) Method and system for fine-granularity access control for database entities
CN112182619A (en) Service processing method and system based on user permission, electronic device and medium
US20020083059A1 (en) Workflow access control
CN106570406A (en) Data level permission configuration method and device
US20110219425A1 (en) Access control using roles and multi-dimensional constraints
CN103473078B (en) A kind of method for generating form
US20210279355A1 (en) Methods and systems for purpose-based access control
US20040088563A1 (en) Computer access authorization
CN101309478B (en) Method for mobile terminal data access
CN114424191A (en) Fine-grained access control to a process language of a database based on accessed resources
CN112818391A (en) Permission control method based on tangent plane programming
US8214382B1 (en) Database predicate constraints on structured query language statements
CN111709017A (en) Refined enhanced authority management, control and analysis system of android platform
CN110992005B (en) Method and system for realizing data authority control processing in big data application
CN106020923A (en) SELinux strategy compiling method and system
CN117407893A (en) Data authority management method, device, equipment and medium based on API configuration
Fuchs et al. Minimizing insider misuse through secure Identity Management
CN116383804A (en) Authority management method, device, equipment, medium and program product
CN101167040B (en) Signaling to a peripheral via irregular read operations
US11816238B2 (en) Assignment of computer privileges to user based on automated skill estimate
CN114491498A (en) Wind power plant central monitoring login system based on permission classification
CN112926071A (en) Multi-level data authority control method based on government affair cloud management platform
He et al. Design of policy language expression in SIoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination