CN107464098A - The checking method of form data operation - Google Patents

The checking method of form data operation Download PDF

Info

Publication number
CN107464098A
CN107464098A CN201710682789.7A CN201710682789A CN107464098A CN 107464098 A CN107464098 A CN 107464098A CN 201710682789 A CN201710682789 A CN 201710682789A CN 107464098 A CN107464098 A CN 107464098A
Authority
CN
China
Prior art keywords
examination
form data
verification
role
auditor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710682789.7A
Other languages
Chinese (zh)
Inventor
陈达志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Morning Glory Information Technology Co Ltd
Chengdu Qianniucao Information Technology Co Ltd
Original Assignee
Chengdu Morning Glory Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Morning Glory Information Technology Co Ltd filed Critical Chengdu Morning Glory Information Technology Co Ltd
Priority to CN201710682789.7A priority Critical patent/CN107464098A/en
Publication of CN107464098A publication Critical patent/CN107464098A/en
Priority to CN201810904691.6A priority patent/CN109086627B/en
Priority to PCT/CN2018/099769 priority patent/WO2019029650A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of checking method of form data operation, including:Role in establishment system, role are independent individuals, and same one role of period can only associate unique user, a user-association one or more role;One or more of selection system role authorizes the examination & verification authority of the operation of its form data having for each auditor as auditor;Examination & verification claimant submits the examination & verification request of certain operation of some form data;Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data.A present invention examination & verification only examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task terminates, and without visioning procedure, shortens the Review Cycle of form data operation.Auditor uses the role of independent individual property, in labor turnover, transfer-position, can realize the seamless handover of examination & verification authority, not interfere with enterprise's normal operation, also evade the risk of confidential information leakage.

Description

The checking method of form data operation
Technical field
The present invention relates to the checking method that form data in the management softwares such as ERP, CRM operates.
Background technology
Access control based roles(RBAC)It is a kind of data base authority pipe that Recent study is most, thought is most ripe Reason mechanism, it is considered as to substitute traditional forced symmetric centralization(MAC)And self contained navigation(DAC)Ideal candidates.Pass The flexibility of the self contained navigation of system is high but security is low, and forced symmetric centralization is safe but limitation is too strong;It is based on Both access controls of role have concurrently, are not only easy to manage and reduce complexity, cost and the probability to make a mistake, thus Great development has been obtained in recent years.Access control based roles(RBAC)Basic thought be according in business organization's view Different functional posies divides different roles, the access rights of database resource is encapsulated in role, user is by being assigned Different roles is given to carry out dereference database resource.
Substantial amounts of table and view are often all had in large-scale application system, this causes management to database resource and awarded Adaptability in tactics obtains sufficiently complex.The access and receiving and grant for authority that database resource is directly managed by user are very difficult, and it needs Understanding of the user to database structure is very thorough, and is familiar with the use of sql like language, once and application system structure or peace Full demand has changed, and will carry out large amount of complex and cumbersome mandate changes, and is very easy to occur some and unexpected awards Security breaches caused by power error.Therefore, for large-scale applied system design one kind is simple, efficient right management method into For system and the common requirements of system user.
The mechanism of authorization control of based role can carry out simple, efficient management to the access rights of system, greatly The burden and cost of System right management are reduced, and causes System right management to more conform to the service management of application system Specification.
However, the user authority management of traditional based role uses the relation mechanism of " role is one-to-many to user ", its " role " is group/class property, i.e. a role can correspond to/associate multiple users simultaneously, and role is similar to post/position/work Kind etc. concept, the mandate under this relation mechanism to user right be divided into following three kinds of forms substantially:
1st, as shown in figure 1, directly being authorized to user, shortcoming is big workload, frequent operation and trouble;Changed when employee occurs (Such as transfer-position, leave office), all permissions that the employee is related to have to be adjusted accordingly, especially for company management people Member, the authority that it is related to is more, and the workload of authority adjustment is big, numerous and diverse, easily error or omission, influences the normal fortune of enterprise Battalion, or even cause the loss that can not be estimated.
2nd, as shown in Fig. 2 to role(Class/group/post/work post property)Authorized(One role can associate multiple User), for user by role's acquisition authority, permission grant main body is group/class property role;
3rd, as shown in figure 3, both the above mode combines.
In statement above, 2,3 are required to authorize the role of class/group property, and pass through class/group/post/work post The mode that the role of property is authorized has the disadvantage that:
1st, operation when user right changes is difficult:During the system use of reality, often because being needed during operation The authority of user is adjusted, such as:When handling the change of employee's authority, some employee's authority of role association becomes Change, we can not change the authority of whole role because of the change of indivedual employee's authorities, because the role is also associated with other The unchanged employee of authority.Therefore in order to tackle this kind of situation, otherwise new role is created to meet employee that the authority changes, The employee is directly authorized according to authority demand(Depart from role).Both the above processing mode, it is more in role-security In the case of to role authorization not only the time required to it is long, and easily make a mistake, user operates cumbersome and trouble, also easily goes out Mistake causes the loss to system user.
When the list operating right of employee/user changes, otherwise employee/user departs from role, otherwise newly-increased role To meet job requirement.The defects of the defects of first way, is with above-mentioned " directly being authorized to user " mode.The second way, newly Increase role to be just related to the newly-built of role, association, authorize work, especially role is more, user of role association also more situation Under, it is difficult to remember which user role, which is specifically associated with,.
2nd, to remember that the concrete power limit that role includes is difficult for a long time:If the privilege feature point of role is relatively more, the time one is grown, very Difficulty remembers the concrete power limit of role, it more difficult to remembers the authority difference between role similar in authority, the authority of close role is also very Easily obscure;To associate new user, can not accurate judgement how should to select to associate.
3rd, because user right changes, then role can be caused to create more and more(If not creating new role, can significantly increase Add the mandate directly to user), it more difficult to distinguish the specific difference of each role-security.
4th, during transfer-position, to by many individual authority distributions of transfer-position user other several users will be given to undertake, then when handling It must will be made a distinction by these authorities of transfer-position user, create role again respectively to associate other several users, such behaviour Make not only complicated and time consumption, and also easily making a mistake.
The difference of examination & verification and examination & approval:
1st, role is audited with examining the difference of role:It is to have permission the role audited to the data to audit role, is passed through List mandate or data grant realize may have multiple roles all to be had permission to certain a data, it is only necessary to one of role Examination & verification is completed, the examination & verification task just finishes;And it is the role set in approval process step to examine role, not particularly for which Data, but for reaching the examination & approval task of the approval node, then the examination & approval role can examination & approval of the approval node, according to The type of approval process, role examine completion and arrived next step or end(Single examination & approval), it is also possible to multiple roles Seen after examination & approval and pass through number(Ballot), or all roles must submit suggestions made after examination(Countersign);
2nd, task is audited with examining the difference of task:
(1)The cancellation of task:
Examination & verification, it is to submit role to click on revocation submitting button when newly-increased, examination & verification task just cancels, and changes and is to have permission when deleting Revocation examination & verification task can be clicked on by clicking on the role that revocation is submitted or revocation is deleted;It is all by flowing that the examination & approval of workflow examination and approval, which are cancelled, Journey promoter cancels.
(2)The process of task:
Examination & verification, only one examination & verification step, is retracted, examination & verification task terminates once approving after examination by or disagreeing;
Examination & approval, be according to the approval process step of setting step by step establish task, after an approval process step performs It is to agree to carry out in next step, still to disagree and return to a certain step, or which step of the execution is judged according to ballot situation, Or agree to select to terminate to walk after passing through to next step, some last step after all role's expressions of opinion in step Suddenly, the approval process is then terminated, the examination & approval task of data just calculates completion;In approval process, it is possible to before going to again Certain process step(For example reject).
(3)Examination & verification can agree or disagree with, and must be just to agree to terminate at the end of approval process.
Also there is partial software that there is audit function on the market, but do not provide and disagree in the audit function of existing software Auditing result function, only only signature agree to function, do not express and do not sign/disagreeing/function of not passing through, no Rapidly unsanctioned auditing result can be fed back to examination & verification claimant in time.For submitter, in its data submitted not The part passed through includes auditing result and is difficult to differentiate for the data not passed through and unauthorized data, submitter.
The content of the invention
It is right it is an object of the invention to overcome the deficiencies of the prior art and provide a kind of checking method of form data operation In the form data for not needing numerous and diverse approval process, realize that the examination & verification that form data operates confirms with audit function, without creating Flow, the workload of auditor/flow creator is reduced, shorten form data operation Review Cycle;Auditor is using only The role of individual property is stood, in labor turnover, transfer-position, associates and is achieved that along band by the associating of user and role/cancellation The switching and renewal of authority are audited, the seamless handover of examination & verification authority can be realized, ensures that user audits authority and upgraded in time, Be not in hysteresis or the omission for auditing authority renewal, do not interfere with enterprise's normal operation, also evaded confidential information leakage Risk.
The purpose of the present invention is achieved through the following technical solutions:The checking method of form data operation, including with Lower step:
Role in establishment system, described role are independent individuals, rather than group/class, same one role of period can only close Join unique user, and a user-association one or more role;
One or more of selection system role is the behaviour that each auditor authorizes its form data having as auditor The examination & verification authority of work;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See.
Described audit opinion include agree to/by, disagree/do not pass through.
The operation of described form data is included to any one in the newly-increased of form data, modification and deletion.
To modification/deletion form data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
If user needs transfer-position, in addition to user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
The checking method of form data operation, in addition to field value mandate auditor by form fields have The step of examination & verification authority of the operation of the form data of the list, the field value of the form fields is selection determination or automatic true Fixed.
When one, which is audited request, there are multiple auditors, auditing result is drawn according to default auditing rule.
Described auditing rule is:The audit opinion for the auditor for providing audit opinion using first as auditing result, As long as there is any one auditor to give audit opinion, examination & verification terminates.
Described auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " same Anticipate/pass through ", then auditing result is " agree to/pass through ", as long as there is the examination & verification that any one auditor gives " agree to/pass through " Opinion, examination & verification terminate.
Or, described auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " disagree/do not pass through ", then auditing result is " disagree/do not pass through ", as long as there have any one auditor to give to be " different Anticipate/do not pass through " audit opinion, examination & verification i.e. terminate.
The checking method of form data operation, comprises the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See;
Described form data operation includes the modification or deletion to form data, to modification/deletion form data, in addition to The step of one unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
The beneficial effects of the invention are as follows:
1)Examination & verification only one examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task i.e. terminate, Form data for not needing numerous and diverse approval process, or need to examine and confirm but be not desired to create numerous and diverse approval process Form data, realize that the examination & verification that form data operates confirms with audit function, without visioning procedure, reduce auditor/stream The workload of journey creator, shorten the Review Cycle of form data operation.
2)Auditor uses the role of independent individual property, in labor turnover, transfer-position, passes through the pass of user and role Connection/cancellation association is achieved that the switching and renewal of examination & verification authority along band, can realize the seamless handover of examination & verification authority, ensure to use Family examination & verification authority is upgraded in time, is not in hysteresis or the omission for auditing authority renewal, is not interfered with enterprise's normal operation, Also the risk of confidential information leakage has been evaded.
Leave office and illustrate:User-association role corresponding to employee Zhang San " direct labor 1 ", when Zhang San leaves office, system manager Directly cancel user corresponding to Zhang San and " this role's of direct labor 1 " associates, then Zhang San loses the " phase of direct labor 1 " automatically The examination & verification authority answered, avoid auditing authority handing-over hysteresis so that Zhang San still has the examination & verification of some confidential information and the power of checking after leaving office Limit, causes related confidential information to be leaked to Zhang San;When new registration employee Li Si takes over the work of Zhang San, directly allow corresponding to Li Si " direct labor 1 ", then Li Si has automatically obtained " audits authority, without again to user-association corresponding to this role of direct labor 1 " Examination & verification authority is reset for Li Si, it is simple and quick, greatly reduce workload.
Transfer-position is illustrated:Employee Zhang San will be from production department's transfer-position to portion after sale, and system manager cancels user corresponding to Zhang San " direct labor's 1 " associates, then is associated with the new role in portion after sale " after-sale service personnel 3 ", Zhang San then obtain automatically with former role " examination & verification authority corresponding to this role of after-sale service personnel 3 " is obtained.
3)The present invention can provide agreement/by, disagree/auditing result not passed through, can be in time rapidly to examination & verification Claimant feeds back auditing result, including auditing result to disagree/not passing through.
4)This application provides unblock to apply for function, the actual data for the list audited to needs, if desired modifies Or delete and apply, it is necessary to submit and unlock, it is traditional by there is this form data unblock person for operating unblock authority to be unlocked Without unblock application in examination & verification, the form data unlocked by the needs of examination & verification is entered by the unblock person with unblock authority Row unblock.
The benefit of unblock application function:
1. reducing the workload of unblock person, unblock person is allowed clearly to know there is which unblock demand;
2. an interactive mode is built for unblock demander and unblock person:
Citing:There is the people of sales force 1000 in enterprise, wherein only 8 people have unblock authority, if not unlocking application function, and someone Need to unlock certain list actual data, then unblock person's any bar form data can only be informed by modes such as phone or instant messagings Need to unlock, unblock person learns that find this form data after information is unlocked again, then:
A, the form data for needing to unlock is linked up and searched with unblock demander, can largely increase the workload of unblock person With cumbersome degree;
B, linked up by modes such as phone or instant messagings, it is easy to occur understanding deviation in information exchanging process, cause mistake By mistake, or unblock person learn after information may not timely processing, or even forget, then unblock can be caused to lag;
C, releasing process can not record unblock demander, unblock demand proposes the information such as time, unlock no related foundation, occur Problem is difficult to call to account.
The unblock application function that the application provides can solve the above problems well.
5)The application auditing rule can customize, such as:As long as someone by then by, must unanimous vote by that could lead to Cross, must more than half by could by, must be 2/3rds above by could pass through etc..For enterprise form data behaviour Make examination & verification and provide a kind of examination & verification mode flexibly, applicable, it is easy to use, especially suitable for needing the feelings of progress democratic decision-making Condition.
The application auditing rule may be configured as:As long as there is any one auditor to have submitted audit opinion, examination & verification has been determined that As a result, examination & verification terminates, and the examination & verification task of other auditors is removed automatically, realizes efficient, quick examination & verification.Especially suitable for more People is identical to the examination & verification authority of same examination & verification task, and anyone can determine the situation of auditing result.
6)The application role is man-to-man relation to user, and same one role of period can only associate unique user, One user-association one or more role, advantage of this is that, all no longer need to be allocated when creating user every time The operation of authority, if role is associated a user to, and also the permission modification of role is than the user right in traditional mechanism Much less is wanted in change.Independent volume property(Post number/station property)Role's number change it is small, although employee turnover is big, The change of post number/station number is small(Do not change within certain period even, i.e., role does not change), so will be very big Simplify the rights management of user, reduce the expense of system.
7)Simple to operate, the efficiency high of dynamic management, registration transfer-position etc., reliability are high:Registration/leaving office/transfer-position exists Application in rights management is simple, does not have to reset authority when employee/user changes, user only need to cancel or associate Role:The user of the role of no longer holding a post just cancels the role association, and catcher is held a post user-association post of the role Number role, the user for associating the role just obtains the examination & verification authority of the role automatically, without being authorized again to role, Drastically increase efficiency, the safety and reliability of system setting.
Citing:Because Zhang San user leaves office or the reason such as transfer-position, Zhang San no longer do " work of this role of purchasing agent 3 ", then By Zhang San cancel with " purchasing agent's 3 " associates;Other Li Si's catcher does that " work of this role of purchasing agent 3 ", only need to be by Li Si The role is associated, then Li Si has automatically obtained " the examination & verification authority of this role of purchasing agent 3 ".
8)Role definition is that property, the roles such as group, work post, class are one-to-many to user by traditional rights management mechanism Relation, during the system use of reality, because being frequently necessary to be adjusted the authority of user during operation, than Such as:When the change of employee's authority is handled, the authority of some employee of role association changes, and we can not be indivedual because of this The change of employee's authority and change the authority of whole role because the role is also associated with the unchanged employee of other authorities.Therefore In order to tackle this kind of situation, otherwise new role is created to meet employee that the authority changes, or to the employee according to power Limit demand directly authorizes(Depart from role).Both the above processing mode, in the case where role-security is more to role authorization not Long the time required to only, and easily make a mistake, user operates cumbersome and trouble, and also easily error causes to system user Loss.
But under the present processes, because role is an independent individual, then it can select to change role-security i.e. It can reach purpose.The present processes, while it seem that workload can be increased in system initialization, but duplication etc. can be passed through Method, the efficiency of its establishment role or mandate is set to be higher than the role of traditional group/class property, because not having to consideration group/class property angle Intercommunity of the color when meeting association user, application scheme can allow priority assignation clear, understand;Especially one is used in system After the section time(User/role-security dynamic change), this application scheme can be that system user is increased substantially in system use Rights management efficiency, make dynamic authorization simpler, be more convenient, it is apparent, clear, improve the efficiency of priority assignation and reliable Property.
9)The role authorization method of traditional group/class property easily malfunctions, and the application method, which significantly reduces, authorizes error Probability, because the application method need to only be considered as the role of independent individual, and without considering to associate this group of property under conventional method Which intercommunity multiple users of matter role have.Even if error is authorized, also only influence is associated with that user of the role, and Tradition can then influence to be associated with all users of the role with the role of group property.Even if there is permission grant mistake, the application Modification method is simple, the time is short, and tradition during role's repairing lookup error of group property to need to consider to be associated with the role's The authority intercommunity of all users, not only modification trouble, complicated, very easy error, and much in the case of more than function point In the case of can only newly create role and could solve.
10)In tradition using group as under the role authorization method of property, if the privilege feature point of role is relatively more, the time one It is long, it is difficult to remember the concrete power limit of role, it more difficult to the authority difference between role similar in authority is remembered, to associate new use Family, can not accurate judgement how should to select to associate.The role of the application method inherently has the property of post number/station number Matter, select very clear.
11)During transfer-position, to by many individual authority distributions of transfer-position user other several users will be given to undertake, then when handling It must will be made a distinction by these authorities of transfer-position user, create role again respectively to associate other several users, such behaviour Make not only complicated and time consumption, and also easily making a mistake.
The application method is then:Several roles by transfer-position user-association, in transfer-position, cancel user and former department first The association of interior role(These roles being cancelled can be associated to other users again), then by user and new department Interior role is associated.It is simple to operate, it will not malfunction.
Brief description of the drawings
Fig. 1 is the schematic diagram that system is directly authorized to user in background technology;
Fig. 2 is the schematic diagram that system is authorized to group/class property role in background technology;
Fig. 3 is the schematic diagram that system of users is directly authorized and is combined to group/class property role authorization in background technology;
Fig. 4 is the schematic diagram that present system is authorized by independent individual property role to user;
Fig. 5 is checking method flow chart of the present invention;
Fig. 6 is present invention unblock application flow chart.
Embodiment
Technical scheme is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to It is as described below.
【Embodiment 1】As shown in figure 5, the checking method of form data operation, comprises the following steps:
Role in establishment system, as shown in figure 4, described role is independent individual, rather than group/class, the same period one Role can only associate unique user, and a user-association one or more role;When role creates or after role's establishment For one department of the role selecting, then the role belongs to the department, and role is authorized according to the action of role, and The title of the role is unique under the department, and the numbering of the role is unique in systems;The corresponding employee of one user, one The corresponding user of employee, employee are defined the competence by the role of its corresponding user-association.
One or more of selection system role authorizes the form data that it has as auditor for each auditor Operation examination & verification authority(As each auditor authorizes it to have the examination & verification authority of which operation of which form data);
Audit claimant(It can be employee, user, group/class property role, independent individual property role etc. to audit claimant)Carry Hand over the examination & verification request of certain operation of some form data;The operation of described form data include to form data it is newly-increased, Modification, delete;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See.
Need to audit for example, customer table list is provided with deletion, auditor role 1 has the deletion of the client of Software Industry Authority is audited, then Zhang San will delete the examination & verification request submitted during client " company of Yongyou Software " and be audited by role 1.
Needing to audit for example, customer table list is provided with deletion, auditor role 1 has the examination & verification authority of the deletion of client, Then every examination & verification request for deleting client's submission is all audited by role 1.
For example, customer table list is provided with newly-increased, modification, deletes to need to audit, auditor role 1 have client it is newly-increased, Modification, the examination & verification authority deleted, then the examination & verification request that every newly-increased, modification, deletion client submit all are audited by role 1.
Need to audit for example, sales order list is provided with modification, auditor role A has " role B, role C, role The examination & verification authority of the modification of D " sales order data, then present role B have modified Changhong electrical equipment sales order, role C modifications The sales order of application software, role C have modified the sales order of Wanda building constructor, then role A B C have modified this Three sales orders and after submitting/preserving, modification of the role A cans to these three orders is audited.
Further, examination & verification claimant can also once submit the examination & verification request of certain operation of multiple form datas, by The auditor for having the examination & verification authority of the corresponding form data operation is audited.
Further, the checking method of form data operation, in addition to one examined by the field value mandate of form fields The step of examination & verification authority of the operation of the form data for the list that core person has, the field value of the form fields are true for selection It is fixed(The field value of field client's industry of such as client's list has manufacture, finance, aviation industry option to operate person by list Select, the field value of the field contract signing people of such as contract list has Zhang San, Li Si, the company personnel's option of king five to be operated by list People selects, these field values be it is unartificial fill in, but the field value obtained by selection mode, also such as contract list City, contract signing department, contract responsible organization, contract execution director, contract are responsible for angle where field contract rank, client The field value of the fields such as color is also selection)Or automatically determine(Field value such as the field founder of client's list has Zhang San, Lee 4th, company personnel's option such as king five, but when the client creates, the value of founder is to obtain current operator automatically as wound People is built, it is also in this way, the field value of this kind of field is according to list to record one, the single role of system, the field value of making the field such as one Dependency rule automatically determines)'s.
Need to audit for example, contracts card list is provided with deletion, Zhang San once have submitted 5 contracts(On contract list, it is responsible for It is sale one that the field value of Department field, which has 3, and it is sale two to have 2)Deletion examination & verification request, the examination & verification of role 1 Authority is:The field value of the responsible organization field of contract list is the examination & verification of the deletion of sale one;The examination & verification authority of role 2 It is:The field value of the responsible organization field of contract list is the examination & verification of the deletion of sale two.Then role 1 can only audit responsible portion For the field value of door field to sell the deletion examination & verification request of 3 contracts of one, role 2 can only audit the word of responsible organization field Segment value is asked to sell the deletion examination & verification of 2 contracts of two.
Examination & verification is exactly visa, is the need for auditing authority when the operation of some form data can not come into force Auditor confirms to use the examination & verification of form data operation during this operation.
Audit authority:The examination & verification for having which data of which list by list authorization to control which auditor is weighed (examination & verification permission grant mode can be designed as limit:Such as, have the examination & verification authority of certain data, then have the newly-increased examination & verification of this data/ This several authorities are audited in modification examination & verification/deletion examination & verification/unblock;Such as, may be designed in newly-increased examination & verification/modification of this data Examination & verification is overall to be authorized, and independent authorization is audited by deleting;Such as, it is also designed to this several authority carrying out independent authorization respectively).
Approve after examination/come into force by the operation for the form data that expresses one's approval, operation, examination & verification disagree/do not pass through expression The operation, the state that data are returned to before the examination & verification are not approved:
Need to set which list to need to audit, the list be arranged to certain operation need examination & verification when, then carrying out the list Just audited during the operation of form data, otherwise need not be audited.
A. examination & verification is increased newly:Data turn into actual data after agreement, disagree state or grass that data are changed into before newly-increased examination & verification Original text state;
B. modification examination & verification:Data turn into actual data after agreement, disagree data and are changed into released state;
C. examination & verification is deleted:Data are deleted after agreement, are disagreed data and are changed into released state;
D. unblock examination & verification:Data are changed into released state after agreement, disagree data and become again as actual data state.
The setting of examination & verification:
A. if newly-increased require examination & verification, then modification must just be audited;, whereas if modification requires examination & verification, it is newly-increased to examine Core;
B. if newly-increased either modification has the requirement of examination & verification or examination & approval, then deletion all necessarily requires to audit;
C. it can increase newly, change and need not all audit also without examination & approval, but can be deleted and audited with setting requirements(Can also It is not configured to audit).
Data are in review process, can cancel submission, cancel examination & verification task:
A. examination & verification is increased newly, only newly-increased examination & verification claimant clicks on revocation submitting button, and examination & verification task just cancels, after revocation is submitted, Data mode is changed into " rough draft ";
B. modification examination & verification, have permission and change the roles of the data and can click on revocation and submit, data mode is " after revocation Unblock ";
C. examination & verification is deleted, has permission and deletes the roles of the data and can click on revocation and submit, data mode is " after revocation Unblock ".
Citing:Assuming that order it is newly-increased/modification/deletion is required for auditing, increase an order 001 newly and submit, the angle having permission The order turns into actual data after color is approved after examination;The order is now changed if desired, then need first to initiate unblock application, Unblock application is by by rear, then is submitted after being modified to data, then the examination & verification of the role by having permission, the modification after approving after examination Data afterwards turn into actual data;Now if it is desired to deleting the order, then need first to initiate unblock application, unblock application is examined Core deletes data again after, and data are deleted after being audited by the role having permission.
Examination & verification only one examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task i.e. tie Beam, the form data for not needing numerous and diverse approval process, or need to examine and confirm but be not desired to create numerous and diverse examination & approval stream The form data of journey, realize that the examination & verification that form data operates confirms with audit function, without visioning procedure, reduce person approving The workload of member/flow creator, shorten the Review Cycle of form data operation.
Described audit opinion includes agreeing to/by, disagree/agreements/by, difference can not provided by, the present invention The auditing result anticipate/not passed through, auditing result, including auditing result rapidly can be fed back for difference to examination & verification claimant in time Anticipate/do not pass through.
In the present embodiment, if user needs transfer-position, in addition to user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
In the present embodiment, auditor use independent individual property role, in labor turnover, transfer-position, by user with The association of role/cancellation association is achieved that the switching and renewal of examination & verification authority along band, can realize the seamless friendship of examination & verification authority Connect, ensure that user audits authority and upgraded in time, be not in hysteresis or the omission for auditing authority renewal, do not interfere with enterprise Normal operation, the risk of confidential information leakage is also evaded.
Leave office and illustrate:User-association role corresponding to employee Zhang San " direct labor 1 ", when Zhang San leaves office, system manager Directly cancel user corresponding to Zhang San and " this role's of direct labor 1 " associates, then Zhang San loses the " phase of direct labor 1 " automatically The examination & verification authority answered, avoid auditing authority handing-over hysteresis so that Zhang San still has the examination & verification of some confidential information and the power of checking after leaving office Limit, causes related confidential information to be leaked to Zhang San;When new registration employee Li Si takes over the work of Zhang San, directly allow corresponding to Li Si " direct labor 1 ", then Li Si has automatically obtained " audits authority, without again to user-association corresponding to this role of direct labor 1 " Examination & verification authority is reset for Li Si, it is simple and quick, greatly reduce workload.
Transfer-position is illustrated:Employee Zhang San will be from production department's transfer-position to portion after sale, and system manager cancels user corresponding to Zhang San " direct labor's 1 " associates, then is associated with the new role in portion after sale " after-sale service personnel 3 ", Zhang San then obtain automatically with former role " examination & verification authority corresponding to this role of after-sale service personnel 3 " is obtained.
Below to carrying out authorizing possessed advantage to analyze to user by independent individual property role:
User is defined the competence by it with associating for role, if to change the authority of user, is possessed by adjusting role Authority changes the purpose for being associated with the authority of the user of the role to reach.User is not authorized directly, but closed by it The role of connection authorizes to user, and after user-association role, the user just has the examination & verification authority of the role.
Role is one-to-one to the relation of user(When the role is with a user-association, other users can not then associate again The role;If the role by user-association, can not select to associate by other users;The i.e. same period, role can and Can only be by a user-association).User is one-to-many to the relation of role(One user can associate multiple roles simultaneously).
The definition of role:Role is without the property such as group/class/classification/post/position/work post, but non-set Property, role have uniqueness, and role is self-existent independent individual;Equivalent to post number in enterprises and institutions apply (The non-post in post number herein, a post may have multiple employees simultaneously, and one post number of same period can only correspond to one Individual employee).
Citing:Following role can be created in some Corporation system:General manager, vice general manager 1, vice general manager 2, Beijing sale One manager, Beijing sell two manager, Beijing sell three managers, Shanghai sales engineer 1, Shanghai sales engineer 2, on Extra large sales engineer 3, Shanghai sales engineer 4, Shanghai sales engineer 5 ...
User and the incidence relation of role:The said firm vice general manager 2 if the said firm employee Zhang San holds a post, while Beijing sale of holding a post One manager, the then role that Zhang San needs to associate sell a manager for vice general manager 2 and Beijing, and Zhang San has the two angles The authority of color.
The concept of traditional role is group/class/post/position/work post property, and a role can correspond to multiple users.And The concept of the application " role " is equivalent to post number/station number, the role being also analogous in movie and television play:One role is the same as the moment Section(Childhood, juvenile, middle age ...)It can only be played by a performer, and a performer may divide decorations polygonal.
After role is created, can during user is created association role, can also user create after the completion of It is associated at any time.The incidence relation with role can be released after user-association role at any time, can also establish at any time and other The incidence relation of role.
The composition of the role is:Numbered in post name+hilllock.Such as:Workshop Production worker 1, Workshop Production worker 2, car Between direct labor 3 ... role be independent individual, equivalent to post number, the concept of station number, different from traditional rights management body Role in system, the concept of role is group/class property of post/position/work post etc. in traditional system.
After the employee Zhang San that illustrates below enters certain company, the relation between employee, user and role is:
1st, new registration:The new registration of employee, it is directly the user(Employee)The role of corresponding post number/station number is selected to be closed Connection, example:Zhang San's registration company(Company is that Zhang San is assigned with a Zhang San user), action is in sale one, is born Blame the sale of Beijing Area's refrigerator product(Corresponding role is sale one subordinate " this role of sales engineer 5 "), then open Three users directly select " this role association of sales engineer 5 ".
2nd, position is increased:Zhang San worked after a period of time, and company also arranges Zhang San to be responsible for the pin of Beijing Area's tv product Sell(Corresponding role is sale one subordinate " this role of sales engineer 8 ")And hold a concurrent post portion supervisor after sale(Corresponding portion after sale It is responsible for 1 this role), then Zhang San user be further added by association sale one subordinate " sales engineer 8 " and after sale subordinate " after sale Portion is responsible for 1 " the two roles, and now, Zhang San employee is associated with three roles, respectively sells the " sales engineer of a subordinate 5 ", " sales engineer 8 " and after sale subordinate " after sale portion supervisor 1 ", Zhang San user then has the authority of these three roles.
3rd, position is reduced:A period of time has been spent again, and company determines to allow Zhang San's tenure portion after sale to handle(Corresponding subordinate after sale " portion manager after sale " this role), and no longer hold a concurrent post other work.Then Zhang San's user-association subordinate after sale " portion manager after sale " this Individual role, while cancel three roles associated before this(Sell " sales engineer 5 ", " sales engineer 8 " and selling for a subordinate " portion supervisor 1 " after sale under rear portion), now, Zhang San user only possesses the authority of subordinate " portion manager after sale " this role after sale.
4th, the adjustment of role-security(The adjustment of the authority possessed for role in itself):As company determines increase portion after sale The authority of manager, then it need to only increase the mandate that this role is handled to portion after sale, then Zhang San user is because portion handles after sale The authority of this role adds, and the authority of Zhang San user also increases.
5th, leave office:After 1 year, Zhang San leaves office, then cancels Zhang San user and subordinate " portion manager after sale " this role after sale Association.
Citing:Company is in dynamic manage, and the registration of office worker, leaving office often persistently occurs, but post number/station Number change it is considerably less (or even not changing over a period to come).
Classical authorization method:In the case of more than systemic-function point, authorized with the role of traditional group/class property, Not only authorize workload big, it is numerous and diverse, and error-prone, or even malfunctioned and be all not easy to find in a short time, it is easily right System user causes damage.
The application authorization method:The application is that the role of post number/station property is authorized, user-association role And define the competence, then to the control of user right, realized simply by the incidence relation of simple user-role, allow authority Control becomes simple, easy to operate, clear, is greatly improved and authorizes efficiency and mandate reliability.
【Embodiment 2】As shown in fig. 6, to modification/deletion form data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;If unblock is by the way that the form data still maintains the original state;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
After initiating unblock application, lock task is just known about, unblock person can agree or disagree with unblock application, agree to, number According to just be released state, data can be modified, deleted etc. operates;Disagreeing, data are still the state that examination & verification passes through, For actual data.
List actual data is:
1st, the form data that need not be audited/examine is exactly actual data after submitting;
2nd, the form data audited is needed, by turning into actual data after examination & verification;
3rd, the form data examined is needed, by turning into actual data after examination & approval.
Have to the form data and check the user of authority, or with checking authority and user with modification authority can Unblock application is submitted, is unlocked by the unblock person for having unblock authority.
Unblock application function is present embodiments provided, the actual data for the list that needs are audited, is if desired modified Or delete and apply, it is necessary to submit and unlock, it is unlocked by the unblock person for having this form data unblock authority, in traditional examination & verification Application is not unlocked, the form data unlocked by the needs of examination & verification is solved by the unblock person with unblock authority Lock.
The benefit of unblock application function:
1. reducing the workload of unblock person, unblock person is allowed clearly to know there is which unblock demand;
2. an interactive mode is built for unblock demander and unblock person:
Citing:There is the people of sales force 1000 in enterprise, wherein only 8 people have unblock authority, if not unlocking application function, and someone Need to unlock certain list actual data, then unblock person's any bar form data can only be informed by modes such as phone or instant messagings Need to unlock, unblock person learns that find this form data after information is unlocked again, then:
A, the form data for needing to unlock is linked up and searched with unblock demander, can largely increase the workload of unblock person With cumbersome degree;
B, linked up by modes such as phone or instant messagings, it is easy to occur understanding deviation in information exchanging process, cause mistake By mistake, or unblock person learn after information may not timely processing, or even forget, then unblock can be caused to lag;
C, releasing process can not record unblock demander, unblock demand proposes the information such as time, unlock no related foundation, occur Problem is difficult to call to account.
The unblock application function that the present embodiment provides can solve the above problems well.
【Embodiment 3】When one, which is audited request, there are multiple auditors, auditing result is drawn according to default auditing rule.
Specifically, described auditing rule can be:Made with the audit opinion of first auditor for providing audit opinion For auditing result, as long as there is any one auditor to give audit opinion, examination & verification terminates.
As long as there is any one auditor to have submitted audit opinion, auditing result is determined that, examination & verification terminates, other examination & verifications The examination & verification task of person is removed automatically, realizes efficient, quick examination & verification.Especially suitable for examination & verification of more people to same examination & verification task Authority is identical, and anyone can determine the situation of auditing result.
Can be:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " agree to/pass through ", Then auditing result is " agree to/pass through ", as long as there is the audit opinion that any one auditor gives " agree to/pass through ", examination & verification Terminate.
Can be:In multiple auditors, if the audit opinion for thering is any one auditor to provide be " disagree/it is obstructed Cross ", then auditing result is " disagree/do not pass through ", as long as there is any one auditor to give examining for " disagreeing/do not pass through " Core opinion, examination & verification terminate.
The application auditing rule can customize, such as:As long as someone by then by, must unanimous vote by could by, Must more than half by could by, must be 2/3rds above by could pass through etc..For enterprise's form data operation Examination & verification provides a kind of examination & verification mode flexibly, applicable, easy to use, especially suitable for needing the situation of progress democratic decision-making.
【Embodiment 4】The checking method of form data operation, comprises the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See;
Described form data operation includes the modification or deletion to form data, to modification/deletion form data, in addition to The step of one unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;If unblock is by the way that the form data still maintains the original state;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
Described above is only the preferred embodiment of the present invention, it should be understood that the present invention is not limited to described herein Form, the exclusion to other embodiment is not to be taken as, and can be used for various other combinations, modification and environment, and can be at this In the text contemplated scope, it is modified by the technology or knowledge of above-mentioned teaching or association area.And those skilled in the art are entered Capable change and change does not depart from the spirit and scope of the present invention, then all should be in the protection domain of appended claims of the present invention It is interior.

Claims (10)

1. the checking method of form data operation, it is characterised in that comprise the following steps:
Role in establishment system, described role are independent individuals, rather than group/class, same one role of period can only close Join unique user, and a user-association one or more role;
One or more of selection system role is the behaviour that each auditor authorizes its form data having as auditor The examination & verification authority of work;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See.
2. the checking method of form data operation according to claim 1, it is characterised in that:Described audit opinion includes Agree to/by, disagree/do not pass through.
3. the checking method of form data operation according to claim 1, it is characterised in that:The behaviour of described form data Make to include to any one in the newly-increased of form data, modification and deletion.
4. the checking method of form data operation according to claim 3, it is characterised in that:To modification/deletion list Data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
5. the checking method of form data operation according to claim 1, it is characterised in that:If user needs transfer-position, Also include user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
6. the checking method of form data operation according to claim 1, it is characterised in that:Also pass through list including one The step of examination & verification authority of the operation of the form data for the list that the field value mandate auditor of field has, the list word The field value selection of section is determined or automatically determined.
7. the checking method of form data operation according to claim 1, it is characterised in that:When one audit request have it is more During individual auditor, auditing result is drawn according to default auditing rule.
8. the checking method of form data operation according to claim 7, it is characterised in that:Described auditing rule is: The audit opinion for the auditor for providing audit opinion using first is as auditing result, as long as there is any one auditor to give Audit opinion, examination & verification terminate.
9. the checking method of form data operation according to claim 7, it is characterised in that:Described auditing rule is: In multiple auditors, as long as the audit opinion for having any one auditor to provide is " agree to/pass through ", then auditing result is " same Anticipate/pass through ", as long as there is the audit opinion that any one auditor gives " agree to/pass through ", examination & verification terminates;It is or, described Auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " disagree/do not pass through ", Then auditing result is " disagree/do not pass through ", as long as there is the examination & verification meaning that any one auditor gives " disagree/do not pass through " See, examination & verification terminates.
10. the checking method of form data operation, it is characterised in that comprise the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning See;
The operation of described form data includes modification or deletion to form data, to modification/deletion form data, also wraps The step of including a unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
CN201710682789.7A 2017-08-10 2017-08-10 The checking method of form data operation Pending CN107464098A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201710682789.7A CN107464098A (en) 2017-08-10 2017-08-10 The checking method of form data operation
CN201810904691.6A CN109086627B (en) 2017-08-10 2018-08-09 Form data operation auditing method
PCT/CN2018/099769 WO2019029650A1 (en) 2017-08-10 2018-08-09 Form data operation auditing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710682789.7A CN107464098A (en) 2017-08-10 2017-08-10 The checking method of form data operation

Publications (1)

Publication Number Publication Date
CN107464098A true CN107464098A (en) 2017-12-12

Family

ID=60547597

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710682789.7A Pending CN107464098A (en) 2017-08-10 2017-08-10 The checking method of form data operation
CN201810904691.6A Active CN109086627B (en) 2017-08-10 2018-08-09 Form data operation auditing method

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810904691.6A Active CN109086627B (en) 2017-08-10 2018-08-09 Form data operation auditing method

Country Status (2)

Country Link
CN (2) CN107464098A (en)
WO (1) WO2019029650A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958551A (en) * 2017-12-29 2018-04-24 福建省农村信用社联合社 A kind of full channel remote centralized authoring system of the expansible bank of business
WO2019029650A1 (en) * 2017-08-10 2019-02-14 成都牵牛草信息技术有限公司 Form data operation auditing method
CN109741004A (en) * 2018-11-30 2019-05-10 航天信息股份有限公司 Request slip checking method, device, storage medium and electronic equipment
CN110276205A (en) * 2019-06-06 2019-09-24 深圳市杰科数码有限公司 Product ID document generating method, system, electronic device and storage medium
CN110990856A (en) * 2019-12-06 2020-04-10 广东联晟通信科技有限公司 Authority auditing method and system
CN111340454A (en) * 2020-03-04 2020-06-26 山信软件股份有限公司 Enterprise homework certificate safety management method
CN111861357A (en) * 2019-06-17 2020-10-30 北京嘀嘀无限科技发展有限公司 Authority information processing method and system, computer device and storage medium
CN112488652A (en) * 2020-11-30 2021-03-12 乐刷科技有限公司 Work order auditing method, system, terminal and storage medium
CN112950162A (en) * 2020-07-09 2021-06-11 北京中百信信息技术股份有限公司 Information system engineering supervision work distribution management information system
CN113269525A (en) * 2021-05-24 2021-08-17 山东浪潮商用系统有限公司 Countersigning management method for workflow
CN113723769A (en) * 2021-08-11 2021-11-30 中核武汉核电运行技术股份有限公司 Contractor authorization device and method for power plant
CN115239292A (en) * 2022-07-21 2022-10-25 北京铭研医药研究有限公司 Information processing method and system for medicine research and development and production verification

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992980B (en) * 2019-04-04 2022-12-27 浪潮通用软件有限公司 User authority multi-model management method
CN110427750A (en) * 2019-07-23 2019-11-08 武汉宏途科技有限公司 A kind of method and system carrying out the control of list permission by permission combination
CN111538748A (en) * 2020-04-30 2020-08-14 中国银行股份有限公司 Service page modification method and device
CN111598542A (en) * 2020-05-21 2020-08-28 贵州普致丰科技有限公司 Electric power production project archive management system stored according to progress
CN111507853B (en) * 2020-06-02 2023-04-07 泰康保险集团股份有限公司 Group insurance policy and insurance data processing method and device
CN111815273A (en) * 2020-07-03 2020-10-23 远光软件股份有限公司 Configuration method of document approval process, storage medium and electronic equipment
CN113065853A (en) * 2021-04-12 2021-07-02 北京嘀嘀无限科技发展有限公司 Data auditing method, equipment, storage medium and computer program product
CN113723914A (en) * 2021-08-11 2021-11-30 中核武汉核电运行技术股份有限公司 Personnel post authorization device and method for power plant

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630385A (en) * 2009-07-31 2010-01-20 福州星网视易信息系统有限公司 Implementation method for realizing multistage auditing workflow function by simple configuration items
CN102194152B (en) * 2010-03-12 2016-01-20 新奥特(北京)视频技术有限公司 Authority control method in a kind of audit service process and device
US9281012B2 (en) * 2010-03-30 2016-03-08 Itxc Ip Holdings S.A.R.L. Metadata role-based view generation in multimedia editing systems and methods therefor
JP5814639B2 (en) * 2011-06-09 2015-11-17 キヤノン株式会社 Cloud system, cloud service license management method, and program
CN102316216A (en) * 2011-09-07 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Terminal adaptive role method and terminal thereof
US20140258226A1 (en) * 2013-03-11 2014-09-11 Southpaw Technology, Inc. Asynchronous transaction management, systems and methods
CN104463005A (en) * 2013-09-25 2015-03-25 天津书生投资有限公司 Method for controlling access permissions of electronic document
CN104484617B (en) * 2014-12-05 2017-09-26 中国航空工业集团公司第六三一研究所 A kind of Access and control strategy of database method based on many strategy fusions
CN105184144B (en) * 2015-07-31 2018-07-10 上海玖道信息科技股份有限公司 A kind of multisystem right management method
CN105046438A (en) * 2015-07-31 2015-11-11 长威信息科技发展股份有限公司 Customized process configuration office system based on visible process configuration
CN106485388A (en) * 2015-09-01 2017-03-08 北京奇虎科技有限公司 The right management method of business approval system and device
CN105303084A (en) * 2015-09-24 2016-02-03 北京奇虎科技有限公司 Privilege management system and method
CN106204258A (en) * 2016-07-22 2016-12-07 福建节点信息科技有限公司 A kind of business capital risk moves managing and control system and management-control method
CN106407717A (en) * 2016-10-24 2017-02-15 深圳市前海安测信息技术有限公司 System and method of verifying electronic signature of electronic medical record in medical information system
CN106779619B (en) * 2016-12-30 2024-02-02 全民互联科技(天津)有限公司 Auditing and signing method and system for perfecting business approval
CN107464098A (en) * 2017-08-10 2017-12-12 成都牵牛草信息技术有限公司 The checking method of form data operation

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019029650A1 (en) * 2017-08-10 2019-02-14 成都牵牛草信息技术有限公司 Form data operation auditing method
CN107958551A (en) * 2017-12-29 2018-04-24 福建省农村信用社联合社 A kind of full channel remote centralized authoring system of the expansible bank of business
CN109741004A (en) * 2018-11-30 2019-05-10 航天信息股份有限公司 Request slip checking method, device, storage medium and electronic equipment
CN110276205B (en) * 2019-06-06 2021-06-15 深圳市杰科数码有限公司 Method and system for generating product serial number file, electronic device and storage medium
CN110276205A (en) * 2019-06-06 2019-09-24 深圳市杰科数码有限公司 Product ID document generating method, system, electronic device and storage medium
CN111861357A (en) * 2019-06-17 2020-10-30 北京嘀嘀无限科技发展有限公司 Authority information processing method and system, computer device and storage medium
CN111861357B (en) * 2019-06-17 2024-04-26 北京嘀嘀无限科技发展有限公司 Authority information processing method and system, computer equipment and storage medium
CN110990856A (en) * 2019-12-06 2020-04-10 广东联晟通信科技有限公司 Authority auditing method and system
CN111340454A (en) * 2020-03-04 2020-06-26 山信软件股份有限公司 Enterprise homework certificate safety management method
CN112950162A (en) * 2020-07-09 2021-06-11 北京中百信信息技术股份有限公司 Information system engineering supervision work distribution management information system
CN112950162B (en) * 2020-07-09 2022-04-29 北京中百信信息技术股份有限公司 Information system engineering supervision work distribution management information system
CN112488652A (en) * 2020-11-30 2021-03-12 乐刷科技有限公司 Work order auditing method, system, terminal and storage medium
CN112488652B (en) * 2020-11-30 2024-05-10 乐刷科技有限公司 Work order auditing method, system, terminal and storage medium
CN113269525A (en) * 2021-05-24 2021-08-17 山东浪潮商用系统有限公司 Countersigning management method for workflow
CN113723769A (en) * 2021-08-11 2021-11-30 中核武汉核电运行技术股份有限公司 Contractor authorization device and method for power plant
CN115239292A (en) * 2022-07-21 2022-10-25 北京铭研医药研究有限公司 Information processing method and system for medicine research and development and production verification

Also Published As

Publication number Publication date
CN109086627A (en) 2018-12-25
CN109086627B (en) 2021-11-16
WO2019029650A1 (en) 2019-02-14

Similar Documents

Publication Publication Date Title
CN107464098A (en) The checking method of form data operation
CN108694557A (en) The setting method of the form fields operating right of workflow and its approval node
CN107180334A (en) Based role is to the man-to-man Work-flow control method and system of user
CN108984715A (en) Based on the method according to field setting approval process
CN108805532A (en) The efficient measures and procedures for the examination and approval of workflow approval node
CN108764691A (en) Setting method based on the approval node of countersign in approval process
CN107315931A (en) Form field values operating right authorization method
CN107146072A (en) The method that workflow approval node based on form fields sets examination & approval role
CN108550029B (en) Method for setting approval roles according to department levels by workflow approval nodes
CN109214150A (en) The list operating right authorization method of based role
CN108764833A (en) The method that workflow approval node examines role by Department formation
CN107045675A (en) The method that workflow approval node is set examination & approval role by role
CN108694560A (en) Setting method based on the approval node of ballot in approval process
CN109032458A (en) The authorization method for the form data that based role obtains
CN107480544A (en) Count list operation permission grant method
CN108898317A (en) The method that list operating right is authorized respectively according to form field values
CN108876313A (en) Setting method of the user in the permission of information interchange unit in system
CN107480948A (en) Approver is directed to the method that examination & approval task seeks the opinion of advisory opinion
CN107480557A (en) Show the authorization method of all system user current entitlement states
CN107480512A (en) Examination & approval task based on modified RBAC mechanism of authorization control delivers method
CN109032459A (en) A kind of form data operating right authorization method
CN107392499A (en) Approval process and its method for approval node mandate are carried out to user
CN107292580A (en) The commission of examination and approval workflow and its recommit method
CN108958870A (en) shortcut function setting method
CN107480556A (en) The method authorized respectively to statistics list operation authority based on train value

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171212