CN111198878B - Basic information investigation system and method - Google Patents
Basic information investigation system and method Download PDFInfo
- Publication number
- CN111198878B CN111198878B CN201811377763.2A CN201811377763A CN111198878B CN 111198878 B CN111198878 B CN 111198878B CN 201811377763 A CN201811377763 A CN 201811377763A CN 111198878 B CN111198878 B CN 111198878B
- Authority
- CN
- China
- Prior art keywords
- data
- information
- key
- module
- item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000011835 investigation Methods 0.000 title claims abstract description 148
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000007726 management method Methods 0.000 claims description 133
- 230000007246 mechanism Effects 0.000 claims description 40
- 238000010276 construction Methods 0.000 claims description 23
- 238000013475 authorization Methods 0.000 claims description 17
- 238000013479 data entry Methods 0.000 claims description 17
- 238000012937 correction Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 11
- 230000008676 import Effects 0.000 claims description 10
- 238000013523 data management Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 claims description 3
- 230000008520 organization Effects 0.000 abstract description 14
- 230000001788 irregular Effects 0.000 abstract 1
- 238000011160 research Methods 0.000 description 15
- 238000007619 statistical method Methods 0.000 description 11
- 238000012795 verification Methods 0.000 description 10
- 230000002159 abnormal effect Effects 0.000 description 7
- 238000002955 isolation Methods 0.000 description 6
- 238000012217 deletion Methods 0.000 description 5
- 230000037430 deletion Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012550 audit Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012216 screening Methods 0.000 description 4
- 238000007792 addition Methods 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000013502 data validation Methods 0.000 description 2
- 238000013524 data verification Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a basic information investigation system and a basic information investigation method, wherein the basic information investigation system comprises an application system (100), a data system (200) and a presentation system (300), wherein the application system (100) is used for receiving business personnel instructions and implementing data input and management operations; a data hierarchy (200) for storing all data information generated internally to the system; a presentation architecture (300) for visualizing presentation system pages and stored data. The basic information investigation method realizes the input and management of basic tone data by constructing a basic information investigation system. The invention inputs scattered, complicated and irregular personnel information and organization information through the system platform; the manual collection efficiency is improved; the post management service is facilitated; the data security is comprehensively improved through physical security and logical security.
Description
Technical Field
The invention relates to the fields of databases and Web applications, in particular to a basic information investigation system and method.
Background
Data changes, alters, and will change people's lives more deeply, which is a part and angle of the entire information technology revolution. From the information age, various fields make a great breakthrough on data collection and use work, various business departments (such as business management departments) apply single data (such as mechanism types and statistics of economic industries) to develop greatly, and the content and types of data are continuously enriched. However, the informatization construction in the basic research field is still in a starting stage. The following problems are faced:
1) The data are scattered, and the manual collection efficiency is low;
the data are distributed in various cities, various fields and various levels, the data are relatively dispersed, and meanwhile, various media such as paper, optical discs and U discs exist in different investigation unit conditions, a unified data input platform is lacked, manual collection is difficult, and the efficiency is low.
2) The data are complicated, and the manual arrangement is not performed;
because of different conditions of each investigation unit, the collected data is complex, a unified data input platform is lacked, and the manual arrangement difficulty is high.
3) The data is less, so that the post management service is inconvenient;
most of research data are stored in different servers or personal computers in various modes, a unified data management service platform is lacked, management is not carried out according to a unified classification system and a unified security system, and the security and the reuse value of the data are reduced.
4) The data is not standard and can not be quickly integrated and utilized;
the research tasks are multiple, the unified specification is lacking, even if the same task is used, the recorded information content and the field quantity of different research units are difficult to unify, the strong relevance of the data is poor, a unified data integration platform is lacking, the manual integration is time-consuming, and the utilization rate is low.
Because of the problems, the inventor researches and analyzes related technologies such as a database, data input, data authority and the like to expect to develop a basic information investigation system and method, and provides a standard input form of an input template to improve manual collection efficiency, and data authentication to improve data security, so as to provide clear basic investigation data information within a corresponding authority range for business personnel of various industry departments such as an industrial and commercial management department and a social management department.
Disclosure of Invention
In order to overcome the problems, the inventor accumulates the work for a long time, researches and analyzes the work from the flexibility, the usability and the data safety of the system as starting points through project practice, and provides a basic information investigation system and method.
The invention aims to provide the following technical scheme:
(1) A basic information investigation method comprises the following steps:
constructing a basic information investigation system;
inputting and managing basic tone data by utilizing a basic information investigation system;
the basic information investigation system is obtained by constructing an application system 100, a data system 200 and a presentation system 300; wherein,
the application system 100 is used for receiving the instruction information of the service personnel and implementing the input and management of data;
A data hierarchy 200 for storing all data information generated within the storage system;
presentation system 300 is used to visually present system pages and stored data.
In a preferred embodiment, the construction of the application system 100 is achieved by a construction comprising the following modules:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
project management module 120: the method is used for receiving the operation instruction information, processing the key item according to the operation instruction information, or updating the basic information of the key item, and starting the initiation and approval flow of the key work;
data investigation module 130: the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and realizes key data input work of each key item;
preferably, building the application architecture 100 further includes building a storage management module 140 for assisting in key data entry and management;
the construction of the data hierarchy 200 is achieved by a construction comprising the following data storage modules:
the system configuration library 210: the system is used for storing data information generated inside the system, including user basic information generated by the user management module 110, basic tone project basic information generated by the project management module 120, basic tone data input by the data investigation module 130, system logs generated by system operation and the like;
The construction of presentation architecture 300 is achieved by a construction comprising the following modules:
the data retrieval module 310: aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanism information;
the data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
In a preferred embodiment, building the storage management module 140 includes building a dictionary management sub-module 141 and a broad table management sub-module 142: wherein,
dictionary management submodule 141: the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule 142: creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
preferably, corresponding field information is independently stored for different key categories in the key field library;
More preferably, the key field library and the field option dictionary are maintained and enriched periodically;
more preferably, the field information of the broad table may be configured by calling a key field library.
In a preferred embodiment, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
two-layer authentication: authenticating the data according to the key data under the item;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
In a preferred embodiment, the data authority module 320 authenticates the data information as follows:
project authentication: checking a minimum storage unit item of data, and judging through item security;
data authentication: firstly, judging through the item security class of the data; if the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are authenticated.
In a preferred embodiment, the entry of key data comprises the steps of:
step 1'), newly adding a user: newly adding a user through the user management module 110, initializing user basic information, and distributing user authority roles;
step 1), constructing a broad table: using the newly added user account or the existing account in the step 1'), configuring a basic investigation broad table corresponding to different basic tone categories for the department:
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information may be added by the wide table management sub-module 142; the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department;
step 2), creating an item: creating an investigation project according to the service management requirement, filling in basic information of the basic tone project, and submitting to effect;
step 3), key data input: preferably, the key data entry includes two modes, namely a data entry mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by the item management module 120 by the input page, and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations;
When the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by the input page according to the investigation information template set by the item management module 120, uploading the Excel file after inputting relevant field values of investigation information, and realizing input of data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
(2) A basic information investigation system, preferably for carrying out the method described in the above (1).
The basic information investigation system and method provided by the invention have the following beneficial effects:
(1) An independent wide table is established for each business department, and the independent storage and management of the wide table meets the different management requirements of each business department (such as an industrial and commercial management department and a social management department) and realizes the transverse isolation of data;
the data is logically and safely protected through two-layer authentication, three-layer security, three rights people and three associated information, so that the longitudinal management of the data is realized; the security of the key data is improved by the transverse isolation and the longitudinal management;
(2) The wide-table field information can be conveniently configured for each business department by setting and calling a basic tone field library;
the investigation information template is conveniently configured by checking the wide-table field information, so that the collection and the input of investigation data in a system are facilitated;
(3) The scattered, complicated and nonstandard personnel information is unified in data input through the system platform by the user management module, the storage management module, the project management module, the data investigation module, the data retrieval module and the data authority module, so that the collection, processing and fusion of basic investigation data are improved, and the effective management service of basic data is finally achieved.
Drawings
Fig. 1 is a schematic structural diagram of a basic information investigation system in a preferred embodiment of the present invention;
FIG. 2 shows a page of a basic information research system creating a user in a preferred embodiment of the present invention;
FIG. 3 illustrates a page of a basic information research system in a preferred embodiment of the present invention when a key item is created;
FIG. 4 shows a page of the basic information research system retrieving a key person in a preferred embodiment of the present invention;
fig. 5 is a flow chart for forming authentication related field information in a preferred embodiment of the present invention;
FIG. 6 shows a flow chart of item authentication in a preferred embodiment of the invention;
FIG. 7 shows a flow chart of data authentication in a preferred embodiment of the invention;
FIG. 8 shows a basic information research system personnel item wide table construction page in a preferred embodiment of the present invention;
FIG. 9 is a schematic diagram of a basic information research system personnel project key data entry page in a preferred embodiment of the present invention;
fig. 10 is a schematic diagram showing lateral isolation and longitudinal management of a basic information research system in a preferred embodiment of the present invention.
Reference numerals illustrate:
100-application system;
110-a user management module;
120-project management module;
130-a data investigation module;
131-personnel investigation submodule;
1311-personnel entry sub-module;
1312-importing the sub-modules in batches by personnel;
1313-personnel data verification sub-module;
1314-personnel data weight-shifting sub-module;
132-a mechanism investigation submodule;
1321-mechanism entry sub-module;
1322-bulk import of the mechanism into sub-modules;
1323-institution data validation sub-module;
1324-mechanism data de-duplication sub-module;
140-a storage management module;
141-a dictionary management sub-module;
142-wide table management submodule;
150-a statistical analysis module;
200-data hierarchy;
210-a system configuration library;
300-a presentation system;
310-a data retrieval module;
320-data rights module.
Detailed Description
The invention is further described in detail below by means of the figures and examples. The features and advantages of the present invention will become more apparent from the description.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In order to improve the collection efficiency of large-scale key data, facilitate the later stage arrangement, aiming at the problems of lack of unified input standards and unified data input/integration/management platforms, the system and the method effectively develop from the aspects of data input, data analysis, data management and data security so as to acquire a basic information investigation system and method, and input/integrate/manage the key data in a clear mode.
The invention aims to provide a basic information investigation method, which comprises the following steps:
constructing a basic information investigation system;
and inputting and managing the key data by using the basic information investigation system.
In the invention, a basic information investigation system is obtained by constructing an application system 100, a data system 200 and a presentation system 300, as shown in fig. 1; wherein,
the application system 100 is used for receiving the instruction information of the service personnel and implementing the input and management of data;
a data hierarchy 200 for storing all data information generated within the storage system;
Presentation system 300 is used to visually present system pages and stored data.
In a preferred embodiment of the present invention, the construction of the application system 100 is achieved by a construction comprising the following modules:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
preferably, the user basic information comprises user attribute, user authority information and login information; the user attributes comprise names, user account numbers, mobile phone numbers and electronic mailboxes; the user authority information comprises administrative departments, administrative regions, administrative levels and roles to which the user belongs; the login information comprises an account password.
The roles are divided into a system manager, an auditor and a general person; the system administrator has the authority to add, delete, activate and deactivate the user account, and the auditor has the authority to audit the newly built user account and to approve the newly built project.
The corresponding operation instructions comprise the steps of adding, deleting, enabling and disabling the user account, inquiring and modifying the user attribute, the user authority information and the login information, authorizing the user passing the audit, and the like. Fig. 2 is a page of a creation user in which user basic information is shown.
Project management module 120: the method is used for receiving the operation instruction information, processing the basic tone project or updating basic information of the basic tone project according to the operation instruction information, starting the initiation and approval processes of basic tone work, and uniformly carrying out data investigation.
Preferably, the key item basic information comprises item attribute, item authority information, item support information and the like; wherein, the project attribute comprises a project name and a project type (such as personnel project or institution project, corresponding key information type is personnel information or institution information); the project authority information comprises project security and participation units and personnel; the item support information comprises a key information template corresponding to each key item, and the key information template comprises key information of the key item to be counted.
The project secret classes are divided into three secret classes, namely sharing (all people can view), proprietary (creator and affiliated person can view, and can not authorize), and authorization (creator, project affiliated person and authorized person can view). The creator is a creator of the data and is automatically generated according to the login user; the affiliated person is a common owner of data appointed by the creator, and the data has an indefinite period and is generally a member belonging to the same project; the authorizer is an object for creating a person to authorize data across/non-across departments to allow non-project members to view the data, and a valid time period for data authorization needs to be set at this time, namely, the authorizer has time limit on data viewing.
The corresponding operation instructions comprise adding, deleting or approving the basic tone project, and adding, inquiring or modifying project attributes, project authority information and project support information. Fig. 3 is a page in which a key item is created, in which key item basic information is shown.
The project management module 120 realizes unified management of basic tone projects, setting of project security and setting of participating units and personnel, and can meet the requirement of users on inquiry, addition, modification, deletion or approval of the affiliated projects.
Data investigation module 130: the key data input module is used for receiving input command information, establishing (initializing) an input page and realizing the key data input work of each key item.
In a preferred embodiment of the present invention, the construction of the data hierarchy 200 is accomplished by a construction comprising the following data storage modules:
the system configuration library 210: the data information generated in the system is used for storing the user basic information generated by the user management module 110, the basic information of the basic tone project generated by the project management module 120, the basic tone data input by the data research module 130, the system log generated by the system operation and the like.
The user basic information comprises user attributes, user authority information and login information. The key item basic information includes item attributes, item authority information, and item support information.
In a preferred embodiment of the present invention, the construction of presentation architecture 300 is accomplished by a construction comprising the following modules:
the data retrieval module 310: and aiming at keywords to be queried, carrying out list presentation on key items, key personnel and key mechanism information, and meeting the operations of users on the query, the addition, the modification, the deletion, the approval and the like of the items, the personnel and the mechanisms to which the key items, the key personnel and the key mechanism information belong.
Fig. 4 is a page for retrieving a key person, in which relevant information of the key person is shown.
The data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
The data authority module 320 performs logic security protection on the data, and realizes longitudinal management of the data.
In a preferred embodiment of the present invention, building the application architecture 100 further includes building a storage management module 140 for assisting in key data entry and management; the build storage management module 140 includes a build dictionary management sub-module 141 and a wide table management sub-module 142: wherein,
Dictionary management submodule 141: the method is used for constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields.
Preferably, the corresponding field information is stored independently for different key categories in the key field library. It should be noted that, under the basic tone category established by the department, different basic tone items can be divided, for example, under the category of the organization, according to different investigation purposes, a plurality of different basic tone items can be established to carry out investigation on the organization, and the affiliated person of each item can be adjusted accordingly.
More preferably, the key field library and field option dictionary are maintained and enriched periodically to satisfy the configuration of key field information for different periods and business phases.
In the invention, the field option dictionary aims at the fields with fixed and limited option information, such as the fields of 'organization country', 'gender', 'blood type', and the like, and the fields without fixed options, such as 'organization name', 'registered capital', 'interest hobbies', 'ever used name', and the like, have no corresponding options in the field option dictionary.
In the present invention, a key field library and a field option dictionary are stored in the system configuration library 210, wherein field information and option information can be called by the broad table management sub-module 142.
Table 1A shows part of field information in the key field library corresponding to the key class "organization"; table 1B shows part of field information in the key field library corresponding to the key class "person". Table 2 shows that the fields "legal type", "cultural degree", and "gender" in the key field library correspond to option information in the field option dictionary.
Table 1A key field library field information (institution)
Table 1B key field information (personnel) in the key field library
Table 2 correspondence of partial fields in the key field library to field option dictionary
Broad table management submodule 142: the method creates independent wide tables for business departments, and implements addition and removal of wide table field information, so that customized configuration of the basic tone information of each business direction is realized. The independent storage and management of the department width table meets the different management requirements of business departments (such as an industrial and commercial management department and a social management department), and realizes the transverse isolation of data.
The broad table management sub-module 142 sets a broad table for each key class independently for each department key class. For example, a person wide table and an organization wide table are set for the key categories "person" and "organization" of the business administration, respectively.
The project management module 120 is used for adding the new key project, the new key project naturally accompanies the addition of project attribute, project authority information and project support information, and the establishment of the key information template corresponding to each key project in the project support information is generated by calling all the fields in the broad table and checking the target fields.
That is, all field information under the corresponding key category is carried in the broad table, and according to different key items, the corresponding field information can be selected to set the corresponding key information template.
In the invention, the field information of the wide table is configured by calling a key field library.
In the present invention, the broad table is stored in the system configuration library 210 as a carrier for inputting the key data by the data investigation module 130.
In the present invention, the data investigation module 130 enables entry of investigation data by:
data entry mode: according to the investigation information template set by the project management module 120, determining field information of the input page, initializing the input page, and receiving and storing relevant field values of the input investigation information;
batch introduction mode: determining field information of an input page according to an investigation information template set by the project management module 120, generating an Excel file for downloading, uploading the Excel file after relevant field values of the investigation information are input, and inputting data in a system;
Performing attribute verification on the entered key data and providing verification result information (data error correction);
the method comprises the steps of comparing field values of key attributes (such as essential attributes of key data and investigation indexes indispensable during investigation) under different record numbers in the recorded data and the uploaded Excel file, and sending out abnormal prompt information (prompting recorded) when a plurality of records with the same attribute field values appear, so that the accuracy and the effectiveness of data transmission are ensured.
According to the invention, the key data input or input in batches are stored in the wide table corresponding to the key category to which the key item belongs through the input page.
In a preferred embodiment of the present invention, the key items include a personnel investigation item and an organization investigation item. Accordingly, the data investigation module 130 includes a personnel investigation submodule 131 and a mechanism investigation submodule 132, which respectively record data of personnel investigation items and mechanism investigation items:
the entering operation of the personnel investigation submodule 131 comprises the following steps:
data entry mode: the field information of the input page is determined according to the personnel investigation information template set by the project management module 120, initialization of the input page is realized, and relevant field values of the input personnel investigation information are received and stored;
Batch introduction mode: determining field information of an input page according to a personnel investigation information template set by the project management module 120, generating an Excel file for downloading, uploading the Excel file after relevant field values of personnel investigation information are input, and inputting data in a system;
performing attribute verification on the input or imported key data, and providing verification result information; if the attribute of the input value under the field 'birth date' is a 'yyyy-mm-dd' date type value, if the input value is a non-date type field value, an abnormal prompt message is sent;
and comparing personnel certificate numbers under different record numbers in the recorded or imported Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded), wherein the data is not allowed to be put in storage, so that the accuracy and the effectiveness of data transmission are ensured. Wherein, a person corresponds to a record number, and all field values belonging to the same person form a record.
At this time, the key data input or input in batch is stored in the wide table corresponding to the "personnel" key category through the input page.
The input operation of the mechanism investigation submodule 132 includes:
data entry mode: determining field information of the input page according to the mechanism investigation information template set by the project management module 120, initializing the input page, and receiving and storing relevant field values of the input mechanism investigation information;
batch introduction mode: determining field information of an input page according to a mechanism investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of the input mechanism investigation information, so as to realize input of data in a system;
similarly, performing attribute verification on the input or imported key data and providing verification result information;
and comparing the organization codes under different record numbers in the recorded or imported Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded), wherein the data is not allowed to be put in storage, so that the accuracy and the effectiveness of data transmission are ensured. Wherein, a mechanism corresponds to a record number, and all field values belonging to the same mechanism form a record.
At this time, the key data input or input in batch is stored in the wide table corresponding to the "mechanism" key category through the input page.
In the invention, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority people and three associated information, thereby realizing longitudinal management of the data and improving the security of the key data: in particular, the method comprises the steps of,
1) Two-layer authentication: the data is authenticated by the key data under the item, wherein the key item is mainly used for authentication screening when related functional pages such as inquiry, uploading and the like need to select the item;
2) Three-layer security level: the method comprises three layers of sharing (all viewable), proprietary (creator, owner viewable, unauthorized) and authorization (creator, project owner, authorizer viewable) for defining the security level of the key project;
3) Three rights people: the method comprises a creator (creator of data, automatically generated according to a login user), a affiliated person (common owner of the data designated by the creator, unlimited period), an authorized person (creator cross/non cross department authorization, need to set the effective time period of data authorization) and a secret class for limiting basic tone data;
4) Three associated information: user level information, regional information, department information.
Wherein, three rights people and three associated information belong to user rights information, and three layers of security classes belong to project rights information.
In the invention, the key related field information, besides the business necessary content, can also add part of key information according to the authority and statistical requirements, namely, the data authority module 320 can realize the authentication of the data information by forming the authentication related field information. The formation of the authentication related field information mainly includes the following three cases:
1) For the project: setting a project security level when a new project is created through the project management module 120, automatically associating a creator with a designated owner to form project authority field content, and setting an authorizer if authorization requirements exist;
2) For key data: when uploading data, selecting items, automatically associating a creator and designating a affiliated person to form the content of the authority field of the key data; if there is an authorization requirement, setting an 'authorizer';
3) For all key content: for information related to an account number (three rights people), relative 'job level information', 'regional information', 'department information' is needed, so that authentication and data statistics are facilitated.
By the above operation on the key content, key field information related to key authentication is formed, and the operation flow is shown in fig. 5.
In the present invention, the authentication process of the data authority module 320 for data information is as follows:
according to key information (namely user basic information) of the login account, key information (namely basic information of a key item) of the item and data is matched, authentication screening is carried out according to an authentication rule, and finally the viewable and available item and data of the account are presented, wherein the key information (namely basic information of the key item) is as follows:
1) Project authentication: checking a minimum storage unit item of data, and judging through item security; the method is mainly used for authenticating related functional pages such as inquiry, uploading and the like when the related functional pages need to select the items; item authentication is shown in fig. 6.
For the data query page, when the items are queried, the queried items comprise the items within the authority range of the user account;
when the data is uploaded and selected, only the items of which the user account belongs to the creator or the person to which the user account belongs can be selected, and the items of which the user account belongs to the authorizer cannot be uploaded.
2) Data authentication: firstly, judging through the item security class to which the data belongs. If the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are used for authentication, and the data authentication flow is shown in fig. 7.
In the invention, the basic information investigation system is utilized to implement the input and management of the basic tone data, wherein the management of the basic tone data comprises the retrieval, statistical analysis, derivation and the like of the basic tone data; in particular, the method comprises the steps of,
entry of data:
step 1), newly adding a user: the user is newly added by the user management module 110, and the user authority roles are allocated according to initial user basic information, such as initial user name, administrative department, administrative region, administrative level, account number password, mobile phone number, email box and the like;
step 2), constructing a broad table: configuring basic investigation broad tables corresponding to different basic tone categories for the departments where the user accounts or the existing accounts newly added in the step 1) are used;
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information may be added by the wide table management sub-module 142; the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department; the construction page of the personnel item wide table is shown in fig. 8;
step 3), creating an item: creating investigation projects according to service management requirements, filling basic information of the projects, including project names, project descriptions, setting key types, people (participators), project security classes, investigation information templates and the like, and submitting to effect;
Step 4), key data input: the key data input comprises two modes, namely a data input mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by the item management module 120 by the input page, and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations; the personnel item key data entry page is shown in fig. 9;
when the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by the input page according to the investigation information template set by the item management module 120, uploading the Excel file after inputting relevant field values of investigation information, and realizing input of data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
Generally, items are classified into human key items and institutional key items.
For personnel data investigation items: similarly, investigation data uploading is divided into two modes, namely data entry and data batch import.
Data entry mode: selecting an investigation item to which personnel information belongs, automatically associating the person with the investigation item, and attaching the investigation item to a mechanism, automatically generating a data input page according to an investigation information template of the investigation item by the system, filling in the data input page, and reporting personnel information. When data is submitted, the system automatically executes data error correction and duplicate removal operations. As in fig. 9, a personnel item key data entry page is shown.
Data batch import: selecting an investigation item to which personnel information belongs, automatically associating the person with the investigation item, and attaching the investigation item to a mechanism, and automatically generating an Excel template file according to an investigation information template of the investigation item by the system to provide downloading. And after the investigation information is filled, when the data is submitted, the system automatically executes data error correction and duplicate removal operations.
For institutional data research projects: similarly, investigation data uploading is divided into two modes, namely data entry and data batch import.
Data entry mode: and selecting an investigation item to which the mechanism information belongs and automatically associating the person to which the mechanism information belongs, and automatically generating a data input page according to an investigation information template of the investigation item by the system to report filling mechanism information. When data is submitted, the system automatically executes data error correction and duplicate removal operations.
Data batch import: and selecting an investigation item to which the mechanism information belongs and automatically associating the person to which the mechanism information belongs, and automatically generating an Excel template file according to an investigation information template of the investigation item by the system to provide downloading. And after the investigation information is filled, when the data is submitted, the system automatically executes data error correction and duplicate removal operations.
Searching data:
step 5), through the data retrieval module 310, the list presentation is carried out on the key items, key personnel and key institutions, so that the inquiry, the addition, the modification, the deletion, the approval and the like of the items, the personnel and the institutions to which the user belongs are satisfied. In the process of data retrieval, checking data authority, executing two-layer authentication, three-layer security, three authority persons and three association information rules, and carrying out logic security protection on the data.
Fig. 4 shows a personnel item key data retrieval page. The field information (except 'view') of the table in the search page corresponds to the field in the investigation information template, the information 'details' under the field 'view' are linked with the investigation data template corresponding to the basic tone data, and the basic tone data displayed in the investigation data template can be invoked by clicking the 'details'.
Export of data:
step 6), the information retrieved by the data retrieval module 310 is exported, or directly exported from the system configuration library 210; the data is exported in a txt, excel, pdf, doc, docx format file, preferably an Excel file.
Statistical analysis of data:
step 7), the statistical analysis of the data comprises online statistical analysis and offline statistical analysis:
for online statistical analysis: a statistical analysis module 150 is built in the investigation system, and is used for implementing statistical analysis of the key data, and the statistical analysis result is stored in a system configuration library 210;
for offline statistical analysis: deriving the key data and performing data analysis by using statistical analysis software.
In the invention, when the basic information investigation system is used, the authorization data is presented in two pages:
1. Authorized data page: the authorized data is presented primarily. Wherein if the login account is an authorizer and is also a creator or owner, the authorized data need not be presented on this page.
2. Authorized data page: the authorization data is presented primarily. If the account number is logged in, there is authorized data that needs to be presented on this page as long as it belongs to the creator.
Another aspect of the present invention is to provide a basic information investigation system, as shown in fig. 1, which includes an application system 100, a data system 200, and a presentation system 300; wherein,
the application system 100 includes:
the user management module 110: the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
preferably, the user basic information comprises user attribute, user authority information and login information; the user attributes comprise names, user account numbers, mobile phone numbers and electronic mailboxes; the user authority information comprises administrative departments, administrative regions, administrative levels and roles to which the user belongs; the login information comprises an account password.
The roles are divided into a system manager, an auditor and a general person; the system administrator has the authority to add, delete, activate and deactivate the user account, and the auditor has the authority to audit the newly built user account and to approve the newly built project.
The corresponding operation instructions comprise the steps of adding, deleting, enabling and disabling the user account, inquiring and modifying the user attribute, the user authority information and the login information, authorizing the user passing the audit, and the like. Fig. 2 is a page of a creation user in which user basic information is shown.
Project management module 120: the method is used for receiving the operation instruction information, processing the basic tone project or updating basic information of the basic tone project according to the operation instruction information, starting the initiation and approval processes of basic tone work, and uniformly carrying out data investigation.
Preferably, the key item basic information comprises item attribute, item authority information, item support information and the like; wherein, the project attribute comprises a project name and a project type (such as personnel project or institution project, corresponding key information type is personnel information or institution information); the project authority information comprises project security and participation units and personnel; the item support information comprises a key information template corresponding to each key item, and the key information template comprises key information of the key item to be counted.
The project secret classes are divided into three secret classes, namely sharing (all people can view), proprietary (creator and affiliated person can view, and can not authorize), and authorization (creator, project affiliated person and authorized person can view).
The corresponding operation instructions comprise adding, deleting or approving the basic tone project, and adding, inquiring or modifying project attributes, project authority information and project support information. Fig. 3 is a page in which a key item is created, in which key item basic information is shown.
The project management module 120 realizes unified management of basic tone projects, setting of project security and setting of participating units and personnel, and can meet the requirement of users on inquiry, addition, modification, deletion or approval of the affiliated projects.
Data investigation module 130: the system is a key data input module, receives input command information, establishes (initializes) an input page, and performs information acquisition and input work of each key item.
The data hierarchy 200 includes:
the system configuration library 210: the data information generated in the system is used for storing the user basic information generated by the user management module 110, the basic information of the basic tone project generated by the project management module 120, the basic tone data input by the data research module 130, the system log generated by the system operation and the like.
The user basic information comprises user attributes, user authority information and login information. The key item basic information includes item attributes, item authority information, and item support information.
The presentation system 300 includes:
the data retrieval module 310: and aiming at keywords to be queried, performing list presentation on key items, key personnel and key institutions, and meeting the requirements of users on query, addition, modification, deletion, approval and other operations of the items, personnel and institutions to which the key items, the key personnel and the key institutions belong.
Fig. 4 is a page for retrieving a key person, in which relevant information of the key person is shown.
The data rights module 320: the user authority information set by the user management module 110 and the project authority information set by the project management module 120 authenticate the project and the key data under the project, so that the data presented by the data retrieval module 310 are visible data in the user authority range.
The data authority module 320 performs logic security protection on the data, and realizes longitudinal management of the data.
In a preferred embodiment of the present invention, the application architecture 100 further includes a storage management module 140 for assisting in key data entry and management; it comprises the following steps:
dictionary management submodule 141: the method is used for constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields.
Preferably, the corresponding field information is stored independently for different key categories in the key field library. It should be noted that the key items established by the departments belong to different key categories, for example, under the category of the institutions, according to different investigation purposes, a plurality of different key items can be established to carry out investigation on the institutions, and the affiliated person of each item can be adjusted accordingly.
In the present invention, a key field library and a field option dictionary are stored in the system configuration library 210, wherein field information and option information can be called by the broad table management sub-module 142.
Broad table management submodule 142: the method creates independent wide tables for business departments, and implements addition and removal of wide table field information, so that customized configuration of the basic tone information of each business direction is realized. The independent storage and management of the department width table meets the different management requirements of business departments (such as an industrial and commercial management department and a social management department), and realizes the transverse isolation of data. Fig. 10 shows a schematic diagram of lateral isolation and longitudinal management.
The broad table management sub-module 142 sets a broad table for each key class independently for each department key class. For example, a person wide table and an organization wide table are set for the key categories "person" and "organization" of the business administration, respectively.
In the invention, the field information of the wide table is configured by calling a key field library.
In the present invention, the broad table is stored in the system configuration library 210 as a carrier for inputting the key data by the data investigation module 130.
In a preferred embodiment of the present invention, the key items include a personnel investigation item and an organization investigation item. Accordingly, the data investigation module 130 includes a personnel investigation submodule 131 and a mechanism investigation submodule 132, which respectively record data of personnel investigation items and mechanism investigation items:
the personnel investigation submodule 131 includes:
personnel entry sub-module 1311: the field information of the input page is determined according to the personnel investigation information template set by the project management module 120, initialization of the input page is realized, and relevant field values of the input personnel investigation information are received and stored;
personnel batch import sub-module 1312: determining field information of an input page according to a personnel investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of personnel investigation information are input, so that data input in a system is realized;
personnel data verification sub-module 1313: performing attribute verification on the key data input by the personnel input sub-module 1311 and the personnel batch input sub-module 1312, and providing verification result information; if the attribute of the input value under the field 'birth date' is a 'yyyy-mm-dd' date type value, if the input value is a non-date type field value, an abnormal prompt message is sent;
Personnel data weight-removal sub-module 1314: and comparing personnel certificate numbers under different record numbers in the recorded data and the uploaded Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the same data creator, sending out abnormal prompt information (prompting recorded) and ensuring the accuracy and the effectiveness of data transmission when the data are not allowed to be put in storage. Wherein, a person corresponds to a record number, and all field values belonging to the same person form a record.
Wherein the mechanism investigation submodule 132 includes:
mechanism entry sub-module 1321: determining field information of the input page according to the mechanism investigation information template set by the project management module 120, initializing the input page, and receiving and storing relevant field values of the input mechanism investigation information;
the mechanism batch imports sub-submodule 1322: determining field information of an input page according to a mechanism investigation information template set by the project management module 120, generating an Excel file for downloading, and receiving the Excel file after relevant field values of the input mechanism investigation information, so as to realize input of data in a system;
institution data validation sub-module 1323: performing attribute verification on the key data input by the mechanism input sub-module 1321 and the mechanism batch input sub-module 1322, and providing verification result information;
Mechanism data deduplication submodule 1324: and comparing the recorded data with the organization codes under different record numbers in the Excel file according to the project and the data creator, and if a plurality of records with the same attribute field value appear under the same project and the data creator, sending out abnormal prompt information (prompting to be recorded), wherein the data is not allowed to be put in storage. Wherein, a mechanism corresponds to a record number, and all field values belonging to the same mechanism form a record.
In the invention, the data authority module 320 performs logic security protection on the data through two-layer authentication, three-layer security, three authority people and three associated information, thereby realizing longitudinal management of the data and improving the security of the key data: in particular, the method comprises the steps of,
1) Two-layer authentication: the data is authenticated by the key data under the item, wherein the key item is mainly used for authentication screening when related functional pages such as inquiry, uploading and the like need to select the item;
2) Three-layer security level: including shared (all viewable), proprietary (creator, owner viewable, unauthorized) and authorized (creator, project owner, authorizer viewable), for defining the security level of the key project;
3) Three rights people: the method comprises a creator (creator of data, automatically generated according to a login user), a affiliated person (common owner of the data designated by the creator, unlimited period), an authorized person (creator cross/non cross department authorization, need to set the effective time period of data authorization) and a secret class for limiting basic tone data;
4) Three associated information: user level information, regional information, department information.
Wherein, three rights people and three associated information belong to user rights information, and three layers of security classes belong to project rights information.
In the invention, the key related field information, besides the business necessary content, can also add part of key information according to the authority and statistical requirements, namely, the data authority module 320 can realize the authentication of the data information by forming the authentication related field information. The formation of the authentication related field information mainly includes the following three cases:
1) For the project: setting a project security level when a new project is created through the project management module 120, automatically associating a creator with a designated owner to form project authority field content, and setting an authorizer if authorization requirements exist;
2) For project key data: when uploading data, selecting items, automatically associating a creator and designating a affiliated person to form the content of a key data authority field; if there is an authorization requirement, setting an 'authorizer';
3) For all key content: for information related to an account number (three rights people), relative 'job level information', 'regional information', 'department information' is needed, so that authentication and data statistics are facilitated.
By the above operation on the key content, key field information related to key authentication is formed, and the operation flow is shown in fig. 5.
In the present invention, the authentication process of the data authority module 320 for data information is as follows:
according to key information (namely user basic information) of the login account, key information (namely basic information of a key item) of the item and data is matched, authentication screening is carried out according to an authentication rule, and finally the viewable and available item and data of the account are presented, wherein the key information (namely basic information of the key item) is as follows:
1) Project authentication: checking a minimum storage unit item of data, and judging through item security; the method is mainly used for authenticating related functional pages such as inquiry, uploading and the like when the related functional pages need to select the items; item authentication is shown in fig. 6.
For the data query page, when the items are queried, the queried items comprise the items within the authority range of the user account;
when the data is uploaded and selected, only the items of which the user account belongs to the creator or the person to which the user account belongs can be selected, and the items of which the user account belongs to the authorizer cannot be uploaded.
2) Data authentication: firstly, judging through the item security class to which the data belongs. If the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are used for authentication, and the data authentication flow is shown in fig. 7.
The invention has been described above in connection with preferred embodiments, which are, however, exemplary only and for illustrative purposes. On this basis, the invention can be subjected to various substitutions and improvements, and all fall within the protection scope of the invention.
Claims (7)
1. The basic information investigation method is characterized by comprising the following steps:
constructing a basic information investigation system;
inputting and managing basic tone data by utilizing a basic information investigation system;
the basic information investigation system is obtained by constructing an application system (100), a data system (200) and a presentation system (300); wherein,
the application system (100) is used for receiving the instruction information of the service personnel and implementing the input and management of data;
A data hierarchy (200) for storing all data information generated internally to the system;
a presentation architecture (300) for visualizing presentation system pages and stored data;
the construction of the application system (100) is realized by the construction comprising the following modules:
user management module (110): the method is used for receiving the operation instruction information, and carrying out operation processing on the user account according to the operation instruction information or updating the user basic information;
project management module (120): the method is used for receiving the operation instruction information, processing the key item according to the operation instruction information, or updating the basic information of the key item, and starting the initiation and approval flow of the key work;
data investigation module (130): the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and realizes key data input work of each key item;
the construction application system (100) further comprises a construction storage management module (140) for assisting in key data entry and management;
the construction of the data hierarchy (200) is achieved by a construction comprising the following data storage modules:
system configuration library (210): the system is used for storing data information generated in the system, and comprises user basic information generated by a user management module (110), basic tone project basic information generated by a project management module (120), basic tone data input by a data investigation module (130) and a system log generated by system operation;
The construction of the presentation architecture (300) is achieved by a construction comprising the following modules:
data retrieval module (310): aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanism information;
data rights module (320): authentication is carried out on the project and the key data under the project through the user authority information set by the user management module (110) and the project authority information set by the project management module (120), so that the data presented by the data retrieval module (310) are visible data in the user authority range;
the build storage management module (140) includes a build dictionary management sub-module (141) and a wide table management sub-module (142): wherein,
dictionary management submodule (141): the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule (142): creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
The corresponding field information is independently stored aiming at different key categories in the key field library;
the data authority module (320) performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
two-layer authentication: from itemsKey data under the item, authenticating the data;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
2. The method for studying basic information according to claim 1, wherein,
a basic tone field library and a field option dictionary are regularly maintained and enriched.
3. The method for studying basic information according to claim 1, wherein,
the field information of the broad table may be configured by calling a key field library.
4. The basic information investigation method of claim 1, wherein the authentication procedure of the data rights module (320) for the data information is as follows:
project authentication: checking a minimum storage unit item of data, and judging through item security;
Data authentication: firstly, judging through the item security class of the data; if the item security is shared, all data of the corresponding item can be seen; if the project security is proprietary, authenticating a creator and a affiliated person through each piece of data corresponding to the project; if the data is an authorized project, the creator, the affiliated person and the authorized person corresponding to each piece of data of the project are authenticated.
5. The basic information investigation method according to claim 1, wherein the entering of the key data comprises the steps of:
step 1'), newly adding a user: newly adding a user through a user management module (110), initializing user basic information, and distributing user authority roles;
step 1), constructing a broad table: using the newly added user account or the existing account in the step 1'), configuring a basic investigation broad table corresponding to different basic tone categories for the department:
specifically, a business department is selected first; the system defaults to several necessary fields commonly used as initial fields, and if the fields do not need to be added, the fields can be directly submitted; if the number of fields is insufficient, the required wide table field information can be added by a wide table management sub-module (142); the preview wide table has no problem, and a submit button can be clicked to generate a basic investigation wide table corresponding to each item of the department;
Step 2), creating an item: creating an investigation project according to the service management requirement, filling in basic information of the basic tone project, and submitting to effect;
step 3), key data input: the key data input comprises two modes, namely a data input mode and a batch import mode:
when data is recorded: selecting an item, setting data permission, and initializing an input page according to an investigation information template set by an item management module (120), and receiving and storing relevant field values of the input investigation information; when data is submitted, the system automatically executes data error correction and duplicate removal operations;
when the batch is introduced, the following steps are carried out: selecting an item, setting data permission, generating an Excel file for downloading by an input page according to an investigation information template set by an item management module (120), uploading the Excel file after inputting relevant field values of investigation information, and inputting data in a system; when data is submitted, the system automatically executes data error correction and duplicate removal operations.
6. The basic information investigation system is characterized by comprising an application system (100), a data system (200) and a presentation system (300);
the application system (100) comprises:
User management module (110): the method comprises the steps of receiving operation instruction information, and performing operation processing on a user account according to the operation instruction information or updating user basic information;
project management module (120): the method comprises the steps of receiving operation instruction information, processing a key item according to the operation instruction information, or updating basic information of the key item, and starting a start and approval process of key work;
data investigation module (130): the system comprises a key data input module, a key data input module and a key data input module, wherein the key data input module receives input command information, establishes an input page and performs information acquisition and input work of each key item;
the application system (100) further comprises a storage management module (140) for assisting in key data entry and management;
the data hierarchy (200) includes:
system configuration library (210): the system is used for storing data information generated in the system, and comprises user basic information generated by a user management module (110), basic tone project basic information generated by a project management module (120), basic tone data input by a data investigation module (130) and a system log generated by system operation;
the presentation system (300) comprises:
data retrieval module (310): aiming at keywords to be queried, presenting a list of key items, key personnel and key mechanisms;
Data rights module (320): authentication is carried out on the project and the key data under the project through the user authority information set by the user management module (110) and the project authority information set by the project management module (120), so that the data presented by the data retrieval module (310) are visible data in the user authority range;
the storage management module (140) includes a dictionary management sub-module (141) and a wide table management sub-module (142): wherein,
dictionary management submodule (141): the method comprises the steps of constructing a key field library and a field option dictionary, wherein the key field library stores relevant field information aiming at different key categories, and the field option dictionary stores option information corresponding to relevant fields;
broad table management submodule (142): creating independent wide tables for each business department, and implementing the addition and removal of the word segment information of the wide tables to realize the customized configuration of the key information of each business direction;
the corresponding field information is independently stored aiming at different key categories in the key field library;
the data authority module (320) performs logic security protection on the data through two-layer authentication, three-layer security, three authority persons and three associated information; in particular, the method comprises the steps of,
Two-layer authentication: from itemsKey data under the item, authenticating the data;
three-layer security level: the method comprises three layers of sharing, proprietary and authorization, which are used for limiting the security level of the key item;
three rights people: the method comprises the steps of creating a person, a person and an authorized person, and defining the security level of the key data;
three associated information: including user level information, zone information, department information.
7. The basic information investigation system of claim 6, wherein the user basic information comprises user attributes, user rights information and login information;
the key item basic information includes item attributes, item authority information, and item support information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811377763.2A CN111198878B (en) | 2018-11-19 | 2018-11-19 | Basic information investigation system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811377763.2A CN111198878B (en) | 2018-11-19 | 2018-11-19 | Basic information investigation system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111198878A CN111198878A (en) | 2020-05-26 |
CN111198878B true CN111198878B (en) | 2023-11-10 |
Family
ID=70743855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811377763.2A Active CN111198878B (en) | 2018-11-19 | 2018-11-19 | Basic information investigation system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111198878B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111985200B (en) * | 2020-08-18 | 2024-06-25 | 南京六的平方信息技术有限公司 | Data collection statistical method and system thereof |
CN112632026A (en) * | 2020-10-29 | 2021-04-09 | 江苏海岸线互联网科技有限公司 | Industrial discrete data structured database system |
CN112633920B (en) * | 2020-12-15 | 2022-10-21 | 广东广建项目管理有限公司 | Data research method, device and storage medium |
CN112712330A (en) * | 2020-12-15 | 2021-04-27 | 广东广建项目管理有限公司 | Investigation monitoring and feasibility summarizing system for construction environment |
CN113326310B (en) * | 2021-06-18 | 2023-04-18 | 立信(重庆)数据科技股份有限公司 | NLP-based research data standardization method and system |
CN117973356A (en) * | 2024-04-01 | 2024-05-03 | 上海艾拉比智能科技有限公司 | Investigation tool, generation method and use method thereof and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104299152A (en) * | 2014-10-21 | 2015-01-21 | 沈阳化工大学 | Client management information system |
CN104951954A (en) * | 2014-03-25 | 2015-09-30 | 上海旭中市场信息咨询有限公司 | FMCG research system |
CN108038719A (en) * | 2017-12-06 | 2018-05-15 | 企创创(广州)科技有限公司 | A kind of market service investigation system based on internet |
CN108335080A (en) * | 2018-01-25 | 2018-07-27 | 广州建衡工程咨询有限公司 | A kind of Construction Audit system and implementation method |
CN108462888A (en) * | 2018-03-14 | 2018-08-28 | 江苏有线数据网络有限责任公司 | The intelligent association analysis method and system of user's TV and internet behavior |
-
2018
- 2018-11-19 CN CN201811377763.2A patent/CN111198878B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104951954A (en) * | 2014-03-25 | 2015-09-30 | 上海旭中市场信息咨询有限公司 | FMCG research system |
CN104299152A (en) * | 2014-10-21 | 2015-01-21 | 沈阳化工大学 | Client management information system |
CN108038719A (en) * | 2017-12-06 | 2018-05-15 | 企创创(广州)科技有限公司 | A kind of market service investigation system based on internet |
CN108335080A (en) * | 2018-01-25 | 2018-07-27 | 广州建衡工程咨询有限公司 | A kind of Construction Audit system and implementation method |
CN108462888A (en) * | 2018-03-14 | 2018-08-28 | 江苏有线数据网络有限责任公司 | The intelligent association analysis method and system of user's TV and internet behavior |
Also Published As
Publication number | Publication date |
---|---|
CN111198878A (en) | 2020-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111198878B (en) | Basic information investigation system and method | |
US20220075889A1 (en) | System of decentralized Zero-Trust services for creating, using and analyzing securely commingled Self-Governing data sets | |
US11461785B2 (en) | System and method to identify, classify and monetize information as an intangible asset and a production model based thereon | |
US8296297B2 (en) | Content analysis and correlation | |
US8306999B2 (en) | Computer-implemented systems, methods, and computer program product for providing row-level security in a database network | |
CN100430951C (en) | Systems and methods of access control enabling ownership of access control lists to users or groups | |
US20170277773A1 (en) | Systems and methods for secure storage of user information in a user profile | |
JP6932175B2 (en) | Personal number management device, personal number management method, and personal number management program | |
EP2405607B1 (en) | Privilege management system and method based on object | |
US20170277774A1 (en) | Systems and methods for secure storage of user information in a user profile | |
US20130304765A1 (en) | Automatic folder access management | |
US7617211B2 (en) | System and method for automatically synchronizing security-relevant information between a relational database and a multidimensional database | |
KR102187861B1 (en) | A System Providing Job Search Service Using Block Chain | |
US9037537B2 (en) | Automatic redaction of content for alternate reviewers in document workflow solutions | |
US20170277775A1 (en) | Systems and methods for secure storage of user information in a user profile | |
KR20190029509A (en) | System and method for securely storing user information in a user profile | |
CN103150320B (en) | The system and method that content is issued for electronics | |
Fan et al. | Heronian mean operators of linguistic neutrosophic multisets and their multiple attribute decision-making methods | |
US20190080369A1 (en) | Systems and methods for providing a decentralized platform for connecting members of an open-science community | |
JP4292342B2 (en) | Approval route determination method and program in electronic approval system | |
US7814049B2 (en) | Computer device for managing documents in multi-user mode | |
KR100358876B1 (en) | Method and system for verifying access to a network environment | |
JP2005285008A (en) | Data security management system, program, and data security management method | |
WO2018232021A2 (en) | Systems and methods for secure storage of user information in a user profile | |
Bondade et al. | Attribute based Encryption for Improved Multi-Keyword Search in Information Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |