CN114218562A - Information processing method based on user authority - Google Patents

Information processing method based on user authority Download PDF

Info

Publication number
CN114218562A
CN114218562A CN202111575714.1A CN202111575714A CN114218562A CN 114218562 A CN114218562 A CN 114218562A CN 202111575714 A CN202111575714 A CN 202111575714A CN 114218562 A CN114218562 A CN 114218562A
Authority
CN
China
Prior art keywords
information
school
user
authority
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111575714.1A
Other languages
Chinese (zh)
Inventor
余澜
陈天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yundie Zhixue Technology Co ltd
Original Assignee
Beijing Yundie Zhixue Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yundie Zhixue Technology Co ltd filed Critical Beijing Yundie Zhixue Technology Co ltd
Priority to CN202111575714.1A priority Critical patent/CN114218562A/en
Publication of CN114218562A publication Critical patent/CN114218562A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention relates to an information processing method based on user permission, which comprises the following steps: acquiring login information of a first user, and verifying the login information; when the verification is passed, acquiring a current user account authority information list, matching in the user account authority information list according to first user identification information, and marking the user data record as a first record if the user data record with a user identification field matched with the first user identification information exists; the user data record comprises a user identification field and a permission field; the permission field comprises a first permission field, a second permission field and a third permission field; extracting the authority field of the first record, acquiring a mapping relation between a pre-established data management list and the authority field, and configuring corresponding data management authority for the first user according to the authority field; and acquiring an information processing instruction sent by the first user based on different data management authorities, and performing corresponding information processing according to the information processing instruction.

Description

Information processing method based on user authority
Technical Field
The invention relates to the technical field of data processing, in particular to an information processing method based on user permission.
Background
The wide application of novel information technologies such as big data, artificial intelligence, cloud computing, internet of things, mobile internet in education work has greatly improved education worker's work efficiency, but along with the high-speed development of education informationization, the network security problem arouses people's attention more and more, especially in many application systems, how to guarantee the security of huge data information is the problem that needs to solve at present.
Disclosure of Invention
The invention aims to provide an information processing method based on user authority, which carries out authority verification on users logging in a system through a user account authority information list, configures corresponding data management authority for the users according to different authority fields, carries out corresponding information processing according to different data management authorities and ensures the safety of data management to a certain extent.
In order to achieve the above object, the present invention provides an information processing method based on user rights, the information processing method comprising:
acquiring login information of a first user, and verifying the login information; the login information comprises first user identification information;
when the verification is passed, acquiring a current user account authority information list, matching in the user account authority information list according to the first user identification information, and if a user data record with a user identification field matched with the first user identification information exists, marking the user data record as a first record; the user account permission information list comprises a plurality of user data records; the user data record comprises a user identification field and a permission field; the permission field comprises a first permission field, a second permission field and a third permission field;
extracting the authority field of the first record, acquiring a mapping relation between a pre-established data management list and the authority field, and configuring corresponding data management authority for the first user according to the authority field;
and acquiring an information processing instruction sent by the first user based on different data management authorities, and performing corresponding information processing according to the information processing instruction.
Preferably, the data management list includes: school information management, account information management, school data management and group information management; configuring corresponding data management authority for the first user according to the authority field, which specifically comprises:
when the permission field is a first permission field, configuring the school information management permission, account information management, school data management and group information management for the first user; and when the permission field is a second permission field or a third permission field, configuring the school information management permission for the first user.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
when the permission field is a first permission field, acquiring a first school creation instruction input by a first user;
acquiring a school information creation parameter list according to the first school creation instruction;
acquiring information input by a first user based on the school information creation parameter list, generating first school basic data, and sending verification;
and when the verification is passed, extracting key item information of the first school from the first school basic data to generate a school information list.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
when the permission field is a first permission field or a second permission field, acquiring a second school modification instruction input by the first user;
extracting a second school ID from the school information list according to the second school modification instruction;
acquiring a second school information parameter list according to the second school ID;
and receiving modification information input by the first user based on the second school information parameter list, and updating second school basic data.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
when the permission field is a first permission field, a second permission field or a third permission field, acquiring a third school viewing instruction input by the first user; the third school viewing instruction comprises a third school name and a third school zone;
and searching key item information of a third school from the school information list according to the third school name and a third school area.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
acquiring teaching data information of each school;
analyzing the teaching data information to generate teaching condition information of each school; the teaching condition information comprises school condition information and/or learning condition information and/or teaching condition information.
Further preferably, the analyzing the teaching data information to generate teaching condition information of each school includes:
according to the school ID, counting school situation information of each school from the teaching data information; the school situation information comprises teacher quantity information, student quantity information, course quantity information and resource quantity information;
and/or the presence of a gas in the gas,
extracting the stage teaching information of each class of each school from the teaching data information;
analyzing and processing the periodic teaching information according to a preset periodic assessment principle,
generating learning situation information of each class of each school; the learning situation information comprises attendance information, class situation information and examination situation information;
and/or the presence of a gas in the gas,
extracting questionnaire survey information of each school from the teaching data information;
generating the teaching information of each school according to the questionnaire survey information; the teaching information comprises classroom feedback information, teaching method flexibility information and operation correction information.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
acquiring a permission upgrading request sent by a second user; the permission upgrading request comprises second user identification information;
according to the second user identification information, extracting school condition data of a fourth school corresponding to the second user identification information from the school condition information of each school;
processing the school condition data of the fourth school according to a preset algorithm to generate school condition analysis data of the fourth school; the school sentiment analysis data comprises a teacher-student ratio and/or a teacher-course ratio;
and when the teacher-student ratio or the teacher-course ratio is not less than the corresponding preset ratio, updating the permission field corresponding to the second user identification information, and updating the user account permission information list.
Further preferably, the acquiring an information processing instruction sent by the first user based on different data management permissions, and performing corresponding information processing according to the information processing instruction specifically includes:
acquiring a group information creating or modifying instruction;
acquiring a basic information item list and a propaganda information item list of a group according to the group information creating instruction;
and receiving information input by a user based on the basic information list and the propaganda information list, and creating or modifying the group information.
Preferably, before the login information of the first user is acquired, the information processing method further includes:
acquiring first user identity information; the first user identity information comprises first user real name information and first user role information;
acquiring a preset role authority mapping relation, matching in the role authority mapping relation according to the first user role information, and searching an authority field corresponding to the first user role information according to the first user role information if matching is successful;
and creating the user account authority information list according to the first user identification information, the first user real name information and the authority field.
According to the information processing method based on the user authority, provided by the embodiment of the invention, the authority of the user logging in the system is verified through the user account authority information list, the corresponding data management authority is configured for the user according to different authority fields, and the corresponding information processing is carried out according to different data management authorities, so that the safety of data management is ensured to a certain extent.
Drawings
Fig. 1 is a flowchart of an information processing method based on user rights according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
The information processing method based on the user authority provided by the embodiment of the invention is applied to a background management system of an education group, can realize different data management according to different authorities of users, and ensures the safety of data to a certain extent.
Fig. 1 is a flowchart of an information processing method based on user rights according to an embodiment of the present invention, and a technical solution of the present invention is described with reference to fig. 1 as a specific embodiment.
The information processing method based on the user authority provided by the embodiment of the invention specifically comprises the following steps:
step 110, obtaining login information of a first user, and verifying the login information;
in particular, the first user may be understood as a user that has been registered in the background management system and has been stored in a preset user information base. The system can be specifically a contact person and a responsible person of a school, and can also be an administrator of a background management system. The login information includes first user identification information and first user password information. When the login information of the first user is obtained, matching can be performed in a preset user information base according to the first user identification information and the first user password information, when the verification is passed, step 120 is executed, and when the verification is not passed, verification failure information and new user registration list information are returned to the first user.
Before step 110 is executed, firstly, a user account authority information list is created, and the specific steps are as follows:
step 101, acquiring first user identity information;
specifically, in order to ensure the data security of each school and facilitate the group management layer to find out the contact or the responsible person of each school through the background management system, the system can confirm and screen the identity of the registered user. The first user identity information comprises first user real name information and first user role information. The first user role information may specifically include a headquarter and school leader, a branch school leader, a headquarter and school contact, a branch school leader contact, and a system administrator.
In an optional scheme, the first user identity information further comprises first user facial image information and first user contact information.
102, acquiring a preset role authority mapping relation, matching in the role authority mapping relation according to first user role information, and searching an authority field corresponding to the first user role information according to the first user role information if matching is successful;
specifically, the permission fields include a first permission field, a second permission field and a third permission field, wherein the permission corresponding to the first permission field is highest and is sequentially reduced. The authority corresponding to the first authority field can be understood as the authority of a system administrator. The right corresponding to the second right field can be understood as the right of a common administrator with privilege. The authority corresponding to the third authority field can be understood as having the authority of a common administrator.
Typically, different user role type information has different data access rights. For example, the authority field corresponding to the headquarter principal is the second authority field. And the headquarter school contact and the branch school contact only have the authority of a common administrator.
And 103, creating a user account authority information list according to the first user identification information, the first user real name information and the authority field.
It should be noted that the role-authority mapping relationship is established when the user registers, and since the role is related to the position of the school, that is, the role type information cannot be changed, when the authority needs to be adjusted subsequently, for example, the authority is upgraded, the role-authority mapping relationship can be performed only for the user identification information, that is, the user account, because the user identification information is the unique identifier of the user in the system.
For example, when the user registers, the authority corresponding to the headquarters party contact is the third authority. When a certain condition is needed or met and the authority is upgraded to the second authority, the role of the user is still a headquarter contact, which is an objective fact, so how to associate the user with the authority, the invention associates the user with the authority by establishing a user account authority information list.
Step 120, when the verification is passed, acquiring a current user account authority information list, matching in the user account authority information list according to the first user identification information, and if a user data record with a user identification field matched with the first user identification information exists, marking the user data record as a first record;
specifically, the user account authority information list is established in advance and is updated in real time. The user account permission information list comprises a plurality of user data records. The user data record includes a user identification field and a permission field. The permission field includes a first permission field, a second permission field, and a third permission field.
In a preferred scheme, the user account permission information list may further include user real name information, a permission field, contact information, permission status information, and the like. Wherein the permission status information may include enable or disable.
Step 130, extracting the authority field of the first record, acquiring a mapping relation between a pre-established data management list and the authority field, and configuring corresponding data management authority for the first user according to the authority field;
specifically, the data management list includes: school information management, account information management, school data management and group information management.
More specifically, when the permission field is the first permission field, configuring all management permissions in the data management list for the first user; and when the permission field is the second permission field or the third permission field, configuring the school information management permission in the data management list for the first user. The first user of the second permission field can modify or check the information in the school information management item, and the first user of the third permission field can only check the information in the school information management item, so that the safety of each item of data in the system is ensured.
Step 140, acquiring an information processing instruction sent by the first user based on different data management authorities, and performing corresponding information processing according to the information processing instruction.
In particular, the method comprises the following steps of,
when the permission field is a first permission field, acquiring a first school creation instruction input by a first user;
acquiring a school information creation parameter list according to a first school creation instruction;
the school information creation parameter list specifically includes: the system comprises a school full name, a school short name, contact person information, region information and propaganda information. The publicity information may specifically include school official website address, Facebook homepage, Twitter homepage, microblog homepage, wechat public number two-dimensional code information, tremble public number two-dimensional code information, and the like. In a preferred embodiment, the school information creation parameter list further includes a school badge and detailed address information of a school.
Acquiring information input by a first user based on a school information creation parameter list, generating first school basic data, and sending verification;
the first school basic data may include all parameters in the school information creation parameter list, or may be part of the parameters, but the first school basic data must be the necessary information in the above list. The process of auditing is to verify the format and content of the first school base data. For example, whether the official website address is correct, whether the picture format of school badge meets the requirements, and the like.
When the verification is passed, extracting key item information of the first school from the first school basic data to generate a school information list;
the first school is only used for clearly describing the technical scheme and has no specific meaning. The first school may refer to one school or a plurality of schools. The key item information may specifically include: school name, school location, school website, etc. It is understood that the school information list includes key item information and school IDs of a plurality of schools.
Further, when the permission field is the first permission field or the second permission field, a second school modification instruction input by the first user is obtained;
extracting a second school ID from the school information list according to the second school modification instruction;
acquiring a second school information parameter list according to the second school ID;
and receiving modification information input by the first user based on the second school information parameter list, and updating the second school basic data.
Further, when the permission field is the first permission field, the second permission field or the third permission field, a third school viewing instruction input by the first user is obtained; the third school viewing instruction comprises a third school name and a third school zone;
the third school name may be a school full name, a school short name or keyword information in the school name, and may be Chinese characters, English characters or pinyin.
And searching key item information of the third school from the school information list according to the third school name and the third school area.
Further, when the authority field is the first authority field, obtaining teaching data information of each school;
the teaching data information may be understood as a set of various data information periodically reported to the group by each school, and may include, for example, school teacher information, school supporting resource information, school teaching progress analysis information, and the like.
And analyzing the teaching data information to generate teaching condition information of each school. Wherein, the teaching condition information comprises school condition information and/or learning condition information and/or teaching condition information.
In a further particular embodiment, the first and second coating layers are,
and according to the school ID, counting the school situation information of each school from the teaching data information.
Specifically, a key item list and a school ID are searched according to preset school conditions, and relevant information is extracted from the school teacher resource information and the school matching resource information. The school situation information comprises teacher quantity information, student quantity information, course quantity information and resource information. The resources can refer to hardware facility conditions of the school, and can also refer to software conditions such as a platform set up by the school for teaching work.
The invention can also extract the stage teaching information of each class of each school from the teaching data information. And analyzing and processing the stage teaching information according to a preset stage assessment principle. Generating learning situation information of each class of each school; the learning situation information comprises attendance information, class situation information and examination situation information.
The invention can also extract questionnaire survey information of each school from the teaching data information. And generating the teaching information of each school according to the questionnaire survey information. The teaching information comprises classroom feedback information, teaching method flexibility information and operation correction information.
Through comprehensive understanding of school situation information, learning situation information and teaching situation information, group managers can objectively evaluate schools, and therefore correct decisions can be made.
In order to ensure real-time update of school information and timely and orderly promotion of various group works and simultaneously improve the flexibility of configuration of user permissions and the safety of system data, the user permissions are specifically upgraded by the following steps:
step S1, when the authority field is the first authority field, acquiring the authority upgrading request sent by the second user;
and the permission upgrading request comprises second user identification information.
Step S2, extracting school condition data of a fourth school corresponding to the second user identification information from the school condition information of each school according to the second user identification information;
the school situation data may specifically include the number of teachers, the number of students, and the number of courses per session.
Step S3, processing school condition data of a fourth school according to a preset algorithm to generate school condition analysis data of the fourth school;
wherein, the school sentiment analysis data comprises a teacher-student ratio and/or a teacher-course ratio.
And step S4, when the teacher-student ratio or the teacher-course ratio is not less than the corresponding preset ratio, updating the authority field corresponding to the second user identification information, and updating the user account authority information list.
In a specific example, in order to improve the teaching quality of online education, the preset teacher-student ratio is 1:10, and the preset teacher-course ratio is 1: 50. The number of students in the fourth school is 54, the number of teachers is 9, and the number of courses in each period is 540, so that the ratio of teachers to students in the fourth school is 1:6, and the ratio of teachers to courses is 1: 60. Therefore, although the teacher course ratio is smaller than the preset teacher course ratio, the teacher-student ratio is larger than the preset teacher-student ratio, and therefore the second user right corresponding to the fourth school can be upgraded.
Therefore, theoretical basis is provided for realizing dynamic management of user authority, and the method is beneficial to benign competition of various schools in a group.
Further, when the authority field is the first authority field, acquiring a group information creating or modifying instruction;
according to the group information creating instruction, acquiring a basic information item list and a propaganda information item list of a group; and receiving information input by a user based on the basic information list and the propaganda information list, and creating or modifying the group information. The group information may specifically include a group name, a region, a contact address, a group introduction, a qualification certificate, a portal domain name, a group operation platform domain name, and the like.
According to the information processing method based on the user authority, provided by the embodiment of the invention, the authority of the user logging in the system is verified through the user account authority information list, the corresponding data management authority is configured for the user according to different authority fields, and the corresponding information processing is carried out according to different data management authorities, so that the safety of data management is ensured to a certain extent.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM powertrain control method, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. An information processing method based on user authority, characterized in that the information processing method comprises:
acquiring login information of a first user, and verifying the login information; the login information comprises first user identification information;
when the verification is passed, acquiring a current user account authority information list, matching in the user account authority information list according to the first user identification information, and if a user data record with a user identification field matched with the first user identification information exists, marking the user data record as a first record; the user account permission information list comprises a plurality of user data records; the user data record comprises a user identification field and a permission field; the permission field comprises a first permission field, a second permission field and a third permission field;
extracting the authority field of the first record, acquiring a mapping relation between a pre-established data management list and the authority field, and configuring corresponding data management authority for the first user according to the authority field;
and acquiring an information processing instruction sent by the first user based on different data management authorities, and performing corresponding information processing according to the information processing instruction.
2. The information processing method according to claim 1, wherein the data management list includes: school information management, account information management, school data management and group information management; configuring corresponding data management authority for the first user according to the authority field, which specifically comprises:
when the authority field is a first authority field, configuring the school information management authority, the account information management authority, the school data management authority and the group information management authority for the first user; and when the permission field is a second permission field or a third permission field, configuring the school information management permission for the first user.
3. The information processing method according to claim 2, wherein the obtaining of the information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically include:
when the permission field is a first permission field, acquiring a first school creation instruction input by a first user;
acquiring a school information creation parameter list according to the first school creation instruction;
acquiring information input by a first user based on the school information creation parameter list, generating first school basic data, and sending verification;
and when the verification is passed, extracting key item information of the first school from the first school basic data to generate a school information list.
4. The information processing method according to claim 3, wherein the acquiring an information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically includes:
when the permission field is a first permission field or a second permission field, acquiring a second school modification instruction input by the first user;
extracting a second school ID from the school information list according to the second school modification instruction;
acquiring a second school information parameter list according to the second school ID;
and receiving modification information input by the first user based on the second school information parameter list, and updating second school basic data.
5. The information processing method according to claim 3, wherein the acquiring an information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically includes:
when the permission field is a first permission field, a second permission field or a third permission field, acquiring a third school viewing instruction input by the first user; the third school viewing instruction comprises a third school name and a third school zone;
and searching key item information of a third school from the school information list according to the third school name and a third school area.
6. The information processing method according to claim 2, wherein the obtaining of the information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically include:
acquiring teaching data information of each school;
analyzing the teaching data information to generate teaching condition information of each school; the teaching condition information comprises school condition information and/or learning condition information and/or teaching condition information.
7. The information processing method according to claim 6, wherein the analyzing the teaching data information to generate teaching condition information of each school specifically includes:
according to the school ID, counting school situation information of each school from the teaching data information; the school situation information comprises teacher quantity information, student quantity information, course quantity information and resource quantity information;
and/or the presence of a gas in the gas,
extracting the stage teaching information of each class of each school from the teaching data information;
analyzing and processing the periodic teaching information according to a preset periodic assessment principle,
generating learning situation information of each class of each school; the learning situation information comprises attendance information, class situation information and examination situation information;
and/or the presence of a gas in the gas,
extracting questionnaire survey information of each school from the teaching data information;
generating the teaching information of each school according to the questionnaire survey information; the teaching information comprises classroom feedback information, teaching method flexibility information and operation correction information.
8. The information processing method according to claim 6, wherein the acquiring an information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically includes:
acquiring a permission upgrading request sent by a second user; the permission upgrading request comprises second user identification information;
according to the second user identification information, extracting school condition data of a fourth school corresponding to the second user identification information from the school condition information of each school;
processing the school condition data of the fourth school according to a preset algorithm to generate school condition analysis data of the fourth school; the school sentiment analysis data comprises a teacher-student ratio and/or a teacher-course ratio;
and when the teacher-student ratio or the teacher-course ratio is not less than the corresponding preset ratio, updating the permission field corresponding to the second user identification information, and updating the user account permission information list.
9. The information processing method according to claim 2, wherein the obtaining of the information processing instruction sent by the first user based on different data management authorities and performing corresponding information processing according to the information processing instruction specifically include:
acquiring a group information creating or modifying instruction;
acquiring a basic information item list and a propaganda information item list of a group according to the group information creating instruction;
and receiving information input by a user based on the basic information list and the propaganda information list, and creating or modifying the group information.
10. The information processing method according to claim 1, wherein before acquiring the login information of the first user, the information processing method further comprises:
acquiring first user identity information; the first user identity information comprises first user real name information and first user role information;
acquiring a preset role authority mapping relation, matching in the role authority mapping relation according to the first user role information, and searching an authority field corresponding to the first user role information according to the first user role information if matching is successful;
and creating the user account authority information list according to the first user identification information, the first user real name information and the authority field.
CN202111575714.1A 2021-12-21 2021-12-21 Information processing method based on user authority Pending CN114218562A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111575714.1A CN114218562A (en) 2021-12-21 2021-12-21 Information processing method based on user authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111575714.1A CN114218562A (en) 2021-12-21 2021-12-21 Information processing method based on user authority

Publications (1)

Publication Number Publication Date
CN114218562A true CN114218562A (en) 2022-03-22

Family

ID=80704887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111575714.1A Pending CN114218562A (en) 2021-12-21 2021-12-21 Information processing method based on user authority

Country Status (1)

Country Link
CN (1) CN114218562A (en)

Similar Documents

Publication Publication Date Title
US20140215573A1 (en) System and method for application accounts
Blažič Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills?
US20140017653A1 (en) Apparatus, system, and method for a virtual instruction cloud
US20180061254A1 (en) Academic-Integrity-Preserving Continuous Assessment Technologies
US20130203037A1 (en) Examination mangement
US20230260065A1 (en) Enhanced teaching method and security protocol in testing students
Malhi et al. E-learning based on cloud computing for educational institution: Security issues and solutions
Zhi et al. RFID-enabled smart attendance management system
Shukla et al. A novel approach: Cloud-based real-time electronic notice board
US10452775B2 (en) Learning application template management in a modular learning system
Blažič Cybersecurity skills in eu: New educational concept for closing the missing workforce gap
Sherine et al. Development of an Efficient and Secured E-Voting Mobile Application Using Android
CN114218562A (en) Information processing method based on user authority
US11948217B2 (en) Systems and methods for providing navigation of multiple organizations in one or more electronic learning systems
Romashkova et al. International training programs IT security system for specialists in onboard systems
Lin et al. Public Integrity Auditing for Cloud Storage based on Consortium Blockchain
Mohammed et al. Enhancing attendance tracking using animated QR codes: a case study
Privalov et al. Systematic approach to the organization of safe information and education environment in the higher educational institutions
Cigoj et al. An Advanced Educational Tool for Digital Forensic Engineering.
KR102290468B1 (en) System for managing online learning
Gapinski Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
Alier et al. Privacy and E-Learning: A Pending Task. Sustainability 2021, 13, 9206
Prieto et al. A Methodology Approach to Evaluate Cloud-Based Infrastructures in Support for e-Assessment
Zahid et al. LMS NUST concurrent session impact and solution
Savelieva et al. Integrating case studies into information security education

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 1002, floor 10, block B, No. 18, Zhongguancun Street, Haidian District, Beijing 100044

Applicant after: Beijing Biyun shuchuang Technology Co.,Ltd.

Address before: Room 1002, floor 10, block B, No. 18, Zhongguancun Street, Haidian District, Beijing 100044

Applicant before: Beijing yundie Zhixue Technology Co.,Ltd.