CN115033918B - Enterprise integrated information management method and system - Google Patents

Enterprise integrated information management method and system Download PDF

Info

Publication number
CN115033918B
CN115033918B CN202210644662.7A CN202210644662A CN115033918B CN 115033918 B CN115033918 B CN 115033918B CN 202210644662 A CN202210644662 A CN 202210644662A CN 115033918 B CN115033918 B CN 115033918B
Authority
CN
China
Prior art keywords
security level
information
image information
release
lowest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210644662.7A
Other languages
Chinese (zh)
Other versions
CN115033918A (en
Inventor
汤乐辉
王英彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yishunyun Shenzhen Technology Co ltd
Original Assignee
Yishunyun Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yishunyun Shenzhen Technology Co ltd filed Critical Yishunyun Shenzhen Technology Co ltd
Priority to CN202210644662.7A priority Critical patent/CN115033918B/en
Publication of CN115033918A publication Critical patent/CN115033918A/en
Application granted granted Critical
Publication of CN115033918B publication Critical patent/CN115033918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an enterprise integrated information management method and system, wherein the method comprises the following steps: the terminal acquires first information to be published by a user and a published object corresponding to the first information; the terminal carries out intelligent recognition on the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object; and the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be released to the release object. The technical scheme provided by the application has the advantage of high user experience.

Description

Enterprise integrated information management method and system
Technical Field
The invention relates to the field of Internet, in particular to an enterprise integrated information management method and system.
Background
Enterprise information is information about an enterprise, including but not limited to: enterprise public information (e.g., intellectual property, business information, stakeholder information, etc.), temporary public information (e.g., bid information), and secret information (e.g., technical secrets, business secrets, etc.);
the management of the existing enterprise information is generally based on manual management, and the integrated management of the enterprise information cannot be dynamically realized, so that the cost of enterprise information management is increased.
Disclosure of Invention
The embodiment of the invention provides an enterprise integrated information management method and system, which can intelligently manage enterprise information, reduce the cost of enterprise information management and improve the user experience.
In a first aspect, an embodiment of the present invention provides an enterprise integrated information management method, where the method includes the following steps:
the terminal acquires first information to be published by a user and a published object corresponding to the first information;
the terminal carries out intelligent recognition on the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object;
and the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be released to the release object.
In a second aspect, there is provided an enterprise-integrated information management system, the system comprising:
the acquisition unit is used for acquiring first information to be published by a user and a published object corresponding to the first information;
the processing unit is used for intelligently identifying the first information to determine a first security level corresponding to the first information, and acquiring the lowest security level of the release object according to the release object; and comparing the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, allowing the first information to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, prohibiting the first information from being released to the release object.
In a third aspect, a computer-readable storage medium storing a program for electronic data exchange is provided, wherein the program causes a terminal to execute the method provided in the first aspect.
The embodiment of the invention has the following beneficial effects:
it can be seen that the terminal of the technical scheme provided by the application acquires the first information to be published by the user and the published object corresponding to the first information; the terminal carries out intelligent recognition on the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object; and the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be released to the release object. According to the technical scheme, whether the security level of the first information to be issued is matched with the issued object or not can be automatically determined, and if the security level of the issued object is not matched with the issued object (namely, the security level of the issued object is lower than the first security level), the issue of the first information is forbidden, the fact that enterprise information is issued to the unmatched object is avoided, the safety of enterprise information integrated management is further improved, and the user experience degree is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structure of a terminal
FIG. 2 is a flow diagram of an enterprise integrated information management method;
fig. 3 is a schematic structural diagram of an enterprise integrated information management system.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims and drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 provides a terminal, where the terminal may be a terminal of an IOS, an android, etc. system, and of course, may also be a terminal of another system, for example, a hong mo, etc., and the application is not limited to the specific system, and as shown in fig. 1, the terminal device may specifically include: the processor, memory, display screen, communication circuitry, and audio components (optional) may be connected by a bus, or may be connected by other means, and the present application is not limited to the specific manner of connection described above.
The enterprise information may have different requirements for different users, for example, some information needs to be kept secret in a limited manner (for example, the information can be sent after a secret protocol is signed), some information can be sent at will (for example, introduction information of an enterprise, etc.), and for the enterprise information, an integrated intelligent management scheme is needed, so that management on the enterprise integrated information can be realized, and some information is prevented from being disclosed, and a certain loss is caused to the enterprise.
Referring to fig. 2, fig. 2 provides an enterprise-integrated information management method, which may be implemented in a communication system, as shown in fig. 2, which may include: the terminal and the network equipment can also be data centers, and the terminal and the network equipment are connected in a wireless mode; the wireless mode may be a wireless communication system, and the terminal may be a mobile phone, a computer, a server, or the like.
The network device may be a device for communicating with a terminal, the network device may be an evolved NodeB (evolved NodeB) in an LTE system, may also be a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario, or the network device may be a relay device, an access point, an in-vehicle device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, one or a group of base stations (including a plurality of antenna panels) antenna panels in the 5G system, or may also be a network node constituting a gNB or a transmission point, such as a baseband unit (BBU), or a Distributed Unit (DU), etc., which embodiments of the present application are not limited.
The wireless communication system may be: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet Radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, long term evolution advanced (Advanced long term evolution, LTE-a) system, new Radio, NR system evolution system, LTE system over unlicensed spectrum (LTE-based access to unlicensed spectrum, LTE-U), unlicensed spectrum NR system, universal mobile telecommunications system (Universal Mobile Telecommunication System, UMTS), next generation communication system, or other communication system, etc.
The method is shown in fig. 2, and specifically may include:
step S201, a terminal acquires first information to be published by a user and a published object corresponding to the first information;
by way of example, the published objects may take a variety of forms, and may be combined in a variety of forms, including but not limited to: mailbox, weChat, microblog, etc., and in particular, may also determine the publishing object according to the manner in which it is published.
For example, the obtaining manner of the publishing object may specifically include:
the terminal obtains the release channel of the user, and determines the release object according to the release channel, which may specifically include: if the release channel is an email, acquiring a suffix name of the email, inquiring from a mapping relation between the suffix name and a company name according to the suffix name to obtain a first company name corresponding to the suffix name, and determining that the first company name is the release object; if the publishing channel is a semi-public channel (such as WeChat friend circle, group, private letter, discussion group and the like), acquiring all the personnel of the semi-public channel, and determining the all the personnel as a publishing object; if the posting channel is a public channel (e.g., web forum, magazine, etc. publishing mode), the posting subject is determined to be any person.
Step S202, the terminal intelligently identifies the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object;
for example, the obtaining, according to the published object, the lowest security level of the published object may specifically include:
if the release object is a first company name, extracting a security level corresponding to the first company name according to a mapping relation between the company name and the security level, and determining the security level as the lowest security level of the release object;
if the release object is all personnel of the semi-public channel, extracting all security levels in all personnel, and acquiring the lowest security level (the lowest security level in all personnel) in all security levels to determine the lowest security level of the release object;
if the release object is any person, the lowest security level of the release object is directly determined to be the lowest level in all security levels.
For example, the privacy class is divided into: the method comprises the steps of secret, confidentiality and disclosure of 4 grades, wherein secret > confidentiality > disclosure, and if the published object is any person, the lowest confidentiality grade of the published object is directly determined to be disclosure.
Of course, in practical applications, the security level may also be in other forms of presentation, for example, level a, level B, level C, level D, level E, etc., where level a > level B > level C > level D > level E. If the published object is all personnel of the semi-public channel, taking a group as an example, assuming that 3 persons exist in the group, and the corresponding security levels are level A, level B and level C respectively, determining that the lowest security level of the published object is level C.
And step S203, the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be issued to the issuing object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be issued to the issuing object.
The terminal of the technical scheme provided by the application obtains first information to be published by a user and a published object corresponding to the first information; the terminal carries out intelligent recognition on the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object; and the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be released to the release object. According to the technical scheme, whether the security level of the first information to be issued is matched with the issued object or not can be automatically determined, and if the security level of the issued object is not matched with the issued object (namely, the security level of the issued object is lower than the first security level), the issue of the first information is forbidden, the fact that enterprise information is issued to the unmatched object is avoided, the safety of enterprise information integrated management is further improved, and the user experience degree is improved.
For example, the intelligent identifying, by the terminal, the first information to determine the first security level corresponding to the first information may specifically include:
the terminal performs classification recognition on the first information to determine the type of the first information, if the type is text information, the first security level is determined according to the security level of the text information, if the type is image information, the first security level is determined according to the security level of the image information, and if the type is mixed information of the image information and the text information, the higher security level in the image information and the text information is determined to be the first security level.
By way of example, the above classification recognition may be performed by artificial intelligence classifiers, including, but not limited to, support vector machines, neural network models, deep neural network models, and the like.
For example, the determining the first security level according to the security level of the text information may specifically include:
performing word segmentation processing on the text information to obtain a plurality of keywords of the text information, acquiring security levels of the plurality of keywords corresponding to the plurality of keywords, and determining the security level with the largest number of keywords as the security level of the text information.
Specifically, for example, there are 20 keywords, wherein the security level corresponding to 10 keywords is level a, the security level corresponding to 6 keywords is level B, and the security level of the text information is determined to be level a.
For example, the acquiring the security levels of the plurality of keywords corresponding to the plurality of keywords may specifically include:
inquiring whether the words with the same words as a plurality of keywords are in a word list with one security level, if the words with the same words are in the word list, determining that the security level of the keyword corresponding to the same words is the one security level, dragging the words with no same words, inquiring whether the words with the same words are in a word list with other security levels, if the words with the same words are in the word list with other security levels, determining that the security level of the keyword is the security level corresponding to the same words, if the words with the same words are not in the word list with other security levels, inquiring the meaning word of the keyword from the word list with all the security levels, determining the security level corresponding to the meaning word as the security level of the keyword, traversing the keywords, and determining the security levels of the keywords.
For example, the determining the first security level according to the security level of the image information may specifically include:
and identifying the image information to determine whether the image information has a plurality of pieces of size information, if the image information has a plurality of pieces of size information, arbitrarily selecting two line segments corresponding to two different sizes from the plurality of pieces of size information, respectively obtaining two pixel points corresponding to the two line segments to obtain two numerical values, calculating the ratio between the two numerical values to obtain a first ratio, calculating the ratio between the two different sizes to obtain a second ratio, if the first ratio is the same as the second ratio, determining the image information as proportional image information, obtaining the security level corresponding to the proportional image information, and determining the security level as the first security level of the image information.
The security level of the information is generally high only in some engineering drawings, but the prior art of how to determine that the image information is the proportional image information does not provide the technical scheme, and whether the image information is the proportional image information is determined by whether the proportion of the size information is consistent with the proportion of the pixel points, because the length of a line segment corresponds to the size of an image drawn in proportion in the engineering drawings, so that the image information can be determined as the proportional image information if the two ratios are the same, and the security level of the proportional image information can be set by a user, such as level a or level B.
The above-described information having a plurality of sizes may be determined by a digital recognition algorithm, which may employ an existing AI algorithm, which is not limited thereto.
For example, the determining the first security level according to the security level of the image information may specifically include:
and carrying out object recognition on the image information to obtain product information corresponding to the image information, if the product information is the same as a product corresponding to a user company, extracting a release product image in the product corresponding to the user company, comparing the image information with the release product image to determine whether the image information is the same, if the image information is the same, determining that the security level corresponding to the release product is the first security level, if the image information is not the same, determining that the image information is a non-release product, and determining that the security level corresponding to the non-release product is the first security level.
For example, the image information is a fan a, if the fan a is not released, the security level corresponding to the non-released product may be determined to be a level a, if the fan a is released, the security level corresponding to the released product may be determined to be a level C, because the security level of the released product and the non-released product is completely different for the product of the enterprise, for example, the non-released product may involve a series of problems such as a technical secret, a business secret, a patent, etc., but the released product does not have such problems, so it is of great significance to determine whether the image is the released product through the image information.
Referring to fig. 3, fig. 3 provides a schematic structural diagram of an enterprise-integrated information management system, the system comprising:
an obtaining unit 301, configured to obtain first information to be published by a user and a published object corresponding to the first information;
the processing unit 302 is configured to intelligently identify the first information to determine a first security level corresponding to the first information, and obtain a lowest security level of the published object according to the published object; and comparing the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, allowing the first information to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, prohibiting the first information from being released to the release object.
By way of example only, the present invention is directed to a method of,
the obtaining unit is specifically configured to obtain a distribution channel of a user, determine the distribution object according to the distribution channel, and specifically include:
if the release channel is an email, acquiring a suffix name of the email, inquiring from a mapping relation between the suffix name and a company name according to the suffix name to obtain a first company name corresponding to the suffix name, and determining that the first company name is the release object; if the publishing channel is a semi-publishing channel, acquiring all personnel of the semi-publishing channel, and determining all personnel as a publishing object; if the release channel is a public channel, determining that the release object is any person.
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to extract a security level corresponding to a first company name according to a mapping relationship between the company name and the security level, and determine the security level as a lowest security level of the issuing object if the issuing object is the first company name;
if the release object is all personnel of the semi-public channel, extracting all security levels in all personnel, and acquiring the lowest security level in all security levels to determine the lowest security level of the release object;
if the release object is any person, the lowest security level of the release object is directly determined to be the lowest level in all security levels.
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to perform classification recognition on the first information to determine a category of the first information, determine the first security level according to a security level of the text information if the category is the text information, determine the first security level according to a security level of the image information if the category is the image information, and determine a higher security level of the image information and the text information as the first security level if the category is a mixed information of the image information and the text information.
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to perform word segmentation processing on the text information to obtain a plurality of keywords of the text information, obtain security levels of the plurality of keywords corresponding to the plurality of keywords, and determine the security level with the largest number of keywords as the security level of the text information.
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to query whether a word list with one security level has the same word as a plurality of keywords, if the word list with the same word has the same word, determine that the security level of the one keyword corresponding to the same word is the one security level, drag no word with the same word, query whether a word list with other security levels has the same word as the one keyword, if the word list with other security levels does not have the same word as the one keyword, query a word list with all security levels for a word with the same word, determine the security level corresponding to the word with the short meaning as the security level of the one keyword, traverse the keywords, and determine the security levels of the keywords.
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to identify the image information to determine whether the image information has multiple pieces of size information, if the image information has multiple pieces of size information, arbitrarily select two line segments corresponding to two different sizes from the multiple pieces of size information, respectively obtain two numbers of two pixel points corresponding to the two line segments, calculate a ratio between the two numbers to obtain a first ratio, calculate a ratio between the two different sizes to obtain a second ratio, if the first ratio is the same as the second ratio, determine that the image information is proportional image information, obtain a security level corresponding to the proportional image information, and determine that the security level corresponding to the proportional image information is a first security level of the image information
By way of example only, the present invention is directed to a method of,
the processing unit is specifically configured to perform object recognition on the image information to obtain product information corresponding to the image information, if the product information is the same as a product corresponding to a user company, extract a released product image in the product corresponding to the user company, compare the image information with the released product image to determine whether the image information is the same, if the image information is the released product, extract a security level corresponding to the released product to determine the first security level, if the image information is not the released product, extract a security level corresponding to the non-released product to determine the first security level.
By way of example, the processing unit in the embodiments of the present application may also be used to perform a refinement, an alternative, etc. of the embodiment shown in fig. 2, which is not described here again.
The embodiment of the present invention also provides a computer storage medium storing a computer program for electronic data exchange, where the computer program causes a computer to execute part or all of the steps of any one of the enterprise-integrated information management methods described in the above method embodiments.
Embodiments of the present invention also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program operable to cause a computer to perform part or all of the steps of any one of the enterprise-integrated information management methods described in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The foregoing has outlined rather broadly the more detailed description of embodiments of the invention, wherein the principles and embodiments of the invention are explained in detail using specific examples, the above examples being provided solely to facilitate the understanding of the method and core concepts of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (7)

1. An enterprise integrated information management method, which is characterized by comprising the following steps:
the terminal acquires first information to be published by a user and a published object corresponding to the first information;
the terminal carries out intelligent recognition on the first information to determine a first security level corresponding to the first information, and acquires the lowest security level of the release object according to the release object;
the terminal compares the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, the first information is allowed to be released to the release object, and if the comparison result is that the lowest security level is lower than the first security level, the first information is forbidden to be released to the release object;
the terminal intelligently identifies the first information to determine a first security level corresponding to the first information specifically comprises the following steps:
the terminal performs classification recognition on the first information to determine the type of the first information, if the type is text information, the first security level is determined according to the security level of the text information, if the type is image information, the first security level is determined according to the security level of the image information, and if the type is mixed information of the image information and the text information, the higher security level in the image information and the text information is determined to be the first security level;
the determining the first security level according to the security level of the image information specifically includes:
and identifying the image information to determine whether the image information has a plurality of pieces of size information, if the image information has a plurality of pieces of size information, arbitrarily selecting two line segments corresponding to two different sizes from the plurality of pieces of size information, respectively obtaining two pixel points corresponding to the two line segments to obtain two numerical values, calculating the ratio between the two numerical values to obtain a first ratio, calculating the ratio between the two different sizes to obtain a second ratio, if the first ratio is the same as the second ratio, determining the image information as proportional image information, obtaining the security level corresponding to the proportional image information, and determining the security level as the first security level of the image information.
2. The method according to claim 1, wherein the acquisition mode of the published object specifically includes:
the terminal obtains a release channel of a user, and determines the release object according to the release channel, and specifically comprises the following steps:
if the release channel is an email, acquiring a suffix name of the email, inquiring from a mapping relation between the suffix name and a company name according to the suffix name to obtain a first company name corresponding to the suffix name, and determining that the first company name is the release object; if the publishing channel is a semi-publishing channel, acquiring all personnel of the semi-publishing channel, and determining all personnel as a publishing object; if the release channel is a public channel, determining that the release object is any person.
3. The method according to claim 2, wherein the obtaining the minimum security level of the published object according to the published object specifically comprises:
if the release object is a first company name, extracting a security level corresponding to the first company name according to a mapping relation between the company name and the security level, and determining the security level as the lowest security level of the release object;
if the release object is all personnel of the semi-public channel, extracting all security levels in all personnel, and acquiring the lowest security level in all security levels to determine the lowest security level of the release object;
if the release object is any person, the lowest security level of the release object is directly determined to be the lowest level in all security levels.
4. An enterprise-integrated information management system, the system comprising:
the acquisition unit is used for acquiring first information to be published by a user and a published object corresponding to the first information;
the processing unit is used for intelligently identifying the first information to determine a first security level corresponding to the first information, and acquiring the lowest security level of the release object according to the release object; comparing the first security level with the lowest security level to obtain a comparison result, if the comparison result is that the lowest security level is higher than or equal to the first security level, allowing the first information to be issued to the issuing object, and if the comparison result is that the lowest security level is lower than the first security level, prohibiting the first information from being issued to the issuing object;
the processing unit is specifically configured to perform classification recognition on the first information to determine a category of the first information, determine the first security level according to a security level of the text information if the category is the text information, determine the first security level according to a security level of the image information if the category is the image information, and determine a higher security level in the image information and the text information as the first security level if the category is a mixed information of the image information and the text information;
the determining the first security level according to the security level of the image information specifically includes:
and identifying the image information to determine whether the image information has a plurality of pieces of size information, if the image information has a plurality of pieces of size information, arbitrarily selecting two line segments corresponding to two different sizes from the plurality of pieces of size information, respectively obtaining two pixel points corresponding to the two line segments to obtain two numerical values, calculating the ratio between the two numerical values to obtain a first ratio, calculating the ratio between the two different sizes to obtain a second ratio, if the first ratio is the same as the second ratio, determining the image information as proportional image information, obtaining the security level corresponding to the proportional image information, and determining the security level as the first security level of the image information.
5. The system of claim 4, wherein the system further comprises a controller configured to control the controller,
the obtaining unit is specifically configured to obtain a distribution channel of a user, determine the distribution object according to the distribution channel, and specifically include:
if the release channel is an email, acquiring a suffix name of the email, inquiring from a mapping relation between the suffix name and a company name according to the suffix name to obtain a first company name corresponding to the suffix name, and determining that the first company name is the release object; if the publishing channel is a semi-publishing channel, acquiring all personnel of the semi-publishing channel, and determining all personnel as a publishing object; if the release channel is a public channel, determining that the release object is any person.
6. The system of claim 4, wherein the system further comprises a controller configured to control the controller,
the processing unit is specifically configured to extract a security level corresponding to a first company name according to a mapping relationship between the company name and the security level, and determine the security level as a lowest security level of the issuing object if the issuing object is the first company name;
if the release object is all personnel of the semi-public channel, extracting all security levels in all personnel, and acquiring the lowest security level in all security levels to determine the lowest security level of the release object;
if the release object is any person, the lowest security level of the release object is directly determined to be the lowest level in all security levels.
7. A computer-readable storage medium storing a program for electronic data exchange, wherein the program causes a terminal to perform the method provided in any one of claims 1-3.
CN202210644662.7A 2022-06-09 2022-06-09 Enterprise integrated information management method and system Active CN115033918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210644662.7A CN115033918B (en) 2022-06-09 2022-06-09 Enterprise integrated information management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210644662.7A CN115033918B (en) 2022-06-09 2022-06-09 Enterprise integrated information management method and system

Publications (2)

Publication Number Publication Date
CN115033918A CN115033918A (en) 2022-09-09
CN115033918B true CN115033918B (en) 2023-05-05

Family

ID=83123331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210644662.7A Active CN115033918B (en) 2022-06-09 2022-06-09 Enterprise integrated information management method and system

Country Status (1)

Country Link
CN (1) CN115033918B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 Efficient visual secret sharing method with core participants
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9218507B2 (en) * 2002-07-19 2015-12-22 Charles R. Bowers Method and apparatus for managing confidential information
CN106022196B (en) * 2016-06-30 2019-01-11 维沃移动通信有限公司 A kind of method and intelligent terminal of information sharing
CN106411709A (en) * 2016-10-13 2017-02-15 国家电网公司 Secure mail transmission method and device
CN107895122B (en) * 2017-11-08 2021-08-27 山东大学 Special sensitive information active defense method, device and system
CN108123933B (en) * 2017-12-05 2020-12-08 南京南邮信息产业技术研究院有限公司 Information leakage automatic monitoring method and system based on internet big data
CN111756680A (en) * 2019-03-29 2020-10-09 华为技术有限公司 Data authentication method and device
CN113344313A (en) * 2019-12-03 2021-09-03 上海知芃知识产权服务有限公司 Management method of enterprise information assets
CN112491835A (en) * 2020-11-16 2021-03-12 平安信托有限责任公司 Screenshot sending method and device, computer equipment and storage medium
CN113689148A (en) * 2021-09-26 2021-11-23 支付宝(杭州)信息技术有限公司 Text risk identification method, device and equipment
CN114003929A (en) * 2021-10-27 2022-02-01 平安国际智慧城市科技股份有限公司 Data processing method, device, server and storage medium
CN113869803A (en) * 2021-12-02 2021-12-31 云账户技术(天津)有限公司 Enterprise sensitive information risk assessment method, system and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 Efficient visual secret sharing method with core participants
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image

Also Published As

Publication number Publication date
CN115033918A (en) 2022-09-09

Similar Documents

Publication Publication Date Title
CN109978608A (en) The marketing label analysis extracting method and system of target user's portrait
CN105991731A (en) Method for obtaining information, intelligent terminal and server side
CN106993048B (en) Determine method and device, information recommendation method and the device of recommendation information
CN102711110A (en) Wi-Fi (wireless fidelity) network management method and wireless router
CN107240029B (en) Data processing method and device
CN104796434A (en) Message pushing method and message server
CN103607735B (en) Base station display method and device based on map
CN112469133B (en) Carrier resource scheduling method and device
CN105207881A (en) Message sending method and equipment
CN110267343A (en) A kind of paging management method, network data analysis function and network side equipment
CN104965829A (en) Method, server and system for classifying terminal applications
CN105045911A (en) Label generating method for user to mark and label generating equipment for user to mark
CN111064666B (en) Networking method and device
CN115033918B (en) Enterprise integrated information management method and system
CN104053159B (en) The frequency collocation method and device of a kind of Multi-Carrier basestation
CN114492849B (en) Model updating method and device based on federal learning
CN107403386A (en) Insure management method and system based on bank outlets
CN114173318B (en) Method, device and equipment for identifying region to be optimized
CN113795032B (en) Method and device for judging invisible faults of indoor division, storage medium and equipment
CN107872836B (en) Method and system for policy configuration according to user terminal type
CN109842482A (en) A kind of information synchronization method, system and terminal device
CN104537465A (en) Determining method and device of setting current of power distribution network
CN104735701A (en) Centralized LTE parameter management method and LTE platform
CN105101397A (en) Method for registration of subscriber identity modules, terminal and network server
CN109286560B (en) Method and device for acquiring instant messaging message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant