CN115906142B - Enterprise online interaction data management method - Google Patents
Enterprise online interaction data management method Download PDFInfo
- Publication number
- CN115906142B CN115906142B CN202310223721.8A CN202310223721A CN115906142B CN 115906142 B CN115906142 B CN 115906142B CN 202310223721 A CN202310223721 A CN 202310223721A CN 115906142 B CN115906142 B CN 115906142B
- Authority
- CN
- China
- Prior art keywords
- interaction
- enterprise
- data
- online
- generated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000003993 interaction Effects 0.000 title claims abstract description 230
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000013523 data management Methods 0.000 title claims abstract description 12
- 230000002452 interceptive effect Effects 0.000 claims abstract description 69
- 238000007726 management method Methods 0.000 claims abstract description 9
- 238000012508 change request Methods 0.000 claims description 9
- 238000010276 construction Methods 0.000 claims description 3
- 238000013439 planning Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an enterprise online interaction data management method, which relates to the technical field of data management, and is characterized in that an enterprise online interaction platform is created and a data interaction end for online interaction of an enterprise is arranged; processing interactive data generated in the enterprise online interaction process; performing online authority management on the processed interactive data; dividing the generated interactive data into enterprise internal interactive data and enterprise external interactive data according to different online interactive environments, limiting the ownership rights of the data according to personnel involved in the generation process of the interactive data, and when the data is required to be externally shared, confirming all the involved personnel; when the interactive data is external interactive data of the enterprise, the external interactive data of the enterprise is encrypted, and when an external shared object exists, the external data of the enterprise is re-encrypted according to the existing external shared object, so that the ownership and privacy degree of the data are improved.
Description
Technical Field
The invention relates to the technical field of data management, in particular to an enterprise online interaction data management method.
Background
Enterprise management informatization is a development trend of enterprise management, and at present, products of this type on the market are generally divided into two types: firstly, business data management such as traditional enterprise resource planning (Enterprise Resource Planning, ERP) purchase, sale and storage has been developed for over twenty years, and with the continuous development of application, technology and concept, the content is more and more, the operation is more and more complex, but the nature is unchanged, and the business data management is realized in a core or a fixed mode;
in the prior art, when the data generated by the online interaction of enterprises are shared externally, information is easy to be unequal, so that personnel involved in the interaction process do not know that the data is shared externally, and how to improve the data possession degree and privacy degree of the personnel involved in the interaction process is a problem which needs to be solved.
Disclosure of Invention
The invention aims to provide an enterprise online interaction data management method.
The aim of the invention can be achieved by the following technical scheme: an enterprise online interaction data management method comprises the following steps:
step S1: creating an enterprise online interaction platform and setting a data interaction end for online interaction of an enterprise;
step S2: processing interactive data generated in the enterprise online interaction process;
step S3: and performing online authority management on the processed interactive data.
Further, the construction process of the enterprise online interaction platform comprises the following steps:
an enterprise online interaction platform is constructed, and a permission application unit for applying permissions is arranged in the enterprise online interaction platform;
the enterprise inputs the basic information of the enterprise through the authority application unit, and the input basic information of the enterprise is audited;
after the auditing is passed, establishing an enterprise interaction space associated with the enterprise;
setting unique and mutually different identification sequences for the established enterprise interaction space, and establishing corresponding index links according to the identification sequences;
and establishing a data interaction end, and linking the data interaction end with the enterprise interaction space through index links.
Further, the interactive data generated in the enterprise online interactive process comprises enterprise internal interactive data and enterprise external interactive data;
marking interaction data generated by online interaction of staff of the same enterprise in an enterprise interaction space as enterprise internal interaction data;
and marking interaction data generated by online interaction of different enterprise staff in the data interaction terminal as external interaction data of the enterprise.
Further, the process of processing the interaction data generated in the enterprise online interaction process includes:
when the interactive data generated in the enterprise online interaction process is the enterprise internal interactive data, acquiring the authority level of staff performing online interaction, wherein the authority level comprises a primary authority, a secondary authority and a tertiary authority;
when the authority levels of the staff performing online interaction are all first-level authority, marking the interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space;
when the authority level of the staff performing online interaction is the second-level authority or the third-level authority, marking interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space;
when the interactive data generated in the enterprise online interactive process is external interactive data of the enterprise;
marking enterprises corresponding to staff performing online interaction, and acquiring identification sequences of index links corresponding to the enterprises;
establishing a temporary interaction space in the data interaction end, taking the acquired identification sequence as access authentication of the temporary interaction space, and accessing staff from each enterprise into the temporary interaction space;
after online interaction is completed in the temporary interaction space, the generated interaction data are stored, corresponding interaction logs are generated, and meanwhile the temporary interaction space is invalid;
and correlating the saved interaction data and interaction logs with all enterprise staff accessed into the temporary interaction space, and completing encryption of the interaction data and the interaction logs.
Further, the encryption process performed on the interaction data and the interaction log includes:
acquiring identification sequences of index links corresponding to enterprises where all enterprise employees are located and login accounts of the employees, and randomly arranging the identification sequences to obtain corresponding character strings;
converting the obtained character string into a binary character string, and converting the obtained binary character string into a hexadecimal character string;
encrypting the obtained hexadecimal character string through an RSA encryption algorithm to obtain a corresponding public key and a private key;
encrypting the generated interaction data and interaction logs according to the obtained public key, and then sending the obtained private key to corresponding enterprise staff;
the enterprise employee decrypts the generated interaction data with the obtained private key.
Further, the process of performing online authority management on the processed interaction data comprises the following steps:
when the interactive data generated in the online interaction process of the enterprise is the internal interactive data of the enterprise, when staff performing online interaction needs to online share all or part of the generated interactive data to other staff, a data sharing request is generated, the data sharing request is sent to all staff performing online interaction, and after all staff performing online interaction agree, the data content to be shared is shared to other corresponding staff;
when the interactive data generated in the enterprise online interaction process is the external interactive data of the enterprise, acquiring all enterprises related to the external interactive data of the enterprise, and acquiring an enterprise authority set;
when any enterprise in the enterprise permission set needs to share the generated enterprise external interaction data to enterprise personnel working hours of other enterprises not belonging to the enterprise permission set, a permission change request is generated, the permission change request is sent to staff corresponding to all enterprises in all enterprise permission sets, and after all staff confirm the permission change request, the corresponding other enterprises acquire data sharing permission and re-encrypt the enterprise external interaction data.
Compared with the prior art, the invention has the beneficial effects that: dividing the generated interactive data into enterprise internal interactive data and enterprise external interactive data according to different online interactive environments, limiting the ownership rights of the data according to personnel involved in the generation process of the interactive data, and when the data is required to be externally shared, confirming all the involved personnel;
when the interactive data is external interactive data of the enterprise, the external interactive data of the enterprise is encrypted, and when an external shared object exists, the external data of the enterprise is re-encrypted according to the existing external shared object, so that the ownership and privacy degree of the data are enhanced.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
As shown in fig. 1, an enterprise online interaction data management method includes the following steps:
step S1: creating an enterprise online interaction platform and setting a data interaction end for online interaction of an enterprise;
step S2: processing interactive data generated in the enterprise online interaction process;
step S3: and performing online authority management on the processed interactive data.
It should be further noted that, in the implementation process, the construction process of the enterprise online interaction platform includes:
an enterprise online interaction platform is constructed, and a permission application unit for applying permissions is arranged in the enterprise online interaction platform;
the enterprise inputs the basic information of the enterprise through the authority application unit, and the input basic information of the enterprise is audited; it should be further noted that, in the implementation process, the business basic information includes a business name, a business location address, a business organization code, a business license, legal basic information, a postal code, and a business contact manner; the legal basic information comprises a name, a gender, an age and a mobile phone number authenticated by a real name;
after the verification is passed, establishing an enterprise interaction space associated with the enterprise, setting a legal person of the enterprise as an administrator of the enterprise interaction space, generating a corresponding login account and a login password according to legal person basic information of the legal person of the enterprise, and transmitting the generated login account and login password to the legal person;
setting a registration unit and a login unit which are linked with the enterprise interaction space;
enabling a legal person to enter an enterprise interaction space through the login unit according to the obtained login account number and login password;
the registration unit is used for registering information of enterprise staff, inputting staff basic information into the registration unit, and transmitting the input staff basic information to an administrator of the enterprise interaction space for auditing; it should be further noted that, in the specific implementation process, the basic information of the staff includes name, gender, age, job and mobile phone number of real name authentication;
after the verification is passed, a login account and a login password are generated according to the mobile phone number in the employee basic information, and the employee basic information is stored in an enterprise interaction space;
the staff inputs the obtained login account number and login password to a login unit, and enters an enterprise interaction space; it should be further noted that, in the implementation process, an administrator may set different authority levels for the employee basic information stored in the enterprise interaction space, where the authority levels include a first level authority, a second level authority and a third level authority, and the third level authority is greater than the second level authority and greater than the first level authority.
Setting unique and mutually different identification sequences for the established enterprise interaction space, and establishing corresponding index links according to the identification sequences;
and establishing a data interaction end, and linking the data interaction end with the enterprise interaction space through index links.
It should be further noted that, in the implementation process, the interaction data generated in the online interaction process of the enterprise includes the internal interaction data of the enterprise and the external interaction data of the enterprise;
marking interaction data generated by online interaction of staff of the same enterprise in an enterprise interaction space as enterprise internal interaction data;
marking interaction data generated by online interaction of different enterprise staff in a data interaction terminal as enterprise external interaction data;
it should be further noted that, in the implementation process, the process of processing the interaction data generated in the enterprise online interaction process includes:
when the interactive data generated in the enterprise online interaction process is the enterprise internal interactive data, acquiring the authority level of staff performing online interaction; it should be further noted that, in the specific implementation process, different authority levels have different online interaction authorities;
when the right class is the first-level right, the corresponding staff has the online conversation right and the file viewing right in the enterprise interaction space;
when the authority level is the second level authority, the corresponding staff has the authority for uploading and downloading the file in the enterprise interaction space on the basis of the first level authority;
when the right level is three-level right, the corresponding staff has the right of carrying out online interaction at the data interaction end on the basis of the two-level right;
when the authority levels of the staff performing online interaction are all first-level authority, marking the interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space;
when the authority level of the staff performing online interaction is the second-level authority or the third-level authority, marking interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space; it should be further noted that, in the implementation process, for the generated interaction log, the staff with the second level authority can download all or part of the content of the generated interaction log; the staff with three-level authority can download all or part of the generated interactive log and upload all or part of the interactive log into the data interactive terminal;
when the interactive data generated in the enterprise online interactive process is external interactive data of the enterprise;
marking enterprises corresponding to staff performing online interaction, and acquiring identification sequences of index links corresponding to the enterprises;
establishing a temporary interaction space in the data interaction end, taking the acquired identification sequence as access authentication of the temporary interaction space, and accessing staff from each enterprise into the temporary interaction space;
after online interaction is completed in the temporary interaction space, the generated interaction data are stored, corresponding interaction logs are generated, and meanwhile the temporary interaction space is invalid;
correlating the saved interaction data and interaction logs with all enterprise staff accessed into the temporary interaction space, and completing encryption of the interaction data and the interaction logs;
it should be further noted that, in the implementation process, the encryption process performed on the interaction data and the interaction log includes:
acquiring identification sequences of index links corresponding to enterprises where all enterprise employees are located and login accounts of the employees, and randomly arranging the identification sequences to obtain corresponding character strings;
converting the obtained character string into a binary character string, and converting the obtained binary character string into a hexadecimal character string;
encrypting the obtained hexadecimal character string through an RSA encryption algorithm to obtain a corresponding public key and a private key;
encrypting the generated interaction data and interaction logs according to the obtained public key, and then sending the obtained private key to corresponding enterprise staff;
the enterprise employee decrypts the generated interaction data with the obtained private key.
It should be further noted that, in the specific implementation process, the process of performing online rights management on the interaction data after the processing includes:
when the interactive data generated in the online interaction process of the enterprise is the internal interactive data of the enterprise, when staff performing online interaction needs to online share all or part of the generated interactive data to other staff, a data sharing request is generated, the data sharing request is sent to all staff performing online interaction, and after all staff performing online interaction agree, the data content to be shared is shared to other corresponding staff;
when the interactive data generated in the enterprise online interaction process is the external interactive data of the enterprise, acquiring all enterprises related to the external interactive data of the enterprise, and acquiring an enterprise authority set;
when any enterprise in the enterprise permission set needs to share the generated enterprise external interaction data to enterprise personnel of other enterprises not belonging to the enterprise permission set, generating permission change requests, sending the permission change requests to staff corresponding to all enterprises in all enterprise permission sets, and after all staff confirms the permission change requests, obtaining data sharing permission by the corresponding other enterprises, and re-encrypting the enterprise external interaction data;
it should be further noted that, in the implementation process, the process of re-encrypting the external interaction data of the enterprise includes:
adding other enterprises obtaining sharing rights into the enterprise rights set, obtaining identification sequences of index links corresponding to all enterprises in the enterprise rights set and login accounts of staff, and randomly arranging the identification sequences to obtain corresponding character strings;
converting the obtained character string into a binary character string, and converting the obtained binary character string into a hexadecimal character string;
encrypting the obtained hexadecimal character string through an RSA encryption algorithm to obtain a corresponding public key and a private key;
encrypting the generated interaction data and interaction logs according to the obtained public key, and then sending the obtained private key to enterprise staff corresponding to all enterprises in the corresponding enterprise permission set;
the enterprise employee decrypts the generated interaction data with the obtained private key.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.
Claims (2)
1. An enterprise online interaction data management method is characterized by comprising the following steps:
step S1: creating an enterprise online interaction platform and setting a data interaction end for online interaction of an enterprise;
step S2: processing interaction data generated in the enterprise online interaction process and generating a corresponding interaction log;
step S3: performing online authority management on the processed interactive data;
the construction process of the enterprise online interaction platform comprises the following steps:
an enterprise online interaction platform is constructed, and a permission application unit for applying permissions is arranged in the enterprise online interaction platform;
the enterprise inputs the basic information of the enterprise through the authority application unit, and the input basic information of the enterprise is audited;
after the auditing is passed, establishing an enterprise interaction space associated with the enterprise;
setting unique and mutually different identification sequences for the established enterprise interaction space, and establishing corresponding index links according to the identification sequences;
establishing a data interaction end, and linking the data interaction end with an enterprise interaction space through index linking;
the interactive data generated by the enterprise online interactive process comprises enterprise internal interactive data and enterprise external interactive data;
marking interaction data generated by online interaction of staff of the same enterprise in an enterprise interaction space as enterprise internal interaction data;
marking interaction data generated by online interaction of different enterprise staff in a data interaction terminal as enterprise external interaction data;
the process of processing the interactive data generated by the enterprise online interactive process comprises the following steps:
when the interactive data generated in the enterprise online interaction process is the enterprise internal interactive data, acquiring the authority level of staff performing online interaction, wherein the authority level comprises a primary authority, a secondary authority and a tertiary authority;
when the authority levels of the staff performing online interaction are all first-level authority, marking the interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space;
when the authority level of the staff performing online interaction is the second-level authority or the third-level authority, marking interaction data generated by the online interaction, generating a corresponding interaction log, and storing the generated interaction log in an enterprise interaction space;
when the interactive data generated in the enterprise online interactive process is external interactive data of the enterprise;
marking enterprises corresponding to staff performing online interaction, and acquiring identification sequences of index links corresponding to the enterprises;
establishing a temporary interaction space in the data interaction end, taking the acquired identification sequence as access authentication of the temporary interaction space, and accessing staff from each enterprise into the temporary interaction space;
after online interaction is completed in the temporary interaction space, the generated interaction data are stored, corresponding interaction logs are generated, and meanwhile the temporary interaction space is invalid;
correlating the saved interaction data and interaction logs with all enterprise staff accessed into the temporary interaction space, and completing encryption of the interaction data and the interaction logs;
the process of performing online authority management on the processed interaction data comprises the following steps:
when the interactive data generated in the online interaction process of the enterprise is the internal interactive data of the enterprise, when staff performing online interaction needs to online share all or part of the generated interactive data to other staff, a data sharing request is generated, the data sharing request is sent to all staff performing online interaction, and after all staff performing online interaction agree, the data content to be shared is shared to other corresponding staff;
when the interactive data generated in the enterprise online interaction process is the external interactive data of the enterprise, acquiring all enterprises related to the external interactive data of the enterprise, and acquiring an enterprise authority set;
when any enterprise in the enterprise permission set needs to share the generated enterprise external interaction data to enterprise personnel working hours of other enterprises not belonging to the enterprise permission set, a permission change request is generated, the permission change request is sent to staff corresponding to all enterprises in all enterprise permission sets, and after all staff confirm the permission change request, the corresponding other enterprises acquire data sharing permission and re-encrypt the enterprise external interaction data.
2. The method for managing online interaction data of enterprises according to claim 1, wherein the encryption process for the interaction data and the interaction log comprises:
acquiring identification sequences of index links corresponding to enterprises where all enterprise employees are located and login accounts of the employees, and randomly arranging the identification sequences to obtain corresponding character strings;
converting the obtained character string into a binary character string, and converting the obtained binary character string into a hexadecimal character string;
encrypting the obtained hexadecimal character string through an RSA encryption algorithm to obtain a corresponding public key and a private key;
encrypting the generated interaction data and interaction logs according to the obtained public key, and then sending the obtained private key to corresponding enterprise staff;
the enterprise employee decrypts the generated interaction data with the obtained private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310223721.8A CN115906142B (en) | 2023-03-09 | 2023-03-09 | Enterprise online interaction data management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310223721.8A CN115906142B (en) | 2023-03-09 | 2023-03-09 | Enterprise online interaction data management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115906142A CN115906142A (en) | 2023-04-04 |
CN115906142B true CN115906142B (en) | 2023-07-25 |
Family
ID=86485734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310223721.8A Active CN115906142B (en) | 2023-03-09 | 2023-03-09 | Enterprise online interaction data management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115906142B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111046421A (en) * | 2019-11-28 | 2020-04-21 | 郑州财经学院 | Enterprise management sharing method based on APP |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320139A (en) * | 2018-03-14 | 2018-07-24 | 吉志勇 | Enterprise Internet-based and personal interactive system and its application process |
CN111431896A (en) * | 2020-03-20 | 2020-07-17 | 上海中通吉网络技术有限公司 | Data sharing method and system |
CN112163793B (en) * | 2020-10-30 | 2024-08-02 | 中京恒瑞国际软件有限公司 | EBC technology platform and interaction method for organizing service collaboration and data intercommunication sharing of EB technology platform |
CN114390239B (en) * | 2021-12-23 | 2022-11-25 | 北京百度网讯科技有限公司 | Communication method, device, system, electronic device, and storage medium |
-
2023
- 2023-03-09 CN CN202310223721.8A patent/CN115906142B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111046421A (en) * | 2019-11-28 | 2020-04-21 | 郑州财经学院 | Enterprise management sharing method based on APP |
Also Published As
Publication number | Publication date |
---|---|
CN115906142A (en) | 2023-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11314891B2 (en) | Method and system for managing access to personal data by means of a smart contract | |
CN111783075B (en) | Authority management method, device and medium based on secret key and electronic equipment | |
US10356062B2 (en) | Data access control utilizing key restriction | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
US20180270051A1 (en) | Multiple authority key derivation | |
US9031876B2 (en) | Managing keys for encrypted shared documents | |
US11120144B1 (en) | Methods and systems providing central management of distributed de-identification and tokenization software for sharing data | |
US20160191993A1 (en) | Source identification for unauthorized copies of content | |
US20070150299A1 (en) | Method, system, and apparatus for the management of the electronic files | |
CN109241753A (en) | A kind of data sharing method and system based on block chain | |
CN106506159A (en) | Encryption method and equipment for key safety | |
WO2021003977A1 (en) | Default information query method and apparatus, and computer device and storage medium | |
CN110932859B (en) | User information processing method, apparatus, device and readable storage medium | |
JP7235668B2 (en) | REGISTRATION METHOD, COMPUTER AND PROGRAM | |
US11556667B2 (en) | Facilitating processing of a query on shareable data in a temporary vault | |
EP3185465A1 (en) | A method for encrypting data and a method for decrypting data | |
CN111639952A (en) | Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain | |
CN110889121A (en) | Method, server and storage medium for preventing data leakage | |
CN107409129A (en) | Use the mandate in accesses control list and the distributed system of group | |
KR102131206B1 (en) | Method, service server and authentication server for providing corporate-related services, supporting the same | |
CN106326666A (en) | Health record information management service system | |
CN113592497A (en) | Financial transaction service security authentication method and device based on block chain | |
CN115906142B (en) | Enterprise online interaction data management method | |
CN106529216A (en) | Software authorization system based on public storage platforms and software authorization method | |
TWI737139B (en) | Personal data protection application system and personal data protection application method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |