CN109344600B - Distributed system and data processing method based on same - Google Patents
Distributed system and data processing method based on same Download PDFInfo
- Publication number
- CN109344600B CN109344600B CN201811172611.9A CN201811172611A CN109344600B CN 109344600 B CN109344600 B CN 109344600B CN 201811172611 A CN201811172611 A CN 201811172611A CN 109344600 B CN109344600 B CN 109344600B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- backlogs
- enterprise
- user identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
The invention discloses a distributed system and a data processing method based on the system, wherein the method comprises the following steps: configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority; acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data; extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user. The method and the system can be networked, can be upgraded and analyzed in real time, can provide data processing and analyzing capability for users, and have high practicability.
Description
Technical Field
The present invention relates to the field of data processing methods, and in particular, to a distributed system and a data processing method based on the distributed system.
Background
At present, most of enterprise management modes are old, a management system is in a single machine mode, real-time upgrading cannot be achieved, a plurality of subsystems are independent and coexist, data of a plurality of sub-enterprises cannot be synchronized in real time, effective real-time analysis cannot be achieved on the data, and better data guidance, market positioning and commodity competitiveness can not be provided for enterprises in the future.
Disclosure of Invention
In view of the above technical problems, the present invention provides a distributed system that is networked, can be upgraded in real time, can perform real-time analysis, and can provide data processing and analysis capabilities for users, and a data processing method based on the system.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a data processing method of a distributed system is provided, which comprises the following steps:
configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The method can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, and has high practicability.
Preferably, as an implementable manner, before configuring the corresponding operation service content for the user according to the user identity and allocating the corresponding operation right, the method further includes the following steps:
acquiring a user identity type selected when a user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Preferably, as an implementable manner, the user identities include individual users, enterprise users, and family members, wherein the individual users are personally oriented.
Preferably, as an implementation manner, after the overall analysis of the data chain and before the execution strategy corresponding to the data element is formulated for the user, the method further includes the following steps:
the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
The invention also provides a distributed system, which comprises a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The system can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, is networked, can be upgraded in real time and analyzed in real time, can provide data processing and analyzing capability for the user, and has high practicability.
Preferably, as an implementable manner, the login module is further configured to obtain a user identity type selected when the user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Preferably, as an implementation manner, the user identities distinguished by the login module include an individual user, an enterprise user and a family member.
Preferably, as an implementable manner, the policy making module is further configured to obtain the progress of all matters to be solved related to the login user, determine the sequence of the matters to be solved according to the importance of the matters to be solved, and add the sequence of the matters to be solved to the execution policy.
Drawings
The invention will be further described with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a data processing method of a distributed system provided by the present invention;
FIG. 2 is a flow chart of identity authentication;
fig. 3 is a schematic block diagram of a distributed system provided by the present invention.
Detailed Description
As shown in fig. 1, the data processing method of the distributed system provided by the present invention includes the following steps:
step S10: configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
step S20: acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
step S30: extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The method can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, and has high practicability.
On the basis of the corresponding embodiment of fig. 1, a modification is made, and fig. 2 is shown in detail. Fig. 2 is a flowchart of identity authentication. The method comprises the following specific steps:
step S11: acquiring a user identity type selected when a user logs in;
step S12: matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Through the identification of the user identity type, the user identity can be effectively classified into the corresponding user identity type, and the efficiency of the user identity authentication is effectively improved.
Specifically, the user identities comprise individual users, enterprise users and family members, wherein the individual users are oriented to individuals and used for displaying relevant personal information for the users; the enterprise user faces to the enterprise, and the user provides the enterprise service which can be reserved for the enterprise; family members face to families and are used for providing family data sharing for users, and different members in the family members have the same data elements according to the registration information. When the event is a personal user, all personal related items, backlogs and the like are obtained, and a corresponding event execution scheme is formulated for the user according to the marked items, the importance, the destination, the sequence and the like of the backlogs, so that the item processing efficiency is improved, and the reminding operation is performed for the user. When the family member is the family member, the family member uses the same key information during registration, the system can determine the information of all the persons related to the family registered by using the same key information and the related information of all the persons to-do-things and the like through the collection and statistics of the key information, plans according to the family member to-do-things and the like, arranges the same or similar items on the same day or coincides, avoids the repeated processing of the items, improves the efficiency of the item processing, and saves the resources to a certain extent. When the enterprise user is the enterprise user, the backlogs related to the enterprise in all the employees in the enterprise are collected, the backlogs of the same type are determined, planning statistics transaction is executed, and the transaction efficiency of the enterprise is improved. Meanwhile, the feedback of the users related to enterprise products is collected, and a corresponding adjusting scheme is formulated according to the feedback opinions of the users, so that the influence of the enterprise is improved, and different situations are met.
By classifying the user identities, the identities of the login users can be effectively and accurately classified, and the accuracy of data analysis, data association and decision making is guaranteed.
Furthermore, in order to better execute the strategy according to the user identity, the following steps are added between the overall analysis of the data chain and the establishment of the execution strategy corresponding to the data elements for the user:
step S40: the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved to an execution strategy.
On the basis of the above method embodiment, a distributed system is also provided, and see fig. 3 in detail. The distributed system comprises a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The system can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, is networked, can be upgraded in real time and analyzed in real time, can provide data processing and analyzing capability for the user, and has high practicability.
On the basis of the above embodiment, the following improvements are also made:
the login module is also used for acquiring the user identity type selected when the user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Through the identification of the user identity type, the user identity can be effectively classified into the corresponding user identity type, and the efficiency of the user identity authentication is effectively improved.
On the basis of the above embodiment, the following improvements are also made:
the user identities distinguished by the login module include individual users, enterprise users, and family members, where individual users are personally oriented.
By classifying the user identities, the identities of the login users can be effectively and accurately classified, and the accuracy of data analysis, data association and decision making is guaranteed.
In order to better execute the strategy according to the user identity, the strategy making module is also used for acquiring the progress of all matters to be solved related to the login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
The foregoing embodiments are intended to illustrate that the invention may be implemented or used by those skilled in the art, and modifications to the above embodiments will be apparent to those skilled in the art, and therefore the invention includes, but is not limited to, the above embodiments, any methods, processes, products, etc., consistent with the principles and novel and inventive features disclosed herein, and fall within the scope of the invention.
Claims (4)
1. A data processing method for a distributed system, comprising the steps of:
configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user;
before configuring corresponding operation service content for the user according to the user identity and distributing corresponding operation authority, the method further comprises the following steps:
acquiring a user identity type selected when a user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system;
the user identities comprise individual users, enterprise users and family members;
when the user identity is a personal user, acquiring all personal related items and backlogs, and formulating a corresponding event execution scheme for the user according to the marked items and the importance, destination and sequence of the backlogs;
when the user identity is a family member, the system determines information of all family members registered by using the same key information and the family members of the user and relevant information of the backlogs of all the members through the collection and statistics of the key information, makes a plan according to the backlogs of the family members, and arranges the same or similar items to the same day or overlaps the same;
and when the user identity is an enterprise user, collecting the backlogs related to the enterprise in all employees of the enterprise corresponding to the enterprise user, determining the backlogs of the same type, and executing planning statistics.
2. The data processing method of the distributed system according to claim 1, wherein after the overall analysis of the data chain and before the execution strategy corresponding to the data elements is formulated for the user, the method further comprises the following steps:
the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
3. A distributed system is characterized by comprising a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing corresponding data chains according to the data elements, performing overall analysis on the data chains, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user;
the login module is also used for acquiring the user identity type selected by the user during login;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system;
the user identities distinguished by the login module comprise individual users, enterprise users and family members;
when the user identity is a personal user, acquiring all personal related items and backlogs, and formulating a corresponding event execution scheme for the user according to the marked items and the importance, destination and sequence of the backlogs;
when the user identity is a family member, the system determines information of all family members registered by using the same key information and the family members of the user and relevant information of the backlogs of all the members through the collection and statistics of the key information, makes a plan according to the backlogs of the family members, and arranges the same or similar items to the same day or overlaps the same;
and when the user identity is an enterprise user, collecting the backlogs related to the enterprise in all employees of the enterprise corresponding to the enterprise user, determining the backlogs of the same type, and executing planning statistics.
4. The distributed system according to claim 3, wherein the policy making module is further configured to obtain a progress of all matters to be solved related to the logged-in user, determine a sequence of the matters to be solved according to importance of the matters to be solved, and add the sequence of the matters to be solved to the execution policy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811172611.9A CN109344600B (en) | 2018-10-09 | 2018-10-09 | Distributed system and data processing method based on same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811172611.9A CN109344600B (en) | 2018-10-09 | 2018-10-09 | Distributed system and data processing method based on same |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109344600A CN109344600A (en) | 2019-02-15 |
CN109344600B true CN109344600B (en) | 2022-04-08 |
Family
ID=65308556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811172611.9A Active CN109344600B (en) | 2018-10-09 | 2018-10-09 | Distributed system and data processing method based on same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109344600B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487383A (en) * | 2010-12-02 | 2012-06-06 | 上海可鲁系统软件有限公司 | Industrial internet distributed system safety access control device |
CN102571873A (en) * | 2010-12-31 | 2012-07-11 | 上海可鲁系统软件有限公司 | Bidirectional security audit method and device in distributed system |
CN104917793A (en) * | 2014-03-13 | 2015-09-16 | 中国移动通信集团河北有限公司 | Access control method, device and system |
CN104956330A (en) * | 2012-11-29 | 2015-09-30 | 格林伊登美国控股有限责任公司 | Workload distribution with resource awareness |
CN107944713A (en) * | 2017-11-28 | 2018-04-20 | 象翌微链科技发展有限公司 | The management system and method for a kind of platform |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6871279B2 (en) * | 2001-03-20 | 2005-03-22 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically managing user roles in a distributed system |
CA2695439A1 (en) * | 2007-07-12 | 2009-01-15 | Innovation Investments, Llc | Identity authentication and secured access systems, components, and methods |
JP5476729B2 (en) * | 2009-02-12 | 2014-04-23 | 株式会社リコー | Image forming apparatus, IC card user validity checking method and program |
CN104636643B (en) * | 2013-11-07 | 2017-12-01 | 华为技术有限公司 | Control method and device are presented in system interface content |
CN105447682A (en) * | 2015-11-24 | 2016-03-30 | 裴兆欣 | Government affair management system |
CN106203168B (en) * | 2016-07-06 | 2019-01-25 | 广东盈迅信息技术有限公司 | Database security accesses system |
-
2018
- 2018-10-09 CN CN201811172611.9A patent/CN109344600B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487383A (en) * | 2010-12-02 | 2012-06-06 | 上海可鲁系统软件有限公司 | Industrial internet distributed system safety access control device |
CN102571873A (en) * | 2010-12-31 | 2012-07-11 | 上海可鲁系统软件有限公司 | Bidirectional security audit method and device in distributed system |
CN104956330A (en) * | 2012-11-29 | 2015-09-30 | 格林伊登美国控股有限责任公司 | Workload distribution with resource awareness |
CN104917793A (en) * | 2014-03-13 | 2015-09-16 | 中国移动通信集团河北有限公司 | Access control method, device and system |
CN107944713A (en) * | 2017-11-28 | 2018-04-20 | 象翌微链科技发展有限公司 | The management system and method for a kind of platform |
Also Published As
Publication number | Publication date |
---|---|
CN109344600A (en) | 2019-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111639363B (en) | Data analysis method based on block chain and edge computing server | |
CN111897863B (en) | Multi-source heterogeneous data fusion and convergence method | |
US10257228B2 (en) | System and method for real time detection and prevention of segregation of duties violations in business-critical applications | |
US20180341778A1 (en) | Extraction of policies from static permissions and access events for physical access control | |
CN110489984B (en) | Reminding method and device for to-be-processed items, computer equipment and storage medium | |
US8839449B1 (en) | Assessing risk of information leakage | |
CN108989336A (en) | A kind of emergency disposal system and emergence treating method for network safety event | |
US8601010B1 (en) | Application management database with personnel assignment and automated configuration | |
CN102509057B (en) | Mark-based method for safely filtering unstructured data | |
CN112732693B (en) | Intelligent internet of things data acquisition method, device, equipment and storage medium | |
US7225106B2 (en) | Data processing system and method for processing test orders | |
CN109344600B (en) | Distributed system and data processing method based on same | |
CN110086826B (en) | Information processing method | |
CN116383786A (en) | Big data information supervision system and method based on Internet of things | |
CN114708080B (en) | Distributed financial data online processing method | |
US20100301993A1 (en) | Pattern based security authorization | |
US11290384B2 (en) | Access origin classification apparatus, access origin classification method and program | |
CN112632247A (en) | Method and device for detecting man-hour report, computer equipment and storage medium | |
CN113111153A (en) | Data analysis method, device, equipment and storage medium | |
CN112766822A (en) | Enterprise decision management information service system | |
CN111967996A (en) | Method and device for identifying enterprise capital composition, computer readable storage medium and electronic equipment | |
EP4254237A1 (en) | Security data processing device, security data processing method, and computer-readable storage medium for storing program for processing security data | |
CN112328779B (en) | Training sample construction method, device, terminal equipment and storage medium | |
Ansell et al. | Swedish legislation regarding forensic DNA elimination databases | |
CN115018263A (en) | User grouping method and device and data object grouping method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |