CN107229644A - Searching method and device - Google Patents

Searching method and device Download PDF

Info

Publication number
CN107229644A
CN107229644A CN201610177009.9A CN201610177009A CN107229644A CN 107229644 A CN107229644 A CN 107229644A CN 201610177009 A CN201610177009 A CN 201610177009A CN 107229644 A CN107229644 A CN 107229644A
Authority
CN
China
Prior art keywords
user
search
search condition
search result
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610177009.9A
Other languages
Chinese (zh)
Inventor
许家强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610177009.9A priority Critical patent/CN107229644A/en
Publication of CN107229644A publication Critical patent/CN107229644A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a kind of searching method and device.Searching method includes:Obtain the search condition that user provides;Determine the corresponding data isolation rank of user;Scanned for according to the corresponding data isolation rank of user and search condition, to obtain search result.The application can provide the search result being consistent with user right, improve the efficiency of data needed for user obtains, it is ensured that Information Security.

Description

Searching method and device
【Technical field】
The application is related to Internet technical field, more particularly to a kind of searching method and device.
【Background technology】
In enterprise and internet system, often there is the data platform of oneself in enterprise, and data platform is often Search system is accessed, function of search is provided a user.Often there is sensitiveness in business data, they are depended on In specific user group, different user colony has different access rights.
But, the search system of current main flow typically only provides the function of search of core, i.e., it is direct according to The search condition of family input scans for data platform and returns to search result.And for access rights control System, is typically shown by control data by data platform combination specific transactions logic and realized.Relatively conventional Data display scheme is:Data platform only search result summary page every search result of displaying it is basic Information, when user clicks on essential information request access details information, data platform prompting user's lack of competence Access.
There is following defect in above-mentioned access privilege control scheme:
First, no matter whether user has permission to access, and shows the essential information of each search result, holds Easily cause information leakage.
Second, when user clicks on the essential information request access details information of search result, it is prompted nothing again Authority is accessed, and is easily misled user and is performed invalid operation, and the efficiency of data needed for reduction user obtains is used Family experience is poor.
【The content of the invention】
The many aspects of the application provide a kind of searching method and device, are consistent to provide with user right Search result, improve user obtain needed for data efficiency, it is ensured that Information Security.
The one side of the application there is provided a kind of searching method, including:
Obtain the search condition that user provides;
Determine the corresponding data isolation rank of the user;
Scanned for according to the corresponding data isolation rank of the user and the search condition, to be searched Hitch fruit.
The another aspect of the application there is provided a kind of searcher, including:
Acquisition module, the search condition for obtaining user's offer;
Determining module, for determining the corresponding data isolation rank of the user;
Search module, for according to the corresponding data isolation rank of the user and search condition progress Search, to obtain search result.
As shown from the above technical solution, the application is by the search condition of user data isolation corresponding with user Rank, which is combined, to be scanned for, and realizes the combination of search technique and data isolation, so can be only by number User is supplied to as search result according to the secure data after isolation, data platform need not do access rights again Control, user can directly access the detail information of search result, be conducive to improving number needed for user obtains According to efficiency, improve Consumer's Experience, simultaneously as user is it is seen that secure data after data isolation, It ensure that data safety.
【Brief description of the drawings】
, below will be to embodiment or existing in order to illustrate more clearly of the technical scheme in the embodiment of the present application The accompanying drawing used required in technology description is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present application, for those of ordinary skill in the art, is not paying creation Property work on the premise of, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the system schematic that existing user scans in enterprise and internet system;
The schematic flow sheet for the searching method that Fig. 2 provides for the embodiment of the application one;
The schematic flow sheet for the searching method that Fig. 3 provides for another embodiment of the application;
The schematic flow sheet for the searching method that Fig. 4 provides for the another embodiment of the application;
The structural representation for the searcher that Fig. 5 provides for the another embodiment of the application;
The structural representation for the searcher that Fig. 6 provides for the another embodiment of the application.
【Embodiment】
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with this Shen Accompanying drawing that please be in embodiment, the technical scheme in the embodiment of the present application is clearly and completely described, Obviously, described embodiment is some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained under the premise of creative work is not made The every other embodiment obtained, belongs to the scope of the application protection.
Fig. 1 is the system schematic that existing user scans in enterprise and internet system.Such as Fig. 1 It is shown, in the search system, including:The data platform 11 of enterprise, what data platform 11 was accessed searches Cable system 12 and the terminal device of user 13.Data platform 11 is carried by search system 12 to user For function of search.
When data needed for user needs to search in data platform 11, by its terminal device 13 to searching Cable system 12 sends in searching request, searching request and carries search condition;Search system 12 is according to searching Rope condition directly scans for and obtained the base for the search result for meeting search condition into data platform 11 This information, search system 12 returns to the summary page of search result to terminal device 13, by search result Essential information is shown on search result summary page.Above-mentioned flow is as shown in the fine rule with arrow in Fig. 1.
When user needs to access the detail information of some search result, the upper corresponding search knot of summary page is clicked on The essential information of fruit, to send the request of access details information to data platform 11;Data platform 11 connects The request of user is received, according to the mark of the user carried in request, judges whether user has access rights; If user has access rights, the detail information of corresponding search result is provided a user, if user does not have Access rights, then return to prompt message to user, to point out user to have no right access.Above-mentioned flow such as Fig. 1 Shown in the middle thick line with arrow.
In such scheme, there is problems with:
First, no matter whether user has permission to access, and shows the essential information of each search result, holds Easily cause information leakage.
Second, when user clicks on the essential information request access details information of search result, it is prompted nothing again Authority is accessed, and is easily misled user and is performed invalid operation, and the efficiency of data needed for reduction user obtains is used Family experience is poor.
In view of the above-mentioned problems, the application provides a solution, its core thinking is:By search technique It is combined with data isolation technology, and makes the cohesive process transparent to user, user's input search condition The search result obtained afterwards is actually the secure data after data isolation, reaches the purpose of safety search. So data platform need not do access privilege control again, and user can directly access the details letter of search result Breath, is conducive to improving the efficiency of data needed for user obtains, Consumer's Experience is improved, simultaneously as user sees To be secure data after data isolation, it is ensured that data safety.
Technical scheme is described in detail below by specific embodiment.
The schematic flow sheet for the searching method that Fig. 2 provides for the embodiment of the application one.As shown in Fig. 2 should Method includes:
201st, the search condition that user provides is obtained.
202nd, the corresponding data isolation rank of user is determined.
203rd, the search condition provided according to the corresponding data isolation rank of user and user is scanned for, To obtain search result.
The present embodiment provides a kind of searching method, can be performed by searcher, to provide a kind of combination The search plan of data isolation technology, improves the efficiency of data needed for user obtains, it is ensured that data safety. On implementing, searcher, which can be located in data platform as a searching component, to be realized, Huo Zheye It can be realized independently of data platform.
Referring first to the step 101 in Fig. 1:, can when user needs to search for data from data platform To provide search condition to searcher.Searcher obtains the search condition that user provides.
Optionally, user can be by its terminal device to searcher transmission searching request, by searching bar Part is carried in searching request.Searcher receives the searching request that the terminal device of user is sent, to searching Rope request is parsed, and therefrom obtains search condition.Or
Optionally, searcher externally provides complete search for application DLL (Application Programming Interface, API), referred to as search for entrance.For user, it can pass through The incoming search condition of search entrance.For example, user can pass through the SDK instruments on its terminal device The incoming all kinds of search conditions of grammer arranged according to the search entrance.Searcher receives user and passes through search What device surface was provided a user searches for the incoming search condition of entrance.
With continued reference to the step 102 in Fig. 1, after the search condition of user is obtained, searcher is true Determine the corresponding data isolation rank of user.
In actual applications, user can also fill in addition to providing search condition to searcher to search The identification information that user is provided is put, so that searcher determines the identity of user.The identification information of user can Can uniquely it be marked with being that title, id, account, the relevant information of the terminal device of user of user etc. are any Know the information of user.
Searcher is according to the identification information of user, search access right management platform, to determine the access of user Role.For any enterprise, in addition to the data platform with data storage, typically it can also lead to Rights management platform is crossed to be managed the information such as role, the authority of internal staff.In rights management The main corresponding relation being stored between the identification information of user and the access role of user in platform.For example, User A access role is common employee, and user B access role is keeper, user C visit It is line manager, etc. to ask role.
In addition, in order to guarantee data security, in general, different access role has different access rights Limit.It means that a certain access role can only access the data in its authority correspondence scope, and it can not visit Ask data outside the data outside extent of competence, access authority range need to carry out the access role every From.In the present embodiment, by different data isolation ranks represent to need for different access role every From data area.For ease of the corresponding relation between maintenance access role and data isolation rank, this reality Apply example and safeguard an access role and data isolation level map table.For searcher, from authority Management platform determined after the access role of user, can be according to the access role of user, queried access angle Color and data isolation mapping table, determine the corresponding data isolation rank of user.
With continued reference to the step 103 in Fig. 1, it is determined that after the corresponding data isolation rank of user, searching The search condition that rope device is provided according to the corresponding data isolation rank of user and user is scanned for, and is realized The combination of search technique and data isolation technology, to obtain search result.Here search result is through number The symbol searched according to the secure data after isolation, that is, during there is from user the data area of access rights Close the data of search condition.
In an optional embodiment, searcher is carried using the corresponding data isolation rank of user and user The mode that the search condition of confession is scanned for includes:Searcher is first according to the corresponding data isolation of user Rank, determines the identification information for the data area that user can access;Then according to identification information and search Condition is scanned for, to obtain search result.Wherein, identification information here defines that user can visit The data area asked, and scanned for according to the identification information and search condition, it is ensured that search result It is that what is searched in the data area that can be accessed in user meet the data of search condition.
In one embodiment, searcher scans for specifically may be used according to identification information and search condition Think:The identification information and search condition are assembled, to obtain new search condition, then basis New search condition is scanned for, to obtain search result.The method flow of the embodiment as shown in figure 3, Comprise the following steps:
301st, the search condition that user provides is obtained.
302nd, the corresponding data isolation rank of user is determined.
303rd, according to the corresponding data isolation rank of user, the data area that user can access is determined Identification information.
304th, identification information and search condition are assembled, to obtain new search condition.
305th, scanned for according to new search condition, to obtain search result.
In this embodiment, searcher is assembled identification information with search condition, new to obtain Search condition, is then scanned for using new search condition, can directly arrive what identification information was identified Scanned in data area, advantageously reduce hunting zone, save searching resource, improve search efficiency; Meanwhile, the secure data after data isolation can be obtained again as search result, reach the mesh of safety search 's.
Wherein, when searcher states searching method flow shown in Fig. 3 in realization, its one kind realizes structure Mainly include:Basic search (BaseSearch) module, basic search strategy (BaseSearchStrategy) module, character data isolation (RoleDataScope) module, with And search mission (SearchTask) module.It is, of course, also possible to including:Search result (SearchResult) Module, search-type (SearchType) module etc..
Wherein, basic search module is mainly used in externally exposing search service, for different application scenarios, Different realizations are derived from, equivalent to search entrance, a kind of function is to receive the search condition that user provides.
Character data isolation module, access role and data isolation level map table for safeguarding user. Specifically, character data range module can extract the access role of user from rights management platform, from Data isolation rank is extracted in data isolation rank (DataScopeLevel) module, so as to form access Mapping relations between role and data isolation rank.
Basic search policy module be used for call character data isolation module, determine the corresponding data of user every From rank, then according to the data isolation rank of user, the mark for the data area that user can access is determined Know information, identification information is assembled with search condition, to obtain new search condition.
Search mission module is used to be scanned for into data platform according to new search condition, and is searched Hitch fruit.
The search-type that search result module is provided mainly in conjunction with search-type module, scans for result Displaying processing.
Wherein, the data isolation rank that different pieces of information platform is supported is different.For example, common Data isolation rank includes:My (self) rank, supervisor's rank, all ranks.Comparatively, I is less than all ranks at rank less than rank, supervisor's rank is responsible for.
My rank refer to can only search field title be user id (user_id) data rank.If The corresponding data isolation rank of user is my rank, then can using user_id as above-mentioned identification information, For identifying the data area of user-accessible, the search condition for then providing user_id and user enters Row assembling, is scanned for new search condition.
Supervisor's rank refers to the rank that is scanned for keeper's identity, and rank is higher, and the keeper can be with The data area of access is represented by searching route (path).If the corresponding data isolation rank of user , then can be using path as above-mentioned identification information, for identifying the number that user can access to be responsible for rank According to scope, the search condition for then providing user_id and user is assembled, with new search condition Scan for.
All ranks refer to the rank that may search for any data, it is not necessary to do and isolate.If user is corresponding Data isolation rank is all ranks, then can regard the information for indicating to search for total data as above-mentioned mark Information, for identifying the data area of user-accessible, then by indicate search for total data information and The search condition that user provides is assembled, and is scanned for new search condition.What deserves to be explained is, The information for indicating search total data can be information, i.e., the search condition directly provided using user Scan for.
In another specific embodiment, searcher is scanned for specifically according to identification information and search condition Can be:Scanned for according to search condition, to obtain initial search result;According at the beginning of identification information pair Beginning search result is filtered, to obtain final search result.The method flow of the embodiment such as Fig. 4 It is shown, comprise the following steps:
401st, the search condition that user provides is obtained.
402nd, the corresponding data isolation rank of user is determined.
403rd, according to the corresponding data isolation rank of user, the data area that user can access is determined Identification information.
404th, scanned for according to search condition, to obtain initial search result.
405th, filtered according to identification information pair initial search result, to obtain final search result.
In this embodiment, the search condition that searcher is provided according to user first is scanned for, and is obtained Initial search result, is then filtered using identification information pair initial search result, is therefrom extracted and is used The search result that family has permission to access, can equally obtain the secure data after data isolation and be tied as search Really, the purpose of safety search is reached.
Further, after search result is obtained, searcher can be as prior art by search result Essential information be showed in the summary of search result page on.User needs to access the details of some search result During information, the essential information that can click on corresponding search result sends request, data platform to data platform The detail information of corresponding search result is directly returned to user.Herein it should be noted that due to using The search result that the above embodiments of the present application are searched is actually the secure data after data isolation, It is the data that user has permission to access entirely, so data platform as prior art without using access right Limit control, i.e., need not judge whether user has access rights, but directly return to search knot to user The detail information of fruit, is conducive to mitigating the burden of data platform, it also avoid user and performs invalid operation, Be conducive to improving the efficiency of data needed for user obtains, better user experience.
Further, after being actually data isolation due to the search result that the above embodiments of the present application are obtained Secure data, be that user has permission the data checked or accessed entirely, checked in the absence of unsuitable user Data, based on this, the detail information of search result directly can be illustrated in search result row by searcher In table, such user can directly check the detail information of search result in search result list, without The detail information of search result is asked to data platform, is conducive to further improving data needed for user obtains Efficiency.What deserves to be explained is, the detail information that this mode is relatively adapted to search result is fairly simple Situation, if the detail information of search result is more complicated, directly transmission detail information can be wasted compared with multiple resource.
What deserves to be explained is, the method that the embodiment of the present application is provided can be applied not only to internet hunt scene In, it can also be applied in information recommendation scene, data isolation is combined with information recommendation, base is realized In the correlation recommendation of data isolation.If specifically, application scenarios are information recommendation scene, above-mentioned basis The search result that the corresponding data isolation rank of user is obtained with the search condition that user provides is actually to need The information of user is recommended, so being recommended after search result is obtained, in addition to by search result The step of user.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore by its all table State as a series of combination of actions, but those skilled in the art should know, the application is not by being retouched The limitation for the sequence of movement stated, because according to the application, some steps can be using other orders or same Shi Jinhang.Secondly, those skilled in the art should also know, embodiment described in this description belongs to In preferred embodiment, necessary to involved action and module not necessarily the application.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment The part of detailed description, may refer to the associated description of other embodiment.
The structural representation for the searcher that Fig. 5 provides for the another embodiment of the application.As shown in figure 5, The searcher includes:Acquisition module 51, determining module 52 and search module 53.
Acquisition module 51, the search condition for obtaining user's offer.
Determining module 52, for determining the corresponding data isolation rank of user.
Search module 53, for being scanned for according to the corresponding data isolation rank of user and search condition, with Obtain search result.
In an optional embodiment, determining module 52 specifically for:
According to the identification information of user, search access right management platform, to determine the access role of user;
According to the access role of user, queried access role and data isolation level map table, to determine user Corresponding data isolation rank.
In an optional embodiment, as shown in fig. 6, one kind of search module 53 realizes that structure includes:Really Order member 531 and search unit 532.
Determining unit 531, for according to the corresponding data isolation rank of user, determining the number that user can access According to the identification information of scope.
Search unit 532, for being scanned for according to identification information and search condition, to obtain search result.
Further, search unit 532 specifically for:
Identification information is assembled with search condition, to obtain new search condition;
Scanned for according to new search condition, to obtain search result.
Further, search unit 532 specifically for:
Scanned for according to search condition, to obtain initial search result;
Filtered according to identification information pair initial search result, to obtain search result.
In an optional embodiment, acquisition module 51 specifically for:
Receive user and the incoming search condition of the search entrance externally provided is provided.
The searcher that the present embodiment is provided, by the search condition of user data isolation level corresponding with user It is not combined and scans for, realizes the combination of search technique and data isolation, so can be only by data Secure data after isolation is supplied to user as search result, and data platform need not do access rights control again System, user can directly access the detail information of search result, be conducive to improving data needed for user obtains Efficiency, Consumer's Experience is improved, simultaneously as user is it is seen that secure data after data isolation, is protected Data safety is demonstrate,proved.
In addition, the searcher that the present embodiment is provided can be applied not only to internet hunt scene, can also Applied in information recommendation scene, data isolation is combined with information recommendation, realizes and is based on data isolation Correlation recommendation.If specifically, application scenarios are information recommendation scene, above-mentioned search module 53 The search result that the search condition provided according to the corresponding data isolation rank of user and user is obtained is actually Need to recommend the information of user, so as shown in fig. 6, the searcher of the present embodiment can also include: Recommending module 54, after obtaining search result in search module 53, use is recommended by search result Family.
It is apparent to those skilled in the art that, it is for convenience and simplicity of description, above-mentioned to retouch The specific work process for the system, apparatus, and unit stated, may be referred to the correspondence in preceding method embodiment Process, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, device and Method, can be realized by another way.For example, device embodiment described above is only to show Meaning property, for example, the division of the unit, only a kind of division of logic function can when actually realizing To there is other dividing mode, such as multiple units or component can combine or be desirably integrated into another System, or some features can be ignored, or not perform.It is another, it is shown or discussed each other Coupling or direct-coupling or communication connection can be the INDIRECT COUPLING of device or unit by some interfaces Or communication connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, make It can be for the part that unit is shown or may not be physical location, you can with positioned at a place, Or can also be distributed on multiple NEs.Can select according to the actual needs part therein or Person's whole units realize the purpose of this embodiment scheme.
In addition, each functional unit in the application each embodiment can be integrated in a processing unit In or unit be individually physically present, can also two or more units be integrated in one In individual unit.Above-mentioned integrated unit can both be realized in the form of hardware, it would however also be possible to employ hardware adds The form of SFU software functional unit is realized.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in a computer In read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, including some fingers Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.) Or processor (processor) performs the part steps of each embodiment methods described of the application.And it is foregoing Storage medium include:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various Can be with the medium of store program codes.
Finally it should be noted that:Above example is only to the technical scheme for illustrating the application, rather than to it Limitation;Although the application is described in detail with reference to the foregoing embodiments, the ordinary skill of this area Personnel should be understood:It can still modify to the technical scheme described in foregoing embodiments, or Person carries out equivalent substitution to which part technical characteristic;And these modifications or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of each embodiment technical scheme of the application.

Claims (14)

1. a kind of searching method, it is characterised in that including:
Obtain the search condition that user provides;
Determine the corresponding data isolation rank of the user;
Scanned for according to the corresponding data isolation rank of the user and the search condition, to be searched for As a result.
2. according to the method described in claim 1, it is characterised in that described to determine the corresponding number of the user According to isolation level, including:
According to the identification information of the user, search access right management platform, to determine the access angle of the user Color;
According to the access role of the user, queried access role and data isolation level map table, to determine The corresponding data isolation rank of the user.
3. according to the method described in claim 1, it is characterised in that described according to the corresponding number of the user Scanned for according to isolation level and the search condition, to obtain search result, including:
According to the corresponding data isolation rank of the user, the data area that the user can access is determined Identification information;
Scanned for according to the identification information and the search condition, to obtain the search result.
4. method according to claim 3, it is characterised in that described according to the identification information and institute Search condition is stated to scan for, to obtain the search result, including:
The identification information is assembled with the search condition, to obtain new search condition;
Scanned for according to the new search condition, to obtain the search result.
5. method according to claim 3, it is characterised in that described according to the identification information and institute Search condition is stated to scan for, to obtain the search result, including:
Scanned for according to the search condition, to obtain initial search result;
The initial search result according to the identification information pair is filtered, to obtain the search result.
6. the method according to claim any one of 1-5, it is characterised in that the acquisition user provides Search condition, including:
Receive the user and the incoming search condition of the search entrance externally provided is provided.
7. the method according to claim any one of 1-5, it is characterised in that if application scenarios are information Recommend scene, methods described also includes:
After the search result is obtained, the search result is recommended into the user.
8. a kind of searcher, it is characterised in that including:
Acquisition module, the search condition for obtaining user's offer;
Determining module, for determining the corresponding data isolation rank of the user;
Search module, for being searched according to the corresponding data isolation rank of the user and the search condition Rope, to obtain search result.
9. device according to claim 8, it is characterised in that the determining module specifically for:
According to the identification information of the user, search access right management platform, to determine the access angle of the user Color;
According to the access role of the user, queried access role and data isolation level map table, to determine The corresponding data isolation rank of the user.
10. device according to claim 8, it is characterised in that the search module includes:
Determining unit, for according to the corresponding data isolation rank of the user, determining that the user can visit The identification information for the data area asked;
Search unit, it is described to obtain for being scanned for according to the identification information and the search condition Search result.
11. device according to claim 10, it is characterised in that the search unit specifically for:
The identification information is assembled with the search condition, to obtain new search condition;
Scanned for according to the new search condition, to obtain the search result.
12. device according to claim 10, it is characterised in that the search unit specifically for:
Scanned for according to the search condition, to obtain initial search result;
The initial search result according to the identification information pair is filtered, to obtain the search result.
13. the device according to claim any one of 8-12, it is characterised in that the acquisition module tool Body is used for:
Receive the user and the incoming search condition of the search entrance externally provided is provided.
14. the device according to claim any one of 8-12, it is characterised in that also include:
Recommending module, for when application scenarios are information recommendation scene, the search result to be recommended into institute State user.
CN201610177009.9A 2016-03-25 2016-03-25 Searching method and device Pending CN107229644A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610177009.9A CN107229644A (en) 2016-03-25 2016-03-25 Searching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610177009.9A CN107229644A (en) 2016-03-25 2016-03-25 Searching method and device

Publications (1)

Publication Number Publication Date
CN107229644A true CN107229644A (en) 2017-10-03

Family

ID=59932948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610177009.9A Pending CN107229644A (en) 2016-03-25 2016-03-25 Searching method and device

Country Status (1)

Country Link
CN (1) CN107229644A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107832462A (en) * 2017-11-28 2018-03-23 北京恒华伟业科技股份有限公司 A kind of data request method and device
CN108920974A (en) * 2018-05-23 2018-11-30 华迪计算机集团有限公司 A kind of application authorization search method and system for supporting multi-layer
CN111339560A (en) * 2020-02-26 2020-06-26 中国邮政储蓄银行股份有限公司 Data isolation method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012981A (en) * 2010-11-16 2011-04-13 传神联合(北京)信息技术有限公司 Distributing and matching method and system of general permission grade
CN102201935A (en) * 2011-05-13 2011-09-28 大唐移动通信设备有限公司 Access control method and device based on VIEW
CN102799645A (en) * 2012-06-28 2012-11-28 用友软件股份有限公司 Security search device and method
CN104766023A (en) * 2015-02-02 2015-07-08 苏州全维软件科技有限公司 User management method based on ORACLE database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012981A (en) * 2010-11-16 2011-04-13 传神联合(北京)信息技术有限公司 Distributing and matching method and system of general permission grade
CN102201935A (en) * 2011-05-13 2011-09-28 大唐移动通信设备有限公司 Access control method and device based on VIEW
CN102799645A (en) * 2012-06-28 2012-11-28 用友软件股份有限公司 Security search device and method
CN104766023A (en) * 2015-02-02 2015-07-08 苏州全维软件科技有限公司 User management method based on ORACLE database

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107832462A (en) * 2017-11-28 2018-03-23 北京恒华伟业科技股份有限公司 A kind of data request method and device
CN108920974A (en) * 2018-05-23 2018-11-30 华迪计算机集团有限公司 A kind of application authorization search method and system for supporting multi-layer
CN111339560A (en) * 2020-02-26 2020-06-26 中国邮政储蓄银行股份有限公司 Data isolation method, device and system

Similar Documents

Publication Publication Date Title
US10257187B2 (en) Prompting login account
US9218481B2 (en) Managing password strength
CN109977690A (en) A kind of data processing method, device and medium
CN105279435B (en) Webpage leak detection method and device
CN105095970B (en) The execution method and system of third-party application
CN106575327A (en) Analyzing facial recognition data and social network data for user authentication
CA3062580A1 (en) An enterprise group establishing method and computer device in an instant messaging system
US10891357B2 (en) Managing the display of hidden proprietary software code to authorized licensed users
CN104753909B (en) Method for authenticating after information updating, Apparatus and system
US12038984B2 (en) Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index
CN110399748A (en) A kind of screenshot method and device based on image recognition
US11277448B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US20190197457A1 (en) Assigning tickets to agents based on relevant skills in a customer-support ticketing system
Kshetri et al. Big data and cloud computing for development: Lessons from key industries and economies in the global south
CN104615662B (en) A kind of method, apparatus and terminal device handling data
CN107229644A (en) Searching method and device
CN110069911A (en) Access control method, device, system, electronic equipment and readable storage medium
CN105939370A (en) Method and device for updating URL library
CN110247857A (en) Current-limiting method and device
CN106257520A (en) Resolve answer method and system
CN109829821A (en) A kind of abnormal processing method of digital asset address transfer, apparatus and system
US20220391122A1 (en) Data processing systems and methods for using a data model to select a target data asset in a data migration
CN104318309B (en) All-purpose card based on mobile terminal realizes system and method
CN106888200A (en) Mark correlating method, method for sending information and device
US11416109B2 (en) Automated data processing systems and methods for automatically processing data subject access requests using a chatbot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003