System dispatching method

A kind of employee, unique technology, applied in the field of management software system dispatch, can solve problems such as affecting task execution, prone to errors, increasing internal friction, etc., to achieve the effect of guaranteeing the execution cycle, convenient and fast operation, and reducing workload

Inactive Publication Date: 2017-11-21
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0013] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0014] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors
[0017] B: For the dispatcher, these tasks need to be reassigned to other people, which means that they need to do repetitive work, which increases internal friction, and the dispatcher has a heavy workload and is prone to errors;
[0018] C: The process of returning a task usually requires approval, which prolongs the cycle of task execution and increases internal friction in the system; even if approval is not required, if the task is not returned in time, it will seriously affect the execution of the task, especially some tasks with urgent time requirements , if it is not returned in time and handed over to a new person, it may cause serious consequences and unpredictable losses;
[0019] D: When a user transfers a post, the user also needs to return all the previous tasks first, and then the dispatcher dispatches tasks for the new position. There are also problems such as troublesome operation and delayed task execution cycle.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System dispatching method
  • System dispatching method
  • System dispatching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] [Example 1] such as Figure 5 As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object and a dispatching step;

[0060] S1: Steps to determine the task to be dispatched: determine the task that needs to be dispatched. The task can be the content filled in manually, or the specified form data or the content brought out by the specified form data (such as dispatching a worker to process a documentary , dispatching workers to handle a complaint, specifying to handle an installation request, etc.), or a combination of the three; tasks include: production tasks, sales tasks, logistics tasks, after-sales tasks, and other tasks that need to be dispatched .

[0061] S2: The step of determining the object to be dispatched: determine the object to be dispatched, and the object is a role, such as Figure 4 As shown, the role is an independent individual, not a group / class. A role can only be associated ...

Embodiment 2

[0066] [Example 2] such as Figure 5As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object and a dispatching step;

[0067] SS1: Steps to determine the dispatched object: determine the dispatched object, the object is a role, and the role is an independent individual, not a group / class. A role can only be associated with a unique user at the same time, and a A user is associated with one or more roles;

[0068] SS2: Steps for determining the tasks to be dispatched: determine the tasks that need to be dispatched;

[0069] SS3: Work assignment step: The dispatcher assigns the tasks that need to be dispatched to the dispatched role, and the employees corresponding to the users associated with the dispatched role get the dispatched tasks. A dispatcher can be a role, a user, or a person.

[0070] If the user needs to transfer jobs across departments, a user cross-department job transfer management ste...

Embodiment 3

[0076] [Example 3] such as Figure 5 As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object and a dispatching step;

[0077] S1: The step of determining the tasks to be dispatched: determine the tasks that need to be dispatched;

[0078] S2: The step of determining the assigned object: determine the assigned object, the object is a role, the role is an independent individual, not a group / class, a role can only be associated with a unique user at the same time, and a A user is associated with one or more roles;

[0079] S3: Work dispatching step: dispatch tasks that need to be dispatched to the dispatched role, and the employees corresponding to the users associated with the dispatched role obtain the dispatched tasks. The time assigned by the dispatcher is a time period, not an exact time point, as long as it is completed within this time period, it is considered normal completion.

[0080] It al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system dispatching method. The method includes: determining dispatched tasks, wherein the tasks which need to be dispatched are determined, determining dispatched objects, wherein the dispatched objects are determined, the objects are roles, the roles are independent individuals rather than groups/classes, one role can only be associated with a unique user in the same time period, and one user is associated with one or more roles; and carrying out dispatching, wherein the tasks which need to be dispatched are distributed to the dispatched roles. According to the method, the tasks are distributed to the roles, the user obtains the tasks through associations with the role, the association of an employee and the role is canceled when a turnover of the employee occurs, a newly recruited employee is directly enabled to be associated with the role without the need for re-dispatching for the newly recruited employee, and operations are convenient and quick; the association of an employee and the original role is canceled when position transferring of the employee occurs, the tasks dispatched for the new role can be automatically obtained by associating with the new role; and for a dispatcher, no operation needs to be carried out when the turnover or position transferring occurs.

Description

technical field [0001] The invention relates to a dispatching method of management software systems such as ERP. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful database permission management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). Traditional discretionary access control has high flexibility but low security, mandatory access control has high security but is too restrictive; role-based access control combines both, which is not only easy to manage but also reduces complexity, cost and error probability , which has been greatly developed in recent years. The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users can indirectly a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q10/10
CPCG06Q10/06311G06Q10/063112G06Q10/10G06Q10/103G06Q10/105
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products