CN117112116B - User management system based on digital government affairs - Google Patents

User management system based on digital government affairs Download PDF

Info

Publication number
CN117112116B
CN117112116B CN202311331465.0A CN202311331465A CN117112116B CN 117112116 B CN117112116 B CN 117112116B CN 202311331465 A CN202311331465 A CN 202311331465A CN 117112116 B CN117112116 B CN 117112116B
Authority
CN
China
Prior art keywords
demand
data
user
module
recommendation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311331465.0A
Other languages
Chinese (zh)
Other versions
CN117112116A (en
Inventor
魏杨
徐小芳
李舒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Rongtong Shuzhi Information Technology Co ltd
Original Assignee
Chengdu Rongtong Shuzhi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Rongtong Shuzhi Information Technology Co ltd filed Critical Chengdu Rongtong Shuzhi Information Technology Co ltd
Priority to CN202311331465.0A priority Critical patent/CN117112116B/en
Publication of CN117112116A publication Critical patent/CN117112116A/en
Application granted granted Critical
Publication of CN117112116B publication Critical patent/CN117112116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention belongs to the field of user management, relates to a data analysis technology, and is used for solving the problem that a user management system in the prior art is unfavorable for users to develop work by adopting a unified operation interface, in particular to a user management system based on digital government affairs, which comprises a user management platform, wherein the user management platform is in communication connection with a user end, an application end and a database, and the user end comprises a demand customization module and a customization recommendation module; the application end comprises a data encryption module and a data calling module; the demand customization module is used for carrying out demand customization analysis on the user: acquiring the position of a new user when the new user registers a user management platform, and calling a demand data set from a database through the position of the new user, wherein the demand data set comprises a general demand set and a customized demand set; according to the invention, the user can be subjected to demand customization analysis, each employee can carry out personalized customization on the platform operation interface according to own demand, and the operation convenience in working is improved.

Description

User management system based on digital government affairs
Technical Field
The invention belongs to the field of user management, relates to a data analysis technology, and particularly relates to a user management system based on digital government affairs.
Background
The user management system is designed based on the authority management of different roles, and users can distribute different roles and authorities according to the actual operation requirement, and realize different functions of various departments, different agents and subordinate operators in an operator on the basis of sharing one software platform.
In the prior art, the user management system generally adopts the same platform interface, and users of different positions and different departments all adopt a unified operation interface for office work, however, the functional modules required by the users of different positions and different departments in offices are different, so that the unified operation interface is unfavorable for the users to develop work.
Aiming at the technical problems, the application provides a solution.
Disclosure of Invention
The invention aims to provide a user management system based on digital government affairs, which is used for solving the problem that the user management system in the prior art adopts a unified operation interface, which is not beneficial to users to develop work;
the technical problems to be solved by the invention are as follows: how to provide a personalized custom user management system for thousands of people and thousands of sides.
The aim of the invention can be achieved by the following technical scheme:
the user management system based on the digital government affairs comprises a user management platform, wherein the user management platform is in communication connection with a user side, an application side and a database, and the user side comprises a demand customization module and a customization recommendation module; the application end comprises a data encryption module and a data calling module;
the demand customization module is used for carrying out demand customization analysis on users: acquiring the position of a new user when the new user registers in a user management platform, and calling a demand data set from a database through the position of the new user, wherein the demand data set comprises a general demand set and a custom demand set, the general demand set is a necessary demand module for the new user to log in the user management platform for office work, the new user screens a plurality of demand modules from the custom demand set as a preferred data set, then the general demand set and the preferred data set form a registration demand set, and office demand personalized customization is carried out for the new user according to the registration demand set;
the customized recommendation module is used for carrying out recommendation analysis on user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, and judging whether the demand module has recommendation value or not through the recommendation coefficient TJ;
the data encryption module is used for encrypting the user data;
the data calling module is used for carrying out data decryption calling when the user carries out data calling.
In a preferred embodiment of the present invention, when a user needs to adjust a registered demand group, a demand change request is sent to a user management platform, then a plurality of demand modules are selected from a customized demand group again to be used as sub-selection data groups, a replacement demand group is formed by a general demand group and the sub-selection data groups, a demand adjustment record is generated and sent to the user management platform, and the user management platform receives the demand adjustment record and then sends the demand adjustment record to a database for storage.
As a preferred embodiment of the present invention, the preferred data SX is the number of times the demand module is screened into the preferred data set, the replacement data GH is the number of times the demand module in the preferred data set is removed in the demand adjustment, and the sub-selected data CX is the number of times the demand module is screened into the sub-selected data set.
As a preferred embodiment of the invention, the specific process of judging whether the demand module has the recommended value comprises the following steps: acquiring a recommendation threshold TJmin through a database, and comparing a recommendation coefficient TJ with the recommendation threshold TJmin: if the recommendation coefficient TJ is smaller than the recommendation threshold TJmin, judging that the corresponding demand module does not have recommendation value; if the recommendation coefficient TJ is greater than or equal to the recommendation threshold TJmin, judging that the demand module has recommendation value, marking the corresponding demand module as recommendation demand, arranging the recommendation demand according to the sequence of the recommendation coefficient TJ from large to small to obtain a recommendation sequence, and sending the recommendation sequence to a database for storage.
As a preferred embodiment of the present invention, the specific process of the data encryption module for encrypting user data includes: the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n, n is a positive integer, n keys are generated in the form of Ai-Bi-Ci, wherein Ai is the work number of the user sending the processing object i, B1 is the data type number of the processing object i, ci is the time length of the user sending the processing object i, and the processing object i is encrypted and compressed by the keys.
As a preferred embodiment of the present invention, the specific process of encrypting and compressing the processing object includes: the method comprises the steps of arranging n keys according to the receiving time sequence of a data encryption module to obtain a receiving sequence, arranging a processing object i according to the sequence from big to small of a data packet memory value to obtain a processing sequence, matching the keys in the receiving sequence with the processing objects in the processing sequence, compressing the processing objects after the key matching is completed to obtain a processing compressed packet, forming a sending data packet by all the processing compressed packets in a processing period, sending the sending data packet to a user management platform, and sending the sending data packet to a database after the user management platform receives the sending data packet.
As a preferred implementation manner of the invention, the specific process of the data decryption and calling by the data calling module when the user performs data calling comprises the following steps: the user sends a data calling request to a user management platform, the user management platform receives the data calling request and then sends the data calling request to a data calling module, a corresponding sending data packet is called from a database according to the data calling request of the user, then processing objects i in the sending data packet are arranged according to the sequence of the memory value of the data packet from big to small, keys Ai-Bi-Ci are arranged according to the receiving sequence, the corresponding processing objects i are decompressed by the keys Ai-Bi-Ci to obtain a calling data packet, the calling data packet is sent to the user management platform, and the user management platform receives the calling data packet and then sends the calling data packet to a client of the user; and generating a data call record and sending the data call record to a database for storage.
As a preferred embodiment of the invention, the working method of the user management system based on digital government affairs comprises the following steps:
step one: and carrying out demand customization analysis on the user: acquiring the position of a new user when the new user registers a user management platform, calling a demand data set from a database through the position of the new user, screening a plurality of demand modules from a customized demand set by the new user as a preferred data set, forming a registration demand set by a general demand set and the preferred data set, and carrying out office demand personalized customization on the new user according to the registration demand set;
step two: recommendation analysis is carried out on the user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, judging whether the demand module has recommendation value or not through the recommendation coefficient TJ, and forming a recommendation sequence by the demand module with recommendation value;
step three: the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n and n are positive integers, n keys are generated in the form of Ai-Bi-Ci, a receiving sequence and a processing sequence are generated, and the processing object and the keys are matched according to the receiving sequence and the processing sequence;
step four: when the user performs data call, performing data decryption call: and calling a corresponding sending data packet from a database according to a data calling request of a user, arranging the processing objects i in the sending data packet according to the sequence from the large value to the small value of the data packet, arranging the keys Ai-Bi-Ci according to the receiving sequence, and decompressing the corresponding processing objects i by adopting the keys Ai-Bi-Ci to obtain the calling data packet.
The invention has the following beneficial effects:
1. the user can be subjected to demand customization analysis through the demand customization module, after the new user finishes registration of the user management platform, a plurality of demand modules are screened from the customization demand group to serve as a first-choice data group, then the general demand group and the first-choice data group form a registration demand group, each employee can carry out personalized customization on a platform operation interface according to own demands, and the operation convenience of the working process is improved;
2. the user demands can be recommended and analyzed through the custom recommendation module, recommendation coefficients are calculated for custom demand groups corresponding to all positions in an analysis period, and recommendation necessity of the demand module is fed back through recommendation coefficients obtained by calculating the first selection times, the replacement times and the second selection times of the demand module in the analysis period, so that a recommendation sequence is formed by the recommendation demands to provide demand custom references for new users;
3. the user data can be encrypted through the data encryption module, the key of the data packet is generated in a specific form, then the data packet and the key are matched one by one according to the receiving sequence and the processing sequence, then the data packet is encrypted and compressed through the key, and when a single data packet is called, the sequence of the sent data packet is required to be recombined, so that the safety of data storage is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is an overall system block diagram of the present invention.
Fig. 2 is a system block diagram of a first embodiment of the present invention.
Fig. 3 is a system block diagram of a second embodiment of the present invention.
Fig. 4 is a flowchart of a method according to a third embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the user management system based on digital government affairs comprises a user management platform, wherein the user management platform is in communication connection with a user side, an application side and a database, and the user side comprises a demand customization module and a customization recommendation module; the application end comprises a data encryption module and a data calling module.
Example 1
As shown in fig. 2, the requirement customization module is configured to perform requirement customization analysis on a user: acquiring the position of a new user when the new user registers in a user management platform, and calling a demand data set from a database through the position of the new user, wherein the demand data set comprises a general demand set and a custom demand set, the general demand set is a necessary demand module for the new user to log in the user management platform for office work, the new user screens a plurality of demand modules from the custom demand set as a preferred data set, then the general demand set and the preferred data set form a registration demand set, and office demand personalized customization is carried out for the new user according to the registration demand set; when a user needs to adjust a registered demand group, a demand change request is sent to a user management platform, a plurality of demand modules are screened from a customized demand group again to be used as sub-selection data groups, a general demand group and the sub-selection data groups form a replacement demand group, meanwhile, a demand adjustment record is generated and sent to the user management platform, and the user management platform receives the demand adjustment record and then sends the demand adjustment record to a database for storage; after the new user finishes the registration of the user management platform, a plurality of demand modules are screened from the customized demand group to serve as a preferred data group, then the general demand group and the preferred data group form a registered demand group, and each employee can customize the platform operation interface in a personalized way according to own demands, so that the operation convenience of the working process is improved.
The customized recommendation module is used for carrying out recommendation analysis on the user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, and acquiring preferred data SX, replacement data GH and sub-selection data CX of each demand module in the customized demand group, wherein the preferred data SX is the number of times the demand module is screened into the preferred data group, the replacement data GH is the number of times the demand module in the preferred data group is removed in demand adjustment, and the sub-selection data CX is the number of times the demand module is screened into the sub-selection data group; obtaining a recommended coefficient TJ of the demand module through a formula TJ=α1×SX+α2×CX- α3×GH, wherein α1, α2 and α3 are proportionality coefficients, and α1 > α2 > α3 > 1; acquiring a recommendation threshold TJmin through a database, and comparing a recommendation coefficient TJ with the recommendation threshold TJmin: if the recommendation coefficient TJ is smaller than the recommendation threshold TJmin, judging that the corresponding demand module does not have recommendation value; if the recommendation coefficient TJ is greater than or equal to a recommendation threshold TJmin, judging that the demand module has recommendation value, marking the corresponding demand module as recommendation demand, arranging the recommendation demand according to the sequence of the recommendation coefficient TJ from high to low to obtain a recommendation sequence, and sending the recommendation sequence to a database for storage; and carrying out recommendation analysis on the user demands, carrying out recommendation coefficient calculation on the customized demand groups corresponding to each position in the analysis period, and feeding back the recommendation necessity of the demand module through the recommendation coefficient obtained by calculating the first selection times, the replacement times and the second selection times of the demand module in the analysis period, so that a recommendation sequence formed by the recommendation demands provides a demand customization reference for new users.
Example two
As shown in fig. 3, the data encryption module is configured to encrypt user data: the method comprises the steps that a user sends a data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n and n are positive integers, n keys are generated in the form of Ai-Bi-Ci, wherein Ai is the work number of the user sending the processing object i, B1 is the data type number of the processing object i, ci is the time length of the user sending the processing object i, the n keys are arranged according to the receiving time sequence of the data encryption module to obtain a receiving sequence, the processing object i is arranged according to the sequence from large to small of the memory value of the data packet to obtain a processing sequence, the keys in the receiving sequence are matched with the processing objects in the processing sequence, the processing object after the key matching is compressed to obtain a processing compressed packet, all the processing compressed packets in the processing period form a sending data packet, the sending data packet is sent to a user management platform, and the user management platform sends the sending data packet to a database after receiving the sending data packet; the user data is encrypted, a key of a data packet is generated in a specific form, the data packet and the key are matched one by one according to a receiving sequence and a processing sequence, then the data packet is encrypted and compressed through the key, and when a single data packet is called, the sequence of the sent data packet is required to be recombined, so that the safety of data storage is improved.
The data calling module is used for carrying out data decryption calling when the user carries out data calling: the user sends a data calling request to a user management platform, the user management platform receives the data calling request and then sends the data calling request to a data calling module, a corresponding sending data packet is called from a database according to the data calling request of the user, then processing objects i in the sending data packet are arranged according to the sequence of the memory value of the data packet from big to small, keys Ai-Bi-Ci are arranged according to the receiving sequence, the corresponding processing objects i are decompressed by the keys Ai-Bi-Ci to obtain a calling data packet, the calling data packet is sent to the user management platform, and the user management platform receives the calling data packet and then sends the calling data packet to a client of the user; and generating a data call record and sending the data call record to a database for storage.
Example III
As shown in fig. 4, the user management method based on digital government affairs comprises the following steps:
step one: and carrying out demand customization analysis on the user: acquiring the position of a new user when the new user registers a user management platform, calling a demand data set from a database through the position of the new user, screening a plurality of demand modules from a customized demand set by the new user as a preferred data set, forming a registration demand set by a general demand set and the preferred data set, and carrying out office demand personalized customization on the new user according to the registration demand set;
step two: recommendation analysis is carried out on the user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, judging whether the demand module has recommendation value or not through the recommendation coefficient TJ, and forming a recommendation sequence by the demand module with recommendation value;
step three: the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n and n are positive integers, n keys are generated in the form of Ai-Bi-Ci, a receiving sequence and a processing sequence are generated, and the processing object and the keys are matched according to the receiving sequence and the processing sequence;
step four: when the user performs data call, performing data decryption call: and calling a corresponding sending data packet from a database according to a data calling request of a user, arranging the processing objects i in the sending data packet according to the sequence from the large value to the small value of the data packet, arranging the keys Ai-Bi-Ci according to the receiving sequence, and decompressing the corresponding processing objects i by adopting the keys Ai-Bi-Ci to obtain the calling data packet.
The user management system based on digital government affairs acquires the position of a new user when the new user registers a user management platform, a demand data set is called from a database through the position of the new user, the new user screens a plurality of demand modules from a customized demand set to be used as a preferred data set, then a registration demand set is formed by the general demand set and the preferred data set, and office demand personalized customization is carried out for the new user according to the registration demand set; generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, judging whether the demand module has recommendation value or not through the recommendation coefficient TJ, and forming a recommendation sequence by the demand module with recommendation value; the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n and n are positive integers, n keys are generated in the form of Ai-Bi-Ci, a receiving sequence and a processing sequence are generated, and the processing object and the keys are matched according to the receiving sequence and the processing sequence.
The foregoing is merely illustrative of the structures of this invention and various modifications, additions and substitutions for those skilled in the art can be made to the described embodiments without departing from the scope of the invention or from the scope of the invention as defined in the accompanying claims.
The formulas are all formulas obtained by collecting a large amount of data for software simulation and selecting a formula close to a true value, and coefficients in the formulas are set by a person skilled in the art according to actual conditions; such as: formula tj=α1×sx+α2×cx- α3×gh; collecting a plurality of groups of sample data by a person skilled in the art and setting a corresponding recommendation coefficient for each group of sample data; substituting the set recommended coefficient and the acquired sample data into a formula, forming a ternary one-time equation set by any three formulas, screening the calculated coefficient, and taking an average value to obtain values of alpha 1, alpha 2 and alpha 3 of 4.38, 4.15 and 2.32 respectively;
the size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding recommended coefficient is preliminarily set for each group of sample data by a person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected, for example, the recommended coefficient is proportional to the value of the preferred data.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (2)

1. The user management system based on the digital government affairs is characterized by comprising a user management platform, wherein the user management platform is in communication connection with a user side, an application side and a database, and the user side comprises a demand customization module and a customization recommendation module; the application end comprises a data encryption module and a data calling module;
the demand customization module is used for carrying out demand customization analysis on users: acquiring the position of a new user when the new user registers in a user management platform, and calling a demand data set from a database through the position of the new user, wherein the demand data set comprises a general demand set and a custom demand set, the general demand set is a necessary demand module for the new user to log in the user management platform for office work, the new user screens a plurality of demand modules from the custom demand set as a preferred data set, then the general demand set and the preferred data set form a registration demand set, and office demand personalized customization is carried out for the new user according to the registration demand set;
the customized recommendation module is used for carrying out recommendation analysis on user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, and judging whether the demand module has recommendation value or not through the recommendation coefficient TJ;
the calculation formula of the recommendation coefficient TJ of the demand module is as follows:wherein α1, α2, and α3 are scaling factors, and α1 > α2 > α3 >, respectively1;
The data encryption module is used for encrypting the user data;
the data calling module is used for carrying out data decryption calling when a user carries out data calling;
when a user needs to adjust a registered demand group, a demand change request is sent to a user management platform, a plurality of demand modules are screened from a customized demand group again to be used as sub-selection data groups, a general demand group and the sub-selection data groups form a replacement demand group, meanwhile, a demand adjustment record is generated and sent to the user management platform, and the user management platform receives the demand adjustment record and then sends the demand adjustment record to a database for storage;
the first-choice data SX is the number of times the demand module is screened into the first-choice data group, the replacement data GH is the number of times the demand module in the first-choice data group is removed in demand adjustment, and the secondary-choice data CX is the number of times the demand module is screened into the secondary-choice data group;
the specific process for judging whether the demand module has the recommended value comprises the following steps: acquiring a recommendation threshold TJmin through a database, and comparing a recommendation coefficient TJ with the recommendation threshold TJmin: if the recommendation coefficient TJ is smaller than the recommendation threshold TJmin, judging that the corresponding demand module does not have recommendation value; if the recommendation coefficient TJ is greater than or equal to a recommendation threshold TJmin, judging that the demand module has recommendation value, marking the corresponding demand module as recommendation demand, arranging the recommendation demand according to the sequence of the recommendation coefficient TJ from high to low to obtain a recommendation sequence, and sending the recommendation sequence to a database for storage;
the specific process of the data encryption module for encrypting the user data comprises the following steps: the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n, n is a positive integer, n keys are generated in the form of Ai-Bi-Ci, wherein Ai is the work number of the user sending the processing object i, B1 is the data type number of the processing object i, ci is the time length of the user sending the processing object i, and the processing object i is encrypted and compressed by the keys;
the specific process for encrypting and compressing the processing object comprises the following steps: arranging n keys according to the receiving time sequence of a data encryption module to obtain a receiving sequence, arranging a processing object i according to the sequence from big to small of a data packet memory value to obtain a processing sequence, matching the keys in the receiving sequence with the processing objects in the processing sequence, compressing the processing objects after the key matching is completed to obtain a processing compressed packet, forming a transmitting data packet by all the processing compressed packets in a processing period, transmitting the transmitting data packet to a user management platform, and transmitting the transmitting data packet to a database after the user management platform receives the transmitting data packet;
the specific process of the data decryption and calling by the data calling module when the user calls the data comprises the following steps: the user sends a data calling request to a user management platform, the user management platform receives the data calling request and then sends the data calling request to a data calling module, a corresponding sending data packet is called from a database according to the data calling request of the user, then processing objects i in the sending data packet are arranged according to the sequence of the memory value of the data packet from big to small, keys Ai-Bi-Ci are arranged according to the receiving sequence, the corresponding processing objects i are decompressed by the keys Ai-Bi-Ci to obtain a calling data packet, the calling data packet is sent to the user management platform, and the user management platform receives the calling data packet and then sends the calling data packet to a client of the user; and generating a data call record and sending the data call record to a database for storage.
2. The digital government affair-based user management system of claim 1, wherein the working method of the digital government affair-based user management system includes the steps of:
step one: and carrying out demand customization analysis on the user: acquiring the position of a new user when the new user registers a user management platform, calling a demand data set from a database through the position of the new user, screening a plurality of demand modules from a customized demand set by the new user as a preferred data set, forming a registration demand set by a general demand set and the preferred data set, and carrying out office demand personalized customization on the new user according to the registration demand set;
step two: recommendation analysis is carried out on the user requirements: generating an analysis period, acquiring a customized demand group corresponding to each position in the analysis period, acquiring preferred data SX, replacement data GH and sub-selected data CX of each demand module in the customized demand group, performing numerical value calculation to obtain a recommendation coefficient TJ of the demand module, judging whether the demand module has recommendation value or not through the recommendation coefficient TJ, and forming a recommendation sequence by the demand module with recommendation value;
step three: the user sends the data packet to be encrypted to a data encryption module to generate a processing period, the data packet received in the processing period is marked as a processing object i, i=1, 2, …, n and n are positive integers, n keys are generated in the form of Ai-Bi-Ci, a receiving sequence and a processing sequence are generated, and the processing object and the keys are matched according to the receiving sequence and the processing sequence;
step four: when the user performs data call, performing data decryption call: and calling a corresponding sending data packet from a database according to a data calling request of a user, arranging the processing objects i in the sending data packet according to the sequence from the large value to the small value of the data packet, arranging the keys Ai-Bi-Ci according to the receiving sequence, and decompressing the corresponding processing objects i by adopting the keys Ai-Bi-Ci to obtain the calling data packet.
CN202311331465.0A 2023-10-16 2023-10-16 User management system based on digital government affairs Active CN117112116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311331465.0A CN117112116B (en) 2023-10-16 2023-10-16 User management system based on digital government affairs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311331465.0A CN117112116B (en) 2023-10-16 2023-10-16 User management system based on digital government affairs

Publications (2)

Publication Number Publication Date
CN117112116A CN117112116A (en) 2023-11-24
CN117112116B true CN117112116B (en) 2024-02-02

Family

ID=88813039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311331465.0A Active CN117112116B (en) 2023-10-16 2023-10-16 User management system based on digital government affairs

Country Status (1)

Country Link
CN (1) CN117112116B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990691A (en) * 2019-11-14 2020-04-10 泰康保险集团股份有限公司 Online course recommendation method and device and computer storage medium
CN112419009A (en) * 2020-12-11 2021-02-26 安徽九天印务有限公司 Food plastic packaging bag customization system based on customer demands
TW202121291A (en) * 2019-11-19 2021-06-01 臺灣銀行股份有限公司 Customized function recommendation method for digital platforms reducing 10%~15% of recommended model computation time and decreasing the set regulation time for customers
CN115577152A (en) * 2022-09-29 2023-01-06 山东开正信息产业有限公司 Online book borrowing management system based on data analysis
WO2023015935A1 (en) * 2021-08-10 2023-02-16 平安科技(深圳)有限公司 Method and apparatus for recommending physical examination item, device and medium
CN116127186A (en) * 2022-12-09 2023-05-16 之江实验室 Knowledge-graph-based individual matching recommendation method and system for person sentry
CN116204714A (en) * 2023-02-21 2023-06-02 中国联合网络通信集团有限公司 Recommendation method, recommendation device, electronic equipment and storage medium
CN116244504A (en) * 2022-12-29 2023-06-09 黄泽鑫 Recommendation method and system for auxiliary college entrance examination volunteer filling scheme
WO2023125692A1 (en) * 2021-12-30 2023-07-06 华为技术有限公司 Service recommendation method and related apparatus
CN116542698A (en) * 2023-07-06 2023-08-04 厦门美契信息技术有限公司 Enterprise customized intelligent development management platform
WO2023167912A1 (en) * 2022-03-04 2023-09-07 Slate Technologies Inc. System and method for creation of a project manifest in a computing environment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012003580A1 (en) * 2010-07-08 2012-01-12 Christopher Bryson Consumer, retailer and supplier computing systems and methods
WO2017112914A2 (en) * 2015-12-23 2017-06-29 Pymetrics, Inc. Systems and methods for data-driven identification of talent
US10523682B1 (en) * 2019-02-26 2019-12-31 Sailpoint Technologies, Inc. System and method for intelligent agents for decision support in network identity graph based identity management artificial intelligence systems

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990691A (en) * 2019-11-14 2020-04-10 泰康保险集团股份有限公司 Online course recommendation method and device and computer storage medium
TW202121291A (en) * 2019-11-19 2021-06-01 臺灣銀行股份有限公司 Customized function recommendation method for digital platforms reducing 10%~15% of recommended model computation time and decreasing the set regulation time for customers
CN112419009A (en) * 2020-12-11 2021-02-26 安徽九天印务有限公司 Food plastic packaging bag customization system based on customer demands
WO2023015935A1 (en) * 2021-08-10 2023-02-16 平安科技(深圳)有限公司 Method and apparatus for recommending physical examination item, device and medium
WO2023125692A1 (en) * 2021-12-30 2023-07-06 华为技术有限公司 Service recommendation method and related apparatus
WO2023167912A1 (en) * 2022-03-04 2023-09-07 Slate Technologies Inc. System and method for creation of a project manifest in a computing environment
CN115577152A (en) * 2022-09-29 2023-01-06 山东开正信息产业有限公司 Online book borrowing management system based on data analysis
CN116127186A (en) * 2022-12-09 2023-05-16 之江实验室 Knowledge-graph-based individual matching recommendation method and system for person sentry
CN116244504A (en) * 2022-12-29 2023-06-09 黄泽鑫 Recommendation method and system for auxiliary college entrance examination volunteer filling scheme
CN116204714A (en) * 2023-02-21 2023-06-02 中国联合网络通信集团有限公司 Recommendation method, recommendation device, electronic equipment and storage medium
CN116542698A (en) * 2023-07-06 2023-08-04 厦门美契信息技术有限公司 Enterprise customized intelligent development management platform

Also Published As

Publication number Publication date
CN117112116A (en) 2023-11-24

Similar Documents

Publication Publication Date Title
Regula et al. One-shot coherence distillation
Habibi et al. Image coding by linear transformation and block quantization
US10587587B2 (en) Information processing apparatus and information processing method
Xiong et al. Randomized requantization with local differential privacy
Calmon et al. Fundamental limits of perfect privacy
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
US9615101B2 (en) Method and apparatus for signal encoding producing encoded signals of high fidelity at minimal sizes
Cullina et al. Fundamental limits of database alignment
Drekic et al. On the density and moments of the time of ruin with exponential claims
DE10240875B4 (en) Safe reference printing using personal electronic devices
CN117112116B (en) User management system based on digital government affairs
Soleymani et al. Privacy-preserving distributed learning in the analog domain
CN116384908A (en) Method for obtaining use state of reinforcing steel bar material in construction site
CN111782719A (en) Data processing method and device
Khong On integral quadratic constraints
CN113256266B (en) Building construction data archiving processing method and system based on data analysis and computer storage medium
Dieuleveut et al. Federated-EM with heterogeneity mitigation and variance reduction
CN112529586A (en) Transaction information management method, device, equipment and storage medium
CN115314288B (en) Data tracing system and method based on encryption verification technology
CN115098890B (en) Privacy calculation security audit method and system
Yao et al. Capacity of 3-user linear computation broadcast over F q with 1D demand and side-information
CN116340355A (en) Data query method and device
CN112765254B (en) Solution method and system for realizing data visualization and data integration ETL
CN110930195A (en) Data processing method and electronic equipment
Aceto et al. An efficient storage technique for network monitoring data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant