Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Office system based on character accessing control and realization method thereof

A role access control, office system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as disappearance of security

Inactive Publication Date: 2014-01-15
上海博腾信息科技(集团)有限公司
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the system cannot guarantee that the user can only access the data he has the right to access and perform the operations he should perform, such as reading files that he should not read, processing files beyond his authority, and illegally tampering with the contents of files, etc., then security may disappear.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Office system based on character accessing control and realization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solution of the present invention will be described in detail below with reference to the accompanying drawings.

[0023] figure 1 It is an implementation method of an office system based on role access control of the present invention. include:

[0024] step 1,

[0025] The user needs to log in to the office system with a user name and password;

[0026] The authentication server verifies the user name and password to confirm the user's identity. During verification, the information entered by the user is compared with the user information table in the database. If they match, the user is allowed to enter the system, otherwise an error message will be returned;

[0027] Step 2. After the user logs into the office system, the system extracts the user identification number from the user information table, queries the role allocation table in the database to activate the role, and establish a session. The role allocation table contains the user identification number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an office system based on character accessing control, which comprises the following components: a bulletin board system, an E-mail system and an electronic official document system. The electronic official document system comprises the following departments: a read document processing department, an official document processing department and an outgoing document processing department. In the bulletin board system, an administrator character takes charge in maintaining the bulletin board system. In an official document processing subsystem, separation for characters and character layers also exists. The invention simultaneously discloses a realization method of the system. The office system realizes a fact that the users in different characters acquire different authorities in a same office system, namely different functional modules are displayed for different characters, thereby effectively preventing operation exceeding behavior, and improving safety of the office system in identity discrimination and authorizing control.

Description

Technical field [0001] The invention relates to an information security control technology, in particular to a role-based office system access control system and an implementation method thereof. Background technique [0002] In today's information age, various activities are increasingly dependent on computers, while computer security has become an issue that cannot be ignored. For example, in the official document processing subsystem of an office automation system, the authority of the draft and the person who approves the official document is different, and the operations they can do are also different. If the system cannot guarantee that the user can only access the data he has the right to access and perform the operations that he should perform, such as reading files that he should not read, handling files beyond his authority, and illegally tampering with the contents of files, then security may be lost. How to prevent the theft, destruction and abuse of official documen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
Inventor 蒋志勇
Owner 上海博腾信息科技(集团)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products