Secured systems and methods for tracking and management of logistical processes
First Claim
1. A method for providing access to data relating to a plurality of logistical processes, the method comprising:
- identifying a user from a plurality of users;
identifying data from a plurality of data, wherein the identified data includes a subset of the plurality of data; and
providing the user with access to the identified data, wherein providing the user with access to the identified data includes;
defining a user profile by establishing at least one permission associated with the identified data, wherein the established permission allows the user to access the identified data, and wherein the user profile is based on one of employee characteristics, work assignments, or geographical locations.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided for providing access to data relating to a plurality of processes associated with a supply chain network. The method may include identifying a user from a plurality of users. The method may also include identifying data from a plurality of data, wherein the identified data includes a subset of the plurality of data. The method may further include providing the user with access to the identified data. Providing the user with access to the identified data may include defining a user profile by establishing at least one permission associated with the identified data. The established permission may allow the user to access the identified data, and the user profile may be based on one of employee characteristics, work assignments, or geographical locations.
-
Citations
20 Claims
-
1. A method for providing access to data relating to a plurality of logistical processes, the method comprising:
-
identifying a user from a plurality of users; identifying data from a plurality of data, wherein the identified data includes a subset of the plurality of data; and providing the user with access to the identified data, wherein providing the user with access to the identified data includes; defining a user profile by establishing at least one permission associated with the identified data, wherein the established permission allows the user to access the identified data, and wherein the user profile is based on one of employee characteristics, work assignments, or geographical locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer readable medium having programming instructions for providing a user access to data relating to a plurality of logistical processes of a supply chain network, the programming instructions comprising:
-
identifying the user; accessing a user profile that determines a level of data access afforded to the user, the user profile being defined by at least one permission associated with a first subset of the data and at least one restriction associated with a second subset of the data different from the first subset, wherein the permission allows access to the first data subset and the restriction limits access to the second data subset; and displaying at least a portion of the first data subset. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for providing access to data relating to the performance of a plurality of logistical processes of a supply chain network, the method comprising:
-
identifying a user from a plurality of users; assigning the user an identification, the identification including an electronic log-in handle and an associated password; identifying data from a plurality of process performance data, wherein the identified data includes a first data subset of the plurality of process performance data; and providing the user with access to the identified data, wherein providing the user with access to the identified data includes; defining a user profile by establishing a permission associated with the first data subset and a restriction associated with data excluded from the first data subset, wherein the permission allows the user to access the first data subset and the restriction limits the user from accessing the data excluded from the first data subset, wherein the user profile is based on employee characteristics, work assignments, and geographical locations.
-
Specification