Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System task dispatching method

A technology for dispatchers and employees, applied in the field of dispatching management software systems, it can solve problems such as affecting task execution, increasing internal friction, and prone to errors, and achieves the effects of convenient and fast operation, reduced workload, and convenient use.

Active Publication Date: 2018-12-04
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the above statement, both 2 and 3 need to authorize the roles of class / group nature, but the method of authorization and workflow control through the role of class / group / position / type of work has the following disadvantages: 1. When user permissions change Difficult to operate: In actual system use, it is often necessary to adjust user permissions during operation. For example, when dealing with changes in employee permissions, the permissions of an employee associated with a role change. We cannot Changes in employee permissions change the permissions of the entire role, because the role is also associated with other employees whose permissions have not changed
[0009] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0010] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0011] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors
[0012] As far as the way of dispatching workers is concerned, the traditional system usually assigns work tasks directly to people. Once this person leaves or transfers, he must return all the tasks in his hands. There are the following defects: A: For this person , all tasks must be returned one by one, and the operation is cumbersome, especially for employees who are about to leave, they may not be willing to cooperate in completing the operation of returning tasks; B: For dispatchers, these tasks need to be reassigned to other People need to do repetitive work, which increases internal friction, and the dispatcher has a heavy workload and is prone to errors; C: The process of returning tasks usually needs to be approved, which prolongs the cycle of task execution and increases internal friction in the system; Approval is required, and if the task is not returned in time, it will seriously affect the execution of the task, especially some tasks have urgent time requirements. If it is not returned in time and handed over to a new person, it may cause serious consequences and unpredictable losses; D: When a user transfers a post, the user also needs to return all the previous tasks, and then the dispatcher dispatches tasks for the new post. There are also problems such as troublesome operation and delays in the task execution cycle.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System task dispatching method
  • System task dispatching method
  • System task dispatching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] [Example 1] such as Figure 5 As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object and a dispatching step; S1: the step of determining the dispatched task: determining the task that needs to be dispatched Task, the task can be the content filled in manually, or the specified form data or the content brought out by the specified form data (such as dispatching a worker to process a copy, dispatching a worker to process a complaint, specifying to process an installation request etc.), or a combination of the three; tasks include: production tasks, sales tasks, logistics tasks, after-sales tasks and other tasks that need to be dispatched.

[0050] S2: The step of determining the object to be dispatched: determine the object to be dispatched, and the object is a role, such as Figure 4 As shown, the role is an independent individual, not a group / class. A role can only be associated with a uniqu...

Embodiment 2

[0055] [Example 2] such as Figure 5 As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object, and a dispatching step; SS1: the step of determining the dispatched object: determining the dispatched object , the object is a role, the role is an independent individual, not a group / class, a role can only be associated with a unique user at the same time, and a user is associated with one or more roles; SS2: determine the assigned task Step: determine the task that needs to be dispatched; SS3: dispatching step: the dispatcher assigns the task that needs to be dispatched to the dispatched role, and the employee corresponding to the user associated with the dispatched role obtains the dispatched task. A dispatcher can be a role, a user, or a person.

[0056]If the user needs to transfer posts across departments, there is also a user cross-department transfer management step, including: (1) cancel the assoc...

Embodiment 3

[0060] [Example 3] such as Figure 5 As shown, a system dispatching method includes a step of determining the dispatched task, a step of determining the dispatched object and a dispatching step; S1: the step of determining the dispatched task: determining the task that needs to be dispatched Task; S2: The step of determining the assigned object: determine the assigned object, the object is a role, and the role is an independent individual, not a group / class. A role can only be associated with a unique user at the same time. A user is associated with one or more roles; S3: dispatching step: assign tasks that need to be dispatched to the dispatched role, and the employees corresponding to the users associated with the dispatched role get the dispatched tasks. The time assigned by the dispatcher is a time period, not an exact time point, as long as it is completed within this time period, it is considered normal completion.

[0061] It also includes a step of returning the task,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system task dispatching method. The method comprises determining tasks to be dispatched, namely, determining the tasks requiring dispatching; determining dispatching objects,namely, determining the objects to which the tasks are to be dispatched, wherein the objects are roles which are independent individuals but not groups / classes and one role can only be associated with a unique user in the same time period, and one user can be associated with one or more roles; dispatching, namely, dispatching tasks that require dispatching to the dispatching roles. According to the invention, the tasks are dispatched to the roles, and the user obtains the tasks through the association with the roles. When an employee leaves his / her post, the association between the employee and his / her role is canceled, and a new employee can be directly associated with the role. Re-dispatching for the new employee is not needed, and the operation is convenient and quick. When the employee is transferred to another position, the association with the original role is cancelled, and the tasks dispatched to a new role can be automatically obtained by associating with the new role. The dispatching object needs no action in the event of job termination or post transfer.

Description

technical field [0001] The invention relates to a dispatching method of management software systems such as ERP. Background technique [0002] Role-based access control (RBAC) is the most researched and thoughtful database permission management mechanism in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). Traditional discretionary access control has high flexibility but low security, mandatory access control has high security but is too restrictive; role-based access control combines both, which is not only easy to manage but also reduces complexity, cost and error probability , which has been greatly developed in recent years. The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users can indirectly a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10
CPCG06Q10/06311G06Q10/063112G06Q10/10G06Q10/103G06Q10/105
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products