CN107464098A - The checking method of form data operation - Google Patents
The checking method of form data operation Download PDFInfo
- Publication number
- CN107464098A CN107464098A CN201710682789.7A CN201710682789A CN107464098A CN 107464098 A CN107464098 A CN 107464098A CN 201710682789 A CN201710682789 A CN 201710682789A CN 107464098 A CN107464098 A CN 107464098A
- Authority
- CN
- China
- Prior art keywords
- examination
- form data
- verification
- role
- auditor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- General Engineering & Computer Science (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of checking method of form data operation, including:Role in establishment system, role are independent individuals, and same one role of period can only associate unique user, a user-association one or more role;One or more of selection system role authorizes the examination & verification authority of the operation of its form data having for each auditor as auditor;Examination & verification claimant submits the examination & verification request of certain operation of some form data;Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data.A present invention examination & verification only examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task terminates, and without visioning procedure, shortens the Review Cycle of form data operation.Auditor uses the role of independent individual property, in labor turnover, transfer-position, can realize the seamless handover of examination & verification authority, not interfere with enterprise's normal operation, also evade the risk of confidential information leakage.
Description
Technical field
The present invention relates to the checking method that form data in the management softwares such as ERP, CRM operates.
Background technology
Access control based roles(RBAC)It is a kind of data base authority pipe that Recent study is most, thought is most ripe
Reason mechanism, it is considered as to substitute traditional forced symmetric centralization(MAC)And self contained navigation(DAC)Ideal candidates.Pass
The flexibility of the self contained navigation of system is high but security is low, and forced symmetric centralization is safe but limitation is too strong;It is based on
Both access controls of role have concurrently, are not only easy to manage and reduce complexity, cost and the probability to make a mistake, thus
Great development has been obtained in recent years.Access control based roles(RBAC)Basic thought be according in business organization's view
Different functional posies divides different roles, the access rights of database resource is encapsulated in role, user is by being assigned
Different roles is given to carry out dereference database resource.
Substantial amounts of table and view are often all had in large-scale application system, this causes management to database resource and awarded
Adaptability in tactics obtains sufficiently complex.The access and receiving and grant for authority that database resource is directly managed by user are very difficult, and it needs
Understanding of the user to database structure is very thorough, and is familiar with the use of sql like language, once and application system structure or peace
Full demand has changed, and will carry out large amount of complex and cumbersome mandate changes, and is very easy to occur some and unexpected awards
Security breaches caused by power error.Therefore, for large-scale applied system design one kind is simple, efficient right management method into
For system and the common requirements of system user.
The mechanism of authorization control of based role can carry out simple, efficient management to the access rights of system, greatly
The burden and cost of System right management are reduced, and causes System right management to more conform to the service management of application system
Specification.
However, the user authority management of traditional based role uses the relation mechanism of " role is one-to-many to user ", its
" role " is group/class property, i.e. a role can correspond to/associate multiple users simultaneously, and role is similar to post/position/work
Kind etc. concept, the mandate under this relation mechanism to user right be divided into following three kinds of forms substantially:
1st, as shown in figure 1, directly being authorized to user, shortcoming is big workload, frequent operation and trouble;Changed when employee occurs
(Such as transfer-position, leave office), all permissions that the employee is related to have to be adjusted accordingly, especially for company management people
Member, the authority that it is related to is more, and the workload of authority adjustment is big, numerous and diverse, easily error or omission, influences the normal fortune of enterprise
Battalion, or even cause the loss that can not be estimated.
2nd, as shown in Fig. 2 to role(Class/group/post/work post property)Authorized(One role can associate multiple
User), for user by role's acquisition authority, permission grant main body is group/class property role;
3rd, as shown in figure 3, both the above mode combines.
In statement above, 2,3 are required to authorize the role of class/group property, and pass through class/group/post/work post
The mode that the role of property is authorized has the disadvantage that:
1st, operation when user right changes is difficult:During the system use of reality, often because being needed during operation
The authority of user is adjusted, such as:When handling the change of employee's authority, some employee's authority of role association becomes
Change, we can not change the authority of whole role because of the change of indivedual employee's authorities, because the role is also associated with other
The unchanged employee of authority.Therefore in order to tackle this kind of situation, otherwise new role is created to meet employee that the authority changes,
The employee is directly authorized according to authority demand(Depart from role).Both the above processing mode, it is more in role-security
In the case of to role authorization not only the time required to it is long, and easily make a mistake, user operates cumbersome and trouble, also easily goes out
Mistake causes the loss to system user.
When the list operating right of employee/user changes, otherwise employee/user departs from role, otherwise newly-increased role
To meet job requirement.The defects of the defects of first way, is with above-mentioned " directly being authorized to user " mode.The second way, newly
Increase role to be just related to the newly-built of role, association, authorize work, especially role is more, user of role association also more situation
Under, it is difficult to remember which user role, which is specifically associated with,.
2nd, to remember that the concrete power limit that role includes is difficult for a long time:If the privilege feature point of role is relatively more, the time one is grown, very
Difficulty remembers the concrete power limit of role, it more difficult to remembers the authority difference between role similar in authority, the authority of close role is also very
Easily obscure;To associate new user, can not accurate judgement how should to select to associate.
3rd, because user right changes, then role can be caused to create more and more(If not creating new role, can significantly increase
Add the mandate directly to user), it more difficult to distinguish the specific difference of each role-security.
4th, during transfer-position, to by many individual authority distributions of transfer-position user other several users will be given to undertake, then when handling
It must will be made a distinction by these authorities of transfer-position user, create role again respectively to associate other several users, such behaviour
Make not only complicated and time consumption, and also easily making a mistake.
The difference of examination & verification and examination & approval:
1st, role is audited with examining the difference of role:It is to have permission the role audited to the data to audit role, is passed through
List mandate or data grant realize may have multiple roles all to be had permission to certain a data, it is only necessary to one of role
Examination & verification is completed, the examination & verification task just finishes;And it is the role set in approval process step to examine role, not particularly for which
Data, but for reaching the examination & approval task of the approval node, then the examination & approval role can examination & approval of the approval node, according to
The type of approval process, role examine completion and arrived next step or end(Single examination & approval), it is also possible to multiple roles
Seen after examination & approval and pass through number(Ballot), or all roles must submit suggestions made after examination(Countersign);
2nd, task is audited with examining the difference of task:
(1)The cancellation of task:
Examination & verification, it is to submit role to click on revocation submitting button when newly-increased, examination & verification task just cancels, and changes and is to have permission when deleting
Revocation examination & verification task can be clicked on by clicking on the role that revocation is submitted or revocation is deleted;It is all by flowing that the examination & approval of workflow examination and approval, which are cancelled,
Journey promoter cancels.
(2)The process of task:
Examination & verification, only one examination & verification step, is retracted, examination & verification task terminates once approving after examination by or disagreeing;
Examination & approval, be according to the approval process step of setting step by step establish task, after an approval process step performs
It is to agree to carry out in next step, still to disagree and return to a certain step, or which step of the execution is judged according to ballot situation,
Or agree to select to terminate to walk after passing through to next step, some last step after all role's expressions of opinion in step
Suddenly, the approval process is then terminated, the examination & approval task of data just calculates completion;In approval process, it is possible to before going to again
Certain process step(For example reject).
(3)Examination & verification can agree or disagree with, and must be just to agree to terminate at the end of approval process.
Also there is partial software that there is audit function on the market, but do not provide and disagree in the audit function of existing software
Auditing result function, only only signature agree to function, do not express and do not sign/disagreeing/function of not passing through, no
Rapidly unsanctioned auditing result can be fed back to examination & verification claimant in time.For submitter, in its data submitted not
The part passed through includes auditing result and is difficult to differentiate for the data not passed through and unauthorized data, submitter.
The content of the invention
It is right it is an object of the invention to overcome the deficiencies of the prior art and provide a kind of checking method of form data operation
In the form data for not needing numerous and diverse approval process, realize that the examination & verification that form data operates confirms with audit function, without creating
Flow, the workload of auditor/flow creator is reduced, shorten form data operation Review Cycle;Auditor is using only
The role of individual property is stood, in labor turnover, transfer-position, associates and is achieved that along band by the associating of user and role/cancellation
The switching and renewal of authority are audited, the seamless handover of examination & verification authority can be realized, ensures that user audits authority and upgraded in time,
Be not in hysteresis or the omission for auditing authority renewal, do not interfere with enterprise's normal operation, also evaded confidential information leakage
Risk.
The purpose of the present invention is achieved through the following technical solutions:The checking method of form data operation, including with
Lower step:
Role in establishment system, described role are independent individuals, rather than group/class, same one role of period can only close
Join unique user, and a user-association one or more role;
One or more of selection system role is the behaviour that each auditor authorizes its form data having as auditor
The examination & verification authority of work;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See.
Described audit opinion include agree to/by, disagree/do not pass through.
The operation of described form data is included to any one in the newly-increased of form data, modification and deletion.
To modification/deletion form data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
If user needs transfer-position, in addition to user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
The checking method of form data operation, in addition to field value mandate auditor by form fields have
The step of examination & verification authority of the operation of the form data of the list, the field value of the form fields is selection determination or automatic true
Fixed.
When one, which is audited request, there are multiple auditors, auditing result is drawn according to default auditing rule.
Described auditing rule is:The audit opinion for the auditor for providing audit opinion using first as auditing result,
As long as there is any one auditor to give audit opinion, examination & verification terminates.
Described auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " same
Anticipate/pass through ", then auditing result is " agree to/pass through ", as long as there is the examination & verification that any one auditor gives " agree to/pass through "
Opinion, examination & verification terminate.
Or, described auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is
" disagree/do not pass through ", then auditing result is " disagree/do not pass through ", as long as there have any one auditor to give to be " different
Anticipate/do not pass through " audit opinion, examination & verification i.e. terminate.
The checking method of form data operation, comprises the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See;
Described form data operation includes the modification or deletion to form data, to modification/deletion form data, in addition to
The step of one unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
The beneficial effects of the invention are as follows:
1)Examination & verification only one examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task i.e. terminate,
Form data for not needing numerous and diverse approval process, or need to examine and confirm but be not desired to create numerous and diverse approval process
Form data, realize that the examination & verification that form data operates confirms with audit function, without visioning procedure, reduce auditor/stream
The workload of journey creator, shorten the Review Cycle of form data operation.
2)Auditor uses the role of independent individual property, in labor turnover, transfer-position, passes through the pass of user and role
Connection/cancellation association is achieved that the switching and renewal of examination & verification authority along band, can realize the seamless handover of examination & verification authority, ensure to use
Family examination & verification authority is upgraded in time, is not in hysteresis or the omission for auditing authority renewal, is not interfered with enterprise's normal operation,
Also the risk of confidential information leakage has been evaded.
Leave office and illustrate:User-association role corresponding to employee Zhang San " direct labor 1 ", when Zhang San leaves office, system manager
Directly cancel user corresponding to Zhang San and " this role's of direct labor 1 " associates, then Zhang San loses the " phase of direct labor 1 " automatically
The examination & verification authority answered, avoid auditing authority handing-over hysteresis so that Zhang San still has the examination & verification of some confidential information and the power of checking after leaving office
Limit, causes related confidential information to be leaked to Zhang San;When new registration employee Li Si takes over the work of Zhang San, directly allow corresponding to Li Si
" direct labor 1 ", then Li Si has automatically obtained " audits authority, without again to user-association corresponding to this role of direct labor 1 "
Examination & verification authority is reset for Li Si, it is simple and quick, greatly reduce workload.
Transfer-position is illustrated:Employee Zhang San will be from production department's transfer-position to portion after sale, and system manager cancels user corresponding to Zhang San
" direct labor's 1 " associates, then is associated with the new role in portion after sale " after-sale service personnel 3 ", Zhang San then obtain automatically with former role
" examination & verification authority corresponding to this role of after-sale service personnel 3 " is obtained.
3)The present invention can provide agreement/by, disagree/auditing result not passed through, can be in time rapidly to examination & verification
Claimant feeds back auditing result, including auditing result to disagree/not passing through.
4)This application provides unblock to apply for function, the actual data for the list audited to needs, if desired modifies
Or delete and apply, it is necessary to submit and unlock, it is traditional by there is this form data unblock person for operating unblock authority to be unlocked
Without unblock application in examination & verification, the form data unlocked by the needs of examination & verification is entered by the unblock person with unblock authority
Row unblock.
The benefit of unblock application function:
1. reducing the workload of unblock person, unblock person is allowed clearly to know there is which unblock demand;
2. an interactive mode is built for unblock demander and unblock person:
Citing:There is the people of sales force 1000 in enterprise, wherein only 8 people have unblock authority, if not unlocking application function, and someone
Need to unlock certain list actual data, then unblock person's any bar form data can only be informed by modes such as phone or instant messagings
Need to unlock, unblock person learns that find this form data after information is unlocked again, then:
A, the form data for needing to unlock is linked up and searched with unblock demander, can largely increase the workload of unblock person
With cumbersome degree;
B, linked up by modes such as phone or instant messagings, it is easy to occur understanding deviation in information exchanging process, cause mistake
By mistake, or unblock person learn after information may not timely processing, or even forget, then unblock can be caused to lag;
C, releasing process can not record unblock demander, unblock demand proposes the information such as time, unlock no related foundation, occur
Problem is difficult to call to account.
The unblock application function that the application provides can solve the above problems well.
5)The application auditing rule can customize, such as:As long as someone by then by, must unanimous vote by that could lead to
Cross, must more than half by could by, must be 2/3rds above by could pass through etc..For enterprise form data behaviour
Make examination & verification and provide a kind of examination & verification mode flexibly, applicable, it is easy to use, especially suitable for needing the feelings of progress democratic decision-making
Condition.
The application auditing rule may be configured as:As long as there is any one auditor to have submitted audit opinion, examination & verification has been determined that
As a result, examination & verification terminates, and the examination & verification task of other auditors is removed automatically, realizes efficient, quick examination & verification.Especially suitable for more
People is identical to the examination & verification authority of same examination & verification task, and anyone can determine the situation of auditing result.
6)The application role is man-to-man relation to user, and same one role of period can only associate unique user,
One user-association one or more role, advantage of this is that, all no longer need to be allocated when creating user every time
The operation of authority, if role is associated a user to, and also the permission modification of role is than the user right in traditional mechanism
Much less is wanted in change.Independent volume property(Post number/station property)Role's number change it is small, although employee turnover is big,
The change of post number/station number is small(Do not change within certain period even, i.e., role does not change), so will be very big
Simplify the rights management of user, reduce the expense of system.
7)Simple to operate, the efficiency high of dynamic management, registration transfer-position etc., reliability are high:Registration/leaving office/transfer-position exists
Application in rights management is simple, does not have to reset authority when employee/user changes, user only need to cancel or associate
Role:The user of the role of no longer holding a post just cancels the role association, and catcher is held a post user-association post of the role
Number role, the user for associating the role just obtains the examination & verification authority of the role automatically, without being authorized again to role,
Drastically increase efficiency, the safety and reliability of system setting.
Citing:Because Zhang San user leaves office or the reason such as transfer-position, Zhang San no longer do " work of this role of purchasing agent 3 ", then
By Zhang San cancel with " purchasing agent's 3 " associates;Other Li Si's catcher does that " work of this role of purchasing agent 3 ", only need to be by Li Si
The role is associated, then Li Si has automatically obtained " the examination & verification authority of this role of purchasing agent 3 ".
8)Role definition is that property, the roles such as group, work post, class are one-to-many to user by traditional rights management mechanism
Relation, during the system use of reality, because being frequently necessary to be adjusted the authority of user during operation, than
Such as:When the change of employee's authority is handled, the authority of some employee of role association changes, and we can not be indivedual because of this
The change of employee's authority and change the authority of whole role because the role is also associated with the unchanged employee of other authorities.Therefore
In order to tackle this kind of situation, otherwise new role is created to meet employee that the authority changes, or to the employee according to power
Limit demand directly authorizes(Depart from role).Both the above processing mode, in the case where role-security is more to role authorization not
Long the time required to only, and easily make a mistake, user operates cumbersome and trouble, and also easily error causes to system user
Loss.
But under the present processes, because role is an independent individual, then it can select to change role-security i.e.
It can reach purpose.The present processes, while it seem that workload can be increased in system initialization, but duplication etc. can be passed through
Method, the efficiency of its establishment role or mandate is set to be higher than the role of traditional group/class property, because not having to consideration group/class property angle
Intercommunity of the color when meeting association user, application scheme can allow priority assignation clear, understand;Especially one is used in system
After the section time(User/role-security dynamic change), this application scheme can be that system user is increased substantially in system use
Rights management efficiency, make dynamic authorization simpler, be more convenient, it is apparent, clear, improve the efficiency of priority assignation and reliable
Property.
9)The role authorization method of traditional group/class property easily malfunctions, and the application method, which significantly reduces, authorizes error
Probability, because the application method need to only be considered as the role of independent individual, and without considering to associate this group of property under conventional method
Which intercommunity multiple users of matter role have.Even if error is authorized, also only influence is associated with that user of the role, and
Tradition can then influence to be associated with all users of the role with the role of group property.Even if there is permission grant mistake, the application
Modification method is simple, the time is short, and tradition during role's repairing lookup error of group property to need to consider to be associated with the role's
The authority intercommunity of all users, not only modification trouble, complicated, very easy error, and much in the case of more than function point
In the case of can only newly create role and could solve.
10)In tradition using group as under the role authorization method of property, if the privilege feature point of role is relatively more, the time one
It is long, it is difficult to remember the concrete power limit of role, it more difficult to the authority difference between role similar in authority is remembered, to associate new use
Family, can not accurate judgement how should to select to associate.The role of the application method inherently has the property of post number/station number
Matter, select very clear.
11)During transfer-position, to by many individual authority distributions of transfer-position user other several users will be given to undertake, then when handling
It must will be made a distinction by these authorities of transfer-position user, create role again respectively to associate other several users, such behaviour
Make not only complicated and time consumption, and also easily making a mistake.
The application method is then:Several roles by transfer-position user-association, in transfer-position, cancel user and former department first
The association of interior role(These roles being cancelled can be associated to other users again), then by user and new department
Interior role is associated.It is simple to operate, it will not malfunction.
Brief description of the drawings
Fig. 1 is the schematic diagram that system is directly authorized to user in background technology;
Fig. 2 is the schematic diagram that system is authorized to group/class property role in background technology;
Fig. 3 is the schematic diagram that system of users is directly authorized and is combined to group/class property role authorization in background technology;
Fig. 4 is the schematic diagram that present system is authorized by independent individual property role to user;
Fig. 5 is checking method flow chart of the present invention;
Fig. 6 is present invention unblock application flow chart.
Embodiment
Technical scheme is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to
It is as described below.
【Embodiment 1】As shown in figure 5, the checking method of form data operation, comprises the following steps:
Role in establishment system, as shown in figure 4, described role is independent individual, rather than group/class, the same period one
Role can only associate unique user, and a user-association one or more role;When role creates or after role's establishment
For one department of the role selecting, then the role belongs to the department, and role is authorized according to the action of role, and
The title of the role is unique under the department, and the numbering of the role is unique in systems;The corresponding employee of one user, one
The corresponding user of employee, employee are defined the competence by the role of its corresponding user-association.
One or more of selection system role authorizes the form data that it has as auditor for each auditor
Operation examination & verification authority(As each auditor authorizes it to have the examination & verification authority of which operation of which form data);
Audit claimant(It can be employee, user, group/class property role, independent individual property role etc. to audit claimant)Carry
Hand over the examination & verification request of certain operation of some form data;The operation of described form data include to form data it is newly-increased,
Modification, delete;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See.
Need to audit for example, customer table list is provided with deletion, auditor role 1 has the deletion of the client of Software Industry
Authority is audited, then Zhang San will delete the examination & verification request submitted during client " company of Yongyou Software " and be audited by role 1.
Needing to audit for example, customer table list is provided with deletion, auditor role 1 has the examination & verification authority of the deletion of client,
Then every examination & verification request for deleting client's submission is all audited by role 1.
For example, customer table list is provided with newly-increased, modification, deletes to need to audit, auditor role 1 have client it is newly-increased,
Modification, the examination & verification authority deleted, then the examination & verification request that every newly-increased, modification, deletion client submit all are audited by role 1.
Need to audit for example, sales order list is provided with modification, auditor role A has " role B, role C, role
The examination & verification authority of the modification of D " sales order data, then present role B have modified Changhong electrical equipment sales order, role C modifications
The sales order of application software, role C have modified the sales order of Wanda building constructor, then role A B C have modified this
Three sales orders and after submitting/preserving, modification of the role A cans to these three orders is audited.
Further, examination & verification claimant can also once submit the examination & verification request of certain operation of multiple form datas, by
The auditor for having the examination & verification authority of the corresponding form data operation is audited.
Further, the checking method of form data operation, in addition to one examined by the field value mandate of form fields
The step of examination & verification authority of the operation of the form data for the list that core person has, the field value of the form fields are true for selection
It is fixed(The field value of field client's industry of such as client's list has manufacture, finance, aviation industry option to operate person by list
Select, the field value of the field contract signing people of such as contract list has Zhang San, Li Si, the company personnel's option of king five to be operated by list
People selects, these field values be it is unartificial fill in, but the field value obtained by selection mode, also such as contract list
City, contract signing department, contract responsible organization, contract execution director, contract are responsible for angle where field contract rank, client
The field value of the fields such as color is also selection)Or automatically determine(Field value such as the field founder of client's list has Zhang San, Lee
4th, company personnel's option such as king five, but when the client creates, the value of founder is to obtain current operator automatically as wound
People is built, it is also in this way, the field value of this kind of field is according to list to record one, the single role of system, the field value of making the field such as one
Dependency rule automatically determines)'s.
Need to audit for example, contracts card list is provided with deletion, Zhang San once have submitted 5 contracts(On contract list, it is responsible for
It is sale one that the field value of Department field, which has 3, and it is sale two to have 2)Deletion examination & verification request, the examination & verification of role 1
Authority is:The field value of the responsible organization field of contract list is the examination & verification of the deletion of sale one;The examination & verification authority of role 2
It is:The field value of the responsible organization field of contract list is the examination & verification of the deletion of sale two.Then role 1 can only audit responsible portion
For the field value of door field to sell the deletion examination & verification request of 3 contracts of one, role 2 can only audit the word of responsible organization field
Segment value is asked to sell the deletion examination & verification of 2 contracts of two.
Examination & verification is exactly visa, is the need for auditing authority when the operation of some form data can not come into force
Auditor confirms to use the examination & verification of form data operation during this operation.
Audit authority:The examination & verification for having which data of which list by list authorization to control which auditor is weighed
(examination & verification permission grant mode can be designed as limit:Such as, have the examination & verification authority of certain data, then have the newly-increased examination & verification of this data/
This several authorities are audited in modification examination & verification/deletion examination & verification/unblock;Such as, may be designed in newly-increased examination & verification/modification of this data
Examination & verification is overall to be authorized, and independent authorization is audited by deleting;Such as, it is also designed to this several authority carrying out independent authorization respectively).
Approve after examination/come into force by the operation for the form data that expresses one's approval, operation, examination & verification disagree/do not pass through expression
The operation, the state that data are returned to before the examination & verification are not approved:
Need to set which list to need to audit, the list be arranged to certain operation need examination & verification when, then carrying out the list
Just audited during the operation of form data, otherwise need not be audited.
A. examination & verification is increased newly:Data turn into actual data after agreement, disagree state or grass that data are changed into before newly-increased examination & verification
Original text state;
B. modification examination & verification:Data turn into actual data after agreement, disagree data and are changed into released state;
C. examination & verification is deleted:Data are deleted after agreement, are disagreed data and are changed into released state;
D. unblock examination & verification:Data are changed into released state after agreement, disagree data and become again as actual data state.
The setting of examination & verification:
A. if newly-increased require examination & verification, then modification must just be audited;, whereas if modification requires examination & verification, it is newly-increased to examine
Core;
B. if newly-increased either modification has the requirement of examination & verification or examination & approval, then deletion all necessarily requires to audit;
C. it can increase newly, change and need not all audit also without examination & approval, but can be deleted and audited with setting requirements(Can also
It is not configured to audit).
Data are in review process, can cancel submission, cancel examination & verification task:
A. examination & verification is increased newly, only newly-increased examination & verification claimant clicks on revocation submitting button, and examination & verification task just cancels, after revocation is submitted,
Data mode is changed into " rough draft ";
B. modification examination & verification, have permission and change the roles of the data and can click on revocation and submit, data mode is " after revocation
Unblock ";
C. examination & verification is deleted, has permission and deletes the roles of the data and can click on revocation and submit, data mode is " after revocation
Unblock ".
Citing:Assuming that order it is newly-increased/modification/deletion is required for auditing, increase an order 001 newly and submit, the angle having permission
The order turns into actual data after color is approved after examination;The order is now changed if desired, then need first to initiate unblock application,
Unblock application is by by rear, then is submitted after being modified to data, then the examination & verification of the role by having permission, the modification after approving after examination
Data afterwards turn into actual data;Now if it is desired to deleting the order, then need first to initiate unblock application, unblock application is examined
Core deletes data again after, and data are deleted after being audited by the role having permission.
Examination & verification only one examination & verification step, once approve after examination/by or disagree/it is obstructed after, examination & verification task i.e. tie
Beam, the form data for not needing numerous and diverse approval process, or need to examine and confirm but be not desired to create numerous and diverse examination & approval stream
The form data of journey, realize that the examination & verification that form data operates confirms with audit function, without visioning procedure, reduce person approving
The workload of member/flow creator, shorten the Review Cycle of form data operation.
Described audit opinion includes agreeing to/by, disagree/agreements/by, difference can not provided by, the present invention
The auditing result anticipate/not passed through, auditing result, including auditing result rapidly can be fed back for difference to examination & verification claimant in time
Anticipate/do not pass through.
In the present embodiment, if user needs transfer-position, in addition to user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
In the present embodiment, auditor use independent individual property role, in labor turnover, transfer-position, by user with
The association of role/cancellation association is achieved that the switching and renewal of examination & verification authority along band, can realize the seamless friendship of examination & verification authority
Connect, ensure that user audits authority and upgraded in time, be not in hysteresis or the omission for auditing authority renewal, do not interfere with enterprise
Normal operation, the risk of confidential information leakage is also evaded.
Leave office and illustrate:User-association role corresponding to employee Zhang San " direct labor 1 ", when Zhang San leaves office, system manager
Directly cancel user corresponding to Zhang San and " this role's of direct labor 1 " associates, then Zhang San loses the " phase of direct labor 1 " automatically
The examination & verification authority answered, avoid auditing authority handing-over hysteresis so that Zhang San still has the examination & verification of some confidential information and the power of checking after leaving office
Limit, causes related confidential information to be leaked to Zhang San;When new registration employee Li Si takes over the work of Zhang San, directly allow corresponding to Li Si
" direct labor 1 ", then Li Si has automatically obtained " audits authority, without again to user-association corresponding to this role of direct labor 1 "
Examination & verification authority is reset for Li Si, it is simple and quick, greatly reduce workload.
Transfer-position is illustrated:Employee Zhang San will be from production department's transfer-position to portion after sale, and system manager cancels user corresponding to Zhang San
" direct labor's 1 " associates, then is associated with the new role in portion after sale " after-sale service personnel 3 ", Zhang San then obtain automatically with former role
" examination & verification authority corresponding to this role of after-sale service personnel 3 " is obtained.
Below to carrying out authorizing possessed advantage to analyze to user by independent individual property role:
User is defined the competence by it with associating for role, if to change the authority of user, is possessed by adjusting role
Authority changes the purpose for being associated with the authority of the user of the role to reach.User is not authorized directly, but closed by it
The role of connection authorizes to user, and after user-association role, the user just has the examination & verification authority of the role.
Role is one-to-one to the relation of user(When the role is with a user-association, other users can not then associate again
The role;If the role by user-association, can not select to associate by other users;The i.e. same period, role can and
Can only be by a user-association).User is one-to-many to the relation of role(One user can associate multiple roles simultaneously).
The definition of role:Role is without the property such as group/class/classification/post/position/work post, but non-set
Property, role have uniqueness, and role is self-existent independent individual;Equivalent to post number in enterprises and institutions apply
(The non-post in post number herein, a post may have multiple employees simultaneously, and one post number of same period can only correspond to one
Individual employee).
Citing:Following role can be created in some Corporation system:General manager, vice general manager 1, vice general manager 2, Beijing sale
One manager, Beijing sell two manager, Beijing sell three managers, Shanghai sales engineer 1, Shanghai sales engineer 2, on
Extra large sales engineer 3, Shanghai sales engineer 4, Shanghai sales engineer 5 ...
User and the incidence relation of role:The said firm vice general manager 2 if the said firm employee Zhang San holds a post, while Beijing sale of holding a post
One manager, the then role that Zhang San needs to associate sell a manager for vice general manager 2 and Beijing, and Zhang San has the two angles
The authority of color.
The concept of traditional role is group/class/post/position/work post property, and a role can correspond to multiple users.And
The concept of the application " role " is equivalent to post number/station number, the role being also analogous in movie and television play:One role is the same as the moment
Section(Childhood, juvenile, middle age ...)It can only be played by a performer, and a performer may divide decorations polygonal.
After role is created, can during user is created association role, can also user create after the completion of
It is associated at any time.The incidence relation with role can be released after user-association role at any time, can also establish at any time and other
The incidence relation of role.
The composition of the role is:Numbered in post name+hilllock.Such as:Workshop Production worker 1, Workshop Production worker 2, car
Between direct labor 3 ... role be independent individual, equivalent to post number, the concept of station number, different from traditional rights management body
Role in system, the concept of role is group/class property of post/position/work post etc. in traditional system.
After the employee Zhang San that illustrates below enters certain company, the relation between employee, user and role is:
1st, new registration:The new registration of employee, it is directly the user(Employee)The role of corresponding post number/station number is selected to be closed
Connection, example:Zhang San's registration company(Company is that Zhang San is assigned with a Zhang San user), action is in sale one, is born
Blame the sale of Beijing Area's refrigerator product(Corresponding role is sale one subordinate " this role of sales engineer 5 "), then open
Three users directly select " this role association of sales engineer 5 ".
2nd, position is increased:Zhang San worked after a period of time, and company also arranges Zhang San to be responsible for the pin of Beijing Area's tv product
Sell(Corresponding role is sale one subordinate " this role of sales engineer 8 ")And hold a concurrent post portion supervisor after sale(Corresponding portion after sale
It is responsible for 1 this role), then Zhang San user be further added by association sale one subordinate " sales engineer 8 " and after sale subordinate " after sale
Portion is responsible for 1 " the two roles, and now, Zhang San employee is associated with three roles, respectively sells the " sales engineer of a subordinate
5 ", " sales engineer 8 " and after sale subordinate " after sale portion supervisor 1 ", Zhang San user then has the authority of these three roles.
3rd, position is reduced:A period of time has been spent again, and company determines to allow Zhang San's tenure portion after sale to handle(Corresponding subordinate after sale
" portion manager after sale " this role), and no longer hold a concurrent post other work.Then Zhang San's user-association subordinate after sale " portion manager after sale " this
Individual role, while cancel three roles associated before this(Sell " sales engineer 5 ", " sales engineer 8 " and selling for a subordinate
" portion supervisor 1 " after sale under rear portion), now, Zhang San user only possesses the authority of subordinate " portion manager after sale " this role after sale.
4th, the adjustment of role-security(The adjustment of the authority possessed for role in itself):As company determines increase portion after sale
The authority of manager, then it need to only increase the mandate that this role is handled to portion after sale, then Zhang San user is because portion handles after sale
The authority of this role adds, and the authority of Zhang San user also increases.
5th, leave office:After 1 year, Zhang San leaves office, then cancels Zhang San user and subordinate " portion manager after sale " this role after sale
Association.
Citing:Company is in dynamic manage, and the registration of office worker, leaving office often persistently occurs, but post number/station
Number change it is considerably less (or even not changing over a period to come).
Classical authorization method:In the case of more than systemic-function point, authorized with the role of traditional group/class property,
Not only authorize workload big, it is numerous and diverse, and error-prone, or even malfunctioned and be all not easy to find in a short time, it is easily right
System user causes damage.
The application authorization method:The application is that the role of post number/station property is authorized, user-association role
And define the competence, then to the control of user right, realized simply by the incidence relation of simple user-role, allow authority
Control becomes simple, easy to operate, clear, is greatly improved and authorizes efficiency and mandate reliability.
【Embodiment 2】As shown in fig. 6, to modification/deletion form data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;If unblock is by the way that the form data still maintains the original state;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
After initiating unblock application, lock task is just known about, unblock person can agree or disagree with unblock application, agree to, number
According to just be released state, data can be modified, deleted etc. operates;Disagreeing, data are still the state that examination & verification passes through,
For actual data.
List actual data is:
1st, the form data that need not be audited/examine is exactly actual data after submitting;
2nd, the form data audited is needed, by turning into actual data after examination & verification;
3rd, the form data examined is needed, by turning into actual data after examination & approval.
Have to the form data and check the user of authority, or with checking authority and user with modification authority can
Unblock application is submitted, is unlocked by the unblock person for having unblock authority.
Unblock application function is present embodiments provided, the actual data for the list that needs are audited, is if desired modified
Or delete and apply, it is necessary to submit and unlock, it is unlocked by the unblock person for having this form data unblock authority, in traditional examination & verification
Application is not unlocked, the form data unlocked by the needs of examination & verification is solved by the unblock person with unblock authority
Lock.
The benefit of unblock application function:
1. reducing the workload of unblock person, unblock person is allowed clearly to know there is which unblock demand;
2. an interactive mode is built for unblock demander and unblock person:
Citing:There is the people of sales force 1000 in enterprise, wherein only 8 people have unblock authority, if not unlocking application function, and someone
Need to unlock certain list actual data, then unblock person's any bar form data can only be informed by modes such as phone or instant messagings
Need to unlock, unblock person learns that find this form data after information is unlocked again, then:
A, the form data for needing to unlock is linked up and searched with unblock demander, can largely increase the workload of unblock person
With cumbersome degree;
B, linked up by modes such as phone or instant messagings, it is easy to occur understanding deviation in information exchanging process, cause mistake
By mistake, or unblock person learn after information may not timely processing, or even forget, then unblock can be caused to lag;
C, releasing process can not record unblock demander, unblock demand proposes the information such as time, unlock no related foundation, occur
Problem is difficult to call to account.
The unblock application function that the present embodiment provides can solve the above problems well.
【Embodiment 3】When one, which is audited request, there are multiple auditors, auditing result is drawn according to default auditing rule.
Specifically, described auditing rule can be:Made with the audit opinion of first auditor for providing audit opinion
For auditing result, as long as there is any one auditor to give audit opinion, examination & verification terminates.
As long as there is any one auditor to have submitted audit opinion, auditing result is determined that, examination & verification terminates, other examination & verifications
The examination & verification task of person is removed automatically, realizes efficient, quick examination & verification.Especially suitable for examination & verification of more people to same examination & verification task
Authority is identical, and anyone can determine the situation of auditing result.
Can be:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " agree to/pass through ",
Then auditing result is " agree to/pass through ", as long as there is the audit opinion that any one auditor gives " agree to/pass through ", examination & verification
Terminate.
Can be:In multiple auditors, if the audit opinion for thering is any one auditor to provide be " disagree/it is obstructed
Cross ", then auditing result is " disagree/do not pass through ", as long as there is any one auditor to give examining for " disagreeing/do not pass through "
Core opinion, examination & verification terminate.
The application auditing rule can customize, such as:As long as someone by then by, must unanimous vote by could by,
Must more than half by could by, must be 2/3rds above by could pass through etc..For enterprise's form data operation
Examination & verification provides a kind of examination & verification mode flexibly, applicable, easy to use, especially suitable for needing the situation of progress democratic decision-making.
【Embodiment 4】The checking method of form data operation, comprises the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See;
Described form data operation includes the modification or deletion to form data, to modification/deletion form data, in addition to
The step of one unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;If unblock is by the way that the form data still maintains the original state;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
Described above is only the preferred embodiment of the present invention, it should be understood that the present invention is not limited to described herein
Form, the exclusion to other embodiment is not to be taken as, and can be used for various other combinations, modification and environment, and can be at this
In the text contemplated scope, it is modified by the technology or knowledge of above-mentioned teaching or association area.And those skilled in the art are entered
Capable change and change does not depart from the spirit and scope of the present invention, then all should be in the protection domain of appended claims of the present invention
It is interior.
Claims (10)
1. the checking method of form data operation, it is characterised in that comprise the following steps:
Role in establishment system, described role are independent individuals, rather than group/class, same one role of period can only close
Join unique user, and a user-association one or more role;
One or more of selection system role is the behaviour that each auditor authorizes its form data having as auditor
The examination & verification authority of work;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See.
2. the checking method of form data operation according to claim 1, it is characterised in that:Described audit opinion includes
Agree to/by, disagree/do not pass through.
3. the checking method of form data operation according to claim 1, it is characterised in that:The behaviour of described form data
Make to include to any one in the newly-increased of form data, modification and deletion.
4. the checking method of form data operation according to claim 3, it is characterised in that:To modification/deletion list
Data, in addition to the step of unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
5. the checking method of form data operation according to claim 1, it is characterised in that:If user needs transfer-position,
Also include user's transfer-position management process, specifically include:
(1)Cancellation user associates with former role's;
(2)User's new role corresponding with after transfer-position is associated, user automatically obtains the examination & verification authority of the new role.
6. the checking method of form data operation according to claim 1, it is characterised in that:Also pass through list including one
The step of examination & verification authority of the operation of the form data for the list that the field value mandate auditor of field has, the list word
The field value selection of section is determined or automatically determined.
7. the checking method of form data operation according to claim 1, it is characterised in that:When one audit request have it is more
During individual auditor, auditing result is drawn according to default auditing rule.
8. the checking method of form data operation according to claim 7, it is characterised in that:Described auditing rule is:
The audit opinion for the auditor for providing audit opinion using first is as auditing result, as long as there is any one auditor to give
Audit opinion, examination & verification terminate.
9. the checking method of form data operation according to claim 7, it is characterised in that:Described auditing rule is:
In multiple auditors, as long as the audit opinion for having any one auditor to provide is " agree to/pass through ", then auditing result is " same
Anticipate/pass through ", as long as there is the audit opinion that any one auditor gives " agree to/pass through ", examination & verification terminates;It is or, described
Auditing rule is:In multiple auditors, as long as the audit opinion for having any one auditor to provide is " disagree/do not pass through ",
Then auditing result is " disagree/do not pass through ", as long as there is the examination & verification meaning that any one auditor gives " disagree/do not pass through "
See, examination & verification terminates.
10. the checking method of form data operation, it is characterised in that comprise the following steps:
The examination & verification authority of the operation of its form data having is authorized for each auditor;
Examination & verification claimant submits the examination & verification request of certain operation of some form data;
Examination & verification request is audited by the auditor of the examination & verification authority operated with the form data, provides examination & verification meaning
See;
The operation of described form data includes modification or deletion to form data, to modification/deletion form data, also wraps
The step of including a unblock application:
S1:Unlock applicant and apply for unblock form data, by there is the unblock person of this form data unblock authority operated true
Recognize and whether unlock;
S2:If unblock passes through, the modification/deletion for carrying out the form data according to its form data operating right by operator is grasped
Make;
S3:Auditing claimant submits the examination & verification to this modification/deletion action of the form data to ask;
S4:Auditor audits to this modification/deletion action, provides audit opinion.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710682789.7A CN107464098A (en) | 2017-08-10 | 2017-08-10 | The checking method of form data operation |
CN201810904691.6A CN109086627B (en) | 2017-08-10 | 2018-08-09 | Form data operation auditing method |
PCT/CN2018/099769 WO2019029650A1 (en) | 2017-08-10 | 2018-08-09 | Form data operation auditing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710682789.7A CN107464098A (en) | 2017-08-10 | 2017-08-10 | The checking method of form data operation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107464098A true CN107464098A (en) | 2017-12-12 |
Family
ID=60547597
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710682789.7A Pending CN107464098A (en) | 2017-08-10 | 2017-08-10 | The checking method of form data operation |
CN201810904691.6A Active CN109086627B (en) | 2017-08-10 | 2018-08-09 | Form data operation auditing method |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810904691.6A Active CN109086627B (en) | 2017-08-10 | 2018-08-09 | Form data operation auditing method |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN107464098A (en) |
WO (1) | WO2019029650A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107958551A (en) * | 2017-12-29 | 2018-04-24 | 福建省农村信用社联合社 | A kind of full channel remote centralized authoring system of the expansible bank of business |
WO2019029650A1 (en) * | 2017-08-10 | 2019-02-14 | 成都牵牛草信息技术有限公司 | Form data operation auditing method |
CN109741004A (en) * | 2018-11-30 | 2019-05-10 | 航天信息股份有限公司 | Request slip checking method, device, storage medium and electronic equipment |
CN110276205A (en) * | 2019-06-06 | 2019-09-24 | 深圳市杰科数码有限公司 | Product ID document generating method, system, electronic device and storage medium |
CN110990856A (en) * | 2019-12-06 | 2020-04-10 | 广东联晟通信科技有限公司 | Authority auditing method and system |
CN111340454A (en) * | 2020-03-04 | 2020-06-26 | 山信软件股份有限公司 | Enterprise homework certificate safety management method |
CN111861357A (en) * | 2019-06-17 | 2020-10-30 | 北京嘀嘀无限科技发展有限公司 | Authority information processing method and system, computer device and storage medium |
CN112488652A (en) * | 2020-11-30 | 2021-03-12 | 乐刷科技有限公司 | Work order auditing method, system, terminal and storage medium |
CN112950162A (en) * | 2020-07-09 | 2021-06-11 | 北京中百信信息技术股份有限公司 | Information system engineering supervision work distribution management information system |
CN113269525A (en) * | 2021-05-24 | 2021-08-17 | 山东浪潮商用系统有限公司 | Countersigning management method for workflow |
CN113723769A (en) * | 2021-08-11 | 2021-11-30 | 中核武汉核电运行技术股份有限公司 | Contractor authorization device and method for power plant |
CN115239292A (en) * | 2022-07-21 | 2022-10-25 | 北京铭研医药研究有限公司 | Information processing method and system for medicine research and development and production verification |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992980B (en) * | 2019-04-04 | 2022-12-27 | 浪潮通用软件有限公司 | User authority multi-model management method |
CN110427750A (en) * | 2019-07-23 | 2019-11-08 | 武汉宏途科技有限公司 | A kind of method and system carrying out the control of list permission by permission combination |
CN111538748A (en) * | 2020-04-30 | 2020-08-14 | 中国银行股份有限公司 | Service page modification method and device |
CN111598542A (en) * | 2020-05-21 | 2020-08-28 | 贵州普致丰科技有限公司 | Electric power production project archive management system stored according to progress |
CN111507853B (en) * | 2020-06-02 | 2023-04-07 | 泰康保险集团股份有限公司 | Group insurance policy and insurance data processing method and device |
CN111815273A (en) * | 2020-07-03 | 2020-10-23 | 远光软件股份有限公司 | Configuration method of document approval process, storage medium and electronic equipment |
CN113065853A (en) * | 2021-04-12 | 2021-07-02 | 北京嘀嘀无限科技发展有限公司 | Data auditing method, equipment, storage medium and computer program product |
CN113723914A (en) * | 2021-08-11 | 2021-11-30 | 中核武汉核电运行技术股份有限公司 | Personnel post authorization device and method for power plant |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101630385A (en) * | 2009-07-31 | 2010-01-20 | 福州星网视易信息系统有限公司 | Implementation method for realizing multistage auditing workflow function by simple configuration items |
CN102194152B (en) * | 2010-03-12 | 2016-01-20 | 新奥特(北京)视频技术有限公司 | Authority control method in a kind of audit service process and device |
US9281012B2 (en) * | 2010-03-30 | 2016-03-08 | Itxc Ip Holdings S.A.R.L. | Metadata role-based view generation in multimedia editing systems and methods therefor |
JP5814639B2 (en) * | 2011-06-09 | 2015-11-17 | キヤノン株式会社 | Cloud system, cloud service license management method, and program |
CN102316216A (en) * | 2011-09-07 | 2012-01-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal adaptive role method and terminal thereof |
US20140258226A1 (en) * | 2013-03-11 | 2014-09-11 | Southpaw Technology, Inc. | Asynchronous transaction management, systems and methods |
CN104463005A (en) * | 2013-09-25 | 2015-03-25 | 天津书生投资有限公司 | Method for controlling access permissions of electronic document |
CN104484617B (en) * | 2014-12-05 | 2017-09-26 | 中国航空工业集团公司第六三一研究所 | A kind of Access and control strategy of database method based on many strategy fusions |
CN105184144B (en) * | 2015-07-31 | 2018-07-10 | 上海玖道信息科技股份有限公司 | A kind of multisystem right management method |
CN105046438A (en) * | 2015-07-31 | 2015-11-11 | 长威信息科技发展股份有限公司 | Customized process configuration office system based on visible process configuration |
CN106485388A (en) * | 2015-09-01 | 2017-03-08 | 北京奇虎科技有限公司 | The right management method of business approval system and device |
CN105303084A (en) * | 2015-09-24 | 2016-02-03 | 北京奇虎科技有限公司 | Privilege management system and method |
CN106204258A (en) * | 2016-07-22 | 2016-12-07 | 福建节点信息科技有限公司 | A kind of business capital risk moves managing and control system and management-control method |
CN106407717A (en) * | 2016-10-24 | 2017-02-15 | 深圳市前海安测信息技术有限公司 | System and method of verifying electronic signature of electronic medical record in medical information system |
CN106779619B (en) * | 2016-12-30 | 2024-02-02 | 全民互联科技(天津)有限公司 | Auditing and signing method and system for perfecting business approval |
CN107464098A (en) * | 2017-08-10 | 2017-12-12 | 成都牵牛草信息技术有限公司 | The checking method of form data operation |
-
2017
- 2017-08-10 CN CN201710682789.7A patent/CN107464098A/en active Pending
-
2018
- 2018-08-09 CN CN201810904691.6A patent/CN109086627B/en active Active
- 2018-08-09 WO PCT/CN2018/099769 patent/WO2019029650A1/en active Application Filing
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019029650A1 (en) * | 2017-08-10 | 2019-02-14 | 成都牵牛草信息技术有限公司 | Form data operation auditing method |
CN107958551A (en) * | 2017-12-29 | 2018-04-24 | 福建省农村信用社联合社 | A kind of full channel remote centralized authoring system of the expansible bank of business |
CN109741004A (en) * | 2018-11-30 | 2019-05-10 | 航天信息股份有限公司 | Request slip checking method, device, storage medium and electronic equipment |
CN110276205B (en) * | 2019-06-06 | 2021-06-15 | 深圳市杰科数码有限公司 | Method and system for generating product serial number file, electronic device and storage medium |
CN110276205A (en) * | 2019-06-06 | 2019-09-24 | 深圳市杰科数码有限公司 | Product ID document generating method, system, electronic device and storage medium |
CN111861357A (en) * | 2019-06-17 | 2020-10-30 | 北京嘀嘀无限科技发展有限公司 | Authority information processing method and system, computer device and storage medium |
CN111861357B (en) * | 2019-06-17 | 2024-04-26 | 北京嘀嘀无限科技发展有限公司 | Authority information processing method and system, computer equipment and storage medium |
CN110990856A (en) * | 2019-12-06 | 2020-04-10 | 广东联晟通信科技有限公司 | Authority auditing method and system |
CN111340454A (en) * | 2020-03-04 | 2020-06-26 | 山信软件股份有限公司 | Enterprise homework certificate safety management method |
CN112950162A (en) * | 2020-07-09 | 2021-06-11 | 北京中百信信息技术股份有限公司 | Information system engineering supervision work distribution management information system |
CN112950162B (en) * | 2020-07-09 | 2022-04-29 | 北京中百信信息技术股份有限公司 | Information system engineering supervision work distribution management information system |
CN112488652A (en) * | 2020-11-30 | 2021-03-12 | 乐刷科技有限公司 | Work order auditing method, system, terminal and storage medium |
CN112488652B (en) * | 2020-11-30 | 2024-05-10 | 乐刷科技有限公司 | Work order auditing method, system, terminal and storage medium |
CN113269525A (en) * | 2021-05-24 | 2021-08-17 | 山东浪潮商用系统有限公司 | Countersigning management method for workflow |
CN113723769A (en) * | 2021-08-11 | 2021-11-30 | 中核武汉核电运行技术股份有限公司 | Contractor authorization device and method for power plant |
CN115239292A (en) * | 2022-07-21 | 2022-10-25 | 北京铭研医药研究有限公司 | Information processing method and system for medicine research and development and production verification |
Also Published As
Publication number | Publication date |
---|---|
CN109086627A (en) | 2018-12-25 |
CN109086627B (en) | 2021-11-16 |
WO2019029650A1 (en) | 2019-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107464098A (en) | The checking method of form data operation | |
CN108694557A (en) | The setting method of the form fields operating right of workflow and its approval node | |
CN107180334A (en) | Based role is to the man-to-man Work-flow control method and system of user | |
CN108984715A (en) | Based on the method according to field setting approval process | |
CN108805532A (en) | The efficient measures and procedures for the examination and approval of workflow approval node | |
CN108764691A (en) | Setting method based on the approval node of countersign in approval process | |
CN107315931A (en) | Form field values operating right authorization method | |
CN107146072A (en) | The method that workflow approval node based on form fields sets examination & approval role | |
CN108550029B (en) | Method for setting approval roles according to department levels by workflow approval nodes | |
CN109214150A (en) | The list operating right authorization method of based role | |
CN108764833A (en) | The method that workflow approval node examines role by Department formation | |
CN107045675A (en) | The method that workflow approval node is set examination & approval role by role | |
CN108694560A (en) | Setting method based on the approval node of ballot in approval process | |
CN109032458A (en) | The authorization method for the form data that based role obtains | |
CN107480544A (en) | Count list operation permission grant method | |
CN108898317A (en) | The method that list operating right is authorized respectively according to form field values | |
CN108876313A (en) | Setting method of the user in the permission of information interchange unit in system | |
CN107480948A (en) | Approver is directed to the method that examination & approval task seeks the opinion of advisory opinion | |
CN107480557A (en) | Show the authorization method of all system user current entitlement states | |
CN107480512A (en) | Examination & approval task based on modified RBAC mechanism of authorization control delivers method | |
CN109032459A (en) | A kind of form data operating right authorization method | |
CN107392499A (en) | Approval process and its method for approval node mandate are carried out to user | |
CN107292580A (en) | The commission of examination and approval workflow and its recommit method | |
CN108958870A (en) | shortcut function setting method | |
CN107480556A (en) | The method authorized respectively to statistics list operation authority based on train value |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171212 |