Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authority management method, electronic device and storage medium

A technology of user rights and management methods, which is applied in the field of user rights management, can solve the problems of long time and manpower, reduce production efficiency, and low authentication efficiency, and achieve the effect of improving production efficiency, improving authentication efficiency, and realizing automatic authentication

Pending Publication Date: 2021-02-09
SHENZHENSHI YUZHAN PRECISION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication process of personnel identity verification, qualification certification and authority restriction is usually performed manually, so the personnel certification process requires a lot of time and manpower, and the certification efficiency is low, resulting in reduced production efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority management method, electronic device and storage medium
  • User authority management method, electronic device and storage medium
  • User authority management method, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] see figure 2 As shown in FIG. 1 , it is a flowchart of a user rights management method according to an embodiment of the present invention. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0097] In one embodiment, the user rights management method is applied in the first electronic device 1 or the second electronic device 2 .

[0098] S11. Receive user request information.

[0099] In one embodiment, the user request information includes at least identity information and permission request information. The identity information may be the user's ID number, employee ID number, or other information sufficient to identify the user. The first electronic device 1 or the second electronic device 2 may receive the user's identity information by receiving a scanned copy of the certificate sent or uploaded by the user, manually inputting a certificate number or other forms.

[0100] In one embodime...

Embodiment 2

[0129] see image 3 As shown in FIG. 2 , it is a flowchart of a user rights management method provided by an embodiment of the present invention. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0130] In one embodiment, the user rights management method is applied in the operating environment formed by the first electronic device 1 and the second electronic device 2 .

[0131] S201. Receive user request information.

[0132] In one embodiment, the user request information includes at least identity information and permission request information. Among them, the identity information is the user's ID number, employee ID number or other information sufficient to identify the user's identity. The first electronic device 1 receives the user's identity information by receiving a scanned document sent or uploaded by the user, manually inputting a document number, or other forms.

[0133] In one embodime...

Embodiment 3

[0177] see Figure 4 As shown in FIG. 2 , it is a flowchart of a user rights management method provided by an embodiment of the present invention. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0178] In one embodiment, the user rights management method is applied in the first electronic device 1 .

[0179] S301. Receive user request information.

[0180] In one embodiment, the user request information includes at least identity information and permission request information. Among them, the identity information is the user's ID number, employee ID number or other information sufficient to identify the user's identity. The first electronic device 1 may receive the user's identity information by receiving a scanned document sent or uploaded by the user, manually inputting a document number, or other forms.

[0181] In one embodiment, the permission request information includes at least a permissi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authority management method, which is used for processing an authority opening request of a user and comprises the following steps of: receiving user request informationwhich at least comprises identity information and authority request information; obtaining permission qualification of the user according to the user request information; providing a first authentication interface according to the permission qualification; receiving a first input corresponding to the first authentication interface; processing the first input to obtain an authority request result corresponding to the authority request information; updating user management information according to the permission request result, wherein the user management information comprises user permission information; and providing a permission request result. The invention further provides an electronic device and a storage medium. The authentication process of personnel can be automatically controlled,manual execution is not needed, and the authentication efficiency is improved.

Description

technical field [0001] The invention relates to a user authority management method, an electronic device and a storage medium. Background technique [0002] In the factory management stage, in order to keep confidential, it is necessary to carry out identity verification, qualification certification and authority restriction certification for all access personnel who are in contact with the product process. Proficiency, while avoiding disclosure of confidential content of the product and its manufacturing process. However, the processes of personnel identity verification, qualification certification, and authorization restriction certification are usually performed manually, and such a personnel certification process requires a lot of time and manpower, and the certification efficiency is low, resulting in reduced production efficiency. Contents of the invention [0003] In view of this, it is necessary to provide a user rights management method, an electronic device and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45G06F21/107
Inventor 韩正杰吴婵芳罗立平
Owner SHENZHENSHI YUZHAN PRECISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products