[go: up one dir, main page]

CN117828678B - Data processing method, apparatus, storage medium, and program product - Google Patents

Data processing method, apparatus, storage medium, and program product Download PDF

Info

Publication number
CN117828678B
CN117828678B CN202311866477.3A CN202311866477A CN117828678B CN 117828678 B CN117828678 B CN 117828678B CN 202311866477 A CN202311866477 A CN 202311866477A CN 117828678 B CN117828678 B CN 117828678B
Authority
CN
China
Prior art keywords
search
file
page
target
propagation path
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311866477.3A
Other languages
Chinese (zh)
Other versions
CN117828678A (en
Inventor
庞云洁
韩锦文
王泉
张东明
孙云鹏
陈少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Volcano Engine Technology Co Ltd
Original Assignee
Beijing Volcano Engine Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Volcano Engine Technology Co Ltd filed Critical Beijing Volcano Engine Technology Co Ltd
Priority to CN202311866477.3A priority Critical patent/CN117828678B/en
Publication of CN117828678A publication Critical patent/CN117828678A/en
Application granted granted Critical
Publication of CN117828678B publication Critical patent/CN117828678B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the disclosure provides a data processing method, device, storage medium and program product, the method displays a search page, the search page supports a propagation path of search file content, search information input through the search page is received, search is performed according to search information to match hit target file content according to a file security protection database in response to a search request corresponding to the search information, and the propagation path of the target file content is acquired, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured, the propagation path of the target file content is displayed on a first search result display page, and the propagation path of the target file content is used for representing the condition that the target file content is operated and/or transmitted. The data processing method provided by the embodiment can realize systematic data security management.

Description

Data processing method, apparatus, storage medium, and program product
Technical Field
The embodiment of the disclosure relates to the technical field of computer and network communication, in particular to a data processing method, device, storage medium and program product.
Background
With the rapid development of computer technology, data security problems frequently occur, and data security protection technology begins to become a serious issue for enterprise data management technology, so that at present, common solutions are to encrypt and protect data with higher security level or shrink limit data crowd to ensure data security, but when data is lost due to malicious behaviors, no related technical solution is available for systematically supporting data security protection management.
Disclosure of Invention
Embodiments of the present disclosure provide a data processing method, apparatus, storage medium, and program product to implement systematic data security protection management.
In a first aspect, an embodiment of the present disclosure provides a data processing method, including:
displaying a search page, wherein the search page supports a propagation path of search file contents;
receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to the search information depending on a file security protection database to match the content of a hit target file, and acquiring a propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured;
And displaying the propagation path of the target file content on a first search result display page, wherein the propagation path of the target file content is used for representing the condition that the target file content is operated and/or transmitted.
In a second aspect, embodiments of the present disclosure provide a data processing apparatus, including:
the display module is used for displaying a search page, wherein the search page supports a propagation path of the content of the search file;
The searching module is used for receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to the search information depending on a file security protection database to match the content of a hit target file and acquiring a propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured;
The display module is further configured to display a propagation path of the target file content on the first search result display page, where the propagation path of the target file content is used to characterize a situation where the target file content is operated and/or transmitted.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including a processor and a memory;
the memory stores computer-executable instructions;
The processor executes computer-executable instructions stored in the memory to cause the at least one processor to perform the data processing method as described above in the first aspect and the various possible designs of the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, implement the data processing method according to the first aspect and the various possible designs of the first aspect.
In a fifth aspect, embodiments of the present disclosure provide a computer program product comprising a computer program which, when executed by a processor, implements the data processing method according to the first aspect and the various possible designs of the first aspect.
The data processing method, the device, the storage medium and the program product provided by the embodiment comprise the steps of displaying a search page, supporting a propagation path of content of a search file, receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to a file security protection database according to the search information to match the hit content of the target file, and acquiring the propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured, and displaying the propagation path of the content of the target file on a first search result display page, and the propagation path of the content of the target file is used for representing the condition that the content of the target file is operated and/or transmitted. According to the data processing method provided by the embodiment, a security protection database can be established according to data security requirements, the database is utilized to dynamically maintain transmission paths of the files aiming at the appointed files needing to be secured, a search page is provided for a user to search and feed back the transmission paths of the contents of the target files appointed by the user through a search engine based on the database, so that the user can quickly know the data security situation of the target files by triggering the search conveniently, and therefore the data processing method is established from a bottom security protection database, to the collection and maintenance of the information related to the transmission paths of the files aiming at the appointed files needing to be secured in the middle layer, and to the upper layer for the search engine construction, and the data security management can be achieved systematically.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the description of the prior art, it being obvious that the drawings in the following description are some embodiments of the present disclosure, and that other drawings may be obtained from these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is an application scenario schematic diagram of a data processing method according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of a data processing method according to an embodiment of the disclosure;
FIGS. 3a-3f are interface diagrams of a data processing method according to embodiments of the present disclosure;
FIG. 4 is a block diagram of a data processing apparatus provided by an embodiment of the present disclosure;
Fig. 5 is a schematic hardware structure of a data processing device according to an embodiment of the present disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are some embodiments of the present disclosure, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
In the embodiment of the disclosure, the processing of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the related information such as file content, user data and the like accords with the rules of relevant laws and regulations and does not violate the popular regulations of the public order.
Aiming at the problem that the prior data processing mode cannot systematically support data security protection management when data is lost due to malicious behaviors, the inventor of the present disclosure researches and discovers that a security protection database can be established according to data security requirements, the database is utilized to dynamically maintain transmission paths of files to be security protected aiming at the appointed files, a search page is provided for a user to search and feed back the transmission paths of the content of the target file appointed by the user through a search engine based on the database, so that the user can conveniently trigger the search to quickly know the data security situation of the target file, and thus the systematic data security management is realized. Based on this, the embodiment of the disclosure provides a data processing method.
Fig. 1 is an application scenario schematic diagram of a data processing method according to an embodiment of the present disclosure. As shown in fig. 1, the server 102 is connected to the terminal device 101 and the terminal device 103 through a network, where the server 102 is used to provide services for the terminal device or a client installed on the terminal device, and a database may be provided on the server 102 or independent of the server 102, to provide data storage services for the server 102, and the network includes, but is not limited to, a wide area network, a metropolitan area network, or a local area network, and the terminal device 101 and the terminal device 103 are not limited to, a PC, a mobile phone, a tablet computer, and the like. The data processing method provided by the embodiment of the present disclosure may be executed by the server 102, may be executed by the terminal device 101, or may be executed by both the server 102 and the terminal device 101. Wherein the terminal device 101 performs the data processing method of the embodiments of the present disclosure may also be performed by a client installed thereon.
In an exemplary implementation process, the terminal device 103 may install a client, obtain a policy configuration through the client, collect a log record related to the content of the target file based on the policy configuration, and upload the log record to a file security protection database of the server 102, and, for example, may store the content of the target file triggered by a preset operation (such as sending out, receiving, creating, downloading, etc.) on the terminal device 103, collect a corresponding log record, upload the log record to the file security protection database of the server 102, and after finding that some data is lost due to a malicious behavior, a user (such as an information security manager) may obtain a propagation path of the content of the target file by searching at the terminal device 102. According to the data processing method provided by the embodiment of the disclosure, the target file content is obtained by matching from the database based on the search information input in the search page, and the propagation path of the target file content is displayed on the display page, so that the operation is convenient, the data display intuitiveness is high, and the systematic data security management can be realized.
Fig. 2 is a schematic flow chart of a data processing method according to an embodiment of the disclosure. As shown in fig. 2, a method of an embodiment of the present disclosure may include:
201. The search page is displayed.
Specifically, in order to facilitate the security management of data, the data to be protected may be classified, and different protection policies may be configured for different classes of data to be protected. In order to ensure that the target file is in a safe state, a data security manager can monitor data to be protected on a second device which can be used by an operator through a first device, when the data to be protected (such as the content of the target file) is found to be triggered and sent out and other preset operations, the second device performs the preset operations to generate a corresponding log record, wherein the log record can comprise the file subject, the file content, the information abstract MD5, the data type, the data grade, the equipment information of the equipment, the related operator information and the like of the content of the target file, and the log record is uploaded to a file security protection database so as to perform security detection and ensure the security of data transmission.
When the data security manager needs to check the propagation path of a certain target file content, a search page can be displayed through the second device or a client installed on the second device, search controls such as a text input box and a voice input control can be included in the search page, and a user can input search information related to the target file content by performing touch operation on the search controls. The search information can be key information such as file subject of the target file content, information abstract MD5, data type and the like, and can also be a complete file.
202. Receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to the search information depending on a file security protection database to match the content of a hit target file, and acquiring a propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured.
Receiving search information input through the search page, generating a search request according to the search information, searching and matching a plurality of log records stored in a file security protection database according to the search request, obtaining at least one target log record corresponding to target file content corresponding to the search information, and performing aggregation processing on the at least one target log record to generate a propagation path of the target file content, wherein the log record can comprise the target file content and log source information (such as equipment information of equipment where the target file content is located, operator information of an associated user of the equipment and the like) triggered by a preset operation.
The search information may be a segment or a complete file in the form of video, pictures, text, charts, etc. The propagation path of the target file content may include device information of a device in which the target file content is located, operator information of a user associated with the device, full link information of landing, operating, outgoing, etc. of the target file content.
In an embodiment of the disclosure, considering that there is a high data security risk in performing operations such as file creation and reception on a specific source, the specific source may be set as a monitoring object, and in a specific embodiment of the disclosure, the preset operation of triggering the log record may include creation, where the log record is generated after detecting that a target application on a corresponding target device opens a creation process. And/or the preset operation can comprise receiving, wherein the log record is generated after the detection that the target application program on the corresponding target equipment is provided with a receiving process. The target application program may be a target website, a target APP, or the like.
In one embodiment of the present disclosure, in order to intuitively understand what target file contents exist and what log sources each target file content corresponds to, a target information source may be used as an index. Specifically, in the embodiment of the present disclosure, the aggregating the at least one target log record to generate the file propagation path corresponding to the lost data may include aggregating the at least one target log record to obtain an aggregate list with the target file content as an index, and determining the aggregate list as the file propagation path corresponding to the search information.
203. And displaying a propagation path of the target file content on a first search result display page, wherein the propagation path of the target file content is used for representing the condition that the target file content is operated and/or transmitted to display the first search result display page, and the first search result display page displays the file propagation path.
In the embodiment of the disclosure, after the propagation path of the target file content is acquired, a first search result display page may be displayed, and the first search result display page may be presented, where the file propagation path may be displayed in a paginated manner, and each page may be displayed in a list form.
As can be seen from the above description, the data processing method provided by the embodiments of the present disclosure can establish a security protection database according to data security requirements, dynamically maintain transmission paths of the files for specified files to be secured by using the database, and provide a search page for a user to search and feed back a transmission path of the content of a target file specified to be searched by the user through a search engine based on the database, so that the user can quickly understand the data security situation of the target file by triggering the search, and therefore, the data processing method establishes from a bottom security protection database, to the middle layer, to the collection and maintenance of information related to the transmission path of the specified files to be secured, and to the upper layer, to the search engine construction, so that systematic data security management can be achieved.
In one embodiment of the present disclosure, on the basis of the embodiment of fig. 2, there are various ways to obtain the search information corresponding to the content of the target file on the search page. The search page can support two types of searches, including file integral search and file key information search, wherein the search page supports file integral search, and comprises the step of inputting a target file as search information in a dragging or file uploading mode, and the search page supports file key information search, and comprises the step of inputting file key information as search information. The file key information may include related attribute information including file content, file theme, file MD5, file type, file level, and the like.
Illustratively, taking a computer as an example, after a client application installed on the computer is started, the interface 31 shown in FIG. 3a is displayed on the display screen of the computer. The interface 31 is a search page, which may include a set of multiple search functions, and is mainly configured to receive search information input by a user, match and obtain corresponding target file contents from data in the file security database based on the search information, and return a search result of a propagation path of the target file contents based on the target file contents.
As shown in fig. 3a, the interface 31 includes an input box 301. The input box 301 may be displayed in the form of graphics, text, icons, or the like, or may be displayed in a combination of a plurality of forms. The present disclosure does not limit display parameters such as color, size, and the like employed by the input box 301. For example, as shown in FIG. 3a, the input box 301 is presented in the form of "image+text".
The application program receives a touch or voice control operation (e.g., text or voice input operation) on the input box 301, and in response to the touch or voice control operation, a search first search result presentation page as shown in fig. 3b or 3c may be exemplarily displayed on the computer.
Optionally, in order to achieve faster and more accurate matching, a specific data item may be searched, the search page further includes a data item selection control, the log records include at least one data item, step 202 may include obtaining the search information in response to an input operation acting on the input box, obtaining a target option in response to an input operation acting on the data item selection control, determining, for each log record in the plurality of log records, a target data item corresponding to the log record from the plurality of data items corresponding to the target option, searching and matching, according to the first search information, target data items corresponding to the plurality of log records respectively, obtaining at least one target log record corresponding to the target file content, and determining a propagation path of the target file content according to the at least one target log record corresponding to the target file content. Optionally, the data entry may include at least one of a file title, a file content, a message digest MD5, a severity level to which it belongs, a category of data to which it belongs.
As shown in fig. 3a, the interface 31 also includes a data entry selection control 302. The size, color, display location, display transparency, and other display parameters of the data entry selection control 302 are not limited in the embodiments of the present disclosure. Wherein the data entry selection control 302 may include a plurality of option controls, such as option 1 through option 4. The options may be file title, file content, message digest MD5, belonging severity level or belonging data category. The plurality of selection controls may be selected in a selection mode or a multiple selection mode. For example, only option 1 may be selected, and option 1 and option 2 may also be selected simultaneously, which is specifically set according to actual needs, which is not limited in the embodiment of the present disclosure.
The application program receives a touch operation (for example, a click operation or a hover operation) on the data entry selection control 302, and in response to the touch operation, the selected control may be displayed differently, for example, a line is thickened, a color is changed, etc., a search range of each log record is determined, and then a file propagation path may be determined in combination with the search information input in the input box 301. For example, assuming that the data entry selection control 302 includes an option of a file name, and assuming that the file name is selected, only the content in the data entry of the file name is matched based on the search information in the plurality of log records, so that a target log record corresponding to the target file content is selected, and further, the file propagation path of the target file content can be obtained based on the obtained target log record aggregation.
Optionally, when the missing data is a certain file, in order to facilitate searching based on the whole of the file, a file input control may be set, in this embodiment, the search page includes a file input control, and step 202 may include obtaining the search information in response to a file input operation acting on the file input control. Optionally, the file input control comprises a file input area, the searching information is obtained in response to a file input operation acting on the file input control, the searching information can be obtained in response to a touch operation of dragging a file to be protected to the file input area, and/or the file input control comprises a first entry control, the searching information is obtained in response to a file input operation acting on the file input control, the searching information can be obtained, the searching information can be displayed in response to a touch operation acting on the first entry control in the file input control, a file selection interface is displayed, and the searching information is obtained in response to a touch operation acting on the file selection interface.
As shown in fig. 3a, interface 31 also includes a file input control 303. The size, color, display position, display transparency, and other display parameters of the file input control 303 are not limited in the embodiments of the present disclosure. The file input control 303 may include, among other things, a file input region 3032 and/or a first entry control 3031.
The application program receives a touch operation (e.g., a file drag operation) triggered in the file input region 3032, and in response to the touch operation, search information may be determined according to the input file, and specifically, search information may be determined based on information such as a file name, file content, and information digest MD5 of the file.
The application program receives a touch operation (for example, a click operation or a hover operation) on the first portal control 3031, and in response to the touch operation, a file selection interface may be displayed, and a plurality of files to be selected may be included in the file selection interface, and in response to a selection operation on the plurality of files to be selected, search information is determined according to the selected files to be selected.
It should be noted that, the input box 301, the data entry selection control 302, and the file input control 303 may be used alternatively, or may be used in combination, and may be specifically set according to actual needs, which is not limited in the embodiments of the present disclosure.
In one embodiment of the present disclosure, to facilitate quick re-searching after the previous search results are obtained, a search control may be set on the first search results presentation page. On the basis of the embodiment shown in fig. 2, the first search result display page may include a second search control, and after step 203, the method may further include obtaining new search information in response to a touch operation applied to the second search control, generating a new file propagation path according to the new search information, and presenting the new file propagation path in the first search result display page.
For example, after acquiring the search information in the search page shown in fig. 3a and determining the file propagation path based on the search information, it is possible to jump to the first search result presentation page shown in fig. 3b to 3c to present the file propagation path.
As shown in fig. 3b, the interface 34 includes a search result list of a plurality of files related to the target file content, and the record for each file may include file attribute information (e.g., file name, file MD5, level), details of propagation related information (e.g., number of operators, number of devices, operation, etc.), and file propagation path (e.g., may include full link information of file landing, operation, forwarding), where the number of operators may include the number of operators respectively corresponding to trigger different preset operations (e.g., create/receive, download, and send), and the number of devices may include the number of devices respectively corresponding to trigger different preset operations (e.g., create/receive, download, send), and the interface 34 further includes the search control 304. Reference is made in particular to the description of fig. 3 a. The search control 304 is configured to receive search information input by the user again, so as to update and display a file propagation path displayed in the lower area.
In one embodiment of the disclosure, the search page further supports selection of a search range, the method further comprises determining a target search range corresponding to the search request, searching according to the search information and depending on a file security database to match hit target file contents according to the search request corresponding to the search information, and acquiring a propagation path of the target file contents, wherein searching according to the search information and the target search range and depending on the file security database to match hit target file contents according to the search request corresponding to the search information, and acquiring the propagation path of the target file contents.
The target search range may include information related to time, operator attributes, file type attributes, and the like.
For example, to facilitate finding file propagation paths for different time periods, a time period selection control may be set in the first search result presentation page to input a time range, defining a search range in time. On the basis of the embodiment shown in fig. 2, the first search result presentation page further includes a first period selection control, and step 203 may further include, in response to the first period selection control being acted on, acquiring a time range, selecting a target file propagation path with a trigger time of the preset operation meeting the time range from propagation paths of the target file content, and presenting the target file propagation path in the first search result presentation page.
As shown in fig. 3c, the interface 33 includes a time period selection control 305, which may include a specific date entry area and a last n day selection area to facilitate the user entering a time range in a variety of forms. After the time range is determined, the file propagation path shown in the lower area may be updated and displayed, and only the file propagation path satisfying the time range may be displayed.
In one embodiment of the present disclosure, considering that there are more operators and devices associated with the same target file content, the statistics of the operators and the devices may be displayed on the first search result presentation page, and for convenience of detail, an entry control may be set on the first search result presentation page to enter the detail presentation page. On the basis of the embodiment shown in fig. 2, the first search result presentation page further includes second entry controls respectively associated with at least one target file content in the file propagation path, and step 203 may further include displaying a detail page in response to the second entry controls, where the detail page presents source information under different preset operations corresponding to the corresponding target file content.
As shown in fig. 3c, the interface 35 further comprises an entry control 306, the entry control 306 being used to enter a details page to reveal details pages of the file propagation path, such as specific operator information and equipment information related to the number of operators and equipment. The application receives a trigger operation (e.g., a click operation or a hover operation) on the portal control 306, and in response to the touch operation, jumps to the interface 34 as shown in fig. 3 d.
As shown in fig. 3d, the interface 34 includes a plurality of operator information corresponding to different preset operations (creation/reception, download, and outgoing) corresponding to the target file content corresponding to the portal control 306, and a plurality of device information corresponding to each operator. So that the user can intuitively know which operators the corresponding target file content is transmitted to on which equipment.
In one embodiment of the present disclosure, the search result presentation page also supports search viewing for at least one attribute dimension for the search results, the at least one attribute dimension including one or more of time, text keywords, and file transmission path detail pages.
In one embodiment of the disclosure, the search page further supports viewing global security posture of propagation paths of all files maintained in the file security database, and the method may further include receiving a global security posture viewing request triggered on the search page, the global security posture request being used for requesting to view global security posture of propagation paths of all files maintained in the file security database, acquiring the propagation paths maintained in the file security database in response to the global security posture request, and displaying a global security posture graph summarized based on a preset data security hierarchy and a transmission path sequence on a second search result page.
Specifically, the global security situation can be checked by one-key check, clicking a button or touching a voice control.
Illustratively, in order to facilitate the data security manager to globally grasp the propagation of all files maintained in the file security protection data, in order to secure the contents of the target file. On the basis of the embodiment shown in fig. 2, the method further comprises the steps of responding to the global display control, obtaining global file propagation paths corresponding to the log records, and displaying a second search result display page, wherein the global file propagation paths are displayed on the second search result display page. Alternatively, to improve intuitiveness and logic, the global file propagation path may be presented in a tree form. The tree structure comprises a plurality of levels of nodes, the nodes of different levels correspond to different factors, the nodes of each level are divided into nodes based on the corresponding factors, and the factors comprise severity level, data application field, data type, file name, operation type, staff, equipment or data opposite end.
By way of example, the search page may have a function selection area including an entry control for the search function for exposing search function related controls in the main presentation area, such as controls 301 through 303 shown in fig. 3a, and an entry control for the global presentation function for exposing global presentation function related content in the main presentation area. The two portal controls may be presented in the form of icons, text, symbols, pictures, etc., or may be presented in a combination of forms. The present disclosure is not limited to the display parameters of color, size, etc. employed by the two controls.
The application receives a touch operation (e.g., a click operation or a hover operation) on an entry control of the global presentation function, and in response to the touch operation, the primary presentation area displays a global security posture of propagation paths of all files maintained in the file security database.
In one embodiment of the disclosure, the second search result presentation page further supports hierarchical viewing of information in the global security posture graph, and in response to the selected viewed target content, path information directly associated with the target content is highlighted in accordance with a transmission path of the target content.
As shown in fig. 3e, the file propagation paths of all files maintained in the file security database are displayed in a tree structure in the interface 35. The nodes of the first level of the tree structure are classified based on the severity level, the nodes of the second level are classified based on the data application field, the nodes of the third level are classified based on the data type, the nodes of the fourth level are classified based on different file individuals, the nodes of the fifth level are classified based on different types of preset operations, and the method specifically can comprise creation/reception, downloading, outgoing and the like. The nodes of the sixth hierarchy are partitioned based on different operator individuals, and the seventh hierarchy is partitioned based on different equipment individuals. The tree structure can be displayed in a classified manner, so that a user can conveniently and intuitively view the global security situation. As shown in fig. 3e, in response to the selection of the level 3, the child node of the level 3 may be displayed, and the level 3 may be highlighted, for example, bolded, in response to the selection of the field 3, the child node of the field 3 may be displayed, and the border of the field 3 may be bolded, and so on, to form a transmission path of the level 3, the field 3, the type 2, the file 1, the operation 3, the operator 2.
In one embodiment of the disclosure, the second search result presentation page further supports search viewing of a time dimension for the global security posture, and the method may further include determining a selected target time range in response to a time range selection operation triggered on the second search result presentation page, the target time range being used for indicating viewing of a data security posture within a corresponding time range, and acquiring a propagation path maintained in the file security protection database in response to the global security posture request and presenting a global security posture map based on a preset data security hierarchy and a transmission path order summary on a second search result page, and may include acquiring a propagation path maintained in the file security protection database based on the target time range and presenting a global security posture map based on a preset data security hierarchy and a transmission path order summary on a second search result page in response to the global security posture request.
Specifically, in order to facilitate searching for file propagation paths of different time periods in the global file propagation path, a time period selection control may be set in the second search result presentation page so as to input a time range, and define a presentation range of the global file propagation path in time. On the basis of the embodiment shown in fig. 2, the second search result display page further comprises a second time period selection control, and step 203 may further comprise, in response to acting on the second time period selection control, acquiring a time range, acquiring a propagation path maintained in the file security protection database based on the target time range, and displaying a global security situation map based on preset data security hierarchy classification and transmission path sequence summary on the second search result page.
As shown in fig. 3e, the interface 35 also includes a time period selection control 308, which may include a specific date entry area and a most recent n-day selection area to facilitate the user entering a time range in a variety of forms. After determining the time range, the global situation map in the time range shown in the lower area may be displayed, that is, only the file propagation path satisfying the above time range is displayed. It is advantageous to generate different data sets based on different time dimensions.
In one embodiment of the disclosure, the displaying the propagation path of the target file content on the first search result presentation page may include displaying the propagation path of the target file content on the first search result presentation page based on full link information including a file drop record, a file operation record, and a file forwarding record.
The landing is the process of writing data into the disk through downloading/creating/receiving and other actions. File circulation is a full-link process of data dropping, operation and outgoing.
In order to fully understand the operation process of each target file content on a certain target device, a file circulation page can be provided for a user. Based on the embodiment shown in fig. 2, step 203 may further include displaying a file circulation page, where the file circulation page presents an operation record of a plurality of operation behaviors triggered by the corresponding target file content on the corresponding target device. The operational behavior may include at least one of downloading, creating, receiving, moving, renaming, copying, compressing, decompressing, and outgoing.
As shown in fig. 3f, the interface 36 displays the operation of the contents of the target file at different times. For example, assuming that time 1 to time 8 are sequential, i.e., time 1 is the earliest time, initially at time 1, a pdf file with a file name of 1 is downloaded from application 1, then at time 2, an xml file with a file name of 2 is created based on name 1, then at time 3, name 1 is moved from path 1 to path 2, name 1 is renamed to name 3 at time 4, the name 3 file is copied at time 5 to obtain the corresponding copy, name 3 is compressed at time 6, the compressed file is decompressed at time 7, and the decompressed name 4 file is exported at time 8. The method realizes full-link tracking of file landing, operation and outgoing, is beneficial to eliminating potential safety hazards and comprehensively improves data security.
In one embodiment of the present disclosure, considering that the operation record of a certain target file content on a certain target device is generally required to be known, the entry control of the file circulation page may be set in the log record presentation page corresponding to the certain device, and step 203 may further include displaying the log record presentation page, presenting the log record corresponding to the corresponding target device and the third entry control associated with the log record on the basis of the embodiment shown in fig. 2, and displaying the file circulation page in response to the touch operation applied to the third entry control. The file flow page presents operation records of a plurality of operation behaviors triggered by corresponding target file contents on corresponding target devices.
For example, a log record presentation page may present a plurality of log records related to a target device. The log record includes an entry control for the file transfer page, which entry control is used to enter the file transfer page, and the alert presentation page corresponds to the target device, so that the entry control of the alert presentation page may be associated with the target device, e.g., the entry control of the alert presentation page may be associated with device information 1 through device information 4 in interface 35 as shown in interfaces 34 and 3e of fig. 3d.
Corresponding to the data processing method of the above embodiment, fig. 4 is a block diagram of a data processing apparatus provided by an embodiment of the present disclosure. For ease of illustration, only portions relevant to embodiments of the present disclosure are shown. Referring to fig. 4, the apparatus includes a display module 401 and a search module 402.
The display module 401 is used for displaying a search page, wherein the search page supports a propagation path of the content of a search file;
The searching module 402 is configured to receive search information input through the search page, respond to a search request corresponding to the search information, and perform searching according to the search information in dependence on a file security protection database to match the content of a hit target file and obtain a propagation path of the content of the target file, where the file security protection database is configured to maintain a pre-specified propagation path related to at least one file that needs to be secured;
The display module 401 is further configured to display a propagation path of the target file content on the first search result presentation page, where the propagation path of the target file content is used to characterize a situation where the target file content is operated and/or transmitted.
In one embodiment of the disclosure, the search information comprises first search information, the search page comprises an input box, and the search module 402 is specifically configured to obtain the first search information in response to an input operation acting on the input box.
In one embodiment of the disclosure, the search page supports two types of searches, namely file integral search and file key information search, wherein the search page supports file integral search and comprises the step of inputting a target file as search information in a dragging or file uploading mode, and the search page supports file key information search and comprises the step of inputting file key information as search information.
In one embodiment of the disclosure, the search page further supports selecting a search range, the search module 402 is further configured to determine a target search range corresponding to the search request, and when the search module 402 searches according to the search information and depending on the file security database to match the hit target file content and obtain the propagation path of the target file content in response to the search request corresponding to the search information, the search module is specifically configured to search according to the search information and the target search range depending on the file security database to match the hit target file content and obtain the propagation path of the target file content in response to the search request corresponding to the search information.
In one embodiment of the present disclosure, the search result presentation page also supports search viewing for at least one attribute dimension for the search results, the at least one attribute dimension including one or more of time, text keywords, and file transmission path detail pages.
In one embodiment of the disclosure, the search page further supports a global security posture for viewing propagation paths of all files maintained in the file security database, and the search module 402 is further configured to receive a global security posture viewing request triggered on the search page, where the global security posture request is used to request to view global security posture of propagation paths of all files maintained in the file security database, obtain the propagation paths maintained in the file security database in response to the global security posture request, and display a global security posture graph based on a preset data security hierarchy and a transmission path sequence summary on a second search result page.
In one embodiment of the present disclosure, the second search result presentation page further supports search viewing of a time dimension for the global security posture, and the display module 401 is further configured to determine, in response to a time range selection operation triggered on the second search result presentation page, a selected target time range, where the target time range is used to indicate viewing of a data security posture within a corresponding time range, and the search module 402 is configured to, when in response to the global security posture request, obtain a propagation path maintained in the file security protection database and present, on the second search result page, a global security posture map based on a preset data security hierarchy and a transmission path order summary, and specifically, in response to the global security posture request, obtain, based on the target time range, a propagation path maintained in the file security protection database and present, on the second search result page, a global security posture map based on the preset data security hierarchy and the transmission path order summary.
In one embodiment of the disclosure, the second search result presentation page further supports hierarchical viewing of information in the global security posture graph, and in response to the selected viewed target content, path information directly associated with the target content is highlighted in accordance with a transmission path of the target content.
In one embodiment of the present disclosure, the display module 401 is specifically configured to display, on the first search result presentation page, a propagation path of the target file content based on full link information including a file drop record, a file operation record, and a file forwarding record when displaying the propagation path of the target file content on the first search result presentation page.
The device provided in this embodiment may be used to execute the technical solution of the foregoing method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
In order to achieve the above embodiments, the embodiments of the present disclosure further provide an electronic device.
Referring to fig. 5, a schematic diagram of a structure of an electronic device 900 suitable for use in implementing embodiments of the present disclosure is shown, where the electronic device 900 may be a terminal device or a server. The terminal device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA) or the like, a tablet computer (Portable Android Device) or the like, a Portable Multimedia Player (PMP) or the like, a car-mounted terminal (e.g., car navigation terminal) or the like, and a fixed terminal such as a digital TV or a desktop computer or the like. The electronic device shown in fig. 5 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 5, the electronic device 900 may include a processing means (e.g., a central processor, a graphics processor, etc.) 901, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage means 908 into a random access Memory (Random Access Memory RAM) 903. In the RAM 903, various programs and data necessary for the operation of the electronic device 900 are also stored. The processing device 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to the bus 904.
In general, devices may be connected to the I/O interface 905 including input devices 906 such as a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc., output devices 907 including a Liquid crystal display (LCD for short) CRYSTAL DISPLAY, speaker, vibrator, etc., storage devices 908 including magnetic tape, hard disk, etc., for example, and communication devices 909. The communication means 909 may allow the electronic device 900 to communicate wirelessly or by wire with other devices to exchange data. While fig. 5 shows an electronic device 900 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication device 909, or installed from the storage device 908, or installed from the ROM 902. When executed by the processing device 901, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of a computer-readable storage medium may include, but are not limited to, an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to electrical wiring, fiber optic cable, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be included in the electronic device or may exist alone without being incorporated into the electronic device.
The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods shown in the above-described embodiments.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (Local Area Network, LAN for short) or a wide area network (Wide Area Network, WAN for short), or may be connected to an external computer (e.g., through the internet using an internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The name of the unit does not in any way constitute a limitation of the unit itself, for example the first acquisition unit may also be described as "unit acquiring at least two internet protocol addresses".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic that may be used include Field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems-on-a-chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this disclosure is not limited to the specific combinations of features described above, but also covers other embodiments which may be formed by any combination of features described above or equivalents thereof without departing from the spirit of the disclosure. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the present disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.

Claims (11)

1. A method of data processing, comprising:
displaying a search page, wherein the search page supports a propagation path of search file contents;
receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to the search information depending on a file security protection database to match the content of a hit target file, and acquiring a propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured;
Displaying a propagation path of the target file content on a first search result display page, wherein the propagation path of the target file content is used for representing the condition that the target file content is operated and/or transmitted;
The search page also supports viewing global security situations of propagation paths of all files maintained in the file security protection database, and the method further comprises:
receiving a global security situation viewing request triggered on the search page, wherein the global security situation viewing request is used for requesting to view global security situations of propagation paths of all files maintained in the file security protection database;
And responding to the global security situation request, acquiring a propagation path maintained in the file security protection database, and displaying a global security situation map based on preset data security hierarchy classification and transmission path sequence summarization on a second search result page.
2. The method of claim 1, wherein the search page supports two types of searches including a file global search and a file key information search;
The searching page supports the input of a target file as searching information in a dragging or file uploading mode;
the searching page supports file key information searching and comprises the step of enabling the file key information to be input as searching information.
3. The method of claim 1, wherein the search page further supports selecting a search scope, and wherein the method further comprises:
determining a target search range corresponding to the search request;
Searching according to the search information depending on the file security protection database to match the hit target file content and acquiring the propagation path of the target file content, wherein the searching comprises the following steps of:
Responding to a search request corresponding to the search information, searching according to the search information and the target search range depending on a file security protection database to match the hit target file content, and acquiring a propagation path of the target file content.
4. The method of claim 1, wherein the search result presentation page further supports a search view for at least one attribute dimension for search results, the at least one attribute dimension comprising one or more of a time, a text keyword, and a file transfer path detail page.
5. The method of claim 1, wherein the second search results page further supports a search review in a time dimension for the global security posture, and wherein the method further comprises:
determining a selected target time range in response to a time range selection operation triggered on the second search result page, the target time range being used for indicating to view data security situations in the corresponding time range;
The step of responding to the global security situation request, obtaining the propagation path maintained in the file security protection database and displaying the global security situation map based on the preset data security level grading and the transmission path sequence summarization on a second search result page, wherein the step of obtaining the global security situation map comprises the following steps:
And responding to the global security situation request, acquiring a propagation path maintained in the file security protection database based on the target time range, and displaying a global security situation map based on preset data security hierarchy classification and transmission path sequence summarization on a second search result page.
6. The method of claim 1, wherein the second search results page further supports hierarchical viewing of information in the global security posture graph, and wherein path information directly associated with the target content is highlighted in accordance with a transmission path of the target content in response to the target content being selected for viewing.
7. The method of claim 1, wherein displaying the propagation path of the target file content on the first search result presentation page comprises:
and displaying the propagation path of the target file content on the first search result display page based on the full-link information comprising the file drop record, the file operation record and the file forwarding record.
8. A data processing apparatus, comprising:
the display module is used for displaying a search page, wherein the search page supports a propagation path of the content of the search file;
The searching module is used for receiving search information input through the search page, responding to a search request corresponding to the search information, searching according to the search information depending on a file security protection database to match the content of a hit target file and acquiring a propagation path of the content of the target file, wherein the file security protection database is used for maintaining a pre-designated propagation path related to at least one file needing to be secured;
the display module is further used for displaying a propagation path of the target file content on a first search result display page, wherein the propagation path of the target file content is used for representing the condition that the target file content is operated and/or transmitted;
The search page also supports viewing global security situations of propagation paths of all files maintained in the file security protection database;
The searching module is further used for receiving a global security situation checking request triggered on the searching page, wherein the global security situation checking request is used for requesting to check global security situations of propagation paths of all files maintained in the file security protection database, responding to the global security situation checking request, acquiring the propagation paths maintained in the file security protection database and displaying a global security situation map based on preset data security hierarchy classification and transmission path sequence summarization on a second searching result page.
9. An electronic device is characterized by comprising a processor and a memory;
the memory stores computer-executable instructions;
The processor executing computer-executable instructions stored in the memory, causing the processor to perform the data processing method of any one of claims 1 to 7.
10. A computer-readable storage medium, in which computer-executable instructions are stored which, when executed by a processor, implement the data processing method according to any one of claims 1 to 7.
11. A computer program product comprising a computer program which, when executed by a processor, implements a method of data processing according to any one of claims 1 to 7.
CN202311866477.3A 2023-12-29 2023-12-29 Data processing method, apparatus, storage medium, and program product Active CN117828678B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311866477.3A CN117828678B (en) 2023-12-29 2023-12-29 Data processing method, apparatus, storage medium, and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311866477.3A CN117828678B (en) 2023-12-29 2023-12-29 Data processing method, apparatus, storage medium, and program product

Publications (2)

Publication Number Publication Date
CN117828678A CN117828678A (en) 2024-04-05
CN117828678B true CN117828678B (en) 2025-01-17

Family

ID=90503859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311866477.3A Active CN117828678B (en) 2023-12-29 2023-12-29 Data processing method, apparatus, storage medium, and program product

Country Status (1)

Country Link
CN (1) CN117828678B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118708618A (en) * 2024-06-07 2024-09-27 北京火山引擎科技有限公司 Protected data search and processing method, system, device, medium and product

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008052570A (en) * 2006-08-25 2008-03-06 Hitachi Software Eng Co Ltd System for managing operation history

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4528203B2 (en) * 2005-05-30 2010-08-18 日本電信電話株式会社 File search method, file search device, and file search program
TW200849044A (en) * 2007-06-15 2008-12-16 Tsu-Shun Lin Database files-management system, integration module and browsing interface of database files-management system, database files-management method
WO2019061040A1 (en) * 2017-09-26 2019-04-04 华为技术有限公司 File management method and device
CN113434464A (en) * 2021-06-24 2021-09-24 江苏创源电子有限公司 Distributed log processing system and method
CN115238156A (en) * 2022-06-20 2022-10-25 北京字跳网络技术有限公司 Search page display method, device, equipment, medium and product

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008052570A (en) * 2006-08-25 2008-03-06 Hitachi Software Eng Co Ltd System for managing operation history

Also Published As

Publication number Publication date
CN117828678A (en) 2024-04-05

Similar Documents

Publication Publication Date Title
US20210350070A1 (en) Distributed Document Co-Authoring and Processing
EP3296862B1 (en) Version control machine
US8572202B2 (en) Persistent saving portal
US7707198B2 (en) Harvesting of media objects from searched sites without a user having to enter the sites
US8667394B1 (en) System for generating an intelligent cross-platform document
US20120192064A1 (en) Distributed document processing and management
CN112528595B (en) Document processing method and device and electronic equipment
Bumgarner Implementing Splunk-Big Data Reporting and Development for Operational Intelligence
US20140164893A1 (en) Assisted portal navigation and crowd-based feedback
US20220261437A1 (en) Data indexing for search tool
WO2022111591A1 (en) Page generation method and apparatus, storage medium, and electronic device
CN115344688B (en) Business data display method and device, electronic equipment and computer readable medium
CN117828678B (en) Data processing method, apparatus, storage medium, and program product
CN115757400A (en) Data table processing method and device, electronic equipment and computer readable medium
US11080284B2 (en) Hybrid search connector
US20130227422A1 (en) Enterprise portal smart worklist
US10185747B2 (en) Presenting publisher data sets in context
CN115061601B (en) Electronic document processing method, device, terminal and storage medium
CN116974577A (en) Data processing method and device and electronic equipment
WO2022151835A1 (en) Sample message processing method and apparatus
CN115422131B (en) Business review knowledge base retrieval method, device, equipment and computer-readable medium
US20240095633A1 (en) Method for determining a project flow, electronic device, and storage medium
US20240402897A1 (en) Method, apparatus, electronic device and storage medium for displaying information
CN114997118B (en) Document processing method, device, equipment and medium
CN117435808A (en) Material display method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant