CN107229644A - Searching method and device - Google Patents
Searching method and device Download PDFInfo
- Publication number
- CN107229644A CN107229644A CN201610177009.9A CN201610177009A CN107229644A CN 107229644 A CN107229644 A CN 107229644A CN 201610177009 A CN201610177009 A CN 201610177009A CN 107229644 A CN107229644 A CN 107229644A
- Authority
- CN
- China
- Prior art keywords
- user
- search
- search condition
- search result
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a kind of searching method and device.Searching method includes:Obtain the search condition that user provides;Determine the corresponding data isolation rank of user;Scanned for according to the corresponding data isolation rank of user and search condition, to obtain search result.The application can provide the search result being consistent with user right, improve the efficiency of data needed for user obtains, it is ensured that Information Security.
Description
【Technical field】
The application is related to Internet technical field, more particularly to a kind of searching method and device.
【Background technology】
In enterprise and internet system, often there is the data platform of oneself in enterprise, and data platform is often
Search system is accessed, function of search is provided a user.Often there is sensitiveness in business data, they are depended on
In specific user group, different user colony has different access rights.
But, the search system of current main flow typically only provides the function of search of core, i.e., it is direct according to
The search condition of family input scans for data platform and returns to search result.And for access rights control
System, is typically shown by control data by data platform combination specific transactions logic and realized.Relatively conventional
Data display scheme is:Data platform only search result summary page every search result of displaying it is basic
Information, when user clicks on essential information request access details information, data platform prompting user's lack of competence
Access.
There is following defect in above-mentioned access privilege control scheme:
First, no matter whether user has permission to access, and shows the essential information of each search result, holds
Easily cause information leakage.
Second, when user clicks on the essential information request access details information of search result, it is prompted nothing again
Authority is accessed, and is easily misled user and is performed invalid operation, and the efficiency of data needed for reduction user obtains is used
Family experience is poor.
【The content of the invention】
The many aspects of the application provide a kind of searching method and device, are consistent to provide with user right
Search result, improve user obtain needed for data efficiency, it is ensured that Information Security.
The one side of the application there is provided a kind of searching method, including:
Obtain the search condition that user provides;
Determine the corresponding data isolation rank of the user;
Scanned for according to the corresponding data isolation rank of the user and the search condition, to be searched
Hitch fruit.
The another aspect of the application there is provided a kind of searcher, including:
Acquisition module, the search condition for obtaining user's offer;
Determining module, for determining the corresponding data isolation rank of the user;
Search module, for according to the corresponding data isolation rank of the user and search condition progress
Search, to obtain search result.
As shown from the above technical solution, the application is by the search condition of user data isolation corresponding with user
Rank, which is combined, to be scanned for, and realizes the combination of search technique and data isolation, so can be only by number
User is supplied to as search result according to the secure data after isolation, data platform need not do access rights again
Control, user can directly access the detail information of search result, be conducive to improving number needed for user obtains
According to efficiency, improve Consumer's Experience, simultaneously as user is it is seen that secure data after data isolation,
It ensure that data safety.
【Brief description of the drawings】
, below will be to embodiment or existing in order to illustrate more clearly of the technical scheme in the embodiment of the present application
The accompanying drawing used required in technology description is briefly described, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the present application, for those of ordinary skill in the art, is not paying creation
Property work on the premise of, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the system schematic that existing user scans in enterprise and internet system;
The schematic flow sheet for the searching method that Fig. 2 provides for the embodiment of the application one;
The schematic flow sheet for the searching method that Fig. 3 provides for another embodiment of the application;
The schematic flow sheet for the searching method that Fig. 4 provides for the another embodiment of the application;
The structural representation for the searcher that Fig. 5 provides for the another embodiment of the application;
The structural representation for the searcher that Fig. 6 provides for the another embodiment of the application.
【Embodiment】
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with this Shen
Accompanying drawing that please be in embodiment, the technical scheme in the embodiment of the present application is clearly and completely described,
Obviously, described embodiment is some embodiments of the present application, rather than whole embodiments.It is based on
Embodiment in the application, those of ordinary skill in the art are obtained under the premise of creative work is not made
The every other embodiment obtained, belongs to the scope of the application protection.
Fig. 1 is the system schematic that existing user scans in enterprise and internet system.Such as Fig. 1
It is shown, in the search system, including:The data platform 11 of enterprise, what data platform 11 was accessed searches
Cable system 12 and the terminal device of user 13.Data platform 11 is carried by search system 12 to user
For function of search.
When data needed for user needs to search in data platform 11, by its terminal device 13 to searching
Cable system 12 sends in searching request, searching request and carries search condition;Search system 12 is according to searching
Rope condition directly scans for and obtained the base for the search result for meeting search condition into data platform 11
This information, search system 12 returns to the summary page of search result to terminal device 13, by search result
Essential information is shown on search result summary page.Above-mentioned flow is as shown in the fine rule with arrow in Fig. 1.
When user needs to access the detail information of some search result, the upper corresponding search knot of summary page is clicked on
The essential information of fruit, to send the request of access details information to data platform 11;Data platform 11 connects
The request of user is received, according to the mark of the user carried in request, judges whether user has access rights;
If user has access rights, the detail information of corresponding search result is provided a user, if user does not have
Access rights, then return to prompt message to user, to point out user to have no right access.Above-mentioned flow such as Fig. 1
Shown in the middle thick line with arrow.
In such scheme, there is problems with:
First, no matter whether user has permission to access, and shows the essential information of each search result, holds
Easily cause information leakage.
Second, when user clicks on the essential information request access details information of search result, it is prompted nothing again
Authority is accessed, and is easily misled user and is performed invalid operation, and the efficiency of data needed for reduction user obtains is used
Family experience is poor.
In view of the above-mentioned problems, the application provides a solution, its core thinking is:By search technique
It is combined with data isolation technology, and makes the cohesive process transparent to user, user's input search condition
The search result obtained afterwards is actually the secure data after data isolation, reaches the purpose of safety search.
So data platform need not do access privilege control again, and user can directly access the details letter of search result
Breath, is conducive to improving the efficiency of data needed for user obtains, Consumer's Experience is improved, simultaneously as user sees
To be secure data after data isolation, it is ensured that data safety.
Technical scheme is described in detail below by specific embodiment.
The schematic flow sheet for the searching method that Fig. 2 provides for the embodiment of the application one.As shown in Fig. 2 should
Method includes:
201st, the search condition that user provides is obtained.
202nd, the corresponding data isolation rank of user is determined.
203rd, the search condition provided according to the corresponding data isolation rank of user and user is scanned for,
To obtain search result.
The present embodiment provides a kind of searching method, can be performed by searcher, to provide a kind of combination
The search plan of data isolation technology, improves the efficiency of data needed for user obtains, it is ensured that data safety.
On implementing, searcher, which can be located in data platform as a searching component, to be realized, Huo Zheye
It can be realized independently of data platform.
Referring first to the step 101 in Fig. 1:, can when user needs to search for data from data platform
To provide search condition to searcher.Searcher obtains the search condition that user provides.
Optionally, user can be by its terminal device to searcher transmission searching request, by searching bar
Part is carried in searching request.Searcher receives the searching request that the terminal device of user is sent, to searching
Rope request is parsed, and therefrom obtains search condition.Or
Optionally, searcher externally provides complete search for application DLL (Application
Programming Interface, API), referred to as search for entrance.For user, it can pass through
The incoming search condition of search entrance.For example, user can pass through the SDK instruments on its terminal device
The incoming all kinds of search conditions of grammer arranged according to the search entrance.Searcher receives user and passes through search
What device surface was provided a user searches for the incoming search condition of entrance.
With continued reference to the step 102 in Fig. 1, after the search condition of user is obtained, searcher is true
Determine the corresponding data isolation rank of user.
In actual applications, user can also fill in addition to providing search condition to searcher to search
The identification information that user is provided is put, so that searcher determines the identity of user.The identification information of user can
Can uniquely it be marked with being that title, id, account, the relevant information of the terminal device of user of user etc. are any
Know the information of user.
Searcher is according to the identification information of user, search access right management platform, to determine the access of user
Role.For any enterprise, in addition to the data platform with data storage, typically it can also lead to
Rights management platform is crossed to be managed the information such as role, the authority of internal staff.In rights management
The main corresponding relation being stored between the identification information of user and the access role of user in platform.For example,
User A access role is common employee, and user B access role is keeper, user C visit
It is line manager, etc. to ask role.
In addition, in order to guarantee data security, in general, different access role has different access rights
Limit.It means that a certain access role can only access the data in its authority correspondence scope, and it can not visit
Ask data outside the data outside extent of competence, access authority range need to carry out the access role every
From.In the present embodiment, by different data isolation ranks represent to need for different access role every
From data area.For ease of the corresponding relation between maintenance access role and data isolation rank, this reality
Apply example and safeguard an access role and data isolation level map table.For searcher, from authority
Management platform determined after the access role of user, can be according to the access role of user, queried access angle
Color and data isolation mapping table, determine the corresponding data isolation rank of user.
With continued reference to the step 103 in Fig. 1, it is determined that after the corresponding data isolation rank of user, searching
The search condition that rope device is provided according to the corresponding data isolation rank of user and user is scanned for, and is realized
The combination of search technique and data isolation technology, to obtain search result.Here search result is through number
The symbol searched according to the secure data after isolation, that is, during there is from user the data area of access rights
Close the data of search condition.
In an optional embodiment, searcher is carried using the corresponding data isolation rank of user and user
The mode that the search condition of confession is scanned for includes:Searcher is first according to the corresponding data isolation of user
Rank, determines the identification information for the data area that user can access;Then according to identification information and search
Condition is scanned for, to obtain search result.Wherein, identification information here defines that user can visit
The data area asked, and scanned for according to the identification information and search condition, it is ensured that search result
It is that what is searched in the data area that can be accessed in user meet the data of search condition.
In one embodiment, searcher scans for specifically may be used according to identification information and search condition
Think:The identification information and search condition are assembled, to obtain new search condition, then basis
New search condition is scanned for, to obtain search result.The method flow of the embodiment as shown in figure 3,
Comprise the following steps:
301st, the search condition that user provides is obtained.
302nd, the corresponding data isolation rank of user is determined.
303rd, according to the corresponding data isolation rank of user, the data area that user can access is determined
Identification information.
304th, identification information and search condition are assembled, to obtain new search condition.
305th, scanned for according to new search condition, to obtain search result.
In this embodiment, searcher is assembled identification information with search condition, new to obtain
Search condition, is then scanned for using new search condition, can directly arrive what identification information was identified
Scanned in data area, advantageously reduce hunting zone, save searching resource, improve search efficiency;
Meanwhile, the secure data after data isolation can be obtained again as search result, reach the mesh of safety search
's.
Wherein, when searcher states searching method flow shown in Fig. 3 in realization, its one kind realizes structure
Mainly include:Basic search (BaseSearch) module, basic search strategy
(BaseSearchStrategy) module, character data isolation (RoleDataScope) module, with
And search mission (SearchTask) module.It is, of course, also possible to including:Search result (SearchResult)
Module, search-type (SearchType) module etc..
Wherein, basic search module is mainly used in externally exposing search service, for different application scenarios,
Different realizations are derived from, equivalent to search entrance, a kind of function is to receive the search condition that user provides.
Character data isolation module, access role and data isolation level map table for safeguarding user.
Specifically, character data range module can extract the access role of user from rights management platform, from
Data isolation rank is extracted in data isolation rank (DataScopeLevel) module, so as to form access
Mapping relations between role and data isolation rank.
Basic search policy module be used for call character data isolation module, determine the corresponding data of user every
From rank, then according to the data isolation rank of user, the mark for the data area that user can access is determined
Know information, identification information is assembled with search condition, to obtain new search condition.
Search mission module is used to be scanned for into data platform according to new search condition, and is searched
Hitch fruit.
The search-type that search result module is provided mainly in conjunction with search-type module, scans for result
Displaying processing.
Wherein, the data isolation rank that different pieces of information platform is supported is different.For example, common
Data isolation rank includes:My (self) rank, supervisor's rank, all ranks.Comparatively,
I is less than all ranks at rank less than rank, supervisor's rank is responsible for.
My rank refer to can only search field title be user id (user_id) data rank.If
The corresponding data isolation rank of user is my rank, then can using user_id as above-mentioned identification information,
For identifying the data area of user-accessible, the search condition for then providing user_id and user enters
Row assembling, is scanned for new search condition.
Supervisor's rank refers to the rank that is scanned for keeper's identity, and rank is higher, and the keeper can be with
The data area of access is represented by searching route (path).If the corresponding data isolation rank of user
, then can be using path as above-mentioned identification information, for identifying the number that user can access to be responsible for rank
According to scope, the search condition for then providing user_id and user is assembled, with new search condition
Scan for.
All ranks refer to the rank that may search for any data, it is not necessary to do and isolate.If user is corresponding
Data isolation rank is all ranks, then can regard the information for indicating to search for total data as above-mentioned mark
Information, for identifying the data area of user-accessible, then by indicate search for total data information and
The search condition that user provides is assembled, and is scanned for new search condition.What deserves to be explained is,
The information for indicating search total data can be information, i.e., the search condition directly provided using user
Scan for.
In another specific embodiment, searcher is scanned for specifically according to identification information and search condition
Can be:Scanned for according to search condition, to obtain initial search result;According at the beginning of identification information pair
Beginning search result is filtered, to obtain final search result.The method flow of the embodiment such as Fig. 4
It is shown, comprise the following steps:
401st, the search condition that user provides is obtained.
402nd, the corresponding data isolation rank of user is determined.
403rd, according to the corresponding data isolation rank of user, the data area that user can access is determined
Identification information.
404th, scanned for according to search condition, to obtain initial search result.
405th, filtered according to identification information pair initial search result, to obtain final search result.
In this embodiment, the search condition that searcher is provided according to user first is scanned for, and is obtained
Initial search result, is then filtered using identification information pair initial search result, is therefrom extracted and is used
The search result that family has permission to access, can equally obtain the secure data after data isolation and be tied as search
Really, the purpose of safety search is reached.
Further, after search result is obtained, searcher can be as prior art by search result
Essential information be showed in the summary of search result page on.User needs to access the details of some search result
During information, the essential information that can click on corresponding search result sends request, data platform to data platform
The detail information of corresponding search result is directly returned to user.Herein it should be noted that due to using
The search result that the above embodiments of the present application are searched is actually the secure data after data isolation,
It is the data that user has permission to access entirely, so data platform as prior art without using access right
Limit control, i.e., need not judge whether user has access rights, but directly return to search knot to user
The detail information of fruit, is conducive to mitigating the burden of data platform, it also avoid user and performs invalid operation,
Be conducive to improving the efficiency of data needed for user obtains, better user experience.
Further, after being actually data isolation due to the search result that the above embodiments of the present application are obtained
Secure data, be that user has permission the data checked or accessed entirely, checked in the absence of unsuitable user
Data, based on this, the detail information of search result directly can be illustrated in search result row by searcher
In table, such user can directly check the detail information of search result in search result list, without
The detail information of search result is asked to data platform, is conducive to further improving data needed for user obtains
Efficiency.What deserves to be explained is, the detail information that this mode is relatively adapted to search result is fairly simple
Situation, if the detail information of search result is more complicated, directly transmission detail information can be wasted compared with multiple resource.
What deserves to be explained is, the method that the embodiment of the present application is provided can be applied not only to internet hunt scene
In, it can also be applied in information recommendation scene, data isolation is combined with information recommendation, base is realized
In the correlation recommendation of data isolation.If specifically, application scenarios are information recommendation scene, above-mentioned basis
The search result that the corresponding data isolation rank of user is obtained with the search condition that user provides is actually to need
The information of user is recommended, so being recommended after search result is obtained, in addition to by search result
The step of user.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore by its all table
State as a series of combination of actions, but those skilled in the art should know, the application is not by being retouched
The limitation for the sequence of movement stated, because according to the application, some steps can be using other orders or same
Shi Jinhang.Secondly, those skilled in the art should also know, embodiment described in this description belongs to
In preferred embodiment, necessary to involved action and module not necessarily the application.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment
The part of detailed description, may refer to the associated description of other embodiment.
The structural representation for the searcher that Fig. 5 provides for the another embodiment of the application.As shown in figure 5,
The searcher includes:Acquisition module 51, determining module 52 and search module 53.
Acquisition module 51, the search condition for obtaining user's offer.
Determining module 52, for determining the corresponding data isolation rank of user.
Search module 53, for being scanned for according to the corresponding data isolation rank of user and search condition, with
Obtain search result.
In an optional embodiment, determining module 52 specifically for:
According to the identification information of user, search access right management platform, to determine the access role of user;
According to the access role of user, queried access role and data isolation level map table, to determine user
Corresponding data isolation rank.
In an optional embodiment, as shown in fig. 6, one kind of search module 53 realizes that structure includes:Really
Order member 531 and search unit 532.
Determining unit 531, for according to the corresponding data isolation rank of user, determining the number that user can access
According to the identification information of scope.
Search unit 532, for being scanned for according to identification information and search condition, to obtain search result.
Further, search unit 532 specifically for:
Identification information is assembled with search condition, to obtain new search condition;
Scanned for according to new search condition, to obtain search result.
Further, search unit 532 specifically for:
Scanned for according to search condition, to obtain initial search result;
Filtered according to identification information pair initial search result, to obtain search result.
In an optional embodiment, acquisition module 51 specifically for:
Receive user and the incoming search condition of the search entrance externally provided is provided.
The searcher that the present embodiment is provided, by the search condition of user data isolation level corresponding with user
It is not combined and scans for, realizes the combination of search technique and data isolation, so can be only by data
Secure data after isolation is supplied to user as search result, and data platform need not do access rights control again
System, user can directly access the detail information of search result, be conducive to improving data needed for user obtains
Efficiency, Consumer's Experience is improved, simultaneously as user is it is seen that secure data after data isolation, is protected
Data safety is demonstrate,proved.
In addition, the searcher that the present embodiment is provided can be applied not only to internet hunt scene, can also
Applied in information recommendation scene, data isolation is combined with information recommendation, realizes and is based on data isolation
Correlation recommendation.If specifically, application scenarios are information recommendation scene, above-mentioned search module 53
The search result that the search condition provided according to the corresponding data isolation rank of user and user is obtained is actually
Need to recommend the information of user, so as shown in fig. 6, the searcher of the present embodiment can also include:
Recommending module 54, after obtaining search result in search module 53, use is recommended by search result
Family.
It is apparent to those skilled in the art that, it is for convenience and simplicity of description, above-mentioned to retouch
The specific work process for the system, apparatus, and unit stated, may be referred to the correspondence in preceding method embodiment
Process, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, device and
Method, can be realized by another way.For example, device embodiment described above is only to show
Meaning property, for example, the division of the unit, only a kind of division of logic function can when actually realizing
To there is other dividing mode, such as multiple units or component can combine or be desirably integrated into another
System, or some features can be ignored, or not perform.It is another, it is shown or discussed each other
Coupling or direct-coupling or communication connection can be the INDIRECT COUPLING of device or unit by some interfaces
Or communication connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, make
It can be for the part that unit is shown or may not be physical location, you can with positioned at a place,
Or can also be distributed on multiple NEs.Can select according to the actual needs part therein or
Person's whole units realize the purpose of this embodiment scheme.
In addition, each functional unit in the application each embodiment can be integrated in a processing unit
In or unit be individually physically present, can also two or more units be integrated in one
In individual unit.Above-mentioned integrated unit can both be realized in the form of hardware, it would however also be possible to employ hardware adds
The form of SFU software functional unit is realized.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in a computer
In read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, including some fingers
Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.)
Or processor (processor) performs the part steps of each embodiment methods described of the application.And it is foregoing
Storage medium include:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM),
Random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various
Can be with the medium of store program codes.
Finally it should be noted that:Above example is only to the technical scheme for illustrating the application, rather than to it
Limitation;Although the application is described in detail with reference to the foregoing embodiments, the ordinary skill of this area
Personnel should be understood:It can still modify to the technical scheme described in foregoing embodiments, or
Person carries out equivalent substitution to which part technical characteristic;And these modifications or replacement, do not make corresponding skill
The essence of art scheme departs from the spirit and scope of each embodiment technical scheme of the application.
Claims (14)
1. a kind of searching method, it is characterised in that including:
Obtain the search condition that user provides;
Determine the corresponding data isolation rank of the user;
Scanned for according to the corresponding data isolation rank of the user and the search condition, to be searched for
As a result.
2. according to the method described in claim 1, it is characterised in that described to determine the corresponding number of the user
According to isolation level, including:
According to the identification information of the user, search access right management platform, to determine the access angle of the user
Color;
According to the access role of the user, queried access role and data isolation level map table, to determine
The corresponding data isolation rank of the user.
3. according to the method described in claim 1, it is characterised in that described according to the corresponding number of the user
Scanned for according to isolation level and the search condition, to obtain search result, including:
According to the corresponding data isolation rank of the user, the data area that the user can access is determined
Identification information;
Scanned for according to the identification information and the search condition, to obtain the search result.
4. method according to claim 3, it is characterised in that described according to the identification information and institute
Search condition is stated to scan for, to obtain the search result, including:
The identification information is assembled with the search condition, to obtain new search condition;
Scanned for according to the new search condition, to obtain the search result.
5. method according to claim 3, it is characterised in that described according to the identification information and institute
Search condition is stated to scan for, to obtain the search result, including:
Scanned for according to the search condition, to obtain initial search result;
The initial search result according to the identification information pair is filtered, to obtain the search result.
6. the method according to claim any one of 1-5, it is characterised in that the acquisition user provides
Search condition, including:
Receive the user and the incoming search condition of the search entrance externally provided is provided.
7. the method according to claim any one of 1-5, it is characterised in that if application scenarios are information
Recommend scene, methods described also includes:
After the search result is obtained, the search result is recommended into the user.
8. a kind of searcher, it is characterised in that including:
Acquisition module, the search condition for obtaining user's offer;
Determining module, for determining the corresponding data isolation rank of the user;
Search module, for being searched according to the corresponding data isolation rank of the user and the search condition
Rope, to obtain search result.
9. device according to claim 8, it is characterised in that the determining module specifically for:
According to the identification information of the user, search access right management platform, to determine the access angle of the user
Color;
According to the access role of the user, queried access role and data isolation level map table, to determine
The corresponding data isolation rank of the user.
10. device according to claim 8, it is characterised in that the search module includes:
Determining unit, for according to the corresponding data isolation rank of the user, determining that the user can visit
The identification information for the data area asked;
Search unit, it is described to obtain for being scanned for according to the identification information and the search condition
Search result.
11. device according to claim 10, it is characterised in that the search unit specifically for:
The identification information is assembled with the search condition, to obtain new search condition;
Scanned for according to the new search condition, to obtain the search result.
12. device according to claim 10, it is characterised in that the search unit specifically for:
Scanned for according to the search condition, to obtain initial search result;
The initial search result according to the identification information pair is filtered, to obtain the search result.
13. the device according to claim any one of 8-12, it is characterised in that the acquisition module tool
Body is used for:
Receive the user and the incoming search condition of the search entrance externally provided is provided.
14. the device according to claim any one of 8-12, it is characterised in that also include:
Recommending module, for when application scenarios are information recommendation scene, the search result to be recommended into institute
State user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610177009.9A CN107229644A (en) | 2016-03-25 | 2016-03-25 | Searching method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610177009.9A CN107229644A (en) | 2016-03-25 | 2016-03-25 | Searching method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107229644A true CN107229644A (en) | 2017-10-03 |
Family
ID=59932948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610177009.9A Pending CN107229644A (en) | 2016-03-25 | 2016-03-25 | Searching method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107229644A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107832462A (en) * | 2017-11-28 | 2018-03-23 | 北京恒华伟业科技股份有限公司 | A kind of data request method and device |
CN108920974A (en) * | 2018-05-23 | 2018-11-30 | 华迪计算机集团有限公司 | A kind of application authorization search method and system for supporting multi-layer |
CN111339560A (en) * | 2020-02-26 | 2020-06-26 | 中国邮政储蓄银行股份有限公司 | Data isolation method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102012981A (en) * | 2010-11-16 | 2011-04-13 | 传神联合(北京)信息技术有限公司 | Distributing and matching method and system of general permission grade |
CN102201935A (en) * | 2011-05-13 | 2011-09-28 | 大唐移动通信设备有限公司 | Access control method and device based on VIEW |
CN102799645A (en) * | 2012-06-28 | 2012-11-28 | 用友软件股份有限公司 | Security search device and method |
CN104766023A (en) * | 2015-02-02 | 2015-07-08 | 苏州全维软件科技有限公司 | User management method based on ORACLE database |
-
2016
- 2016-03-25 CN CN201610177009.9A patent/CN107229644A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102012981A (en) * | 2010-11-16 | 2011-04-13 | 传神联合(北京)信息技术有限公司 | Distributing and matching method and system of general permission grade |
CN102201935A (en) * | 2011-05-13 | 2011-09-28 | 大唐移动通信设备有限公司 | Access control method and device based on VIEW |
CN102799645A (en) * | 2012-06-28 | 2012-11-28 | 用友软件股份有限公司 | Security search device and method |
CN104766023A (en) * | 2015-02-02 | 2015-07-08 | 苏州全维软件科技有限公司 | User management method based on ORACLE database |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107832462A (en) * | 2017-11-28 | 2018-03-23 | 北京恒华伟业科技股份有限公司 | A kind of data request method and device |
CN108920974A (en) * | 2018-05-23 | 2018-11-30 | 华迪计算机集团有限公司 | A kind of application authorization search method and system for supporting multi-layer |
CN111339560A (en) * | 2020-02-26 | 2020-06-26 | 中国邮政储蓄银行股份有限公司 | Data isolation method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10257187B2 (en) | Prompting login account | |
US9218481B2 (en) | Managing password strength | |
CN109977690A (en) | A kind of data processing method, device and medium | |
CN105279435B (en) | Webpage leak detection method and device | |
CN105095970B (en) | The execution method and system of third-party application | |
CN106575327A (en) | Analyzing facial recognition data and social network data for user authentication | |
CA3062580A1 (en) | An enterprise group establishing method and computer device in an instant messaging system | |
US10891357B2 (en) | Managing the display of hidden proprietary software code to authorized licensed users | |
CN104753909B (en) | Method for authenticating after information updating, Apparatus and system | |
US12038984B2 (en) | Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index | |
CN110399748A (en) | A kind of screenshot method and device based on image recognition | |
US11277448B2 (en) | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods | |
US20190197457A1 (en) | Assigning tickets to agents based on relevant skills in a customer-support ticketing system | |
Kshetri et al. | Big data and cloud computing for development: Lessons from key industries and economies in the global south | |
CN104615662B (en) | A kind of method, apparatus and terminal device handling data | |
CN107229644A (en) | Searching method and device | |
CN110069911A (en) | Access control method, device, system, electronic equipment and readable storage medium | |
CN105939370A (en) | Method and device for updating URL library | |
CN110247857A (en) | Current-limiting method and device | |
CN106257520A (en) | Resolve answer method and system | |
CN109829821A (en) | A kind of abnormal processing method of digital asset address transfer, apparatus and system | |
US20220391122A1 (en) | Data processing systems and methods for using a data model to select a target data asset in a data migration | |
CN104318309B (en) | All-purpose card based on mobile terminal realizes system and method | |
CN106888200A (en) | Mark correlating method, method for sending information and device | |
US11416109B2 (en) | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |