CN117077098A - Information processing method, apparatus, electronic device and storage medium - Google Patents

Information processing method, apparatus, electronic device and storage medium Download PDF

Info

Publication number
CN117077098A
CN117077098A CN202311115632.8A CN202311115632A CN117077098A CN 117077098 A CN117077098 A CN 117077098A CN 202311115632 A CN202311115632 A CN 202311115632A CN 117077098 A CN117077098 A CN 117077098A
Authority
CN
China
Prior art keywords
information
recycle bin
resource information
access right
restored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311115632.8A
Other languages
Chinese (zh)
Inventor
张�荣
刘文曜
魏红强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311115632.8A priority Critical patent/CN117077098A/en
Publication of CN117077098A publication Critical patent/CN117077098A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides an information processing method, an information processing device, electronic equipment and a storage medium, and relates to the technical field of computers or the technical field of finance. The method comprises the following steps: responding to a reduction request for reducing the information to be reduced in the recycle bin information table, and determining a recycle bin access right result based on the reduction request; under the condition that the access right result of the recycle bin is used for representing that the recycle bin has the access right, determining whether the resource information management table comprises information to be restored or not; under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information management table through a recycle bin interface; and deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.

Description

Information processing method, apparatus, electronic device and storage medium
Technical Field
The present disclosure relates to the field of computer technology or financial technology, and more particularly, to an information processing method, apparatus, electronic device, and storage medium.
Background
With the continuous change of operation and maintenance requirements, operations such as deleting the resource information of the unified nanotubes are required, and the deleted resource information is usually temporarily stored in a recycle bin. The resource information temporarily stored in the recycle bin is deleted in the common list, but the resource information list of the recycle bin and the common list share one database table, namely the deleted resource information can still be accessed in the database table.
In the process of implementing the disclosed concept, the inventor finds that at least the following problems exist in the related art: because the resource information list of the recycle bin and the common list share one database table, the problems of lower system operation performance and lower system safety may exist.
Disclosure of Invention
In view of this, the present disclosure provides an information processing method, apparatus, electronic device, and storage medium.
One aspect of the present disclosure provides an information processing method including: responding to a restoration request for restoring the information to be restored in the recycle bin information table, and determining a recycle bin access right result based on the restoration request; under the condition that the access right result of the recycle bin is used for representing that the recycle bin has access right, determining whether the resource information management table comprises the information to be restored or not; under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information management table through a recycle bin interface; and deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.
According to an embodiment of the present disclosure, in response to a deletion request for deleting information to be deleted in the above-described resource information management table, a first resource information access right result is determined based on the above-described deletion request; deleting the information to be deleted from the resource information management table under the condition that the first resource information access right result is determined to be used for representing that the first resource information access right exists; and adding the information to be deleted into a recycle bin information table through the recycle bin interface.
According to an embodiment of the present disclosure, the determining, based on the deletion request, a first resource information access right result includes: determining a login identifier based on the deletion request; and determining the first resource information access right result based on the login identifier and the right access mapping table, wherein the right access mapping table is used for representing the mapping relation between the login identifier and the resource information access right result.
According to an embodiment of the present disclosure, in response to an addition request for adding target information, a second resource information access right result is determined based on the above-described addition request; and adding the target information into the resource information management table under the condition that the second resource information access right result is determined to be used for representing that the second resource information has the access right.
According to an embodiment of the present disclosure, in response to a query request for querying information in a resource information management table, a third resource information access right result is determined based on the above-described query request; determining feedback information matched with the query request from the resource information management table based on the query request under the condition that the third resource information access right result is determined to be used for representing that the third resource information access right result has access right; shielding the feedback sub-information of the preset type in the feedback information to obtain target feedback information; and displaying the target feedback information.
According to an embodiment of the present disclosure, in response to receiving a login request; determining a login identification from the login request; determining a login password matched with the login identifier from a password table based on the login identifier; and generating the restore request based on the login identifier, the login password and the information to be restored.
Another aspect of the present disclosure provides an information processing apparatus including: the access right determining module is used for responding to a restoration request for restoring the information to be restored in the recycle bin information table and determining a recycle bin access right result based on the restoration request; the information to be restored determining module is used for determining whether the resource information management table comprises the information to be restored or not under the condition that the access right result of the recycle bin is determined to be used for representing the access right; the information reduction module is used for reducing the information to be reduced in the recycle bin information table into the resource information management table through a recycle bin interface under the condition that the information to be reduced does not exist in the resource information management table; and the information deleting module is used for deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.
Another aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more instructions that, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, cause the processor to implement a method as described above.
Another aspect of the present disclosure provides a computer program product comprising computer executable instructions which, when executed, are adapted to carry out a method as described above.
According to the embodiment of the disclosure, in the case of receiving the restoration request for restoring the information to be restored in the recycle bin information table, determining the recycle bin access right result based on the restoration request is adopted; under the condition that the access right result of the recycle bin is used for representing that the recycle bin has the access right, determining whether the resource information management table comprises information to be restored or not; and under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information association table through the recycle bin interface, and under the condition that the information to be restored exists in the resource information management table, deleting the information to be restored of the recycle bin information table through the recycle bin interface. The resource information in the recycle bin is independently managed by establishing an independent recycle bin information table and a resource information table, so that the recycle bin information table and the resource information table are not interfered with each other, and the technical effect of improving the system operation performance and the safety is achieved by determining the recycle bin access authority result of the recovery request and using the set recycle bin interface to provide service for the user with the access authority under the condition that the recycle bin access authority result is used for representing the access authority.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments thereof with reference to the accompanying drawings in which:
fig. 1 schematically illustrates application scenarios of an information processing method, apparatus, electronic device, and storage medium according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an information processing method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of adding information to be deleted, according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a flow chart for querying information in a resource information management table according to an embodiment of the present disclosure;
fig. 5 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure; and
fig. 6 schematically shows a block diagram of an electronic device adapted to implement an information processing method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
It should be noted that the information processing method and apparatus of the present disclosure may be used in the financial field, and may be used in any field other than the financial field, and the application field of the information processing method and apparatus is not limited by the present disclosure.
In the research process, along with the continuous improvement of the importance of resource management, many enterprises or individuals adopt a user centralized management system to uniformly manage resource information, wherein the resource information can be resource and user information. The resource information of the nano tube in the system can realize the security guarantee such as operation check in the operation and maintenance process, so the resource needing the nano tube is completely contained according to the security requirement. However, as the operation and maintenance requirements change, some of the nanotube resources and user information need to be removed from the library, deleted or modified into other contents, but when the resource information needs to be reused after being deleted or the deleting action is only misoperation of operation and maintenance personnel, timely restoration is very important to the operation and maintenance efficiency. Therefore, a recycle bin is usually provided, and the recycle bin can temporarily store the resource information deleted from the common resource list and support the operations of restoring and thoroughly deleting the resource information.
However, the existing recycle bin still has the following problems that although the resource information is deleted in the common list and stored in the recycle bin, the deleted resource information and the undeleted resource information share the same database table, when common authority operation and maintenance personnel re-add the same resource information in the common resource list, the retrieval function informs that the resource information cannot be repeatedly added, and the common authority operation and maintenance personnel have no account number recycle bin authority and cannot check whether the resource information exists in the recycle bin, so that the resource addition is blocked; and the resource information of the recycle bin can still be accessed or called by other functions, so that the problem of system operation performance intersection exists in the related technology, the system safety is low, and the safety of the deleted resource information cannot be ensured.
In view of this, an embodiment of the present disclosure provides an information processing method, including: responding to a reduction request for reducing the information to be reduced in the recycle bin information table, and determining a recycle bin access right result based on the reduction request; under the condition that the access right result of the recycle bin is used for representing that the recycle bin has the access right, determining whether the resource information management table comprises information to be restored or not; under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information management table through a recycle bin interface; and deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.
Fig. 1 schematically illustrates an application scenario of an information processing method, apparatus, electronic device, and storage medium according to an embodiment of the present disclosure.
It should be noted that fig. 1 illustrates only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but it does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments, or scenarios.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired and/or wireless communication links, and the like.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications may be installed on the terminal devices 101, 102, 103, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients and/or social platform software, to name a few.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the information processing method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the information processing system provided by the embodiments of the present disclosure may be generally provided in the server 105. The information processing method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the information processing system provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Alternatively, the information processing method provided by the embodiment of the present disclosure may be performed by the terminal apparatus 101, 102, or 103, or may be performed by another terminal apparatus other than the terminal apparatus 101, 102, or 103. Accordingly, the information processing system provided by the embodiments of the present disclosure may also be provided in the terminal apparatus 101, 102, or 103, or in another terminal apparatus different from the terminal apparatus 101, 102, or 103.
For example, the restoration request of the information to be restored may be originally received by any one of the terminal devices 101, 102, or 103 (for example, but not limited to, the terminal device 101). Then, the terminal device 101 may locally execute the information processing method provided by the embodiment of the present disclosure, or receive a restoration request of information to be restored by another terminal device, a server, or a server cluster, and execute the information processing method provided by the embodiment of the present disclosure by another terminal device, a server, or a server cluster that receives the restoration request.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flowchart of an information processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S240.
In operation S210, in response to a restoration request for restoring information to be restored in the recycle bin information table, a recycle bin access right result is determined based on the restoration request.
According to the embodiment of the disclosure, in the case of receiving a restore request, requester information for sending the restore request is determined from the restore request, so as to determine a recycle bin access right result. For example: the request identifier may be obtained from the restore request, and the request identifier may be compared with a first predetermined white list, so as to determine a result of access rights of the recycle bin, where the first predetermined white list may include the request identifier having access rights of the recycle bin and a result of access rights of the recycle bin corresponding to the request identifier.
According to the embodiment of the disclosure, whether the restoration request has the authority is determined through the restoration request, so that the restoration request which does not contain the access authority of the recycle bin is refused, and the information security of the resource information temporarily stored in the recycle bin can be better ensured.
In operation S220, in case it is determined that the recycle bin access right result is used to characterize having access right, it is determined whether the information to be restored is included in the resource information management table.
In accordance with an embodiment of the present disclosure, it is determined to reject the restore request in the event that it is determined that the recycle bin access rights result is used to characterize no access rights.
According to embodiments of the present disclosure, the resource information management table may be a database table, i.e., a list in which all resource information is stored.
According to the embodiment of the disclosure, under the condition that the access right result of the recycle bin is determined to be used for representing that the recycle bin has the access right, whether the resource information management table comprises the information to be restored or not can be further determined, and the problem of repeated error reporting of data caused by the existence of the information to be restored in the resource information management table is avoided.
In operation S230, in case it is determined that the information to be restored does not exist in the resource information management table, the information to be restored in the recycle bin information table is restored to the resource information management table through the recycle bin interface.
According to the embodiment of the disclosure, the resource information management table and the recycle bin information table are two tables which are separately managed, and the resource information in the two tables is not interfered with each other, i.e. the same resource information can exist in the resource information management table and the recycle bin information management table.
According to the embodiment of the disclosure, under the condition that the information to be restored does not exist in the resource information management table, the information to be restored in the recycle bin information table can be restored to the resource information management table through the recycle bin interface, so that restoration of the information to be restored is realized.
In operation S240, in case it is determined that the information to be restored exists in the resource information management table, the information to be restored in the recycle bin information table is deleted through the recycle bin interface.
According to the embodiment of the disclosure, the information deleted in the recycle bin information table is completely deleted, and the recovery cannot be performed.
According to an embodiment of the present disclosure, for users without access rights to the recycle bin, the recycle bin is in a black box state.
According to the embodiment of the disclosure, the recycle bin interface performs interface shielding on functions except for the functions related to the recycle bin, such as recovering the resource information in the recycle bin information table, deleting the resource information in the recycle bin information table, inquiring the resource information in the recycle bin information table, and the like, and the functions except for the functions cannot be generally called on the recycle bin interface, so that the condition that the deleted resource information can still be called by other functions is avoided.
According to the embodiment of the disclosure, the recycle bin performs interface shielding on the functions except the information to be restored and the information to be deleted, so that the resource information in the recycle bin information table is not accessed when the other functions are called, the polling calling range of the other functions is reduced, and the system performance is improved.
According to the embodiment of the disclosure, when it is determined that the information to be restored exists in the resource information management table, the information to be restored in the recycle bin information table can be deleted, so that the situation that deletion cannot be performed due to repeated information in the recycle bin information table when the information to be restored in the resource information management table is deleted later is avoided, wherein other functions can be account authority application, resource nano-tubes, man-machine separation interface access and the like.
According to the embodiment of the disclosure, in the case of receiving the restoration request for restoring the information to be restored in the recycle bin information table, determining the recycle bin access right result based on the restoration request is adopted; under the condition that the access right result of the recycle bin is used for representing that the recycle bin has the access right, determining whether the resource information management table comprises information to be restored or not; and under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information association table through the recycle bin interface, and under the condition that the information to be restored exists in the resource information management table, deleting the information to be restored of the recycle bin information table through the recycle bin interface. The resource information in the recycle bin is independently managed by establishing an independent recycle bin information table and a resource information table, so that the recycle bin information table and the resource information table are not interfered with each other, and the technical effect of improving the system operation performance and the safety is achieved by determining the recycle bin access authority result of the recovery request and using the set recycle bin interface to provide service for the user with the access authority under the condition that the recycle bin access authority result is used for representing the access authority.
The method shown in fig. 2 is further described below with reference to fig. 3-4 in conjunction with the exemplary embodiment.
Fig. 3 schematically illustrates a flowchart of adding information to be deleted according to an embodiment of the present disclosure.
As shown in fig. 3, adding the information to be deleted includes operations S310 to S330.
In operation S310, in response to a deletion request for deleting information to be deleted in the resource information management table, a first resource information access right result is determined based on the deletion request.
In operation S320, in case it is determined that the first resource information access right result is used to characterize having access right, the information to be deleted is deleted from the resource information management table.
In operation S330, the information to be deleted is added to the recycle bin information table through the recycle bin interface.
According to the embodiment of the disclosure, in the case of receiving a deletion request for deleting information to be deleted in the resource information management table, a first resource information access right result for transmitting the deletion request may be determined based on the deletion request, and a determination manner of the first resource information access right result for the deletion request is not limited, for example, the requester information of the deletion request may be determined by the deletion request, and the requester information may be compared with a second predetermined white list corresponding to the resource information management table, so as to determine a first resource information access right result, and the second predetermined white list may include a requester identifier having the right of the resource information management table and the first resource information access right result corresponding to the requester identifier.
According to the embodiment of the disclosure, in the case that the first resource information access right result is determined to be used for representing that the first resource information has no access right, the deletion request is refused, that is, the information to be deleted is not deleted from the resource information management table.
According to the embodiment of the disclosure, in the case of deleting the information to be deleted from the resource information management table, the information to be deleted can be added to the information table of the recycle bin through the recycle bin interface, so that the deletion of the information in the resource information management table is realized, and the information deleted in the resource information management table is added to the information table of the recycle bin.
According to the embodiment of the disclosure, the deletion request without the authority is refused by determining the access authority result of the first resource information based on the deletion request, so that the information security of the information in the resource information management table is protected. By deleting the information to be deleted from the resource information management table and calling the recycle bin interface under the condition that the first resource information access right result is used for representing that the access right exists, the information to be deleted is added into the recycle bin information table, the information to be deleted can be thoroughly deleted in the resource information management table, and the information to be deleted is added into the recycle bin information table by calling the recycle bin interface, and the recycle bin information table and the resource information management table are mutually independent, the recycle bin information table is temporarily stored in the recycle bin information table but cannot be influenced when the resource information management table is operated, meanwhile, the information to be deleted which is mistakenly deleted or is still required to be used later can be restored from the recycle bin information table, and the restoring efficiency is further improved.
According to an embodiment of the present disclosure, determining the first resource information access right result based on the deletion request may include the following operations.
Determining a login identification based on the deletion request; and determining a first resource information access right result based on the login identification and the right access mapping table, wherein the right access mapping table is used for representing the mapping relation between the login identification and the resource information access right result.
According to embodiments of the present disclosure, the login identification is not limited, and may be any identification that characterizes the identity of the requestor that sent the delete request, such as: a login account or name, etc.
According to the embodiment of the disclosure, whether the identifier matched with the login identifier exists in the authority access mapping table is determined through the login identifier, so that a first resource information access authority result is obtained.
According to the embodiment of the disclosure, the authority access mapping table comprises a login identifier and a resource information access authority result corresponding to the login identifier.
According to the embodiment of the disclosure, in the case that the identifier matched with the login identifier exists, the first resource information access right result is considered to be having the access right.
According to the embodiment of the disclosure, in the case that the identifier matched with the login identifier does not exist, the first resource information access right is considered to be the result of not having the access right
According to the embodiment of the disclosure, the deletion request is subjected to authority verification, so that the safety of the resource information in the resource information management table can be better ensured, the situation that unauthorized personnel delete by mistake and the like is avoided, and the system safety is improved.
According to an embodiment of the present disclosure, the information processing method may further include the following operations.
Determining a second resource information access right result based on the addition request in response to the addition request for adding the target information; and adding the target information to the resource information management table in the case that the second resource information access right result is determined to be used for representing that the second resource information has the access right.
According to the embodiment of the disclosure, in the case that the permission of adding the target information is received, permission verification still needs to be performed, and the permission verification process may be that a login identifier is determined from the adding request, and a second resource information access permission result is determined based on the login identifier and the permission access mapping table.
According to the embodiment of the disclosure, when the condition that the access right is verified, the target information can be directly added into the resource information management table, and the resource information management table and the recycle bin information table are not related to each other, so that whether the target information exists in the recycle bin information table or not is not required to be determined, the target information can be directly added into the resource information management table, even if the target information exists in the recycle bin information table, the process of adding the target information into the resource information management table is not interfered, namely, the problem that the resource information cannot be added into the resource information management table if certain resource information exists in a recycle bin in the related technology is at least partially solved, the problem that the resource information addition is blocked is solved, and the improvement of the information nanotube efficiency and the improvement of the work efficiency of operation and maintenance personnel without the access right of the recycle bin are realized.
Fig. 4 schematically illustrates a flowchart of querying information in a resource information management table according to an embodiment of the present disclosure.
As shown in fig. 4, querying the information in the resource information management table includes operations S410 to S440.
In operation S410, in response to a query request for querying information in the resource information management table, a third resource information access right result is determined based on the query request.
In case it is determined that the third resource information access right result is used to characterize having access right, feedback information matching the query request is determined from the resource information management table based on the query request in operation S420.
In operation S430, a predetermined type of feedback sub-information in the feedback information is masked to obtain target feedback information.
In operation S440, target feedback information is presented.
According to the embodiment of the disclosure, in the case of receiving the query request for querying the information in the resource information management table, the access right verification is still performed on the query request, where the access right verification process of the query request is not limited, a login identifier may be determined for the query request, and the third resource information access right result may be determined based on the login identifier and the right access mapping table.
According to an embodiment of the present disclosure, the request content may be determined based on the query request, so that feedback information matching the query request may be determined in the resource information management table by the request content. The request content may include information such as query information identification, query information keywords, and the like.
According to the embodiment of the disclosure, a predetermined type may be set according to an actual situation, and the feedback sub-information of the predetermined type is masked, so as to obtain target feedback information, where the feedback sub-information of the predetermined type is not limited, for example: the resource information with the time of a predetermined time period may be added, or the resource information which is only accessible by having a higher access right may be added. Specifically, the method comprises the following steps: and acquiring a plurality of feedback sub-information through the query request, identifying the adding time of the plurality of feedback sub-information, and screening out the feedback sub-information with the adding time being a preset time period, thereby obtaining target feedback information. Or in order to determine the authority level of the login identification of the query request, taking the feedback sub-information matched with the authority level as target feedback sub-information.
According to the embodiment of the disclosure, the resource information management table and the recycle bin information table are mutually independent, so that the resource information in the recycle bin information table is not queried when the resource information management table is queried, the resource information in the recycle bin information table is not accessed by a user without authority, and the problem that the resource information placed in the recycle bin is still likely to be accessed and called is avoided. Thus, the security of the information added to the recycle bin is further ensured and the amount of query data is reduced. Meanwhile, when the resource information in the resource information management table is queried, the feedback sub-information of a preset type is shielded, so that the safety of the information management of the resource information management table is further improved.
According to an embodiment of the present disclosure, the information processing method may further include the following operations.
Responding to the received login request; determining a login identification from the login request; determining a login password matched with the login identifier from a password table based on the login identifier; and generating a restoration request based on the login identification, the login password and the information to be restored.
According to an embodiment of the present disclosure, the login identifier, the login password, and the information to be restored may be included in the restore request, and the information to be restored may include an identifier of the information to be restored, a keyword of the information to be restored, and the like may represent the information to be restored.
According to the embodiment of the disclosure, under the condition that a login request is received, the login password matched with the login identifier can be directly determined from the password table based on the login identifier in the login request, so that an initiator of the login request cannot learn the login password, and only when the initiator of the login request has login permission, the login can be performed, thereby ensuring the separation of man-machine passwords and further ensuring the security of a system.
It should be noted that, unless there is an execution sequence between different operations or an execution sequence between different operations in technical implementation, the execution sequence between multiple operations may be different, and multiple operations may also be executed simultaneously in the embodiment of the disclosure.
Fig. 5 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the information processing apparatus 500 includes an access right determination module 510, an information to be restored determination module 520, an information restoration module 530, and an information deletion module 540.
The access right determining module 510 is configured to determine, in response to a restoration request for restoring information to be restored in the recycle bin information table, a recycle bin access right result based on the restoration request.
The to-be-restored information determining module 520 is configured to determine whether the resource information management table includes to-be-restored information if it is determined that the access right result of the recycle bin is used to characterize having access rights.
The information restoring module 530 is configured to restore the information to be restored in the recycle bin information table to the resource information management table through the recycle bin interface when it is determined that the information to be restored does not exist in the resource information management table.
The information deleting module 540 is configured to delete the information to be restored in the recycle bin information table through the recycle bin interface when it is determined that the information to be restored exists in the resource information management table.
According to an embodiment of the present disclosure, the information processing apparatus 500 further includes: the system comprises a first access right determining module, an information deleting module to be deleted and an information adding module.
The first access right determining module is used for responding to a deleting request for deleting the information to be deleted in the resource information management table, and determining a first resource information access right result based on the deleting request.
And the information to be deleted deleting module is used for deleting the information to be deleted from the resource information management table under the condition that the first resource information access right result is determined to be used for representing that the first resource information access right result has access right. And
and the information adding module is used for adding the information to be deleted into the recycle bin information table through the recycle bin interface.
According to an embodiment of the present disclosure, the first access right determining module includes: the login identification determination submodule and the access right determination submodule.
The login identification determining submodule is used for determining the login identification based on the deletion request.
The access right determining sub-module is used for determining a first resource information access right result based on the login identification and the right access mapping table, wherein the right access mapping table is used for representing the mapping relation between the login identification and the resource information access right result.
According to an embodiment of the present disclosure, the information processing apparatus 500 further includes: the system comprises a second access right determining module and a target information adding module.
And the second access right determining module is used for responding to the adding request for adding the target information and determining a second resource information access right result based on the adding request.
And the target information adding module is used for adding the target information into the resource information management table under the condition that the second resource information access right result is determined to be used for representing that the second resource information access right result has the access right.
According to an embodiment of the present disclosure, the information processing apparatus 500 further includes: the system comprises a third access right determining module, a feedback information determining module, a target feedback information determining module and a target feedback information displaying module.
And the third access right determining module is used for responding to the query request for querying the information in the resource information management table and determining a third resource information access right result based on the query request.
And the feedback information determining module is used for determining feedback information matched with the query request from the resource information management table based on the query request under the condition that the third resource information access right result is determined to be used for representing the access right.
And the target feedback information determining module is used for shielding the feedback sub-information of the preset type in the feedback information to obtain target feedback information.
And the target feedback information display module is used for displaying the target feedback information.
According to an embodiment of the present disclosure, the information processing apparatus 500 further includes: the device comprises a request receiving module, a login identification determining module, a login password determining module and a restoration request generating module.
And the request receiving module is used for responding to the received login request.
And the login identification determining module is used for determining the login identification from the login request.
And the login password determining module is used for determining the login password matched with the login identifier from the password table based on the login identifier.
And the restoration request generation module is used for generating a restoration request based on the login identification, the login password and the information to be restored.
Any number of modules, sub-modules, units, sub-units, or at least some of the functionality of any number of the sub-units according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented as split into multiple modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in any other reasonable manner of hardware or firmware that integrates or encapsulates the circuit, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be at least partially implemented as computer program modules, which when executed, may perform the corresponding functions.
For example, any of the access right determining module 510, the information to be restored determining module 520, the information restoring module 530, and the information deleting module 540 may be combined in one module/unit/sub-unit, or any of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least some of the functionality of one or more of these modules/units/sub-units may be combined with at least some of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to embodiments of the present disclosure, at least one of the access rights determination module 510, the information to be restored determination module 520, the information restoration module 530, and the information deletion module 540 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of any of the three implementations of software, hardware, and firmware. Alternatively, at least one of the access right determining module 510, the information to be restored determining module 520, the information restoring module 530, and the information deleting module 540 may be at least partially implemented as a computer program module, which may perform a corresponding function when being executed.
It should be noted that, in the embodiment of the present disclosure, the information processing apparatus portion corresponds to the information processing method portion in the embodiment of the present disclosure, and the description of the information processing apparatus portion specifically refers to the information processing method portion, which is not described herein.
Fig. 6 schematically shows a block diagram of an electronic device adapted to implement an information processing method according to an embodiment of the disclosure. The computer system illustrated in fig. 6 is merely an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 6, a computer system 600 according to an embodiment of the present disclosure includes a processor 601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. The processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 601 may also include on-board memory for caching purposes. The processor 601 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 603, various programs and data required for the operation of the system 600 are stored. The processor 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. The processor 601 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 602 and/or the RAM 603. Note that the program may be stored in one or more memories other than the ROM 602 and the RAM 603. The processor 601 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the system 600 may further include an input/output (I/O) interface 605, the input/output (I/O) interface 605 also being connected to the bus 604. The system 600 may also include one or more of the following components connected to an input/output (I/O) interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to an input/output (I/O) interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on drive 610 so that a computer program read therefrom is installed as needed into storage section 608.
According to embodiments of the present disclosure, the method flow according to embodiments of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 602 and/or RAM 603 and/or one or more memories other than ROM 602 and RAM 603 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program comprising program code for performing the methods provided by the embodiments of the present disclosure, the program code for causing an electronic device to carry out the information processing methods provided by the embodiments of the present disclosure when the computer program product is run on the electronic device.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of signals over a network medium, and downloaded and installed via the communication section 609, and/or installed from the removable medium 611. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (10)

1. An information processing method, comprising:
responding to a reduction request for reducing the information to be reduced in the recycle bin information table, and determining a recycle bin access right result based on the reduction request;
under the condition that the access right result of the recycle bin is used for representing that the recycle bin has access right, determining whether the resource information management table comprises the information to be restored or not;
under the condition that the information to be restored does not exist in the resource information management table, restoring the information to be restored in the recycle bin information table into the resource information management table through a recycle bin interface;
And deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.
2. The method of claim 1, further comprising:
determining a first resource information access right result based on a deletion request for deleting information to be deleted in the resource information management table;
deleting the information to be deleted from the resource information management table under the condition that the first resource information access right result is determined to be used for representing that the first resource information access right result has access rights; and
and adding the information to be deleted into a recycle bin information table through the recycle bin interface.
3. The method of claim 2, wherein the determining a first resource information access rights result based on the delete request comprises:
determining a login identification based on the deletion request; and
and determining the first resource information access right result based on the login identification and the right access mapping table, wherein the right access mapping table is used for representing the mapping relation between the login identification and the resource information access right result.
4. The method of claim 1, further comprising:
determining a second resource information access right result based on an addition request for adding target information in response to the addition request;
and adding the target information into the resource information management table under the condition that the second resource information access right result is determined to be used for representing that the second resource information has the access right.
5. The method of claim 1, further comprising:
determining a third resource information access right result based on a query request for querying information in a resource information management table in response to the query request;
determining feedback information matched with the query request from the resource information management table based on the query request under the condition that the third resource information access right result is determined to be used for representing the access right;
shielding feedback sub-information of a preset type in the feedback information to obtain target feedback information; and
and displaying the target feedback information.
6. The method of claim 1, further comprising:
responding to the received login request;
determining a login identification from the login request;
determining a login password matched with the login identifier from a password table based on the login identifier; and
And generating the restoration request based on the login identification, the login password and the information to be restored.
7. An information processing apparatus comprising:
the access right determining module is used for responding to a restoration request for restoring the information to be restored in the recycle bin information table and determining a recycle bin access right result based on the restoration request;
the information to be restored determining module is used for determining whether the resource information management table comprises the information to be restored or not under the condition that the access right result of the recycle bin is determined to be used for representing the access right;
the information reduction module is used for reducing the information to be reduced in the recycle bin information table to the resource information management table through a recycle bin interface under the condition that the information to be reduced does not exist in the resource information management table;
and the information deleting module is used for deleting the information to be restored in the recycle bin information table through the recycle bin interface under the condition that the information to be restored exists in the resource information management table.
8. An electronic device, comprising:
one or more processors;
a memory for storing one or more instructions,
Wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 6.
9. A computer readable storage medium having stored thereon executable instructions which when executed by a processor cause the processor to implement the method of any of claims 1 to 6.
10. A computer program product comprising computer executable instructions for implementing the method of any one of claims 1 to 6 when executed.
CN202311115632.8A 2023-08-31 2023-08-31 Information processing method, apparatus, electronic device and storage medium Pending CN117077098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311115632.8A CN117077098A (en) 2023-08-31 2023-08-31 Information processing method, apparatus, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311115632.8A CN117077098A (en) 2023-08-31 2023-08-31 Information processing method, apparatus, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117077098A true CN117077098A (en) 2023-11-17

Family

ID=88711506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311115632.8A Pending CN117077098A (en) 2023-08-31 2023-08-31 Information processing method, apparatus, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117077098A (en)

Similar Documents

Publication Publication Date Title
US10614233B2 (en) Managing access to documents with a file monitor
US11188667B2 (en) Monitoring and preventing unauthorized data access
CN109522751B (en) Access right control method and device, electronic equipment and computer readable medium
US11750652B2 (en) Generating false data for suspicious users
US10891357B2 (en) Managing the display of hidden proprietary software code to authorized licensed users
US8341733B2 (en) Creating secured file views in a software partition
CN114207614A (en) Safety investigation platform
CN109542764B (en) Webpage automatic testing method and device, computer equipment and storage medium
US10628591B2 (en) Method for fast and efficient discovery of data assets
CN114175067A (en) Incident survey workspace generation and survey control
CN117077098A (en) Information processing method, apparatus, electronic device and storage medium
CN116561803A (en) Security policy information processing method, device, equipment and storage medium
US20230153457A1 (en) Privacy data management in distributed computing systems
US7664752B2 (en) Authorization over a distributed and partitioned management system
CN117171731A (en) Rights management method, device, equipment and storage medium
CN117176576A (en) Network resource changing method, device, equipment and storage medium
CN113760893A (en) Instruction control method, apparatus, computer system, and computer-readable storage medium
CN118034975A (en) Data processing method, device, equipment and storage medium
CN115563647A (en) Document display method and device, electronic equipment and medium
CN117592105A (en) Method for creating object set mapping, method and device for verifying object authority
CN116743457A (en) Cluster permission changing method and device, electronic equipment and storage medium
CN113946295A (en) Authority control method and device
CN116756753A (en) Operating system command control method, device, equipment, medium and product
CN117520130A (en) Log generation method, device, electronic equipment and storage medium
CN117744043A (en) Code obfuscation method, apparatus, device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination