Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Matrix permission implementation method based on RIM real identity management system

A technology of real identity and management system, applied in transmission systems, data processing applications, instruments, etc., can solve problems such as difficult work synchronization, reduced work efficiency, and difficult work management software collaborative services, achieve freedom of authority, and improve efficiency. , the effect of reducing the probability of error

Inactive Publication Date: 2017-06-13
REM TEC SRL
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When companies cooperate with each other, it is difficult to form work synchronization, which greatly reduces work efficiency
In other words, it is difficult to realize the collaborative service of work management software between companies, and it is difficult to form a transparent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Matrix permission implementation method based on RIM real identity management system
  • Matrix permission implementation method based on RIM real identity management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Embodiment 1, in the current society, there will definitely be intersections between companies, that is, the same job between two companies, so as to improve the efficiency of the work. The present invention provides a real identity based on RIM The implementation method of the matrix authority of the management system is mainly completed by attaching to the RIM identity management system. What is the RIM identity management system? In detail, the RIM identity management system also includes the RIM identity management method using the system, details as follows:

[0027] A RIM identity management method is applied to an identity management system, and the method specifically includes the following steps:

[0028] 1) Identity entry

[0029] A. First, establish a storage module and related identification and entry modules;

[0030] B. Enter the identity card number of the person to be managed (user) in the ID card identification input module, and the ID card identifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of permission to all work management systems, particularly relates to a matrix permission implementation method based on an RIM real identity management system. The matrix permission is implemented mainly on the basis of the RIM real identity management system. The RIM real identity management system performs real identity inputting firstly, and an account number and a password are obtained; a comprehensive work management system is built on the basis of the RIM real identity management system; after the account number and the password are adopted to login the work management system, personnel in the work management system can build unit organizational structures, and personnel in each unit organizational structure can also build project organizational structures. The method is capable of comprehensively achieving data interconnection and sharing, related projects can be managed across organizations, related data can be checked, a process can be initiated across the unit organizations, the working efficiency is greatly improved, the error probability is reduced, besides, the whole process is orderly and traceable, and the method makes the permission freer, more flexible and more convenient.

Description

technical field [0001] The invention belongs to the technical field of authority among various work management systems, and in particular relates to a matrix type authority realization method based on the RIM real identity management system. Background technique [0002] With the continuous progress of society and the continuous improvement of life, all walks of life are pursuing work efficiency. [0003] The advent of the information age has also brought a lot of convenience to the fast-paced 21st century, for example, Taobao, JD.com, Didi, etc., have all facilitated people's lives. [0004] In order to improve work efficiency and facilitate company management, work management software emerges spontaneously. Although the work management software facilitates the company's internal work efficiency, there are also many opacities in it, and sometimes, it will lead to great losses, for example, false information tampering, defrauding funds, etc. [0005] In some ways, work man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06F21/34H04L29/06G06Q10/10
CPCG06F21/31G06F21/32G06F21/34G06Q10/103H04L63/0815H04L63/083H04L63/0861
Inventor 方延春
Owner REM TEC SRL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products