Dynamic configuration method for user access browsing authority
Technical Field
The application relates to the field of data management, in particular to a dynamic configuration method for user access browsing permission.
Background
In the near future, the medical industry will incorporate more high technologies such as artificial intelligence, sensing technology and the like, so that the medical service is made to be intelligent in real sense, and the prosperity and development of the medical industry are promoted. Under the background of new Chinese medical improvement, intelligent medical treatment is going to live in the lives of common people. The data of the medical industry has the need of privacy protection, so that when artificial intelligence is applied to the research, model training and data prediction in the medical field, a plurality of medical institutions are often required to perform the research, model training and data prediction in a networking and data collaboration mode.
According to the prior art, the platform cannot set the authority of the user, so that the privacy of the platform data is threatened.
Disclosure of Invention
In order to solve the defects of the prior art, the application provides a dynamic configuration method for the access browsing permission of a user, which comprises the following steps: providing an authority setting interface; collecting operation data of a manager on the authority setting interface; setting authority information for accessing a system interface for users of the user group according to the operation data; when the user accesses the system interface, judging whether the authority information of the user has the authority to access the current interface, and if so, allowing the user to access the system interface.
Further, the permission setting interface sets the permission information in a checking mode.
Further, the method for dynamically configuring the access browsing authority of the user further comprises the following steps: and storing the authority information of the access system interface set for the user of the user group according to the operation data into a database.
Further, the method for dynamically configuring the access browsing authority of the user further comprises the following steps: and when the user accesses the system interface, calling the stored authority information to carry out authority verification.
Further, the step of calling the stored authority information for authority verification includes the following steps: providing a login interface; and judging whether the account and the password input by the user through the login interface meet preset conditions.
Further, the step of calling the stored authority information for authority verification includes the following steps: and if the account number and the password input by the user through the login interface meet preset conditions, providing a notification interface to inform the user of the authority of the user.
Further, the authority information includes a user name of the user.
Further, the authority information includes a department of the user.
Further, the authority information includes a data range that the user can preview.
Further, the authority information includes a title level or/and a role level of the user.
The application has the advantages that: the dynamic configuration method for the user access browsing permission is provided, wherein the dynamic configuration method for the permission of different user groups for accessing each interface is realized in an online mode.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a diagram illustrating steps of a method for dynamically configuring access browsing authority of a user according to an embodiment of the present application;
fig. 2 is a schematic diagram of a setting interface of a method for dynamically configuring access browsing authority of a user according to an embodiment of the application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1 and fig. 2, the method for dynamically configuring the access browsing permission of the user according to the present application includes the following steps: providing an authority setting interface; collecting operation data of a manager on an authority setting interface; setting authority information for accessing a system interface for users of the user group according to the operation data; when the user accesses the system interface, judging whether the authority information of the user has the authority to access the current interface, and if so, allowing the user to access the system interface.
Specifically, the permission setting interface sets permission information in a checking mode.
Specifically, the method for dynamically configuring the access browsing authority of the user further comprises the following steps: storing the authority information of the access system interface set for the user of the user group according to the operation data in a database; when a user accesses a system interface, calling the stored authority information to carry out authority verification; providing a login interface; judging whether an account and a password input by a user through a login interface meet preset conditions or not; if the account number and the password input by the user through the login interface meet preset conditions, a notification interface is provided to inform the user of the authority of the user.
As shown in fig. 2, specifically, the authority information includes: a user name of the user, a department, a range of data that the user can preview, a job title level or/and a role level of the user.
By adopting the technical scheme, the user permission in the hospital can be dynamically set, so that the data privacy safety in all parties of federal study is ensured.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.