Method, device and ERP (enterprise resource planning) system for user identity and permission validation

An ERP system and user identity technology, which is applied in transmission systems, data processing applications, electrical components, etc., can solve the problems that cannot be realized without the role of ERP system, and mutual login between ERP system and external systems cannot be satisfied, so as to improve performance and the effect of efficiency

Active Publication Date: 2015-02-18
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiments of the present invention is to provide a method, device and ERP system for user identity and authority verification, aiming at solving the problem that WIF does not provide role-based implementation for the ERP system and cannot realize the mutual login between the ERP system and external systems and cannot meet the requirements of ERP software. application problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and ERP (enterprise resource planning) system for user identity and permission validation
  • Method, device and ERP (enterprise resource planning) system for user identity and permission validation
  • Method, device and ERP (enterprise resource planning) system for user identity and permission validation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 The flow of the method for verifying user identity and authority provided by the embodiment of the present invention is shown, and the details are as follows:

[0040] In step S101, identity verification information input by a user is received.

[0041] In the embodiment of the present invention, the identity verification information input by the user is first received, and the identity verification information includes user identification, user name, user password, etc., wherein the user identification may be a user ID, but is not limited to the user ID.

[0042] In step S102, when the identity verification information matches the corresponding user information pre-stored in the user table, a statement is issued, and the statement includes authority verification information.

[0043] In the embodiment of the present invention, a user table may be used to store user information. The user information includes, but is not limited to, the user's username, user i...

Embodiment 2

[0055] In the embodiment of the present invention, authorization verification is divided into three types, which are function authorization verification, field authorization verification and data authorization verification. According to different permission verification types. The permission verification information is different from the permission object. Each will be described in detail below.

[0056] 1. Function authority verification and field authority verification.

[0057] In the embodiment of the present invention, the methods for verifying function rights and field rights are basically the same. image 3 Shows the detailed flow of function permission verification and field permission verification.

[0058] In step S301, the authority verification information in the statement is read, and the authority verification information includes the user ID and the role to which the user belongs.

[0059] In the embodiment of the present invention, the authority verificatio...

Embodiment 3

[0077] Figure 5 The structure of the user identity and authority verification device provided by the embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown. The device can be a software unit, a hardware unit, or a combination of software and hardware built into the ERP system, or integrated into the ERP system or the application system of the ERP system as an independent pendant. in:

[0078] The identity verification information receiving module 51 is configured to receive the identity verification information input by the user.

[0079] In the embodiment of the present invention, the identity verification information includes a user ID (a user ID is used as an example here, but not limited to a user ID), a user name, a user password, and the like.

[0080] The statement issuing module 52, when the identity verification information received by the identity verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, a device and an ERP (enterprise resource planning) system for user identity and permission validation, which are applicable to the field of computer software. The method includes the steps: receiving identity validation information inputted by a user; issuing a declaration when the identity validation information is matched with corresponding user information prestored in a user list, wherein the validation includes permission validation information including one or various combinations of a user identifier and user's roles; obtaining a permission validation request including a permission object; and reading the permission validation information and performing permission validation by comparing the permission validation information and the permission object with the information in the corresponding list. A role permission model is introduced into the declaration, and as the declaration is transferred in the ERP system and can be obtained at any time, an authentication method is no longer additionally called when the ERP system needs related role and permission information, and the performance and the efficiency of the system are improved.

Description

technical field [0001] The invention belongs to the field of computer software, in particular to a method, device and ERP system for verifying user identity and authority. Background technique [0002] With the trend of software WEB and service becoming more obvious, the security and ease of use of software identity authentication and authority management have put forward higher requirements for the current identity authentication and authority management. How to ensure that the confidential information of the logged-in user is not lost? How to implement single sign-on between different application systems, and modify user information in one system to take effect globally? [0003] In response to this problem, manufacturers such as Microsoft have launched a joint certification scheme. Among them, WIF (Windows Authentication Infrastructure Framework) can help developers build statement-aware applications, improve developer productivity, enhance application security and prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q10/06
Inventor 徐英
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products