CN111198878B - Basic information investigation system and method - Google Patents

Basic information investigation system and method Download PDF

Info

Publication number
CN111198878B
CN111198878B CN201811377763.2A CN201811377763A CN111198878B CN 111198878 B CN111198878 B CN 111198878B CN 201811377763 A CN201811377763 A CN 201811377763A CN 111198878 B CN111198878 B CN 111198878B
Authority
CN
China
Prior art keywords
data
information
key
module
item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811377763.2A
Other languages
Chinese (zh)
Other versions
CN111198878A (en
Inventor
徐福利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chen Rui Corp
Original Assignee
Chen Rui Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chen Rui Corp filed Critical Chen Rui Corp
Priority to CN201811377763.2A priority Critical patent/CN111198878B/en
Publication of CN111198878A publication Critical patent/CN111198878A/en
Application granted granted Critical
Publication of CN111198878B publication Critical patent/CN111198878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a basic information investigation system and a basic information investigation method, wherein the basic information investigation system comprises an application system (100), a data system (200) and a presentation system (300), wherein the application system (100) is used for receiving business personnel instructions and implementing data input and management operations; a data hierarchy (200) for storing all data information generated internally to the system; a presentation architecture (300) for visualizing presentation system pages and stored data. The basic information investigation method realizes the input and management of basic tone data by constructing a basic information investigation system. The invention inputs scattered, complicated and irregular personnel information and organization information through the system platform; the manual collection efficiency is improved; the post management service is facilitated; the data security is comprehensively improved through physical security and logical security.

Description

Basic information investigation system and method
Technical Field
The invention relates to the fields of databases and Web applications, in particular to a basic information investigation system and method.
Background
Data changes, alters, and will change people's lives more deeply, which is a part and angle of the entire information technology revolution. From the information age, various fields make a great breakthrough on data collection and use work, various business departments (such as business management departments) apply single data (such as mechanism types and statistics of economic industries) to develop greatly, and the content and types of data are continuously enriched. However, the informatization construction in the basic research field is still in a starting stage. The following problems are faced:
1) The data are scattered, and the manual collection efficiency is low;
the data are distributed in various cities, various fields and various levels, the data are relatively dispersed, and meanwhile, various media such as paper, optical discs and U discs exist in different investigation unit conditions, a unified data input platform is lacked, manual collection is difficult, and the efficiency is low.
2) The data are complicated, and the manual arrangement is not performed;
because of different conditions of each investigation unit, the collected data is complex, a unified data input platform is lacked, and the manual arrangement difficulty is high.
3) The data is less, so that the post management service is inconvenient;
most of research data are stored in different servers or personal computers in various modes, a unified data management service platform is lacked, management is not carried out according to a unified classification system and a unified security system, and the security and the reuse value of the data are reduced.
4) The data is not standard and can not be quickly integrated and utilized;
the research tasks are multiple, the unified specification is lacking, even if the same task is used, the recorded information content and the field quantity of different research units are difficult to unify, the strong relevance of the data is poor, a unified data integration platform is lacking, the manual integration is time-consuming, and the utilization rate is low.
Because of the problems, the inventor researches and analyzes related technologies such as a database, data input, data authority and the like to expect to develop a basic information investigation system and method, and provides a standard input form of an input template to improve manual collection efficiency, and data authentication to improve data security, so as to provide clear basic investigation data information within a corresponding authority range for business personnel of various industry departments such as an industrial and commercial management department and a social management department.
Disclosure of Invention
In order to overcome the problems, the inventor accumulates the work for a long time, researches and analyzes the work from the flexibility, the usability and the data safety of the system as starting points through project practice, and provides a basic information investigation system and method.
The invention aims to provide the following technical scheme:
(1) A basic information investigation method comprises the following steps:
constructing a basic information investigation system;
inputting and managing basic tone data by utilizing a basic information investigation system;
the basic information investigation system is obtained by constructing an application system 100, a data system 200 and a presentation system 300; wherein,
the application system 100 is used for receiving the instruction information of the service personnel and implementing the input and management of data;
A data hierarchy 200 for storing all data information generated within the storage system;
presentation system 300 is used to visually present system pages and stored data.
In a preferred embodiment, the construction of the application system 100 is achieved by a construction comprising the following modules:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
project management module 120: the method is used for receiving the operation instruction information, processing the key item according to the operation instruction information, or updating the basic information of the key item, and starting the initiation and approval flow of the key work;
data investigation module 130: the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and realizes key data input work of each key item;
preferably, building the application architecture 100 further includes building a storage management module 140 for assisting in key data entry and management;
the construction of the data hierarchy 200 is achieved by a construction comprising the following data storage modules:
the system configuration library 210: the system is used for storing data information generated inside the system, including user basic information generated by the user management module 110, basic tone project basic information generated by the project management module 120, basic tone data input by the data investigation module 130, system logs generated by system operation and the like;
The construction of presentation architecture 300 is achieved by a construction comprising the following modules:
the data retrieval module 310: aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanism information;
the data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
In a preferred embodiment, building the storage management module 140 includes building a dictionary management sub-module 141 and a broad table management sub-module 142: wherein,
dictionary management submodule 141: the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule 142: creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
preferably, corresponding field information is independently stored for different key categories in the key field library;
More preferably, the key field library and the field option dictionary are maintained and enriched periodically;
more preferably, the field information of the broad table may be configured by calling a key field library.
In a preferred embodiment, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
two-layer authentication: authenticating the data according to the key data under the item;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
In a preferred embodiment, the data authority module 320 authenticates the data information as follows:
project authentication: checking a minimum storage unit item of data, and judging through item security;
data authentication: firstly, judging through the item security class of the data; if the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are authenticated.
In a preferred embodiment, the entry of key data comprises the steps of:
step 1'), newly adding a user: newly adding a user through the user management module 110, initializing user basic information, and distributing user authority roles;
step 1), constructing a broad table: using the newly added user account or the existing account in the step 1'), configuring a basic investigation broad table corresponding to different basic tone categories for the department:
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information may be added by the wide table management sub-module 142; the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department;
step 2), creating an item: creating an investigation project according to the service management requirement, filling in basic information of the basic tone project, and submitting to effect;
step 3), key data input: preferably, the key data entry includes two modes, namely a data entry mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by the item management module 120 by the input page, and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations;
When the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by the input page according to the investigation information template set by the item management module 120, uploading the Excel file after inputting relevant field values of investigation information, and realizing input of data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
(2) A basic information investigation system, preferably for carrying out the method described in the above (1).
The basic information investigation system and method provided by the invention have the following beneficial effects:
(1) An independent wide table is established for each business department, and the independent storage and management of the wide table meets the different management requirements of each business department (such as an industrial and commercial management department and a social management department) and realizes the transverse isolation of data;
the data is logically and safely protected through two-layer authentication, three-layer security, three rights people and three associated information, so that the longitudinal management of the data is realized; the security of the key data is improved by the transverse isolation and the longitudinal management;
(2) The wide-table field information can be conveniently configured for each business department by setting and calling a basic tone field library;
the investigation information template is conveniently configured by checking the wide-table field information, so that the collection and the input of investigation data in a system are facilitated;
(3) The scattered, complicated and nonstandard personnel information is unified in data input through the system platform by the user management module, the storage management module, the project management module, the data investigation module, the data retrieval module and the data authority module, so that the collection, processing and fusion of basic investigation data are improved, and the effective management service of basic data is finally achieved.
Drawings
Fig. 1 is a schematic structural diagram of a basic information investigation system in a preferred embodiment of the present invention;
FIG. 2 shows a page of a basic information research system creating a user in a preferred embodiment of the present invention;
FIG. 3 illustrates a page of a basic information research system in a preferred embodiment of the present invention when a key item is created;
FIG. 4 shows a page of the basic information research system retrieving a key person in a preferred embodiment of the present invention;
fig. 5 is a flow chart for forming authentication related field information in a preferred embodiment of the present invention;
FIG. 6 shows a flow chart of item authentication in a preferred embodiment of the invention;
FIG. 7 shows a flow chart of data authentication in a preferred embodiment of the invention;
FIG. 8 shows a basic information research system personnel item wide table construction page in a preferred embodiment of the present invention;
FIG. 9 is a schematic diagram of a basic information research system personnel project key data entry page in a preferred embodiment of the present invention;
fig. 10 is a schematic diagram showing lateral isolation and longitudinal management of a basic information research system in a preferred embodiment of the present invention.
Reference numerals illustrate:
100-application system;
110-a user management module;
120-project management module;
130-a data investigation module;
131-personnel investigation submodule;
1311-personnel entry sub-module;
1312-importing the sub-modules in batches by personnel;
1313-personnel data verification sub-module;
1314-personnel data weight-shifting sub-module;
132-a mechanism investigation submodule;
1321-mechanism entry sub-module;
1322-bulk import of the mechanism into sub-modules;
1323-institution data validation sub-module;
1324-mechanism data de-duplication sub-module;
140-a storage management module;
141-a dictionary management sub-module;
142-wide table management submodule;
150-a statistical analysis module;
200-data hierarchy;
210-a system configuration library;
300-a presentation system;
310-a data retrieval module;
320-data rights module.
Detailed Description
The invention is further described in detail below by means of the figures and examples. The features and advantages of the present invention will become more apparent from the description.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In order to improve the collection efficiency of large-scale key data, facilitate the later stage arrangement, aiming at the problems of lack of unified input standards and unified data input/integration/management platforms, the system and the method effectively develop from the aspects of data input, data analysis, data management and data security so as to acquire a basic information investigation system and method, and input/integrate/manage the key data in a clear mode.
The invention aims to provide a basic information investigation method, which comprises the following steps:
constructing a basic information investigation system;
and inputting and managing the key data by using the basic information investigation system.
In the invention, a basic information investigation system is obtained by constructing an application system 100, a data system 200 and a presentation system 300, as shown in fig. 1; wherein,
the application system 100 is used for receiving the instruction information of the service personnel and implementing the input and management of data;
a data hierarchy 200 for storing all data information generated within the storage system;
Presentation system 300 is used to visually present system pages and stored data.
In a preferred embodiment of the present invention, the construction of the application system 100 is achieved by a construction comprising the following modules:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
preferably, the user basic information comprises user attribute, user authority information and login information; the user attributes comprise names, user account numbers, mobile phone numbers and electronic mailboxes; the user authority information comprises administrative departments, administrative regions, administrative levels and roles to which the user belongs; the login information comprises an account password.
The roles are divided into a system manager, an auditor and a general person; the system administrator has the authority to add, delete, activate and deactivate the user account, and the auditor has the authority to audit the newly built user account and to approve the newly built project.
The corresponding operation instructions comprise the steps of adding, deleting, enabling and disabling the user account, inquiring and modifying the user attribute, the user authority information and the login information, authorizing the user passing the audit, and the like. Fig. 2 is a page of a creation user in which user basic information is shown.
Project management module 120: the method is used for receiving the operation instruction information, processing the basic tone project or updating basic information of the basic tone project according to the operation instruction information, starting the initiation and approval processes of basic tone work, and uniformly carrying out data investigation.
Preferably, the key item basic information comprises item attribute, item authority information, item support information and the like; wherein, the project attribute comprises a project name and a project type (such as personnel project or institution project, corresponding key information type is personnel information or institution information); the project authority information comprises project security and participation units and personnel; the item support information comprises a key information template corresponding to each key item, and the key information template comprises key information of the key item to be counted.
The project secret classes are divided into three secret classes, namely sharing (all people can view), proprietary (creator and affiliated person can view, and can not authorize), and authorization (creator, project affiliated person and authorized person can view). The creator is a creator of the data and is automatically generated according to the login user; the affiliated person is a common owner of data appointed by the creator, and the data has an indefinite period and is generally a member belonging to the same project; the authorizer is an object for creating a person to authorize data across/non-across departments to allow non-project members to view the data, and a valid time period for data authorization needs to be set at this time, namely, the authorizer has time limit on data viewing.
The corresponding operation instructions comprise adding, deleting or approving the basic tone project, and adding, inquiring or modifying project attributes, project authority information and project support information. Fig. 3 is a page in which a key item is created, in which key item basic information is shown.
The project management module 120 realizes unified management of basic tone projects, setting of project security and setting of participating units and personnel, and can meet the requirement of users on inquiry, addition, modification, deletion or approval of the affiliated projects.
Data investigation module 130: the key data input module is used for receiving input command information, establishing (initializing) an input page and realizing the key data input work of each key item.
In a preferred embodiment of the present invention, the construction of the data hierarchy 200 is accomplished by a construction comprising the following data storage modules:
the system configuration library 210: the data information generated in the system is used for storing the user basic information generated by the user management module 110, the basic information of the basic tone project generated by the project management module 120, the basic tone data input by the data research module 130, the system log generated by the system operation and the like.
The user basic information comprises user attributes, user authority information and login information. The key item basic information includes item attributes, item authority information, and item support information.
In a preferred embodiment of the present invention, the construction of presentation architecture 300 is accomplished by a construction comprising the following modules:
the data retrieval module 310: and aiming at keywords to be queried, carrying out list presentation on key items, key personnel and key mechanism information, and meeting the operations of users on the query, the addition, the modification, the deletion, the approval and the like of the items, the personnel and the mechanisms to which the key items, the key personnel and the key mechanism information belong.
Fig. 4 is a page for retrieving a key person, in which relevant information of the key person is shown.
The data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
The data authority module 320 performs logic security protection on the data, and realizes longitudinal management of the data.
In a preferred embodiment of the present invention, building the application architecture 100 further includes building a storage management module 140 for assisting in key data entry and management; the build storage management module 140 includes a build dictionary management sub-module 141 and a wide table management sub-module 142: wherein,
Dictionary management submodule 141: the method is used for constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields.
Preferably, the corresponding field information is stored independently for different key categories in the key field library. It should be noted that, under the basic tone category established by the department, different basic tone items can be divided, for example, under the category of the organization, according to different investigation purposes, a plurality of different basic tone items can be established to carry out investigation on the organization, and the affiliated person of each item can be adjusted accordingly.
More preferably, the key field library and field option dictionary are maintained and enriched periodically to satisfy the configuration of key field information for different periods and business phases.
In the invention, the field option dictionary aims at the fields with fixed and limited option information, such as the fields of 'organization country', 'gender', 'blood type', and the like, and the fields without fixed options, such as 'organization name', 'registered capital', 'interest hobbies', 'ever used name', and the like, have no corresponding options in the field option dictionary.
In the present invention, a key field library and a field option dictionary are stored in the system configuration library 210, wherein field information and option information can be called by the broad table management sub-module 142.
Table 1A shows part of field information in the key field library corresponding to the key class "organization"; table 1B shows part of field information in the key field library corresponding to the key class "person". Table 2 shows that the fields "legal type", "cultural degree", and "gender" in the key field library correspond to option information in the field option dictionary.
Table 1A key field library field information (institution)
Table 1B key field information (personnel) in the key field library
Table 2 correspondence of partial fields in the key field library to field option dictionary
Broad table management submodule 142: the method creates independent wide tables for business departments, and implements addition and removal of wide table field information, so that customized configuration of the basic tone information of each business direction is realized. The independent storage and management of the department width table meets the different management requirements of business departments (such as an industrial and commercial management department and a social management department), and realizes the transverse isolation of data.
The broad table management sub-module 142 sets a broad table for each key class independently for each department key class. For example, a person wide table and an organization wide table are set for the key categories "person" and "organization" of the business administration, respectively.
The project management module 120 is used for adding the new key project, the new key project naturally accompanies the addition of project attribute, project authority information and project support information, and the establishment of the key information template corresponding to each key project in the project support information is generated by calling all the fields in the broad table and checking the target fields.
That is, all field information under the corresponding key category is carried in the broad table, and according to different key items, the corresponding field information can be selected to set the corresponding key information template.
In the invention, the field information of the wide table is configured by calling a key field library.
In the present invention, the broad table is stored in the system configuration library 210 as a carrier for inputting the key data by the data investigation module 130.
In the present invention, the data investigation module 130 enables entry of investigation data by:
data entry mode: according to the investigation information template set by the project management module 120, determining field information of the input page, initializing the input page, and receiving and storing relevant field values of the input investigation information;
batch introduction mode: determining field information of an input page according to an investigation information template set by the project management module 120, generating an Excel file for downloading, uploading the Excel file after relevant field values of the investigation information are input, and inputting data in a system;
Performing attribute verification on the entered key data and providing verification result information (data error correction);
the method comprises the steps of comparing field values of key attributes (such as essential attributes of key data and investigation indexes indispensable during investigation) under different record numbers in the recorded data and the uploaded Excel file, and sending out abnormal prompt information (prompting recorded) when a plurality of records with the same attribute field values appear, so that the accuracy and the effectiveness of data transmission are ensured.
According to the invention, the key data input or input in batches are stored in the wide table corresponding to the key category to which the key item belongs through the input page.
In a preferred embodiment of the present invention, the key items include a personnel investigation item and an organization investigation item. Accordingly, the data investigation module 130 includes a personnel investigation submodule 131 and a mechanism investigation submodule 132, which respectively record data of personnel investigation items and mechanism investigation items:
the entering operation of the personnel investigation submodule 131 comprises the following steps:
data entry mode: the field information of the input page is determined according to the personnel investigation information template set by the project management module 120, initialization of the input page is realized, and relevant field values of the input personnel investigation information are received and stored;
Batch introduction mode: determining field information of an input page according to a personnel investigation information template set by the project management module 120, generating an Excel file for downloading, uploading the Excel file after relevant field values of personnel investigation information are input, and inputting data in a system;
performing attribute verification on the input or imported key data, and providing verification result information; if the attribute of the input value under the field 'birth date' is a 'yyyy-mm-dd' date type value, if the input value is a non-date type field value, an abnormal prompt message is sent;
and comparing personnel certificate numbers under different record numbers in the recorded or imported Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded), wherein the data is not allowed to be put in storage, so that the accuracy and the effectiveness of data transmission are ensured. Wherein, a person corresponds to a record number, and all field values belonging to the same person form a record.
At this time, the key data input or input in batch is stored in the wide table corresponding to the "personnel" key category through the input page.
The input operation of the mechanism investigation submodule 132 includes:
data entry mode: determining field information of the input page according to the mechanism investigation information template set by the project management module 120, initializing the input page, and receiving and storing relevant field values of the input mechanism investigation information;
batch introduction mode: determining field information of an input page according to a mechanism investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of the input mechanism investigation information, so as to realize input of data in a system;
similarly, performing attribute verification on the input or imported key data and providing verification result information;
and comparing the organization codes under different record numbers in the recorded or imported Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded), wherein the data is not allowed to be put in storage, so that the accuracy and the effectiveness of data transmission are ensured. Wherein, a mechanism corresponds to a record number, and all field values belonging to the same mechanism form a record.
At this time, the key data input or input in batch is stored in the wide table corresponding to the "mechanism" key category through the input page.
In the invention, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority people and three associated information, thereby realizing longitudinal management of the data and improving the security of the key data: in particular, the method comprises the steps of,
1) Two-layer authentication: the data is authenticated by the key data under the item, wherein the key item is mainly used for authentication screening when related functional pages such as inquiry, uploading and the like need to select the item;
2) Three-layer security level: the method comprises three layers of sharing (all viewable), proprietary (creator, owner viewable, unauthorized) and authorization (creator, project owner, authorizer viewable) for defining the security level of the key project;
3) Three rights people: the method comprises a creator (creator of data, automatically generated according to a login user), a affiliated person (common owner of the data designated by the creator, unlimited period), an authorized person (creator cross/non cross department authorization, need to set the effective time period of data authorization) and a secret class for limiting basic tone data;
4) Three associated information: user level information, regional information, department information.
Wherein, three rights people and three associated information belong to user rights information, and three layers of security classes belong to project rights information.
In the invention, the key related field information, besides the business necessary content, can also add part of key information according to the authority and statistical requirements, namely, the data authority module 320 can realize the authentication of the data information by forming the authentication related field information. The formation of the authentication related field information mainly includes the following three cases:
1) For the project: setting a project security level when a new project is created through the project management module 120, automatically associating a creator with a designated owner to form project authority field content, and setting an authorizer if authorization requirements exist;
2) For key data: when uploading data, selecting items, automatically associating a creator and designating a affiliated person to form the content of the authority field of the key data; if there is an authorization requirement, setting an 'authorizer';
3) For all key content: for information related to an account number (three rights people), relative 'job level information', 'regional information', 'department information' is needed, so that authentication and data statistics are facilitated.
By the above operation on the key content, key field information related to key authentication is formed, and the operation flow is shown in fig. 5.
In the present invention, the authentication process of the data authority module 320 for data information is as follows:
according to key information (namely user basic information) of the login account, key information (namely basic information of a key item) of the item and data is matched, authentication screening is carried out according to an authentication rule, and finally the viewable and available item and data of the account are presented, wherein the key information (namely basic information of the key item) is as follows:
1) Project authentication: checking a minimum storage unit item of data, and judging through item security; the method is mainly used for authenticating related functional pages such as inquiry, uploading and the like when the related functional pages need to select the items; item authentication is shown in fig. 6.
For the data query page, when the items are queried, the queried items comprise the items within the authority range of the user account;
when the data is uploaded and selected, only the items of which the user account belongs to the creator or the person to which the user account belongs can be selected, and the items of which the user account belongs to the authorizer cannot be uploaded.
2) Data authentication: firstly, judging through the item security class to which the data belongs. If the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are used for authentication, and the data authentication flow is shown in fig. 7.
In the invention, the basic information investigation system is utilized to implement the input and management of the basic tone data, wherein the management of the basic tone data comprises the retrieval, statistical analysis, derivation and the like of the basic tone data; in particular, the method comprises the steps of,
entry of data:
step 1), newly adding a user: the user is newly added by the user management module 110, and the user authority roles are allocated according to initial user basic information, such as initial user name, administrative department, administrative region, administrative level, account number password, mobile phone number, email box and the like;
step 2), constructing a broad table: configuring basic investigation broad tables corresponding to different basic tone categories for the departments where the user accounts or the existing accounts newly added in the step 1) are used;
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information may be added by the wide table management sub-module 142; the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department; the construction page of the personnel item wide table is shown in fig. 8;
step 3), creating an item: creating investigation projects according to service management requirements, filling basic information of the projects, including project names, project descriptions, setting key types, people (participators), project security classes, investigation information templates and the like, and submitting to effect;
Step 4), key data input: the key data input comprises two modes, namely a data input mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by the item management module 120 by the input page, and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations; the personnel item key data entry page is shown in fig. 9;
when the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by the input page according to the investigation information template set by the item management module 120, uploading the Excel file after inputting relevant field values of investigation information, and realizing input of data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
Generally, items are classified into human key items and institutional key items.
For personnel data investigation items: similarly, investigation data uploading is divided into two modes, namely data entry and data batch import.
Data entry mode: selecting an investigation item to which personnel information belongs, automatically associating the person with the investigation item, and attaching the investigation item to a mechanism, automatically generating a data input page according to an investigation information template of the investigation item by the system, filling in the data input page, and reporting personnel information. When data is submitted, the system automatically executes data error correction and duplicate removal operations. As in fig. 9, a personnel item key data entry page is shown.
Data batch import: selecting an investigation item to which personnel information belongs, automatically associating the person with the investigation item, and attaching the investigation item to a mechanism, and automatically generating an Excel template file according to an investigation information template of the investigation item by the system to provide downloading. And after the investigation information is filled, when the data is submitted, the system automatically executes data error correction and duplicate removal operations.
For institutional data research projects: similarly, investigation data uploading is divided into two modes, namely data entry and data batch import.
Data entry mode: and selecting an investigation item to which the mechanism information belongs and automatically associating the person to which the mechanism information belongs, and automatically generating a data input page according to an investigation information template of the investigation item by the system to report filling mechanism information. When data is submitted, the system automatically executes data error correction and duplicate removal operations.
Data batch import: and selecting an investigation item to which the mechanism information belongs and automatically associating the person to which the mechanism information belongs, and automatically generating an Excel template file according to an investigation information template of the investigation item by the system to provide downloading. And after the investigation information is filled, when the data is submitted, the system automatically executes data error correction and duplicate removal operations.
Searching data:
step 5), through the data retrieval module 310, the list presentation is carried out on the key items, key personnel and key institutions, so that the inquiry, the addition, the modification, the deletion, the approval and the like of the items, the personnel and the institutions to which the user belongs are satisfied. In the process of data retrieval, checking data authority, executing two-layer authentication, three-layer security, three authority persons and three association information rules, and carrying out logic security protection on the data.
Fig. 4 shows a personnel item key data retrieval page. The field information (except 'view') of the table in the search page corresponds to the field in the investigation information template, the information 'details' under the field 'view' are linked with the investigation data template corresponding to the basic tone data, and the basic tone data displayed in the investigation data template can be invoked by clicking the 'details'.
Export of data:
step 6), the information retrieved by the data retrieval module 310 is exported, or directly exported from the system configuration library 210; the data is exported in a txt, excel, pdf, doc, docx format file, preferably an Excel file.
Statistical analysis of data:
step 7), the statistical analysis of the data comprises online statistical analysis and offline statistical analysis:
for online statistical analysis: a statistical analysis module 150 is built in the investigation system, and is used for implementing statistical analysis of the key data, and the statistical analysis result is stored in a system configuration library 210;
for offline statistical analysis: deriving the key data and performing data analysis by using statistical analysis software.
In the invention, when the basic information investigation system is used, the authorization data is presented in two pages:
1. Authorized data page: the authorized data is presented primarily. Wherein if the login account is an authorizer and is also a creator or owner, the authorized data need not be presented on this page.
2. Authorized data page: the authorization data is presented primarily. If the account number is logged in, there is authorized data that needs to be presented on this page as long as it belongs to the creator.
Another aspect of the present invention is to provide a basic information investigation system, as shown in fig. 1, which includes an application system 100, a data system 200, and a presentation system 300; wherein,
the application system 100 includes:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
preferably, the user basic information comprises user attribute, user authority information and login information; the user attributes comprise names, user account numbers, mobile phone numbers and electronic mailboxes; the user authority information comprises administrative departments, administrative regions, administrative levels and roles to which the user belongs; the login information comprises an account password.
The roles are divided into a system manager, an auditor and a general person; the system administrator has the authority to add, delete, activate and deactivate the user account, and the auditor has the authority to audit the newly built user account and to approve the newly built project.
The corresponding operation instructions comprise the steps of adding, deleting, enabling and disabling the user account, inquiring and modifying the user attribute, the user authority information and the login information, authorizing the user passing the audit, and the like. Fig. 2 is a page of a creation user in which user basic information is shown.
Project management module 120: the method is used for receiving the operation instruction information, processing the basic tone project or updating basic information of the basic tone project according to the operation instruction information, starting the initiation and approval processes of basic tone work, and uniformly carrying out data investigation.
Preferably, the key item basic information comprises item attribute, item authority information, item support information and the like; wherein, the project attribute comprises a project name and a project type (such as personnel project or institution project, corresponding key information type is personnel information or institution information); the project authority information comprises project security and participation units and personnel; the item support information comprises a key information template corresponding to each key item, and the key information template comprises key information of the key item to be counted.
The project secret classes are divided into three secret classes, namely sharing (all people can view), proprietary (creator and affiliated person can view, and can not authorize), and authorization (creator, project affiliated person and authorized person can view).
The corresponding operation instructions comprise adding, deleting or approving the basic tone project, and adding, inquiring or modifying project attributes, project authority information and project support information. Fig. 3 is a page in which a key item is created, in which key item basic information is shown.
The project management module 120 realizes unified management of basic tone projects, setting of project security and setting of participating units and personnel, and can meet the requirement of users on inquiry, addition, modification, deletion or approval of the affiliated projects.
Data investigation module 130: the system is a key data input module, receives input command information, establishes (initializes) an input page, and performs information acquisition and input work of each key item.
The data hierarchy 200 includes:
the system configuration library 210: the data information generated in the system is used for storing the user basic information generated by the user management module 110, the basic information of the basic tone project generated by the project management module 120, the basic tone data input by the data research module 130, the system log generated by the system operation and the like.
The user basic information comprises user attributes, user authority information and login information. The key item basic information includes item attributes, item authority information, and item support information.
The presentation system 300 includes:
the data retrieval module 310: and aiming at keywords to be queried, performing list presentation on key items, key personnel and key institutions, and meeting the requirements of users on query, addition, modification, deletion, approval and other operations of the items, personnel and institutions to which the key items, the key personnel and the key institutions belong.
Fig. 4 is a page for retrieving a key person, in which relevant information of the key person is shown.
The data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
The data authority module 320 performs logic security protection on the data, and realizes longitudinal management of the data.
In a preferred embodiment of the present invention, the application architecture 100 further includes a storage management module 140 for assisting in key data entry and management; it comprises the following steps:
dictionary management submodule 141: the method is used for constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields.
Preferably, the corresponding field information is stored independently for different key categories in the key field library. It should be noted that the key items established by the departments belong to different key categories, for example, under the category of the institutions, according to different investigation purposes, a plurality of different key items can be established to carry out investigation on the institutions, and the affiliated person of each item can be adjusted accordingly.
In the present invention, a key field library and a field option dictionary are stored in the system configuration library 210, wherein field information and option information can be called by the broad table management sub-module 142.
Broad table management submodule 142: the method creates independent wide tables for business departments, and implements addition and removal of wide table field information, so that customized configuration of the basic tone information of each business direction is realized. The independent storage and management of the department width table meets the different management requirements of business departments (such as an industrial and commercial management department and a social management department), and realizes the transverse isolation of data. Fig. 10 shows a schematic diagram of lateral isolation and longitudinal management.
The broad table management sub-module 142 sets a broad table for each key class independently for each department key class. For example, a person wide table and an organization wide table are set for the key categories "person" and "organization" of the business administration, respectively.
In the invention, the field information of the wide table is configured by calling a key field library.
In the present invention, the broad table is stored in the system configuration library 210 as a carrier for inputting the key data by the data investigation module 130.
In a preferred embodiment of the present invention, the key items include a personnel investigation item and an organization investigation item. Accordingly, the data investigation module 130 includes a personnel investigation submodule 131 and a mechanism investigation submodule 132, which respectively record data of personnel investigation items and mechanism investigation items:
the personnel investigation submodule 131 includes:
personnel entry sub-module 1311: the field information of the input page is determined according to the personnel investigation information template set by the project management module 120, initialization of the input page is realized, and relevant field values of the input personnel investigation information are received and stored;
personnel batch import sub-module 1312: determining field information of an input page according to a personnel investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of personnel investigation information are input, so that data input in a system is realized;
personnel data verification sub-module 1313: performing attribute verification on the key data input by the personnel input sub-module 1311 and the personnel batch input sub-module 1312, and providing verification result information; if the attribute of the input value under the field 'birth date' is a 'yyyy-mm-dd' date type value, if the input value is a non-date type field value, an abnormal prompt message is sent;
Personnel data weight-removal sub-module 1314: and comparing personnel certificate numbers under different record numbers in the recorded data and the uploaded Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded) and ensuring the accuracy and the effectiveness of data transmission when the data are not allowed to be put in storage. Wherein, a person corresponds to a record number, and all field values belonging to the same person form a record.
Wherein the mechanism investigation submodule 132 includes:
mechanism entry sub-module 1321: determining field information of the input page according to the mechanism investigation information template set by the project management module 120, initializing the input page, and receiving and storing relevant field values of the input mechanism investigation information;
the mechanism batch imports sub-submodule 1322: determining field information of an input page according to a mechanism investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of the input mechanism investigation information, so as to realize input of data in a system;
institution data validation sub-module 1323: performing attribute verification on the key data input by the mechanism input sub-module 1321 and the mechanism batch input sub-module 1322, and providing verification result information;
Mechanism data deduplication submodule 1324: and comparing the recorded data with the organization codes under different record numbers in the Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the data creator, sending out abnormal prompt information (prompting to be recorded), wherein the data is not allowed to be put in storage. Wherein, a mechanism corresponds to a record number, and all field values belonging to the same mechanism form a record.
In the invention, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority people and three associated information, thereby realizing longitudinal management of the data and improving the security of the key data: in particular, the method comprises the steps of,
1) Two-layer authentication: the data is authenticated by the key data under the item, wherein the key item is mainly used for authentication screening when related functional pages such as inquiry, uploading and the like need to select the item;
2) Three-layer security level: including shared (all viewable), proprietary (creator, owner viewable, unauthorized) and authorized (creator, project owner, authorizer viewable), for defining the security level of the key project;
3) Three rights people: the method comprises a creator (creator of data, automatically generated according to a login user), a affiliated person (common owner of the data designated by the creator, unlimited period), an authorized person (creator cross/non cross department authorization, need to set the effective time period of data authorization) and a secret class for limiting basic tone data;
4) Three associated information: user level information, regional information, department information.
Wherein, three rights people and three associated information belong to user rights information, and three layers of security classes belong to project rights information.
In the invention, the key related field information, besides the business necessary content, can also add part of key information according to the authority and statistical requirements, namely, the data authority module 320 can realize the authentication of the data information by forming the authentication related field information. The formation of the authentication related field information mainly includes the following three cases:
1) For the project: setting a project security level when a new project is created through the project management module 120, automatically associating a creator with a designated owner to form project authority field content, and setting an authorizer if authorization requirements exist;
2) For project key data: when uploading data, selecting items, automatically associating a creator and designating a affiliated person to form the content of a key data authority field; if there is an authorization requirement, setting an 'authorizer';
3) For all key content: for information related to an account number (three rights people), relative 'job level information', 'regional information', 'department information' is needed, so that authentication and data statistics are facilitated.
By the above operation on the key content, key field information related to key authentication is formed, and the operation flow is shown in fig. 5.
In the present invention, the authentication process of the data authority module 320 for data information is as follows:
according to key information (namely user basic information) of the login account, key information (namely basic information of a key item) of the item and data is matched, authentication screening is carried out according to an authentication rule, and finally the viewable and available item and data of the account are presented, wherein the key information (namely basic information of the key item) is as follows:
1) Project authentication: checking a minimum storage unit item of data, and judging through item security; the method is mainly used for authenticating related functional pages such as inquiry, uploading and the like when the related functional pages need to select the items; item authentication is shown in fig. 6.
For the data query page, when the items are queried, the queried items comprise the items within the authority range of the user account;
when the data is uploaded and selected, only the items of which the user account belongs to the creator or the person to which the user account belongs can be selected, and the items of which the user account belongs to the authorizer cannot be uploaded.
2) Data authentication: firstly, judging through the item security class to which the data belongs. If the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are used for authentication, and the data authentication flow is shown in fig. 7.
The invention has been described above in connection with preferred embodiments, which are, however, exemplary only and for illustrative purposes. On this basis, the invention can be subjected to various substitutions and improvements, and all fall within the protection scope of the invention.

Claims (7)

1. The basic information investigation method is characterized by comprising the following steps:
constructing a basic information investigation system;
inputting and managing basic tone data by utilizing a basic information investigation system;
the basic information investigation system is obtained by constructing an application system (100), a data system (200) and a presentation system (300); wherein,
the application system (100) is used for receiving the instruction information of the service personnel and implementing the input and management of data;
A data hierarchy (200) for storing all data information generated internally to the system;
a presentation architecture (300) for visualizing presentation system pages and stored data;
the construction of the application system (100) is realized by the construction comprising the following modules:
user management module (110): the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
project management module (120): the method is used for receiving the operation instruction information, processing the key item according to the operation instruction information, or updating the basic information of the key item, and starting the initiation and approval flow of the key work;
data investigation module (130): the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and realizes key data input work of each key item;
the construction application system (100) further comprises a construction storage management module (140) for assisting in key data entry and management;
the construction of the data hierarchy (200) is achieved by a construction comprising the following data storage modules:
system configuration library (210): the system is used for storing data information generated in the system, and comprises user basic information generated by a user management module (110), basic tone project basic information generated by a project management module (120), basic tone data input by a data investigation module (130) and a system log generated by system operation;
The construction of the presentation architecture (300) is achieved by a construction comprising the following modules:
data retrieval module (310): aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanism information;
data rights module (320): authentication is carried out on the project and the key data under the project through the user authority information set by the user management module (110) and the project authority information set by the project management module (120), so that the data presented by the data retrieval module (310) are visible data in the user authority range;
the build storage management module (140) includes a build dictionary management sub-module (141) and a wide table management sub-module (142): wherein,
dictionary management submodule (141): the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule (142): creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
The corresponding field information is independently stored aiming at different key categories in the key field library;
the data authority module (320) performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
two-layer authentication: from itemsKey data under the item, authenticating the data;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
2. The method for studying basic information according to claim 1, wherein,
a basic tone field library and a field option dictionary are regularly maintained and enriched.
3. The method for studying basic information according to claim 1, wherein,
the field information of the broad table may be configured by calling a key field library.
4. The basic information investigation method of claim 1, wherein the authentication procedure of the data rights module (320) for the data information is as follows:
project authentication: checking a minimum storage unit item of data, and judging through item security;
Data authentication: firstly, judging through the item security class of the data; if the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are authenticated.
5. The basic information investigation method according to claim 1, wherein the entering of the key data comprises the steps of:
step 1'), newly adding a user: newly adding a user through a user management module (110), initializing user basic information, and distributing user authority roles;
step 1), constructing a broad table: using the newly added user account or the existing account in the step 1'), configuring a basic investigation broad table corresponding to different basic tone categories for the department:
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information can be added by a wide table management sub-module (142); the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department;
Step 2), creating an item: creating an investigation project according to the service management requirement, filling in basic information of the basic tone project, and submitting to effect;
step 3), key data input: the key data input comprises two modes, namely a data input mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by an item management module (120), and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations;
when the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by an input page according to an investigation information template set by an item management module (120), uploading the Excel file after inputting relevant field values of investigation information, and inputting data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
6. The basic information investigation system is characterized by comprising an application system (100), a data system (200) and a presentation system (300);
the application system (100) comprises:
User management module (110): the method comprises the steps of receiving operation instruction information, and performing operation processing on a user account according to the operation instruction information or updating user basic information;
project management module (120): the method comprises the steps of receiving operation instruction information, processing a key item according to the operation instruction information, or updating basic information of the key item, and starting a start and approval process of key work;
data investigation module (130): the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and performs information acquisition and input work of each key item;
the application system (100) further comprises a storage management module (140) for assisting in key data entry and management;
the data hierarchy (200) includes:
system configuration library (210): the system is used for storing data information generated in the system, and comprises user basic information generated by a user management module (110), basic tone project basic information generated by a project management module (120), basic tone data input by a data investigation module (130) and a system log generated by system operation;
the presentation system (300) comprises:
data retrieval module (310): aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanisms;
Data rights module (320): authentication is carried out on the project and the key data under the project through the user authority information set by the user management module (110) and the project authority information set by the project management module (120), so that the data presented by the data retrieval module (310) are visible data in the user authority range;
the storage management module (140) includes a dictionary management sub-module (141) and a wide table management sub-module (142): wherein,
dictionary management submodule (141): the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule (142): creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
the corresponding field information is independently stored aiming at different key categories in the key field library;
the data authority module (320) performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
Two-layer authentication: from itemsKey data under the item, authenticating the data;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
7. The basic information investigation system of claim 6, wherein the user basic information comprises user attributes, user rights information and login information;
the key item basic information includes item attributes, item authority information, and item support information.
CN201811377763.2A 2018-11-19 2018-11-19 Basic information investigation system and method Active CN111198878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811377763.2A CN111198878B (en) 2018-11-19 2018-11-19 Basic information investigation system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811377763.2A CN111198878B (en) 2018-11-19 2018-11-19 Basic information investigation system and method

Publications (2)

Publication Number Publication Date
CN111198878A CN111198878A (en) 2020-05-26
CN111198878B true CN111198878B (en) 2023-11-10

Family

ID=70743855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811377763.2A Active CN111198878B (en) 2018-11-19 2018-11-19 Basic information investigation system and method

Country Status (1)

Country Link
CN (1) CN111198878B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111985200B (en) * 2020-08-18 2024-06-25 南京六的平方信息技术有限公司 Data collection statistical method and system thereof
CN112632026A (en) * 2020-10-29 2021-04-09 江苏海岸线互联网科技有限公司 Industrial discrete data structured database system
CN112633920B (en) * 2020-12-15 2022-10-21 广东广建项目管理有限公司 Data research method, device and storage medium
CN112712330A (en) * 2020-12-15 2021-04-27 广东广建项目管理有限公司 Investigation monitoring and feasibility summarizing system for construction environment
CN113326310B (en) * 2021-06-18 2023-04-18 立信(重庆)数据科技股份有限公司 NLP-based research data standardization method and system
CN117973356A (en) * 2024-04-01 2024-05-03 上海艾拉比智能科技有限公司 Investigation tool, generation method and use method thereof and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104299152A (en) * 2014-10-21 2015-01-21 沈阳化工大学 Client management information system
CN104951954A (en) * 2014-03-25 2015-09-30 上海旭中市场信息咨询有限公司 FMCG research system
CN108038719A (en) * 2017-12-06 2018-05-15 企创创(广州)科技有限公司 A kind of market service investigation system based on internet
CN108335080A (en) * 2018-01-25 2018-07-27 广州建衡工程咨询有限公司 A kind of Construction Audit system and implementation method
CN108462888A (en) * 2018-03-14 2018-08-28 江苏有线数据网络有限责任公司 The intelligent association analysis method and system of user's TV and internet behavior

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951954A (en) * 2014-03-25 2015-09-30 上海旭中市场信息咨询有限公司 FMCG research system
CN104299152A (en) * 2014-10-21 2015-01-21 沈阳化工大学 Client management information system
CN108038719A (en) * 2017-12-06 2018-05-15 企创创(广州)科技有限公司 A kind of market service investigation system based on internet
CN108335080A (en) * 2018-01-25 2018-07-27 广州建衡工程咨询有限公司 A kind of Construction Audit system and implementation method
CN108462888A (en) * 2018-03-14 2018-08-28 江苏有线数据网络有限责任公司 The intelligent association analysis method and system of user's TV and internet behavior

Also Published As

Publication number Publication date
CN111198878A (en) 2020-05-26

Similar Documents

Publication Publication Date Title
CN111198878B (en) Basic information investigation system and method
US20220075889A1 (en) System of decentralized Zero-Trust services for creating, using and analyzing securely commingled Self-Governing data sets
US11461785B2 (en) System and method to identify, classify and monetize information as an intangible asset and a production model based thereon
US8296297B2 (en) Content analysis and correlation
US8306999B2 (en) Computer-implemented systems, methods, and computer program product for providing row-level security in a database network
CN100430951C (en) Systems and methods of access control enabling ownership of access control lists to users or groups
US20170277773A1 (en) Systems and methods for secure storage of user information in a user profile
JP6932175B2 (en) Personal number management device, personal number management method, and personal number management program
EP2405607B1 (en) Privilege management system and method based on object
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
US20130304765A1 (en) Automatic folder access management
US7617211B2 (en) System and method for automatically synchronizing security-relevant information between a relational database and a multidimensional database
KR102187861B1 (en) A System Providing Job Search Service Using Block Chain
US9037537B2 (en) Automatic redaction of content for alternate reviewers in document workflow solutions
US20170277775A1 (en) Systems and methods for secure storage of user information in a user profile
KR20190029509A (en) System and method for securely storing user information in a user profile
CN103150320B (en) The system and method that content is issued for electronics
Fan et al. Heronian mean operators of linguistic neutrosophic multisets and their multiple attribute decision-making methods
US20190080369A1 (en) Systems and methods for providing a decentralized platform for connecting members of an open-science community
JP4292342B2 (en) Approval route determination method and program in electronic approval system
US7814049B2 (en) Computer device for managing documents in multi-user mode
KR100358876B1 (en) Method and system for verifying access to a network environment
JP2005285008A (en) Data security management system, program, and data security management method
WO2018232021A2 (en) Systems and methods for secure storage of user information in a user profile
Bondade et al. Attribute based Encryption for Improved Multi-Keyword Search in Information Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant