[go: up one dir, main page]

CN114115881A - Authority control method, system, equipment and storage medium for front-end and back-end separation items - Google Patents

Authority control method, system, equipment and storage medium for front-end and back-end separation items Download PDF

Info

Publication number
CN114115881A
CN114115881A CN202111470873.5A CN202111470873A CN114115881A CN 114115881 A CN114115881 A CN 114115881A CN 202111470873 A CN202111470873 A CN 202111470873A CN 114115881 A CN114115881 A CN 114115881A
Authority
CN
China
Prior art keywords
resource
interface
user
authority
association model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111470873.5A
Other languages
Chinese (zh)
Inventor
廖明乾
陈灏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan XW Bank Co Ltd
Original Assignee
Sichuan XW Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan XW Bank Co Ltd filed Critical Sichuan XW Bank Co Ltd
Priority to CN202111470873.5A priority Critical patent/CN114115881A/en
Publication of CN114115881A publication Critical patent/CN114115881A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a method, a system, equipment and a storage medium for controlling the authority of a front-end and back-end separation project. A permission control method for separating items at the front end and the rear end comprises the following steps: determining resources needing to be subjected to authority control; defining a resource ID of a unique identifier for the resource; acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; constructing a second association model of the user ID and the resource ID of the user owning the authority; obtaining a user authorized resource ID set based on the second association model, and judging whether the resource ID is in the user authorized resource ID set; and obtaining an interface set which is called by the user with the authority based on the ID set of the user with the authority and the first association model, and verifying whether the interface requested currently is in the interface set. The method provided by the invention can simultaneously carry out authority control at the front end and the back end, thereby not only optimizing the experience of the front end user, but also ensuring the safety of the data interface.

Description

Authority control method, system, equipment and storage medium for front-end and back-end separation items
Technical Field
The invention relates to the technical field of data processing, in particular to a method, a system, equipment and a storage medium for controlling the authority of a front-end and back-end separation project.
Background
In recent years, software system development has started a front-end and back-end separated architecture mode and development mode, the front end is dedicated to page and data display, the back end is dedicated to business logic, and the front end and the back end perform data interaction through interfaces. The first one is that whether a user has the authority to use a certain menu is determined by configuring a 'user-role-menu', the menu is displayed if the user has the authority under the control of a front end, otherwise, the menu is not displayed. The second is to determine whether a user has the right to access an interface by configuring a 'user-role-interface', when a front end initiates a request, a back end detects that the user has the right to access the interface, and then response data is sent; otherwise, no permission is prompted, the scheme is not friendly to user interaction, a user can see all menus and function entries on a page, no permission is prompted when the user operates (such as clicks), when a large number of displayed function icons exist, the user is easily interfered to find the correct function icon, the frequency of mistaken clicks is increased, and time is wasted.
Disclosure of Invention
In order to overcome the above problems or partially solve the above problems, an object of the present invention is to provide a method and a system for controlling the authority of a front-end and back-end separated project, so as to solve the unsafe problem of independently relying on the front-end for authority control and the problem of independently relying on the back-end interface for authority control, which is not user-friendly.
The invention is realized by the following technical scheme:
in a first aspect, an embodiment of the present invention provides a method for controlling authority of a front-end and back-end separated item, including the following steps:
s101, determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority or do not have the authority; s102, defining a resource ID of a unique identifier for the resource; s103, acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; s104, constructing a second association model of the user ID and the resource ID of the user owning authority; s105, acquiring a user ID, acquiring a user authorized resource ID set based on the second association model, judging whether the resource ID is in the user authorized resource ID set, and determining the display form of the corresponding resource on a front-end page according to the judgment result; s106, after receiving the interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
Based on the first aspect, in some embodiments of the present invention, the resources include menus, function modules, and operation items.
Based on the first aspect, in some embodiments of the present invention, the determining whether the resource ID is in the user-authorized resource ID set includes: if the judgment result is yes, the corresponding resource is displayed on the front-end page in the first form, and if the judgment result is no, the corresponding resource is displayed on the front-end page in the second form.
In some embodiments of the present invention based on the first aspect, the first mode is display, and the second mode is hidden.
Based on the first aspect, in some embodiments of the present invention, the verifying whether the currently requested interface is in the interface set is performed, and if the verification fails, a prompt indicating that there is no interface call right is returned.
In a second aspect, an embodiment of the present invention provides an authority control system for separating items at front and back ends, including: a page function design module: the method comprises the steps of determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority and do not have authority; the resource ID definition module: a resource ID for defining a unique identifier for the resource; the first association model building module: the interface calling method comprises the steps of obtaining an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; the second association model establishing module: constructing a second association model of the user ID and the resource ID of the user owning the authority; a front-end display module: the system comprises a first correlation model, a second correlation model and a front-end page, wherein the first correlation model is used for acquiring a user ID, acquiring a user authorized resource ID set based on the second correlation model, judging whether the resource ID is in the user authorized resource ID set or not, and determining the display form of a corresponding resource on the front-end page according to the judgment result; a back-end verification module: after receiving an interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
Based on the second aspect, in some embodiments of the invention, the front end display module includes: the first acquisition unit is used for acquiring a user ID and acquiring a user authorized resource ID set based on the second association model; a judging unit, configured to judge whether the resource ID is in the user authorized resource ID set; the first display unit is used for displaying the corresponding resources on the front-end page in a first form; and the second display unit is used for displaying the corresponding resources on the front-end page in a second form.
Based on the second aspect, in some embodiments of the invention, the backend verification module includes: a second obtaining unit, configured to obtain, by a back end, an interface set that a user has an authority to call based on the user authorized resource ID set and the first association model after receiving an interface request; a verification unit, configured to verify whether a currently requested interface is in the interface set; the execution unit is used for executing corresponding interface logic after the verification is passed; and the prompting unit is used for returning a prompt of the interface-free calling authority when the verification fails.
In a third aspect, an embodiment of the present invention provides an electronic device, including: at least one processor, at least one memory, and a data bus; wherein, the processor and the memory complete mutual communication through the data bus; the memory stores program instructions executable by the processor, which invokes the program instructions to perform the one or more programs or methods.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer readable storage medium storing a computer program, the computer program causing a computer to execute one or more of the programs or methods described above.
Compared with the prior art, the invention at least has the following advantages and beneficial effects:
1) the front end and the back end simultaneously perform authority control, so that the experience of a front end user can be optimized, and the safety of a data interface is ensured;
2) when authorization management is carried out, only visible page function permission is concerned, and interfaces for calling each function do not need to be concerned, so that the operation threshold of operation management personnel can be reduced, and the working efficiency of the operation personnel can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and that for those skilled in the art, other related drawings can be obtained from these drawings without inventive effort. In the drawings:
FIG. 1 is a flowchart illustrating an embodiment of a method for controlling authority of front and back separation items;
FIG. 2 is a diagram of E-R mapping between resource IDs and data interfaces in an embodiment of a method for controlling authority of front and back-end separation items;
FIG. 3 is a data layout diagram between a resource ID and a data interface in an embodiment of a method for controlling authority of a front-end and back-end separated project;
FIG. 4 is a diagram of a "user-role-authority" data model E-R in an embodiment of a method for controlling authority of front and back-end separated items;
FIG. 5 is a design diagram of a "user-role-authority" data model database in an embodiment of an authority control method for front and back-end separated items;
FIG. 6 is a block diagram of an embodiment of a system for controlling authority for front-end and back-end disjoint items;
fig. 7 is a block diagram of an electronic device.
Icon: 1-a processor; 2-a memory; 3-a data bus; 100-a page functional design module; 200-resource ID definition module; 300-a first association model building module; 400-a second association model building module; 500-front end display module; 501-a first obtaining unit; 502-a judgment unit; 503-a first presentation unit; 504-a second presentation unit; 600-a back-end verification module; 601-a second acquisition unit; 602-a verification unit; 603-an execution unit; 604-prompt element.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
It should be noted that the terms "first", "second", etc. appearing in the description of the present invention are used merely for distinguishing between the descriptions and are not intended to indicate or imply relative importance.
Example 1
Referring to fig. 1, an embodiment of the present invention provides a method for controlling authority of a front-end and a back-end separated item, including the following steps:
s101, determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority or do not have the authority;
in the stage of page function design, page elements such as menus, pages, function modules, operation items and the like to be subjected to authority control need to be determined, which are called resources in this embodiment, and the display forms of the page elements with and without authority are determined at the same time. In this embodiment, the display mode in the authorized state is defined as a first mode, and the display mode in the unauthorized state is defined as a second mode, for example: user management menu: if the menu item is displayed in the case of having the right, and if the menu item is hidden in the case of not having the right, the first mode is 'display', and the second mode is 'hidden'. Adding a button: the button is highlighted when the authority exists, and the button is displayed in gray when the authority does not exist, so that the first form is highlighted, and the second form is gray.
S102, defining a resource ID of a unique identifier for the resource;
in the front-end development process, a unique identifier ID, called resource ID, is defined for the resource that explicitly needs to be subjected to authority control in S101, so that the association with the interface is established in the subsequent steps. For example, a user management menu may be defined as: menu _ user _ manager; the newly added button may be defined as button _ add _ new.
S103, acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface;
in the back-end data interface design process, an interface to be called for each resource ID is specified, a one-to-many first association model of the resource ID to the data interface (i.e. a mapping table of the resource ID and the back-end data interface) is established, an E-R diagram is shown in fig. 2, and a data design diagram is shown in fig. 3.
S104, constructing a second association model of the user ID and the resource ID of the user owning authority;
illustratively, a general user-role-authority data model can be established to determine whether a user has authority to access an interface or whether resources are displayed to a desired user in a first form, and when a front end initiates a request and a back end detects that the user has authority, data is responded; otherwise, no authority is prompted. The E-R diagram is shown in FIG. 4, and the database design is shown in FIG. 5.
S105, acquiring a user ID, acquiring a user authorized resource ID set based on the second association model, judging whether the resource ID is in the user authorized resource ID set, and determining the display form of the corresponding resource on a front-end page according to the judgment result;
after the user logs in, based on the second association model established in step S104, a role ID associated with the user is queried through the current user ID, a set of associated authorized resource IDs is queried through the role ID, and the set of authorized resource IDs is responded to the front end; when the front end needs to render page elements, the front end judges whether the resource ID is in the permission set or not, and gives different display states corresponding to the resources, such as display (with permission), hiding (without permission), highlight (with permission), graying (without permission) and the like.
S106, after receiving the interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
After receiving the interface request, the back end queries a role ID associated with the user through the user ID of the current request according to the second association model established in the step S104, and then queries an associated resource ID through the role ID; then, according to the first association model established in step 103, an interface set which has permission to call is inquired through resource ID association, whether the currently requested interface is in the interface set is verified, if the currently requested interface is in the set, interface logic is executed, and data is returned; otherwise, directly returning a prompt without interface calling authority.
The joint application of the first association model and the second association model can realize the visual page configuration function, and system operation management personnel maintain the association relation; when the operator manages the user role right, the association (first association model) between the resource and the interface is not needed to be concerned, and the association relationship can be determined in the development process. Operators only need to associate resource permissions for roles and authorize roles for users.
Example 2
Referring to fig. 6, an embodiment of the present invention provides a system for controlling authority of a front-end and a back-end separated item, including: page function design module 100: the method comprises the steps of determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority and do not have authority; resource ID definition module 200: a resource ID for defining a unique identifier for the resource; the first association model building module 300: the interface calling method comprises the steps of obtaining an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; the second association model building module 400: constructing a second association model of the user ID and the resource ID of the user owning the authority; front-end display module 500: the system comprises a first correlation model, a second correlation model and a front-end page, wherein the first correlation model is used for acquiring a user ID, acquiring a user authorized resource ID set based on the second correlation model, judging whether the resource ID is in the user authorized resource ID set or not, and determining the display form of a corresponding resource on the front-end page according to the judgment result; the back-end verification module 600: after receiving an interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
Wherein, the front end display module includes: a first obtaining unit 501, configured to obtain a user ID, and obtain a user authorized resource ID set based on the second association model; a determining unit 502, configured to determine whether the resource ID is in the user authorized resource ID set; a first display unit 503, configured to display the corresponding resource in a first form on a front-end page; the second display unit 504 is configured to enable the corresponding resource to be displayed on the front-end page in a second form.
The back-end verification module includes: a second obtaining unit 601, configured to obtain, by a back end, an interface set that a user has an authority to call based on the user authorized resource ID set and the first association model after receiving an interface request; a verifying unit 602, configured to verify whether a currently requested interface is in the interface set; an execution unit 603, configured to execute a corresponding interface logic after the verification is passed; and a prompt unit 604, configured to return a prompt for the non-interface call permission when the verification fails.
The system provided by the embodiment of the present invention can be used for executing the method described in the above embodiment 1, and the specific method steps are shown in embodiment 1. And will not be described in detail herein.
Example 3
An embodiment of the present invention provides an electronic device, including: at least one processor 1, at least one memory 2 and a data bus 3;
wherein, the processor 1 and the memory 2 complete the communication with each other through the data bus 3; the memory 2 stores program instructions executable by the processor 1, and the processor 1 calls the program instructions to execute the method in the embodiment, for example, to execute: s101, determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority or do not have the authority; s102, defining a resource ID of a unique identifier for the resource; s103, acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; s104, constructing a second association model of the user ID and the resource ID of the user owning authority; s105, acquiring a user ID, acquiring a user authorized resource ID set based on the second association model, judging whether the resource ID is in the user authorized resource ID set, and determining the display form of the corresponding resource on a front-end page according to the judgment result; s106, after receiving the interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
Fig. 7 is a schematic structural block diagram of an electronic device according to an embodiment of the present application. The electronic device comprises a memory 2, a processor 1 and a data bus 3, the memory 2, the processor 1 and the data bus 3 being electrically connected to each other, directly or indirectly, to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 2 can be used for storing software programs and modules, such as program instructions/modules corresponding to the electronic device provided in the embodiments of the present application, and the processor 1 executes the software programs and modules stored in the memory 2, thereby executing various functional applications and data processing. The data bus 3 can be used for signaling or data communication with other node devices.
Example 4
Embodiments of the present invention provide a non-transitory computer readable storage medium storing a computer program, the computer program causing a computer to execute one or more of the above-mentioned programs or methods, such as performing: s101, determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority or do not have the authority; s102, defining a resource ID of a unique identifier for the resource; s103, acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface; s104, constructing a second association model of the user ID and the resource ID of the user owning authority; s105, acquiring a user ID, acquiring a user authorized resource ID set based on the second association model, judging whether the resource ID is in the user authorized resource ID set, and determining the display form of the corresponding resource on a front-end page according to the judgment result; s106, after receiving the interface request, the back end obtains an interface set which is called by the user and has the authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
The above-described functions, if implemented in the form of software functional modules and sold or used as a separate product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-described method according to the embodiments of the present application. And the storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method for controlling authority of a front-end and back-end separated project is characterized by comprising the following steps:
determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources have authority and are not authorized;
defining a resource ID of a unique identifier for the resource;
acquiring an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface;
constructing a second association model of the user ID and the resource ID of the user owning the authority;
acquiring a user ID, acquiring a user authorized resource ID set based on the second association model, judging whether the resource ID is in the user authorized resource ID set, and determining the display form of the corresponding resource on a front-end page according to the judgment result;
after receiving an interface request, the back end obtains an interface set which is called by a user and has authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
2. The method for controlling authority of a front-end and back-end separated project according to claim 1, wherein the resources comprise menus, function modules and operation items.
3. The method for controlling the authority of a front-end and back-end separated project according to claim 1, wherein the step of judging whether the resource ID is in the user authorized resource ID set or not and the step of determining the display form of the corresponding resource on the front-end page according to the judgment result comprises: if the judgment result is yes, the corresponding resource is displayed on the front-end page in the first form, and if the judgment result is no, the corresponding resource is displayed on the front-end page in the second form.
4. The method of claim 3, wherein the first mode is display and the second mode is hidden.
5. The method for controlling the authority of a front-end and back-end separation project according to claim 1, wherein the current requested interface is verified whether to be in the interface set, and if the verification is not passed, a prompt without interface calling authority is returned.
6. An entitlement control system for separating items at a front end and a back end, comprising:
a page function design module: the method comprises the steps of determining resources needing to be subjected to authority control and display forms of the resources on a front-end page when the resources are authorized or not authorized;
the resource ID definition module: a resource ID for defining a unique identification for the resource;
the first association model building module: the interface calling method comprises the steps of obtaining an interface to be called of each resource ID, and establishing a first association model between the resource ID and the interface;
the second association model establishing module: constructing a second association model of the user ID and the resource ID of the user owning the authority;
a front-end display module: the system comprises a first correlation model, a second correlation model and a front-end page, wherein the first correlation model is used for acquiring a user ID, acquiring a user authorized resource ID set based on the second correlation model, judging whether the resource ID is in the user authorized resource ID set or not, and determining the display form of a corresponding resource on the front-end page according to the judgment result;
a back-end verification module: after receiving an interface request, the back end obtains an interface set which is called by a user and has authority based on the user authorized resource ID set and the first association model, verifies whether the interface requested currently is in the interface set, and executes corresponding interface logic after the verification is passed.
7. The system for controlling authority of front-end and back-end separated items according to claim 6, wherein the front-end display module comprises:
a first obtaining unit, configured to obtain a user ID, and obtain a user authorized resource ID set judgment unit based on the second association model, configured to judge whether a resource ID is in the user authorized resource ID set;
the first display unit is used for displaying the corresponding resources on the front-end page in a first form;
and the second display unit is used for displaying the corresponding resources on the front-end page in a second form.
8. The system for controlling authority of a front-end and back-end separated project according to claim 6, wherein the back-end verification module comprises:
the second obtaining unit is used for obtaining an interface set which is called by the user with the authority based on the ID set of the user with the authority and the first association model after the back end receives the interface request;
a verification unit for verifying whether the currently requested interface is within the interface set;
the execution unit is used for executing corresponding interface logic after the verification is passed;
and the prompting unit is used for returning a prompt of the interface-free calling authority when the verification fails.
9. An electronic device, comprising: at least one processor, at least one memory, and a data bus;
the processor and the memory complete mutual communication through the data bus; the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1 to 5.
10. A non-transitory computer-readable storage medium storing a computer program that causes a computer to perform the method according to any one of claims 1 to 5.
CN202111470873.5A 2021-12-03 2021-12-03 Authority control method, system, equipment and storage medium for front-end and back-end separation items Withdrawn CN114115881A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111470873.5A CN114115881A (en) 2021-12-03 2021-12-03 Authority control method, system, equipment and storage medium for front-end and back-end separation items

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111470873.5A CN114115881A (en) 2021-12-03 2021-12-03 Authority control method, system, equipment and storage medium for front-end and back-end separation items

Publications (1)

Publication Number Publication Date
CN114115881A true CN114115881A (en) 2022-03-01

Family

ID=80366781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111470873.5A Withdrawn CN114115881A (en) 2021-12-03 2021-12-03 Authority control method, system, equipment and storage medium for front-end and back-end separation items

Country Status (1)

Country Link
CN (1) CN114115881A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978671A (en) * 2022-05-18 2022-08-30 中国平安财产保险股份有限公司 Method and device for accessing front-end resources, computer equipment and storage medium
CN115495718A (en) * 2022-09-19 2022-12-20 广东云徙智能科技有限公司 Method, device and equipment for authorizing back-end capability based on front-end declaration
CN118468324A (en) * 2024-07-12 2024-08-09 宁波安得智联科技有限公司 Interface authority configuration method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180101668A1 (en) * 2015-05-19 2018-04-12 Ricoh Company, Ltd. Information processing apparatus, information processing method, and computer program
CN111552987A (en) * 2020-04-16 2020-08-18 重庆富民银行股份有限公司 Page access authority control method
CN111814179A (en) * 2020-06-29 2020-10-23 中国平安人寿保险股份有限公司 User authority management and data control method and related equipment thereof
CN112487392A (en) * 2020-12-08 2021-03-12 浪潮云信息技术股份公司 Method for realizing authority control of management system by front end

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180101668A1 (en) * 2015-05-19 2018-04-12 Ricoh Company, Ltd. Information processing apparatus, information processing method, and computer program
CN111552987A (en) * 2020-04-16 2020-08-18 重庆富民银行股份有限公司 Page access authority control method
CN111814179A (en) * 2020-06-29 2020-10-23 中国平安人寿保险股份有限公司 User authority management and data control method and related equipment thereof
CN112487392A (en) * 2020-12-08 2021-03-12 浪潮云信息技术股份公司 Method for realizing authority control of management system by front end

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978671A (en) * 2022-05-18 2022-08-30 中国平安财产保险股份有限公司 Method and device for accessing front-end resources, computer equipment and storage medium
CN114978671B (en) * 2022-05-18 2024-02-13 中国平安财产保险股份有限公司 Method, device, computer equipment and storage medium for front-end resource access
CN115495718A (en) * 2022-09-19 2022-12-20 广东云徙智能科技有限公司 Method, device and equipment for authorizing back-end capability based on front-end declaration
CN115495718B (en) * 2022-09-19 2023-10-13 广东云徙智能科技有限公司 Front-end statement-based back-end capability authorization method, device and equipment
CN118468324A (en) * 2024-07-12 2024-08-09 宁波安得智联科技有限公司 Interface authority configuration method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN114115881A (en) Authority control method, system, equipment and storage medium for front-end and back-end separation items
EP3896916B1 (en) Network distribution method for household appliance, household appliance, mobile terminal and storage medium
CN107995215B (en) Control method and device of intelligent household equipment and cloud platform server
TWI788354B (en) Method and apparatus for managing vehicle control permissions
US10999721B2 (en) Communication identifier binding processing method and terminal
CN102801656B (en) Realize condition control method, the equipment and system of instant messaging application
CN101730099B (en) Terminal management method based on authority control and device
CN110598280A (en) Equipment simulation system and method and computer readable storage medium
CN112948804B (en) Program control method, device and computer readable storage medium
CN112579997B (en) User permission configuration method and device, computer equipment and storage medium
US20140099923A1 (en) Subscriber device unlock
CN113055252B (en) Method, device, equipment and storage medium for detecting newly added service host
CN106656985B (en) Backup account login method, device and system
CN114218619A (en) Data security protection method, device, medium and electronic equipment
CN114238939B (en) Authority verification method, device and system
CN104394526A (en) Method for recovering data service and electronic apparatus
CN106685914A (en) Information authentication method, server and client
CN108416207A (en) Bluetooth access right discrimination method, device and mobile terminal
CN104717258B (en) A kind of data transmission method for uplink and system
CN113779551B (en) A rights management method and device
CN113312661B (en) User authorization system, method and device and electronic equipment
CN104063659A (en) Network connection safety improvement method and electronic equipment
CN115242476B (en) Login verification method, login verification device, login verification medium and electronic equipment
CN109862081A (en) The method, apparatus and vehicle washing system of communication connection are established with maintenance personnel
CN113660288B (en) User number binding method and system based on block chain system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220301

WW01 Invention patent application withdrawn after publication