CN115422514B - Information interaction method, system, equipment and storage medium - Google Patents

Information interaction method, system, equipment and storage medium Download PDF

Info

Publication number
CN115422514B
CN115422514B CN202211158943.8A CN202211158943A CN115422514B CN 115422514 B CN115422514 B CN 115422514B CN 202211158943 A CN202211158943 A CN 202211158943A CN 115422514 B CN115422514 B CN 115422514B
Authority
CN
China
Prior art keywords
user
level
client
information
manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211158943.8A
Other languages
Chinese (zh)
Other versions
CN115422514A (en
Inventor
范立新
朱长红
陈嘉欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guangzhi Dawei Technology Co ltd
Original Assignee
Beijing Guangzhi Dawei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guangzhi Dawei Technology Co ltd filed Critical Beijing Guangzhi Dawei Technology Co ltd
Priority to CN202211158943.8A priority Critical patent/CN115422514B/en
Publication of CN115422514A publication Critical patent/CN115422514A/en
Application granted granted Critical
Publication of CN115422514B publication Critical patent/CN115422514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The application provides an information interaction method, an information interaction system, information interaction equipment and a storage medium, and relates to the technical field of data interaction. A method of information interaction, comprising: acquiring identity information of a first user based on trigger information, wherein the trigger information is content trigger access of the first user to any third-level client of a registered second user; determining that the first user is a registered user according to the identity information of the first user, and acquiring an associated client of the first user according to the identity information of the first user; pushing client content of the second user to the first user; and generating a return visit request of the second user to the associated client of the first user according to the visit record of the first user. According to the embodiment of the application, mutual access among strange users crossing organizations can be realized and data interaction can be performed, so that the business capability of the system is expanded.

Description

Information interaction method, system, equipment and storage medium
Technical Field
The present application relates to the field of information interaction technologies, and in particular, to a method, a system, an apparatus, and a storage medium for information interaction.
Background
Conventional business-to-business transactions tend to consume significant resources and time, either sales, distribution or purchasing, at product costs. And through the transaction mode of B2B, the buying and selling parties can complete the whole business flow on the internet. From the initial impression, to the third of the goods, to the bartering counter-offer, the order and the delivery, and finally to the customer service, B2B reduces the business process and the management cost of the business to a great deal, and reduces the business operation cost. The convenience and extensibility of the network enable enterprises to expand the range of activity, and the enterprises can develop across regions and national boundaries more conveniently and with lower cost.
The inventor of the application finds that the binding application of the personal identity data and the service data in the data architecture of the existing B2B website or App lacks a technology for implementing data interview across an organization system, so that the service data subjected to identity binding cannot be accessed mutually in data channels of different organizations between users, and the problems of incapability of cross-boundary communication and single service capability exist.
Disclosure of Invention
The application provides an information interaction method, system, equipment and storage medium, which realize the function of carrying out mutual access and data interaction between strange users across an organization system on the basis of associating personal identity data of users with service data, thereby expanding the service capability of the system.
According to an aspect of the present application, there is provided a method of information interaction, including: acquiring identity information of a first user based on trigger information, wherein the trigger information is content trigger access of the first user to any third-level client of a registered second user; determining that the first user is a registered user according to the identity information of the first user, and acquiring an associated client of the first user according to the identity information of the first user; pushing client content of the second user to the first user; and generating a return visit request of the second user to the associated client of the first user according to the visit record of the first user.
According to some embodiments, obtaining identity information of the first user based on the trigger information comprises: the first user triggers login information of any third-level client side logged in the second user; and according to the login information, acquiring the identity information of the first user through any third-level client of the second user.
According to some embodiments, the method further comprises: pushing application registration information to the first user according to the identity information of the first user so as to register the first user as a second-level manager; according to first data input by the first user at the second-stage management end, configuring a second-stage client for the first user; according to second data input by the first user at the second-level management end, configuring at least one third-level client for the first user; and storing the association information of the second-level client and the at least one third-level client at a third-level management end.
According to some embodiments, according to the first data input by the first user at the second level management end, configuring the second level client for the first user includes: generating the second-stage client through a second-stage management terminal according to the first data input by the second-stage manager; and sending an online application of the second-level client to the first-level management end so as to online the second-level client.
According to some embodiments, according to the second data input by the first user at the second level management end, at least one third level client is configured for the first user, including: generating the at least one third-level client through a second-level management end according to second data input by the second-level manager, wherein the second data comprises identity information of the third-level manager; pushing the at least one tertiary client for selection by the tertiary administrator; and storing, at the tertiary management end, association information between the at least one tertiary client and the tertiary administrator and the secondary client.
According to some embodiments, obtaining the associated client of the first user according to the identity information of the first user includes: determining whether the first user is a third-level manager according to the identity information of the first user; if yes, at least one third-level client associated with the identity information of the first user is obtained; if not, pushing an application page of a second-level manager to acquire application information submitted by the first user or guiding the first user to a first-level client.
According to some embodiments, pushing client content of the second user to the first user includes: determining a third-level client associated with the identity information of the first user according to the association information stored by the third-level management end under the condition that the first user is a third-level manager; and pushing third-level client content of the second user to the first user.
According to some embodiments, generating a return visit request of the second user to the associated client of the first user according to the access record of the first user includes: acquiring an access record of the first user at a third-level client of the second user; acquiring a return visit request sent by the second user according to the visit record; and pushing the content of the third-level client associated with the identity information of the first user to the second user under the condition that the first user allows the revisit.
According to an aspect of the present application, there is provided a system for information interaction, including: the data acquisition module acquires identity information and application information submitted by a first user; the operation processing module registers the first user as a second manager according to the application information of the first user; acquiring an associated client of the first user according to the identity information of the first user; pushing client content of a second user; determining a return visit request of the second user to the associated client of the first user according to the client visit record of the first user so as to push the content of the associated client of the first user; and the data storage module is used for storing the data acquired by the data acquisition module and the data generated by the operation processing module.
According to some embodiments, the operation processing module is provided with a first-level manager, a second-level manager and a third-level manager, and configures the first-level manager, the second-level manager and the third-level manager, and includes: the first-level manager generates a first-level client through the first-level manager; the second manager generates a second-level client and at least one third-level client through the second manager; and the third-level manager acquires the association information of the second-level client and the at least one third-level client through the third-level manager, and each third-level client is associated with one third-level manager.
According to an aspect of the present application, there is provided an electronic apparatus including: one or more processors; a storage means for storing one or more programs; the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods as described above.
According to an aspect of the present application, there is provided a computer readable storage medium comprising a computer program or instructions which, when executed by a processor, implement a method as described above.
According to the embodiment of the application, the technical scheme of the application enables the user to bind the service end data with multiple identities by establishing the association relation between the user identity data and the service end data which belong to different organization systems, realizes the data interview of the users which belong to different organization relations under the condition that the users are strangers, effectively expands the service range and solves the problem of single service capability of the system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application.
Fig. 1 shows a flowchart of an information interaction method according to an exemplary embodiment of the present application.
Fig. 2 shows a flow chart of second level client online according to an example embodiment of the present application.
Fig. 3 shows a flow chart of third level client online according to an example embodiment of the present application.
Fig. 4 shows a flowchart of a user accessing a tertiary client according to an example embodiment of the present application.
Fig. 5 shows a flow chart of client content interview according to an example embodiment of the present application.
Fig. 6 shows a block diagram of an information interaction system according to an example embodiment of the present application.
Fig. 7A-7F are schematic diagrams illustrating page effects of an information interaction system according to an exemplary embodiment of the present application.
Fig. 8 shows a block diagram of an electronic device according to an example embodiment of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted.
The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the disclosed aspects may be practiced without one or more of the specific details, or with other methods, components, materials, devices, operations, etc. In these instances, well-known structures, methods, devices, implementations, materials, or operations are not shown or described in detail.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
The method, the system, the equipment and the storage medium for information interaction can correlate personal identity data of the user with service data and match the personal identity data with superior management data, so that the user can bind multiple identities with a service end, data interview of users belonging to different organization relations under the condition that the users are strangers to each other is realized, service range is effectively expanded, and the problem of single service capability of a system is solved.
A method, system, apparatus and storage medium for information interaction according to embodiments of the present application will be described in detail with reference to the accompanying drawings.
Fig. 1 shows a flowchart of an information interaction method according to an exemplary embodiment of the present application.
As shown in fig. 1, in step S110, the interactive system acquires identity information of the first user based on the trigger information.
For example, in step S110, when the first user triggers access to the content of the third-level client Cm of the second user registered in the interactive system, the interactive system acquires the identity information of the first user through the page of the third-level client Cm. The interactive system comprises a plurality of third-level clients C1, C2, … …, cm, m being a natural number.
In step S120, the interactive system determines that the first user is a registered user according to the identity information of the first user, and obtains the associated client of the first user according to the identity information of the first user.
For example, in step S120, the interactive system first determines whether the first user is a registered user at the first-level management end according to the identity information of the first user, and if the first user is an unregistered user, obtains application information submitted by the first user through the application page of the second-level manager, and registers the first user as the second-level manager. The first user can apply for the second-level manager through the interactive system before accessing the third-level client Cm of the second user, or can apply for the second-level manager's application page pushed by the interactive system to become the second-level manager in the process of accessing the third-level client Cm of the second user.
After a first user enters a second-level management end in the identity of a second-level manager, the interactive system generates a second-level client Bn through first data input by the first user, n is a natural number, and sends an online application to the first-level management end according to the operation of the first user, wherein the first data comprises basic content data of the second-level client Bn. After the first-level administrator passes the verification, the interactive system brings the second-level client Bn on line, and an access entrance of the third-level client is arranged in the second-level client Bn.
After the second-level client Bn is online, the first user continues to operate at the second-level management end. The interactive system generates at least one third level client from second data submitted by the first user, wherein the second data includes identity information of a third level administrator.
The interactive system stores the association relation between the first user (namely, the second level manager) and the first level client and the second level client Bn and the association relation between the first user (namely, the second level manager) and the third level manager and the third level client to the third level manager so as to generate an association list of the second level client Bn and the third level client.
Further, the interactive system performs inquiry and evidence-seeking according to the identity information of the first user. Under the condition that the identity information of the first user is confirmed to be matched with the identity information of the third-level manager submitted by the second-level manager, the interactive system pushes at least one third-level client associated with the second-level client Bn to the first user according to the association list of the second-level client Bn and the third-level client, so that the first user can select and online the third-level client Cn from the at least one third-level client, n is a natural number, and the identity identification of the third-level manager of the first user is completed.
In step S130, the interactive system pushes client content of the second user to the first user.
For example, in step S130, in the event that the first user is determined to be a tertiary administrator, and the tertiary client Cn associated with the first user is online, the interactive system pushes the information content that has been published by the tertiary client Cm of the second user to the first user for access by the first user.
In step S140, the interactive system generates a return visit request of the second user to the associated client of the first user according to the visit record of the first user.
For example, in step S140, the interactive system records information in the process of accessing the third-level client Cm of the second user by the first user, forms an access record of the first user, and provides the access record to the second user, where both the second user and the first user are third-level administrators. The interactive system acquires a return visit request submitted by the second user, and pushes information content of the third-level client Cn to the second user under the condition that the first user has set the third-level client Cn to allow return visit. The third level client Cn and the third level client Cm may be associated with the same second level client, or may be associated with different second level clients, respectively.
According to the embodiment of the application, the interaction system associates the personal identity data of the users belonging to different organizations with the service data and matches the personal identity data with the upper management data, so that strange users belonging to different organizations can directly visit each other and conduct data interaction, and the service capability of the system is expanded.
Fig. 2 shows a flow chart of second level client online according to an example embodiment of the present application.
As shown in fig. 2, the above step S120 further includes steps S121, S122, and S123. In step S121, the interactive system generates a second-level client from the first data.
For example, in step S121, after the first user registers as the second manager and logs in to the second manager with the identity of the second manager, the interactive system obtains the first data that is entered by the second manager at the second manager, where the first data includes the basic content data of the second client. After being processed by the server, the interactive system generates a second-level client.
In step S122, the interactive system sends an online application of the second-level client.
For example, in step S122, the interactive system sends an online application of the second-level client to the first-level manager for the first-level manager to audit. If the first-level manager does not pass the audit, the interactive system returns the online application so as to be convenient for the second-level manager to submit again after adjustment.
In step S123, the interactive system brings the second-level client on-line.
For example, in step S123, after the first-level administrator checks, the interactive system brings the second-level client on line through a preset online process. The second-level client after online can be accessed through an access entrance arranged on the first-level client, and the first-level client and the second-level client are both provided with an access entrance of the third-level client.
According to the embodiment of the application, the interaction system carries out association binding on the personal identity information of the user and the upper node of the service end through the second-stage management end so as to facilitate management of service data.
Fig. 3 shows a flow chart of third level client online according to an example embodiment of the present application.
As shown in fig. 3, the above step S120 further includes steps S124, S125, and S126. In step S124, the interactive system generates at least one third level client from the second data.
For example, in step S124, after the second-level client is online, the interactive system acquires second data entered by the second-level administrator at the second-level administrator, where the second data includes identity information data of the third-level administrator and basic content data of the third-level client. After being processed by the server, the interactive system generates at least one third-level client. The interactive system stores association information between the third-level client and the third-level administrator, and the second-level client associated with the identity information of the third-level administrator, to the third-level administrator.
In step S125, the interactive system pushes at least one tertiary client to a tertiary administrator for selection by the tertiary administrator.
For example, in step S125, when the first user enters the third-level client page through the third-level client access portal set by the first-level client or the second-level client and logs in, the interactive system verifies the first user identity. In the case that the identity information of the first user matches with the second data entered by the second-level administrator in step S124, the interactive system pushes the generated at least one third-level client associated with the second-level client to the third-level administrator (the first user) according to the association information of the second-level client and the third-level client, so that the third-level administrator can select from the generated at least one third-level client to realize the identity matching of the third-level administrator and the third-level client.
In step S126, the interactive system brings the third level client selected by the third level administrator online.
For example, in step S126, the interactive system will be a third tier client online service that matches the third tier administrator. The third-level client after online can be accessed through an access entrance arranged at the first-level client or the second-level client.
According to the embodiment of the application, the interactive system establishes the association relation between the user identity data and the service end data, so that the user can bind the service end data with multiple identities, and the problem of single service capability of the system is solved.
Fig. 4 shows a flowchart of a user accessing a tertiary client according to an example embodiment of the present application.
As shown in fig. 4, in step S210, the interactive system accepts an access by the first user to the third level client of the second user.
For example, in step S210, the interactive system makes the first user jump to the page of the third level client Cm of any one of the plurality of different third level clients associated with the plurality of different second level clients to access through the third level client access portal provided at the first level client and the second level client, and acquires the identity information of the first user when accessing the information content published by the third level client Cm.
In step S220, in the case that the first user is a third-level administrator, the interactive system acquires at least one third-level client associated with the first user identity information.
For example, in step S220, the interactive system performs query verification according to the identity information of the first user. After confirming that the identity information of the first user is a third-level administrator, the interactive system acquires at least one third-level client corresponding to the second-level client associated with the identity information of the first user according to the association list of the second-level client and the third-level client, and the identity identification of the first user is completed.
In step S230, the interactive system determines a third level client to which the first user identity information is associated.
For example, in step S230, the interactive system determines, from at least one tertiary client associated with the first user identity information, a tertiary client Cn associated with the first user identity information and online.
In step S240, the interactive system pushes the content of the third level client of the second user.
For example, in step S240, after determining that the identity of the first user is a tertiary administrator and that there is a tertiary client Cn associated with the first user and online serving, the interactive system pushes information content that has been published by the tertiary client Cm of the second user to which the first user needs to access to the first user. The third level client Cn and the third level client Cm may be associated with the same second level client, or may be associated with different second level clients, respectively.
In step S250, in the case that the first user is a non-third-level administrator, the interactive system pushes the application page of the second-level administrator to the first user.
For example, in step S250, the interactive system performs query verification according to the identity information of the first user. After confirming that the identity of the first user is not the third-level administrator, the interactive system pushes an application page of the second-level administrator to the first user.
In step S260, in the case that the first user is a stranger visitor, the interactive system obtains second-level administrator application information submitted by the first user.
For example, in step S260, after the interactive system verifies that the identity information of the first user is not recorded in the system, the application information, which is submitted by the first user and becomes the second-level manager, is obtained through the application page of the second-level manager, so that the first user can perform the generating and maintaining operations of the second-level client and the third-level client after becoming the second-level manager. If the first user does not submit the application information which becomes the second level administrator, the interactive system determines that the first user can only access the content of the first level client and the second level client, and the basic content of the third level client.
In step S270, the interactive system directs the first user to the first level client in case the first user is not a stranger visitor.
For example, in step S270, the interactive system verifies that the identity information of the first user is queriable in the system and that the identity of the first user is a second level administrator and not a third level administrator. The interactive system guides the first user to the first-level client through the skip of the application page so that the first user can access the contents of the first-level client and the second-level client and the basic contents of the third-level client.
According to the embodiment of the application, the interaction system verifies the identity information of the user when the user accesses the third-level client so as to push the targeted content according to the user requirement, so that the use experience of the user is improved, and meanwhile, the data interaction between the clients is facilitated.
Fig. 5 shows a flow chart of client content interview according to an example embodiment of the present application.
As shown in fig. 5, in step S310, the interactive system acquires an access record of the first user at the third-level client Cm of the second user.
For example, in step S310, the interactive system pushes the information content published by the tertiary client Cm to the first user, and at the same time, records the information of the tertiary client Cm of the first user accessing the second user, so as to form an access record of the first user.
In step S320, the interactive system obtains a return visit request sent by the second user according to the visit record.
For example, in step S320, the interactive system provides the access record of the first user to the third level client Cm to the second user, wherein the identity of the second user is also the third level administrator. The interactive system acquires a return visit request submitted by the second user according to the visit record.
In step S330, the interactive system pushes the content of the third level client Cn associated with the first user to the second user.
For example, in step S330, the interactive system confirms the setting of the third level client Cn associated with the first user. In the case that the first user sets the third-level client Cn to allow the return visit, the interactive system pushes the information content (such as the first user head portrait) of the third-level client Cn to the second user, wherein the information content of the third-level client Cn may be displayed on the visit dynamics of the third-level client Cm. The interactive system obtains the request of the second user so that the second user can access the dynamic page of the third level client Cn. The third level client Cn and the third level client Cm may be associated with the same second level client, or may be associated with different second level clients, respectively.
According to the embodiment of the application, the interactive system realizes the data interview of the users belonging to different organization relations under the condition that the users are strangers, effectively expands the service range and solves the problem of single service capability of the system.
Fig. 6 shows a block diagram of an information interaction system according to an example embodiment of the present application.
As shown in fig. 6, the interactive system includes a data acquisition module 410, a run processing module 420, and a data storage module 430.
The data acquisition module 410 is configured to acquire identity information provided by the first user when accessing the third-level client page, and acquire application information submitted by the first user on the second-level administrator application page.
The operation processing module 420 is provided with a first-level management end, a second-level management end and a third-level management end, and is correspondingly configured with identities and rights of a first-level manager, a second-level manager and a third-level manager.
The operation processing module 420 registers the first user as the second administrator through application information submitted by the first user on the second administrator application page. Further, the operation processing module 420 obtains the second-level client and the third-level client associated with the first user identity information according to the first user identity information.
The operation processing module 420 pushes third-level client content accessed by the first user, and records client access information of the first user, so that the second user can send a return visit request to the third-level client associated with the first user, and push the third-level client content associated with the first user to the second user, thereby realizing mutual visit among the third-level clients.
The data storage module 430 is configured to store the data acquired by the data acquisition module 410 and the data generated by the operation processing module 420 into a database, where the data includes identity information of the first user, and association information of the second-level client and the third-level client associated with the first user identity information stored by the third-level management end.
Fig. 7A-7F are schematic diagrams illustrating page effects of an information interaction system according to an exemplary embodiment of the present application.
According to the information interaction system of the embodiment of the application, software-as-a-Service (SaaS) application Software is deployed on a server in cloud space, and a system Service background containing a database is generated. The interactive system generates a first-level management end and configures a first-level manager, and the page of the first-level management end is shown in fig. 7A. Each first-level management end corresponds to an independent organization service system. Within an independent organizational service hierarchy, a first level administrator manages a first level client accordingly.
The first-level manager logs in the background of the interactive system and enters the first-level management end after passing identity authentication. The first-level manager adds the content of the first-level client in the first-level management end, then sends an instruction to the server, generates a first-level client, and brings the first-level client on line through a preset on-line flow, and the page of the first-level client after the on-line is shown in fig. 7B. Within an independent organizational service hierarchy, a first level administrator manages a first level client accordingly. Each first-level client is provided with an access entrance of a second-level client and an access entrance of a third-level client, and a user can open the second-level client or the third-level client by clicking an icon of the access entrance of the second-level client or the access entrance of the third-level client.
When a user accesses for the first time, the interactive system pushes a page for applying for the second-level manager, so that the user can apply for and become the second-level manager. Alternatively, the first level administrator may also directly generate the second level administrator through the first level administrator.
The interactive system is further provided with a plurality of second-stage managing terminals, corresponding to a plurality of second-stage administrators, wherein the page of one second-stage managing terminal is shown in fig. 7C. The second-stage manager logs in the background of the interactive system and enters the second-stage management end after passing the identity authentication. And adding the basic content of the second-level client in the second-level manager by the second-level manager, and then sending an instruction to the server to generate the second-level client. After the second-level client is generated, the second-level manager submits an online application to the first-level manager. After the first-level administrator passes the verification, the interactive system brings the second-level clients on line, and the page of one second-level client after the second-level client is brought on line is shown in fig. 7D. Within an independent organizational service hierarchy, a second level administrator manages a second level client accordingly. Each second-level client is provided with an access entrance of the third-level client, and a user can open the third-level client by clicking an icon of the access entrance of the third-level client.
After the second-level client is online, the second-level manager continuously adds the identity information of the third-level manager, such as a mobile phone number and the like, in the second-level manager. The second level manager submits data including third level manager identity information, and the server generates at least one third level client corresponding to the third level manager identity information. Each second level administrator manages one second level client and a plurality of different third level clients within a separate organizational service hierarchy.
The interactive system is further provided with a plurality of third-level management ends, each third-level management end corresponds to one third-level manager, and corresponds to at least one third-level client end associated with the identity of the third-level manager, and the page of one third-level management end is shown in fig. 7E. And the third-level management end displays the second-level client and the third-level client associated with the corresponding third-level manager through the list, so that the third-level manager can select the corresponding third-level client to use when entering the third-level client through the third-level client access entrance of the first-level client or the second-level client. The data of each tertiary manager is stored in the interactive system database in a unified way, so that when the primary client or the secondary client in different independent organization service systems are linked to the tertiary client, the interactive system can push the data of the tertiary manager to the tertiary manager in the global ecology in a crossing way.
When a user logs in to a login page of a third-level client with a third-level administrator identity, the interactive system verifies the user identity in the database. After the verification is passed, the interactive system pushes at least one third-level client associated with the second-level client to the third-level administrator for the third-level administrator to select one of the third-level clients to be online. The third level client page after online is shown in fig. 7F.
Each tertiary client corresponds to only one tertiary administrator, and one tertiary administrator may manage a plurality of tertiary clients associated with the identity of the tertiary administrator. The third level client page is maintained by a second level administrator concerning the underlying content of the second level client. The information content maintenance of the third level client page is done by a third level administrator. The third-level manager maintains information content, including collection and release, wherein the third-level clients associated with the third-level manager are release content, and the third-level clients associated with other third-level managers are collection content.
Fig. 8 shows a block diagram of an electronic device according to an example embodiment of the present application.
As shown in fig. 8, the electronic device 600 is only an example, and should not impose any limitation on the functionality and scope of use of the embodiments of the present application.
As shown in fig. 8, the electronic device 600 is in the form of a general purpose computing device. Components of electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one memory unit 620, a bus 630 connecting the different system components (including the memory unit 620 and the processing unit 610), a display unit 640, etc. In which a storage unit stores program code that can be executed by the processing unit 610, such that the processing unit 610 performs the methods described herein according to various exemplary embodiments of the present application. For example, the processing unit 610 may perform the method as shown in fig. 1.
The storage unit 620 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 6201 and/or cache memory unit 6202, and may further include Read Only Memory (ROM) 6203.
The storage unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 630 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 600, and/or any device (e.g., router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 650. Also, electronic device 600 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 over the bus 630. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 600, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the description of the embodiments above, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. The technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disc, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The computer-readable medium carries one or more programs which, when executed by one of the devices, cause the computer-readable medium to perform the aforementioned functions.
Those skilled in the art will appreciate that the modules may be distributed throughout several devices as described in the embodiments, and that corresponding variations may be implemented in one or more devices that are unique to the embodiments. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
According to some embodiments of the application, the technical scheme can verify the identity information of the user so as to push the targeted content according to the user requirement, so that the use experience of the user is improved, meanwhile, the data interaction between the clients is facilitated, and the service range is effectively expanded.
The foregoing embodiments have been described in some detail to provide an understanding of the methods and concepts underlying the present application. Meanwhile, based on the ideas of the present application, those skilled in the art can make changes or modifications on the specific embodiments and application scope of the present application, which belong to the scope of the protection of the present application. In view of the foregoing, this description should not be construed as limiting the application.

Claims (9)

1. A method of information interaction, comprising:
acquiring identity information of a first user based on trigger information, wherein the trigger information is content trigger access of the first user to any third-level client of a registered second user;
and if the first user is determined to be a registered user according to the identity information of the first user, acquiring an associated client of the first user according to the identity information of the first user, including:
pushing application registration information to the first user according to the identity information of the first user so as to register the first user as a second-level manager;
generating a second-level client through the second-level management end according to first data input by the first user at the second-level management end;
sending an online application of the second-level client to a first-level management end so as to online the second-level client;
generating at least one third-level client through the second-level management end according to second data input by the first user at the second-level management end, wherein the second data comprises identity information of a third-level manager;
pushing the at least one tertiary client for selection by the tertiary administrator;
Storing association information between the at least one tertiary client and the tertiary administrator and the secondary client at a tertiary management end;
pushing client content of the second user to the first user;
and generating a return visit request of the second user to the associated client of the first user according to the visit record of the first user.
2. The method of claim 1, wherein obtaining identity information of the first user based on the trigger information comprises:
the first user triggers login information of any third-level client side logged in the second user;
and according to the login information, acquiring the identity information of the first user through any third-level client of the second user.
3. The method of claim 1, wherein obtaining the associated client of the first user based on the identity information of the first user comprises:
determining whether the first user is the third-level manager according to the identity information of the first user;
if yes, acquiring the at least one third-level client associated according to the identity information of the first user;
If not, pushing the application page of the second-level manager to acquire the application information submitted by the first user or guiding the first user to the first-level client.
4. A method according to claim 3, wherein pushing client content of the second user to the first user comprises:
determining a third-level client associated with the identity information of the first user according to the association information stored by the third-level management end under the condition that the first user is the third-level manager; the method comprises the steps of,
pushing any third level client content of the second user to the first user.
5. The method of claim 4, wherein generating a return visit request for the associated client of the first user by the second user based on the access record of the first user comprises:
acquiring an access record of the first user at any third-level client of the second user;
acquiring a return visit request sent by the second user according to the visit record;
and pushing the content of the third-level client associated with the identity information of the first user to the second user under the condition that the first user allows the revisit.
6. A system for information interaction, comprising:
the data acquisition module acquires identity information and application information submitted by a first user;
the operation processing module registers the first user as a second manager according to the application information of the first user; acquiring the associated client of the first user according to the identity information of the first user, wherein the acquiring comprises the following steps: generating a second-level client through the second-level management end according to first data input by the first user at the second-level management end; sending an online application of the second-level client to a first-level management end so as to online the second-level client; generating at least one third-level client through the second-level management end according to second data input by the first user at the second-level management end, wherein the second data comprises identity information of a third-level manager; pushing the at least one tertiary client for selection by the tertiary administrator; storing association information between the at least one tertiary client and the tertiary administrator and the secondary client at a tertiary management end; pushing client content of a second user; determining a return visit request of the second user to the associated client of the first user according to the client visit record of the first user so as to push the content of the associated client of the first user;
And the data storage module is used for storing the data acquired by the data acquisition module and the data generated by the operation processing module.
7. The system of claim 6, wherein the system further comprises a controller configured to control the controller,
the operation processing module is provided with the first-stage management end, the second-stage management end and the third-stage management end, and configures a first-stage manager, the second-stage manager and the third-stage manager, and comprises:
the first-level manager generates a first-level client through the first-level manager;
the second manager generates a second-level client and at least one third-level client through the second manager;
and the third-level manager acquires the association information of the second-level client and the at least one third-level client through the third-level manager, and each third-level client is associated with one third-level manager.
8. An electronic device, comprising:
one or more processors;
a storage means for storing one or more programs;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-5.
9. A computer readable storage medium having stored thereon a computer program or instructions which, when executed by a processor, implement the method of any of claims 1-5.
CN202211158943.8A 2022-09-22 2022-09-22 Information interaction method, system, equipment and storage medium Active CN115422514B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211158943.8A CN115422514B (en) 2022-09-22 2022-09-22 Information interaction method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211158943.8A CN115422514B (en) 2022-09-22 2022-09-22 Information interaction method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115422514A CN115422514A (en) 2022-12-02
CN115422514B true CN115422514B (en) 2023-07-18

Family

ID=84204211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211158943.8A Active CN115422514B (en) 2022-09-22 2022-09-22 Information interaction method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115422514B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021003751A1 (en) * 2019-07-11 2021-01-14 深圳市鹰硕技术有限公司 Single-account multi-identity login method and apparatus, server, and storage medium
CN113573029A (en) * 2021-09-26 2021-10-29 广州科天视畅信息科技有限公司 Multi-party audio and video interaction method and system based on IOT

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008134786A (en) * 2006-11-28 2008-06-12 Hitachi Omron Terminal Solutions Corp Authentication system, authentication device and authentication method
US9552615B2 (en) * 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
US9633218B2 (en) * 2015-02-27 2017-04-25 Microsoft Technology Licensing, Llc Identities and permissions
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
CN107040459A (en) * 2017-03-27 2017-08-11 高岩 A kind of intelligent industrial secure cloud gateway device system and method
US10735355B1 (en) * 2018-10-05 2020-08-04 Facebook, Inc. Intelligent determination of whether to initiate a communication session for a user based on proximity to client device
CN112417416A (en) * 2020-11-19 2021-02-26 深圳市德普光业科技有限公司 Authentication interaction method, system and storage medium of service system
US11310207B1 (en) * 2020-12-21 2022-04-19 Shopify Inc. Systems and methods for exchanging data between devices
CN113824712A (en) * 2021-09-17 2021-12-21 上海浦东发展银行股份有限公司 Request processing method and device based on micro service, electronic equipment and medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021003751A1 (en) * 2019-07-11 2021-01-14 深圳市鹰硕技术有限公司 Single-account multi-identity login method and apparatus, server, and storage medium
CN113573029A (en) * 2021-09-26 2021-10-29 广州科天视畅信息科技有限公司 Multi-party audio and video interaction method and system based on IOT

Also Published As

Publication number Publication date
CN115422514A (en) 2022-12-02

Similar Documents

Publication Publication Date Title
RU2586866C2 (en) Differentiation of set of features of participant of leased medium and user
US10067923B2 (en) Unified electronic forms management system
US9805209B2 (en) Systems and methodologies for managing document access permissions
US20140114822A1 (en) Method and system for creating tax configuration templates
US8745088B2 (en) System and method of performing risk analysis using a portal
US9910858B2 (en) System and method for providing contextual analytics data
US20140122349A1 (en) System, information management method, and information processing apparatus
CN111539775A (en) Application program management method and device
CN115168460A (en) Data processing method, data transaction system, device and storage medium
US10747390B1 (en) Graphical composer for policy management
JP2007272518A (en) Customer database management device and customer database management program
US20220255914A1 (en) Identity information linking
CN112765102B (en) File system management method and device
CN115422514B (en) Information interaction method, system, equipment and storage medium
CN107294766B (en) Centralized control method and system
CN114168632A (en) Abnormal data identification method and device, electronic equipment and storage medium
CN112116343A (en) Cash register system based on C/S and B/S fusion
KR20210051817A (en) System and method for providing an authentication information service based an open api
Downs et al. Designing submission and workflow services for preserving interdisciplinary scientific data
CN115334064B (en) Method and device for generating configuration system
KR101799198B1 (en) Method and apparatus for managing transaction information
CN117556795A (en) Method for putting business travel service on shelf and business travel service system
CN113919914A (en) Resource management method, resource management platform, electronic device, storage medium, and program product
CN117176576A (en) Network resource changing method, device, equipment and storage medium
CN111563814A (en) Information processing method, device and system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant