Method for setting approval node an approval process based on countersignature

A technology of approval nodes and processes, which is applied in the field of setting approval nodes in the approval process, can solve the problems of difficulty in remembering the difference between roles and permissions with similar permissions, error-prone, complex and time-consuming, etc., to ensure authenticity and credibility degree, avoiding mutual influence, and avoiding the effect of information leakage

Active Publication Date: 2018-11-06
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In the above statement, both 2 and 3 need to authorize the role of class / group nature, but the method of authorization and workflow control through the role of class / group / position / type of work has the following disadvantages: 1. When user permissions change Difficult to operate: In actual system use, it is often necessary to adjust user permissions during operation. For example, when dealing with changes in employee permissions, the permissions of an employee associated with a role change. We cannot Changes in employee permissions change the permissions of the entire role, because the role is also associated with other employees whose permissions have not changed
[0010] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0011] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0012] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for setting approval node an approval process based on countersignature
  • Method for setting approval node an approval process based on countersignature
  • Method for setting approval node an approval process based on countersignature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0075] [Embodiment 2] The method of setting the approval node based on the countersignature in the approval process also includes a step of setting the approval role to view the content of the form fields involved in the approval process, and different approval roles of the same countersignature node can view the content of the form fields The permissions can be different. It is more convenient to use, has a wide range of applications, and facilitates the hiding of some sensitive fields to avoid information leakage.

[0076] For example: For a contract approval process, the sales-related approval role in the countersignature node can be set to be able to view all fields; the production-related approval role can be set to only view the product model field, product quantity field, technical indicator field, and Delivery time field; financial-related approvers can be set to only view the product model, product unit price, contract amount, billing information, and payment method fiel...

Embodiment 3

[0077] [Embodiment 3] Based on the setting method of the countersigned approval node in the approval process, an approval process includes a start node, at least one approval node, and an end node, including the following sequential steps: Step 1: Set the approval method of the approval node For countersignature, the approval node is called a countersignature node. The countersignature node summarizes all countersignature comments of the node's approval role, and provides a reference for the approval role of the subsequent approval node; Step 2: Set one or more approval roles for the countersignature node; It also includes a step of setting the countersignature node to anonymous countersignature. After setting it to anonymous countersignature, except the approval role can see its own countersignature comments, other non-approval roles cannot see the countersignature comments submitted by the approval role.

[0078] An anonymous countersignature function is provided. After setting ...

Embodiment 5

[0096] [Example 5] Such as Figure 5 As shown, the generation of the approval process includes the following steps: S1: Build a user-role-authority three-tier structure model, where: role layer: the main body of the process approval in the workflow is a role, and each role is an independent individual , Instead of a group / class, a role can only be associated with a unique user at the same time period, and a user can be associated with one or more roles; the composition of the role is: post name + post number; authority level: being executed by the workflow The required authority constitutes, and the authority is directly authorized to the role; user layer: the user determines the approval task in the approval process through the associated role, and performs the approval operation with the authority of the associated role; S2: Figure 7 As shown, the approval process is generated based on the three-tier structure model. An approval process includes a start node, at least one appr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for setting an approval node in an approval process based on countersignature. The method comprises the following steps of firstly setting countersignature as an approval mode for the approval node, summarizing all countersigning comments of a node approval role at a countersigning node to provide a reference for the later approval role of the approval node; and secondly, setting one or more approval roles for the countersigning node. According to the invention, the countersigning comments are summarized at the countersigning node so as to provide a powerful reference for the later approval role of the approval node. In a working process, the main body of an approval operation is the role while is an independent individual. Even if an employee / user changes,it is just required to re-associate the new employee with the role of in approval process; or if the approval authority of the employee changes, it is just required to adjust the approval authority of the role in a targeted manner and is not required to reset / adjust the process. Therefore, the setting in convenient, errors and omission are avoided, the normal operation of an enterprise is not influenced, and the reliability of the working process is greatly improved.

Description

Technical field [0001] The invention relates to an approval node approval method for management software systems such as ERP, and in particular to a method for setting an approval node based on countersignature in an approval process. Background technique [0002] Role-based access control (RBAC) is the most researched and most mature database authority management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). Traditional autonomous access control has high flexibility but low security. Mandatory access control is highly secure but too restrictive; role-based access control combines both, which is not only easy to manage, but also reduces complexity, cost and the probability of errors , Which has been greatly developed in recent years. The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q10/10
CPCG06Q10/0633G06Q10/103Y02P90/30
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products