Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authority management method based on system and personnel labels

A system authority and authority management technology, applied in the field of authority management based on system and personnel tags, can solve problems such as high maintenance costs, untimely authority recovery, information security risks, etc., and achieve the effect of improving efficiency

Pending Publication Date: 2021-08-06
SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, large enterprises, especially group enterprises undergoing digital transformation, after employees join the company, the system will automatically grant some general system permissions such as corporate intranet portals, corporate communication software, etc., but according to the needs of different positions or departments, such as finance, For personnel system permissions, employees often initiate applications by themselves, and then personnel or the corresponding system management personnel conduct permission review. The process may be cumbersome and lengthy due to the possibility of cross-group subsidiaries and different personnel. For dozens or even millions of employees The use and maintenance costs of large-scale enterprises are relatively high, and if personnel are transferred to new subsidiaries or departments after the authority is issued, the authority recovery will not be timely
[0003] Each system sets its own roles and configures the roles for different personnel. Each person may have several roles in one system. In the same group company, different systems may be provided by multiple companies. The set roles and approval chains are large. Not the same, the authority application process is cumbersome and lengthy, and the authority recovery is not timely or even not recovered after the application is successful, which may lead to information security risks; if personnel are transferred, they need to re-apply for the corresponding authority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority management method based on system and personnel labels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0039] figure 1 It is a flow chart of the rights management method based on the system and personnel tags provided by the embodiment of the present invention.

[0040] Such as figure 1 As shown, a rights management method based on system and personnel tags provided in this embodiment includes the following steps:

[0041] S11. Obtain the personal identity information of the target employee.

[0042] The acquisition method can be manually entered into the sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authority management method based on a system and a personnel label. The method comprises the following steps: acquiring personnel identity information of a target employee; determining an attribute tag of the target employee according to the personnel identity information; determining the system authority of the target employee based on a pre-established attribute tag and authority management relationship; judging the state information of the target employee, wherein the state information comprises entry, demission and position change; if the state information indicates entry, opening the system authority of the target employee; if the state information indicates demission, recovering the system authority of the target employee; if the state information shows that the position is changed, changing the system authority of the target employee, obtaining the corresponding system authority directly according to the attribute tag through the attribute tag mode, so that the system authority changing efficiency during the employee changing is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of rights management, and in particular relates to a rights management method based on system and personnel tags. Background technique [0002] At present, large enterprises, especially group enterprises undergoing digital transformation, after employees join the company, the system will automatically grant some general system permissions such as corporate intranet portals, corporate communication software, etc., but according to the needs of different positions or departments, such as finance, For personnel system permissions, employees often initiate applications by themselves, and then personnel or the corresponding system management personnel conduct permission review. The process may be cumbersome and lengthy due to the possibility of cross-group subsidiaries and different personnel. For dozens or even millions of employees The use and maintenance costs of large-scale enterprises are relatively high, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06F21/30
CPCG06Q10/103G06F21/30
Inventor 柴富升
Owner SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products