Disclosure of Invention
In order to solve the technical problems, the disclosure provides a document and resource management method, a document and resource management device and electronic equipment.
The method comprises the steps of responding to login operation of a target account, obtaining functional information of the target account, wherein the functional information at least comprises classification management authorities, displaying a user interface containing the functional information when the login state of the target account is determined to be logged in, wherein the user interface comprises authority controls corresponding to each piece of functional information, responding to selection operation of the authority controls corresponding to the classification management authorities, obtaining a document to be allocated, classifying the document to be allocated based on a target classification model, obtaining classification results corresponding to the document to be allocated, classifying the document to be allocated according to the classification results, and/or processing a trained model based on behavior data of the target account.
In some practical examples, the document and resource management method further comprises the steps of obtaining an identification set of the document to be distributed after the document to be distributed is classified according to the classification result, wherein the identification set comprises one or more of keywords and labels, and establishing a corresponding relation between the identification set and the classification result.
In some practical examples, the document and resource management method further comprises responding to target operation of a target permission control, executing a function corresponding to the function information according to the function information corresponding to the target permission control, wherein the function information further comprises any one of grouping management permission, document management permission, tool management permission, searching and screening permission and deleting permission.
In some examples, responding to target operation of a target permission control, executing functions corresponding to the function information according to the function information corresponding to the target permission control comprises responding to creation operation of creating user groups, creating the user groups, wherein one user group corresponds to one group management permission, responding to selection operation of the permission control corresponding to the group management permission, executing first target operation of the user groups corresponding to the group management permission to obtain updated user groups, and the first target operation comprises one or more of group management, member management, resource allocation, user role definition, user role allocation, permission adjustment and update.
In some implementable examples, responding to target operation of a target authority control, executing a function corresponding to the function information according to the function information corresponding to the target authority control, wherein the function information comprises the steps of responding to uploading operation of uploading a document to be distributed, obtaining document content and use information of the document to be distributed, sending the document to be distributed to a classification management module for classification, generating a document relation map of the document to be distributed based on the document content and the use information, wherein the document relation map is used for indicating the background and the context of the document to be distributed, responding to selection operation of the authority control corresponding to the document management authority, executing second target operation on the distributed document corresponding to the document management authority to obtain an updated distributed document, and the second target operation comprises one or more of document attribute setting, access authority setting, version control, document editing, document updating, document sharing and document collaboration.
In some implementable examples, responding to target operation of a target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of the permission control corresponding to the tool management permission, obtaining target information of a target script tool, wherein the target information comprises experience information and improvement suggestion information, optimizing the target script tool based on the target information, responding to selection operation of the permission control corresponding to the tool management permission, obtaining user role information and historical tool use information of a target account, and generating recommendation information containing a recommendation script tool based on the user role information and the historical tool use information.
In some practical examples, responding to target operation of a target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of searching the permission control corresponding to the screening permission, obtaining search information, understanding intention of the search information to obtain search intention corresponding to the search information, conducting contextual search according to the search information to obtain at least one search result, screening the search result according to the search intention to obtain screening search result, and taking the screening search result as the search result of the search information.
In some practical examples, the document and resource management method further comprises the steps of obtaining a current working scene, obtaining preset screeners corresponding to the working scene based on the working scene, wherein one preset screener corresponds to one preset screening condition, and performing data screening according to the preset screening condition corresponding to the preset screener to obtain target screening data.
In some implementable examples, responding to target operation of a target permission control, executing functions corresponding to the function information according to the function information corresponding to the target permission control comprises obtaining a target account number which is not operated in a first preset time period and/or a target document which is not operated in a second preset time period, generating recommendation information to be deleted based on the target account number and/or the target document, responding to selection operation of the permission control corresponding to the deleting permission, obtaining a deleted target account number and/or the target document, generating prompt information under the condition that the deleted target account number and/or the target document is provided with a security protection lock, and deleting the deleted target account number and/or the target document according to the selection operation of the permission control corresponding to the deleting permission.
In some practical examples, responding to target operation of a target permission control, and executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of the permission control corresponding to the auxiliary tool permission, obtaining a target login credential, wherein the target login credential is a login identification of a third party application, and logging in based on the target login credential obtained by the auxiliary tool module to achieve information interaction with the third party application.
In some practical examples, responding to the target operation of the target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises performing user authentication on a target account in response to the login operation of the target account by a login module, logging in the target account if the target account passes the user authentication, performing third target operation on the target account in response to the selection operation of the permission control corresponding to the security permission to ensure the security of the target account, wherein the third target operation comprises one or more of permission and user role management, data encryption, an access control list, a security audit log, network security, vulnerability management, backup and disaster recovery, physical security, endpoint protection, security monitoring and response.
In some practical examples, responding to target operation of the target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises carrying out user authentication based on a user plane and a password of the target account or multiple identity authentications in response to login operation of the target account, logging in the target account under the condition that the target account passes the user authentication, carrying out fourth target operation on the target account in response to selection operation of the permission control corresponding to the permission management information to obtain an updated target account, wherein the fourth target operation comprises one or more of user role management, permission configuration, permission verification and allocation, permission inheritance and allocation and special permission processing.
In some practical examples, responding to target operation of a target permission control, and executing functions corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of the permission control corresponding to disk cleaning information, acquiring files meeting preset conditions, and cleaning the files meeting the preset conditions, wherein the preset conditions comprise one or more of files marked as target marks, files with service lives, unused files within preset time periods and files with version information lower than a preset version.
In some implementable examples, responding to target operation of a target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of the permission control corresponding to system configuration permission information, executing fifth target operation on a target account to obtain an updated target account, wherein the fifth target operation comprises one or more of permission level definition, user role and permission association, user permission allocation, security measures, configuration backup and restoration, permission change notification and configuration change approval flow.
In some implementable examples, responding to target operation of a target permission control, executing the function corresponding to the function information according to the function information corresponding to the target permission control comprises responding to selection operation of permission control corresponding to help information supported by a user, acquiring preset information, wherein the preset information comprises one or more of a user help document, a technical support interface, a common problem solution, a user interface of a third party application, address information of online customer service, technical support hotline, address information of community support, feedback and suggestion, and generating prompt information containing the preset information.
The device comprises a login module, a classification management module and a classification management module, wherein the login module is used for responding to login operation of a target account to obtain functional information of the target account, the functional information at least comprises classification management authorities, the login module is further used for displaying a user interface containing the functional information when the login state of the target account is determined to be logged in, the user interface comprises authority controls corresponding to each piece of functional information, the classification management module is used for responding to selection operation of the authority controls corresponding to the classification management authorities to obtain documents to be allocated, the classification management module is further used for classifying the documents to be allocated based on a target classification model to obtain classification results corresponding to the documents to be allocated and classifying the documents to be allocated according to the classification results, and the target classification model comprises a model trained based on behavior data of the target account and/or a model trained based on natural language processing.
In some practical examples, the classification management module is further configured to obtain an identification set of the document to be allocated after classifying the document to be allocated according to the classification result, where the identification set includes one or more of a keyword and a tag, and the classification management module is further configured to establish a correspondence between the identification set and the classification result.
In some practical examples, the classification management module is further configured to respond to a target operation on a target permission control, and execute a function corresponding to the function information according to the function information corresponding to the target permission control, where the function information further includes any one of a group management permission, a document management permission, a tool management permission, a search and screening permission, and a deletion permission.
In some implementable examples, the document and resource management device further comprises a grouping management module, a grouping management module and a grouping management module, wherein the grouping management module is used for responding to a creating operation of creating a user grouping, one user grouping corresponds to one grouping management authority, the grouping management module is further used for responding to a selecting operation of an authority control corresponding to the grouping management authority, a first target operation is executed on the user grouping corresponding to the grouping management authority to obtain an updated user grouping, and the first target operation comprises one or more of grouping management, member management, resource allocation, user role definition, user role allocation, authority adjustment and updating.
In some practical examples, the document and resource management device further comprises a document management module, a document management module and a document sharing module, wherein the document management module is used for responding to uploading operation of uploading a document to be distributed, acquiring document content and use information of the document to be distributed and sending the document to be distributed to the classification management module for classification, the document management module is further used for generating a document relation map of the document to be distributed based on the document content and the use information, the document relation map is used for indicating the background and the context of the document to be distributed, the document management module is further used for responding to selection operation of a right control corresponding to the document management right, executing second target operation on the distributed document corresponding to the document management right to obtain an updated distributed document, and the second target operation comprises one or more of document attribute setting, access right setting, version control, document editing, document updating, document sharing and document cooperation.
In some practical examples, the document and resource management device further comprises a tool management module, a tool management module and a tool management module, wherein the tool management module is used for responding to the selection operation of the permission control corresponding to the tool management permission to acquire target information of a target script tool, the target information comprises experience information and improvement suggestion information, the tool management module is further used for optimizing the target script tool based on the target information, the tool management module is further used for responding to the selection operation of the permission control corresponding to the tool management permission to acquire user role information and historical tool use information of a target account, and the tool management module is further used for generating recommendation information containing recommendation script tools based on the user role information and the historical tool use information.
In some practical examples, the document and resource management device further comprises a searching and screening module, a searching and screening module and a searching and screening module, wherein the searching and screening module is used for responding to the selection operation of the permission control corresponding to the searching and screening permission, the searching and screening module is further used for carrying out intention understanding on the searching information to obtain the searching intention corresponding to the searching information, the searching and screening module is further used for carrying out contextual searching according to the searching information to obtain at least one searching result, the searching and screening module is further used for screening the searching result according to the searching intention to obtain the screening searching result, and the searching and screening module is further used for taking the screening searching result as the searching result of the searching information.
In some practical examples, the searching and screening module is further configured to obtain a current working scene, obtain a preset screener corresponding to the working scene based on the working scene, wherein one preset screener corresponds to one preset screening condition, and perform data screening according to the preset screening condition corresponding to the preset screener to obtain target screening data.
In some practical examples, the document and resource management device further comprises a deleting module, a deleting module and a prompting module, wherein the deleting module is used for acquiring a target account number which is not operated in a first preset time period and/or a target document which is not operated in a second preset time period, the deleting module is further used for generating recommendation information to be deleted based on the target account number and/or the target document, the deleting module is further used for acquiring a deleted target account number and/or the target document in response to the selection operation of a permission control corresponding to the deleting permission, the deleting module is further used for generating prompting information in the case that the deleted target account number and/or the target document is provided with a security protection lock, and the deleting module is further used for deleting the deleted target account number and/or the target document in response to the selection operation of the permission control corresponding to the deleting permission.
In some practical examples, the document and resource management device further comprises an auxiliary tool module, an auxiliary tool module and a login module, wherein the auxiliary tool module is used for responding to the selection operation of the permission control corresponding to the auxiliary tool permission to obtain a target login credential, the target login credential is a login identifier of a third party application, and the login module is further used for logging in based on the target login credential obtained by the auxiliary tool module so as to achieve information interaction with the third party application.
In some practical examples, the document and resource management device further comprises a security module, wherein the security module is used for carrying out user identity verification on the target account in response to login operation on the target account, the security module is further used for logging in the target account in the case that the target account passes the user identity verification, the security module is further used for carrying out third target operation on the target account in response to selection operation on a permission control corresponding to the security permission so as to ensure the security of the target account, and the third target operation comprises one or more of permission and user role management, data encryption, an access control list, security audit logs, network security, vulnerability management, backup and disaster recovery, physical security, end point protection, security monitoring and response.
In some practical examples, the document and resource management device further comprises a permission module, wherein the permission module is used for carrying out user identity verification based on a user plane and a password of the target account or multiple identity authentications in response to login operation of the target account by the login module, the permission module is further used for logging in the target account under the condition that the target account passes the user identity verification, the permission module is further used for carrying out fourth target operation on the target account to obtain an updated target account in response to selection operation of a permission control corresponding to permission management information, and the fourth target operation comprises one or more of user role management, permission configuration, permission verification and allocation, permission inheritance and allocation and special permission processing.
In some practical examples, the document and resource management device further comprises a disk cleaning module, a disk cleaning module and a disk cleaning module, wherein the disk cleaning module is used for responding to the selection operation of the permission control corresponding to the disk cleaning information to obtain files meeting preset conditions, and the disk cleaning module is also used for cleaning the files meeting the preset conditions, wherein the preset conditions comprise one or more of files with target marks, files with service lives, unused files within preset time periods and files with version information lower than a preset version.
In some practical examples, the document and resource management device further comprises a system configuration permission module, wherein the system configuration permission module is used for responding to the selection operation of the permission control corresponding to the system configuration permission information, executing a fifth target operation on the target account to obtain the updated target account, and the fifth target operation comprises one or more of permission level definition, user role and permission association, user permission allocation, security measures, configuration backup and restoration, permission change notification and configuration change approval flow.
In some practical examples, the document and resource management device further comprises a user support and help module, a user support and help module and a user support and help module, wherein the user support and help module is used for responding to selection operation of a permission control corresponding to the user support and help information and obtaining preset information, the preset information comprises one or more of a user help document, a technical support interface, a common problem solution, a user interface of a third party application, address information of online customer service, technical support hotline, address information of community support, feedback and suggestion, and the user support and help module is further used for generating prompt information containing the preset information.
In a third aspect, the present disclosure provides an electronic device comprising a memory for storing a computer program and a processor for causing the electronic device to implement the document and resource management method as provided in the first aspect above when the computer program is executed.
In a fourth aspect, the present disclosure provides a computer-readable storage medium, including a computer program stored thereon, which when executed by a computing device, causes the computing device to implement the document and resource management method as provided in the first aspect.
In a fifth aspect, the present disclosure provides a vehicle comprising the management apparatus of any one of the documents and resources as provided in the second aspect.
In the present disclosure, the names of the above-mentioned documents and management apparatuses of resources do not constitute limitations on the devices or function modules themselves, and in actual implementations, these devices or function modules may appear under other names. Insofar as the function of each device or function module is similar to the present disclosure, it is within the scope of the claims of the present disclosure and the equivalents thereof.
These and other aspects of the disclosure will be more readily apparent from the following description.
Compared with the prior art, the technical scheme provided by the disclosure has the following advantages:
The document and resource management method provided by the disclosure is used for responding to login operation of a target account to obtain functional information of the target account, wherein the functional information at least comprises classification management authorities, a user interface containing the functional information is displayed when the login state of the target account is determined to be logged in, at the moment, a user can select different functions based on authority controls displayed in the user interface, for example, the user performs selection operation on the authority controls corresponding to the classification management authorities, at the moment, the user responds to the selection operation on the authority controls corresponding to the classification management authorities to obtain documents to be allocated, and classification is performed on the documents to be allocated based on a target classification model to obtain classification results corresponding to the documents to be allocated. Therefore, the classification result is obtained by classifying the documents based on the model trained by the behavior data of the user and/or the model trained by the natural language processing, and the model trained by the behavior data of the user and/or the model trained by the natural language processing better meets the requirements of the user, so that the obtained classification result better meets the requirements of the user, the accuracy of classifying the documents can be improved, the documents can be classified efficiently due to the higher accuracy of classifying the documents, and the problem of how to classify the documents of enterprises efficiently is solved.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein, and it is apparent that the embodiments in the specification are only some, rather than all, of the embodiments of the present disclosure.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
By way of example, taking an execution body for executing the document and resource management method provided by the embodiment of the present disclosure as a server, the document and resource management method provided by the embodiment of the present disclosure is described.
As shown in fig. 1, the document and resource management method provided by the embodiment of the present disclosure includes the following contents of steps S11 to S14:
S11, responding to login operation of the target account, and obtaining function information of the target account, wherein the function information at least comprises classification management authority.
And S12, displaying a user interface containing function information when the login state of the target account is determined to be logged in, wherein the user interface comprises permission controls corresponding to each function information.
S13, responding to the selection operation of the rights control corresponding to the classification management rights, and acquiring the document to be classified.
S14, classifying the documents to be allocated based on the target classification model to obtain classification results corresponding to the documents to be allocated, and classifying the documents to be allocated according to the classification results. Wherein the target classification model comprises a model trained based on behavior data of the target account number and/or a model trained based on natural language processing.
Exemplary, an architecture of an application of the document and resource management method provided by the embodiment of the present disclosure is shown in fig. 2, and includes an access layer, an application layer, a domain layer, a infrastructure layer, and a storage resource/database. The access layer comprises a login module and an application layer, wherein the login module is used for providing a login interface for a user and user interfaces with different user roles, the user roles comprise any one of a super administrator, an administrator, a user, a visitor and a third party application user, the application layer comprises a user management module, a classification management module, a grouping management module, a document management module, a tool management module, a searching and screening module, an auxiliary tool module, a user support and help module, the field layer comprises a user management field service module, a classification management field service module, a grouping management field service module, a document management field service module, a tool management field service module and a searching and screening field service module, and the infrastructure layer comprises a security module, a permission module, a disk cleaning module, a system configuration permission module, a file storage system module and a system monitoring tool module.
In some examples, the user management domain service module is configured to provide services to the user management module, the classification management domain service module is configured to provide services to the classification management module, the grouping management domain service module is configured to provide services to the grouping management module, the document management domain service module is configured to provide services to the document management module, the tool management domain service module is configured to provide services to the tool management module, and the search and filter domain service module is configured to provide services to the search and filter module.
In some examples, the system monitoring tool module is configured to obtain operation information of currently installed system software, such as remaining computing resources, memory occupancy, and the like.
In some examples, one or more of MySQL, redis, and MQ are included in the storage resource/database.
In some examples, the login module may perform the steps of S11 and S12 described above. The login module comprises a manager login module and a user login module, wherein the authorities of different user roles are different after the manager login and the user login, for example, the super manager login comprises a plurality of functional modules such as a user management module, an item classification module, a group classification module and the like. The super manager has authority to manage common manager and common user.
In some examples, the user management module is used for enhancing the user information auditing process, namely introducing secondary verification means such as an identity card, a work card and the like, and ensuring the authenticity and the correctness of the newly-built account. And the user management module is used for realizing fine granularity management of the rights, wherein the rights can be subdivided into single files or operations such as read-only, editing and deleting individual rights, so that the flexibility of the rights management is improved.
In some examples, the user management module is used to create and delete user accounts, or user information modifications, or rights management, or user queries.
In some examples, the classification management module may perform the steps of S13-S14 described above. The classification management module is used for providing a preset intelligent algorithm and automatically distributing classification to the documents according to file contents or user habits. The automatic classification based on file content can be performed by classifying the document to be distributed based on a model trained by natural language processing, wherein the training process of the model trained by natural language processing is as follows, namely, analyzing text content in the document by using NLP technology. This includes segmentation (Tokenization), part-of-speech tagging (POS Tagging), named Entity Recognition (NER), topic Modeling (Topic Modeling), etc. techniques to extract key information. Feature extraction, converting text content into feature vectors that can be used for machine learning. Common methods include Bag of Words model (Bag-of-Words), TF-IDF (Term Frequency-Inverse Document Frequency), word2Vec, and the like. Model training and verification, namely training the model by using a marked training set, and verifying the performance of the model by cross verification or evaluation indexes (such as accuracy rate and recall rate) and the like.
Or classifying the documents to be distributed based on the model trained on the behavior data of the target account, wherein the training process of the model trained on the behavior data of the target account is as follows: user behavior analysis, namely collecting and analyzing the operation history of the user on the document, such as commonly read, commonly edited document types and the like. And establishing a personalized model, namely establishing a classification model of the user individuals and reflecting the preference and habit of each user. Collaborative filtering, using collaborative filtering techniques, predicts and recommends classifications by comparing habits of different users, similar to online recommendation systems.
Or a model trained based on the behavioral data of the target account number, and a model trained based on natural language processing, without limitation.
Therefore, more accurate and personalized file classification can be realized based on file content by combining actual use habit and context information of a user, and the effects of improving working efficiency and realizing resource availability are achieved.
In some examples, in the document and resource management method provided by the embodiment of the disclosure, the classification management module provides a standardized template library, and different templates exist for different types of documents, so that a user can conveniently create and maintain classification standards.
Wherein, the user can set and modify file classification standards through the classification management module, such as:
2.1 Classification by item (e.g., item a, item B, etc.);
2.2 Group (e.g., group a, group B, etc.);
2.3 Classifying according to team;
2.4 Stage-wise classification (e.g., as in-ground, SOP);
2.5 Classification by status (e.g., draft, audit, published, archived);
2.6 Classification by file type according to file extension (e.g.,. Docx,. Pdf,. Xls,. Ppt, etc.);
2.7 Classification by topic (e.g., diagnostic class);
2.8 Support a variety of options including, but not limited to, the following content formats, technical documents, reference documents, canonical documents, description documents, meeting records, research reports, compound disc materials, major questions TBP, foreign assistance management, activity planning, development tools, script classes;
2.9 Classification by author;
2.10 Classification by date;
2.11 Classifying according to authority level;
2.12 Classifying according to keywords or labels;
2.13 Classification by use (e.g., new person's job education, training materials, instructions);
2.14 The technical stage classification comprises the steps of including system design, detailing class documents or preliminary stage, advanced stage and the like, project management classes, including project proposal, project plan, progress report and other project management related files, product document classes, including product specifications, use guidelines, maintenance manuals and other files directly related to products, management strategy classes, including enterprise planning, management flow, human resource strategy and other management aspects, and technical direction classification, wherein classification can be refined, such as message classes, diagnosis classes, communication classes and the like.
In some examples, a user may archive and retrieve documents via a classification management module, such as archiving documents into respective categories according to a predetermined classification hierarchy, a tagging system may be designed.
In some examples, the user may define a set of tags through the categorization management module, such as determining the naming convention and categorization of the tags, such as Tag1 may represent "technical documents," Tag2 represents "market report," etc., and may set the Tag name to a desired name, such as diagnostic related technical documents, A-project materials. A series of preset labels are generated for selection and marking of documents.
In some examples, the user may perform keyword to tag correspondence through the classification management module, such as defining a list of keywords or phrases for each tag. For example, the keyword list of Tag1 may include "specification", "API document", and the like. In some examples, the user may automatically archive via the classification management module, such as by formulating a matching rule for each tag, and automatically archive under the corresponding tag if a keyword appears in the text.
In some examples, a user may parse and categorize documents through a categorization management module, such as parsing the document content using NLP techniques to extract text information when uploading the document to a platform. A matching rule is applied to check whether the document contains keywords associated with a particular tag. If the matching is successful, the corresponding tag is automatically assigned to the document.
In some examples, the classification management module may also provide classification-based retrieval functions, which facilitate users to quickly find classification criteria for documents as desired, and design these retrieval functions, which may improve retrieval efficiency.
In some examples, the categorization management module may also provide for refined management of categorizations, including allowing a user or administrator to add, edit, or delete categorization labels, settings and management that support multi-level categorization.
In some examples, the classification management module may also provide classification statistics and analysis, including providing statistics of the number and access of each type of document, supporting various presentation forms such as charts, and expanding functionality to support the introduction of some third party graphical tools.
According to the document and resource management method, functional information of a target account is obtained in response to login operation of the target account, the functional information at least comprises classification management authorities, a user interface containing the functional information is displayed when the logged-in target account is determined, at the moment, a user can select different functions based on authority controls displayed in the user interface, for example, the user performs selection operation on the authority controls corresponding to the classification management authorities, at the moment, the document to be allocated is obtained in response to selection operation on the authority controls corresponding to the classification management authorities, and classification is conducted on the document to be allocated based on a target classification model to obtain classification results corresponding to the document to be allocated. Therefore, the classification result is obtained by classifying the document based on the model trained by the behavior data of the user and/or the model trained by the natural language processing, and the model trained by the behavior data of the user and/or the model trained by the natural language processing better meets the requirements of the user, so that the obtained classification result better meets the requirements of the user, the accuracy of classifying the document can be improved, and the document can be classified efficiently due to the higher accuracy of classifying the document.
In some practical examples, referring to fig. 1, as shown in fig. 3, the document and resource management method provided in the embodiment of the disclosure further includes S15 and S16.
S15, classifying the documents to be distributed according to the classification result, and acquiring an identification set of the documents to be distributed. Wherein the set of identifications includes one or more of keywords and tags.
S16, establishing a corresponding relation between the identification set and the classification result.
In some examples, the classification management module may perform the steps of S15 and S16 described above.
In some examples, the classification results include one or more of a project, a group, a team, a phase, a status, a file type, a topic, content, an author, a date, a permission level, a classification identifier, a purpose, a topic, the classification identifier including one or more of a keyword and a tag, the status including any of a draft, an audit, a published, an archive, the content including one or more of a technical document, a reference document, a canonical document, a description document, a meeting record, a research report, a compound disc material, a focus question, a foreign aid management, an activity plan, a development tool, and a script class, the topic including one or more of a technical phase, a project management, a product document, a management policy, a technical direction. According to the method, in order to better manage the documents, after the documents to be distributed are classified, the corresponding relation is established between the identification set of the documents to be distributed and the documents to be distributed, so that the user can conveniently search and classify according to the document identifications.
In some practical examples, the document and resource management method provided by the embodiment of the disclosure further comprises responding to target operation of the target permission control, executing functions corresponding to the function information according to the function information corresponding to the target permission control, wherein the function information further comprises any one of grouping management permission, document management permission, tool management permission, searching and screening permission and deleting permission.
In some examples, the user can realize different functions through the user interface, for example, the user performs target operation on the target permission control in the user interface, at this time, the server responds to the target operation on the target permission control and executes the function corresponding to the function information, for example, any one of grouping management permission, document management permission, tool management permission, searching and screening permission and deleting permission according to the function information corresponding to the target permission control. Therefore, the user can perform target operation on the target permission control in the user interface, so that the function required to be executed by the user is realized, and the user experience is ensured.
In some practical examples, the function information further comprises grouping management authority, and in combination with fig. 1, as shown in fig. 4, the document and resource management method provided by the embodiment of the disclosure further comprises S17 and S18.
S18, responding to the creation operation of creating the user group, and creating the user group. Wherein one user group corresponds to one group management authority.
And S19, responding to the selection operation of the permission control corresponding to the packet management permission, and executing a first target operation on the user packet corresponding to the packet management permission to obtain the updated user packet. Wherein the first target operation includes one or more of group management, member management, resource allocation, user role definition, user role allocation, adjustment of permissions, and updating.
In some examples, the packet management module may perform the steps of S17 and S18 described above.
In some examples, in connection with the example given in S14 above, the functions that may be implemented by the group management module include one or more of group management, member management, resource allocation, user role definition, user role allocation, adjustment of permissions, and updating. Wherein, the
3.1 Packet management-the user can create a new user packet, such as a development group. And meanwhile, the method has the authority of modification, deletion and the like, and can also modify group names and descriptions.
3.2 Management of members within the group including adding new members, removing members, adjusting user roles and permissions of members within the group, and managing basic information of members.
3.3 Resource allocation, i.e., allocating resources such as tasks and files to specific groups.
3.4 User roles are defined, such as department manager user roles, project manager user roles, group leader user roles, group member user roles and the like, and each user role enjoys different rights in definition, such as group leader user roles, and has rights of creating, editing and deleting resources in groups.
3.5 And (3) user role allocation, namely, allocating the defined user roles to specific people, and enjoying all rights of the user roles after allocation.
3.6 And (3) adjusting and updating the authority, wherein an administrator can change the authority set of the user roles or the user roles distributed to the user according to the need due to personnel change or work plan change.
According to the method, the user can realize grouping management, member management, resource allocation, user role definition, user role allocation and authority adjustment and update through the grouping management module, so that tasks and shared resources can be effectively allocated, the authorities are more convenient to manage and configure, and the user experience is ensured.
In some practical examples, the function information further comprises document management authority, and in combination with FIG. 1, as shown in FIG. 5, the document and resource management method provided by the embodiment of the disclosure further comprises S19-S21.
S19, responding to uploading operation of uploading the document to be distributed, acquiring document content and use information of the document to be distributed, and sending the document to be distributed to a classification management module for classification.
S20, generating a document relation map of the document to be distributed based on the document content and the use information. Wherein the document relationship graph is used to indicate the context and context of the document to be assigned.
S21, responding to the selection operation of the rights control corresponding to the document management rights, and executing a second target operation on the assigned document corresponding to the document management rights to obtain the updated assigned document. Wherein the second target operation includes one or more of setting document properties, setting access rights, version control, document editing, document updating, document sharing, document collaboration.
In some examples, the document management module may perform the steps of S19-S21 described above.
In some examples, in connection with the example given in S14 above, the document management module may perform functions including one or more of document relationship graphs, capturing core information, understanding document associations, revealing usage patterns, assessing document importance, rights and attribution analysis, quality and utility assessment, and out-link sharing. Wherein, the
The document relation map can acquire the following information by intelligently analyzing the content and the service condition of the document;
And capturing core information, namely intelligently analyzing semantic features such as keywords, topics, concepts and the like of the document, which is helpful for a user to quickly grasp the key points of the document and know the content center of gravity of the document.
And (3) understanding the document association, namely, through content comparison analysis, the similarity or topic relation among the documents can be clarified to provide basis for searching and recommending related documents.
The use mode is disclosed, namely user interaction analysis such as access frequency and editing history reflects the preference and participation of the user on the document, and the roles and the values of the document in the workflow are disclosed.
Frequently accessed documents tend to suggest their importance or have a significant impact on organization, so analysis can help determine which documents require priority attention.
Rights and attribution analysis, analysis is performed in combination with rights settings to identify a community of users who have access to view or edit the document, thereby outlining the security framework and rights structure of the document.
Quality and practicality assessment the frequency of viewing and editing of a document reflects its actual use and can then be used to assess the quality of the document and the actual assistance to the user.
And automatically generating a knowledge graph associated with the documents according to the analysis results, and helping a user to understand the document background and the context.
Meanwhile, the document management module can generate safe external chain sharing, namely a user can generate a document external chain with timeliness, so that documents can be conveniently shared with the outside of a company, and meanwhile, the information safety is ensured.
In some examples, the document management module supports the following operations:
4.1 Document uploading and management, allowing the user to upload new files, and setting document attributes and access rights.
4.2 Version control, namely, managing different versions of a document, recording historical changes, or confirming whether only the latest version is reserved according to actual requirements, and providing an interface for selection matching.
4.3 Document editing and updating-providing an online editing tool that allows authorized users to modify the document-may consider whether to introduce a third party tool.
4.4 Document sharing and collaboration supporting multi-user collaborative editing.
4.5 Rights settings-rights settings may be made for a certain document or set of documents. The method comprises the steps of managing collaborators, setting rights, transferring ownership, and viewing, editing, deleting rights and transferring rights of owners related to documents.
From the above, a user may implement one or more of document relationship graphs, capture core information, understand document associations, reveal usage patterns, evaluate document importance, rights and attribution analysis, quality and practicality evaluation, and out-link sharing through a document management module. Meanwhile, the user can also execute operations such as document uploading and management, version control, document editing and updating, document sharing and collaboration, authority setting and the like through the document management module, so that the user can conveniently transfer, store, edit, authority management and the like the document, and the user experience is improved.
In some practical examples, the function information further comprises tool management authority, and in combination with FIG. 1, as shown in FIG. 6, the document and resource management method provided by the embodiment of the disclosure further comprises S22-S25.
S22, responding to the selection operation of the right control corresponding to the tool management right, and acquiring the target information of the target script tool. Wherein the target information includes experience information and improvement suggestion information.
S23, optimizing the target script tool based on the target information.
S24, responding to the selection operation of the permission control corresponding to the tool management permission, and acquiring user role information and historical tool use information of the target account.
S25, based on the user role information and the historical tool use information, recommendation information containing a recommendation script tool is generated.
In some examples, the tool management module may perform the steps of S22-S25 described above.
In some examples, in conjunction with the example given in S14 above, the tool management module may implement functionality that the tool uses one or more of a feedback mechanism, an intelligent recommendation system, a protocol stack correlation, a white-box test correlation. Wherein, the
The tool uses a feedback mechanism that sets up a user feedback portal for collecting usage experience and improvement suggestions for the tool to continually optimize the tool.
And the intelligent recommendation system intelligently recommends relevant script tools according to the roles and the historical operations of the user.
Protocol stack related diagnosis class, calibration class script
And the white box test is related to coverage index script, HIS index script, compiling rolling script and the like.
In some examples, the tool management module may implement the following operations:
5.1 Hierarchical rights control-providing read-only, download rights for mature and stable scripting tools, but limiting editing capabilities to prevent unnecessary changes-high risk or critical tools should have editing rights granted to only a few experienced administrators or developers.
5.2 And (3) a responsible person system, namely, for scripts needing periodic maintenance, designating responsible persons to be responsible for supervision and updating, and ensuring that the tool is adapted to changing requirements and environments at any time.
5.3 Audit and transparency-all tool changes should be recorded, including the modifier, change time and change content, periodically audit access and edit logs, ensuring compliance requirements are followed.
5.4 Notification and reporting-when the tool changes, all relevant personnel are automatically notified, special attention is required for those scripts that directly affect the business process.
5.5 Version tracking and backup-all scripts should be version managed, and a backup and restore plan of the system is needed.
5.6 Access log-strictly tracking who is operating on the tool when it is involved in viewing, executing or other types of access.
5.7 Periodic auditing and evaluation-even if the tool is not changed, periodic auditing should be performed, ensuring that the tool still meets current specifications and business requirements.
5.8 Providing complete use documents and descriptions for scripts, and training the users according to requirements to enhance the use efficiency and safety of the users.
From the above, the user can implement one or more of feedback mechanism, intelligent recommendation system, protocol stack correlation, white box test correlation by the tool management module. Meanwhile, the user can also execute operations such as hierarchical authority control, responsible person system, audit and transparency, notification and report, version tracking and backup, access log, periodic examination and evaluation, user document and training and the like through the tool management module, so that the user can conveniently use the tool, and the user experience is improved.
In some practical examples, the function information further comprises searching and screening authorities, and in combination with FIG. 1, as shown in FIG. 7, the document and resource management method provided by the embodiment of the disclosure further comprises S26-S30.
S26, responding to the selection operation of the permission control corresponding to the screening permission to search for the searching information.
And S27, carrying out intention understanding on the search information to obtain a search intention corresponding to the search information.
And S28, performing contextual search according to the search information to obtain at least one search result.
And S29, screening the search results according to the search intention to obtain screening search results.
S30, taking the screening search result as the search result of the search information.
In some examples, the search and screening module may perform the steps of S26-S30 described above.
In some examples, in conjunction with the examples given in S14 above, the search and screening module may implement one or more of an artificial intelligence enhanced search, a contextualization screening preset, a project management scenario, a market analysis scenario, a technology development scenario, a development tool scenario. Wherein, the
Artificial intelligence enhanced search-contextually relevant search result ranking optimization can be performed by understanding the intent of the user query with the aid of AI technology.
And the scene screening presets that preset screeners are provided according to different working scenes, each preset screener can quickly call a set of standardized screening conditions, the user is helped to reduce the workload of setting the screening conditions, and the information retrieval speed is increased. In addition, by providing preset actions or views to cope with common workflows, the platform can promote user efficiency and improve the overall user experience. For example:
The project management scene comprises a preset filter, wherein the preset filter comprises an on-screen project, an SOP project, an OTA project, a task to be cut off, a latest updated file and a My project.
The market analysis scene comprises a market trend report, a competitor analysis, a consumer investigation result and a marketing activity feedback.
The technical development scene comprises the steps of presetting a filter, namely developing a document, an API document, a latest technical report and Bug tracking.
The development tool scene comprises a preset filter, namely code examination, function development, bug repair and performance optimization.
In some examples, the search and screening module may implement the following:
6.1 Keyword searching, namely allowing a user to search documents through the keywords, providing information such as tools and the like, providing an index mechanism to provide a searching interface, supporting a searching algorithm, supporting dynamic loading and supporting sorting.
6.2 Screening according to document type, project, state, etc., providing screening interface, supporting combined screening, supporting dynamic loading, supporting save screening condition, and supporting fuzzy inquiry.
From the above, the user can realize one or more of artificial intelligence enhanced search, scenerized screening preset, project management scene, market analysis scene, technical research and development scene and development tool scene through the search and screening module. Meanwhile, the user can execute keyword searching, advanced screening functions and other operations through the searching and screening module, so that the user can conveniently search and screen the documents, and the user experience is improved.
In some practical examples, the function information further comprises searching and screening authorities, and in combination with FIG. 7, as shown in FIG. 8, the document and resource management method provided by the embodiment of the disclosure further comprises S31 and S32.
S31, acquiring a current working scene, and acquiring a preset filter corresponding to the working scene based on the working scene, wherein one preset filter corresponds to one preset filter condition.
S32, data screening is carried out according to preset screening conditions corresponding to the preset screener, and target screening data are obtained.
In some examples, the target screening data is used as search results.
In some examples, the search and screening module may also perform the steps of S31 and S32 described above.
In order to facilitate retrieval, according to the document and resource management method provided by the embodiment of the disclosure, different preset screeners are set for different working scenes, so that a user can select a corresponding preset screener based on a current working scene, and therefore, the server can screen the document according to screening conditions corresponding to the preset screener, so that time for manually inputting the searching conditions by the user can be saved, and searching efficiency is prompted.
In some practical examples, the function information further comprises deleting authority, and in combination with FIG. 1, as shown in FIG. 9, the document and resource management method provided by the embodiment of the disclosure further comprises S33-S37.
S33, acquiring a target account number which is not operated in a first preset time period and/or a target document which is not operated in a second preset time period;
S34, generating recommendation information to be deleted based on the target account number and/or the target document;
S35, responding to the selection operation of the permission control corresponding to the deletion permission, and acquiring the deleted target account number and/or the target document;
S36, generating prompt information under the condition that the deleted target account number and/or the target document is provided with a safety protection lock;
and S37, deleting the deleted target account number and/or the target document in response to the selection operation of the permission control corresponding to the deletion permission.
In some examples, the deletion module may perform the steps of S33-S37 described above.
In some examples, the deletion module may delete unwanted portions in conjunction with the example given in S14 above.
In some examples, the deletion module may implement one or more of "no operation early warning", a security guard lock. Wherein, the
1. And the no-operation early warning function automatically marks accounts or files which are not operated for a long time for the manager to review.
2. And the safety protection lock is used for preventing important information and documents from being deleted by mistake.
In some examples, the deletion module may implement the following:
7.1 Deleting user account number which no longer needs to access system, cleaning up inactive or expired user account number.
7.2 Deleting documents, deleting files and data which are out of date, abandoned or no longer needed according to the document management policy, cleaning repeated files in the system to save storage space and optimize system performance.
7.3 Delete classifications and tags, remove document classifications and tags that are no longer used or are not relevant, reorganize or simplify existing classification schemes.
7.4 Deleting items or groups, deleting item information that has been ended or cancelled, cleaning up work groups or user groups that are no longer active.
7.5 Removing the access rights of the user to the specific document or system part, and removing the rights of the user which does not meet the security requirements or has changed responsibilities.
7.6 Deleting system settings or configuration items, deleting obsolete or no longer needed system configurations and settings, maintaining the modernization and optimality of system settings.
7.7 Deleting the integrated external service, if the external integrated service is not used any more, the corresponding integration can be withdrawn, and the API links or service connections which are not needed any more can be cleaned up.
According to the method, one or more of 'no operation early warning' and the safety protection lock can be realized by the deleting module, so that whether the user deletes an account or a file which is not operated for a long time or not can be actively prompted, and meanwhile, the safety protection lock is arranged to prevent important information and documents from being deleted by mistake, so that the experience of the user is improved. And, the user can delete the user, delete the file, delete the classification and label, delete the project or group, delete the authority, delete the system setting or configuration item and delete the integrated external service through the deleting module, which is convenient for the user to manage the file and the service and improves the user experience.
In some practical examples, the function information further comprises auxiliary tool rights, and in combination with FIG. 1, as shown in FIG. 10, the document and resource management method provided by the embodiment of the disclosure further comprises S38 and S39.
S38, responding to the selection operation of the permission control corresponding to the permission of the auxiliary tool, and obtaining a target login credential, wherein the target login credential is a login identifier of the third party application;
S39, logging in based on the target login credentials acquired by the auxiliary tool module so as to realize information interaction with the third party application.
In some examples, the auxiliary tool module may perform the steps of S38 and S39 described above.
In some examples, in conjunction with the example given in S14 above, the accessibility module may introduce AI models to recommend accessibility based on actual scenarios.
In some examples, the auxiliary tool module may implement the following functions:
Users can log in the login module by using the target login credentials of the third party application, so that the document and resource management device provided by the embodiment of the disclosure can mutually transmit information, such as mutually transmitting data and information, with the third party application.
According to the method, the user logs in the server by adopting the login identification of the third-party application through the auxiliary tool module, so that the user can conveniently realize information interaction with the third-party application. Meanwhile, the user can also introduce an AI model according to the actual scene through the auxiliary tool module, and the auxiliary tool is recommended, so that the working efficiency of the user is improved.
In some practical examples, the function information further comprises security rights, and in combination with FIG. 1, as shown in FIG. 11, the document and resource management method provided by the embodiment of the disclosure further comprises S40-S42.
S40, responding to the login operation of the target account at the login module, and performing user identity verification on the target account.
S41, logging in the target account under the condition that the target account passes user identity verification.
S42, responding to the selection operation of the permission control corresponding to the security permission, and performing third target operation on the target account to ensure the security of the target account. The third target operation comprises one or more of authority and user role management, data encryption, access control list, security audit log, network security, vulnerability management, backup and disaster recovery, physical security, endpoint protection, security monitoring and response.
In some examples, the security module may perform the steps of S40-S42 described above.
In some examples, in conjunction with the example given in S14 above, the security module is the core of the document and resource management apparatus protection measures provided by the embodiments of the present disclosure, which ensures protection against external attacks, prevention of internal data leakage, and protection of resources from damage or loss.
In some examples, the security module may implement the following operations:
9.1 User authentication-ensuring that all users pass a secure login procedure, such as using a user name and password, and even MFA authentication.
9.2 Rights and role management-different levels of access rights are set to limit access to sensitive data based on the role and responsibilities of the user.
9.3 Data encryption-the use of strong encryption standards to secure data both at transmission and at static (storage) times.
9.4 Fine-grained access control, ensuring that users can only access the resources they need and cannot access other data.
9.5 Security audit log-record all critical operations such as login attempts, configuration changes, and file access for backtracking when a security event occurs.
9.6 Network security-implementing firewalls, intrusion Detection Systems (IDS), and other network security measures to prevent unauthorized access.
9.7 Vulnerability management-periodically scanning the system to identify security vulnerabilities and applying necessary patches and updates in time.
9.8 Backup and disaster recovery-setting up a backup strategy to enable rapid recovery in the event of data corruption. And meanwhile, the encryption and storage of the backup data in a safe position are ensured.
9.9 Physical security-protecting servers and physical devices from direct damage, such as through strict data center security measures.
9.10 Endpoint protection-ensuring that all devices accessing the system have appropriate security measures, such as virus protection and malware scanning.
9.11 Education and consciousness training, namely, carrying out security training on staff regularly to improve the consciousness of the staff on information security.
9.12 Safety monitoring and response-the safety state of the continuous monitoring system ensures that any threat can be responded to quickly.
9.13 Privacy protection by ensuring that the design and operation of the system complies with relevant privacy regulations and standards.
In some examples, the server may ensure, through the security module, that external attacks are resisted, internal data leakage is prevented, and resources are protected from damage or loss. Meanwhile, the user can perform operations such as user identity verification, authority and role management, data encryption, access control list, security audit log, network security, vulnerability management, backup and disaster recovery, physical security, endpoint protection, education and consciousness culture, security monitoring and response, privacy protection and the like through the security model, so that the security of the server can be managed and controlled by the user, and the user experience is improved.
In some practical examples, the function information further comprises authority management information, and in combination with FIG. 1, as shown in FIG. 12, the document and resource management method provided by the embodiment of the disclosure further comprises S43-S45.
S43, in response to login operation of the target account, user identity verification is performed based on a user plane and a password of the target account or multiple identity authentications;
s44, logging in the target account under the condition that the target account passes user identity verification;
S45, responding to the selection operation of the permission control corresponding to the permission management information, and performing fourth target operation on the target account to obtain an updated target account, wherein the fourth target operation comprises one or more of user role management, permission configuration, permission auditing and distribution, permission inheritance and distribution and special permission processing.
In some examples, the rights module may perform the steps of S43-S45 described above.
In some examples, in connection with the example given in S14 above, the rights module may implement one or more of user authentication, role management, rights configuration, rights auditing and distribution, rights inheritance and delegation, processing of special rights. Wherein, the
10.1 User authentication by determining who the user is and verifying their credentials, typically by username and password or MFA authentication, to provide a more powerful form of security verification than a traditional single password.
10.2 Defining different user roles, e.g., normal user, group Leader, super manager, etc., setting a default set of permissions for each role.
10.3 Rights configuration-assigning or modifying rights of individual users, assigning users a specific set of rights according to roles.
10.4 Checking and allocating rights, checking and confirming whether the rights requested by the user are reasonable and performing allocation. An interface is provided for a superordinate administrator or a user with administrative rights to assign and adjust rights.
10.5 Rights inheritance and delegation-allowing certain rights to be inherited from an upper role to a lower role. The delegation of rights functions are supported so that advanced users can delegate certain rights to subordinate users.
10.6 Processing special requests for rights, such as temporary rights elevation or emergency access requirements. The rights settings are adjusted to account for changes in the organization architecture or business processes.
According to the method, the user can realize one or more of user identity verification, role management, authority configuration, authority verification and distribution, authority inheritance and delegation and special authority treatment through the authority module, so that the authority, the role and the like of the user in the server can be conveniently managed and controlled, and the user experience is improved.
In some practical examples, the function information further comprises disk cleaning information, and in combination with fig. 1, as shown in fig. 13, the document and resource management method provided by the embodiment of the disclosure further comprises S46 and S47.
S46, responding to the selection operation of the permission control corresponding to the disk cleaning information, and acquiring a file meeting the preset condition;
and S47, cleaning files meeting preset conditions, wherein the preset conditions comprise one or more of files with file identifiers being target identifiers, files with service lives, unused files within preset time length and files with version information lower than a preset version.
In some examples, the disk cleaning module may perform the steps of S46 and S47 described above.
In connection with the example given in S14 above, the disk cleaning module is used to help maintain the efficiency and performance of the system by identifying and removing those files and data that are no longer needed or redundant.
In some examples, the disk cleaning module may implement one or more of file marking, automatic labeling rules, lifetime, manual marking, cleaning policies, cleaning previews, validation mechanisms, secure backup, periodic cleaning tasks, notification systems, performance monitoring, log records. Wherein, the
11.1 File marking-when uploading a file, tags such as "temporary" or "cleanable" are set for the file, which tags help later identify the temporary nature of the file.
11.2 Automatic labeling rules-automatically marking files as "temporary files" or the like for cleaning based on the type of file uploaded or other rules.
11.3 Lifetime, namely, setting a lifetime or validity period for the file, and changing the file into a candidate cleaning object after expiration.
11.4 Manual marking-allowing the user to manually mark files that are no longer needed as "cleanable".
11.5 Cleaning policy-policies are set to identify which files may be cleaned (e.g., not accessed for a long time, version is too old, etc.).
11.6 Cleaning preview-providing a preview list for an administrator to review files that may be deleted prior to performing the cleaning action.
11.7 A validation mechanism that implements a validation flow requiring explicit user or administrator authorization before any files are deleted.
11.8 Safety backup, namely, before cleaning, backing up the files to be deleted to prevent accidental loss.
11.9 Setting a cleaning task to be executed regularly, and automatically cleaning files marked as temporary files or cleanable files.
11.10 Notification system, which sends notification to relevant users and administrators before and after cleaning to ensure relevant personnel know about the change.
11.11 Performance monitoring by tracking the impact of cleaning activities on system performance and making adjustments as necessary.
11.12 Logging, recording detailed information of all cleaning activities, including deleted files and time stamps, etc.
By implementing these measures, an efficient, safe and traceable cleaning procedure is ensured. And manual intervention can be minimized, management load is lightened, and business continuity and data integrity are guaranteed. The overall management capacity and stability of the system are greatly improved.
In order to ensure the normal operation of the server, the user can help maintain the efficiency and performance of the system by using the disk cleaning module in the server to remove the files and data which are not needed or redundant.
In some practical examples, the function information further comprises system configuration authority information, and in combination with fig. 1, as shown in fig. 14, the document and resource management method provided by the embodiment of the disclosure further comprises S48.
S48, responding to the selection operation of the permission control corresponding to the system configuration permission information, and executing a fifth target operation on the target account to obtain the updated target account, wherein the fifth target operation comprises one or more of permission level definition, user role and permission association, user permission distribution, security measures, configuration backup and recovery, permission change notification and configuration change approval flow.
In some examples, the system configuration permission module may perform the step of S48 described above.
In connection with the example given in S14 above, the system configuration authority module may design the following notation functions, including but not limited to the following:
12.1 A right level definition;
12.2 A) roles are associated with rights;
12.3 User rights allocation;
12.4 Security measures;
12.5 Configuration backup and restore;
12.6 A notification of the change of authority;
12.7 Interface ease of use);
12.8 Configuration change approval process.
According to the method, a user can realize authority level definition, role-authority association, user authority allocation, security measures, configuration backup and recovery, authority change notification, interface usability and configuration change approval flow through the system configuration authority module, so that the user's authority, role and system security can be managed, and the user experience is improved.
In some practical examples, the function information further comprises user support and help information, and in combination with fig. 1, as shown in fig. 15, the document and resource management method provided by the embodiment of the disclosure further comprises S49 and S50.
S49, responding to the selection operation of the permission control corresponding to the user support help information, and acquiring preset information, wherein the preset information comprises one or more of a user help document, a technical support interface, a common problem solution, a user interface of a third party application, address information of online customer service, technical support hotline, address information of community support, feedback and advice;
S50, generating prompt information containing preset information.
In some examples, the user support and assistance module may perform the steps of S49 and S50 described above.
In some examples, in the example given in connection with S14 above, the user support and assistance module may implement the following functions:
13.1 User help documents (guiding the user how to use the system);
13.2 Technical support interface (channel providing problem resolution and technical support);
13.3 FAQ (common problem solution);
13.4 Fly book user interface, online customer service, technical support hotline, community support;
13.5 Feedback and advice.
According to the document and resource management method disclosed by the disclosure, a user can integrate some functions according to actual requirements, such as fusing a grouping management module and a permission module. And the hierarchy inheritance of grouping authorities, namely the child grouping automatically inherits the authority template of the parent grouping, so that repeated work is reduced. AI can be used as a personal tool to improve the working efficiency, but has obvious disadvantages for large-scale enterprise-level resource preservation and management, such as consistency, accuracy, flexibility, stability trade-off and the like, and the problems of high cost, slow aging, professionality, safety and the like are also factors to be considered in combination with the current situation, so that AI is not suitable for large-scale enterprise-level resource preservation and management.
The foregoing description of the embodiments of the present disclosure has been presented primarily in terms of methods. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The embodiments of the present disclosure may divide functional modules of the document and resource management apparatus according to the above method examples, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present disclosure, the division of the modules is merely a logic function division, and other division manners may be implemented in actual practice.
Fig. 16 is a schematic structural diagram of a document and resource management apparatus 10 according to an embodiment of the present disclosure. Including a login module 101 and a sort management module 102.
The system comprises a login module 101, a classification management module 102 and a classification module, wherein the login module 101 is used for responding to login operation of a target account to obtain functional information of the target account, the functional information at least comprises classification management authorities, the login module 101 is further used for displaying a user interface containing the functional information when the login state of the target account is determined to be logged in, the user interface comprises authority controls corresponding to each piece of functional information, the classification management module 102 is used for responding to selection operation of the authority controls corresponding to the classification management authorities to obtain documents to be allocated, the classification management module 102 is further used for classifying the documents to be allocated based on a target classification model to obtain classification results corresponding to the documents to be allocated, the target classification model comprises a model trained based on behavior data of the target account and/or a model trained based on natural language processing, and the classification management module is further used for classifying the documents to be allocated according to the classification results.
In some practical examples, the classification management module 102 is further configured to obtain an identification set of the document to be allocated after classifying the document to be allocated according to the classification result, where the identification set includes one or more of a keyword and a tag, and the classification management module 102 is further configured to establish a correspondence between the identification set and the classification result.
In some practical examples, the classification management module 102 is further configured to respond to a target operation on a target permission control, and execute a function corresponding to the function information according to the function information corresponding to the target permission control, where the function information further includes any one of a group management permission, a document management permission, a tool management permission, a search and screening permission, and a deletion permission.
In some practical examples, the function information further comprises a grouping management authority, the document and resource management method further comprises a grouping management module 103, a user grouping creation operation and a grouping management module 103, wherein one user grouping corresponds to one grouping management authority, the grouping management module 103 is further used for responding to a selection operation of an authority control corresponding to the grouping management authority, executing a first target operation on the user grouping corresponding to the grouping management authority to obtain an updated user grouping, and the first target operation comprises one or more of grouping management, member management, resource allocation, user role definition, user role allocation, authority adjustment and updating.
In some practical examples, the function information further comprises a document management authority, the document management module 104 is used for responding to uploading operation of uploading the document to be distributed, acquiring document content and use information of the document to be distributed and sending the document to be distributed to the classification management module for classification, the document management module 104 is further used for generating a document relation graph of the document to be distributed based on the document content and the use information, the document relation graph is used for indicating the background and the context of the document to be distributed, the document management module 104 is further used for responding to selection operation of an authority control corresponding to the document management authority, executing second target operation on the distributed document corresponding to the document management authority to obtain the updated distributed document, and the second target operation comprises one or more of document attribute setting, access authority setting, version control, document editing, document updating, document sharing and document cooperation.
In some practical examples, the function information further comprises tool management rights, the document and resource management method further comprises a tool management module 105, the tool management module 105 is used for acquiring target information of a target script tool in response to selection operation of a rights control corresponding to the tool management rights, the target information comprises experience information and improvement suggestion information, the tool management module 105 is further used for optimizing the target script tool based on the target information, the tool management module 105 is further used for acquiring user role information and historical tool use information of a target account in response to selection operation of the rights control corresponding to the tool management rights, and the tool management module 105 is further used for generating recommendation information containing recommendation script tools based on the user role information and the historical tool use information.
In some practical examples, the function information further comprises a searching and screening authority, the document and resource management method further comprises a searching and screening module 106, the searching and screening module 106 is used for responding to the selection operation of the authority control corresponding to the searching and screening authority to obtain the searching information, the searching and screening module 106 is further used for carrying out intention understanding on the searching information to obtain the searching intention corresponding to the searching information, the searching and screening module 106 is further used for carrying out contextual searching according to the searching information to obtain at least one searching result, the searching and screening module 106 is further used for screening the searching result according to the searching intention to obtain the screening searching result, and the searching and screening module 106 is further used for taking the screening searching result as the searching result of the searching information.
In some practical examples, the searching and screening module 106 is further configured to obtain a current working scenario, obtain a preset screener corresponding to the working scenario based on the working scenario, where one preset screener corresponds to one preset screening condition, and the searching and screening module 106 is further configured to perform data screening according to the preset screening condition corresponding to the preset screener to obtain the target screening data.
In some practical examples, the function information further comprises a deletion authority, the document and resource management method further comprises a deletion module 107, the deletion module 107 is used for acquiring a target account number which is not operated in a first preset time period and/or a target document which is not operated in a second preset time period, the deletion module 107 is further used for generating recommendation information to be deleted based on the target account number and/or the target document, the deletion module 107 is further used for acquiring a deleted target account number and/or the target document in response to the selection operation of an authority control corresponding to the deletion authority, the deletion module 107 is further used for generating prompt information in the case that the deleted target account number and/or the target document is provided with a security protection lock, and the deletion module 107 is further used for deleting the deleted target account number and/or the target document in response to the selection operation of the authority control corresponding to the deletion authority.
In some practical examples, the function information further comprises an auxiliary tool authority, the document and resource management method further comprises an auxiliary tool module 108, the auxiliary tool module 108 is used for responding to selection operation of an authority control corresponding to the auxiliary tool authority to obtain a target login credential, wherein the target login credential is a login identification of a third party application, and the login module 108 is further used for logging in based on the target login credential obtained by the auxiliary tool module to achieve information interaction with the third party application.
In some practical examples, the function information further comprises security rights, the document and resource management method further comprises a security module 109, the security module 109 is used for conducting user authentication on the target account when the login module 101 responds to login operation on the target account, the security module 109 is further used for logging in the target account when the target account passes the user authentication, the security module 109 is further used for conducting third target operation on the target account to ensure the security of the target account in response to selection operation of a rights control corresponding to the security rights, and the third target operation comprises one or more of rights and user role management, data encryption, an access control list, a security audit log, network security, vulnerability management, backup and disaster recovery, physical security, endpoint protection, security monitoring and response.
In some practical examples, the function information further comprises authority management information, the document and resource management method further comprises an authority module 110, the authority module 110 is used for carrying out user identity verification based on a user plane and a password of the target account or multiple identity authentications when the login module 101 responds to login operation of the target account, the authority module 110 is further used for logging in the target account when the target account passes the user identity authentication, the authority module 110 is further used for carrying out fourth target operation on the target account to obtain an updated target account in response to selection operation of an authority control corresponding to the authority management information, and the fourth target operation comprises one or more of user role management, authority configuration, authority verification and distribution, authority inheritance and distribution and special authority processing.
In some practical examples, the function information further comprises disk cleaning information, the document and resource management method further comprises a disk cleaning module 111, the disk cleaning module 111 is used for responding to selection operation of a permission control corresponding to the disk cleaning information to obtain files meeting preset conditions, the disk cleaning module 111 is also used for cleaning the files meeting the preset conditions, and the preset conditions comprise one or more of files with target marks, files with service lives, unused files within preset time periods and files with version information lower than a preset version.
In some practical examples, the function information further comprises system configuration authority information, and the document and resource management method further comprises a system configuration authority module 112, wherein the system configuration authority module 112 is used for responding to the selection operation of the authority control corresponding to the system configuration authority information, executing a fifth target operation on the target account to obtain the updated target account, and the fifth target operation comprises one or more of authority level definition, user role and authority association, user authority allocation, security measures, configuration backup and recovery, authority change notification and configuration change approval flow.
In some practical examples, the function information further comprises user support and help information, the document and resource management method further comprises a user support and help module 113, the user support and help module 113 is used for responding to selection operation of a permission control corresponding to the user support and help information to obtain preset information, wherein the preset information comprises one or more of a user help document, a technical support interface, a common problem solution, a user interface of a third party application, address information of online customer service, technical support hotline, address information of community support, feedback and suggestion, and the user support and help module 113 is further used for generating prompt information containing the preset information.
All relevant contents of each step related to the above method embodiment may be cited to the functional descriptions of the corresponding functional modules, and their effects are not described herein.
Of course, the document and resource management apparatus 10 provided in the embodiments of the present disclosure includes, but is not limited to, the above modules, for example, the document and resource management apparatus 10 may further include a storage module 114. The storage module 114 may be used to store program code of the document and resource management device 10, and may also be used to store data generated by the document and resource management device 10 during operation, such as data in a write request, etc.
Fig. 17 is a schematic structural diagram of a vehicle-mounted terminal according to an embodiment of the disclosure, and as shown in fig. 17, the vehicle-mounted terminal may include at least one processor 51, a memory 52, a communication interface 53, and a communication bus 54.
The following describes each constituent element of the in-vehicle terminal specifically with reference to fig. 17:
The processor 51 is a control center of the electronic device 10, and may be one processor or a collective term of a plurality of processing elements. For example, processor 51 is a central processing unit (Central Processing Unit, CPU), or may be an Application SPECIFIC INTEGRATED Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present disclosure, such as one or more DSPs, or one or more field programmable gate arrays (Field Programmable GATE ARRAY, FPGA).
In a particular implementation, processor 51 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 17, as an example. Also, as one embodiment, the electronic device may include multiple processors, such as processor 51 and processor 55 shown in fig. 17. Each of these processors may be a Single-core processor (Single-CPU) or a Multi-core processor (Multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The Memory 52 may be, but is not limited to, a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a random access Memory (Random Access Memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable Read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), a compact disc (Compact Disc Read-Only Memory, CD-ROM) or other optical storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 52 may be stand alone and be coupled to the processor 51 via a communication bus 54. Memory 52 may also be integrated with processor 51.
In a specific implementation, the memory 52 is used to store data in the present disclosure and to execute software programs of the present disclosure. The processor 51 may perform various functions of the air conditioner by running or executing a software program stored in the memory 52 and calling data stored in the memory 52.
The communication interface 53 uses any transceiver-like means for communicating with other devices or communication networks, such as a radio access network (Radio Access Network, RAN), a wireless local area network (Wireless Local Area Networks, WLAN), a terminal, a cloud, etc. Communication interface 53 may include a login module to implement the interactive functionality.
The communication bus 54 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 17, but not only one bus or one type of bus.
In some embodiments, in conjunction with fig. 16, the login module 101 in the document and resource management apparatus 10 performs the same function as the communication interface 53 in fig. 17, the classification management module 102, the group management module 103, the document management module 104, the tool management module 105, the search and screening module 106, the deletion module 107, the auxiliary tool module 108, the security module 109, the permission module 110, the disk cleaning module 111, and the system configuration permission module 112 perform the same function as the processor 51 in fig. 17, and the storage module 114 in the document and resource management apparatus 10 performs the same function as the memory 52 in fig. 17.
Another embodiment of the present disclosure also provides a computer-readable storage medium having a computer program stored thereon, which when executed by a computing device, causes the computing device to perform the mode switching method shown in the above-described method embodiment.
In some embodiments, the disclosed methods may be implemented as computer program instructions encoded on a computer-readable storage medium in a machine-readable format or encoded on other non-transitory media or articles of manufacture.
Fig. 18 schematically illustrates a conceptual partial view of a computer program product provided by embodiments of the present disclosure, the computer program product comprising a computer program for executing a computer process on a computing device.
In one embodiment, a computer program product is provided using signal bearing medium 410. The signal bearing medium 410 may include one or more program instructions that when executed by one or more processors may provide the functionality or portions of the functionality described above with respect to fig. 1. Thus, for example, referring to the embodiment shown in FIG. 1, one or more features of S11-S14 may be carried by one or more instructions associated with signal bearing medium 410. Further, the program instructions in fig. 18 also describe example instructions.
In some examples, signal bearing medium 410 may comprise a computer readable medium 411 such as, but not limited to, a hard disk drive, compact Disk (CD), digital Video Disk (DVD), digital tape, memory, read-only memory (ROM), or random access memory (random access memory, RAM), among others.
In some implementations, the signal bearing medium 410 may include a computer recordable medium 412 such as, but not limited to, memory, read/write (R/W) CD, R/W DVD, and the like.
In some implementations, the signal bearing medium 410 may include a communication medium 413 such as, but not limited to, a digital and/or analog communication medium (e.g., fiber optic cable, waveguide, wired communications link, wireless communications link, etc.).
The signal bearing medium 410 may be conveyed by a communication medium 413 in wireless form (e.g., a wireless communication medium conforming to the IEEE 802.41 standard or other transmission protocol). The one or more program instructions may be, for example, computing device executable instructions or logic implementation instructions.
In some examples, a management apparatus 10, such as the documents and resources described with respect to fig. 18, may be configured to provide various operations, functions, or actions in response to program instructions through one or more of the computer readable medium 411, the computer recordable medium 412, and/or the communication medium 413.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above.
In the several embodiments provided in the present disclosure, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present disclosure may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present disclosure. The storage medium includes various media capable of storing program codes such as a U disk, a mobile hard disk, a ROM, a RAM, a magnetic disk or an optical disk.
The foregoing is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown and described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.