Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method that displays the current permission status of all system users

A technology for displaying systems and users, applied in data processing applications, instruments, digital data authentication, etc., can solve the problems of system users’ loss, not knowing the authorization status of the customer phone field, increasing authorization, etc., to reduce the probability of authorization errors , Improving the efficiency of authority management, improving efficiency and reliability

Active Publication Date: 2018-12-21
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the traditional role-based user rights management methods all adopt the "role-to-user one-to-many" association mechanism. / Position / Type of work and other concepts, the authorization of user rights under this association mechanism is basically divided into the following three forms: 1. figure 1 As shown, directly authorizing users has the disadvantages of heavy workload, frequent and cumbersome operations; 2. figure 2 As shown, authorize the role (category / group / position / type of work) (a role can be associated with multiple users), and the user obtains the authority through the role; 3. For example image 3 As shown, the combination of the above two methods
[0006] In the above statement, both 2 and 3 need to authorize the role of class / group nature, but the way of authorization through the role of class / group / post / work type has the following disadvantages: 1. The operation is difficult when the user authority changes: In the actual system use, it is often necessary to adjust the user's permissions during the operation process. For example, when dealing with changes in employee permissions, the permissions of an employee associated with a role change. We cannot Changes to change the permissions of the entire role, because the role is also associated with other employees whose permissions have not changed
The above two processing methods not only take a long time to authorize the role in the case of many role permissions, but also are prone to mistakes. The operation of the user is cumbersome and troublesome, and it is also easy to make mistakes and cause losses to the system user.
[0007] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. To associate a new user, it is impossible to accurately determine how to choose the association
[0008] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0009] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors
[0010] like Figure 4 As shown, in the authorization methods of the existing forms, if you select two or more employees and then select a form, the authorization status of the selected employees to the selected form cannot be displayed; similarly, if you select a form , and then select two or more employees, the authorization status of the selected employees for the selected form cannot be displayed
Makes it easy for the authorized operator to make mistakes when authorizing multiple users at the same time
[0011] During the use of the system, permissions are often adjusted due to management needs; for example, according to management needs, the company now needs to adjust the viewing / modifying permissions of the customer phone field (field content of the field) on the customer form (for example, some have viewing permissions Some users without viewing permission are adjusted to have viewing permission, some users without modification permission are adjusted to have modification permission, some users with modification permission are adjusted to have no modification permission, and some users do not have permission Adjustment), the existing method can only select the user and the form in turn, or select the form and the user in turn, and then authorize the customer phone field of the form. If the user is authorized one by one, the workload is huge and error-prone; if you choose If multiple or all users are authorized, only the customer phone field can be authorized uniformly. Once authorized, all selected users have the same authority, and different authorization cannot be performed.
Most importantly, it is impossible to display the previous authorization status of each user to the customer phone field. Without the previous authorization status of each user in the customer phone field as a reference, the authorized operator does not know the previous authorization status of these users to the customer phone field. It is easy for authorized operators to make mistakes in authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method that displays the current permission status of all system users
  • Authorization method that displays the current permission status of all system users
  • Authorization method that displays the current permission status of all system users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] [Example 1] If Figure 5 As shown, the authorization method for displaying the current authority status of all system users includes: S11. Select a form.

[0047] E.g, Image 6 , select Customer Forms.

[0048] S12. Select an element item of a form element of the form.

[0049] The type of the form element includes one or more of form operation authority, form field, time property field and form field value.

[0050] The element items of the form operation authority include one or more of adding, deleting, viewing, modifying, related information viewing, printing, importing and exporting; for example, the element items of the form field of the customer form include the customer name , customer industry and customer address, etc. (namely: the field of the form); the element item of the form field value is the field value of the field, here specifically refers to the field value that is selected or automatically determined, such as the customer in the customer form Al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method for displaying the current authorization status of all system users. Selecting an element item of a form element of the form; After the element item isselected, all system users in the system are displayed, and the current permission status of each system user on the selected element item is displayed. Authorization of that selecte element items isperform on one or more users of the system. After displaying all system users in the system, the invention displays the current authorization status of each system user to the selected element item, which is convenient for authorized operator to modify on the basis, realizes authorization of the selected element item for the system user, and improves authorization efficiency.

Description

technical field [0001] The invention relates to an authorization method for management software systems such as ERP, in particular to an authorization method for displaying the current authority states of all system users. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful database permission management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users can indirectly access database resources by being assigned different roles. [0003] There are often a large number of tables and views in large-scale application systems, which makes the management and authorization of database resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10
CPCG06F21/6227G06Q10/10G06Q10/103G06F2221/2141G06F21/6218G06F2221/2101G06F21/604G06F21/31G06F21/6209G06Q10/105
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products