Methods for monitoring approval operations, authorization operations, and form operations

A form and operation record technology, applied in instruments, electronic digital data processing, digital data protection, etc., can solve the problems of confusing, complex and time-consuming, and difficult operation of similar roles, so as to avoid leakage of confidential information, and operate easily and quickly. , the effect of reducing workload

Active Publication Date: 2018-12-25
CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the above statement, both 2 and 3 need to authorize the role of class / group nature, but the way of authorization through the role of class / group / post / job nature has the following disadvantages: 1. The operation is difficult when the user authority changes: In the actual system use, it is often necessary to adjust the user's permissions during the operation process. For example, when dealing with changes in employee permissions, the permissions of an employee associated with a role change. Instead, change the permissions of the entire role, because the role is also associated with other employees whose permissions have not changed
[0012] 2. It is difficult to remember the specific permissions contained in the role for a long time: If the role has many permission function points, it is difficult to remember the specific permissions of the role over time, and it is even more difficult to remember the permission differences between roles with similar permissions. The permissions of the role are also easy to confuse; if you want to associate a new user, you cannot accurately determine how to choose the association
[0013] 3. Due to the change of user permissions, more and more roles will be created (if no new roles are created, the direct authorization to users will be greatly increased), and it is more difficult to distinguish the specific differences between the permissions of each role
[0014] 4. When transferring a post, if you want to assign many permissions of the transferred user to several other users, you must distinguish these permissions of the transferred user during processing, and then create roles to associate with the other users. users, such an operation is not only complicated and time-consuming, but also prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for monitoring approval operations, authorization operations, and form operations
  • Methods for monitoring approval operations, authorization operations, and form operations
  • Methods for monitoring approval operations, authorization operations, and form operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0066] [Example 1] such as Figure 5 As shown, the method for supervising and approving operations includes the following steps: Create a role in the system, such as Figure 4 As shown, the role is an independent individual, not a group / class. At the same time, a role can only be associated with a unique user, and a user is associated with one or more roles; a user corresponds to an employee, and an employee corresponds to a user , employees determine (obtain) permissions through their corresponding user-associated roles (independent individual nature roles). Employees and users have a 1-to-1 relationship with each other and are bound for life. After a user corresponds to an employee, the user belongs to the employee and the user can no lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for supervising and approving operation, authorizing operation and form operation. The method comprises the following steps: a role is created in the system, wherein the role is an independent individual, at the same time, only one role can be associated with a unique user, and one user can be associated with one or more roles; when a role performs an approval / authorization / form operation, the role that performs the operation is recorded; one or more roles are set as monitoring roles / monitored roles, and their monitored roles / monitored roles are set for each monitoring role / monitored role; records of approvals / authorizations / form operations performed by the monitored role are monitored by the monitoring role. A subject monitor and monitored by that presentinvention is an independent individual character role, The work content of user / employee is distinguished by position number / work position number, corresponding to an independent individual role respectively. The supervision authority is set for each role, and the supervision authority and the monitored authority are refined and authorized to meet the actual operation and use needs of the enterprise.

Description

technical field [0001] The invention relates to a method for monitoring approval operation, authorization operation and form operation in management systems such as ERP and CRM. Background technique [0002] The supervision and accountability of user operation records in the management system is very important. In the existing management system, in many cases, a manager with management authority is required to supervise the operation records of the supervised object. Although it is possible to supervise and monitor the managed object However, the traditional system adopts the method of directly supervising and supervising the user / employee. Once the supervisory authority is granted, the supervisor can supervise all the work operation records of the user / employee. However, a user / employee often has multiple roles, and the supervisor's supervisory authority to the user / employee often cannot cover the work content involved in all positions, and it is difficult to balance the tw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06F21/60
CPCG06F21/604G06F21/6218G06Q10/06311G06Q10/063114G06Q10/063116G06Q10/10
Inventor 陈达志
Owner CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products