Method for supervising approval operation, authorization operation and form operation

A form and operation record technology, applied in the fields of instruments, electronic digital data processing, digital data protection, etc., can solve the problems of confusing similar roles and permissions, difficult to remember the difference between roles and permissions with similar permissions, and increase authorization, so as to avoid confidentiality. Information leakage, convenient and quick settings

Inactive Publication Date: 2017-11-24
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0014] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0015] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for supervising approval operation, authorization operation and form operation
  • Method for supervising approval operation, authorization operation and form operation
  • Method for supervising approval operation, authorization operation and form operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] [Example 1] such as Figure 5 As shown, the method for monitoring and approving operations includes the following steps:

[0069] Create roles in the system, such as Figure 4 As shown, the role is an independent individual, not a group / class. At the same time, a role can only be associated with a unique user, and a user is associated with one or more roles; a user corresponds to an employee, and an employee corresponds to a user , employees determine their permissions through the roles associated with their corresponding users. Employees and users have a 1-to-1 relationship with each other and are bound for life. After a user corresponds to an employee, the user belongs to the employee, and the user cannot be associated with other employees; if the employee leaves, the user cannot correspond to other employees. After an employee joins the company again, the employee still uses the original user.

[0070] When the role performs an approval operation, record the role ...

Embodiment 2

[0077] [Example 2] such as Figure 6 As shown, the method for monitoring and approving operations includes the following steps:

[0078] Create roles in the system, such as Figure 4 As shown, the role is an independent individual, not a group / class. At the same time, a role can only be associated with a unique user, and a user is associated with one or more roles; a user corresponds to an employee, and an employee corresponds to a user , employees determine their permissions through the roles associated with their corresponding users.

[0079] When the role performs an approval operation, record the role that performs the approval operation;

[0080] Set one or more roles as supervised roles, and set one or more roles for each supervised role as its supervisor role;

[0081] The supervision role monitors the approval operation records performed by the supervised role (the supervision role can statistically view all the approval operation records performed by the supervised...

Embodiment 3

[0088] [Example 3] such as Figure 7 As shown, the method for monitoring authorized operations includes the following steps:

[0089] Create a role in the system. The role is an independent individual, not a group / class. At the same time, a role can only be associated with a unique user, and a user is associated with one or more roles;

[0090] When the role performs an authorization operation, record the role that performs the authorization operation;

[0091] Set one or more roles as monitoring roles, and set one or more roles for each monitoring role as its supervised role;

[0092] The supervisory role monitors the authorized operation records performed by the supervised role (the supervisory role can statistically view all the authorized operation records performed by the supervised role, so as to analyze the problems mapped by the relevant operation behavior of the supervised role and deal with them accordingly).

[0093] [Example 4] such as Figure 8 As shown, the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for supervising approval operation, authorization operation and form operation. The method comprises the following steps: creating roles in a system, wherein the roles are independent individuals, and in the same period, one role can only associate with only one user, and one user can associate with one or more roles; when the role executes approval/ authorization/ form operation, recording the role executing the operation; setting one or more roles as a monitoring role/ monitored role, and setting a monitored role/ monitoring role for each monitoring role/ monitored role; and through the monitoring role, monitoring the approval/ authorization/ form operation recordings executed by the monitored role. The monitoring and monitored subjects are independent individual roles respectively; work content of users/staffs is distinguished according to post number/ station number, and each post number/ station number is corresponding to one independent individual role; setting of supervision authority is realized for each role; monitoring and monitored authorities are subjected to refined authorization; and the method meets actual operation and use requirements of enterprises.

Description

technical field [0001] The invention relates to a method for monitoring approval operation, authorization operation and form operation in management systems such as ERP and CRM. Background technique [0002] The supervision and accountability of user operation records in the management system is very important. In the existing management system, in many cases, a manager with management authority is required to supervise the operation records of the supervised object. Although it is possible to supervise and monitor the managed object However, the traditional system adopts the method of directly supervising and supervising the user / employee. Once the supervisory authority is granted, the supervisor can supervise all the work operation records of the user / employee. However, a user / employee often has multiple roles, and the supervisor's supervisory authority to the user / employee often cannot cover the work content involved in all positions, and it is difficult to balance the tw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q10/10G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06Q10/06311G06Q10/063114G06Q10/063116G06Q10/10
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products