CN108833357A - Information inspection method and device - Google Patents

Information inspection method and device Download PDF

Info

Publication number
CN108833357A
CN108833357A CN201810493360.8A CN201810493360A CN108833357A CN 108833357 A CN108833357 A CN 108833357A CN 201810493360 A CN201810493360 A CN 201810493360A CN 108833357 A CN108833357 A CN 108833357A
Authority
CN
China
Prior art keywords
information
shared
user
data
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810493360.8A
Other languages
Chinese (zh)
Inventor
邵连伟
吴磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Internet Network Information Center
Original Assignee
China Internet Network Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Internet Network Information Center filed Critical China Internet Network Information Center
Priority to CN201810493360.8A priority Critical patent/CN108833357A/en
Publication of CN108833357A publication Critical patent/CN108833357A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application provides a kind of information inspection method and devices, user can only check the information in oneself extent of competence, have no right the information checked except oneself extent of competence, therefore, when user wants the information checked except oneself extent of competence, the corresponding first information is sent to server and checks request.Server receives after the first information checks request, according to the first information check the information for the data to be shared that request is included determine have the right to check the data to be shared have the right check user.And have the right to check that user sends information sharing request to the whole of data to be shared, it has the right to check the response message that the agreement of user feedback is shared if receiving any one, obtains the Data Concurrent to be shared and send to the user to be shared.Using above- mentioned information inspection method, it is able to use family and checks and facilitate user to check so that information is shared in a certain range by the information for having no right to check of agreement.

Description

Information inspection method and device
Technical field
This application involves field of computer technology, more particularly to information inspection method and device.
Background technique
As network technology develops rapidly, more and more institutional frameworks use the information in Web Publishing tissue, for example, Bordereau, business plan task dispatching, so that the employee in this institutional framework checks.
According to traditional information inspection mode, user can only check the information in oneself extent of competence, can not check permission The external information of range, still, in some cases, user needs to check the information except certain extents of competence, for example, knot of tissue Structure has issued business plan to each project manager, and the talent of the business plan only project manager or the above rank can check, Other people can't see.But project manager needs the business plan being communicated to subordinate to complete jointly.Using traditional Information inspection mode, subordinate do not check the permission of the business plan, and project manager needs to pass in face of staff member's work downwards Up to the business plan, working efficiency is seriously affected.Believe currently, can be realized user there has been no one kind and check outside oneself extent of competence The solution of breath.
Summary of the invention
In view of this, to solve, user can not in the related technology this application provides a kind of information inspection method and device The technical issues of checking the information except oneself extent of competence.To achieve the above object, the application provides the following technical solutions:
In a first aspect, this application provides a kind of information inspection methods, including:
The first information for receiving the transmission of the first client checks request, and the first information checks that request includes described first Client haves no right the information for the data to be shared checked;
According to the information of the data to be shared determine have permission check the data to be shared have the right check user;
It has the right to check that corresponding second client of user sends information sharing request to described, the information sharing request is used Have the right to check data to be shared described in user sharing described in the request;
After the agreement for receiving any one of second client feedback shared response message, according to described to altogether Data Concurrent to be shared described in the acquisition of information of data is enjoyed to send to first client.
Optionally, the information of the data to be shared includes the message identification of the data to be shared, data organization type And secret grade;
It is described according to the information of the data to be shared determine have permission check the data to be shared have the right check use Family, including:
The first user to match with the data organization type of the data to be shared is searched to gather;
It determines to have the right to check with what the secret grade of the data to be shared matched from first user set User.
Optionally, the message identification of the packet data to be shared of the data to be shared;
It is described according to the information of the data to be shared determine have permission check the data to be shared have the right check use Family, including:
The corresponding data organization type of the data to be shared and private are obtained according to the message identification of the data to be shared Close grade;
The first user to match with the data organization type is searched to gather;
From first user set in determine to match with the secret grade have the right check user.
Optionally, the method also includes:
The second information inspection request that first client is sent is received, the second information inspection request is for requesting Check the information in extent of competence;
Determine institutional framework and Permission Levels belonging to the corresponding user of first client;
Search the first information set to match with institutional framework belonging to the user and Permission Levels;
And search the other institutional frameworks to match with the Permission Levels can public information;
To first client send the first information set and it is described can public information.
Optionally, the method also includes:
It include the client-side information of virtual environment platform to having the terminal device used by a user of registration permission to send, So that the user with registration permission installs client on used terminal device according to the client-side information, institute It is mutually isolated to state the other application program installed on virtual environment platform and the terminal device.
Optionally, before sending the client-side information comprising virtual environment platform, the method also includes:
The invitation request for the invitation non-registered users that registered users are sent is received, the invitation request is not infused comprising described The user identifier of volume user;
Message request is sent to the corresponding terminal device of the user identifier, the message request includes invitation code;
After sending the client-side information comprising virtual environment platform, the method also includes:
The registration information that the non-registered users are sent is received, the registration information includes the invitation code and the user Mark;
When in the registration information user identifier and invitation code respectively with the associated user identifier of the message request and When invitation code is consistent, the feedback information to succeed in registration is returned;
When in registration information user identifier and invitation code and the associated user identifier of the message request and invitation code not When consistent, the feedback information for having no right registration is returned.
Optionally, after sending the client-side information comprising virtual environment platform, the method also includes:
The registration information that non-registered users are sent is received, the registration information includes user identifier;
When in the institutional framework user information of the server-side including the user identifier, the feedback to succeed in registration is returned Information;
When not including the user identifier in the institutional framework user information of the server-side, returns and have no right the anti-of registration Feedforward information.
Second aspect, present invention also provides another information inspection methods, including:
It receives and has the right to check the information sharing request that the client of data to be shared is sent;
The information sharing is parsed to request to obtain the message identification of data to be shared and user identifier to be shared;
The data to be shared are obtained from database according to the message identification;
The data to be shared are sent to client corresponding to the user identifier to be shared.
The third aspect, this application provides a kind of information inspection devices, including:
First receiving unit, the first information for receiving the transmission of the first client check request, and the first information is looked into See that the information for the data to be shared checked is had no right in request comprising first client, the information of the data to be shared is at least wrapped Include message identification;
First determination unit checks the data to be shared for determining to have permission according to the information of the data to be shared Have the right check user;
Request transmitting unit, for having the right to check that corresponding second client of user sends letter to the data to be shared Cease sharing request, information sharing request described has the right to check data to be shared described in user sharing for requesting;
Information acquisition unit, for disappearing when the shared response of the agreement for receiving any one of second client feedback After breath, according to data to be shared described in the acquisition of information of the data to be shared;
Information transmitting unit, for the data to be shared to be sent to first client.
Fourth aspect, present invention also provides another information inspection devices, including:
Receiving unit, for receiving the information sharing request having the right to check the client of data to be shared and sending;
Resolution unit, for parse information sharing request obtain data to be shared message identification and user to be shared Mark;
Acquiring unit, for obtaining the data to be shared from database according to the message identification;
Dispatching Unit, for by the data distribution to be shared to the corresponding client of the user identifier to be shared.
Information inspection method provided by the embodiments of the present application, user can only check the information in oneself extent of competence, have no right Check the information except oneself extent of competence, therefore, when user wants the information checked except oneself extent of competence, need to Server sends the first information and checks request.Server receives after the first information checks request, is looked into according to the first information See the information for the data to be shared that request is included determine have the right to check the data to be shared have the right check user.And to altogether The whole for enjoying data has the right to check that user sends information sharing request, has the right to check the same of user feedback if receiving any one The shared response message of meaning, then obtain the Data Concurrent to be shared and send to the user to be shared.Using above- mentioned information inspection method, It is able to use family and checks and facilitate user so that information is shared in a certain range by the information for having no right to check of agreement It checks.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 shows a kind of structural schematic diagram of information inspection system of the embodiment of the present application;
Fig. 2 shows a kind of flow charts of information inspection method of the embodiment of the present application;
Fig. 3 shows the flow chart of the embodiment of the present application another kind information inspection method;
Fig. 4 shows the flow chart of another information inspection method of the embodiment of the present application;
Fig. 5 shows the flow chart of another information inspection method of the embodiment of the present application;
Fig. 6 shows a kind of block diagram of information inspection device of the embodiment of the present application;
Fig. 7 shows the block diagram of the embodiment of the present application another kind information inspection device;
Fig. 8 shows the block diagram of another information inspection device of the embodiment of the present application;
Fig. 9 shows the block diagram of another information inspection device of the embodiment of the present application;
Figure 10 shows the block diagram of the embodiment of the present application another kind information inspection device.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Referring to Figure 1, a kind of structural schematic diagram of information inspection system of the embodiment of the present application is shown, which includes clothes Business device 1 and at least one client 2.Mode is communicated by wireless communication between at least one client 2 and server 1.
The information of institutional framework is stored in server 1, for example, the information such as the title of institutional framework, attribute;Alternatively, also The information of employee in institutional framework may be stored with.
Client 2 is mounted on mobile intelligent terminal, for example, smart phone, tablet computer etc..User can using the client To access the information in server.
Fig. 2 is referred to, the embodiment of the present application is shown and discloses a kind of flow chart of information inspection method, this method application In system shown in FIG. 1, as shown in Fig. 2, this method may comprise steps of:
S110, the first user end to server send the first information and check request.
In the present embodiment, the first client is to have no right to check the corresponding client of the user of some information.
The first information checks that the information for the data to be shared checked is had no right in request comprising the user to be shared.For example, should The information of data to be shared may include the message identification of the data to be shared, can also include tissue in addition to message identification The information such as structure type and private information mark, uniform resource locator (Uniform Resource Locator, URL).
Each user can access the information to match with the extent of competence of oneself, have no right to check except oneself extent of competence Information.For example, the employee inside an institutional framework has different ranks, the employee in different stage has different Extent of competence can send the first information to server and check request if certain employee haves no right to check certain information.
Include message header and specifying information content when for example, showing information, has the right to check that user's click of the information should Message header can check the corresponding specifying information content of the message header;Have no right to check that the user of the information can only see the letter Title is ceased, corresponding specifying information content can not be seen by clicking the message header.
Under such application scenarios, user shares the information by user end to server request, and user grasps on the client Make the information for oneself having no right to check, so that user end to server sends the first information and checks request, which, which checks, is asked The information for the data to be shared checked is wanted in asking comprising user.
In one embodiment of the application, the first information that client generates checks that request carries the data to be shared Message identification, so that server knows which information is client request share.
In another embodiment of the application, the first information that client generates checks request except the carrying number to be shared According to message identification except, also carry the attribute informations such as data organization type and the secret grade of the data to be shared, further Accelerate server according to the attribute information of the data to be shared determine the data to be shared have the right check user.Such applied field Under scape, when server is to client returned data, it can believe to the message header of data to be shared and the attribute of the data to be shared Breath still only shows heading message to user.In this way, client, which generates when the first information checks request, carries the number to be shared According to message identification, data organization type and secret grade.
S120, server according to the information of data to be shared determine have permission check the data to be shared have the right check use Family.
In the preferred embodiment of the application, each information of server memory storage is provided with data organization type And secret grade the two attributes.Data organization type refers to institutional framework belonging to the information;Secret grade refers to the information Privacy degrees can check that the user of the information is fewer for example, secret higher grade;Secret lower grade, can check this The user of information is more.
In one embodiment of the application, the information of data to be shared only includes the message identification of the data to be shared; After server receives the message identification of the data to be shared, the corresponding number of the data to be shared is determined according to the message identification According to organization type and secret grade.Then, it has the right to check the data to be shared according to data organization type and the determination of secret grade User.
In another embodiment of the application, the information of data to be shared include the data to be shared message identification, Data organization type and secret grade.Server can directly utilize the data organization type and secret grade of the data to be shared Determine the user for having the right to check the data to be shared.
Server based on data organization type and secret grade determine the process for having the right to check the user of the data to be shared It is as follows:
The institutional framework type to match with the data organization type of the data to be shared is first searched, and filters out the tissue User's set under structure type, referred to as the first user set.For example, institutional framework type can be a group, company or The title of subsidiary/member companies.User under the institutional framework type refers to registered employee user under the institutional framework.
Then, from the first user set in determine to match with the secret grade of the data to be shared have the right check use Family.
For example, the secret grade of the information stored in service includes:It is high, medium and low.The secret grade of the data to be shared is Middle rank, then filter out at least one user that Permission Levels are middle ranks or more from the first user set, these users have Power checks user.
S130, server have the right to check that client corresponding to user sends information sharing and asks to the whole of data to be shared It asks.
In the present embodiment, the whole of the data to be shared is had the right to check that the corresponding client of user is known as the second client End, therefore, server send information sharing request to the second client.
It determines that the corresponding whole of data to be shared has the right to check after user, has the right to check that user sends information to whole Sharing request.Information sharing request has the right to check whether user agrees to the data sharing to be shared to be shared for inquiring User.
S140, the second user end to server, which returns, agrees to shared response message.
The shared response message of the agreement can be detected the operation of operation particular control by any one the second client After generate.For example, the particular control can be virtual key or physical button, the application does not limit this.
S150 is obtained after the agreement that server receives any one the second client feedback shared response message Data to be shared.
Data to be shared are sent to the corresponding client of the user to be shared by S160, server.
When server receives agreement that any one has the right to check the client feedback of user for the information sharing to should After the response message of user to be shared, obtain the data to be shared from database, and by the data to be shared be sent to this to The shared corresponding client of user.
Information inspection method provided in this embodiment, user can only check the information in oneself extent of competence, have no right to check Therefore information except oneself extent of competence when user wants the information checked except oneself extent of competence, is needed to service Device sends the corresponding first information and checks request.Server receives after the first information checks request, according to the first information Check the information for the data to be shared that request is included determine have the right to check the data to be shared have the right check user.And to The whole of shared data has the right to check that user sends information sharing request, has the right to check user feedback if receiving any one Agree to shared response message, then obtains the Data Concurrent to be shared and send to the user to be shared.Utilize the above- mentioned information side of checking Method, is able to use family and checks and facilitate use so that information is shared in a certain range by the information for having no right to check of agreement Family is checked.
Fig. 3 is referred to, the flow chart of the embodiment of the present application another kind information inspection method is shown, the present embodiment will focus on Introduce the realization process for the information that registered users are checked in oneself extent of competence.The basis of this method embodiment shown in Fig. 2 It is upper further comprising the steps of:
S210, the first user end to server send the request of the second information inspection.
Second information inspection request is for requesting the information checked within the scope of user's own right.
This method can be applied in any one corresponding client of registered users, and the present embodiment is to be applied to first It is illustrated for client.
S220, server determine the target information that the Permission Levels of user corresponding with the first client match.
In one embodiment of the application, server can determine and be somebody's turn to do according to the second information inspection request received Second information inspection requests associated user identifier.The user identifier is carried in the request of second information inspection.User identifier It is the unique identification of user, for example, user identifier can be according to the unique of the login account (for example, cell-phone number) of user generation Identification number.
Then, institutional framework belonging to the user identifier and Permission Levels are inquired.For example, Permission Levels may include it is high, In, low three ranks.Finally, obtaining target information according to institutional framework and Permission Levels.
In one embodiment of the application, target information includes the permission in the affiliated institutional framework of the user with the user The information that rank matches, and, other institutional frameworks are corresponding can public information.
Under such application scenarios, determine that the process of target information may comprise steps of:
A determines that user identifier corresponds to institutional framework belonging to user and Permission Levels.
The corresponding institutional framework of the user identifier and Permission Levels are inquired in the database for being stored with institutional framework;Group Knitting structure can be company organization belonging to the user.
B searches the first information set to match with institutional framework belonging to user and Permission Levels.
For example, institutional framework belonging to user is C1, moreover, Permission Levels are middle ranks;Then searched under C1 from database Information in secret rank be middle rank and all information below, as first information set.
C, that searches the other institutional frameworks to match with Permission Levels can public information.
Then, searched from the information of other institutional frameworks exposure with the Permission Levels of the user match can open letter Breath.
D, determine first information set and can public information be target information.
S230 returns to target complete information to the first client.
Using under the affiliated institutional framework of user first information set and other institutional frameworks can public information as target Information returns to the first client.
What the application did not limit S210~S230 executes sequence, can execute after S110, alternatively, can be in S110 It executes before.
In the preferred embodiment of the application, user first checks the information in oneself extent of competence, and server is returning In the extent of competence of reuse family while message details (that is, specific information content) of information, user right model can also be returned The message header of external information is enclosed, in this way, user can determine whether to continue to check the information according to message header.That is S210~ S230 is executed before S110.
Information inspection method provided in this embodiment, the information that user checks in oneself extent of competence include affiliated group of user The information to match with the Permission Levels of the user in structure is knitted, and, the interior permission grade with the user of other institutional frameworks What is do not matched can public information.Break the limitation for the information that user can only check in the institutional framework belonging to oneself, it is convenient User check more with the matched information of the Permission Levels of oneself.
Fig. 4 is referred to, shows the flow chart of another information inspection method of the embodiment of the present application, in the present embodiment, only There is the user with registration permission that the client and note for executing the information inspection method could be installed on the terminal device of oneself Volume.
As shown in figure 4, can also include the following steps on the basis of this method embodiment shown in Fig. 2:
S310, server receive the invitation request that the first client is sent.
Invitation request is for inviting non-registered users, and invitation request includes the user identifier of non-registered users.Example Such as, which can be phone number used by a user.
The corresponding client of registered users can be the first client or the second client shown in Fig. 2, the application It is illustrated by taking the first client as an example.Wherein, the non-registered users where registered users invite oneself in institutional framework.
S320, server send message request to the corresponding terminal device of user identifier.
Message request includes invitation code, and it is the user with registration permission which, which is used to characterize the user,.
S330, server send the client comprising virtual environment platform to terminal device corresponding to the user identifier Information.
The client-side information can be the URL for downloading the client, and user downloads client-side program by the URL.
In one embodiment of the application, server sends the client letter while returning to message request to the user Breath.For example, server is sent to the URL in the message request of terminal device comprising the client.In other embodiments, it invites The URL of information and client is individually sent to the terminal device of user.
S340, terminal device install the client according to the client-side information.
The operating system of virtual environment platform and terminal device that the client is included is mutually isolated.When user is at the end After installation is comprising the client of virtual environment platform in end equipment, each run client is in the virtual environment platform The other application program (Application, APP) of operation, the virtual environment platform and terminal device is mutually isolated.To guarantee The running environment of client is safer, improves information security.
S350, server receive the registration information that the client of non-registered users is sent.
In one embodiment of the application, which includes invitation code and user identifier.Wherein, invitation code is clothes Business device is sent to the invitation code on the terminal device of the non-registered users.
S360, whether server audits the registration information legal;If legal, S370 is executed;If illegal, hold Row S380.
After server receives the registration information, user identifier and invitation code are first extracted;Then, it searches whether to think that the user marks Know corresponding terminal device and be transmitted across message request, if be transmitted across, continues the invitation in the message request that judgement has been sent Whether code is consistent with the invitation code in registration information, if unanimously, it is determined that the registration information is legal;If do not marked to the user Know corresponding terminal device and be transmitted across message request, then it is illegal to directly determine the registration information.
S370, server return to the feedback information to succeed in registration to the client of non-registered users.
If the server determine that registration information is legal, then succeed in registration to the terminal device return for sending the registration information Feedback information.
S380, server return to the feedback information for having no right registration to the terminal device of non-registered users.
If the server determine that the registration information is illegal, then have no right to infuse to the terminal device return for sending the registration information The feedback information of volume.
In the other embodiments of the application, it can increase on the basis of any one of the above information inspection method embodiment Add S310-S380, the application do not limit must the basis of embodiment shown in Fig. 2 increase these steps.Moreover, S310~ S380 can be executed before or after S110 (or S210), and the application does not limit.
In another embodiment of the application, believed by the employee of the administrator's typing institutional framework in each institutional framework The information such as breath and level attribute, the employee of typing are the user with registration permission.When the administrator of each institutional framework records After entering the employee information in this institutional framework, server sends the client-side information to the employee of typing.Other steps with Correlation step shown in Fig. 4 is identical, is no longer described in detail one by one herein.
Information inspection method provided in this embodiment, registration user must be the users with registration permission.Moreover, infusing Before volume user registers, server sends the client comprising virtual environment platform to the terminal device used by a user Information;It is mutually isolated between mounted application program on the virtual environment platform and terminal device, to guarantee client Running environment is safer, and then improves the safety of information.
Fig. 5 is referred to, shows the flow chart of another information inspection method of the embodiment of the present application, in the present embodiment, letter The shared application scenarios of breath be there is the user of information inspection permission actively to share to the user for having no right to check the information, for example, The higher employee of rank in some institutional framework wants certain information sharing to its subordinate for having no right to check the information.
As shown in figure 5, this method may comprise steps of:
S410, user end to server send information sharing request.
It has the right to check that the user end to server of certain information sends information sharing request, information sharing request is comprising to altogether Enjoy the message identification of data and the user identifier of user to be shared.
The information sharing generates after requesting the operation for detecting some information of user sharing by the client.
S420, server parse information sharing request, obtain the message identification of data to be shared and the use of user to be shared Family mark.
Server parses the information sharing request that client is sent, and obtains the message identification and this energy of the data to be shared Enough user identifiers by the shared user to be shared for checking the data to be shared.
S430, server obtain data to be shared according to message identification from database.
After server determines the message identification of data to be shared, the corresponding information of the message identification is inquired from database, Data i.e. to be shared.
S440, server is by data distribution to be shared to the corresponding client of user identifier.
After server inquires the data to be shared, by the user identifier institute of the data distribution to be shared to user to be shared Corresponding client.
Information inspection method provided in this embodiment, when user checks by client the information in oneself extent of competence When (that is, data to be shared), if it is desired to the data sharing to be given to the other users for having no right to check the information, then sent to server Information sharing request, information sharing request be associated with data to be shared and can by it is shared see the data to be shared to Shared user.Then, server inquires data to be shared according to information sharing request and is distributed to user to be shared.It utilizes This method realizes user actively by the information sharing in oneself extent of competence to the user for having no right to check, so that user be facilitated to look into It sees.
The step of increasing on the basis of embodiment shown in Fig. 2 in the corresponding embodiment of Fig. 3 and Fig. 4, is equally applicable to Fig. 5 institute The embodiment shown, is no longer described in detail one by one herein.
For the various method embodiments described above, for simple description, therefore, it is stated as a series of action combinations, but Be those skilled in the art should understand that, the application is not limited by the described action sequence because according to the application, certain A little steps can be performed in other orders or simultaneously.Secondly, those skilled in the art should also know that, it is retouched in specification The embodiment stated belongs to preferred embodiment, necessary to related actions and modules not necessarily the application.
Fig. 6 is referred to, a kind of block diagram of information inspection device of the embodiment of the present application is shown, which is applied to Fig. 1 institute Show in the server of system, as shown in fig. 6, the apparatus may include:First receiving unit 110, is asked at first determination unit 120 Ask transmission unit 130, information acquisition unit 140 and information transmitting unit 150.
First receiving unit 110, the first information for receiving the transmission of the first client check request.
The first information checks that the information for the data to be shared checked, the number to be shared are had no right in request comprising the first client According to information include at least message identification.
Under normal conditions, user can only check the information in oneself extent of competence, if user wants to check except permission Information (that is, data to be shared) first information can be sent to server check request, when the use for having the right to check the information Agree to after sharing the information that the user can just see the information in family.
First determination unit 120 checks having for data to be shared for determining to have permission according to the information of data to be shared Power checks user.
First determination unit 120 checks that the information for requesting the data to be shared for being included is determined to have the right to check according to first The user of the data to be shared.
In one embodiment of the application, if the information of the data to be shared only includes message identification, according to the letter Breath mark determines the corresponding data organization type of the data to be shared and secret grade.Then, according to data organization type and private Close grade determines the user for having the right to check the data to be shared.
In another embodiment of the application, the information of data to be shared include the data to be shared message identification, Data organization type and secret grade, then according to the data organization type and secret in the information for directly utilizing the data to be shared Grade determines the user for having the right to check the data to be shared.
Request transmitting unit 130, for sending information sharing request to the second client.
Second client, which refers to, has the right to check the corresponding client of the user of data to be shared.
It determines that the corresponding whole of data to be shared has the right to check after user, has the right to check that user sends information to whole Sharing request.Information sharing request has the right to check whether user agrees to the data sharing to be shared to be shared for inquiring User.
Information acquisition unit 140, for disappearing when the shared response of the agreement for receiving any one the second client feedback After breath, data to be shared are obtained according to the message identification of the data to be shared.
After the corresponding user of any one second client agrees to share the data to be shared, can by this second User end to server, which returns, agrees to shared response message.When information acquisition unit obtains the shared response message of the agreement Afterwards, which is obtained according to the message identification of the data to be shared.
Information transmitting unit 150, for data to be shared to be sent to the first client.
When server receives agreement that any one has the right to check the client feedback of user for the information sharing to should After the response message of user to be shared, obtain the data to be shared from database, and by the data to be shared be sent to this to The shared corresponding client of user.
Information inspection device provided in this embodiment, user can only check the information in oneself extent of competence, have no right to check Therefore information except oneself extent of competence when user wants the information checked except oneself extent of competence, is needed to service Device sends the corresponding first information and checks request.Server receives after the first information checks request, according to the first information Check the information for the data to be shared that request is included determine have the right to check the data to be shared have the right check user.And to The whole of shared data has the right to check that user sends information sharing request, has the right to check user feedback if receiving any one Agree to shared response message, then obtains the Data Concurrent to be shared and send to the user to be shared.Utilize the above- mentioned information side of checking Method, is able to use family and checks and facilitate use so that information is shared in a certain range by the information for having no right to check of agreement Family is checked.
Fig. 7 is referred to, the block diagram of the embodiment of the present application another kind information inspection device is shown, the present embodiment will focus on Jie The registered users that continue check the process of the information in oneself extent of competence.May be used also on the basis of device embodiment shown in Fig. 6 To include:Second receiving unit 210, the second determination unit 220, the first return unit 230.
Second receiving unit 210, for receiving the second information inspection request of the first client transmission.
The second information inspection request is for requesting the information checked in extent of competence.First client is registered use Any one corresponding client of family.
Second determination unit 220, the target letter to match for determining the Permission Levels of user corresponding with the first client Breath.
Second determination unit obtains the user identifier for sending the request, then, inquiry from the request of the second information inspection Institutional framework belonging to the user identifier and Permission Levels, the information to match further according to the institutional framework and Permission Levels.
In one embodiment of the application, target information includes the permission in the affiliated institutional framework of the user with the user The information that rank matches, and, other institutional frameworks are corresponding can public information.
Under such application scenarios, determine that the process of target information may include:Determine that user identifier corresponds to belonging to user Institutional framework and Permission Levels;Search the first information set to match with institutional framework belonging to user and Permission Levels;After It is continuous search the other institutional frameworks to match with Permission Levels can public information;Determine first information set and can public information For target information.
First return unit 230, for returning to target complete information to the first client.
Using under the affiliated institutional framework of user first information set and other institutional frameworks can public information as target Information returns to the first client.
Information inspection device provided in this embodiment, the information that user checks in oneself extent of competence include affiliated group of user The information to match with the Permission Levels of the user in structure is knitted, and, the interior permission grade with the user of other institutional frameworks What is do not matched can public information.Break the limitation for the information that user can only check in the institutional framework belonging to oneself, it is convenient User check more with the matched information of the Permission Levels of oneself.
Fig. 8 is referred to, shows the block diagram of another information inspection device of the embodiment of the present application, in the present embodiment, only User with registration permission could install client and the registration for executing the information inspection method on the terminal device of oneself.
As shown in figure 8, can also include on the basis of device embodiment shown in Fig. 6:Third receiving unit 310 is invited It please transmission unit 320, client-side information transmission unit 330, the 4th receiving unit 340, audit unit 350, the second return unit 360 and third return unit 370.
Third receiving unit 310, the invitation request of the invitation non-registered users for receiving registered users transmission.
Invitation request includes the user identifier of non-registered users.
Transmission unit 320 is invited, for sending message request to the corresponding terminal device of the non-registered users.
The message request includes invitation code, and it is the user with registration permission which, which is used to characterize the user,.
Client-side information transmission unit 330 is believed for sending the client comprising virtual environment platform to the terminal device Breath.
The client-side information can be the URL for downloading the client, and user downloads client-side program by the URL.
In one embodiment of the application, server sends the client letter while returning to message request to the user Breath.For example, server is sent to the URL in the message request of terminal device comprising the client.In other embodiments, it invites The URL of information and client is individually sent to the terminal device of user.
4th receiving unit 340, the registration information that the client for receiving non-registered users is sent.
In one embodiment of the application, which includes the user identifier of invitation code and non-registered users.
Unit 350 is audited, it is whether legal for auditing registration information.
The audit unit extracts user identifier and invitation code from registration information;Then, it searches whether to think the user identifier Corresponding terminal device is transmitted across message request, if be transmitted across, continues the invitation code in the message request that judgement has been sent It is whether consistent with the invitation code in registration information, if unanimously, it is determined that the registration information is legal;If not to the user identifier Corresponding terminal device is transmitted across message request, then it is illegal to directly determine the registration information.
Second return unit 360, for returning to the feedback information to succeed in registration to the client of non-registered users.
If the server determine that registration information is legal, then succeed in registration to the terminal device return for sending the registration information Feedback information.
Third return unit 370, for returning to the feedback information for having no right registration to the terminal device of non-registered users.
If the server determine that the registration information is illegal, then have no right to infuse to the terminal device return for sending the registration information The feedback information of volume.
In another embodiment of the application, believed by the employee of the administrator's typing institutional framework in each institutional framework The information such as breath and level attribute, the employee of typing are the user with registration permission.When the administrator of each institutional framework records After entering the employee information in this institutional framework, server sends client-side information to the employee of typing.
Information inspection device provided in this embodiment, registration user must be the users with registration permission.Moreover, infusing Before volume user registers, server sends the client comprising virtual environment platform to the terminal device used by a user Information;It is mutually isolated between mounted application program on the virtual environment platform and terminal device, to guarantee client Running environment is safer, and then improves the safety of information.
Fig. 9 is referred to, shows the block diagram of another information inspection device of the embodiment of the present application, in the present embodiment, information Shared application scenarios be have information inspection permission user actively share to the user for having no right to check the information, for example, certain The higher employee of rank in a institutional framework wants certain information sharing to its subordinate for having no right to check the information.
As shown in figure 9, the apparatus may include receiving unit 410, resolution unit 420, acquiring unit 430 and Dispatching Unit 440。
Receiving unit 410, for receiving the information sharing request having the right to check the client of data to be shared and sending
Resolution unit 420 obtains message identification and the user identifier of user to be shared for parsing information sharing request.
The corresponding user end to server of registered users sends information sharing request, and information sharing request is comprising to altogether Enjoy the message identification of data and the user identifier of user to be shared.The resolution unit 420 is obtained by parsing information sharing request To the data to be shared message identification and this time can share the data to be shared user to be shared user identifier.
Acquiring unit 430, for obtaining the data to be shared from database according to the message identification.
After the message identification for determining the data to be shared, the corresponding information of the message identification is inquired from database, i.e., to Shared data.
Dispatching Unit 440 is used for the data distribution to be shared to the corresponding client of the user identifier.
After inquiring the shared information, by visitor corresponding to the user identifier of the data distribution to be shared to user to be shared Family end.
Information inspection device provided in this embodiment, when user checks by client the information in oneself extent of competence When (that is, data to be shared), if it is desired to the information sharing to be given to the other users for having no right to check the information, then sent to server Information sharing request, information sharing request be associated with data to be shared and can by it is shared see the data to be shared to Shared user.Then, server inquires data to be shared according to information sharing request and is distributed to user to be shared.It utilizes The device realizes user actively by the information sharing in oneself extent of competence to the user for having no right to check, so that user be facilitated to look into It sees.
On the other hand, present invention also provides the information inspection Installation practices for being applied to client-side.
Referring to Figure 10, the block diagram of the embodiment of the present application another kind information inspection device is shown, which is applied to visitor In the end of family.As shown in Figure 10, the apparatus may include transmission units 510 and receiving unit 520.
Transmission unit 510 checks request for sending the first information.
The first information checks that the information of data to be shared checked will be checked and be had no right to request comprising user to be shared, with Server-side is determined according to the information of the data to be shared to have the right to check user and have the right to check that user sends information to described Sharing request;
Receiving unit 520, for receiving the data to be shared of server-side return.
The data to be shared receive any one of agreement for having the right to check user feedback by the server and share Response message after obtained from database.
Information inspection device provided in this embodiment, when user checks information by client, if it is desired to checking oneself Information except extent of competence, user end to server send the first information and check request.Server receives the first information Check after request, determine have the right to check the data to be shared have the right check user.And it has the right to the whole of data to be shared Check that user sends information sharing request.Server receives any one and has the right to check the response that the agreement that user returns is shared Message then obtains the data to be shared and feeds back to the client.Using above- mentioned information checking device, be able to use family check through Cross the information for having no right to check agreed to facilitates user to check so that information is shared in a certain range.
Information inspection device described in above-described embodiment is desirably integrated into electronic equipment in practical applications, which sets Standby can be the mobile devices such as server, mobile phone, tablet computer.Dispose the electronics of the embodiment of the present application application program controlling device Equipment can be realized user and check the information agreed to by having the right to check user, so that information is shared in a certain range, User is facilitated to check.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of information inspection method, which is characterized in that including:
The first information for receiving the transmission of the first client checks request, and the first information checks that request includes first client Have no right the information for the data to be shared checked in end;
According to the information of the data to be shared determine have permission check the data to be shared have the right check user;
It has the right to check that corresponding second client of user sends information sharing request to described, the information sharing request is for asking It asks described and has the right to check data to be shared described in user sharing;
After the agreement for receiving any one of second client feedback shared response message, according to the number to be shared According to acquisition of information described in Data Concurrent to be shared send to first client.
2. the method according to claim 1, wherein the information of the data to be shared includes the number to be shared According to message identification, data organization type and secret grade;
It is described determined according to the information of the data to be shared have permission check the data to be shared have the right to check user, packet It includes:
The first user to match with the data organization type of the data to be shared is searched to gather;
From first user set in determine to match with the secret grade of the data to be shared have the right check user.
3. the method according to claim 1, wherein the letter of the packet data to be shared of the data to be shared Breath mark;
It is described determined according to the information of the data to be shared have permission check the data to be shared have the right to check user, packet It includes:
The corresponding data organization type of the data to be shared and secret etc. are obtained according to the message identification of the data to be shared Grade;
The first user to match with the data organization type is searched to gather;
From first user set in determine to match with the secret grade have the right check user.
4. method according to claim 1-3, which is characterized in that the method also includes:
The second information inspection request that first client is sent is received, the second information inspection request is checked for requesting Information in extent of competence;
Determine institutional framework and Permission Levels belonging to the corresponding user of first client;
Search the first information set to match with institutional framework belonging to the user and Permission Levels;
And search the other institutional frameworks to match with the Permission Levels can public information;
To first client send the first information set and it is described can public information.
5. method according to claim 1-3, which is characterized in that the method also includes:
It include the client-side information of virtual environment platform to having the terminal device used by a user of registration permission to send, so that The user for having registration permission installs client, the void according to the client-side information on used terminal device The other application program installed on quasi- environmental level and the terminal device is mutually isolated.
6. according to the method described in claim 5, it is characterized in that, send comprising virtual environment platform client-side information it Before, the method also includes:
The invitation request for the invitation non-registered users that registered users are sent is received, the invitation request includes the unregistered use The user identifier at family;
Message request is sent to the corresponding terminal device of the user identifier, the message request includes invitation code;
After sending the client-side information comprising virtual environment platform, the method also includes:
The registration information that the non-registered users are sent is received, the registration information includes that the invitation code and the user mark Know;
When in the registration information user identifier and invitation code respectively with the associated user identifier of the message request and invitation When code is consistent, the feedback information to succeed in registration is returned;
When in registration information user identifier and invitation code and the associated user identifier of the message request and invitation code it is inconsistent When, return to the feedback information for having no right registration.
7. according to the method described in claim 5, it is characterized in that, send comprising virtual environment platform client-side information it Afterwards, the method also includes:
The registration information that non-registered users are sent is received, the registration information includes user identifier;
When in the institutional framework user information of the server-side including the user identifier, the feedback letter to succeed in registration is returned Breath;
When not including the user identifier in the institutional framework user information of the server-side, the feedback letter for having no right registration is returned Breath.
8. a kind of information inspection method, which is characterized in that including:
It receives and has the right to check the information sharing request that the client of data to be shared is sent;
The information sharing is parsed to request to obtain the message identification of data to be shared and user identifier to be shared;
The data to be shared are obtained from database according to the message identification;
The data to be shared are sent to client corresponding to the user identifier to be shared.
9. a kind of information inspection device, which is characterized in that including:
First receiving unit, the first information for receiving the transmission of the first client check request, and the first information, which is checked, asks The information for having no right the data to be shared checked comprising first client is sought, the information of the data to be shared includes at least letter Breath mark;
First determination unit checks having for the data to be shared for determining to have permission according to the information of the data to be shared Power checks user;
Request transmitting unit, for having the right to check that corresponding second client of user sends information and is total to the data to be shared Enjoy request, the information sharing request described has the right to check data to be shared described in user sharing for requesting;
Information acquisition unit, for the response message shared when the agreement for receiving any one of second client feedback Afterwards, the data to be shared according to the acquisition of information of the data to be shared;
Information transmitting unit, for the data to be shared to be sent to first client.
10. a kind of information inspection device, which is characterized in that including:
Receiving unit, for receiving the information sharing request having the right to check the client of data to be shared and sending;
Resolution unit obtains the message identification and user to be shared mark of data to be shared for parsing the information sharing request Know;
Acquiring unit, for obtaining the data to be shared from database according to the message identification;
Dispatching Unit, for by the data distribution to be shared to the corresponding client of the user identifier to be shared.
CN201810493360.8A 2018-05-22 2018-05-22 Information inspection method and device Pending CN108833357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810493360.8A CN108833357A (en) 2018-05-22 2018-05-22 Information inspection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810493360.8A CN108833357A (en) 2018-05-22 2018-05-22 Information inspection method and device

Publications (1)

Publication Number Publication Date
CN108833357A true CN108833357A (en) 2018-11-16

Family

ID=64147816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810493360.8A Pending CN108833357A (en) 2018-05-22 2018-05-22 Information inspection method and device

Country Status (1)

Country Link
CN (1) CN108833357A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145887A (en) * 2019-12-24 2020-05-12 嘉兴太美医疗科技有限公司 Blind breaking method of medicine warning system, blind breaking system and computer readable medium
CN111181839A (en) * 2019-12-25 2020-05-19 口碑(上海)信息技术有限公司 Data processing method, device and equipment in application sharing
CN111339513A (en) * 2020-01-23 2020-06-26 华为技术有限公司 Data sharing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
JP2012181740A (en) * 2011-03-02 2012-09-20 Secom Co Ltd Information storage device
CN102780709A (en) * 2012-08-21 2012-11-14 广东利为网络科技有限公司 Authority management method and system
CN102904900A (en) * 2012-10-26 2013-01-30 王维国 Method for authenticating user status for registering and/or logging in network application
CN104410680A (en) * 2014-11-20 2015-03-11 北京奇虎科技有限公司 Method, client terminal, server and system of sharing file/file folder
CN104917794A (en) * 2014-03-13 2015-09-16 中国移动通信集团公司 Data sharing method, device and system
CN106254467A (en) * 2016-08-05 2016-12-21 北京小米移动软件有限公司 Sharing files method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
JP2012181740A (en) * 2011-03-02 2012-09-20 Secom Co Ltd Information storage device
CN102780709A (en) * 2012-08-21 2012-11-14 广东利为网络科技有限公司 Authority management method and system
CN102904900A (en) * 2012-10-26 2013-01-30 王维国 Method for authenticating user status for registering and/or logging in network application
CN104917794A (en) * 2014-03-13 2015-09-16 中国移动通信集团公司 Data sharing method, device and system
CN104410680A (en) * 2014-11-20 2015-03-11 北京奇虎科技有限公司 Method, client terminal, server and system of sharing file/file folder
CN106254467A (en) * 2016-08-05 2016-12-21 北京小米移动软件有限公司 Sharing files method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
特里奥特 等: "《Oracle数据库管理员基础教程》", 31 May 2001 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145887A (en) * 2019-12-24 2020-05-12 嘉兴太美医疗科技有限公司 Blind breaking method of medicine warning system, blind breaking system and computer readable medium
CN111145887B (en) * 2019-12-24 2021-01-29 上海亿锎智能科技有限公司 Blind breaking method of medicine warning system, blind breaking system and computer readable medium
CN111181839A (en) * 2019-12-25 2020-05-19 口碑(上海)信息技术有限公司 Data processing method, device and equipment in application sharing
CN111181839B (en) * 2019-12-25 2021-08-24 口碑(上海)信息技术有限公司 Data processing method, device and equipment in application sharing
CN111339513A (en) * 2020-01-23 2020-06-26 华为技术有限公司 Data sharing method and device
CN111339513B (en) * 2020-01-23 2023-05-09 华为技术有限公司 Data sharing method and device

Similar Documents

Publication Publication Date Title
CN103716326B (en) Resource access method and URG
CN104022894B (en) Manage method, the method for configuration application parameter of application configuration parameter concentratedly
CN102449976B (en) System and method for accessing private digital content
CN100580653C (en) Application programming interface for administering the distribution of software updates in an update distribution system
CN103220344B (en) Microblogging licenses method and system
US20080148366A1 (en) System and method for authentication in a social network service
CN104933188B (en) A kind of data synchronous system and method in patent personalization storehouse
CN103685590B (en) Obtain the method and system of IP address
CN102904870B (en) Server unit and information processing method
CN102638454A (en) Plug-in type SSO (single signon) integration method oriented to HTTP (hypertext transfer protocol) identity authentication protocol
CN101076033B (en) Method and system for storing authentication certificate
CN101729541B (en) Method and system for accessing resources of multi-service platform
CN101626369A (en) Method, device and system for single sign-on
JP5342020B2 (en) Group definition management system
CN108833357A (en) Information inspection method and device
CN104052616A (en) Method and system for managing services in Internet data center
CN104836782B (en) Server, client and data access method and system
CN109672757A (en) File access method and file access processing unit
CN108023883A (en) A kind of device authorization management method and device
CN101442558A (en) Method and system for providing index service for P2SP network
CN108369614A (en) User authen method and system for carrying out the process
CN103078788A (en) Information interaction method and information interaction system based on application
JP5817728B2 (en) Condition matching system, condition matching link device, and condition matching processing method
CN106060097A (en) Management system and management method for information security competition
JP2016148919A (en) User attribute information management system and user attribute information management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116