Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method capable of displaying current authority states of all system users

A technology for displaying systems and users, applied in data processing applications, instruments, digital data authentication, etc., can solve the problems of loss of system users, increase authorization, not knowing the authorization status of customer phone fields, etc., to reduce the probability of authorization errors , improve efficiency and reliability, and improve the effect of rights management efficiency

Inactive Publication Date: 2017-12-15
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two processing methods not only take a long time to authorize the role in the case of many role permissions, but also are prone to mistakes. The operation of the user is cumbersome and troublesome, and it is also easy to make mistakes and cause losses to the system user.
[0011] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. To associate a new user, it is impossible to accurately determine how to choose the association
[0012] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0013] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors
[0014] like Figure 4 As shown, in the authorization methods of the existing forms, if you select two or more employees and then select a form, the authorization status of the selected employees to the selected form cannot be displayed; similarly, if you select a form , and then select two or more employees, the authorization status of the selected employees for the selected form cannot be displayed
Makes it easy for the authorized operator to make mistakes when authorizing multiple users at the same time
[0015] For example, according to management needs, the company now needs to adjust the view / modify permission of the customer phone field on the customer form (for example, some users with viewing permission are adjusted to have no viewing permission, some users without viewing permission are adjusted to have viewing permission, and some Users without modification rights are adjusted to have modification rights, some users with modification rights are adjusted to have no modification rights, and some users’ rights are not adjusted), the existing method can only select users and forms in turn, or select forms and users in turn, Then authorize the customer phone field of the form. If you authorize users one by one, the workload will be huge and error-prone; if you choose multiple or all user authorizations, you can only authorize the customer phone field uniformly. Authorization means that all users who are selected have the same authority, and cannot perform differential authorization
Most importantly, it is impossible to display the previous authorization status of each user to the customer phone field. Without the previous authorization status of each user in the customer phone field as a reference, the authorized operator does not know the previous authorization status of these users to the customer phone field. It is easy for authorized operators to make mistakes in authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method capable of displaying current authority states of all system users
  • Authorization method capable of displaying current authority states of all system users
  • Authorization method capable of displaying current authority states of all system users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] [Example 1] If Figure 5 As shown in , the authorization methods that display the current permission status of all system users include:

[0065] S11. Select a form.

[0066] For example, Figure 6 , select Customer Forms.

[0067] S12. Select an element item of a form element of the form.

[0068] The type of the form element includes one or more of form operation authority, form field, time property field and form field value.

[0069] The element items of the form operation authority include adding, deleting, viewing, modifying, related information viewing, printing, importing and exporting, etc.; for example, the element items of the form field of the customer form include customer name, customer industry and customer address, etc. (ie: form field); the element item of the form field value is the field value of the field, here specifically refers to the field value that is determined by selection or automatically determined, such as the alternative value of the ...

Embodiment 2

[0102] [Example 2] If Figure 11 As shown in , the authorization methods that display the current permission status of all system users include:

[0103] S21. Select a statistical list.

[0104] S22. Select an element item of a statistical list element of the statistical list.

[0105] The type of the statistical list element includes one or more of the operating authority of the statistical list, the column name of the statistical list, the time attribute column name and the column name value of the statistical list; the value of the column name is the column value of the column where the column name is located (For example, there is a column named customer level in the statistical list, and the "level 1, level 2, level 3,,,," displayed in the list is the column value of the customer level; another example is that there is another column named number of visits, "12, 5, 8,,,," displayed in the list is the column value of the number of visits).

[0106] When the type of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method capable of displaying the current authority states of all system users. The authorization method includes the steps that a form is selected; one element item of one element of the form is selected; all the system users in the system are displayed after the element item is selected, and the current authority state of the element item selected by each system user is displayed; the element items of one or more system users are authorized. After all the system users in the system are displayed, the current authority state of the element item selected by each system user is displayed, so that an authorization operator conducts modification on the basis conveniently to authorize the element items selected by the system users, and the authorization efficiency is improved.

Description

technical field [0001] The invention relates to an authorization method for management software systems such as ERP, in particular to an authorization method for displaying the current authority states of all system users. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful database permission management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users can indirectly access database resources by being assigned different roles. [0003] There are often a large number of tables and views in large-scale application systems, which makes the management and authorization of database resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q10/10
CPCG06F21/6227G06Q10/10G06Q10/103G06F2221/2141G06F21/6218G06F2221/2101G06F21/604G06F21/31G06F21/6209G06Q10/105
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products