CN110502904B - Authorization method and device for traceability data entry permission - Google Patents

Authorization method and device for traceability data entry permission Download PDF

Info

Publication number
CN110502904B
CN110502904B CN201810480922.5A CN201810480922A CN110502904B CN 110502904 B CN110502904 B CN 110502904B CN 201810480922 A CN201810480922 A CN 201810480922A CN 110502904 B CN110502904 B CN 110502904B
Authority
CN
China
Prior art keywords
requester
preset
identification code
data entry
commodity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810480922.5A
Other languages
Chinese (zh)
Other versions
CN110502904A (en
Inventor
洪志权
伍卓萍
于崇刚
孙磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xintianweng Information Technology Co ltd
Original Assignee
Guangzhou Xintianweng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xintianweng Information Technology Co ltd filed Critical Guangzhou Xintianweng Information Technology Co ltd
Priority to CN201810480922.5A priority Critical patent/CN110502904B/en
Publication of CN110502904A publication Critical patent/CN110502904A/en
Application granted granted Critical
Publication of CN110502904B publication Critical patent/CN110502904B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a device for authorizing traceability data entry permission. The method comprises the following steps: receiving a traceability data entry request, wherein the traceability data entry request comprises a commodity identification, a requester identification code and a requester account; acquiring a commodity identifier from the tracing data entry request; inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset identification code list comprises at least one preset requester identification code; acquiring a requester identification code from the request; judging whether a preset requester identification code identical to the requester identification code exists in the preset requester identification code list or not; and if the request exists, acquiring the requester account from the request, and opening the traceability data entry authority of the requester account, wherein the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification. The embodiment of the application can improve the comprehensiveness of the source tracing data.

Description

Authorization method and device for traceability data entry permission
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to an authorization method and device for a traceability data entry authority.
Background
The traceability is the food safety management system which is gradually established and improved in 1997 European Union for dealing with the 'mad cow disease', and once the food quality is in problem, the traceability information is inquired to find out all circulation information of the food production enterprise, the food production area, the specific farmer and the like, and the corresponding legal responsibility of an accident party is clarified. The tracing technology is widely applied at present, is applied to various industries such as medicines, clothes, electronics, machinery and the like except the food field, and can trace the relevant information generated in various links of commodity circulation, such as production, transportation, logistics, customs clearance, sales and the like.
In order to realize the tracing of the commodities, relevant information of the commodities in links such as production, logistics, port customs clearance, sales and the like needs to be collected, in the prior art, many enterprises collect the relevant information of the commodities in each link by taking supply chain management inside the enterprises as a foothold, although tracing data about the commodities can be obtained, because a certain enterprise actively collects information generated by other enterprises in other links, the collected information is usually not particularly complete, the comprehensiveness and integrity of the tracing data are influenced, and the tracing effect is not facilitated.
Disclosure of Invention
The embodiment of the invention provides an authorization method and device for a traceability data entry authority, which can improve the comprehensiveness of collected traceability data.
In a first aspect, an embodiment of the present invention provides an authorization method for a traceable data entry permission, where the method may include:
receiving a traceability data entry request, wherein the traceability data entry request comprises a commodity identification, a requester identification code and a requester account;
obtaining the commodity identification from the tracing data entry request;
inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset identification code list comprises at least one preset requester identification code;
acquiring the identification code of the requester from the request;
judging whether a preset requester identification code identical to the requester identification code exists in the preset requester identification code list or not;
and if the request exists, acquiring the requester account from the request, and opening the traceability data entry authority of the requester account, wherein the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification.
Optionally, the method further comprises:
and setting the traceability data entry permission to comprise the permission of inputting new data, editing and deleting the new data and the permission of editing and deleting the existing data.
Optionally, the method further comprises:
the preset requester identification code list further comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset identification code one to one;
inquiring a preset requester identification code list based on the requester identification code to obtain a preset date range corresponding to a preset identification code which is the same as the requester identification code;
and setting the effective time of the traceability data entry authority of the requester account as the preset date range.
Optionally, the method further comprises:
inquiring a preset requester identification code name list based on the requester identification code to obtain a requester name corresponding to the requester identification code, wherein the preset requester identification code list comprises at least one preset requester identification code and a requester name, and the preset requester identification code corresponds to the requester name one to one;
and displaying the name of the requester.
In a second aspect, an embodiment of the present invention provides an authorization apparatus for tracing source data entry permission, including:
the receiving module is used for receiving a traceability data entry request, and the traceability data entry request comprises a commodity identification, a requester identification code and a requester account.
And the first acquisition module is used for acquiring the commodity identification from the traceability data entry request.
And the second acquisition module is used for inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset identification code list comprises at least one preset requester identification code.
And the third acquisition module is used for acquiring the identification code of the requester from the request.
And the judging module is used for judging whether the preset requester identification code which is the same as the requester identification code exists in the preset requester identification code list.
And the fourth obtaining module is used for obtaining the requesting party account from the request under the condition that the judgment module is yes.
And the authority opening module is used for opening the traceability data entry authority of the requester account, and the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification.
Optionally, the apparatus further comprises:
the system also comprises an authority setting module which is used for setting the traceability data entry authority to comprise the authority for inputting new data, editing and deleting the new data and the authority for editing and deleting the existing data.
Optionally, the apparatus further comprises:
a second obtaining module, configured to query a preset commodity identification database based on the commodity identification to obtain a preset requester identification list corresponding to the commodity identification, where the preset requester identification list includes at least one preset requester identification; the preset identification code list further comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset identification code one to one.
And the fifth obtaining module is used for inquiring the preset requester identification code list based on the requester identification code under the condition that the judgment module concludes that the preset requester identification code list is the same as the requester identification code list, and obtaining the preset date range corresponding to the preset identification code.
And the authority valid time setting module is used for setting the valid time of the traceability data entry authority of the requester account as the preset date range.
Optionally, the apparatus further comprises:
the sixth obtaining module is configured to query a preset requester identity name list based on the requester identity to obtain a requester name corresponding to the requester identity, where the preset requester identity list includes at least one preset requester identity and a requester name, and the preset requester identity and the requester name are in one-to-one correspondence.
And the display module is used for displaying the name of the requester.
In a third aspect, an embodiment of the present invention provides an authorization apparatus for a source tracing data entry permission, including:
at least 1 memory cell.
A processing unit coupled to the at least 1 memory unit.
Wherein the at least 1 storage unit is configured to store computer instructions.
The processing unit is configured to invoke the computer instructions to perform any of the methods of the first aspect.
In a fourth aspect, embodiments of the present invention provide a computer storage medium. The computer storage medium stores computer instructions for performing any of the methods of the first aspect when the computer instructions are invoked.
In the embodiment of the application, the authorization of the traceability data entry authority is carried out on the associated parties involved in the commodity circulation link, so that the associated parties involved in the commodity circulation link have the traceability data entry authority, the generated business information related to the commodity can be automatically uploaded, the omission of the traceability data is avoided, and the comprehensiveness of the traceability data is improved; and the input authority is only limited to be valid in the traceability data corresponding to the commodity identification related to the associated party, and the traceability data of other commodities without the authority can not be modified, so that the authority is limited while the system authority is opened, and the safety of the traceability data is ensured.
The technical scheme of the embodiment of the application can also include that the traceability data entry permission is set to include permission for inputting new data, editing and deleting the new data, and permission for editing and deleting the existing data is not included.
Optionally, the traceability data entry authority can be set to include the authority for inputting new data, editing and deleting the new data, and the authority for editing and deleting the existing data is not included, so that the requester cannot modify the traceability data generated in other links of the commodity product, the authority is opened, the existing data in the system is not influenced, and the security of the existing data in the system is ensured.
Optionally, the valid time of the entry authority can be limited at the same time, and the valid time can be a cooperation period of a commodity owner and a circulation link associated party or other time ranges set according to practical situations, so that the associated party only has the authority of data processing within a certain time range, and the safety of the source tracing data is ensured.
Optionally, the name of the requester can be displayed, so that the user can know which associated parties apply for opening the traceability data entry permission to the system, so as to directly send urging requirements to other associated parties who do not apply for the traceability data entry permission, or send corresponding rewards to the associated parties who have applied for the traceability data entry permission, so as to facilitate the comprehensiveness of the traceability data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an authorization method for tracing source data entry permission according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another authorization method for tracing source data entry permission according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an authorization apparatus for tracing source data entry permission according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of another authorization apparatus for tracing source data entry permission according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of another authorization apparatus for tracing data entry permission according to a fifth embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to those listed but may alternatively include other steps or elements not listed or inherent to such process, method, product, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a diagram illustrating an authorization method for a source data entry permission according to an embodiment of the present application. The method can be executed by an authorization device of the tracing data entry authority. As shown in fig. 1, the method includes the following steps.
Step S101, receiving a traceability data entry request, wherein the traceability data entry request comprises a commodity identification, a requester identification code and a requester account.
In the prior art, a commodity owner has the authority to enter the commodity traceability data in the traceability system, and all traceability data of the commodity in each circulation link are collected by the commodity owner and input into the traceability system to form traceability information of the commodity. In order to make the traceability data more complete, the owner of the commodity opens the entry authority of the traceability data to the related parties of the commodity in each circulation link.
When an associated party related to a commodity circulation link generates related business information, namely traceability data, related to a certain commodity, the associated party hopes to input the traceability data related to the commodity in a traceability system, therefore, the associated party related to the commodity circulation link serves as a request direction to send out a traceability data entry request to the traceability system, and the traceability system receives the traceability data entry request.
Alternatively, the owner of the good generally refers to the manufacturer of the good, the brand of the good, and so forth.
Alternatively, the requestor generally refers to a logistics enterprise, a customs port, a sales enterprise, and the like.
Optionally, the traceability data entry request includes a product identifier to indicate which product the requester wishes to open the entry authority of traceability data.
In the tracing system, the commodity identification is used for identifying and distinguishing different commodities, the commodity identification corresponds to the commodities one by one, and the commodity identification is used as the unique identification of the commodities.
Optionally, the traceability data entry request includes a requester identifier to indicate which requester wishes to open the entry authority of traceability data.
In the tracing system, the requester identification code is used for identifying and distinguishing different requesters, the requester identification code corresponds to the requesters one by one, and the requester identification code is used as the unique identification of the requester.
Optionally, the traceability data entry request includes an account of the requester, so as to indicate to which account the traceability data entry authority is opened when it is determined that the requester can have the traceability data entry authority.
Optionally, the requesting party account is obtained by registering the requesting party in the tracing system. In the traceability system, the requester can view data in the traceability system by logging in the requester account. In general, each requester has one corresponding requester account, but may have multiple requester accounts, which is not limited in the present invention.
Optionally, in the traceability system, encoding rules for generating the commodity identifier, the requestor identifier, and the requestor account are different, so that the traceability system can distinguish the commodity identifier, the requestor identifier, and the requestor account according to the respective encoding rules.
And S102, acquiring the commodity identification from the traceability data entry request.
Optionally, the traceability system identifies the commodity identifier from the traceability data entry request according to the coding rule of the commodity identifier, and obtains the commodity identifier.
Step S103, inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset identification code list comprises at least one preset requester identification code.
Optionally, the preset requester identifier is an identifier of a related party that an owner of the product corresponding to the certain product identifier desires to authorize. The preset requester identification code list corresponding to the commodity identification comprises at least one preset requester identification code. The preset commodity identification database comprises a plurality of preset requester identification code lists corresponding to a plurality of commodity identifications.
And querying a preset commodity identification database by taking the commodity identification in the request as a keyword to obtain a preset requester identification code list corresponding to the commodity identification.
Step S104, obtaining the identification code of the requester from the request.
Optionally, the tracing system identifies the requestor identifier from the tracing data entry request according to the encoding rule of the requestor identifier, and obtains the requestor identifier.
Step S105, determining whether a preset requester id identical to the requester id exists in the preset requester id list.
And inquiring a preset requester identification code list based on the requester identification code in the request, and judging whether a preset requester identification code identical to the requester identification code exists in the list.
And step S106, if the request exists, acquiring the requester account from the request, and opening the traceability data entry authority of the requester account, wherein the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification.
If the preset requester identification code which is the same as the requester identification exists in the preset requester identification code list, the owner of the commodity expects to authorize the requester, the traceability system identifies the requester account from the traceability data entry request according to the coding rule of the requester account, the traceability data entry authority of the requester account is opened, and the traceability data entry authority is set to be valid only for the traceability data corresponding to the commodity identification.
The following describes the technical solutions of the embodiments of the present application in a practical case.
The tracing system receives a tracing data entry request, wherein the request comprises a requester account number (shannfeng), a requester identification code (WLQY0010) and a commodity identification (Food-Milk-123456);
obtaining the product identification from the request as Food-Milk-123456;
querying a preset commodity identification database by using Food-Milk-123456 as a keyword to obtain a preset requester identification list corresponding to the Food-Milk-123456, wherein the list comprises WLQY0010, XSQY0025 and TGGK 0001;
acquiring a requester identification code WLQY0010 from the request;
a preset requester identification code WLQY0010 identical to WLQY0010 exists in the preset requester identification list;
and acquiring the account number of the requester as the shunfeng from the request, and opening the traceability data entry authority of the account number of the shunfeng, wherein the authority is only effective on the traceability data corresponding to the Food-Milk-123456.
In the embodiment of the application, the authorization of the traceability data entry authority is carried out on the associated parties involved in the commodity circulation link, so that the associated parties involved in the commodity circulation link have the traceability data entry authority, the generated business information related to the commodity can be automatically uploaded, the omission of the traceability data is avoided, and the comprehensiveness of the traceability data is improved; and the input authority is only limited to be valid in the traceability data corresponding to the commodity identification related to the associated party, and the traceability data of other commodities without the authority can not be modified, so that the authority is limited while the system authority is opened, and the safety of the traceability data is ensured.
Further, the technical scheme of the embodiment of the application may further include setting the traceability data entry permission to include permission to input new data, edit and delete the new data, and not permission to edit and delete existing data.
Optionally, the requester obtaining the traceability data entry authority can input new data in the traceability system, and edit and delete the input new data, so that the requester can supplement the relevant traceability data for the commodity with the entry authority in the traceability system, and the comprehensiveness of the traceability data is improved.
The requester for obtaining the traceability data entry authority cannot edit or delete the existing data in the system, so that the requester cannot modify the traceability data generated by the commodity in other links, the authority is opened, the existing data in the system cannot be influenced, and the safety of the existing data in the system is ensured.
Referring to fig. 2, fig. 2 is a flowchart illustrating an authorization method for a source-tracing data entry authority according to an embodiment of the present application. The method can be executed by an authorization device of the tracing data entry authority. As shown in fig. 2, the method includes the following steps.
Step S201, receiving a traceability data entry request, wherein the traceability data entry request comprises a commodity identification, a requester identification code and a requester account.
Step S202, the commodity identification is obtained from the traceability data entry request.
Step S203, inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset identification code list comprises at least one preset requester identification code; the preset identification code list further comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset identification code one to one.
Optionally, the preset requester identifier is an identifier of a related party that an owner of the product corresponding to the certain product identifier desires to authorize.
In actual use, a general commodity owner and other related parties in a commodity circulation link have specific cooperation time, and business information related to the commodity can be generated at the related parties in the cooperation period. The preset date range may be a period of cooperation between the owner of the goods and the party with whom authorization is desired. Of course, the preset date range may also be other date ranges set according to actual needs, which is not limited in the present invention.
The preset requester identification code list corresponding to the commodity identification comprises at least one preset requester identification code and a preset date range corresponding to the identification code. The preset commodity identification database comprises a plurality of preset requester identification code lists corresponding to a plurality of commodity identifications.
And querying a preset commodity identification database by taking the commodity identification in the request as a keyword to obtain a preset requester identification code list corresponding to the commodity identification.
Step S204, the identification code of the requester is obtained from the request.
Step S205, determining whether a preset requester id identical to the requester id exists in the preset requester id list.
Step S206, if the request exists, the requester account is obtained from the request, and the traceability data entry authority of the requester account is opened, wherein the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification.
Step S207, querying the list of the predetermined requester identification codes based on the requester identification codes, and obtaining a predetermined date range corresponding to the predetermined identification code that is the same as the requester identification code.
And inquiring a preset requester identification code list by using the requester identification code as a keyword to obtain a preset date range corresponding to the preset identification code which is the same as the requester identification code.
For example, the list of the obtained preset identification codes is shown in the following table
Figure BDA0001665818270000101
The identification code of the requester is WLQY0010, and the corresponding preset date range is obtained by looking up a table and is from 3 month 1 day in 2017 to 6 month 1 day in 2017.
Step S208, setting the valid time of the traceability data entry authority of the requestor account as the preset date range.
And setting the effective time of the traceability data entry authority of the requester account as the preset date range, wherein the requester account has the traceability data entry authority within the preset date range, and the requester account does not have the traceability data entry authority outside the preset date range.
For example, the requestor account has traceability data entry permissions beginning at 3/1/2017 and ending at traceability data entry permissions at 6/1/2017.
It should be noted that, for example, the steps S201, S202, S204, S205, and S206, which are not described in detail in the embodiment of the present application, can refer to the description in the first embodiment of the present application, and are not described herein again.
In the embodiment of the application, on the basis of the technical scheme of the first embodiment of the application, although authorization of traceability data entry permission is performed on the associated parties involved in the commodity circulation link, the associated parties involved in the commodity circulation link respectively have the entry permission of traceability data, the entry permission is limited by effective time, the effective time can be a cooperation period of a commodity owner and the circulation link associated parties or other time ranges set according to actual conditions, the associated parties only have data processing permission within a certain time range, and the security of traceability data is guaranteed.
Further, the technical scheme of the embodiment of the application may further include querying a preset requester identifier name list based on the requester identifier to obtain a requester name corresponding to the requester identifier, where the preset requester identifier list includes at least one preset requester identifier and a requester name, and the preset requester identifier and the requester name are in one-to-one correspondence; and displaying the name of the requester.
Optionally, the requestor identification code is used as a keyword to query a preset requestor account name list, and a requestor name corresponding to the preset requestor identification code which is the same as the requestor identification code is obtained.
And displaying the name of the requester, so that the user can know which associated direction system applies for opening the source tracing data entry authority, and the user management is facilitated.
For example, after knowing which related parties have applied for the traceability data entry authority, the user (owner of the commodity) can directly send urging requirements to other related parties who have not applied for the traceability data entry authority, and the user can also send corresponding rewards to the related parties who have applied for the traceability data entry authority so as to facilitate the other related parties to apply for the traceability data.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an authorization apparatus for tracing source data entry permission according to a third embodiment of the present invention, as shown in fig. 3, including:
the receiving module 301 is configured to receive a traceability data entry request, where the traceability data entry request includes a commodity identifier, a requester identification code, and a requester account;
a first obtaining module 302, configured to obtain the product identifier from the traceability data entry request;
a second obtaining module 303, configured to query a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, where the preset identification code list includes at least one preset requester identification code;
a third obtaining module 304, configured to obtain the identifier of the requestor from the request;
a determining module 305, configured to determine whether a preset requester identifier identical to the requester identifier exists in the preset requester identifier list;
a fourth obtaining module 306, configured to obtain the account of the requesting party from the request if the determination result of the determining module is yes;
and an authority opening module 307, configured to open a traceability data entry authority of the requestor account, where the traceability data entry authority is only valid for traceability data corresponding to the commodity identifier.
Furthermore, the device may further include an authority setting module, configured to set the traceability data entry authority to include an authority to input new data, edit and delete the new data, and not an authority to edit and delete existing data.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an authorization apparatus for tracing source data entry permission according to a fourth embodiment of the present invention, as shown in fig. 4, including:
the receiving module 401 is configured to receive a traceability data entry request, where the traceability data entry request includes a commodity identifier, a requester identification code, and a requester account;
a first obtaining module 402, configured to obtain the product identifier from the traceability data entry request.
A second obtaining module 403, configured to query a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, where the preset identification code list includes at least one preset requester identification code; the preset identification code list also comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset identification code one to one;
a third obtaining module 404, configured to obtain the identifier of the requester from the request;
a determining module 405, configured to determine whether a preset requester identifier identical to the requester identifier exists in the preset requester identifier list;
a fourth obtaining module 406, configured to obtain the account of the requesting party from the request if the determination result of the determining module is yes;
an authority opening module 407, configured to open a traceability data entry authority of the requestor account, where the traceability data entry authority is only valid for traceability data corresponding to the commodity identifier;
a fifth obtaining module 408, configured to, if the determination module concludes that the identifier is the default identifier, query the list of default identifiers based on the identifier of the requestor, and obtain a default date range corresponding to the default identifier that is the same as the identifier of the requestor;
and the authority valid time setting module 409 is configured to set the valid time of the tracing data entry authority of the requestor account to the preset date range.
Optionally, the apparatus may further include a sixth obtaining module, configured to query a preset requester identity name list based on the requester identity to obtain a requester name corresponding to the requester identity, where the preset requester identity list includes at least one preset requester identity and a requester name, and the preset requester identity and the requester name are in one-to-one correspondence.
And the display module is used for displaying the name of the requester.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an authorization package for tracing data entry permission according to an embodiment of the present invention. As shown in fig. 5, the apparatus 500 may include at least 1 storage unit 501, at least 1 processing unit 503, and at least 1 communication interface 504, but the apparatus may also include general-purpose devices such as an input/output device, which is not limited herein.
At least 1 of the storage units 501 may be respectively used to store computer instructions, programs, functional modules, events, databases, and the like, which are not limited herein. At least 1 memory unit 501 may be integrated into one memory device or independently configured in the apparatus 500, which is not limited herein.
At least 1 processing unit 503 may be implemented by a computer, a server, a central processing unit, a micro-processing unit, a data processing unit, a big data special processing unit, or the like.
At least 1 communication interface 504 is used to enable external devices, platforms, or interfacing using wired, wireless, or network technologies. For example, the system is connected with a user terminal, a background control terminal and the like.
When the storage unit 501 stores computer instructions, the processing unit 503 can call the computer instructions to execute any one of the following methods according to embodiments one to four of the present application.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

1. An authorization method for a traceability data entry authority, the method comprising:
receiving a traceability data entry request, wherein the traceability data entry request comprises a commodity identification, a requester identification code and a requester account;
obtaining the commodity identification from the tracing data entry request;
inquiring a preset commodity identification database based on the commodity identification to obtain a preset requester identification code list corresponding to the commodity identification, wherein the preset requester identification code list comprises at least one preset requester identification code;
acquiring the identification code of the requester from the request;
judging whether a preset requester identification code identical to the requester identification code exists in the preset requester identification code list or not;
if the request exists, acquiring the requester account from the request, and opening the traceability data entry authority of the requester account, wherein the traceability data entry authority is only valid for the traceability data corresponding to the commodity identification;
the method further comprises the following steps:
and setting the traceability data entry permission to comprise the permission of inputting new data, editing and deleting the new data and the permission of editing and deleting the existing data.
2. The method of claim 1, further comprising:
the preset requester identification code list further comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset requester identification code one to one;
inquiring a preset requester identification code list based on the requester identification code to obtain a preset date range corresponding to a preset identification code which is the same as the requester identification code;
and setting the effective time of the traceability data entry authority of the requester account as the preset date range.
3. The method according to any one of claims 1-2, further comprising:
inquiring a preset requester identification code name list based on a requester identification code to obtain a requester name corresponding to the requester identification code, wherein the preset requester identification code name list comprises at least one preset requester identification code and the requester name, and the preset requester identification code corresponds to the requester name one to one;
and displaying the name of the requester.
4. An authorization device for tracing source data entry authority, the device comprising:
the system comprises a receiving module, a source tracing module and a source tracing module, wherein the receiving module is used for receiving a source tracing data entry request, and the source tracing data entry request comprises a commodity identifier, a requester identification code and a requester account;
the first acquisition module is used for acquiring the commodity identification from the traceability data entry request;
a second obtaining module, configured to query a preset commodity identification database based on the commodity identification to obtain a preset requester identification list corresponding to the commodity identification, where the preset requester identification list includes at least one preset requester identification;
a third obtaining module, configured to obtain the identifier of the requester from the request;
the judging module is used for judging whether a preset requester identification code which is the same as the requester identification code exists in the preset requester identification code list or not;
the fourth obtaining module is used for obtaining the account of the requesting party from the request under the condition that the judgment module is yes;
the authority opening module is used for opening a traceability data entry authority of the requester account, and the traceability data entry authority is only valid for traceability data corresponding to the commodity identification;
the device further comprises:
and the authority setting module is used for setting the traceability data entry authority to include the authority for inputting new data, editing and deleting the new data and the authority for editing and deleting the existing data.
5. The authorization apparatus according to claim 4, characterized in that the apparatus further comprises:
a second obtaining module, configured to query a preset commodity identification database based on the commodity identification to obtain a preset requester identification list corresponding to the commodity identification, where the preset requester identification list includes at least one preset requester identification; the preset requester identification code list further comprises at least one preset date range, and the at least one preset date range corresponds to the at least one preset requester identification code one to one;
a fifth obtaining module, configured to, if the determination module concludes that the request identifier is positive, query a preset request identifier list based on the request identifier, and obtain a preset date range corresponding to a preset identifier that is the same as the request identifier;
and the authority valid time setting module is used for setting the valid time of the traceability data entry authority of the requester account as the preset date range.
6. An authorization device according to any one of claims 4-5, characterized in that the device further comprises:
a sixth obtaining module, configured to query a preset requester identity name list based on a requester identity to obtain a requester name corresponding to the requester identity, where the preset requester identity name list includes at least one preset requester identity and the requester name, and the preset requester identity and the requester name are in one-to-one correspondence;
and the display module is used for displaying the name of the requester.
7. An apparatus for authorizing an article, comprising:
at least 1 memory cell;
a processing unit coupled to the at least 1 memory unit;
wherein the at least 1 storage unit is configured to store computer instructions;
the processing unit is configured to invoke the computer instructions to perform the method of any of claims 1-3.
8. A computer storage medium having stored thereon computer instructions which, when invoked, perform the method of any one of claims 1 to 3.
CN201810480922.5A 2018-05-18 2018-05-18 Authorization method and device for traceability data entry permission Active CN110502904B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810480922.5A CN110502904B (en) 2018-05-18 2018-05-18 Authorization method and device for traceability data entry permission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810480922.5A CN110502904B (en) 2018-05-18 2018-05-18 Authorization method and device for traceability data entry permission

Publications (2)

Publication Number Publication Date
CN110502904A CN110502904A (en) 2019-11-26
CN110502904B true CN110502904B (en) 2022-02-11

Family

ID=68584565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810480922.5A Active CN110502904B (en) 2018-05-18 2018-05-18 Authorization method and device for traceability data entry permission

Country Status (1)

Country Link
CN (1) CN110502904B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103268455A (en) * 2013-05-09 2013-08-28 华为技术有限公司 Method and device for accessing data
CN104079565A (en) * 2014-06-13 2014-10-01 小米科技有限责任公司 Authorization method and device
CN107194272A (en) * 2017-04-18 2017-09-22 北京潘达互娱科技有限公司 Database-access rights application method and device
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain
JP2018005802A (en) * 2016-07-08 2018-01-11 日立オートモティブシステムズ株式会社 Traceability id recording device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103268455A (en) * 2013-05-09 2013-08-28 华为技术有限公司 Method and device for accessing data
CN104079565A (en) * 2014-06-13 2014-10-01 小米科技有限责任公司 Authorization method and device
JP2018005802A (en) * 2016-07-08 2018-01-11 日立オートモティブシステムズ株式会社 Traceability id recording device
CN107194272A (en) * 2017-04-18 2017-09-22 北京潘达互娱科技有限公司 Database-access rights application method and device
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain

Also Published As

Publication number Publication date
CN110502904A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
US10019430B2 (en) System and method for automatically filling out forms
US11341490B2 (en) Carbon footprint blockchain network
EP3262785B1 (en) Tracking unitization occurring in a supply chain
CN111538786B (en) Block chain data desensitization and tracing storage method and device
Gjermundrød et al. privacyTracker: a privacy-by-design GDPR-compliant framework with verifiable data traceability controls
US20150033327A1 (en) Systems and methodologies for managing document access permissions
CN110533286B (en) Block chain-based coalition member management method and device and computer equipment
CN110287691A (en) Application program login method, device, equipment and storage medium
CN113205352B (en) Traceability chain platform system data interaction management method and system
CN111769941A (en) Business processing method and device and integrated business service system
JP2020502672A (en) System and method for user authorization
WO2011136782A1 (en) Document registry system
CN113297433A (en) Method and system for accessing graph database
US11019065B2 (en) Digital consent system and associated methods
CN108228691B (en) Processing method of data elements in government information management
CN110502904B (en) Authorization method and device for traceability data entry permission
CN109816338A (en) Enterprise's rewards and punishments processing method, device, computer equipment and storage medium
CN110516450B (en) Data acquisition authority management and control method, electronic device and computer readable storage medium
CN111641584A (en) Camera weak password monitoring method and device
CN109918552A (en) Malice group tells tendency personal identification method, server and computer readable storage medium
Suwanda et al. Information System for Operational Goods Management at the Career Guidance and Entrepreneurship Center Malikussaleh University
CN110532533B (en) Form precision collocation method, device, computer equipment and storage medium
CN113626844A (en) User authority control method, system, computer equipment and storage medium
CN112837043A (en) Data processing method and device based on block chain and electronic equipment
Mugiono Framework for smart contract blockchain in halal traceability, integrity, and transparency.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant