Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorizing method of form field value operating authorization

一种操作权限、字段值的技术,应用在数字数据认证、数字数据保护、电数字数据处理等方向,能够解决增加授权、无法显示操作者及操作时间、授权等问题,达到提高精细度、授权操作简单高效、提高授权效率的效果

Inactive Publication Date: 2017-11-03
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shortcomings of the traditional software system are: (1) When performing form field value authorization, the most recent authorized operator and operation time cannot be displayed, and when there is an error in form authorization authorization, accountability cannot be achieved, and the current authorized operation cannot be performed. The author provides a reference for the authorization time, which is not very convenient to use
(2) It is not possible to authorize the operation authority of form field values ​​for multiple roles in batches, and the template authorization function is also not supported. Each field must be set one by one for each authorization, and the authorization efficiency is low. The fields of the form in large software systems are often very Many, the workload of the traditional authorization method is heavy
[0013] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0014] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0015] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorizing method of form field value operating authorization
  • Authorizing method of form field value operating authorization
  • Authorizing method of form field value operating authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] [Embodiment 1] In this embodiment, the fields to be controlled by operation authority are set first, and then the corresponding operation authority is set.

[0066] The form field value operation permission authorization method includes a form field value operation permission authorization step and a step of selecting an authorized person, and the order of the form field value operation permission authorization step and the step of selecting the authorized person is not in any order;

[0067] The operation permission authorization step of the form field value includes the following steps:

[0068] S1: Select a form to be authorized, and display the fields in the form that need to be controlled for operation permissions;

[0069] S2: Authorize the operation authority of the field value of each field respectively, and the operation authority includes one or both of viewing and modification.

[0070] After the setting is completed, the authorized person's permission to vi...

Embodiment 2

[0091] [Embodiment 2] In this embodiment, one or more can be selected when selecting the authorized person, and only one can be selected when selecting the form to be authorized. When there is one and only one authorized person is selected, and the form to be authorized is selected, the operator and operation time that recently authorized the field value of the form to the authorized person are displayed.

[0092] Such as Figure 5 As shown, when an authorized person is selected and the authorization form is selected, the operator and operation time of the recent form field value operation authority authorization are displayed, and the current field value operation authority status of the authorized person on the form is also displayed , modify and save it to get its new field value operation permission.

[0093] Such as Figure 6 As shown, when multiple authorized persons are selected and the authorization form is selected, the authorization operator and operation time of t...

Embodiment 3

[0098] [Example 3] In this example, for field values ​​that do not have viewing authority, the display methods include:

[0099] (1) Display the field corresponding to the field value, but hide the field value with a hidden character, such as Figure 8 As shown, the fields "Phone" and "Contact" are displayed, but the contents of the fields are hidden with *;

[0100] (2) Neither the field value nor the field corresponding to the field value will be displayed.

[0101] Whether there is modification permission or not is also displayed differently. For example, display the field value without modification permission as gray shading, such as Figure 8 shown.

[0102] Specifically, a form includes basic fields and detailed fields, and the detailed fields are column names on the detailed list in the form. For example, in the order form, the basic fields include the order number, customer name, customer address, phone number, contact person, customer industry, etc.; the detailed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorizing method of form field value operating authorization. The method comprises the steps of authorizing the form field value operating authorization and selecting the authorized; authorizing the form field value operating authorization comprises the steps of S1, selecting a form to be authorized, and displaying fields need to be controlled by the operating authorization in the form; S2, authorizing the operating authorization of the field values of all the fields separately; the authorized is one or more characters which are independent individuals rather than groups or classes, one character in the same time section can be only related to a single user. However, one user is related to one or more characters. According to the authorizing method of the form field value operating authorization, separate authorizing of the form field value operating authorization can be achieved, and the precision of system management is improved; multiple authorized characters can be selected at the same time to be authorized in bulk, and thus the authorizing efficiency is increased; besides, the method supports template authorizing, two ways are combined, and thus the authorizing efficiency of the form field value operating authorization is increased.

Description

technical field [0001] The invention relates to a form authorization method of management software such as ERP, in particular to a form field value operation authority authorization method. Background technique [0002] In traditional software systems, it is possible to separately authorize form viewing rights based on form field values. For example, the selected form type is "Order", and the fields in the form that require authorization control are "Order Number", "Customer Name", " Customer address", "telephone number", "contact person", "customer's industry", "product model", "product quantity", "product unit price", etc., can realize the viewing authority of a system user to different order information in the order form Individual controls such as allowing viewing of customer names in order forms and disallowing viewing of phone numbers in order forms. However, the shortcomings of the traditional software system are: (1) When performing form field value authorization, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30G06F21/62G06Q10/10
CPCG06F21/30G06F21/6227G06Q10/105G06F21/45G06F40/174G06F2221/2141G06F2221/2145G06F21/604H04L63/102G06Q10/10
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products