CN109344600B - Distributed system and data processing method based on same - Google Patents

Distributed system and data processing method based on same Download PDF

Info

Publication number
CN109344600B
CN109344600B CN201811172611.9A CN201811172611A CN109344600B CN 109344600 B CN109344600 B CN 109344600B CN 201811172611 A CN201811172611 A CN 201811172611A CN 109344600 B CN109344600 B CN 109344600B
Authority
CN
China
Prior art keywords
user
data
backlogs
enterprise
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811172611.9A
Other languages
Chinese (zh)
Other versions
CN109344600A (en
Inventor
刘维英
陶国谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiangyi Weilian Technology Development Co ltd
Original Assignee
Xiangyi Weilian Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiangyi Weilian Technology Development Co ltd filed Critical Xiangyi Weilian Technology Development Co ltd
Priority to CN201811172611.9A priority Critical patent/CN109344600B/en
Publication of CN109344600A publication Critical patent/CN109344600A/en
Application granted granted Critical
Publication of CN109344600B publication Critical patent/CN109344600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention discloses a distributed system and a data processing method based on the system, wherein the method comprises the following steps: configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority; acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data; extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user. The method and the system can be networked, can be upgraded and analyzed in real time, can provide data processing and analyzing capability for users, and have high practicability.

Description

Distributed system and data processing method based on same
Technical Field
The present invention relates to the field of data processing methods, and in particular, to a distributed system and a data processing method based on the distributed system.
Background
At present, most of enterprise management modes are old, a management system is in a single machine mode, real-time upgrading cannot be achieved, a plurality of subsystems are independent and coexist, data of a plurality of sub-enterprises cannot be synchronized in real time, effective real-time analysis cannot be achieved on the data, and better data guidance, market positioning and commodity competitiveness can not be provided for enterprises in the future.
Disclosure of Invention
In view of the above technical problems, the present invention provides a distributed system that is networked, can be upgraded in real time, can perform real-time analysis, and can provide data processing and analysis capabilities for users, and a data processing method based on the system.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a data processing method of a distributed system is provided, which comprises the following steps:
configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The method can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, and has high practicability.
Preferably, as an implementable manner, before configuring the corresponding operation service content for the user according to the user identity and allocating the corresponding operation right, the method further includes the following steps:
acquiring a user identity type selected when a user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Preferably, as an implementable manner, the user identities include individual users, enterprise users, and family members, wherein the individual users are personally oriented.
Preferably, as an implementation manner, after the overall analysis of the data chain and before the execution strategy corresponding to the data element is formulated for the user, the method further includes the following steps:
the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
The invention also provides a distributed system, which comprises a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The system can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, is networked, can be upgraded in real time and analyzed in real time, can provide data processing and analyzing capability for the user, and has high practicability.
Preferably, as an implementable manner, the login module is further configured to obtain a user identity type selected when the user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Preferably, as an implementation manner, the user identities distinguished by the login module include an individual user, an enterprise user and a family member.
Preferably, as an implementable manner, the policy making module is further configured to obtain the progress of all matters to be solved related to the login user, determine the sequence of the matters to be solved according to the importance of the matters to be solved, and add the sequence of the matters to be solved to the execution policy.
Drawings
The invention will be further described with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a data processing method of a distributed system provided by the present invention;
FIG. 2 is a flow chart of identity authentication;
fig. 3 is a schematic block diagram of a distributed system provided by the present invention.
Detailed Description
As shown in fig. 1, the data processing method of the distributed system provided by the present invention includes the following steps:
step S10: configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
step S20: acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
step S30: extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to the corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The method can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, and has high practicability.
On the basis of the corresponding embodiment of fig. 1, a modification is made, and fig. 2 is shown in detail. Fig. 2 is a flowchart of identity authentication. The method comprises the following specific steps:
step S11: acquiring a user identity type selected when a user logs in;
step S12: matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Through the identification of the user identity type, the user identity can be effectively classified into the corresponding user identity type, and the efficiency of the user identity authentication is effectively improved.
Specifically, the user identities comprise individual users, enterprise users and family members, wherein the individual users are oriented to individuals and used for displaying relevant personal information for the users; the enterprise user faces to the enterprise, and the user provides the enterprise service which can be reserved for the enterprise; family members face to families and are used for providing family data sharing for users, and different members in the family members have the same data elements according to the registration information. When the event is a personal user, all personal related items, backlogs and the like are obtained, and a corresponding event execution scheme is formulated for the user according to the marked items, the importance, the destination, the sequence and the like of the backlogs, so that the item processing efficiency is improved, and the reminding operation is performed for the user. When the family member is the family member, the family member uses the same key information during registration, the system can determine the information of all the persons related to the family registered by using the same key information and the related information of all the persons to-do-things and the like through the collection and statistics of the key information, plans according to the family member to-do-things and the like, arranges the same or similar items on the same day or coincides, avoids the repeated processing of the items, improves the efficiency of the item processing, and saves the resources to a certain extent. When the enterprise user is the enterprise user, the backlogs related to the enterprise in all the employees in the enterprise are collected, the backlogs of the same type are determined, planning statistics transaction is executed, and the transaction efficiency of the enterprise is improved. Meanwhile, the feedback of the users related to enterprise products is collected, and a corresponding adjusting scheme is formulated according to the feedback opinions of the users, so that the influence of the enterprise is improved, and different situations are met.
By classifying the user identities, the identities of the login users can be effectively and accurately classified, and the accuracy of data analysis, data association and decision making is guaranteed.
Furthermore, in order to better execute the strategy according to the user identity, the following steps are added between the overall analysis of the data chain and the establishment of the execution strategy corresponding to the data elements for the user:
step S40: the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved to an execution strategy.
On the basis of the above method embodiment, a distributed system is also provided, and see fig. 3 in detail. The distributed system comprises a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user.
By adopting the technical scheme, the invention achieves the technical effects that: according to the method and the device, the corresponding operation authority and the corresponding operation service content can be effectively distributed to the user through the acquisition of the user identity, the service is more targeted, all data related to the user can be obtained through the acquisition of the data related to the user, the related data is analyzed and processed, and a corresponding execution strategy is formulated. The system can effectively make a corresponding execution strategy for the user, improves the efficiency of event processing and execution, is networked, can be upgraded in real time and analyzed in real time, can provide data processing and analyzing capability for the user, and has high practicability.
On the basis of the above embodiment, the following improvements are also made:
the login module is also used for acquiring the user identity type selected when the user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system.
Through the identification of the user identity type, the user identity can be effectively classified into the corresponding user identity type, and the efficiency of the user identity authentication is effectively improved.
On the basis of the above embodiment, the following improvements are also made:
the user identities distinguished by the login module include individual users, enterprise users, and family members, where individual users are personally oriented.
By classifying the user identities, the identities of the login users can be effectively and accurately classified, and the accuracy of data analysis, data association and decision making is guaranteed.
In order to better execute the strategy according to the user identity, the strategy making module is also used for acquiring the progress of all matters to be solved related to the login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
The foregoing embodiments are intended to illustrate that the invention may be implemented or used by those skilled in the art, and modifications to the above embodiments will be apparent to those skilled in the art, and therefore the invention includes, but is not limited to, the above embodiments, any methods, processes, products, etc., consistent with the principles and novel and inventive features disclosed herein, and fall within the scope of the invention.

Claims (4)

1. A data processing method for a distributed system, comprising the steps of:
configuring corresponding operation service content for the user according to the user identity, and distributing corresponding operation authority;
acquiring all relevant data corresponding to the user identity, analyzing the relevant data, and performing classified storage according to the type of the data;
extracting data elements with the same or related data in different data types, establishing a corresponding data chain according to the data elements, performing overall analysis on the data chain, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user;
before configuring corresponding operation service content for the user according to the user identity and distributing corresponding operation authority, the method further comprises the following steps:
acquiring a user identity type selected when a user logs in;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system;
the user identities comprise individual users, enterprise users and family members;
when the user identity is a personal user, acquiring all personal related items and backlogs, and formulating a corresponding event execution scheme for the user according to the marked items and the importance, destination and sequence of the backlogs;
when the user identity is a family member, the system determines information of all family members registered by using the same key information and the family members of the user and relevant information of the backlogs of all the members through the collection and statistics of the key information, makes a plan according to the backlogs of the family members, and arranges the same or similar items to the same day or overlaps the same;
and when the user identity is an enterprise user, collecting the backlogs related to the enterprise in all employees of the enterprise corresponding to the enterprise user, determining the backlogs of the same type, and executing planning statistics.
2. The data processing method of the distributed system according to claim 1, wherein after the overall analysis of the data chain and before the execution strategy corresponding to the data elements is formulated for the user, the method further comprises the following steps:
the method comprises the steps of obtaining the progress of all matters to be solved related to a login user, determining the sequence of the matters to be solved according to the importance of the matters to be solved, and adding the sequence of the matters to be solved into the execution strategy.
3. A distributed system is characterized by comprising a login module, a data analysis module and a strategy making module;
the login module is used for configuring corresponding operation service contents for the user according to the user identity and distributing corresponding operation authorities;
the data analysis module is used for acquiring all relevant data corresponding to the user identity, analyzing the relevant data and storing the relevant data in a classified manner according to the type of the data;
the strategy making module is used for extracting data elements with the same or related data in different data types, establishing corresponding data chains according to the data elements, performing overall analysis on the data chains, making an execution strategy corresponding to the data elements for a user, and feeding the execution strategy back to a corresponding login user;
the login module is also used for acquiring the user identity type selected by the user during login;
matching user name information input by a user with a user information table corresponding to the user identity type, and prompting the user to successfully log in when a data entry corresponding to the user name information exists in the user information table; otherwise, prompting that the user name or the password is wrong until the user successfully logs in the system;
the user identities distinguished by the login module comprise individual users, enterprise users and family members;
when the user identity is a personal user, acquiring all personal related items and backlogs, and formulating a corresponding event execution scheme for the user according to the marked items and the importance, destination and sequence of the backlogs;
when the user identity is a family member, the system determines information of all family members registered by using the same key information and the family members of the user and relevant information of the backlogs of all the members through the collection and statistics of the key information, makes a plan according to the backlogs of the family members, and arranges the same or similar items to the same day or overlaps the same;
and when the user identity is an enterprise user, collecting the backlogs related to the enterprise in all employees of the enterprise corresponding to the enterprise user, determining the backlogs of the same type, and executing planning statistics.
4. The distributed system according to claim 3, wherein the policy making module is further configured to obtain a progress of all matters to be solved related to the logged-in user, determine a sequence of the matters to be solved according to importance of the matters to be solved, and add the sequence of the matters to be solved to the execution policy.
CN201811172611.9A 2018-10-09 2018-10-09 Distributed system and data processing method based on same Active CN109344600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811172611.9A CN109344600B (en) 2018-10-09 2018-10-09 Distributed system and data processing method based on same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811172611.9A CN109344600B (en) 2018-10-09 2018-10-09 Distributed system and data processing method based on same

Publications (2)

Publication Number Publication Date
CN109344600A CN109344600A (en) 2019-02-15
CN109344600B true CN109344600B (en) 2022-04-08

Family

ID=65308556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811172611.9A Active CN109344600B (en) 2018-10-09 2018-10-09 Distributed system and data processing method based on same

Country Status (1)

Country Link
CN (1) CN109344600B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487383A (en) * 2010-12-02 2012-06-06 上海可鲁系统软件有限公司 Industrial internet distributed system safety access control device
CN102571873A (en) * 2010-12-31 2012-07-11 上海可鲁系统软件有限公司 Bidirectional security audit method and device in distributed system
CN104917793A (en) * 2014-03-13 2015-09-16 中国移动通信集团河北有限公司 Access control method, device and system
CN104956330A (en) * 2012-11-29 2015-09-30 格林伊登美国控股有限责任公司 Workload distribution with resource awareness
CN107944713A (en) * 2017-11-28 2018-04-20 象翌微链科技发展有限公司 The management system and method for a kind of platform

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6871279B2 (en) * 2001-03-20 2005-03-22 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically managing user roles in a distributed system
CA2695439A1 (en) * 2007-07-12 2009-01-15 Innovation Investments, Llc Identity authentication and secured access systems, components, and methods
JP5476729B2 (en) * 2009-02-12 2014-04-23 株式会社リコー Image forming apparatus, IC card user validity checking method and program
CN104636643B (en) * 2013-11-07 2017-12-01 华为技术有限公司 Control method and device are presented in system interface content
CN105447682A (en) * 2015-11-24 2016-03-30 裴兆欣 Government affair management system
CN106203168B (en) * 2016-07-06 2019-01-25 广东盈迅信息技术有限公司 Database security accesses system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487383A (en) * 2010-12-02 2012-06-06 上海可鲁系统软件有限公司 Industrial internet distributed system safety access control device
CN102571873A (en) * 2010-12-31 2012-07-11 上海可鲁系统软件有限公司 Bidirectional security audit method and device in distributed system
CN104956330A (en) * 2012-11-29 2015-09-30 格林伊登美国控股有限责任公司 Workload distribution with resource awareness
CN104917793A (en) * 2014-03-13 2015-09-16 中国移动通信集团河北有限公司 Access control method, device and system
CN107944713A (en) * 2017-11-28 2018-04-20 象翌微链科技发展有限公司 The management system and method for a kind of platform

Also Published As

Publication number Publication date
CN109344600A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN111639363B (en) Data analysis method based on block chain and edge computing server
CN111897863B (en) Multi-source heterogeneous data fusion and convergence method
US10257228B2 (en) System and method for real time detection and prevention of segregation of duties violations in business-critical applications
US20180341778A1 (en) Extraction of policies from static permissions and access events for physical access control
CN110489984B (en) Reminding method and device for to-be-processed items, computer equipment and storage medium
US8839449B1 (en) Assessing risk of information leakage
CN108989336A (en) A kind of emergency disposal system and emergence treating method for network safety event
US8601010B1 (en) Application management database with personnel assignment and automated configuration
CN102509057B (en) Mark-based method for safely filtering unstructured data
CN112732693B (en) Intelligent internet of things data acquisition method, device, equipment and storage medium
US7225106B2 (en) Data processing system and method for processing test orders
CN109344600B (en) Distributed system and data processing method based on same
CN110086826B (en) Information processing method
CN116383786A (en) Big data information supervision system and method based on Internet of things
CN114708080B (en) Distributed financial data online processing method
US20100301993A1 (en) Pattern based security authorization
US11290384B2 (en) Access origin classification apparatus, access origin classification method and program
CN112632247A (en) Method and device for detecting man-hour report, computer equipment and storage medium
CN113111153A (en) Data analysis method, device, equipment and storage medium
CN112766822A (en) Enterprise decision management information service system
CN111967996A (en) Method and device for identifying enterprise capital composition, computer readable storage medium and electronic equipment
EP4254237A1 (en) Security data processing device, security data processing method, and computer-readable storage medium for storing program for processing security data
CN112328779B (en) Training sample construction method, device, terminal equipment and storage medium
Ansell et al. Swedish legislation regarding forensic DNA elimination databases
CN115018263A (en) User grouping method and device and data object grouping method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant