WO2019007260A1 - 表单字段值操作权限授权方法 - Google Patents
表单字段值操作权限授权方法 Download PDFInfo
- Publication number
- WO2019007260A1 WO2019007260A1 PCT/CN2018/093432 CN2018093432W WO2019007260A1 WO 2019007260 A1 WO2019007260 A1 WO 2019007260A1 CN 2018093432 W CN2018093432 W CN 2018093432W WO 2019007260 A1 WO2019007260 A1 WO 2019007260A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- role
- field value
- authorization
- operation authority
- authorized
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/174—Form filling; Merging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Definitions
- the invention relates to a management software form authorization method such as ERP, in particular to a form field value operation authority authorization method.
- the authorization of the form view authority based on the form field value can be realized.
- the selected form type is “order”
- the fields in the form for authorization control are “order number”, “customer name”, “ Customer address, “telephone”, “contact”, “customer's industry”, “product model”, “product quantity”, “product unit price”, etc., can realize the permission of a system user to view different order information in the order form.
- Separate controls such as allowing viewing of customer names in the order form, and not allowing viewing of calls in the order form.
- the defects of the traditional software system are: (1) When the form field value authorization is performed, the recently authorized operator and operation time cannot be displayed, and the file authority authorization cannot be responsible when the file authority authorization is wrong, and the current authorization operation cannot be performed. Provide a reference for the authorization time, which is not convenient to use. (2) The authorization of the form field value operation authority cannot be performed in batches for multiple roles, and the template authorization function is not supported. Each authorization must set each field one by one, and the authorization efficiency is low. The fields of the form in the large software system are often very Many, the traditional authorization method has a lot of work.
- role-based access control is one of the most researched and matured database rights management mechanisms in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and autonomous access control (DAC). .
- Traditional autonomous access control has high flexibility but low security. Forced access control is highly secure but too restrictive.
- Role-based access control combines both ease of management and reduces the complexity, cost, and probability of errors. Therefore, it has been greatly developed in recent years.
- the basic idea of role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and indirectly access database resources by being assigned different roles.
- the role-based permission control mechanism can manage the access rights of the system simply and efficiently, which greatly reduces the burden and cost of the system rights management, and makes the system rights management more in line with the business management specifications of the application system.
- the traditional role-based user rights management adopts the "role-to-user one-to-many" association mechanism, and the "role” is group/class nature, that is, one role can simultaneously correspond to/associate multiple users, and the role is similar to the post/
- the concept of position/work type the authorization of user rights under this association mechanism is basically divided into the following three forms: 1. As shown in Figure 1, the user is authorized directly, the disadvantage is that the workload is large, the operation is frequent and troublesome; Employee changes (such as transfer, resignation, etc.), all the form operation rights involved in the employee must be adjusted accordingly, especially for company management personnel, the form permissions involved, the task of authority adjustment is large and complicated. It is easy to make mistakes or omissions, affecting the normal operation of the company and even causing unpredictable losses.
- the role (class/group/post/work type) is authorized (a role can be associated with multiple users), the user obtains the permission through the role, and the approval operation subject is the group/class nature role; As shown in Figure 3, the above two methods are combined.
- both 2 and 3 need to authorize the role of the class/group nature, and the way of authorization and workflow control through the role of class/group/post/work type has the following disadvantages: 1.
- Difficulties in operation In the actual system use process, it is often necessary to adjust the user's authority during the operation process. For example, when dealing with employee permission changes, the employee rights associated with the role change, we cannot because of this Changes in employee permissions change the permissions of the entire role, because the role is also associated with other employees whose permissions have not changed. So in response to this situation, either create a new role to satisfy the employee whose permissions have changed, or directly authorize (disengage the role) from the employee based on the permission requirements.
- the above two processing methods not only require a long time for the role authorization in the case of a large number of role permissions, but also are easy to make mistakes, the user is cumbersome and troublesome to operate, and is also prone to errors resulting in loss to the system user.
- the employee/user's form operation permissions change either the employee/user is removed from the role or the role is added to meet the job requirements.
- the defect of the first method is the same as the above-mentioned "direct authorization to the user" method.
- the new role involves the creation, association, and authorization of the role. Especially in the case of a large number of roles and a large number of users associated with the role, it is difficult to remember which users are associated with the role.
- the object of the present invention is to overcome the deficiencies of the prior art, and provide a form field value operation authority authorization method, which realizes separate authorization of form field value operation authority and improves system management fineness; a role can only be associated with a unique one at a time. Users greatly improve the efficiency of rights management in the use of the system, making dynamic authorization simpler, more convenient, clearer and clearer, and improving the efficiency and reliability of authority authorization.
- a form field value operation authority authorization method an operation authority authorization step of a form field value, a step of selecting an authorized person, an operation authority authorization step and selection of a form field value
- the sequence of steps of the authorized person is in no particular order;
- the operation authority authorization step of the form field value includes the following steps: S1: selecting a form to be authorized, and displaying a field in the form that requires operation authority control;
- the authorized person is one or more roles, the role is an independent individual, not a group/class, and a role can only associate with a unique user in the same time period. And a user associates one or more roles.
- the operation authority includes one or two of viewing and modification.
- the display mode includes: (1) displaying the field corresponding to the field value, but hiding the field value with the concealer; (2) the field value and the field corresponding to the field value are not displayed.
- the role belongs to the department, and the role is unique under the department.
- the role is authorized according to the work content of the role, and the user obtains the permission by associating the role.
- the name of the role is unique under the department, and the number of the role is unique in the system.
- the user When a user moves across departments, the user is first associated with the role in the original department, and then the user is associated with the role in the new department.
- the form field value operation authority authorization method further includes a template authorization step, which specifically includes: (1) selecting an authorized person and an authorization form, selecting one or more roles as the authorized person; and (2) authorizing the authorized person: Select an existing role or created template as the authorization template, and assign the form field value operation authority of the authorization template to the authorized person; (3) save or not modify and save the form field value operation authority of the authorized person.
- a template authorization step specifically includes: (1) selecting an authorized person and an authorization form, selecting one or more roles as the authorized person; and (2) authorizing the authorized person: Select an existing role or created template as the authorization template, and assign the form field value operation authority of the authorization template to the authorized person; (3) save or not modify and save the form field value operation authority of the authorized person.
- a form field value operation authority authorization method including an operation authority authorization step of a form field value and a step of selecting an authorized person, an operation authority authorization step of the form field value, and an order of selecting the authorized person in no order;
- the operation authority authorization step of the field value includes the following steps: S1: selecting a form to be authorized; S2: selecting an operation authority to be authorized; S3: setting a field in the form having the selected operation authority, the set
- the field has the selected operational authority (ie, has the corresponding operational authority for the field value of the field);
- the authorized person is one or more roles, the role is an independent individual, not a group/class A role can only be associated with a unique user at the same time, and a user is associated with one or more roles.
- the invention has the following advantages: 1) The invention can realize the separate authorization of the operation authority of the form field value, and improves the fineness of the system management; the operation authority includes the viewing and modification, and is particularly suitable for the field values of the fields of the form to be separately authorized.
- the situation For example, in the order form, a system role is allowed to view the "order number", "customer name”, “customer address”, “customer industry”, “product model”, “product quantity”, “product unit price”, but not allowed View the contents of the "Phone” and "Contact” sensitive fields (ie, field values).
- This method can be used to quickly implement separate authorization.
- a system role is allowed to view the content of the “product unit price” field, but the content of the “product unit price” field is not allowed to be modified, and the method can also quickly implement the permission setting.
- the authorized person Zhang San's latest contract form field value operation authority authorization operation is completed by Li Si at 11:00 on May 21, 2015.
- the authorized person chooses Zhang San and the authorization form is selected as the contract
- the authorized operator showed that Li Si had authorized the contract form for Zhang San at 11:00 on May 21, 2015.
- Zhang San should not have the right to view the contents of a confidential field, and the last time he authorized Zhang San, Zhang San has the right to view the contents of the confidential field. In the process of subsequent accountability, you can find the last time. Authorize the operator to find the responsible person.
- an operator needs to authorize the contract form field value for 100 authorized persons, but the operator only completes the authorization of 70 authorized persons on the same day, and the operator can pass the authorization when the operator continues the authorization the next day.
- View the last authorized time of each authorized person to determine if the authorized person requires authorization. It is also possible to search through the authorized time interval for all authorized persons authorized within the specified time interval. By looking at the authorized person's last authorized time, it is possible to know how long the authorized person's authority has not changed, which is helpful for visually determining whether it is necessary to re-authorize it.
- This method can select multiple authorized roles for batch authorization at the same time, which improves the authorization efficiency.
- this method supports template authorization, that is, selects an existing role or created a template as an authorization template, and forms the authorization template.
- the field value operation authority directly grants (updates) the authorized person (and saves it after simple modification), and the authorization operation is simple and efficient. The combination of the two methods greatly improves the authorization efficiency of the system form field value operation authority.
- the role of the application is a one-to-one relationship to the user.
- One role can only be associated with a unique user at the same time, and one user is associated with one or more roles.
- the advantage of this is that as long as the user is associated with the role, the permission can be obtained. (ie, the user gains access to their associated role), and the role's permission changes are much less than the user permissions in the traditional mechanism.
- the number of roles of the nature of the independent body (the nature of the post number/station number) is small. Although the employee turnover is large, the change of the post number/station number is small (even if there is no change in a certain period of time, that is, the role does not change), This will greatly simplify the user's rights management and reduce the overhead of the system.
- the traditional rights management mechanism defines roles as groups, types of work, classes, etc.
- the role is a one-to-many relationship with the user. In the actual system use process, it is often necessary to adjust the user's rights during the operation process. For example, when dealing with employee permission changes, the permissions of an employee associated with the role change. We cannot change the permissions of the entire role because of the change of the individual employee permissions, because the role is also associated with other employees whose permissions have not changed. . So in response to this situation, either create a new role to satisfy the employee whose permissions have changed, or directly authorize (disengage the role) from the employee based on the permission requirements.
- the above two processing methods not only require a long time for the role authorization in the case of a large number of role permissions, but also are easy to make mistakes, the user is cumbersome and troublesome to operate, and is also prone to errors resulting in loss to the system user.
- the role since the role is an independent individual, the role permission can be changed to achieve the goal.
- the method of the present application seems to increase the workload when the system is initialized, it can be made by copying or the like to make the role or authorization more efficient than the traditional group/class nature, because the group/class role is not considered.
- the application scheme will make the permission setting clear and clear; especially after the system is used for a period of time (the user/role authority changes dynamically), the application scheme can greatly improve the system usage for the system user.
- the efficiency of the rights management makes the dynamic authorization simpler, more convenient, clearer and clearer, and improves the efficiency and reliability of the permission setting.
- the traditional group/class role authorization method is error-prone, and the method of the present application greatly reduces the probability of authorization errors, because the method of the present application only needs to consider the role as an independent individual, without considering the traditional method to associate the role of the group. What are the commonalities of multiple users? Even if the authorization error occurs, it only affects the user associated with the role, while the traditional group-based role affects all users associated with the role. Even if a permission authorization error occurs, the correction method of the present application is simple and short, and the traditional group-type role needs to consider the commonality of all users associated with the role when correcting the error, and not only the modification when there are many function points. Troublesome, complicated, very error-prone, and in many cases only new roles can be created.
- the method of the present application is as follows: the transferred user associates several roles.
- the user When adjusting the post, the user is first unlinked from the role in the original department (the canceled roles can be re-associated to other users), and then Associate users with roles in the new department. The operation is simple and will not go wrong.
- FIG. 1 is a schematic diagram of a manner in which a system directly authorizes a user in the background art
- FIG. 2 is a schematic diagram of a manner in which a system authorizes a group/class role in the background art
- FIG. 3 is a schematic diagram of a manner in which a system directly authorizes a user and authorizes a group/class role role in the background art
- FIG. 4 is a schematic diagram of a manner in which a system authorizes a user through an independent individual role
- Figure 5 is a schematic diagram of the selected author in the present invention when one is selected and the form is selected;
- FIG. 6 is a schematic diagram of a selected one of the selected persons in the present invention and a selected form
- FIG. 7 is a schematic diagram of an authorization template used for authorizing a licensee in the present invention.
- FIG. 8 is a schematic diagram of an order form in an embodiment of the present invention.
- a form field value operation authority authorization method including an operation authority authorization step of a form field value and a step of selecting an authorized person, an operation authority authorization step of the form field value, and an order of selecting the authorized person in no order;
- the operation authority authorization step of the field value includes the following steps: S1: selecting a form to be authorized, displaying a field in the form that needs to be controlled by the operation authority; S2: authorizing the operation authority of the field value of each field separately (right The field displayed by S1 that needs to perform operation authority control is authorized; and the field that does not need to perform permission control for the field value not displayed by S1 may have the view value and/or the modification authority by default, and the operation authority includes View one or both of them.
- the authorized person can determine the permission to view and modify the content (field value) of each field in the form.
- the invention can realize the separate authorization of the operation authority of the form field value, and improves the fineness of the system management; the operation authority includes the viewing and modification, and is particularly suitable for the case where the field values of the fields of the form need to be separately authorized.
- the system role clerk 1 Zhang San
- This method can be used to quickly implement separate authorization.
- the clerk 1 (Zhang San) is allowed to view the content of the “product unit price” field, but the content of the “product unit price” field is not allowed to be modified, and the method can also quickly implement the permission setting.
- the effect chart is shown in Figure 5.
- the authorized person is one or more roles, and the role is an independent individual, not a group/class, and a role can only associate with a unique user in the same period.
- a user is associated with one or more roles.
- the role belongs to the department, and the role is unique under the department.
- the role is authorized according to the work content of the role, and the user obtains the permission by associating the role.
- the name of the role is unique under the department, and the number of the role is unique in the system.
- the user determines (acquires) the permission through the association with the role, and if the user's permission is to be modified, the authority of the role is adjusted. In order to achieve the purpose of changing the permissions of the user associated with the role. Once a user associates a role, that user has all the operational privileges for that role.
- the role of the role to the user is one-to-one (when the role is associated with a user, other users can no longer associate the role; if the role is not associated with the user, it can be selected by other users; that is, a role can be And can only be associated by one user).
- a user's relationship to a role is one-to-many (one user can associate multiple roles at the same time).
- Role definition The role does not have the nature of group/class/category/post/job/work, but a non-collection nature, the role is unique, the role is an independent independent entity; in the enterprise application is equivalent Job number (The job number here is not a post, one post may have multiple employees at the same time, and one job number can only correspond to one employee at the same time).
- a company system can create the following roles: general manager, deputy general manager 1, deputy general manager 2, Beijing sales manager, Beijing sales manager, Beijing sales manager, Shanghai sales engineer 1, Shanghai sales Engineer 2, Shanghai Sales Engineer 3, Shanghai Sales Engineer 4, Shanghai Sales Engineer 5...
- general manager deputy general manager 1, deputy general manager 2, Beijing sales manager, Beijing sales manager, Shanghai sales engineer 1, Shanghai sales Engineer 2, Shanghai Sales Engineer 3, Shanghai Sales Engineer 4, Shanghai Sales Engineer 5...
- Zhang San serves as the company's deputy general manager 2, and also serves as a sales manager in Beijing, then Zhang The three roles to be associated are Deputy General Manager 2 and Beijing Sales Manager. Zhang San has the rights to these two roles.
- roles are group/class/post/position/work type, and one role can correspond to multiple users.
- the concept of "role" in this application is equivalent to the post number/station number, and is similar to the role in the film and television drama: a character can only be played by one actor at the same time (childhood, juvenile, middle-aged). And an actor may be decorated with multiple angles.
- the role After the role is created, you can associate the role in the process of creating the user, or you can associate it at any time after the user is created. After the user associates the role, the relationship with the role can be released at any time, and the relationship with other roles can be established at any time.
- the composition of the character is: post name + post number.
- workshop production workers 1, workshop production workers 2, workshop production workers 3... roles are independent individuals, equivalent to the concept of job number and station number, different from the role in the traditional authority management system, the concept of role in the traditional system It is the group/class nature of the position/position/work type.
- the following example shows the relationship between employees, users and roles after the employee Zhang San enters a company: 1. New entry: The employee is newly hired, and directly associates the role of the corresponding job number/station number for the user (employee). Yes, for example: Zhang San joined the company (the company assigned a three-user for Zhang San), the job content is in the sales department, responsible for the sales of refrigerator products in Beijing area (the corresponding role is to sell the sales engineer under the 5 "This role", Zhang San users directly select the "sales engineer 5" role association.
- Zhang also arranged for Zhang San to be responsible for the sales of regional TV products in Beijing (the corresponding role is to sell the role of “Sales Engineer 8” under the Ministry of Sales) and concurrently as the head of the after-sales department (corresponding to the after-sales department)
- the three users added the roles of “sales engineer 8” under the sales department and “sales department supervisor 1” under the after-sales department.
- Zhang San employees associated three roles, respectively.
- Zhang San users have the authority of these three roles.
- Zhang San serves as the post-sales manager (corresponding to the role of “after-sales manager” in the after-sales department) and no longer take up other jobs. Then Zhang San user is associated with the role of “after-sales manager” in the after-sales department, and cancels the three roles previously associated (Sales Engineer 5 under Sales, Sales Engineer 8 and “After Sales Manager 1” under the after-sales department) At this time, Zhang San users only have the authority of the role of “after-sales manager” under the after-sales department.
- This application authorizes the role of the nature of the post number/station number, and the user determines the (acquired) authority by associating the role, and the control of the user authority is realized by a simple user-role relationship. It makes the permission control simple, easy to operate, clear and clear, and greatly improves the authorization efficiency and authorization reliability.
- one or more of the licenseees may be selected, and only one of the forms to be authorized may be selected.
- the authorized person selects one and only one, and the form to be authorized is selected, the operator who has recently authorized the form field value authorization for the authorized person and the operation time are displayed.
- the recent form field value operation authority authorization operator and operation time are displayed, and the field value of the current authorized person to the form is also displayed.
- the operation authority status is modified and saved to obtain its new field value operation authority.
- Displaying the recent operator is convenient for responsibility when the form field value authority authorization error occurs, and displaying the latest operation time is convenient for visually determining whether the form field value authorization needs to be re-executed.
- the authorized person Zhang San's latest contract form field value operation authority authorization operation is completed by Li Si at 11:00 on May 21, 2015.
- the authorized person chooses Zhang San and the authorization form is selected as the contract
- the authorized operator showed that Li Si had authorized the contract form for Zhang San at 11:00 on May 21, 2015.
- Zhang San should not have the right to view the contents of a confidential field, and the last time he authorized Zhang San, Zhang San has the right to view the contents of the confidential field. In the process of subsequent accountability, you can find the last time. Authorize the operator to find the responsible person.
- an operator needs to authorize the contract form field value for 100 authorized persons, but the operator only completes the authorization of 70 authorized persons on the same day, and the operator can pass the authorization when the operator continues the authorization the next day.
- View the last authorized time of each authorized person to determine if the authorized person requires authorization. It is also possible to search through the authorized time interval for all authorized persons authorized within the specified time interval. By looking at the authorized person's last authorized time, it is possible to know how long the authorized person's authority has not changed, which is helpful for visually determining whether it is necessary to re-authorize it.
- the display manner includes: (1) displaying a field corresponding to the field value, but hiding the field value with a concealer, as shown in FIG. Fields "telephone”, “contact”, but hide the field content with *; (2) the field value and the field corresponding to the field value are not displayed.
- the difference display is also required.
- the field value with no modification permission is displayed as a gray shading, as shown in Figure 8.
- a form contains basic fields and detail fields, and the detail fields are the column names on the detail list in the form.
- the basic fields include the order number, customer name, customer address, phone number, contact, customer's industry, etc.; the detail field contains the product model, product quantity, product unit price, and so on.
- the basic field and the detail field are distinguishable and displayed, so that the operator can distinguish at the time of authorization.
- the basic fields order number, customer name, customer address, phone number, contact, and the normal font of the customer's industry can be displayed.
- the detailed fields product model, product quantity, and product unit price are in italics. display.
- the form field value operation authority authorization method further includes a template authorization step, which specifically includes: (1) selecting an authorized person and an authorization form, and selecting one or more roles as the authorized person; (2) Authorize the authorized person: select an existing role or created a template as an authorization template, and assign the form field value operation authority of the authorization template to the authorized person; (3) save the modified or not modified Authorized person's form field value operation permission.
- a template authorization step specifically includes: (1) selecting an authorized person and an authorization form, and selecting one or more roles as the authorized person; (2) Authorize the authorized person: select an existing role or created a template as an authorization template, and assign the form field value operation authority of the authorization template to the authorized person; (3) save the modified or not modified Authorized person's form field value operation permission.
- the template authorization method first select the authorized clerk 1 (Zhang San), select the authorization form "Order Form”, select the created template 1 as the authorization template, and create the template field value operation permission of the template 1.
- the clerk 1 (Zhang San) field value operation authority modify or not modify and save the clerk 1 (Zhang San) form field value operation authority.
- the method can select multiple authorized roles for batch authorization at the same time, and improve the authorization efficiency.
- the method supports template authorization, that is, selecting an existing role or a created template as an authorization template, and the form field value of the authorization template.
- the operation authority directly grants (updates) the authorized person (and then saves it after simple modification), and the authorization operation is simple and efficient.
- the combination of the two methods greatly improves the authorization efficiency of the system form field value operation authority.
- an operation authority is first selected, and a field having the operation authority is set.
- a form field value operation authority authorization method including an operation authority authorization step of a form field value and a step of selecting an authorized person, an operation authority authorization step of the form field value, and an order of selecting the authorized person in no order;
- the operation authority authorization step of the field value includes the following steps: S1: selecting a form to be authorized; S2: selecting an operation authority to be authorized; S3: setting a field in the form having the selected operation authority, the set
- the field has the selected operational authority (ie, has the corresponding operational authority for the field value of the field);
- the authorized person is one or more roles, the role is an independent individual, not a group/class A role can only be associated with a unique user at the same time, and a user is associated with one or more roles.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- Software Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Marketing (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
Description
Claims (9)
- 表单字段值操作权限授权方法,其特征在于,包括一个表单字段值的操作权限授权步骤和一个选择被授权者的步骤,表单字段值的操作权限授权步骤和选择被授权者的步骤顺序不分先后;所述表单字段值的操作权限授权步骤包括以下步骤:S1:选择一个要进行授权的表单,显示出该表单中需要进行操作权限控制的字段;S2:对各字段的字段值的操作权限分别进行授权;所述的被授权者为一个或多个角色,所述的角色是独立的个体,而非组/类,同一时段一个角色只能关联唯一的用户,而一个用户关联一个或多个角色。
- 根据权利要求1所述的表单字段值操作权限授权方法,其特征在于:所述的操作权限包括查看和修改中的一种或两种。
- 根据权利要求2所述的表单字段值操作权限授权方法,其特征在于:对于不具备查看权限的字段值,其显示方式包括:(1)显示该字段值对应的字段,但以隐藏符隐藏字段值;(2)该字段值及该字段值对应的字段均不显示。
- 根据权利要求1所述的表单字段值操作权限授权方法,其特征在于:被授权者选为有且只有一个,且要授权的表单选定时,显示最近对该被授权者进行该表单字段值授权的操作者和操作时间。
- 根据权利要求1所述的表单字段值操作权限授权方法,其特征在于:所述角色归属于部门,该角色在该部门下唯一,根据角色的工作内容对角色进行授权,用户通过关联角色获得权限。
- 根据权利要求5所述的表单字段值操作权限授权方法,其特征在于:所述角色的名称在部门下唯一,角色的编号在系统中唯一。
- 根据权利要求5或6所述的表单字段值操作权限授权方法,其特征在于:用户跨部门调岗时,先取消用户与原部门内的角色的关联,再将用户与新部门内的角色进行关联。
- 根据权利要求1所述的表单字段值操作权限授权方法,其特征在于:还包括一个模板授权步骤,具体包括:(1)选择被授权者和授权表单,选择一个或多个角色作为被授权者;(2)对被授权者进行授权:选择一个现有角色或已创建模板作为授权模板,将该授权模板的表单字段值操作权限赋予该被授权者;(3)修改或不修改后保存得到该被授权者的表单字段值操作权限。
- 表单字段值操作权限授权方法,其特征在于,包括一个表单字段值的操作权限授权步骤和一个选择被授权者的步骤,表单字段值的操作权限授权步骤和选择被授权者的步骤顺序不分先后;所述表单字段值的操作权限授权步骤包括以下步骤:S1:选择一个要进行授权的表单;S2:选择要进行授权的操作权限;S3:设置具有该所选操作权限的表单中的字段,则所设置的字段具有了该所选操作权限;所述的被授权者为一个或多个角色,所述的角色是独立的个体,而非组/类,同一时段一个角色只能关联唯一的用户,而一个用户关联一个或多个角色。
Priority Applications (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/628,551 US11507651B2 (en) | 2017-07-05 | 2018-06-28 | Method for authorizing operation permissions of form-field values |
MX2019015913A MX2019015913A (es) | 2017-07-05 | 2018-06-28 | Procedimiento para autorizar permisos de operaciones de valores de campo de formulario. |
EP18828217.2A EP3651036A4 (en) | 2017-07-05 | 2018-06-28 | PROCESS FOR AUTHORIZING PERMISSIONS TO EXPLOIT FORM FIELD VALUES |
KR1020207001594A KR20200017512A (ko) | 2017-07-05 | 2018-06-28 | 폼 필드값의 조작 권한을 권한부여하는 방법 |
PE2019002676A PE20200286A1 (es) | 2017-07-05 | 2018-06-28 | Procedimiento para autorizar permisos de operaciones de valores de campo de formulario |
BR112020000169-4A BR112020000169A2 (pt) | 2017-07-05 | 2018-06-28 | método para autorizar permissões de operação de valores de campo de formulário |
AU2018296471A AU2018296471A1 (en) | 2017-07-05 | 2018-06-28 | Method for authorizing operation permissions of form field values |
CA3068903A CA3068903A1 (en) | 2017-07-05 | 2018-06-28 | Method for authorizing operation permissions of form-field values |
UAA202000674A UA127351C2 (uk) | 2017-07-05 | 2018-06-28 | Спосіб надання прав стосовно прав на роботу для значень поля форми |
JP2019571525A JP7540660B2 (ja) | 2017-07-05 | 2018-06-28 | フォームフィールド値の操作権限承認方法 |
EA202090222A EA202090222A1 (ru) | 2017-07-05 | 2018-06-28 | Способ предоставления прав на выполнение операций со значением поля формы |
CONC2019/0015066A CO2019015066A2 (es) | 2017-07-05 | 2019-12-30 | Procedimiento para autorizar permisos de operaciones de valores de campo de formulario |
PH12020500010A PH12020500010A1 (en) | 2017-07-05 | 2020-01-02 | Method for authorizing operation permissions of form-field values |
ZA2020/00579A ZA202000579B (en) | 2017-07-05 | 2020-01-28 | Method for authorizing operation permissions of form field values |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710543859.0A CN107315931A (zh) | 2017-07-05 | 2017-07-05 | 表单字段值操作权限授权方法 |
CN201710543859.0 | 2017-07-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019007260A1 true WO2019007260A1 (zh) | 2019-01-10 |
Family
ID=60180698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/093432 WO2019007260A1 (zh) | 2017-07-05 | 2018-06-28 | 表单字段值操作权限授权方法 |
Country Status (16)
Country | Link |
---|---|
US (1) | US11507651B2 (zh) |
EP (1) | EP3651036A4 (zh) |
JP (1) | JP7540660B2 (zh) |
KR (1) | KR20200017512A (zh) |
CN (2) | CN107315931A (zh) |
AU (1) | AU2018296471A1 (zh) |
BR (1) | BR112020000169A2 (zh) |
CA (1) | CA3068903A1 (zh) |
CO (1) | CO2019015066A2 (zh) |
EA (1) | EA202090222A1 (zh) |
MX (1) | MX2019015913A (zh) |
PE (1) | PE20200286A1 (zh) |
PH (1) | PH12020500010A1 (zh) |
UA (1) | UA127351C2 (zh) |
WO (1) | WO2019007260A1 (zh) |
ZA (1) | ZA202000579B (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107315931A (zh) | 2017-07-05 | 2017-11-03 | 成都牵牛草信息技术有限公司 | 表单字段值操作权限授权方法 |
CN107358093A (zh) * | 2017-07-11 | 2017-11-17 | 成都牵牛草信息技术有限公司 | 通过第三方字段对表单字段的字段值进行授权的方法 |
CN107330307A (zh) * | 2017-07-16 | 2017-11-07 | 成都牵牛草信息技术有限公司 | 一种表单数据操作权限授权方法 |
CN107480556A (zh) | 2017-08-07 | 2017-12-15 | 成都牵牛草信息技术有限公司 | 基于列值对统计列表操作权限进行分别授权的方法 |
CN107895249B (zh) * | 2017-11-25 | 2021-02-09 | 深圳市易达云科技有限公司 | 一种订单状态呈现方法及系统 |
CN109977697A (zh) * | 2019-04-03 | 2019-07-05 | 陕西医链区块链集团有限公司 | 一种区块链的数据授权方法 |
CN110046205B (zh) * | 2019-04-22 | 2021-04-09 | 瀚高基础软件股份有限公司 | 一种关系型数据库行安全访问控制方法及系统 |
CN110197051A (zh) * | 2019-06-13 | 2019-09-03 | 浪潮软件股份有限公司 | 一种权限控制的方法、终端及计算机可读存储介质 |
CN110457529B (zh) * | 2019-07-05 | 2022-07-12 | 中国平安财产保险股份有限公司 | 岗位数据处理方法、装置、计算机设备及存储介质 |
CN110533385A (zh) * | 2019-08-08 | 2019-12-03 | 国云科技股份有限公司 | 一种基于角色的多表多字段的数据权限控制方法 |
CN111177252B (zh) * | 2019-11-26 | 2023-07-25 | 腾讯云计算(北京)有限责任公司 | 一种业务数据的处理方法及装置 |
CN112632492B (zh) * | 2020-12-18 | 2021-08-13 | 杭州新中大科技股份有限公司 | 一种用于矩阵化管理的多维权限模型设计方法 |
CN112749537A (zh) * | 2021-01-14 | 2021-05-04 | 浙江红极互联网科技有限公司 | 一种基于角色的电子工程文档管理方法 |
CN114840521B (zh) * | 2022-04-22 | 2023-03-21 | 北京友友天宇系统技术有限公司 | 数据库的权限管理和数据保护方法、装置、设备和存储介质 |
CN115828222B (zh) * | 2022-11-02 | 2023-09-29 | 广州宏天软件股份有限公司 | 一种集中分配自定义引擎权限的方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699565A (zh) * | 2013-10-31 | 2014-04-02 | 于丽珠 | 一种分布式数据库的建立 |
CN104091130A (zh) * | 2014-07-01 | 2014-10-08 | 中国北方发动机研究所(天津) | 企业数据管理平台中的权限控制方法 |
CN107315931A (zh) * | 2017-07-05 | 2017-11-03 | 成都牵牛草信息技术有限公司 | 表单字段值操作权限授权方法 |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040006594A1 (en) | 2001-11-27 | 2004-01-08 | Ftf Technologies Inc. | Data access control techniques using roles and permissions |
US7703021B1 (en) | 2002-05-24 | 2010-04-20 | Sparta Systems, Inc. | Defining user access in highly-configurable systems |
JP4292342B2 (ja) * | 2003-07-14 | 2009-07-08 | レーザーテック株式会社 | 電子承認システムにおける承認ルート決定方法及びプログラム |
US7734999B2 (en) * | 2005-01-03 | 2010-06-08 | Emergis Inc. | System and method for providing forms on a user interface |
US8336078B2 (en) * | 2006-07-11 | 2012-12-18 | Fmr Corp. | Role-based access in a multi-customer computing environment |
CN101299694B (zh) | 2007-04-30 | 2012-04-25 | 华为技术有限公司 | 家庭网络中访客管理的方法及系统、家庭网关 |
JP2008299702A (ja) * | 2007-06-01 | 2008-12-11 | Fuji Xerox Co Ltd | 情報処理プログラム及び情報処理システム |
JP2010020525A (ja) | 2008-07-10 | 2010-01-28 | Mitsubishi Electric Corp | 検索装置及びコンピュータプログラム及び検索方法 |
CN101520875A (zh) * | 2009-04-07 | 2009-09-02 | 金蝶软件(中国)有限公司 | 对用户数据进行权限控制的方法及信息管理系统 |
CN102004868A (zh) | 2009-09-01 | 2011-04-06 | 上海杉达学院 | 一种基于角色访问控制的信息系统数据存储层及组建方法 |
US8332917B2 (en) | 2009-12-29 | 2012-12-11 | International Business Machines Corporation | Providing secure dynamic role selection and managing privileged user access from a client device |
EP2529300A4 (en) * | 2010-01-27 | 2017-05-03 | Varonis Systems, Inc. | Time dependent access permissions |
US20110231322A1 (en) * | 2010-03-16 | 2011-09-22 | Copyright Clearance Center, Inc. | Automated rules-based rights resolution |
JP5538981B2 (ja) * | 2010-03-31 | 2014-07-02 | キヤノン株式会社 | 帳票生成装置、帳票生成装置の制御方法、プログラム |
US20120036263A1 (en) | 2010-05-21 | 2012-02-09 | Open Subnet Inc. | System and Method for Monitoring and Controlling Access to Web Content |
WO2012126528A1 (en) * | 2011-03-24 | 2012-09-27 | Atos It Solutions And Services Gmbh | System and method for user access management |
JP5814639B2 (ja) | 2011-06-09 | 2015-11-17 | キヤノン株式会社 | クラウドシステム、クラウドサービスのライセンス管理方法、およびプログラム |
JP2013007708A (ja) * | 2011-06-27 | 2013-01-10 | Hitachi High-Technologies Corp | 検査装置及び検査レシピの隠蔽方法 |
CN102316216A (zh) * | 2011-09-07 | 2012-01-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种终端自适应角色的方法及终端 |
JP5723338B2 (ja) * | 2011-09-19 | 2015-05-27 | 株式会社東芝 | データ共有システム |
CN102567675B (zh) | 2012-02-15 | 2015-09-30 | 合一网络技术(北京)有限公司 | 一种业务系统下的用户权限管理方法和系统 |
US20130263237A1 (en) | 2012-03-30 | 2013-10-03 | Ebay Inc. | User authentication and authorization using personas |
CN102779040B (zh) | 2012-06-21 | 2015-11-18 | 东莞市微模式软件有限公司 | 一种生成自定义表单的方法和装置 |
CN102902767A (zh) | 2012-09-25 | 2013-01-30 | 北京科东电力控制系统有限责任公司 | 一种表格快速搭建的方法及系统 |
CN102932340A (zh) | 2012-10-25 | 2013-02-13 | 上海电机学院 | 基于角色的访问控制系统及方法 |
CN103971036B (zh) * | 2013-01-28 | 2017-03-01 | 深圳学无国界教育科技有限公司 | 页面栏位权限控制系统及方法 |
US20140258226A1 (en) * | 2013-03-11 | 2014-09-11 | Southpaw Technology, Inc. | Asynchronous transaction management, systems and methods |
CN104463005A (zh) | 2013-09-25 | 2015-03-25 | 天津书生投资有限公司 | 一种控制电子文档的访问权限的方法 |
KR101668550B1 (ko) | 2015-01-07 | 2016-10-21 | 충북대학교 산학협력단 | 비밀번호 기반 역할 및 권한 부여 장치 및 방법 |
CN105303084A (zh) * | 2015-09-24 | 2016-02-03 | 北京奇虎科技有限公司 | 权限管理系统及方法 |
CN105630759A (zh) | 2015-12-28 | 2016-06-01 | 北京致远协创软件有限公司 | 一种数据引用的装置及方法 |
CN105653977B (zh) | 2015-12-28 | 2019-07-05 | 上海瀚银信息技术有限公司 | 一种菜单权限配置方法及系统 |
CN105868357B (zh) | 2016-03-29 | 2019-02-22 | 凯里供电局 | 文件管控系统及方法 |
US9705931B1 (en) * | 2016-07-13 | 2017-07-11 | Lifetrack Medical Systems Inc. | Managing permissions |
CN106570406A (zh) * | 2016-10-27 | 2017-04-19 | 深圳前海微众银行股份有限公司 | 数据级权限配置方法及装置 |
CN107292588A (zh) | 2017-07-01 | 2017-10-24 | 成都牵牛草信息技术有限公司 | 根据表单字段值对表单操作权限进行分别授权的方法 |
-
2017
- 2017-07-05 CN CN201710543859.0A patent/CN107315931A/zh active Pending
-
2018
- 2018-06-28 EP EP18828217.2A patent/EP3651036A4/en active Pending
- 2018-06-28 CA CA3068903A patent/CA3068903A1/en not_active Abandoned
- 2018-06-28 AU AU2018296471A patent/AU2018296471A1/en not_active Abandoned
- 2018-06-28 CN CN201810689172.2A patent/CN108920915B/zh active Active
- 2018-06-28 MX MX2019015913A patent/MX2019015913A/es unknown
- 2018-06-28 KR KR1020207001594A patent/KR20200017512A/ko not_active Application Discontinuation
- 2018-06-28 US US16/628,551 patent/US11507651B2/en active Active
- 2018-06-28 JP JP2019571525A patent/JP7540660B2/ja active Active
- 2018-06-28 BR BR112020000169-4A patent/BR112020000169A2/pt not_active IP Right Cessation
- 2018-06-28 PE PE2019002676A patent/PE20200286A1/es unknown
- 2018-06-28 WO PCT/CN2018/093432 patent/WO2019007260A1/zh active Search and Examination
- 2018-06-28 EA EA202090222A patent/EA202090222A1/ru unknown
- 2018-06-28 UA UAA202000674A patent/UA127351C2/uk unknown
-
2019
- 2019-12-30 CO CONC2019/0015066A patent/CO2019015066A2/es unknown
-
2020
- 2020-01-02 PH PH12020500010A patent/PH12020500010A1/en unknown
- 2020-01-28 ZA ZA2020/00579A patent/ZA202000579B/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699565A (zh) * | 2013-10-31 | 2014-04-02 | 于丽珠 | 一种分布式数据库的建立 |
CN104091130A (zh) * | 2014-07-01 | 2014-10-08 | 中国北方发动机研究所(天津) | 企业数据管理平台中的权限控制方法 |
CN107315931A (zh) * | 2017-07-05 | 2017-11-03 | 成都牵牛草信息技术有限公司 | 表单字段值操作权限授权方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3651036A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN108920915A (zh) | 2018-11-30 |
CO2019015066A2 (es) | 2020-04-24 |
JP2020528174A (ja) | 2020-09-17 |
PE20200286A1 (es) | 2020-02-05 |
MX2019015913A (es) | 2020-08-20 |
CA3068903A1 (en) | 2019-01-10 |
PH12020500010A1 (en) | 2020-12-07 |
EP3651036A4 (en) | 2021-04-21 |
EA202090222A1 (ru) | 2020-08-25 |
AU2018296471A1 (en) | 2020-01-30 |
UA127351C2 (uk) | 2023-07-26 |
US11507651B2 (en) | 2022-11-22 |
CN108920915B (zh) | 2021-10-29 |
CN107315931A (zh) | 2017-11-03 |
US20200218796A1 (en) | 2020-07-09 |
ZA202000579B (en) | 2021-01-27 |
JP7540660B2 (ja) | 2024-08-27 |
EP3651036A1 (en) | 2020-05-13 |
BR112020000169A2 (pt) | 2020-07-07 |
KR20200017512A (ko) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019007260A1 (zh) | 表单字段值操作权限授权方法 | |
WO2018196876A1 (zh) | 基于角色对用户一对一的工作流控制方法和系统 | |
CN108764833B (zh) | 工作流审批节点按部门设置审批角色的方法 | |
WO2019007292A1 (zh) | 基于角色的表单操作权限授权方法 | |
CN108984715B (zh) | 基于依据字段设置审批流程的方法 | |
WO2018210245A1 (zh) | 工作流及其审批节点的表单字段操作权限的设定方法 | |
WO2018214890A1 (zh) | 工作流审批节点按角色设置审批角色的方法 | |
WO2018210248A1 (zh) | 基于表单字段的工作流审批节点设置审批角色的方法 | |
WO2018224024A1 (zh) | 工作流审批节点高效审批方法 | |
CN108550029B (zh) | 工作流审批节点按部门级别设置审批角色的方法 | |
JP7318894B2 (ja) | 統計列表の操作権限の承認方法 | |
JP7231910B2 (ja) | フォームデータの操作権限を承認する方法 | |
WO2018192557A1 (zh) | 基于角色对用户的一对一的权限授权方法和系统 | |
WO2019015656A1 (zh) | 一种系统派工方法 | |
WO2019007291A1 (zh) | 根据表单字段值对表单操作权限进行分别授权的方法 | |
WO2019007210A1 (zh) | 一种表单的关联信息授权方法 | |
WO2019011162A1 (zh) | 快捷功能设置方法 | |
WO2018224023A1 (zh) | 系统中员工登录其账户后的权限显示方法 | |
WO2019029649A1 (zh) | 对使用者进行审批流程及其审批节点授权的方法 | |
WO2019011255A1 (zh) | 通过第三方字段对表单字段的字段值进行授权的方法 | |
WO2018205940A1 (zh) | 基于角色对用户的一对一的组织结构图生成及应用方法 | |
WO2019029500A1 (zh) | 基于列值对统计列表操作权限进行分别授权的方法 | |
WO2019001322A1 (zh) | 基于角色的菜单授权方法 | |
WO2019029502A1 (zh) | 系统中对授权操作者进行授权的方法 | |
WO2019024832A1 (zh) | 管理系统中事务处理的管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18828217 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2019571525 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 3068903 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020000169 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20207001594 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018296471 Country of ref document: AU Date of ref document: 20180628 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018828217 Country of ref document: EP Effective date: 20200205 |
|
ENP | Entry into the national phase |
Ref document number: 112020000169 Country of ref document: BR Kind code of ref document: A2 Effective date: 20200103 |