CN110086826B - Information processing method - Google Patents

Information processing method Download PDF

Info

Publication number
CN110086826B
CN110086826B CN201910393645.9A CN201910393645A CN110086826B CN 110086826 B CN110086826 B CN 110086826B CN 201910393645 A CN201910393645 A CN 201910393645A CN 110086826 B CN110086826 B CN 110086826B
Authority
CN
China
Prior art keywords
message
user
operation command
message information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910393645.9A
Other languages
Chinese (zh)
Other versions
CN110086826A (en
Inventor
邵向兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Notice Network Technology Co ltd
Original Assignee
Xi'an Notice Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Notice Network Technology Co ltd filed Critical Xi'an Notice Network Technology Co ltd
Priority to CN201910393645.9A priority Critical patent/CN110086826B/en
Publication of CN110086826A publication Critical patent/CN110086826A/en
Application granted granted Critical
Publication of CN110086826B publication Critical patent/CN110086826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure relates to an information processing method. According to one embodiment of the present disclosure, the method comprises: receiving message information; analyzing the message information to obtain an operation command, a message channel type and a user attribute; and performing authority control on the message information based on the operation command, the message channel type and the user attribute. The method disclosed by the invention has at least one of the following beneficial technical effects: and performing multiple authority verification on the message information based on the message channel type, the operation command and the user attribute of the message information to realize refined authority control.

Description

Information processing method
Technical Field
The present disclosure relates to the field of computers, and in particular, to an information processing method, apparatus, storage medium, and electronic device.
Background
With the increasing maturity of artificial intelligence technology, in the business office, many enterprises adopt the question-answering robot based on specific scenes to provide intelligent service. The question-answering robot outputs answers to questions posed by the user, and the process needs to control the authority of the user. However, when controlling the authority of the user, there is a problem that the authority control is not fine enough.
Disclosure of Invention
A brief summary of the disclosure is provided below in order to provide a basic understanding of some aspects of the disclosure. It should be understood that this summary is not an exhaustive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
According to a first aspect of the present disclosure, there is provided an information processing method including:
receiving message information;
analyzing the message information to obtain an operation command, a message channel type and a user attribute;
and performing authority control on the message information based on the operation command, the message channel type and the user attribute.
In one embodiment of the present invention,
according to a second aspect of the present disclosure, there is provided an information processing apparatus comprising:
a receiving unit configured to receive message information;
the analysis unit is configured to analyze the message information to obtain an operation command, a message channel type and a user attribute;
and the control unit is configured to perform authority control on the message information based on the operation command, the message channel type and the user attribute.
According to a third aspect of the present disclosure, there is provided a storage medium having stored thereon a program that implements the information processing method of the first aspect described above.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising a processor; a memory on which are stored instructions that, when executed by the processor, implement the program of the information processing method of the first aspect described above.
The technical scheme of the disclosure has at least one of the following technical effects: and performing multiple authority verification on the message information based on the channel type, the operation command and the user attribute of the message information to realize refined authority control.
Drawings
The disclosure may be better understood by reference to the following description taken in conjunction with the accompanying drawings, which are incorporated in and form a part of this specification, along with the following detailed description. In the drawings:
FIG. 1 shows a schematic diagram of an enterprise intelligence services system, in accordance with an embodiment of the present disclosure;
FIG. 2 shows a schematic flow chart diagram of an enterprise intelligence services method in accordance with an embodiment of the present disclosure;
FIG. 3 shows a schematic flow chart diagram of a method of authenticating user personal information based on message information in accordance with an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart diagram illustrating a method for performing entitlement control on message information based on a parsing result of the message information, according to an embodiment of the present disclosure;
FIG. 5 shows a schematic flow chart diagram of an information processing method according to an embodiment of the present disclosure;
fig. 6 shows a block diagram of the structure of an information processing apparatus according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described hereinafter with reference to the accompanying drawings. In the interest of clarity and conciseness, not all features of an actual embodiment are described in the specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions may be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another.
Here, it should be further noted that, in order to avoid obscuring the present disclosure with unnecessary details, only the device structure closely related to the scheme according to the present disclosure is shown in the drawings, and other details not so related to the present disclosure are omitted.
It is to be understood that the disclosure is not limited to the described embodiments, as described below with reference to the drawings. In this context, embodiments may be combined with each other, features may be replaced or borrowed between different embodiments, one or more features may be omitted in one embodiment, where feasible.
An embodiment of the present disclosure provides an information processing method, including: receiving message information; analyzing the message information to obtain an operation command, a message channel type and a user attribute; and performing authority control on the message information based on the operation command, the message channel type and the user attribute.
According to the embodiment of the disclosure, multiple authority checks are performed on the message information based on the message channel type, the operation command and the user attribute of the message information. Compared with the prior art, the method and the device can realize fine authority control, carry out intelligent processing on repeated and fussy information communication inside the enterprise, save the operation cost of the company and improve the level of intelligent service of the enterprise. Embodiments of the present disclosure and their advantages are described in detail below with reference to the accompanying drawings.
FIG. 1 shows a schematic diagram of an enterprise intelligence services system 100, in accordance with an embodiment of the present disclosure. The intelligent service system 100 includes a user authentication module 110, a rights module 120, a rules module 130, a learning module 140, a messaging module 150, an auditing module 160, and a data center 170. The user authentication module 110 is configured to authenticate basic identity information of a user; the permission module 120 is used for realizing fine control on the user permission; the rule module 130 is configured to store default rules set by an administrator, where the rules at least include a rule base, rule access resources, an applicable user range, an applicable message channel range, and an applicable thesaurus range; the learning module 140 is configured to establish a machine learning model based on the historical access information of the user and the overall access information of the enterprise, and train the historical data to update the rule base; the message module 150 is configured to parse the message information to obtain a specific rule, and at the same time, the message module is further configured to implement setting of message content and message channels, for example, to determine which keywords in the message content cannot appear in which message channels; the auditing module 160 is used for implementing log records of all message information, each log record at least comprises time, user ID, message channel, operation rule, operation result, state and log grade; the data center 170 includes all data generated during the business-only service process, and may include, for example, rights configuration data, rules data, machine learning data, log data, and the like.
FIG. 2 shows a schematic flow diagram of an enterprise intelligence service method 200 in accordance with an embodiment of the present disclosure. The method 200 begins at step 210 by receiving message information. Here, the message information is sent by the user through a message channel, which may be any other type of message channel such as enterprise WeChat, or nailing.
Then, in step 220, the user personal information is authenticated based on the message information. This step may be performed by the user authentication module 110. The user authentication module 110 authenticates the personal information of the user, which may be, for example, the unique ID of the user in the enterprise or the user mailbox; if the authentication is passed, a mapping relation between the user personal information and the message channel ID is established in the intelligent service system. It is mainly explained that the information used by different message channel identification users may be different, for example, a nickname used by the user for identifying the user in the WeChat, and an account used by the enterprise WeChat identification user, but no matter the nickname or the account, as long as the authentication is passed, the mapping relationship between the user information and the message channel ID is established. Table 1 shows a user information ID and message channel ID mapping table.
TABLE 1 mapping table of user information ID and message channel ID
Figure BDA0002057442400000041
Then, in step 230, the message information is parsed. This step may be performed by message module 150. Specifically, the message channel type and the user attribute are extracted from the message information, and the user attribute is used to characterize the type of the user, and may be, for example, a group to which the user belongs or a role level of the user, which is not specifically limited herein. For example, in order for a business to complete a specific task, it is necessary to gather people in different departments, create a specific group, and give authority control, in which case the user attribute may be the group to which the user belongs. In addition, analyzing the message information further includes processing the message content in the message information by adopting a regular matching method or a word segmentation tagging method to obtain an operation command, wherein the operation command includes an operation action and an operation object. For example, if the message information sent by a certain user belonging to the group 1 in a nailing manner is "view the memory of the 10.10.10.10 server", the message channel type extracted from the message information is "nail", the user attribute is "group 1", the message information is analyzed by a regular matching method, and the operation object obtained is the server 10.10.10.10, and the operation is "view the memory". Table 2 shows an association table between the user information ID and the user group.
Table 2 table of association relationship between user information ID and user group
Figure BDA0002057442400000042
Figure BDA0002057442400000051
Then, in step 240, the message information is subjected to authority control based on the analysis result of the message information. This step may be performed by the rights module 120 and the rules module 130. Here, the authority module 120 searches the rule base in the rule module 130 for a rule matching the operation command based on the operation command obtained in step 220, and obtains an application range corresponding to the matched rule; then, based on the matching relationship between the application range and the message channel type and the matching relationship between the application range and the user attribute, the authority of the message is controlled. Further, the authority module 120 is further configured to perform authority control on the message based on a matching relationship between the user attribute and the operation action and a matching relationship between the user attribute and the operation object. The authority control process carries out multiple authority verification on the message information based on the message channel type, the operation command and the user attribute, realizes refined authority control, carries out intelligent processing on repeated and fussy information communication in an enterprise, saves the operation cost of a company, and improves the level of intelligent service of the enterprise. Table 3 shows a correspondence table of operation commands and rules.
Table 3 correspondence table of operation commands and rules
Figure BDA0002057442400000052
Then, in step 250, the message information controlled by the authority is executed, and the execution result is output. Specifically, parameters required by executing the operation command are acquired, the operation command is executed according to the parameters, and an execution result is returned to the user. The parameters may include an execute Action, which may be, for example, a sentence of the shell command free-m, and an Action type actiontype, where the Action type includes, but is not limited to, execute method (callfunction), direct reply (reply), call interface (callrestapi), or call underlying SaltStack tool (callsalttaipi), etc.
Then, at step 260, the logging data is saved and the rule base is updated based on the logging data. This step may be performed by learning module 140 and auditing module 160. The intelligent service system calls the log record data saved by the auditing module 160 and calls the learning module 140 to update the rule base according to the log record data.
In summary, the enterprise intelligent service method disclosed by the present disclosure may have the following technical effects:
1. each user can access the required resources quickly and efficiently according to information such as own department, position and the like. For example, for a newly-entered user, the user registers on the enterprise intelligent service platform according to information such as own department and position, and the required resources are efficiently acquired.
2. And rapidly customizing daily services of the enterprise, and establishing an exclusive rule base of the enterprise. The daily problems are extracted, an exclusive rule base of an enterprise is established, and then the user is granted access authority, so that the user can quickly access the resources.
3. Specific groups can be created and given authority control according to specific needs. The right to access the resource is given to the temporary group, thereby greatly meeting the work requirement.
4. And intelligently recommending the user access information by utilizing an artificial intelligence technology. Each user has its own attention, such as the need for the operation and maintenance personnel to view their own servers often, the need for the business developers to know billing information often, and so on. With the increase of times of using the intelligent service platform by each user, learning and recommendation are achieved for daily service of the user, so that effective information can reach the fastest speed, and the level of enterprise intelligent service is provided.
A method of authenticating the user personal information based on the message information will be described in detail below.
Fig. 3 shows a schematic flow diagram of a method 300 for authenticating user personal information based on message information in accordance with an embodiment of the present disclosure. The method 300 begins at step 310 by obtaining user personal information based on the message information. The user personal information may include a user channel ID, a message channel type, and the like.
Then, in step 320, it is determined whether the user has registered an account according to the personal information of the user, if so, step 330 is executed, and if not, step 340 is executed. Specifically, the personal information of the user is matched with the information stored in the database, if the matching is successful, the fact that the user has registered an account is judged, and if the matching is not successful, the fact that the user has not registered the account is judged. The matching success here may be that a mapping relationship between the personal information of the user and the message channel ID exists in the database.
Then, in step 330, it is determined whether the registered account is normal, if so, step 220 in the foregoing embodiment is executed, and if not, the process is ended. The step of determining whether the registered account is normal may be determining whether the user is in a leave state, and if the user is in the leave state, the registered account is not normal, or may be determining whether the user is in a forbidden access state, and if the user is in the forbidden access state, the registered account is not normal.
Then, in step 340, prompting the user to register an account; the account registration mode here can be mailbox registration or job number registration.
Then, in step 350, it is determined whether the registration information of the user is correct, if yes, step 330 is executed, and if not, step 340 is returned to. In this step, it is determined whether the registration information of the user is correct, and the personal information (e.g., mailbox or job number) of the user may be verified, for example, whether the mailbox format is correct, whether the mailbox exists in reality, or whether the job number is correct, etc. In addition, it is worth noting that after the registration information of the user is judged to be correct, a user personal record is generated, namely, a mapping relation between the user personal information and the message channel ID is established and stored in the database, and the record at least comprises the user ID, the user channel ID, the mailbox, the channel type, the message content and the authorization time.
The following describes in detail a method for performing authority control on message information based on the analysis result of the message information.
Fig. 4 shows a schematic flow chart of a method 400 for controlling authority of a message information based on a parsing result of the message information according to an embodiment of the disclosure. The method 400 begins at step 410 by obtaining rules that match the operation command. Specifically, a regularization matching method or a similar text comparison method can be adopted in a rule base for query, or machine learning is carried out by utilizing a historical record of user operation to find out a matched rule. If the matched rule is not inquired, prompting the user that the matched rule cannot be found, or feeding back the similar rule to the user, and prompting the user to quit.
Then, in step 420, the applicable channel and applicable user of the rule are obtained.
Then, in step 430, the message is subjected to authority control based on the matching relationship between the application scope and the message channel type and the matching relationship between the application scope and the user attribute.
Specifically, if the message channel type matches the applicable channel and the user attribute matches the applicable user, the message information can be controlled by the authority, otherwise, the message information cannot be controlled by the authority. For example, the message information is "view the memory of the server 10.10.10.10", the corresponding operation command is "view the memory of the server 10.10.10.10", and a matching rule is found in the rule base according to the operation command, the applicable channel corresponding to the rule is the WeChat, and the message channel type is the nail, which are not matched, so that the message information cannot pass through the authority control. For another example, the applicable user corresponding to the rule is the group 2, the user attribute is the group 1, and the two are not matched, so that the message information cannot pass through the authority control.
Then, in step 440, authority control is performed on the message based on the matching relationship between the user attribute and the operation action and the matching relationship between the user attribute and the operation object.
Specifically, if the user attribute is matched with the operation action and the user attribute is matched with the operation object, that is, the user has the right to execute the operation action on the operation object, the message information can pass through the right control, otherwise, the message information cannot pass through the right control. For example, the message information is "view memory of 10.10.10.10 server", the corresponding user attribute is group 1, the operation object is "server 10.10.10", the operation action is "view memory", the authorized user corresponding to server 10.10.10.10 is group 1, and the permission action granted to group 1 is "read only", because "view" is included in "read only", the user has the permission to perform the action of viewing memory on server 10.10.10.10.
Before step 440, it may be determined whether an operation object exists, and if the operation object does not exist, the user may be prompted to exit. For example, the operation object is a server, and whether the server exists or not is judged, if two conditions exist, namely, in the first condition, a resource management system exists in an enterprise, the existing resource management system is accessed through an open interface; in the second case, if the enterprise does not have a resource management system, a resource management module is established to perform unified management on the server.
Further, the method 400 further includes determining whether the operation command is a high-risk command, if so, the message information cannot pass through the authority control, and if not, the message information can pass through the authority control. The step is set to ensure the safety of the operation process by setting for high-risk commands, considering that certain resources are very dangerous to operate, for example, rm-rf/is operated on the Linux server, and such commands can cause the Linux server to be down. In addition, if the operation command is determined to be a high-risk command, an operation log is recorded, and a message is sent to a related responsible person, wherein the content of the message can be that the user xx operates the high-risk command rm-rf/at xxxx-xx-xx xx xx: xx, and the high-risk command rm-rf/is rejected by the intelligent platform and informed.
Fig. 5 shows a schematic flow diagram of an information processing method 500 according to an embodiment of the present disclosure.
At step 510, message information is received. Here, the message information is sent by the user through a message channel, which may be any other type of message channel such as enterprise WeChat, or nailing.
Then, in step 520, the message information is parsed to obtain the operation command, the message channel type and the user attribute. The message channel type and the user attribute are extracted from the message information, and the user attribute is used to characterize the type of the user, for example, the user may be a group to which the user belongs, or may be a job level of the user, and is not specifically limited herein. For example, in order for a business to complete a specific task, it is necessary to gather people in different departments, create a specific group, and give authority control, in which case the user attribute may be the group to which the user belongs. In addition, analyzing the message information also comprises processing the message content in the message information by adopting a regular matching method or a word segmentation labeling method to obtain an operation command.
Then, in step 530, the message information is subjected to authority control based on the operation command, the message channel type and the user attribute. Searching a rule matched with the operation command in a rule base, and acquiring an application range corresponding to the matched rule; then, based on the matching relationship between the application range and the message channel type and the matching relationship between the application range and the user attribute, the authority of the message is controlled.
The authority control process carries out multiple authority verification on the message information based on the message channel type, the operation command and the user attribute, realizes refined authority control, carries out intelligent processing on repeated and fussy information communication in an enterprise, saves the operation cost of a company, and improves the level of intelligent service of the enterprise.
Fig. 6 shows a block diagram of the structure of an information processing apparatus 600 according to an embodiment of the present disclosure. Referring to fig. 6, the short message processing apparatus 600 includes: receiving section 610, analyzing section 620, and control section 630.
A receiving unit 610 configured to receive message information. Here, the message information is sent by the user through a message channel, which may be any other type of message channel such as enterprise WeChat, or nailing.
And the parsing unit 620 is configured to parse the message information to obtain the operation command, the message channel type and the user attribute. The message channel type and the user attribute are extracted from the message information, and the user attribute is used to characterize the type of the user, for example, the user may be a group to which the user belongs, or may be a job level of the user, and is not specifically limited herein. For example, in order for a business to complete a specific task, it is necessary to gather people in different departments, create a specific group, and give authority control, in which case the user attribute may be the group to which the user belongs. In addition, analyzing the message information also comprises processing the message content in the message information by adopting a regular matching method or a word segmentation labeling method to obtain an operation command.
A control unit 630 configured to perform authority control on the message information based on the operation command, the message channel type, and the user attribute. Searching a rule matched with the operation command in a rule base, and acquiring an application range corresponding to the matched rule; then, based on the matching relationship between the application range and the message channel type and the matching relationship between the application range and the user attribute, the authority of the message is controlled.
According to the method and the device, multiple authority verification is carried out on the message information based on the message channel type, the operation command and the user attribute, refined authority control is achieved, repeated and tedious information communication inside an enterprise is processed intelligently, the operation cost of the enterprise is saved, and the level of intelligent service of the enterprise is improved.
Fig. 7 shows a schematic structural diagram of an electronic device 700 according to an embodiment of the disclosure. As shown in fig. 7, the electronic apparatus 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the electronic apparatus are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer-readable medium bearing instructions that, in such embodiments, may be downloaded and installed from a network via the communication section 709, and/or installed from the removable medium 711. The instructions, when executed by a Central Processing Unit (CPU)701, perform the various method steps described in the present invention.
Although example embodiments have been described, it will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the inventive concept. Accordingly, it should be understood that the above-described exemplary embodiments are not limiting, but illustrative.

Claims (9)

1. An information processing method comprising:
receiving message information;
analyzing the message information to obtain an operation command, a message channel type and a user attribute;
performing authority control on the message information based on the operation command, the message channel type and the user attribute;
the performing authority control on the message information based on the operation command, the message channel type and the user attribute comprises:
and performing authority control on the message information based on the matching relationship between the operation command and the message channel type and the matching relationship between the operation command and the user attribute.
2. The information processing method according to claim 1, wherein the operation command includes an operation action and an operation object, the method further comprising:
and performing authority control on the message information based on the matching relationship between the user attribute and the operation action and the matching relationship between the user attribute and the operation object.
3. The information processing method according to claim 2, further comprising:
and if the operation object does not exist, rejecting the message information.
4. The information processing method according to claim 1, further comprising:
and if the operation command is a high-risk command, rejecting the message information.
5. The information processing method according to claim 1, further comprising registering a message channel of the user using the user personal information.
6. The information processing method according to claim 1, further comprising:
and if the message information passes the authority control, executing the operation command.
7. An information processing apparatus comprising:
a receiving unit configured to receive message information;
the analysis unit is configured to analyze the message information to obtain an operation command, a message channel type and a user attribute;
a control unit configured to perform authority control on the message information based on the operation command, the message channel type, and the user attribute;
the control unit is further configured to perform authority control on the message information based on a matching relationship between the operation command and the message channel type and a matching relationship between the operation command and the user attribute.
8. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-6.
9. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 6.
CN201910393645.9A 2019-05-13 2019-05-13 Information processing method Active CN110086826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910393645.9A CN110086826B (en) 2019-05-13 2019-05-13 Information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910393645.9A CN110086826B (en) 2019-05-13 2019-05-13 Information processing method

Publications (2)

Publication Number Publication Date
CN110086826A CN110086826A (en) 2019-08-02
CN110086826B true CN110086826B (en) 2021-09-17

Family

ID=67419836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910393645.9A Active CN110086826B (en) 2019-05-13 2019-05-13 Information processing method

Country Status (1)

Country Link
CN (1) CN110086826B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800740A (en) * 2021-01-27 2021-05-14 北京明略软件***有限公司 Method, system, device and storage medium for realizing automatic billing by using RPA robot
CN113220661A (en) * 2021-04-29 2021-08-06 西安点告网络科技有限公司 Multi-cloud database management method, system, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107688614A (en) * 2017-08-04 2018-02-13 平安科技(深圳)有限公司 It is intended to acquisition methods, electronic installation and computer-readable recording medium
CN108959627A (en) * 2018-07-23 2018-12-07 北京光年无限科技有限公司 Question and answer exchange method and system based on intelligent robot
CN109684540A (en) * 2018-12-11 2019-04-26 北京奇点机智科技有限公司 The method and apparatus of information on services interaction

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232204A1 (en) * 2012-03-01 2013-09-05 International Business Machines Corporation Identifying and processing previously sent and received messages
US10277539B2 (en) * 2015-07-31 2019-04-30 International Business Machines Corporation Intelligent messaging reply system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107688614A (en) * 2017-08-04 2018-02-13 平安科技(深圳)有限公司 It is intended to acquisition methods, electronic installation and computer-readable recording medium
CN108959627A (en) * 2018-07-23 2018-12-07 北京光年无限科技有限公司 Question and answer exchange method and system based on intelligent robot
CN109684540A (en) * 2018-12-11 2019-04-26 北京奇点机智科技有限公司 The method and apparatus of information on services interaction

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"多媒体智能客服通信***设计";陈也创;《中国优秀硕士学位论文全文数据库》;20160215;第12,23-24页 *

Also Published As

Publication number Publication date
CN110086826A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
US20220308942A1 (en) Systems and methods for censoring text inline
EP3963519A1 (en) Systems and methods for data-driven infrastructure controls
CN110309636B (en) Identity authentication method and system
EP3713191B1 (en) Identifying legitimate websites to remove false positives from domain discovery analysis
CN111125512A (en) Service recommendation processing method, device and system
US20180196875A1 (en) Determining repeat website users via browser uniqueness tracking
CN106650350B (en) Identity authentication method and system
EP3830723B1 (en) Increasing security of a password-protected resource based on publicly available data
CN110086826B (en) Information processing method
CN116150349A (en) Data product security compliance checking method, device and server
CN111782719B (en) Data processing method and device
CN114003600A (en) Data processing method, system, electronic device and storage medium
CN116955573A (en) Question searching method, device, equipment and storage medium
CN111985902B (en) Cross-system information collaborative management method, device, equipment and storage medium
CN114189366B (en) Account correlation method, terminal and server
CN113037555A (en) Risk event marking method, risk event marking device and electronic equipment
CN111737433A (en) Clustering solution method and system for user problems
CN114205417B (en) Information processing method, device, electronic equipment and storage medium
CN109344600B (en) Distributed system and data processing method based on same
CN114037565A (en) Method, device, equipment and medium for processing court case based on RPA and AI
US20190319959A1 (en) Novel Technology for Securing Access to an Enterprise Information System Through a Natural Language Interface
CN116402477A (en) File digital information management system
CN111488563A (en) Data authentication method and device
CN112801834A (en) Safety management system and safety management method applied to intelligent education platform
CN117271860A (en) Data processing method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant