scispace - formally typeset
Search or ask a question

Showing papers on "Authority control published in 2018"


Patent
20 Apr 2018
TL;DR: In this article, the authors present an authority control method, a user terminal, electronic equipment and a storage medium, which consists of the following steps of: obtaining an authority opening request and extracting at least one target authority requested by the authority request to be opened; searching page information corresponding to the at least 1 target authority in a preset local authority configuration file; and skipping authority opening pages respectively corresponding to each target authority and opening each authority in each authority opening page.
Abstract: Embodiments of the invention disclose an authority control method, a user terminal, electronic equipment and a storage medium. The method comprises the following steps of: obtaining an authority opening request and extracting at least one target authority requested by the authority request to be opened; searching page information corresponding to the at least one target authority in a preset localauthority configuration file; and skipping authority opening pages respectively corresponding to the at least one target authority and opening the at least one target authority in each authority opening page. By adoption of the method, tedious operations in the authority opening process can be avoided and the authority opening process is convenient.

11 citations


Patent
10 Apr 2018
TL;DR: In this paper, the authors proposed a data access authority control method for smaller data granularity, in which the safety of data is effectively guaranteed and the accurate control of the data authority is achieved.
Abstract: The invention relates to the technical field of data processing, in particular to a data access authority control method, a data access authority control device, a user authority management method, astorage medium and an electronic terminal. The data access authority control method comprises the steps of determining whether or not the data access request from a user is received; sending a user authority query command to a database so as to acquire the authority information of each data block of the user in the database when it is determined that the data access request of the user is received; and extracting the corresponding data of the data access request in each data block according to the authority information of the user in each data block. The authority management for smaller data granularity is achieved by means of the data access authority control method, and therefore the safety of the data is effectively guaranteed and the accurate control of the data authority is achieved.

6 citations


Patent
13 Feb 2018
TL;DR: In this paper, a user can set ACL authorities of a file and a directory by a Linux client, which serve as extended attributes of the file and the directory and are stored in a metadata server, and the ACL authorities can include a read authority, a write authority, an execution authority, and a deletion authority.
Abstract: An embodiment of the invention discloses an ACL (access control list) authority control method and device A user can set ACL authorities of a file and a directory by a Linux client, the set ACL authorities serve as extended attributes of the file and the directory and are stored in a metadata server, and the ACL authorities can include a read authority, a write authority, an execution authority,a deletion authority and a visual authority A Windows client acquires the corresponding ACL authorities from the metadata server by calling a file system API (application program interface), and theACL authorities are verified and inherited Based on the read authority, the write authority and the execution authority, the deletion authority and the visual authority are added Compared with traditional ACL authority control, more advanced user access authority types are provided, diversified demands of enterprise users for data access authorities can be met, and users can control file readingand writing and authority granting capacity

6 citations


Patent
09 Oct 2018
TL;DR: In this paper, an authority control method and a control device for large-scale resource data authority is presented, and the authorization precision is ensured through authorization based on the resource directories and the resource groups to which the data belongs.
Abstract: An embodiment of the invention provides an authority control method and an authority control device. The authority control method is applied to an Articulated Naturality Web (ANW) server, and comprises the steps that: the ANW server receives a login request input by a user; the ANW server determines one or more target resource directories to which the user is authorized and target resource groupsto which the user is authorized according to the login request, wherein one or more pieces of resource data are stored under each resource directory, and each piece of resource data has a corresponding resource group; the ANW server acquires target resource data corresponding to the target resource group for each target resource directory; and the ANW server displays the target resource data. By adopting the authority control method and the authority control device, the flexible control of large-scale resource data authority is realized, and the authorization precision is ensured through authorization based on the resource directories and the resource groups to which the resource data belongs.

6 citations


Patent
04 May 2018
TL;DR: In this paper, a limits of authority control method based on the multiple cloud platforms is proposed, where a unified management system is arranged and the multiple clouds platforms uniformly perform limits on the unified management systems.
Abstract: The invention relates to the technical field of management of multiple cloud platforms, in particular to a limits of authority control method based on the multiple cloud platforms. The method refers to that a unified management system is arranged and the multiple cloud platforms uniformly perform limits of authority control on the unified management system; the method comprises the specific stepsthat step 1, all functional points of the unified management system are summarized, and a function table is established and initialized; step 2, required roles are defined according to business function requirements, and a role table is established and initialed; step 3, a role and function association table is established and initialed; step 4, according to the association table, the unified management system limits the authority corresponding to different roles. The method solves the problems that the limits of authority of the multiple cloud platforms are complicated to control, the limitsof authority of the multiple cloud platforms cannot be arranged uniformly, and human resources are wasted; the system can be applied to a unified management environment of the limits of authority of the multiple cloud platforms.

4 citations


Journal Article
TL;DR: A brief history of name authority in the University of North Texas (UNT) Libraries' Digital Collections, including the development and use of a local name authority database for creators associated with the UNT community, can be found in this article.
Abstract: Brief history of name authority in the University of North Texas (UNT) Libraries' Digital Collections, including the development and use of a local name authority database for creators associated with the UNT community. This text was part of the article "Who Is This: Moving from Authority Control to Identity Management" published in the May/June 2018 issue of AALL Spectrum.

3 citations


Patent
21 Dec 2018
TL;DR: In this paper, an authority control method based on block chain, a device and a computer-readable storage medium is presented, which includes the following steps: when transaction information is received, contract information of an institution account number and an intelligent contract being extracted from the transaction information.
Abstract: The invention discloses an authority control method based on block chain, a device and a computer-readable storage medium. The method comprises the following steps: when transaction information is received, contract information of an institution account number and an intelligent contract being extracted from the transaction information; acquiring a first association relationship between a preset institution account number and a role, determining a role corresponding to the institution account number according to the first association relationship, and determining a transaction type according to contract information; acquiring a second association relationship between the preset role and the transaction authority, and determining whether the role has the transaction authority in all the authority control units corresponding to the authority control chain according to the second association relationship; if it is determined that the role has transaction authority, the transaction corresponding to the transaction information being executed in the block chain according to the contract information and the transaction type. The invention realizes the design of authority control based onthe authority model of 'account number, role and authority', and covers multiple transaction types such as deployment of intelligent contract and execution of intelligent contract.

3 citations


Patent
09 Mar 2018
TL;DR: In this article, an authority control method, device and system, a service-providing method, devices and systems, electronic equipment, a mobile terminal and two operating systems are described.
Abstract: The invention discloses an authority control method, device and system, a service providing method, device and system, electronic equipment, a mobile terminal and two operating system. The authority control method which is implemented in first equipment for providing a target service includes: receiving an access request, aiming at the target service, transmitted by second equipment; according toan access object initiating the access request, triggering an access agent object corresponding to the access object to initiate a service request to a target service providing object; using an authority control mechanism to perform authority checking on the access agent object, and using the checking result as the basis allowing target service providing object to execute a target service functionor refuse to execute the target service function. By the authority control method, a safety guarantee is provided for the service access process between interconnecting equipment. In addition, the method is simple and practicable due to the fact that the authority control mechanism of the equipment is utilized.

3 citations


Patent
13 Apr 2018
TL;DR: In this article, the authors present a dynamic data authority control method based on AOP technology, and belongs to the field of big-data technology, which includes: establishing a client, a console, a database server and an authority server.
Abstract: The invention discloses a dynamic data authority control method based on AOP technology, and belongs to the field of big-data technology. The method includes: establishing a client, a console, a database server and an authority server; and establishing a data authority control strategy module and a service interception module in the authority server. Technical problems that in existing data authority control, strategy configurations cannot be dynamically added to take effect, and flexible responding to customer needs is difficult are solved, service logic and data authority control are separated, data authority control can be flexibly configured, and thus dynamic adding, modifying or deleting of data authority control strategies are realized without the need for modifying code. Multi-granular data authority control needs can be satisfied, and development costs are saved.

3 citations


Patent
30 Nov 2018
TL;DR: In this paper, a browser-based data security management method and a browser based data management device, electronic equipment, and a computer readable medium are disclosed, and the method comprises the following steps: confirming user login information; acquiring corresponding browser authority management data according to the user's credentials; and restricting corresponding application functions in the browser according to browser authority data.
Abstract: The application discloses a browser-based data security management method and a browser-based data security management device, electronic equipment, and a computer readable medium. The method comprises the following steps: confirming user login information; acquiring corresponding browser authority management data according to the user login information; and restricting corresponding application functions in the browser according to the browser authority management data. The method obtains the browser authority control data corresponding to the user according to the user login information after the user logs in, and restricts corresponding functions on the browser that the user has logged in according to the authority management data, thereby effectively implementing data management of thebrowser, and further ensuring data security of the browser.

3 citations


Patent
06 Nov 2018
TL;DR: In this paper, a resource authority management method and device is presented, which comprises the steps of pre-configuring a user role corresponding to each terminal user, determining an associationrelationship between each piece of resource information in a preset resource data table and the authority control information in the preset authority data table, and configuring role authority information corresponding to the user role for each user role according to the association relationship.
Abstract: The invention discloses a resource authority management method and device. The method comprises the steps of pre-configuring a user role corresponding to each terminal user; determining an associationrelationship between each piece of resource information in a preset resource data table and each piece of authority control information in a preset authority data table; and configuring role authority information corresponding to the user role for each user role according to the association relationship, wherein the role authority information comprises resource information corresponding to the user role, and the authority control information corresponding to the resource information corresponding to the user role. Through utilization of the scheme provided by the invention, resources corresponding to various different roles and the authority thereof can be managed independently, the uniform management of the different roles of users is facilitated, and the user management efficiency is improved.

Journal ArticleDOI
TL;DR: To improve the accuracy with which such files are distinguished, it is suggested developing systematic rules for handling additional components—elements frequently, but inconsistently, associated with personal name authority files in various authority control schemes.

Patent
23 Mar 2018
TL;DR: In this paper, the authors present a terminal control method and device, a terminal and a computer readable storage medium, which relates to the technical field of electronics. But they do not provide a detailed description of the device.
Abstract: The invention provides a terminal control method and device, a terminal and a computer readable storage medium, and relates to the technical field of electronics. The terminal control method comprisesthe steps of receiving an operation instruction of a target, wherein the target comprises an application program and/or an interface; judging whether or not the authority of the target meets an authority strategy of the terminal under the authority control mode; judging whether or not the behavior content of the target is matched with the content of a preset behavior model; if the authority of the target meets the authority strategy under the authority control mode and the behavior content of the target is matched with the content of the preset behavior model, controlling the terminal to execute the operation instruction. By means of the terminal control method and device, the authority adjusting requirement of a user can be met, and the authority control accuracy can be improved.

Patent
18 Dec 2018
TL;DR: In this article, a resource access authority control method belonging to the network authority management field is presented, where the file server verifies the resource request information, and provides the requested resource to the web front end if the verification is passed.
Abstract: The invention discloses a resource access authority control method, belonging to the network authority management field. The method comprises the following steps: S1, a web front end sends a request for obtaining verification information to a web server; 2, after receiving the request for obtaining the verification information, the web server sends a preset request to the file server; 3, after receiving that preset request, the file server generates authentication information and access control information; S4, the file server writes the resources requested by the web front end, the authentication information and the access control information into the self-cache; S5, the authentication information is sent to the web front end; 6, the web front end sends the authentication information andthe resource request information to the file server; S7, the file server verifies the resource request information, and provides the requested resource to the web front end if the verification is passed. The invention mainly solves the problem that the construction of multimedia resources in the service layer of the web server can not realize the single access effective authority control, and realizes the access frequency control and the access time control of the network resources.

Patent
24 Jul 2018
TL;DR: In this paper, an API authority management method based on an OSGI framework is proposed, which involves a message processing module which is used for parsing and encapsulating a request response message according to a constraint format and is responsible for proposing message communication between a service access plugin for requesting the corresponding message and an authority management plug-in.
Abstract: The invention discloses an API authority management method based on an OSGI framework, and relates to the technical field of OSGI authority management. The method involves a message processing modulewhich is used for parsing and encapsulating a request response message according to a constraint format and is responsible for proposing message communication between a service access plug-in for requesting the corresponding message and an authority management plug-in; an authority filtering module used for performing identity verification and authorization verification on the request message; a service management module used for providing a registration service to a service providing plug-in and providing service access capability for the authority filtering module; an authority configurationmodule used for performing identity information management and service access authority allocation management of a service requester. The API authority management method can achieve the authority control of the API level of the OSGI framework, so that finer authority control services become possible.

Patent
22 Jun 2018
TL;DR: In this paper, a two-level function menu is created through a reflection mechanism of JAVA; then the generated menu is provided to a system administrator to enable the administrator to carry out analysis on corresponding user roles; for open access authority, identification can be carried out through a manner of customization annotation.
Abstract: The invention relates to the field of JAVA technology development, and particularly to a system authority control method. According to the method of the invention, a two-level function menu is createdthrough a reflection mechanism of JAVA; then the generated menu is provided to a system administrator to enable the system administrator to carry out analysis on corresponding user roles; for open access authority, identification can be carried out through a manner of customization annotation; and authority filtering is not carried out when a system recognizes the type of accesses. According to the method, access authority of the system can be effectively managed, and difficulty of system authority management is greatly reduced.

Patent
28 Sep 2018
TL;DR: In this article, a method and a device for controlling authority is presented, which comprises the steps of: acquiring authority information of each role when receiving an authority control request; performing classified caching on the authority information according to difference of the roles; searching for target authority set information of a current user corresponding to a target role from the cached authority according to the target role of the current user; and transmitting the menu level authority information to a client; receiving a trigger request for a target menu in a plurality of displayed menus from the client, and determining a target page corresponding to the trigger
Abstract: The invention provides a method and a device for controlling authority. The method comprises the steps of: acquiring authority information of each role when receiving an authority control request; performing classified caching on the authority information according to difference of the roles; searching for target authority set information of a current user corresponding to a target role from the cached authority information according to the target role of the current user; searching for menu level authority set information from the target authority set information; transmitting the menu levelauthority set information to a client; receiving a trigger request for a target menu in a plurality of displayed menus from the client, and determining a target page corresponding to the trigger request; determining button level authority set information of a plurality of buttons on which the current user has an operation authority in the target page according to button level authority informationin the target authority set information and button information of the target page; and in response to the trigger request, transmitting the button level authority set information to the client. Through adoption of the method of the invention, the menus and the buttons on which the user has the operation authority can be displayed.

Patent
30 Nov 2018
TL;DR: In this article, the authors proposed a space service authority control method and system based on the basis of map service, component service, slicing service and other services, the control and sharing of geographic information data are achieved through a Service authority control process, the range, the pattern layer, the field, the executable functions and other authority of spatial data of different roles can be controlled by using a service containing all spatial data.
Abstract: The invention relates to a space service authority control method and system. On the basis of map service, component service, slicing service and other services, the control and sharing of geographicinformation data are achieved through a service authority control process, the range, the pattern layer, the field, the executable functions and other authority of spatial data of different roles canbe controlled by using a service containing all spatial data instead of respectively creating the services and authorizing the services one by one, thereby reducing the complexity of space service authority management; and some service data that are allowed to be accessed are selectively transmitted to a client by a service access control process, thereby improving the security of the spatial information.

Proceedings Article
05 Nov 2018
TL;DR: The findings show that while LCNAF and Scopus results are comparable between the two institutions, the difference in the ORCID, VIAF, and ISNI are considerable and have implications for enhancing local authority data by linking to external identifier authority data to augment institutional repository metadata.
Abstract: The aim of this poster is to analyze name authority control in two institutional repositories to determine the extent to which faculty researchers are represented in researcher identifier databases. A purposive sample of 50 faculty authors from Florida Southern College (FSC) and Ryerson University (RU) were compared against five different authority databases: Library of Congress Name Authority File (LCNAF), Scopus, Open Researcher and Contributor ID (ORCID), Virtual International Authority File (VIAF), and International Standard Name Identifier (ISNI). We first analyzed the results locally, then compared them between the two institutions. The findings show that while LCNAF and Scopus results are comparable between the two institutions, the difference in the ORCID, VIAF, and ISNI are considerable. Additionally, the results show that the majority of authors at each institution are represented in two or three external databases. This has implications for enhancing local authority data by linking to external identifier authority data to augment institutional repository metadata.

Patent
02 Mar 2018
TL;DR: In this article, a network file system-based authority control method is proposed for NFS systems, which consists of registering an ACL processing function and an ACL authority control function according to an ACL program number.
Abstract: The invention discloses a network file system-based authority control method. The authority control method comprises the following steps of: registering an ACL processing function and an ACL authoritycontrol function according to an ACL program number; when a business request is received, judging whether a user corresponding to the business request has an operation authority or not by utilizing the ACL authority control function; if the judging result is positive, executing an operation corresponding to the business request by utilizing the ACL processing function; and if the judging result is negative, executing an error report operation. According to the authority control method, control authorities can be set through a network file system to realize setting, modification and control ofuser authorities of an NFS client, so as to control authorities of the NFS client more accurately. The invention furthermore discloses a network file system-based authority control system, a computerreadable storage medium and a server, which also have above beneficial effects.

Journal ArticleDOI
TL;DR: In this paper, the authors identified the online visibility for catalogue data for the national publications in the Library of Congress and found that the coverage of national publications from the cataloguing in publication database is not satisfactory.
Abstract: Visibility of online catalogues will contribute data for many aspects such as creating uniform catalogues in libraries and ranking of libraries, authors, publishers, and institutions. The Cataloguing in Publication is the description of cataloguing the record for a book, which is obtained by the publishers just prior to their book publication for printing the same on the verso of the book title page while making them available online. Library of Congress provides online access to its Cataloguing in Publication and other catalogue data. The paper identifies the online visibility for catalogue data for the national publications in the Library of Congress. The finding shows that the coverage of national publications in the Library of Congress database is not satisfactory. A critical decline of online catalogue data from the LC is identified after the year of 2007, and the expected values for online catalogue record numbers for the year from 2007 to 2016 were measured using a fitting curve. Another finding of this study reveals that publications in the social science discipline get more online catalogue data from the LC. Necessary discussion and interpretation for these trends have been made throughout the paper using Tables and Figures.

01 Jan 2018
TL;DR: This article is based on the experiences in the VLIRED Cuba programme with interoperability between the metadata of different platforms and the reusability of the data in different information silos, and develops tools like EsFácil and Esfácil Authority to create standardized metadata in different platforms.
Abstract: This article is based on the experiences in the VLIRED Cuba programme with interoperability between the metadata of different platforms and the reusability of the data in different information silos. VLIRED Cuba, a VLIR-UOS network programme, started with implementing specific platforms for educational, library and information management and research output, resp. Moodle, ABCD, DSpace and VIVO. The final goal is to create an integrated research, education & information network. The authors defined the basic concepts metadata, authority systems and interoperability based on a literature study. “Interoperability is enabling information that originates in one context to be used in another in ways that are as highly automated as possible”. But the overall success of such data structures being applied by a wide variety of metadata producers will depend on the quality of the metadata content they provide. VLIRED Cuba chooses for open source software to develop the network: ABCD for the library, DSpace and VIVO for research information and Moodle for e-learning. But the platforms uses different metadata formats, respectively MARC, Qualified Dublin Core, a group of ontologies and LOM. To make the different systems interoperable the content should be described in standardized way. The project focused therefore on the key elements to standardize: people, organization and keywords. A basic principle is that these entities should be defined by a unique value. This has to be integrated in the different metadata formats. Authority systems will deliver standard content: for people ORCID, Cuban ID or local VIVO id’s for keywords controlled vocabularies like CCS, AGROVOC and MESH. Finally VLIRED Cuba is developing tools like EsFácil and EsFácil Authority to create standardized metadata in different platforms. EsFácil Authority is an authority system that can manage all type of authority lists and make then searchable through a REST API. EsFácil will collect and enrich publication metadata and make it available for systems with different metadata format.

Journal ArticleDOI
TL;DR: In this article, the authors presented the results of a survey designed to benchmark the use of vendors to support authority control activities in Association of Research Libraries member libraries, and found that the majority of the vendors were used for the same purpose.
Abstract: This article presents the results of a survey designed to benchmark the use of vendors to support authority control activities in Association of Research Libraries member libraries. Such ac...

Patent
01 Jun 2018
TL;DR: In this article, the authors present an authority control method and device for cloud computing technology, which solves a problem that a conventional authority management method is relatively fixed in roleconfiguration and cannot meet application requirements.
Abstract: The invention discloses an authority control method and device, relates to cloud computing technology, and solves a problem that a conventional authority management method is relatively fixed in roleconfiguration and cannot meet application requirements. The method includes: creating a role and configuring an authority table for the role, the authority table including operation authority information of at least one event; allocating the role to a user, and establishing an association between the user and the authority table. The authority control method and device are suitable for a management information system and achieve flexible and accurate management of user authority.

Patent
23 Mar 2018
TL;DR: In this article, the authors provided a server cluster authority management method and device, a medium and an electronic device, to intercept one user's access request for each server by employing each interceptor deployed on each server in the server cluster.
Abstract: The embodiment of the invention provides a server cluster authority management method and device, a medium and an electronic device. The server cluster authority management method comprises the stepsof: intercepting one user's access request for each server by employing each interceptor deployed on each server in a server cluster; obtaining a first authority management strategy distributed by anunified authority management center to the user; and performing management for the user's access requests according to the first authority management strategy and a second authority management strategy in each interceptor deployed on each server. According to the technical scheme of the embodiment of the invention, the unified authority management can be achieved by employing the first authority management strategy distributed by the unified authority management center, special authority control of each server can be achieved by employing the second authority management strategy in each interceptor deployed on each server, and therefore, flexibility and independence of authority control of the server cluster can be improved.


Journal ArticleDOI
28 Jun 2018
TL;DR: The Virtual International Authority File (VIAF) as mentioned in this paper is an international cooperation consortium, which has established cooperation between national bibliographic agencies and libraries in several parts of the world and has added value and availability of authority files in Linked Open Data.
Abstract: The Virtual International Authority File (VIAF) is an international cooperation consortium, which has established cooperation between national bibliographic agencies and libraries in several parts of the world and has added value and availability of authority files in Linked Open Data. The consortium was designed based on bases, concepts and technologies established in cataloging, which due to technological limitations, have been converted through World Wide Web Consortium recommendations to publish linked data. It provides infrastructure for the exchange and sharing of authority data in Web of data, in addition to the construction of value vocabularies of high level. This study aims to present and describe the bases, concepts and technologies involved in the development of VIAF. The study was accomplished through of literature documentary and shows, as a result, the relationship between concepts of authority control, bibliographic control, linked data, among others, with the established infrastructure in VIAF. Furthermore, it shows the contributions of the consortium to the unification of the national variations in descriptions of value, through cluster formation, which provides terminological control in the values that include linguistic and cultural diversity. In conclusion, the VIAF is a democratic initiative of international cooperation and can be used as a reliable source of authority files for librarian institutions, as well as to the Linked Data community.

Journal ArticleDOI
Cuijuan Xia1, Wei Liu
17 Jul 2018
TL;DR: This study is to address the problem of traditional library data problems through using the Linked Data approach to build knowledge bases in transforming and normalizing name authority data into the format that can be easily deployed by digital humanities research.
Abstract: Libraries as a type of social institution have a long history of collecting, preserving and spreading the knowledge of mankind and have cumulated a vast amount of highly structured data conforming to library and information standards. Among these data, especially, name authority data are fundamentally important for digital humanities. However, traditional library data are not built in the way that digital humanities research requires, which makes it difficult for digital humanities researchers to use them directly. This study is to address this problem through using the Linked Data approach to build knowledge bases in transforming and normalizing name authority data into the format that can be easily deployed by digital humanities research. A name authority database was built on various sources and formed the content infrastructure to provide Linked Open Data services, which enables sophisticated searches and uses of document resources knowledge base with multiple types of documents and multimedia, instead of digital collections with only a keyword search function. The process of design and development as well as the way through which resources are interlinked are described in detail in this paper.

Patent
08 Jun 2018
TL;DR: In this paper, a map-resource authority management method, device and equipment and a computer readable storage medium are described, which includes the steps that a role corresponding to a current user is determined according to user information of the current user and the pre-established corresponding relationships between users and roles.
Abstract: The embodiment of the invention discloses a map-resource authority management method, device and equipment and a computer readable storage medium. The map-resource authority management method includesthe steps that a role corresponding to a current user is determined according to user information of the current user and the pre-established corresponding relationships between users and roles; through the role corresponding to the current user and the pre-established corresponding relationships between the roles and resources, an authority operation list and a layer list which correspond to theroles are determined; operation authorities of the roles are obtained from the authority operation list, and layer authorities of the roles are obtained from the layer list; through the roles and thepre-established leader-member relationships between the roles, all leader roles corresponding to the roles are determined; the operation authorities and the layer authorities of the roles are assigned to all the leader roles corresponding to the roles. In the using process of the map-resource authority management method, device and equipment and the computer readable storage medium in the embodiment, the accuracy of map-resource authority control management is increased, the users more conveniently manage and control map resources, and different users can better manage and control the map resources.

Patent
13 Feb 2018
TL;DR: In this paper, a database authority management method is proposed, where the first database is a arelational database with authority management, and the second database is pre-configured with an external table, which has a mapping relation with a second database, and determining the management authority of the login account according to preconfigured management authority information.
Abstract: The invention discloses a database authority management method. The method comprises the steps of obtaining a login account which logs in a first database successfully, wherein the first database is arelational database with authority management, and the first database is pre-configured with an external table, and the external table has a mapping relation with a second database; determining the management authority of the login account according to pre-configured management authority information; judging whether management operation of the login account for the external table exceeds the management authority of the login account or not; and allowing the management operation if the management operation of the login account does not exceed the management authority, and synchronizing the management operation with the second database based on the mapping relationship between the external table and the second database. The invention also discloses a database authority management system. According to the method and the system, the authority control over the second database is realized and the security of the second database is improved.