CN110688676B - User information visibility control method, device, equipment and storage medium - Google Patents

User information visibility control method, device, equipment and storage medium Download PDF

Info

Publication number
CN110688676B
CN110688676B CN201910924655.0A CN201910924655A CN110688676B CN 110688676 B CN110688676 B CN 110688676B CN 201910924655 A CN201910924655 A CN 201910924655A CN 110688676 B CN110688676 B CN 110688676B
Authority
CN
China
Prior art keywords
preset
level
user
visibility
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910924655.0A
Other languages
Chinese (zh)
Other versions
CN110688676A (en
Inventor
罗振兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN201910924655.0A priority Critical patent/CN110688676B/en
Publication of CN110688676A publication Critical patent/CN110688676A/en
Application granted granted Critical
Publication of CN110688676B publication Critical patent/CN110688676B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure provides a user information visibility control method, apparatus, device and storage medium, the method comprising: setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels; responding to a user information viewing request of a first user to a second user, which is sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts; determining second user information viewable by the first user according to the visibility of the preset user information of the first level, the second level and the second level to the first level; and feeding back the second user information to the client. According to the technical scheme of the embodiment of the disclosure, fine-grained management of staff information visibility by enterprises can be realized.

Description

User information visibility control method, device, equipment and storage medium
Technical Field
The embodiments of the present disclosure relate to computer software technologies, and in particular, to a method, an apparatus, a device, and a storage medium for controlling visibility of user information.
Background
SaaS (Software-as-a-Service) products build all network infrastructures, Software and hardware operation platforms required by informatization for enterprises.
The address book module of the SaaS product is used for meeting the functions that people in the same tenant can see each other and initiate communication, in an enterprise, the visibility of the people has a control requirement, and people in some sensitive departments need to hide some information, such as mobile phone numbers, for other department people. At present, products on the market can specify a part of people to hide specified information from all other people, but the configuration mode of information visibility is difficult to satisfy the management of the information visibility of people among different departments, different sequences or different subsidiaries by a large enterprise.
Disclosure of Invention
The disclosure provides a user information visibility control method, device, equipment and storage medium, so as to manage employee information visibility of users of different levels.
In a first aspect, an embodiment of the present disclosure provides a method for controlling user information visibility, including:
setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels;
responding to a user information viewing request of a first user to a second user, which is sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
determining second user information viewable by the first user according to the visibility of the preset user information of the first level, the second level and the second level to the first level;
and feeding back the second user information to the client.
In a second aspect, an embodiment of the present disclosure further provides an apparatus for controlling visibility of user information, where the apparatus includes:
the information visibility setting module is used for setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels;
the user level determining module is used for responding to a user information viewing request of a first user to a second user sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
a viewable information determining module, configured to determine, according to visibility of the preset user information of the first level, the second level, and the second level to the first level, second user information viewable by the first user;
and the information feedback module is used for feeding back the second user information to the client.
In a third aspect, an embodiment of the present disclosure further provides an apparatus, where the apparatus includes:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a user information visibility control method as provided by any embodiment of the disclosure.
In a fourth aspect, embodiments of the present disclosure also provide a storage medium containing computer-executable instructions for performing a user information visibility control method as provided by any of the embodiments of the present disclosure when executed by a computer processor.
According to the embodiment of the disclosure, the information feasibility is set for each preset level through the level height relation of the preset levels, corresponding user information is provided for the user, the problem that the user information hiding mode is single is solved, and the effect of fine-grained management of enterprise on staff information visibility is realized.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Fig. 1 is a flowchart of a user information visibility control method according to a first embodiment of the present invention;
fig. 2A is a flowchart of a user information visibility control method according to a second embodiment of the present invention;
fig. 2B is a schematic diagram of a software interface for creating a preset level tag according to a second embodiment of the present invention;
fig. 2C is a schematic diagram of a software interface for editing tag information according to a second embodiment of the present invention;
FIG. 2D is a software interface diagram of an information visibility setting according to a second embodiment of the present invention;
FIG. 2E is a schematic diagram of a software interface for displaying user information according to a second embodiment of the present invention;
FIG. 2F is a diagram of another software interface for displaying user information according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a user information visibility control apparatus according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus in the fourth embodiment of the present invention.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
In the following embodiments, optional features and examples are provided in each embodiment, and various features described in the embodiments may be combined to form a plurality of alternatives, and each numbered embodiment should not be regarded as only one technical solution.
Example one
Fig. 1 is a flowchart of a user information visibility control method according to an embodiment of the present disclosure, where the present embodiment is applicable to a case where an enterprise manages availability of person information, and the method may be implemented by a user information visibility control apparatus, which may be implemented by hardware and/or software, and is generally integrated in a device having an information visibility control function, where the device may be a server. As shown in fig. 1, the method specifically includes:
step 110, setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels;
the user in one tenant is usually configured with at least two preset levels, and the user account can be divided under the corresponding preset levels in a manner of configuring a level tag for the user account. The preset levels are set according to the needs of tenants and have a level height relationship. For example, a president level, a manager level, and an employee level may be set, with the levels decreasing from the president level to the employee level. For the management of the employee information in the enterprise, generally, a high-level user in a preset level can check all the preset user information of a low-level user, the low-level user can check part of the preset user information of the high-level user, and a user in the same level can check part or all the preset user information of the other side. The preset user information is generally information items predetermined according to enterprise management needs, such as names, calendars, mailboxes, mobile phones, landline telephones, affiliated departments, positions, directly affiliated superior levels, cities, job numbers and the like.
Step 120, responding to a user information viewing request of a first user to a second user sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set;
the user information viewing request comprises an account number of the first user and an account number used for the second user. The user account level set comprises at least two preset levels and corresponding user accounts, a first level of a first user is determined by searching for a user account matched with the account of the first user in the user account level set, and a second level of a second user is determined by searching for a user account matched with the account of the second user in the user account level set. Optionally, before setting the visibility of the preset user information of each preset level to all preset levels according to the relationship between the levels of at least two preset levels, the method further includes: acquiring at least two preset levels and a user account; and binding the user account under the corresponding preset level to generate a user account level set. All the preset level tags are arranged in the user account level set, and a corresponding user account is bound under each preset level tag. The user account binding option of each tag can be clicked on the tag list page, so that the user account binding page can be entered, and the current tag is bound to user accounts of personnel in some tenants. Bulk additions may also be enabled through the organizational framework. For example, the user accounts except for the manager positions under a certain department are added to the employee-level tags, so that the efficiency of binding the user accounts at the preset level is improved, and the operation of an administrator is reduced.
Step 130, determining second user information which can be viewed by the first user according to the visibility of the first level of the preset user information of the first level, the second level and the second level;
after the preset levels of the first user and the second user are determined, the visibility of the preset user information of the second level to the first level is determined according to the visibility of the preset user information of each preset level to all the preset levels, and then the second user information which can be checked by the first user is determined to which preset items of all the preset user information of the second user.
And step 140, feeding back the second user information to the client.
And feeding back the second user information to the client so that the client can display the second user information to the first user.
According to the technical scheme, the information feasibility is set for each preset level through the level height relation of the preset level, corresponding user information is provided for the user, the problem that the user information hiding mode is single is solved, and the effect of fine-grained management of staff information visibility by enterprises is achieved.
Example two
Fig. 2A is a flowchart of a user information visibility control method according to a second embodiment of the present disclosure. The present embodiment is embodied on the basis of various alternatives in the foregoing embodiment, and as shown in fig. 2A, the method specifically includes:
step 210, setting whether to start visibility protection of preset user information of a preset level on at least part of the preset level;
in the enterprise, it is necessary for the personnel at different levels to set the preset user information to perform visibility protection of the preset user information at preset levels according to the preset levels where the personnel are located. For example, a person in a high level has a right to view all the preset user information of the person in a lower level than the person in the high level. For the persons at the same level, preset items in the preset user information can be mutually checked, and the preset items can be all the preset user information or part of the preset user information. For persons lower than the preset level of the person, preset items in the preset user information of the person can be checked, and the preset items are part of the preset user information.
Step 220, if the visibility protection of the preset user information of the preset level to at least one preset level is started, setting a preset item for starting the visibility protection in the preset user information;
if preset user information visibility protection for at least one preset level is started at a certain preset level, which preset items can be viewed by which preset levels and which preset items cannot be viewed by which preset levels need to be set. Optionally, the preset item for opening visibility protection is set according to configuration operation of the administrator client on the preset item. The visibility of the preset items in the preset user information of one preset level to all the preset levels can be configured by an administrator, and of course, the visibility can also be set by default by the system. And the administrator can add preset items or reduce preset items which are already set according to the needs of enterprise management. As shown in fig. 2B, the administrator can create a preset level tab to fulfill the need for information protection by setting visibility between different tabs. If the opening information protection is selected, only the preset items in the preset user information of the preset level can be viewed by the users of the same level or the low level, and if the closing information protection is selected, all the preset items in the preset user information of the preset level can be viewed by the users of the same level or the low level. For example, as shown in fig. 2C, the visibility management page at "president level" can see several kinds of information including a tag name, a tag description, whether to turn on information protection, and a visible range. Label name: presetting the name of a level label; description of the label: presetting description words of the grade labels; whether to start information protection: whether the switch for information protection is turned on or not is judged, if the switch is turned off, all the preset user information of the personnel under the preset level label is disclosed to all the personnel in the tenant, and if the switch is turned on, the visibility of the personnel of the preset level label to at least part of the preset user information of the preset level label can be set. As in fig. 2C, the visible range: the method is characterized in that the preset level personnel open 'address book visibility' for the preset level personnel, all existing preset level labels of 'employee level', 'manager level', 'chief deputy level' and 'president level' can be selected, and the 'president level' is supposed to only select the 'president level' and the 'chief deputy level', namely, the 'president level' personnel can only be seen by the 'president level' and the 'chief deputy level' personnel in the address book personal name cards, and other staff level personnel can only see head images and cannot open the name card pages and cannot see any information even if the other staff level personnel are in the same group with the president level and the 'chief deputy level' personnel. For the checked job level, a personal information protection option can be set independently to hide some information. As shown in fig. 2D, the "president level" person protects "calendar", "mobile phone", "directly subordinate higher level", "job number", "city", and "job level" against the "president level" person, that is, any president level person hides the above information such as mobile phone number from the president level person, but discloses "mailbox", "landline phone", "affiliated department", and "job position". On the basis of the above technical solution, the user information visibility control method provided by the embodiment of the present disclosure further includes: and according to the visibility limit canceling operation of the administrator client, canceling the visibility limit of the preset user information of each preset level on all the preset levels. That is, the protection of the preset user information of a certain preset level from all the preset levels can be turned off, so that the preset user information of the preset level is visible to all the preset levels.
For example, as shown in fig. 2E, for a user who requests to view information, what is visible to wang XX is a "mailbox" for preset user information; as shown in fig. 2F, horse XX is the preset user information that is visible to the user who requests to view the information, such as "department", "mailbox", "city", and "directly superior".
Step 230, in response to a user information viewing request of a first user to a second user sent by a client, determining a first level of the first user and a second level of the second user according to a user account level set;
step 240, determining second user information viewable by the first user according to the visibility of the first level of the preset user information of the first level, the second level and the second level;
and step 250, feeding back the second user information to the client.
According to the technical scheme, the visibility of the preset user information of each preset level to other preset levels can be flexibly controlled, and the granularity of staff information visibility management of enterprises is refined.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a user information visibility control apparatus provided in a third embodiment of the present disclosure, and as shown in fig. 3, the apparatus specifically includes:
the information visibility setting module 310 is configured to set visibility of preset user information at each preset level to all preset levels according to a height relationship between at least two preset levels;
the user level determining module 320 is configured to determine, according to the user account level set, a first level of the first user and a second level of the second user in response to a user information viewing request of the first user to the second user, where the user information viewing request is sent by the client; the user account level set comprises at least two preset levels and corresponding user accounts;
the viewable information determining module 330 is configured to determine, according to the visibility of the first level of the preset user information at the first level, the second level, and the second level, second user information viewable by the first user;
and the information feedback module 340 is configured to feed back the second user information to the client.
According to the technical scheme, the information feasibility is set for each preset level through the level height relation of the preset level, corresponding user information is provided for the user, the problem that the user information hiding mode is single is solved, and the effect of fine-grained management of staff information visibility by enterprises is achieved.
Optionally, the user information visibility control apparatus further includes:
the system comprises a preset level and user account acquisition module, a display module and a display module, wherein the preset level and user account acquisition module is used for acquiring at least two preset levels and user accounts before the visibility of preset user information of each preset level to all the preset levels is set according to the height relation of the at least two preset levels;
and the user account level set generation module is used for binding the user accounts at the corresponding preset levels to generate a user account level set.
Optionally, the information visibility setting module includes:
the visibility protection starting unit is used for setting whether to start the visibility protection of preset user information at a preset level on at least part of the preset level;
and the preset item setting unit is used for setting a preset item for starting visibility protection in the preset user information if the preset user information of the preset level starts the visibility protection of at least one preset level.
Optionally, the preset item setting unit is specifically configured to:
and setting a preset item for opening the visibility protection according to the configuration operation of the administrator client on the preset item.
Optionally, the user information visibility control apparatus further includes:
and the visibility limit removing module is used for removing the visibility limit of the preset user information of each preset level to all the preset levels according to the visibility limit removing operation of the administrator client.
Example four
Fig. 4 is a schematic structural diagram of an apparatus according to a fourth embodiment of the present disclosure. FIG. 4 illustrates a schematic diagram of a server 400 suitable for use in implementing embodiments of the present disclosure. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the electronic device 400 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage device 406 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the electronic apparatus 400 are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage devices 406 including, for example, magnetic tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the electronic device 400 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates an electronic device 400 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 409, or from the storage means 406, or from the ROM 402. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 401.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation on the unit itself, for example, the information visibility setting module may also be described as a "module that sets the visibility of preset user information of each preset level to all preset levels".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided a user information visibility control method including:
setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels;
responding to a user information viewing request of a first user to a second user, which is sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
determining second user information viewable by the first user according to the visibility of the preset user information of the first level, the second level and the second level to the first level;
and feeding back the second user information to the client.
Optionally, before the setting, according to the relationship between the levels of the at least two preset levels, the visibility of the preset user information of each preset level to all the preset levels, the method further includes:
acquiring at least two preset levels and the user account;
and binding the user account under the corresponding preset level to generate the user account level set.
Optionally, the setting, according to a height relationship between at least two preset levels, visibility of preset user information of each preset level to all the preset levels includes:
setting whether to start visibility protection of the preset user information of the preset level on at least part of the preset level;
and if the visibility protection of the preset user information at the preset level to at least one preset level is started, setting a preset item for starting the visibility protection in the preset user information.
Optionally, if the visibility protection of the preset user information at the preset level to at least one preset level is started, setting a preset item for starting the visibility protection in the preset user information, including:
and setting the preset item for opening the visibility protection according to the configuration operation of the administrator client on the preset item.
Optionally, the user information visibility control method further includes:
and according to the visibility limit canceling operation of the administrator client, canceling the visibility limit of the preset user information of each preset level on all the preset levels.
According to one or more embodiments of the present disclosure, there is provided a user information visibility control apparatus including:
the information visibility setting module is used for setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels;
the user level determining module is used for responding to a user information viewing request of a first user to a second user sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
a viewable information determining module, configured to determine, according to visibility of the preset user information of the first level, the second level, and the second level to the first level, second user information viewable by the first user;
and the information feedback module is used for feeding back the second user information to the client.
Optionally, the user information visibility control apparatus further includes:
the system comprises a preset level and user account acquisition module, a display module and a display module, wherein the preset level and user account acquisition module is used for acquiring at least two preset levels and user accounts before the visibility of preset user information of each preset level to all the preset levels is set according to the height relation of the at least two preset levels;
and the user account level set generation module is used for binding the user accounts at the corresponding preset levels to generate a user account level set.
Optionally, the information visibility setting module includes:
a visibility protection enabling unit, configured to set whether to enable visibility protection of at least a part of the preset level by the preset user information at the preset level;
and the preset item setting unit is used for setting a preset item for starting visibility protection in the preset user information if the preset user information at the preset level starts the visibility protection of at least one preset level.
Optionally, the preset item setting unit is specifically configured to:
and setting the preset item for opening the visibility protection according to the configuration operation of the administrator client on the preset item.
Optionally, the user information visibility control apparatus further includes:
and the visibility limit removing module is used for removing the visibility limit of the preset user information of each preset level to all the preset levels according to the visibility limit removing operation of the administrator client.
In accordance with one or more embodiments of the present disclosure, there is provided an apparatus comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a user information visibility control method as provided by any of the embodiments of the present disclosure.
According to one or more embodiments of the present disclosure, there is provided a storage medium containing computer-executable instructions for performing a user information visibility control method as provided by any of the embodiments of the present disclosure when executed by a computer processor.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (8)

1. A method for controlling visibility of user information, comprising:
setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels; the preset user information is an information item predetermined according to enterprise management needs;
responding to a user information viewing request of a first user to a second user, which is sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
determining second user information viewable by the first user according to the visibility of the preset user information of the first level, the second level and the second level to the first level;
feeding back the second user information to the client;
the setting of the visibility of the preset user information of each preset level to all the preset levels according to the height relationship of at least two preset levels includes:
setting whether to start visibility protection of the preset user information of the preset level on at least part of the preset level;
if the visibility protection of the preset user information of the preset level to at least one preset level is started, setting a preset item for starting the visibility protection in the preset user information;
the setting of the preset item for starting visibility protection in the preset user information includes: and respectively setting the information visibility of the preset items for starting visibility protection to at least part of preset users at preset levels, wherein different preset levels correspond to different visible preset user information.
2. The method according to claim 1, wherein before the setting of the visibility of the preset user information of each preset level to all the preset levels according to the relationship between the levels of the at least two preset levels, the method further comprises:
acquiring at least two preset levels and the user account;
and binding the user account under the corresponding preset level to generate the user account level set.
3. The method according to claim 1, wherein if the preset user information at the preset level is started to perform visibility protection on at least one preset level, setting a preset item for starting visibility protection in the preset user information, includes:
and setting the preset item for opening the visibility protection according to the configuration operation of the administrator client on the preset item.
4. The user information visibility control method according to claim 1, further comprising:
and according to the visibility limit canceling operation of the administrator client, canceling the visibility limit of the preset user information of each preset level on all the preset levels.
5. A user information visibility control apparatus, comprising:
the information visibility setting module is used for setting the visibility of the preset user information of each preset level to all the preset levels according to the height relation of at least two preset levels; the preset user information is an information item predetermined according to enterprise management needs;
the user level determining module is used for responding to a user information viewing request of a first user to a second user sent by a client, and determining a first level of the first user and a second level of the second user according to a user account level set; the user account level set comprises at least two preset levels and corresponding user accounts;
a viewable information determining module, configured to determine, according to visibility of the preset user information of the first level, the second level, and the second level to the first level, second user information viewable by the first user;
the information feedback module is used for feeding back the second user information to the client;
the information visibility setting module includes:
a visibility protection enabling unit, configured to set whether to enable visibility protection of at least a part of the preset level by the preset user information at the preset level;
a preset item setting unit, configured to set a preset item for starting visibility protection in the preset user information if the visibility protection of the preset user information at the preset level to at least one preset level is started;
the setting of the preset item for starting visibility protection in the preset user information includes: and respectively setting the information visibility of the preset items for starting visibility protection to at least part of preset users at preset levels, wherein different preset levels correspond to different visible preset user information.
6. The apparatus according to claim 5, wherein the preset item setting unit is specifically configured to:
and setting the preset item for opening the visibility protection according to the configuration operation of the administrator client on the preset item.
7. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the user information visibility control method of any one of claims 1-4.
8. A storage medium containing computer-executable instructions for performing the user information visibility control method of any one of claims 1-4 when executed by a computer processor.
CN201910924655.0A 2019-09-27 2019-09-27 User information visibility control method, device, equipment and storage medium Active CN110688676B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910924655.0A CN110688676B (en) 2019-09-27 2019-09-27 User information visibility control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910924655.0A CN110688676B (en) 2019-09-27 2019-09-27 User information visibility control method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110688676A CN110688676A (en) 2020-01-14
CN110688676B true CN110688676B (en) 2021-11-16

Family

ID=69110682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910924655.0A Active CN110688676B (en) 2019-09-27 2019-09-27 User information visibility control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110688676B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150347A (en) * 2022-07-12 2022-10-04 中国银行股份有限公司 Method, device, equipment and storage medium for differentially displaying chat group messages

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2977476B2 (en) * 1995-11-29 1999-11-15 株式会社日立製作所 Security method
JP3680034B2 (en) * 2002-03-20 2005-08-10 株式会社東芝 Information processing apparatus and user switching method used in the same apparatus
CN102722666A (en) * 2012-05-23 2012-10-10 上海蔓草网络科技有限公司 Hierarchical user privacy information display system and method
CN105871577A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Method and device for managing resource privilege
CN106056365A (en) * 2016-07-07 2016-10-26 珠海佳米科技有限公司 Enterprise address book visibility authority control method and apparatus
CN107392053A (en) * 2017-08-11 2017-11-24 四川长虹电器股份有限公司 A kind of data permission control method in enterprise staff information database
US10579814B2 (en) * 2017-10-30 2020-03-03 International Business Machines Corporation Monitoring and preventing unauthorized data access
CN108009422B (en) * 2017-11-09 2020-05-22 华南理工大学 Multi-domain division method and system based on multi-level user grouping management
CN108629166A (en) * 2018-04-27 2018-10-09 华中科技大学 A kind of user right various dimensions multiple management method of information system
CN109656884A (en) * 2018-12-14 2019-04-19 郑州云海信息技术有限公司 A kind of method and device accessing file

Also Published As

Publication number Publication date
CN110688676A (en) 2020-01-14

Similar Documents

Publication Publication Date Title
US10701019B2 (en) Message queue manager
US10931783B2 (en) Targeted profile picture selection
US20180047038A1 (en) Leveraging hashtags to dynamically scope a target audience for a social network message
US20180293550A1 (en) Cognitive enhancement to meeting scheduling
US10678413B2 (en) Application for auto deletion of images
US11646020B2 (en) Communication notification management
US11288637B2 (en) Systems and methods for analytics integration into electronic applications
US20180025325A1 (en) Electronic calendar scheduling incorporating location availability of invitee(s)
US10755717B2 (en) Providing reminders based on voice recognition
US10664328B2 (en) Calendar entry creation by interaction with map application
CN110688676B (en) User information visibility control method, device, equipment and storage medium
US20180091460A1 (en) Augmenting location of social media posts based on proximity of other posts
US11146515B2 (en) Visitor invitation management
US10084737B2 (en) Scheduling events
US10171412B2 (en) Email quota management system
US20200099636A1 (en) Delayed condition-based email delivery
US20230069102A1 (en) Enhanced caller identification
US11188396B2 (en) Pending notification deletion through autonomous removal triggering
CN115016878A (en) Information processing method and device and electronic equipment
US9916861B2 (en) Editing media on a mobile device before transmission
US20170041262A1 (en) Prioritizing and handling of messages across multiple communication systems
US10205768B2 (en) Facility for initiating automatic exchange of file(s) between mobile devices
US20130060865A1 (en) Synchronization operation based on a filter tag
CN116342084A (en) Information processing method, device, electronic equipment and computer readable medium
CN114169969A (en) House resource bargaining method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant