CN117389759A - Event reporting method and device, storage medium and electronic equipment - Google Patents

Event reporting method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN117389759A
CN117389759A CN202311323870.8A CN202311323870A CN117389759A CN 117389759 A CN117389759 A CN 117389759A CN 202311323870 A CN202311323870 A CN 202311323870A CN 117389759 A CN117389759 A CN 117389759A
Authority
CN
China
Prior art keywords
user
information
target
event
event information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311323870.8A
Other languages
Chinese (zh)
Inventor
黄志鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority to CN202311323870.8A priority Critical patent/CN117389759A/en
Publication of CN117389759A publication Critical patent/CN117389759A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications

Abstract

The application discloses an event reporting method, an event reporting device, a storage medium and electronic equipment, wherein the method for solving the middle comprises the following steps: responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; inquiring each piece of user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface; reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. The method can improve the event reporting efficiency.

Description

Event reporting method and device, storage medium and electronic equipment
Technical Field
The present invention relates to the field of event reporting technologies, and in particular, to a method and apparatus for reporting an event, a storage medium, and an electronic device.
Background
In the prior art, the traditional event reporting method has the advantages that the information of the reported person is maintained in advance, if the information is changed, the information is generally required to be updated manually, and if the number of the reported person is excessive, the information is inaccurate for a long time. The reporting mode and reporting range of the message are not flexible. The notification mode is generally mail mode, and then the system maintains the notification range in advance to perform notification. Regarding the notification scope, when an event is reported, the event may need to be notified to a higher level, and the higher level of the individual may need to be changed frequently, and this part of data also needs to be manually maintained, so that the event reporting efficiency is low.
Disclosure of Invention
In view of the above, the present invention provides an event reporting method, an event reporting device, a storage medium and an electronic device, and aims to solve the problem of low efficiency of the existing event reporting method.
In order to solve the above problems, the present application provides an event reporting method, including:
responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
inquiring each piece of user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface;
Reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method.
Optionally, after reporting the event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information, the method further includes: screening each second user to obtain a target second user, which specifically comprises the following steps:
when the reported information processing user corresponding to the first user is obtained as a second user based on the organization architecture information, determining the second user as a target second user; or,
when the reported information processing user corresponding to the first user is a plurality of second users based on the organization architecture information, determining the first second user initiating the confirmation operation as a target second user based on the confirmation operation of each second user on the event information; or,
And when the reported information processing user corresponding to the first user is obtained as a plurality of second users based on the organization structure information, and when each second user forwards the event information to each third user, determining each second user and the first user initiating the confirmation operation in each third user as a target second user.
Optionally, the querying, by using a preset user information reading method, each user information using a preset application program based on the user identifier, to obtain target user basic information corresponding to the first user identifier specifically includes:
inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface;
verifying the identity of the first user based on the first credential information to obtain a first verification result;
and under the condition that the first verification result is that verification is passed, inquiring all user information of a user information interface of a preset application program, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface.
Optionally, in the process of processing the event information by the target second user, when judging that the event information needs to be approved, responding to an approval operation initiated by the target second user to obtain enterprise identification and approval key information corresponding to the target second user;
Inquiring a preset cache area based on the enterprise identifier and the approval key information to obtain second credential information for accessing an approval interface;
verifying the identity of the target second user based on the second credential information to obtain a second verification result;
and under the condition that the second verification result is verification passing, obtaining an approval result after approval processing returned by the approval interface.
Optionally, the method further comprises:
if the approval result is that the approval is passed, the target second user continues to process the event information to obtain an event information processing result;
and under the condition that the approval result is that the approval is not passed, sending the event information to each preset assistant for negotiation processing to obtain an event information processing result.
Optionally, the responding to the ending operation of the processing of the event information by the target second user adopts a predetermined event information pushing method to push the processing result of the event information to each target user, which specifically includes:
responding to the ending operation of the target second user for processing the event information, and obtaining enterprise identification and message pushing key information corresponding to the target second user;
Inquiring a preset storage area based on the enterprise identifier and the message pushing key information to obtain third credential information for accessing a message pushing interface of a preset application program;
verifying the identity of the target second user based on the third credential information to obtain a third verification result;
and pushing the processing result of the event information to each preselected target user based on the message pushing interface under the condition that the third verification result is verification passing.
Optionally, after responding to the ending operation of the processing of the event information by the target second user, the method further comprises:
generating an event information processing log in response to an ending operation of processing the event information by the target second user;
and configuring each tag keyword of the event information processing log based on the type of the event information to query the event information processing log based on each tag keyword.
In order to solve the above problems, the present application provides an event reporting device, including:
the acquisition module is used for: the method comprises the steps of responding to login operation of a first user, and obtaining a first user identifier, an enterprise identifier and first key information corresponding to the first user;
And a query module: the target user basic information corresponding to the first user identifier is returned by the user information interface;
and a reporting module: the method comprises the steps of reporting event information edited by a first user to at least one second user based on organization architecture information carried in basic information of the target user;
and the pushing module is used for: and the processing result of the event information is pushed to each target user by adopting a preset event information pushing method in response to the ending operation of the target second user for processing the event information.
In order to solve the above-mentioned problems, the present application provides a storage medium storing a computer program, where the computer program implements the steps of the event reporting method described above when executed by a processor.
In order to solve the above problems, the present application provides an electronic device, which at least includes a memory, and a processor, wherein the memory stores a computer program, and the processor implements the steps of the event reporting method when executing the computer program on the memory.
Under the condition that a first user logs in an event reporting page, acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; and calling a user information acquisition interface of a preset application program through the enterprise identifier and the first key information to acquire target user basic information corresponding to the first user identifier information, wherein the target user basic information is acquired in real time, and timeliness of data is ensured. The basic information of the target user is the latest information every time, so that error reporting of event information due to organization architecture adjustment is prevented, and event information edited by the first user is reported to each second user based on the organization architecture information carried in the basic information of the target user; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. And pushing the processing result of the event information to each preselected target user by adopting a method for calling a message pushing interface of the preset application program, thereby improving the event reporting efficiency.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 shows a flow chart of an event reporting method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of an event reporting method according to another embodiment of the present application;
fig. 3 is a block diagram of an event reporting device according to another embodiment of the present application.
Detailed Description
Various aspects and features of the present application are described herein with reference to the accompanying drawings.
It should be understood that various modifications may be made to the embodiments of the application herein. Therefore, the above description should not be taken as limiting, but merely as exemplification of the embodiments. Other modifications within the scope and spirit of this application will occur to those skilled in the art.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It is also to be understood that, although the present application has been described with reference to some specific examples, those skilled in the art can certainly realize many other equivalent forms of the present application.
The foregoing and other aspects, features, and advantages of the present application will become more apparent in light of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application will be described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application with unnecessary or excessive detail. Therefore, specific structural and functional details disclosed herein are not intended to be limiting, but merely serve as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the word "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments as per the application.
An embodiment of the present application provides an event reporting method, as shown in fig. 1, including:
step S101: responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
in the implementation process, when a first user logs in an event reporting page, an acquired user information interface of a preset application program is required to be called to acquire user basic information. Specifically, in response to a login operation of a first user, a first user identifier, an enterprise identifier and first key information corresponding to the first user are obtained, when a user login event reports a page, the first user identifier corresponding to the first user can be directly obtained, the enterprise identifier corresponding to the first user identifier information and the first key information are obtained from a configuration file, and a foundation is laid for subsequently obtaining target user basic information corresponding to the first user identifier based on the enterprise identifier and the first key information.
Step S102: inquiring each piece of user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface;
in the specific implementation process of the step, the event reporting method can report the event based on the preset application program. The preset application program may be a mature enterprise micro-letter service program, etc., and the type of the preset application program is not limited in this application. Inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface; after a user logs in an event report page, the first credential information can be used to access a user information interface of a preset application program in login timeliness so as to obtain target user basic information corresponding to the first user identifier. Verifying the first credential information to obtain a first verification result; and under the condition that the first verification result is that verification is passed, inquiring all user information of a user information interface of a preset application program, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface. The target user basic information comprises: name, phone number, belonging organization structure, etc.
Step S103: reporting the event information edited by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
in the implementation process of this step, the organization structure information includes: department information, personnel information, job information, the information of the upper level, the information of the lower level and the like, when the first user edits event information, the event information can be reported to selected second users of the same department according to the organization structure information carried in the basic information of the target user, and also can be reported to one of the second users of the same department as a responsible person for processing the event information, specifically, when the selected responsible person is a plurality of, screening is performed on each second user to obtain the target second user, and the method specifically comprises the following steps: determining a first second user initiating a confirmation operation as a target second user based on the confirmation operation of each second user on the event information; or when each second user forwards the event information to each third user, determining each second user and the first user initiating the confirmation operation in each third user as a target second user. And taking the target second user as a responsible person for processing the event information.
Step S104: and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method.
In the specific implementation process, responding to the ending operation of processing the event information by a target second user, and obtaining enterprise identification and message pushing key information corresponding to the target second user; inquiring a preset storage area based on the enterprise identifier and the message pushing key information to obtain third credential information for accessing a message pushing interface of a preset application program; verifying the third credential information to obtain a third verification result; and pushing the processing result of the event information to each preselected target user based on the message pushing interface under the condition that the third verification result is verification passing.
Under the condition that a first user logs in an event reporting page, acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; and calling a user information acquisition interface of a preset application program through the enterprise identifier and the first key information to acquire target user basic information corresponding to the first user identifier information, wherein the target user basic information is acquired in real time, and timeliness of data is ensured. The basic information of the target user is the latest information every time, so that error reporting of event information due to organization architecture adjustment is prevented, and event information edited by the first user is reported to each second user based on the organization architecture information carried in the basic information of the target user; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. And pushing the processing result of the event information to each preselected target user by adopting a method for calling a message pushing interface of the preset application program, thereby improving the event reporting efficiency.
In yet another embodiment of the present application, another event reporting method is provided, as shown in fig. 2, including:
step S201: responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
in the implementation process, when a first user logs in an event reporting page, an acquisition user information interface of a preset application program is called to acquire user basic information. Specifically, in response to a login operation of a first user, a first user identifier userid, an enterprise identifier morph and first key information secret corresponding to the first user are obtained, the first key information secret can be in the form of a character string, a digital letter combination and the like, and the preset application program comprises various application services, for example: the method comprises the steps that an address book management service, an approval service, a message pushing service, a customer service and other applications are applied, each application is provided with an independent secret key, namely the address book management service, the approval service, the message pushing service, the customer service and other application services correspond to different secret keys, when an interface corresponding to each application service of a preset application program is called, login credentials of the interface are required to be verified to authenticate logged-in users, when a user logs in an event and reports a page, a first user identifier corresponding to the first user can be directly obtained, enterprise identifiers corresponding to first user identifier information and first secret key information are obtained from a configuration file, and a foundation is laid for obtaining target user basic information corresponding to the first user identifier based on the enterprise identifiers and the first secret key information.
Step S202: inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface;
in the implementation process, a preset cache area is queried based on the enterprise identification morph and a first key information secret corresponding to a user information acquisition application of the preset application program, and first credential information access_token for accessing a user information acquisition interface is obtained. The first credential information is a login credential for accessing the user information acquisition application, and in a login timeliness period, the user information acquisition interface corresponding to the user information acquisition application is accessed based on the first credential information, so that a foundation is laid for subsequently acquiring target user basic information corresponding to the first user identification information.
Step S203: verifying the identity of the first user based on the first credential information to obtain a first verification result;
in the specific implementation process, authentication verification is carried out on the identity of the first user based on the first credential information, and only the verified user has permission to access the user information acquisition interface so as to acquire the user information corresponding to the first user.
Step S204: inquiring all user information of a user information interface of a preset application program under the condition that the first verification result is verification passing, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface;
in the specific implementation process of the step, the event reporting method can report the event based on the preset application program. The preset application program may be a mature enterprise micro-letter service program, etc., and the type of the preset application program is not limited in this application. And under the condition that the first verification result is that verification is passed, inquiring all user information of a user information interface of a preset application program, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface. The target user basic information comprises: name, phone number, belonging organization structure, etc.
Step S205: reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
in the specific implementation process, based on the organization architecture information carried in the basic information of the target user, the event information initiated by the first user is reported to each second user with permission to process the event information, specifically, according to the department information, the position information, the information of the upper level, the lower level and the like in the organization architecture information, the event information initiated by the first user is reported to each second user through the selected operation of the first user, and the first user can report the event information to a plurality of second users at the same time or report the event information to one of the second users. Specifically, the event information may be: in operation, the interruption affects the problem that the service cannot be executed or operated, such as report downloading, unavailable function, network failure, etc. When encountering these events, it is generally necessary to find the corresponding responsible person for processing. For example, during billing, the invoice information of the purchase is found to be wrong, and the personnel for searching the purchase are required to assist. However, in enterprises with larger scale, the method is sometimes unfamiliar with corresponding responsible persons, and after the reported information is filled, the system finds out the corresponding responsible person for processing according to the pre-configured organization structure information.
Step S206: screening the second users to obtain target second users;
in the specific implementation process, when the reported information processing user corresponding to the first user is obtained based on the organization architecture information, one second user is determined to be a target second user; or when the reported information processing user corresponding to the first user is obtained as a plurality of second users based on the organization structure information, determining the first second user initiating the confirmation operation as a target second user based on the confirmation operation of each second user on the event information; or when the reported information processing user corresponding to the first user is obtained based on the organization structure information to be a plurality of second users, and when each second user forwards the event information to each third user, determining each second user and the first user initiating the confirmation operation in each third user as a target second user.
Step S207: in the process of processing the event information by the target second user, under the condition that the event information is judged to need approval processing, responding to approval operation initiated by the target second user, and obtaining enterprise identification and approval key information corresponding to the target second user;
In the specific implementation process, when the second user initiates the approval operation, the approval interface of the preset application program needs to be called to obtain the approval result. Specifically, in response to an approval operation initiated by a target second user, second user identification, enterprise identification and approval key information corresponding to the target second user are obtained, when the target second user initiates the approval operation, the second user identification corresponding to the target second user can be directly obtained, the enterprise identification and the approval key information corresponding to the second user identification information are obtained from a configuration file, and a foundation is laid for the subsequent access of the target second user to an approval interface of the preset application approval application based on the enterprise identification and the approval key information.
Step S208: inquiring a preset cache area based on the enterprise identifier and the approval key information to obtain second credential information for accessing an approval interface;
in the specific implementation process, the preset cache area is queried based on the enterprise identification morph and the approval key information secret corresponding to the approval application of the preset application program, and second credential information access_token of the access approval interface is obtained. The second credential information is a login credential for accessing the approval application, and in the login aging period, the approval interface corresponding to the approval application is accessed based on the second credential information, so that a foundation is laid for subsequently acquiring an approval result returned by the approval interface.
Step S209: verifying the identity of the target second user based on the second credential information to obtain a second verification result;
in the specific implementation process, authenticating and verifying the identity of the target second user based on the second credential information, and only the verified user has authority to access the approval interface corresponding to the preset application approval application to initiate approval so as to acquire the approval result returned by the approval interface.
Step S210: obtaining an approval result after approval returned by the approval interface under the condition that the second verification result is verification passing;
in the specific implementation process, if the second verification result is that verification is passed, the target second user initiates an approval request to a selected approval user through an approval application of the preset application program, and the approval user may be a authorized supervisor or the like. And obtaining an approval result after approval processing returned by the approval interface. Various conditions requiring approval are encountered in daily business operations, such as: when a user uses a service system, the problem of face recognition faults occurs, and when the user submits a relevant certification file, and the current user is proved to be a user of the system, in order to let a background technician pass the face recognition process of the current user and enter the next process, the event reporting method in the application needs to report the event passing the face recognition process of the current user to a supervisor superior for approval processing, and after the supervisor superior approval passes, the background technician can pass the face recognition process of the user through authority processing so as to make the user perform the next process.
Step S211: if the approval result is that the approval is passed, the target second user continues to process the event information to obtain an event information processing result;
in the specific implementation process, if the approval result is that the approval passes, the target second user continues to process the event information to obtain an event information processing result. For example: by using the event reporting method, the event which is released in the face recognition process of the current user is reported to the supervisor upper level for approval processing, and after the supervisor upper level approval passes, a background technician can release the face recognition process of the user through background authority processing, so that an event information processing result is obtained.
Step S212: if the approval result is that the approval is not passed, the event information is sent to each preset assistant to carry out negotiation processing, and an event information processing result is obtained;
in the specific implementation process, if the approval result is that the approval is not passed, the event information is sent to each preset assistant to carry out negotiation processing, so as to obtain an event information processing result, for example: and under the condition that the approval result is that the approval is not passed, a method for selecting assistance personnel can be adopted to carry out negotiation processing, and a method for solving the event information is comprehensively obtained to obtain an event information processing result.
Step S213: responding to the ending operation of the target second user for processing the event information, and obtaining enterprise identification and message pushing key information corresponding to the target second user;
in the specific implementation process, after the target second user finishes processing the event information, responding to the ending operation of the target second user for processing the event information, and obtaining enterprise identification and message pushing key information corresponding to the target second user. Specifically, when the processing of the target second user ends the event information, the processing result needs to be pushed to each selected target user in a mode of calling the predetermined application message pushing application interface, the second user identification, the enterprise identification and the message pushing key information corresponding to the target second user are obtained in response to the ending operation of the target second user for processing the event information, the second user identification corresponding to the target second user can be directly obtained when the target second user initiates the message pushing operation, the enterprise identification corresponding to the second user identification information and the message pushing key information are obtained from the configuration file, and a foundation is laid for the subsequent message pushing interface for the target second user to access the predetermined application message pushing application based on the enterprise identification and the message pushing key information.
Step S214: inquiring a preset storage area based on the enterprise identifier and the message pushing key information to obtain third credential information for accessing a message pushing interface of a preset application program;
in the specific implementation process, the preset cache area is queried based on the enterprise identification morph and the message pushing key information secret corresponding to the message pushing application of the preset application program, and the third credential information access_token of the access message pushing interface is obtained. The third credential information is login credential for accessing the message pushing application, and in the login aging period, the message pushing interface corresponding to the message pushing application is accessed based on the third credential information, so that a foundation is laid for subsequently sending event information processing results to each preset target user based on the message pushing interface.
Step S215: verifying the identity of the target second user by the third credential information to obtain a third verification result;
in the specific implementation process, authenticating and verifying the identity of the target second user based on the third credential information, and only the authenticated user has authority to access the message pushing interface corresponding to the preset application message pushing application, so that the processing result of the event information is sent to each preselected target user based on the message pushing interface.
Step S216: and pushing the processing result of the event information to each preselected target user based on the message pushing interface under the condition that the third verification result is verification passing.
In the specific implementation process, when the third verification result is verification passing, pushing the processing result of the event information to each preselected target user based on the message pushing interface. Generating an event information processing log in response to an ending operation of processing the event information by the target second user; and configuring each tag keyword of the event information processing log based on the type of the event information to query the event information processing log based on each tag keyword. The method can facilitate the accumulation of knowledge by constructing an event information processing log, a user can use a method of calling a customer service interface corresponding to a customer service application of a preset application program to make an automatic reply robot, and an event reporter can check whether a solution of current event information exists or not by inputting a query keyword in advance before the event is reported. Fuzzy matching can be performed according to the keywords and the titles of the historical events, related event titles are listed, the event titles are clicked, and details can be checked. Meanwhile, for an important event, after the event is processed, a user can label the event on the system, and when keywords are input, the event can be quickly searched. For example, the event A is marked with two labels, the authentication is abnormal, the invoice is illegal, and the processing log of the event A can be searched for reference by inputting the keyword of the invoice illegal.
According to the event reporting method, a first user identifier, an enterprise identifier and first key information corresponding to a first user are obtained through responding to login operation of the first user; inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface; verifying the identity of the first user based on the first credential information to obtain a first verification result; and under the condition that the first verification result is that verification is passed, a user information acquisition interface of a preset application program is called to acquire target user basic information corresponding to the first user identification, the user basic information of the preset application program is updated in real time, and the information acquired by the user in each login is acquired again, so that the timeliness and accuracy of the user basic information are ensured. Based on the organization architecture information carried in the basic information of the target user, reporting the event information initiated by the first user to at least one second user, and based on the organization architecture information preset by a preset application program, accurately finding the second user which is in butt joint with the first user from the event information initiated by the first user, wherein the organization architecture adjustment in the preset application program is also updated in real time, and the event information reporting system or device constructed by adopting the event information reporting method does not need to manually maintain the organization architecture information, so that the personnel maintenance cost is saved; meanwhile, when the target second user encounters approval in the event information processing process, the approval interface of the preset application program can be directly called to initiate reporting approval of the event information, and the report approval can be quickly notified to an approver based on the preset organization structure of the preset application program, so that reporting efficiency is improved. And finally pushing the processing result of the event information to each preselected target user through a message pushing interface of a preset application program, thereby improving the reporting efficiency of the event information.
In yet another embodiment of the present application, an event reporting device is provided, as shown in fig. 3, including:
acquisition module 1: the method comprises the steps of responding to login operation of a first user, and obtaining a first user identifier, an enterprise identifier and first key information corresponding to the first user;
query module 2: the target user basic information corresponding to the first user identifier is returned by the user information interface;
reporting module 3: the method comprises the steps of reporting event information edited by a first user to at least one second user based on organization architecture information carried in basic information of the target user;
pushing module 4: and the processing result of the event information is pushed to each target user by adopting a preset event information pushing method in response to the ending operation of the target second user for processing the event information.
In a specific implementation process, the event reporting device further includes: the screening module is specifically used for: : screening each second user to obtain a target second user, which specifically comprises the following steps: when the reported information processing user corresponding to the first user is obtained as a second user based on the organization architecture information, determining the second user as a target second user; or when the reported information processing user corresponding to the first user is obtained as a plurality of second users based on the organization structure information, determining the first second user initiating the confirmation operation as a target second user based on the confirmation operation of each second user on the event information; or when the reported information processing user corresponding to the first user is obtained based on the organization structure information to be a plurality of second users, and when each second user forwards the event information to each third user, determining each second user and the first user initiating the confirmation operation in each third user as a target second user.
In a specific implementation process, the query module 2 is specifically configured to: inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface; verifying the identity of the first user based on the first credential information to obtain a first verification result; and under the condition that the first verification result is that verification is passed, inquiring all user information of a user information interface of a preset application program, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface.
In an implementation process, the device further comprises: the approval module is specifically used for: in the process of processing the event information by the target second user, under the condition that the event information is judged to need approval processing, responding to approval operation initiated by the target second user, and obtaining enterprise identification and approval key information corresponding to the target second user; inquiring a preset cache area based on the enterprise identifier and the approval key information to obtain second credential information for accessing an approval interface; verifying the identity of the target second user based on the second credential information to obtain a second verification result; and under the condition that the second verification result is verification passing, obtaining an approval result after approval processing returned by the approval interface.
In a specific implementation process, the approval module is further configured to: if the approval result is that the approval is passed, the target second user continues to process the event information to obtain an event information processing result; and under the condition that the approval result is that the approval is not passed, sending the event information to each preset assistant for negotiation processing to obtain an event information processing result.
In a specific implementation process, the pushing module 4 is specifically configured to: responding to the ending operation of the target second user for processing the event information, and obtaining enterprise identification and message pushing key information corresponding to the target second user; inquiring a preset storage area based on the enterprise identifier and the message pushing key information to obtain third credential information for accessing a message pushing interface of a preset application program; verifying the identity of the target second user based on the third credential information to obtain a third verification result; and pushing the processing result of the event information to each preselected target user based on the message pushing interface under the condition that the third verification result is verification passing.
In a specific implementation process, the device further comprises an information processing log generation module, wherein the information processing log generation module is specifically configured to: generating an event information processing log in response to an ending operation of processing the event information by the target second user; and configuring each tag keyword of the event information processing log based on the type of the event information to query the event information processing log based on each tag keyword.
Under the condition that a first user logs in an event reporting page, acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; and calling a user information acquisition interface of a preset application program through the enterprise identifier and the first key information to acquire target user basic information corresponding to the first user identifier information, wherein the target user basic information is acquired in real time, and timeliness of data is ensured. The basic information of the target user is the latest information every time, so that error reporting of event information due to organization architecture adjustment is prevented, and event information edited by the first user is reported to each second user based on the organization architecture information carried in the basic information of the target user; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. And pushing the processing result of the event information to each preselected target user by adopting a method for calling a message pushing interface of the preset application program, thereby improving the event reporting efficiency.
Another embodiment of the present application provides a storage medium storing a computer program which, when executed by a processor, performs the method steps of:
step one, responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
inquiring all user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface;
step three, reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
and step four, responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The specific implementation process of the above method steps may refer to the embodiment of the above arbitrary event reporting method, and this embodiment is not repeated here.
Under the condition that a first user logs in an event reporting page, acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; and calling a user information acquisition interface of a preset application program through the enterprise identifier and the first key information to acquire target user basic information corresponding to the first user identifier information, wherein the target user basic information is acquired in real time, and timeliness of data is ensured. The basic information of the target user is the latest information every time, so that error reporting of event information due to organization architecture adjustment is prevented, and event information edited by the first user is reported to each second user based on the organization architecture information carried in the basic information of the target user; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. And pushing the processing result of the event information to each preselected target user by adopting a method for calling a message pushing interface of the preset application program, thereby improving the event reporting efficiency.
Another embodiment of the present application provides an electronic device, which may be a server, that includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic device includes non-volatile and/or volatile storage media and internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the electronic device is used for communicating with an external client through a network connection. The electronic device program, when executed by the processor, implements functions or steps of a server side of an event reporting method.
In one embodiment, an electronic device is provided, which may be a client. The electronic device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic device includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the electronic device is used for communicating with an external server through a network connection. The electronic device program, when executed by a processor, implements functions or steps of a client side of an event reporting method.
Another embodiment of the present application provides an electronic device, at least including a memory, and a processor, where the memory stores a computer program, and the processor when executing the computer program on the memory implements the following method steps:
step one, responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
inquiring all user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface;
step three, reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
and step four, responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method.
The specific implementation process of the above method steps may refer to the embodiment of the above arbitrary event reporting method, and this embodiment is not repeated here.
Under the condition that a first user logs in an event reporting page, acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user; and calling a user information acquisition interface of a preset application program through the enterprise identifier and the first key information to acquire target user basic information corresponding to the first user identifier information, wherein the target user basic information is acquired in real time, and timeliness of data is ensured. The basic information of the target user is the latest information every time, so that error reporting of event information due to organization architecture adjustment is prevented, and event information edited by the first user is reported to each second user based on the organization architecture information carried in the basic information of the target user; and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method. And pushing the processing result of the event information to each preselected target user by adopting a method for calling a message pushing interface of the preset application program, thereby improving the event reporting efficiency.
The above embodiments are only exemplary embodiments of the present application and are not intended to limit the present application, the scope of which is defined by the claims. Various modifications and equivalent arrangements may be made to the present application by those skilled in the art, which modifications and equivalents are also considered to be within the scope of the present application.

Claims (10)

1. An event reporting method, comprising:
responding to login operation of a first user, and acquiring a first user identifier, an enterprise identifier and first key information corresponding to the first user;
inquiring each piece of user information of a user information interface of a preset application program based on the enterprise identifier and the first key information, and acquiring target user basic information corresponding to the first user identifier returned by the user information interface;
reporting event information initiated by the first user to at least one second user based on the organization architecture information carried in the target user basic information;
and responding to the ending operation of the target second user for processing the event information, and pushing the processing result of the event information to each target user by adopting a preset event information pushing method.
2. The method of claim 1, wherein after reporting the first user-initiated event information to at least one second user based on the organizational structure information carried in the target user base information, the method further comprises: screening each second user to obtain a target second user, which specifically comprises the following steps:
when the reported information processing user corresponding to the first user is obtained as a second user based on the organization architecture information, determining the second user as a target second user; or,
when the reported information processing user corresponding to the first user is a plurality of second users based on the organization architecture information, determining the first second user initiating the confirmation operation as a target second user based on the confirmation operation of each second user on the event information; or,
and when the reported information processing user corresponding to the first user is obtained as a plurality of second users based on the organization structure information, and when each second user forwards the event information to each third user, determining each second user and the first user initiating the confirmation operation in each third user as a target second user.
3. The method of claim 1, wherein the querying each user information using a preset application program by using a preset user information reading method based on the user identifier to obtain the target user basic information corresponding to the first user identifier specifically includes:
inquiring a preset cache area based on the enterprise identifier and the first key information to obtain first credential information for accessing a user information interface;
verifying the identity of the first user based on the first credential information to obtain a first verification result;
and under the condition that the first verification result is that verification is passed, inquiring all user information of a user information interface of a preset application program, and obtaining target user basic information corresponding to the first user identifier returned by the user information interface.
4. The method of claim 2, wherein in the process of processing the event information by the target second user, if it is determined that the event information needs to be approved, the enterprise identifier and approval key information corresponding to the target second user are obtained in response to an approval operation initiated by the target second user;
Inquiring a preset cache area based on the enterprise identifier and the approval key information to obtain second credential information for accessing an approval interface;
verifying the identity of the target second user based on the second credential information to obtain a second verification result;
and under the condition that the second verification result is verification passing, obtaining an approval result after approval processing returned by the approval interface.
5. The method of claim 4, wherein the method further comprises:
if the approval result is that the approval is passed, the target second user continues to process the event information to obtain an event information processing result;
and under the condition that the approval result is that the approval is not passed, sending the event information to each preset assistant for negotiation processing to obtain an event information processing result.
6. The method of claim 1, wherein the pushing the processing result of the event information to each target user by using a predetermined event information pushing method in response to an ending operation of processing the event information by the target second user, specifically includes:
responding to the ending operation of the target second user for processing the event information, and obtaining enterprise identification and message pushing key information corresponding to the target second user;
Inquiring a preset storage area based on the enterprise identifier and the message pushing key information to obtain third credential information for accessing a message pushing interface of a preset application program;
verifying the identity of the target second user based on the third credential information to obtain a third verification result;
and pushing the processing result of the event information to each preselected target user based on the message pushing interface under the condition that the third verification result is verification passing.
7. The method of claim 6, wherein after an end operation of processing the event information in response to a target second user, the method further comprises:
generating an event information processing log in response to an ending operation of processing the event information by the target second user;
and configuring each tag keyword of the event information processing log based on the type of the event information to query the event information processing log based on each tag keyword.
8. An event reporting device, comprising:
the acquisition module is used for: the method comprises the steps of responding to login operation of a first user, and obtaining a first user identifier, an enterprise identifier and first key information corresponding to the first user;
And a query module: the target user basic information corresponding to the first user identifier is returned by the user information interface;
and a reporting module: the method comprises the steps of reporting event information edited by a first user to at least one second user based on organization architecture information carried in basic information of the target user;
and the pushing module is used for: and the processing result of the event information is pushed to each target user by adopting a preset event information pushing method in response to the ending operation of the target second user for processing the event information.
9. A storage medium storing a computer program which, when executed by a processor, implements the steps of the event reporting method of any of the preceding claims 1-7.
10. An electronic device comprising at least a memory, a processor, the memory having stored thereon a computer program, the processor, when executing the computer program on the memory, implementing the steps of the event reporting method of any of the preceding claims 1-7.
CN202311323870.8A 2023-10-11 2023-10-11 Event reporting method and device, storage medium and electronic equipment Pending CN117389759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311323870.8A CN117389759A (en) 2023-10-11 2023-10-11 Event reporting method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311323870.8A CN117389759A (en) 2023-10-11 2023-10-11 Event reporting method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN117389759A true CN117389759A (en) 2024-01-12

Family

ID=89436880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311323870.8A Pending CN117389759A (en) 2023-10-11 2023-10-11 Event reporting method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN117389759A (en)

Similar Documents

Publication Publication Date Title
CN108737418B (en) Identity authentication method and system based on block chain
US8064583B1 (en) Multiple data store authentication
CN107277049B (en) Access method and device of application system
EP3164795B1 (en) Prompting login account
US8429712B2 (en) Centralized user authentication system apparatus and method
US20130054433A1 (en) Multi-Factor Identity Fingerprinting with User Behavior
US9756034B2 (en) Law enforcement agency portal
CN111343168B (en) Identity authentication method and device, computer equipment and readable storage medium
CN111541546B (en) Multi-platform login method, device, equipment and readable medium
CN112597472A (en) Single sign-on method, device and storage medium
CN112860778B (en) Database management method, device, equipment and medium for desktop application program
US20200302081A1 (en) Method and system for managing personal digital identifiers of a user in a plurality of data elements
CN103607416A (en) Method and application system for authenticating identity of network terminal machine
CN105072608B (en) A kind of method and device of administrative authentication token
CN112118238A (en) Method, device, system, equipment and storage medium for authentication login
CN113645257B (en) Identity authentication method and device, electronic equipment and storage medium
CN110909388B (en) Decentralized electronic calendar management system and method
CN111541543A (en) Information verification method and device, computer equipment and storage medium
US20090190737A1 (en) Caller Authentication System
CN117389759A (en) Event reporting method and device, storage medium and electronic equipment
CN112583890B (en) Message pushing method and device based on enterprise office system and computer equipment
CN109257213B (en) Method and device for judging computer terminal access verification failure
CN115774581A (en) Method and related apparatus for executing robot feet
US20230370448A1 (en) Authentication method and authentication system
CN116112468B (en) SSL certificate detection method, SSL certificate detection device, SSL certificate detection computer equipment, SSL certificate storage medium and SSL certificate product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination