Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authorizing field values of form fields through third-party fields

A field value and field technology, which is applied in the field of authorizing field values ​​of form fields through third-party fields, can solve the problems of increased authorization, loss of system users, and difficulty in remembering the specific permissions of roles, so as to reduce the possibility of leakage The effect of improving the efficiency of authorization

Inactive Publication Date: 2017-11-17
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two processing methods not only take a long time to authorize the role in the case of many role permissions, but also are prone to mistakes. The operation of the user is cumbersome and troublesome, and it is also easy to make mistakes and cause losses to the system user.
[0013] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. To associate a new user, it is impossible to accurately determine how to choose the association
[0014] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0015] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authorizing field values of form fields through third-party fields
  • Method for authorizing field values of form fields through third-party fields
  • Method for authorizing field values of form fields through third-party fields

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0067] [Example 1] If Figure 4 As shown, the method of authorizing the field value of a form field through a third-party field includes:

[0068] Select one or more authorized objects. The authorized objects include one or more of people, users, groups, classes, and roles. The roles are independent individuals, not groups / classes. A role can only be associated with a unique user at the same time, and a A user is associated with one or more roles.

[0069] Such as Figure 5 As shown, a department must be selected when the role is created. Once the role is created, the role belongs to the department. The role is authorized according to the work content of the role, and the name of the role is unique under the department. The number of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authorizing field values of form fields through third-party fields. The method comprises the steps of selecting one or more authorized objects; selecting a form to be authorized, and displaying authorized fields, meeting a condition that authorization of viewing permissions of the field values of the authorized fields needs to be controlled through the third-party fields, in the form; selecting one or more third-party fields for each authorized field, wherein each third-party field comprises one or more options; and authorizing the viewing permission of the field value of the authorized field of form data corresponding to each option of each third-party field. By setting the third-party fields to limit the authorized fields needed to be subjected to the authorization of the viewing / modification permissions of the field values in the form, the viewing / modification permissions of the authorized objects can be set to be consistent with job responsibilities of the authorized objects, so that the authorized objects can be prevented from viewing / modifying form information unrelated to work of the authorized objects, and the possibility of company information leakage is reduced.

Description

technical field [0001] The invention relates to a form authorization method of management software systems such as ERP, in particular to a method for authorizing field values ​​of form fields through third-party fields. Background technique [0002] In traditional ERP management software, separate authorizations are provided for viewing and modifying permissions based on form field values. For example, for contract forms, the fields in the form include contract signing time, contract signer, customer name, customer industry, etc. It can separately authorize the content of the fields that users can view, allowing user A to view the contract signing time and contract signer in the form, and not allowing user A to view the customer name and customer industry, so as to realize the confidentiality of company information and prevent confidential information Give way. However, these ERP management software can only authorize each user separately, and cannot realize batch authoriza...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06Q10/10
CPCG06F21/45G06Q10/10G06F2221/2137G06F2221/2149G06F2221/2145G06F21/629G06Q10/105H04L63/105G06F21/6218G06F21/30G06Q10/103G06F2221/2141
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products