CN105912924A - Method for sending permissions to users' accounts in enterprise information management system - Google Patents
Method for sending permissions to users' accounts in enterprise information management system Download PDFInfo
- Publication number
- CN105912924A CN105912924A CN201610203752.7A CN201610203752A CN105912924A CN 105912924 A CN105912924 A CN 105912924A CN 201610203752 A CN201610203752 A CN 201610203752A CN 105912924 A CN105912924 A CN 105912924A
- Authority
- CN
- China
- Prior art keywords
- user account
- attribute
- permission
- authority
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method for sending permissions to users' accounts in an enterprise information management system. The method comprises following steps: setting basic permission properties of The invention provides a method for sending permissions to users' accounts in an enterprise information management system. The method comprises following steps: setting basic permission properties of users' accounts; generating basic permission codes of users' accounts based on basic permission properties; setting additional permission properties of users' accounts; generating additional permissiousers' accounts; generating basic permission codes of users' accounts based on basic permission properties; setting additional permission properties of users' accounts; generating additional permission codes of users' accounts based on additional permission properties; superposing additional permission codes to the basic permission properties in order to form total permission codes; and sending con codes of users' accounts based on additional permission properties; superposing additional permission codes to the basic permission properties in order to form total permission codes; and sending corresponding users' permissions to users' accounts based on total permission codes. By applying the method, flexibility of permission adjustments in the enterprise information management system can be rresponding users' permissions to users' accounts based on total permission codes. By applying the method, flexibility of permission adjustments in the enterprise information management system can be improved in order to avoid safety risks occurring in conventional permission adjustments.improved in order to avoid safety risks occurring in conventional permission adjustments.
Description
Technical field
The present invention relates to control of authority field in information management system, particularly relate to a kind of to company information pipe
User account in reason system issues the method for authority.
Background technology
In the enterprise information management system, can the control of authority to system information be to weigh a system expire
The Core Feature that foot user needs, is also the important component part of security system, Consumer's Experience.System
The various functions comprised in system to realize differential representing for different grades of user, its objective is to use
Authority acquired in family operating right in systems and its real work matches, and such as user logs in
After system, it is judged that this user have increase, delete, revise, inquire about, which authority such as examination & approval, and
Above-mentioned authority is applicable to which module and its scope of data related to.Its power having of different grades of user
Limit difference, such as, in production division, department manager user has multiple authority, such as inquiry and produces number
According to public expense expenditure power in the authority of all staff attendance data, inquiry this department in authority, inquiry this department
Limit, and the production operators user in this production division only has the authority checking creation data.
Further, ripe control of authority also includes the aspect quickly adjusting authority and distribution rights, i.e.
The manager of permission system is by the user in new authority imparting system, or the user in adjustment system takes
The authority obtained, this contributes to system and tackles change of personnel neatly, and realizes inter-sectional cooperation neatly
Complete a certain task.
The existing enterprise information management system uses data base to realize permissions mapping, such as by fixed in advance
The database table of justice stores the authority items of user and correspondence thereof.The when it come to adjustment to the authority of user,
The developer needing the enterprise information management system adjusts database table and just can realize, and therefore adds extra
Maintenance cost.
Some enterprise information management systems have one-dimensional rights management structure, the most only by a system pipes
Reason person carries out rights management, and the mode of this rights management is only applicable to medium-sized and small enterprises, many for including
The large-scale conglomerate of individual subunit is the most inapplicable, because the manager's workload being responsible for rights management is excessive.
Other enterprise information management systems have definition authority and the rule of administration authority of complexity, but it is weighed
The basic logic of limit management is that the logic managed downwards according to coupling actual tissue mechanism realizes, the most currently
The all permissions of user is only applicable to its subordinate unit of unit one belongs to and is allocated and operates, and technically cannot
Unit information at the same level is authorized or subordinate unit's operation superior unit mandate.Such as in group, first is public
All mandates on the user-orienfed principle of department can only cannot for the first company and subordinate unit, rights management person
The data of the second company are operated by the user authorizing the first company, but in actual use, the most often
There is such demand, as checked mutually business or examination & verification between unit.Under normal logic, two level lists at the same level
Between Wei, between subordinate and superior unit, data manipulation can not be carried out, operate, can only be by one
Individual unit user does " unit transfer " in system and reaches from the adjustment newly determined a post, and this has the biggest behaviour
Make risk.
Summary of the invention
In order to overcome drawbacks described above of the prior art, the invention provides a kind of to enterprise information management system
User account in system issues the method for authority, and the method includes:
The basic Authorization Attributes of user account is set;
The basic authority code of described user account is generated according to described basic Authorization Attributes;
The additional rights attribute of described user account is set;
The additional rights code of described user account is generated according to described additional rights attribute;
It is superimposed to described additional rights code on described basic authority code form total authority code;
It is that described user account issues corresponding user right according to described total authority code.
According to an aspect of the present invention, described in the method, basic Authorization Attributes includes unit attribute;Institute
State organization's tree generation that unit attribute is belonged to according to described user account.
According to another aspect of the present invention, described in the method, basic Authorization Attributes also includes role attribute;
Described role attribute generates according to the self-defining operation of system manager.
According to another aspect of the present invention, described in the method, basic Authorization Attributes also includes post attribute;
Described post attribute operates according to the specific transactions corresponding to described user account and generates.
According to another aspect of the present invention, described in the method, basic Authorization Attributes also includes department's attribute;
Described department attribute generates according to described organization tree.
According to another aspect of the present invention, the method is described user account according to described total authority code
Issue corresponding user right to include: resolve the page that described total authority code is corresponding to obtain described user right
Face control ID;Present described page control corresponding for page control ID.
According to another aspect of the present invention, additional rights attribute described in the method is according to system manager
Or the additional rights that higher level user configures to described user account generates.
The present invention is issued the method for authority and is come by authority code the user account in the enterprise information management system
Realizing issuing authority, this authority code is formed by basic authority code and additional rights code superposition, Qi Zhongji
This authority code is that the basic Authorization Attributes according to user account generates, and its effect is to distribute for user account
The authority that routine work is possessed;Additional rights code is that the additional rights attribute according to user account generates
, its effect is to weigh dynamically in the case of not changing organization's attaching relation of user account
Limit adjusts.Implement the motility that the present invention can adjust with authority in enterprise information management system, and
Avoid the security risk that existing authority occurs in adjusting.
Accompanying drawing explanation
The detailed description that non-limiting example is made made with reference to the following drawings by reading, this
Bright other features, objects and advantages will become more apparent upon:
Fig. 1 is the method that the user account in the enterprise information management system is issued authority according to the present invention
The flow chart of a kind of detailed description of the invention;
The logical structure schematic diagram of the embodiment of Fig. 2 to Tu4Shi organization tree;
In accompanying drawing, same or analogous reference represents same or analogous parts.
Detailed description of the invention
For a better understanding and interpretation of the present invention, below in conjunction with accompanying drawing, the present invention is made the most in detail
Thin description.
The invention provides a kind of method transmitting data in cruising inspection system, refer to Fig. 1, Fig. 1 is basis
The one to the method that the user account in the enterprise information management system issues authority of the present invention is embodied as
The flow chart of mode, the method includes:
Step S100, arranges the basic Authorization Attributes of user account;
Step S200, generates the basic authority code of described user account according to described basic Authorization Attributes;
Step S300, arranges the additional rights attribute of described user account;
Step S400, generates the additional rights code of described user account according to described additional rights attribute;
Step S500, is superimposed to described additional rights code on described basic authority code form total authority code;
Step S600, is that described user account issues corresponding user right according to described total authority code.
It will be understood by those skilled in the art that described user account maps is to use this user's account in reality
Family logs in the operator of the enterprise information management system, and the occurrences in human life ownership that these operator have in reality is closed
System, responsibilities and target, for use the enterprise information management system complete described responsibilities or
Reaching described target, the described enterprise information management system needs for the distribution of described user account basic
Operating right.
Specifically, in the step s 100, first the basic Authorization Attributes of user account be set, described substantially
Authorization Attributes is for defining or map the basic authority that described user account possesses, typically, described substantially
Authorization Attributes includes unit attribute, the organization that described unit attribute is belonged to according to described user account
Tree generates.Wherein said organization tree is for defining overall situation user in the described enterprise information management system
The data structure of organization's attaching relation, relationship between superior and subordinate and the term of reference of account, this tissue machine
The actual administrative hierarchy of the enterprise that Broussonetia papyrifera is mated generally according to the described enterprise information management system builds.
The operator of the most described user account are under the jurisdiction of the administrative department of the first branch company of the first group, then
Described unit attribute correspondingly record the described first group, described first branch company, described administrative department and
Its superior and the subordinate's attaching relation, and map one of administrative department of the first branch company of the described first group or
The sub-authority of multinomial work.
Alternatively, described basic Authorization Attributes also includes role attribute, and described role attribute is according to system pipes
The self-defining operation of reason person generates, and on the one hand the purpose defining this role attribute for described user account is mark
Remember and the authority that described user account has in role's distribution, be on the other hand easy for system manager and exist
Same group of permission grant is given multiple described user accounts by batches.The most described user's account
The operator at family have reimbursement authority, and the most described role attribute marks described user account and maps reimbursement
One or more sub-authority in authority, including examining, appraising and deciding.
Alternatively, described basic Authorization Attributes also includes post attribute, and described post attribute is according to described use
Specific transactions operation corresponding to the account of family generates.The operation of described specific transactions is the behaviour of described user account
The operation that particular job required by task is carried out, described particular job task and described operator is completed as personnel
Member post of actual definition in administrative organizational affiliation is relevant, can be according to the daily work of described operator
Determine as task, it is also possible to distribute to described operator according to the post attaching relation of described operator
Post task in job content determines.The operator of the most described user account have safety patrol inspection
Task, the most described post attribute marks described user account and belongs to safe post, and reflects
Penetrate the sub-authority of one or more trouble free service in described safe post, be generally of identical post attribute
Multiple user accounts belong to same user's group.It will be understood by those skilled in the art that there is identical unit
One group of user account of attribute can have different post attributes, such as, belong to equipment control department
One group of user account can be respectively configured its corresponding safe post, patrol and examine post, logistics post etc..
Alternatively, described basic Authorization Attributes also includes department's attribute, and described department attribute is according to described group
Loom Broussonetia papyrifera generates.Described department attribute is used for marking described user account in described organization tree
The concrete department belonged to.Such as mark described user account and be belonging to Finance Department, Human Resource Department
Or administration department.
It is provided with the basic Authorization Attributes of described user account in the step s 100, further in step S200
According to described basic Authorization Attributes generate described user account basic authority code, typically, described substantially
Authority code includes the field for identifying described basic Authorization Attributes or identifier.
Further in view of new in order to give described user account in the case of not causing security risk
Authority, arranges the additional rights attribute of described user account in step S300, typically, described additionally
The additional rights that Authorization Attributes configures to described user account according to system manager or higher level user generates,
Wherein said system manager or described higher level user refer to have pipe in the described enterprise information management system
Manage other user accounts of the authority of described user account.The most described user account is the common of administration department
Employee-users, the most described higher level user can be administration department other user at ministerial level, it is also possible to be described row
The director user of the higher authority in political affairs portion.Correspondingly, in step S400, according to described additionally
Authorization Attributes generates the additional rights code of described user account, and described additional rights code includes for identifying
Go out field or the identifier of described additional rights attribute.
In step S500, it is superimposed to described additional rights code on described basic authority code form total power
Limit code, the concrete mode forming described total authority code can be by described additional rights code and described basic power
Limit code simply merges, duplicate removal merges or uses suitable computerized algorithm to carry out mathematic(al) manipulation, described
Total authority code include for identify described basic Authorization Attributes and the field of described additional rights attribute or
Identifier.The purpose generating this total authority code is successfully to login described company information pipe at described user account
After reason system, the described enterprise information management system can be the distribution of described user account according to this total authority code
A corresponding group system operating right.
To the operation detailed process of described total authority code as described in step S600, according to described total authority code it is
Described user account issues corresponding user right.Described user right should include that described basic authority code reflects
The additional rights that the basic authority penetrated and described additional rights code map.With the described enterprise information management system
As a example by being embodied as B/S pattern, described user account is mutual eventually through being presented on use with system server
Web page in the terminal of family realizes, and is therefore that described user account issues phase according to described total authority code
The user right answered may include steps of: first resolves described total authority code to obtain described user power
The page control ID that limit is corresponding, presents described page control corresponding for page control ID further.Concrete and
Speech, the page control presented in the interaction page of described user account is and described page control ID mono-a pair
Answer, the most also with described user right one_to_one corresponding.Correspondingly, its unrelated with described user right
He processes page control being hidden when building described interaction page, or is not selected to build described friendship
The page mutually.
Although it should be noted that describe the operation of the inventive method in the accompanying drawings with particular order, but
It is that this does not requires that or imply and according to this particular order to perform these operations, or must must hold
Operation shown in row is whole could realize desired result.On the contrary, the step described in flow chart can change
Become execution sequence.Additionally or alternatively, it is convenient to omit some step, multiple steps are merged into one
Step performs, and/or a step is decomposed into the execution of multiple step.
It is the key factor constituting permission system in view of organization tree, also determines that described basic authority
The key factor of attribute.Hereinafter by several frequently seen organization's number, refer to Fig. 2 to Fig. 4, figure
The logical structure schematic diagram of the embodiment of 2 to Tu4Shi organization tree.Wherein figure 2 show described tissue
Mechanism tree is the logical structure of Dan Shu, and the organization tree of this type is applicable to build independent enterprise's row
The permission system of political affairs unit, such as in the department of company's multiple sane levels included below, as shown in Figure 2
Primary sector, secondary sector and the third sector, directly include corresponding under the department of each described sane level
User account.Fig. 3 shows the logical structure of Shu Shi group of described organization tree, the tissue of this type
Mechanism tree is applicable to build the permission system of the enterprise's administrative unit including subunit and independent department, such as
The subunit of one company's multiple sane level included below and department, a company as shown in Figure 3, two companies
And Finance Department, correspondingly, under described subunit, can include that lower one-level other subunit department or son are single
The subunit of position.Fig. 4 shows the logical structure of Shu Shi group of described organization forest, this type
Organization tree is applicable to build and includes multiple group and do not include enterprise's row of independent administrative department or user
The permission system of political affairs mechanism, the such as multiple sane level groups shown in Fig. 4: one of group, two and of group
The three of group.It will be understood by those skilled in the art that the organization related in the enterprise information management system
Tree needs the administrative organization's division according to enterprise self to determine.
The method that the user account in the enterprise information management system is issued authority that the present invention provides relates to
The part of software logic can use PLD to realize, it is also possible to is embodied as computer program
Product, this program product makes computer perform for the method demonstrated.Described computer program bag
Include computer-readable recording medium, this medium comprises computer program logic or code section, for real
Each step of the existing above-mentioned part relating to software logic.Described computer-readable recording medium can be by
Built-in medium in a computer is installed or (can such as may be used from the removable medium of basic computer dismounting
Hot-swappable storage device).Described built-in medium includes but not limited to rewritable nonvolatile memory,
Such as RAM, ROM and hard disk.Described removable medium includes but not limited to: optical storage media (such as CD-ROM
And DVD), magneto-optic storage media (such as MO), magnetic recording medium (such as tape or portable hard drive), tool
There are the media (such as storage card) of built-in rewritable nonvolatile memory and have built-in ROM's
Media (such as ROM box).
It will be appreciated by those skilled in the art that any computer system with properly programmed device can
Perform all steps of the method for the present invention being included in computer program.Although this specification is retouched
The most detailed description of the invention stated all lay particular emphasis on software program, but realize the present invention in hardware and provide
The alternate embodiment of method equally within the scope of protection of present invention.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment,
And without departing from the spirit or essential characteristics of the present invention, it is possible to real in other specific forms
The existing present invention.Therefore, embodiment should be regarded as exemplary, and be nonrestrictive, the present invention
Scope limited by claims rather than described above, in the implication of the equivalency of claim
All it is included in the present invention with all changes in scope.Should be by any reference in claim
It is considered as limiting involved claim.Furthermore, it is to be understood that " an including " word is not excluded for miscellaneous part, list
Unit or step, odd number is not excluded for plural number.In claim, multiple parts, unit or the device of statement also may be used
To be realized by software or hardware by parts, unit or device.
The present invention is issued the method for authority and is come by authority code the user account in the enterprise information management system
Realizing issuing authority, this authority code is formed by basic authority code and additional rights code superposition, Qi Zhongji
This authority code is that the basic Authorization Attributes according to user account generates, and its effect is to distribute for user account
The authority that routine work is possessed;Additional rights code is that the additional rights attribute according to user account generates
, its effect is to weigh dynamically in the case of not changing organization's attaching relation of user account
Limit adjusts.Implement the motility that the present invention can adjust with authority in enterprise information management system, and
Avoid the security risk that existing authority occurs in adjusting.
Described above some preferred embodiments being only the present invention, it is impossible to this limit the present invention it
Interest field, the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is contained.
Claims (7)
1. the method user account in the enterprise information management system being issued authority, the method includes:
The basic Authorization Attributes of user account is set;
The basic authority code of described user account is generated according to described basic Authorization Attributes;
The additional rights attribute of described user account is set;
The additional rights code of described user account is generated according to described additional rights attribute;
It is superimposed to described additional rights code on described basic authority code form total authority code;
It is that described user account issues corresponding user right according to described total authority code.
Method the most according to claim 1, wherein:
Described basic Authorization Attributes includes unit attribute;
The organization tree that described unit attribute is belonged to according to described user account generates.
Method the most according to claim 2, wherein:
Described basic Authorization Attributes also includes role attribute;
Described role attribute generates according to the self-defining operation of system manager.
The most according to the method in claim 2 or 3, wherein:
Described basic Authorization Attributes also includes post attribute;
Described post attribute operates according to the specific transactions corresponding to described user account and generates.
Method the most according to claim 4, wherein:
Described basic Authorization Attributes also includes department's attribute;
Described department attribute generates according to described organization tree.
Method the most according to claim 1, wherein, is described user's account according to described total authority code
Family issues corresponding user right and includes:
Resolve the page control ID that described total authority code is corresponding to obtain described user right;
Present described page control corresponding for page control ID.
Method the most according to claim 1, wherein:
The volume that described additional rights attribute configures to described user account according to system manager or higher level user
Outer permission build.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610203752.7A CN105912924A (en) | 2016-04-01 | 2016-04-01 | Method for sending permissions to users' accounts in enterprise information management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610203752.7A CN105912924A (en) | 2016-04-01 | 2016-04-01 | Method for sending permissions to users' accounts in enterprise information management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105912924A true CN105912924A (en) | 2016-08-31 |
Family
ID=56744477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610203752.7A Pending CN105912924A (en) | 2016-04-01 | 2016-04-01 | Method for sending permissions to users' accounts in enterprise information management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105912924A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548298A (en) * | 2016-11-27 | 2017-03-29 | 合肥汉腾信息技术有限公司 | Management information system is multiplexed, isolation is independent is cooperateed with fusion |
CN106790154A (en) * | 2016-12-29 | 2017-05-31 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN106790155A (en) * | 2016-12-29 | 2017-05-31 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN107895112A (en) * | 2017-11-01 | 2018-04-10 | 东软集团股份有限公司 | List priority assignation, list generation method and device, medium, electronic equipment |
CN108959628A (en) * | 2017-07-24 | 2018-12-07 | 成都牵牛草信息技术有限公司 | Forum's management method |
CN111291408A (en) * | 2020-01-21 | 2020-06-16 | 文思海辉智科科技有限公司 | Data management method and device and electronic equipment |
CN114969811A (en) * | 2022-05-16 | 2022-08-30 | 贵州领航视讯信息技术有限公司 | Data authority control method based on data segmentation |
CN116340983A (en) * | 2023-05-24 | 2023-06-27 | 深圳墨影科技有限公司 | User authority management method based on robot ecological chain user |
CN116720174A (en) * | 2023-08-11 | 2023-09-08 | 蒲惠智造科技股份有限公司 | OA office system-based account generation authority intelligent classification supervision method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1365065A (en) * | 2001-01-16 | 2002-08-21 | 安德华科技股份有限公司 | Method and system for dynamically controlling column authority |
US20060242422A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Rights Elevator |
CN101060407A (en) * | 2007-05-22 | 2007-10-24 | 上海众恒信息产业有限公司 | User access authorization management method and system |
CN101847002A (en) * | 2010-05-20 | 2010-09-29 | 浙江中控软件技术有限公司 | Method for implementing dynamic regulation of authority items, device and system thereof |
CN102930226A (en) * | 2012-10-25 | 2013-02-13 | 无锡中科泛在信息技术研发中心有限公司 | Method for controlling use permission of fine-grained client |
CN103632082A (en) * | 2013-12-10 | 2014-03-12 | 惠州华阳通用电子有限公司 | Universal permission management system and universal permission management method |
CN104598777A (en) * | 2013-10-31 | 2015-05-06 | 南京思润软件有限公司 | Rights management method based on B/S framework |
CN105335664A (en) * | 2015-10-27 | 2016-02-17 | 成都贝发信息技术有限公司 | Permission management system based on B/S mode |
-
2016
- 2016-04-01 CN CN201610203752.7A patent/CN105912924A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1365065A (en) * | 2001-01-16 | 2002-08-21 | 安德华科技股份有限公司 | Method and system for dynamically controlling column authority |
US20060242422A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Rights Elevator |
CN101060407A (en) * | 2007-05-22 | 2007-10-24 | 上海众恒信息产业有限公司 | User access authorization management method and system |
CN101847002A (en) * | 2010-05-20 | 2010-09-29 | 浙江中控软件技术有限公司 | Method for implementing dynamic regulation of authority items, device and system thereof |
CN102930226A (en) * | 2012-10-25 | 2013-02-13 | 无锡中科泛在信息技术研发中心有限公司 | Method for controlling use permission of fine-grained client |
CN104598777A (en) * | 2013-10-31 | 2015-05-06 | 南京思润软件有限公司 | Rights management method based on B/S framework |
CN103632082A (en) * | 2013-12-10 | 2014-03-12 | 惠州华阳通用电子有限公司 | Universal permission management system and universal permission management method |
CN105335664A (en) * | 2015-10-27 | 2016-02-17 | 成都贝发信息技术有限公司 | Permission management system based on B/S mode |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548298A (en) * | 2016-11-27 | 2017-03-29 | 合肥汉腾信息技术有限公司 | Management information system is multiplexed, isolation is independent is cooperateed with fusion |
WO2018095266A1 (en) * | 2016-11-27 | 2018-05-31 | 钱叶敢 | Reuse, separation independence, and integration coordination of management information system |
CN106790154B (en) * | 2016-12-29 | 2019-11-26 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN106790154A (en) * | 2016-12-29 | 2017-05-31 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN106790155A (en) * | 2016-12-29 | 2017-05-31 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN106790155B (en) * | 2016-12-29 | 2019-11-05 | 江西博瑞彤芸科技有限公司 | User right information generation method |
CN108959628A (en) * | 2017-07-24 | 2018-12-07 | 成都牵牛草信息技术有限公司 | Forum's management method |
CN107895112A (en) * | 2017-11-01 | 2018-04-10 | 东软集团股份有限公司 | List priority assignation, list generation method and device, medium, electronic equipment |
CN111291408A (en) * | 2020-01-21 | 2020-06-16 | 文思海辉智科科技有限公司 | Data management method and device and electronic equipment |
CN111291408B (en) * | 2020-01-21 | 2022-11-25 | 文思海辉智科科技有限公司 | Data management method and device and electronic equipment |
CN114969811A (en) * | 2022-05-16 | 2022-08-30 | 贵州领航视讯信息技术有限公司 | Data authority control method based on data segmentation |
CN116340983A (en) * | 2023-05-24 | 2023-06-27 | 深圳墨影科技有限公司 | User authority management method based on robot ecological chain user |
CN116340983B (en) * | 2023-05-24 | 2023-08-18 | 深圳墨影科技有限公司 | User authority management method based on robot ecological chain user |
CN116720174A (en) * | 2023-08-11 | 2023-09-08 | 蒲惠智造科技股份有限公司 | OA office system-based account generation authority intelligent classification supervision method |
CN116720174B (en) * | 2023-08-11 | 2023-10-24 | 蒲惠智造科技股份有限公司 | OA office system-based account generation authority intelligent classification supervision method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105912924A (en) | Method for sending permissions to users' accounts in enterprise information management system | |
CN109522707B (en) | Role and resource-based user data read-write security authority control method and system | |
CN108694557B (en) | Workflow and method for setting form field operation authority of approval node thereof | |
US11669571B2 (en) | Predicted data use obligation match using data differentiators | |
CN104919414B (en) | The role of access right kmeans cluster has found | |
US7113923B1 (en) | System and method of managing an office of programs | |
Scheer | Business process engineering: reference models for industrial enterprises | |
US11948215B2 (en) | Intellectual property exchange ecosystem for additive manufacturing | |
JP4903408B2 (en) | Organization reference data and qualification system | |
EP3850557A1 (en) | Blockchain for data and model governance | |
US8229938B2 (en) | Systems and methods for correlating meta-data model representations and asset-logic model representations | |
CN107526766A (en) | Data organization method and development environment system | |
KR102417932B1 (en) | Dispersion of customized engineering models for further fabrication | |
CN102663008B (en) | Government integrated business platform business library and construction method of base library | |
WO2006078466A2 (en) | User education and management system and method | |
CN109977657A (en) | A kind of method of distributing user permission in the enterprise information management system | |
US20060137026A1 (en) | Interactive security control system with conflict checking | |
Prasetyo et al. | Development of project document management system based on data governance with DAMA International framework | |
CN117034227A (en) | Authority management method and device, electronic equipment and storage medium | |
US11688027B2 (en) | Generating actionable information from documents | |
CN111368284A (en) | Method for distributing user authority in enterprise information management system | |
Buckl et al. | Enterprise architecture management patterns for company-wide access views on business objects | |
Khurshid | Improving Facility Management Through Digitized Task Management | |
Belousov et al. | Legal and economic components of modern accounting transformation | |
Martín-Zamora et al. | Digitalization of Financial Reporting: Its Role in Improving Corporate Efficiency and Transparency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160831 |
|
RJ01 | Rejection of invention patent application after publication |