Management of data of user groups and maintenance of communication thereof

ABSTRACT

Methods and devices for management of group user data and/or maintenance of instant messaging groups. The methods may include receiving, by a computing device, a request for searching data of a first group user. For example, the request is initialized by a second group user via an instant messaging application. The computing device may determine a data search permission of the second group user on the data of the first group user, select a data item of the first group user in accordance with the data search permission, and return the data item to the second group user. Using techniques described herein, the implementations may enable users to view group contacts and perform access control to improve security of the group data and to avoid leakage of communication information of group users.

CROSS REFERENCE TO RELATED PATENT APPLICATIONS

This application claims priority to Chinese Patent Application No.201510369383.4, filed on Jun. 26, 2015, entitled “Methods andApparatuses for Management of Group User Information and Maintenance ofInstant Messaging Group,” which is hereby incorporated by reference inits entirety.

TECHNICAL FIELD

The present disclosure relates to the field of communication technology,and more particularly to methods and devices for management of groupuser data and/or maintenance of instant messaging groups.

BACKGROUND

An enterprise often has a large number of employees located in differentbusiness departments and performing different tasks. When there are alarge number of employees and the organizational structure of theenterprise is complex, it is difficult for an individual employee toknow other employees. For example, if an employee needs to contactco-workers with whom the employee is unfamiliar, the employee may viewgroup contacts of the enterprise to obtain contact information of theco-workers and to contact these co-workers.

SUMMARY

Implementations herein related to methods and devices for management ofgroup user data and/or maintenance of instant messaging groups. Theimplementations may enable users to view group contacts of an enterpriseand control access to improve security of group data of the enterpriseand to avoid leakage of communication information of group users of theenterprise. This Summary is not intended to identify all key features oressential features of the claimed subject matter, nor is it intended tobe used alone as an aid in determining the scope of the claimed subjectmatter.

To achieve the above object, the implementations provide the followingtechnical schemes.

According to an aspect of the present disclosure, the implementationsprovide a method for management of group user data. The method mayinclude receiving, by a computing device, a request for searching dataof a first group user. For example, the request may be initialized by asecond group user via an instant messaging application. The computingdevice may determine a data search permission of the second group useron the data of the first group user, select a data item of the firstgroup user in accordance with the data search permission, and return thedata item to the second group user.

According to another aspect of the present disclosure, theimplementations provide a device for management of group user data. Thedevice may include a first receiving module configured to receive arequest for searching data of a first group user. The request may beinitialized by a second group user via an instant messaging application.The device may further include a determining module configured todetermine a data search permission of the second group user on the dataof the first group user, and a selecting module configured to select adata item of the first group user in accordance with the data searchpermission and to return the data item to the second group user.

According to another aspect of the present disclosure, theimplementations provides a method for maintenance of an instantmessaging group. The method may include receiving, by a computingdevice, an editing command for group contacts. For example, the editingcommand may be initialized by an administrative user of a group via agroup contact page of an instant messaging application. When the editingcommand is applied to updating of a community organization, thecomputing device may update the instant messaging group associated withthe community organization based on updated status of the communityorganization.

According to another aspect of the present disclosure, theimplementations provides a device for maintenance of an instantmessaging group. The device may include a command receiving moduleconfigured to receive an editing command for group contacts. Forexample, the editing command may be initialized by an administrativeuser of a group via a group contact page of an instant messagingapplication. The device may further include an updating moduleconfigured to update the instant messaging group associated with thecommunity organization based on updated status of the communityorganization when the editing command is applied to updating of acommunity organization.

As seen in above technical solutions, the present disclosureincorporates group contacts into mobile devices to achieve a moreefficient management of the group contacts in a mobile environment ascompared to conventional techniques. Meanwhile, by determination of datasearch permission, appropriate permissions may be obtained forindividual group users to avoid disclosure and unlimited searches ofgroup data. This helps to improve information security of the community.

BRIEF DESCRIPTION OF THE DRAWINGS

The Detailed Description is described with reference to the accompanyingfigures. The use of the same reference numbers in different figuresindicates similar or identical items.

FIG. 1 is a schematic flow diagram illustrating a method for managementof data of an enterprise in accordance with the implementations of thepresent disclosure.

FIG. 2 is a schematic view of a computing environment in accordance withthe implementations of the present disclosure.

FIG. 3 is another schematic flow diagram illustrating a method formanagement of data of another enterprise in accordance with theimplementations of the present disclosure.

FIGS. 4 and 5 are diagrams illustrating user interfaces for managementof data of an enterprise in accordance with the implementations of thepresent disclosure.

FIG. 6 is a diagram illustrating information synchronization betweencontacts of an enterprise and instant message groups in accordance withthe implementations of the present disclosure.

FIG. 7 is a schematic flow diagram illustrating a method for maintenanceof instant messaging groups in accordance with the implementations ofthe present disclosure.

FIG. 8 is a schematic view of a computing device in accordance with theimplementations of the present disclosure.

FIG. 9 is a block diagram illustrating a device for management of dataof an enterprise in accordance with the implementations of the presentdisclosure.

FIG. 10 is another schematic view of another computing device inaccordance with the implementations of the present disclosure.

FIG. 11 is a block diagram illustrating a device for maintenance ofinstant messaging groups in accordance with the implementations of thepresent disclosure.

DETAILED DESCRIPTION

FIG. 1 is a schematic flow diagram illustrating a method 100 formanagement of data of an enterprise in accordance with theimplementations of the present disclosure. As shown in FIG. 1, themethod 100 is implemented by a computing device (e.g., a server). Themethod 100 may include the following operations.

At 102, the server may receive a request for searching data of a firstgroup user of an enterprise. The request may be initiated by a secondgroup user of the enterprise via a group contact page of the instantmessaging application. In other implementations, the second group usermay use other methods for searching data of the first group user. Forexample, using a global search function, the second group user mayinitialize the search request by inputting information such as a fuzzyname, a mailbox, an employee number etc.

In implementations, the instant messaging application may be anyapplication that enables instant messaging such as Enterprise InstantMessaging (EIM), for example, DingTalk. In these instances, as theInternet continues to develop, instant messaging applications havebecome a communication tool that people widely used and beenincreasingly used in mobile devices. Accordingly, combination of instantmessaging applications and group contacts of an enterprise can savecorresponding equipment costs, maintenance costs and time costs ascompared to management of group contacts by specialized personnel anddevices. This further helps the enterprise to develop mobile enterprisemanagement.

At 104, the server may determine a data search permission of the secondgroup user on the data of the first group user.

At 106, the server may select a data item of the first group user inaccordance with the data search permission and return the data item tothe second group user.

In implementations, the server may configure a data search permission ofa group user and select a data item corresponding to the data searchpermission for the group user. This may avoid disclosure and unlimitedsearches of group data and help to improve information security of theenterprise.

It should be noted that, in the implementations of the presentdisclosure, “group users of an enterprise” and “group contacts of anenterprise” are only used as examples for descriptions. Theimplementations of the present disclosure may apply to other enterprisesand organizations to obtain corresponding group users and groupcontacts. This present disclosure is not limited by these descriptions.

FIG. 2 is a schematic view of a computing environment 200 in accordancewith the implementations of the present disclosure. As illustrated inFIG. 2, a group user may log in an account on a mobile device andexchange data with a server. The group user may search group contacts ofan enterprise related to the group user (e.g., an employee of theenterprise).

In implementations, the group contacts may be presented in a form ofmobile contacts. For example, the group contacts may be displayed in analphabetical order by their names. All employees may be ordered and thenthe group user may select an employee that the group user desires toview. Detailed information of the selected employee may be presentedfurther. Alternatively, as illustrated in FIG. 2, according to anorganizational structure of the enterprise, the server may form acorresponding contact entry in the group contacts. For example, in FIG.2, “Alibaba” corresponds to all employees of Alibaba. “Alibaba—comeforth division” corresponds to employees of the come forth division ofAlibaba. In general, the division refers to a department to which thecurrent group user belongs. This facilitates the group user to perform asearch operation. In some implementations, the group contacts may alsoapply to group contacts of an enterprise or a division as well as toother organizations similar to an enterprise such as “long-distancerunning squad” shown in FIG. 2. In implementations, group contacts aredifferent from general mobile contacts. User terminals typically do notsave or persist data of the group contacts, but perform real-timequeries to the server. In implementations, the cache may be cleared tosecure user data of the enterprise when the group user exits the currentterminal.

In accordance with the scenario shown in FIG. 2, FIG. 3 is a schematicflow diagram illustrating a method 300 for management of data of anotherenterprise in accordance with the implementations of the presentdisclosure. As illustrated in FIG. 3, the method 300 may include thefollowing operations.

At 302, a server may receive a request for searching data of a firstgroup user of an enterprise from any group user of the enterprise.

In implementations, for purposes of illustration, the server may receivea request for searching data of group user A of an enterprise from groupuser B of the enterprise. The request may be initiated by the group userB via a group contact page of the instant messaging application. Inimplementations, “Group contact page” refers to all pages related togroup contacts of the enterprise such as details contact information ofa group user of the enterprise, while not limited by the informationillustrated in FIG. 2.

In implementations, to improve security of the group contacts, theimplementations provide, on the basis of the mobile contact management,two options of management modes: a number hidden mode and an executivemode. In some implementations, a group user may edit data of the groupuser in the group contacts using mobile devices.

FIGS. 4 and 5 are diagrams illustrating user interfaces 400 and 500 formanagement of data of an enterprise in accordance with theimplementations of the present disclosure.

As illustrated in FIG. 4, when a group user “little white” edits data,the group user may choose whether to enable a privacy mode and to enablea type of the privacy mode: a numbers hidden mode or an executive mode.Alternatively, in other implementations, via assignment of permissions,the server may assign a data search permission to the group user toenable the group user to have privileges of an “administrator”. Forexample, the group user may edit data of other group users via theinterfaces illustrated in FIG. 4 and choose whether to enable a privacymode: a numbers hidden mode or an executive mode. In these instances,ordinary employees may not edit their data without limitations. Thishelps data management and maintenance of the group contacts of theenterprise.

The following are described in detail. After the operation 302, theserver may determine a corresponding initialized mode of the group userA. If the number hidden mode is initialized, the server may performoperation 304. If the executive mode is initialized, the server mayperform operation 310.

1. Number Hidden Mode

At 304, the server may separately determine a department that the groupuser A and the group user B belong to under an organizational structureof the enterprise respectively.

At 306, the server may determine whether the group user A and the groupuser B belong to the same department. If the group user A and the groupuser B belong to the same department, the server may determine that thegroup user B has a permission for searching complete data of the groupuser A. If the group user A and the group B do not belong to the samedepartment, the server may perform operation 308.

In these instances, the server may allow permissions for complete datasearch within these group users to facilitate regular communicationsbetween these group users and to help to improve communicationefficiency because these group users may communicate for cooperationamong group users of the same department.

Based on the organizational structure of the enterprise, the server maydetermine a defining unit for a department of the enterprise. Forexample, the server may define “project department” as a unit. In thisinstance, group users working on the same project belong to the samedepartment, while group users working on different projects belong todifferent departments. Alternatively, the server may define a “projectgroup” as a unit. In this instance, when the project includes multipleproject groups, group users of the same project group belong to the samedepartment, while group users working on the same project but differentproject groups belong to different departments.

Group users in different departments may not have much common ground inwork and therefore may not be familiar with each other. In theseinstances, the server may impose certain restrictions among these groupusers to control access to their data to avoid leakage of information orharassment.

At 308, the server may separately obtain a level of a managementposition of the group user A and the group user B. If a level of amanagement position of the group user B is a first predetermined level,or the level of the management position of the group user B is higherthan a level of a management position of the group user A, the servermay determine that the group user B has a permission for searchingcomplete data of the group user A. Otherwise, the server may determinethat the data search permission of the group user B on the data of thegroup user A is irrelevant to an default data item.

In implementations, based on the organizational structure of theenterprise, there is a level of a management position corresponding to agroup user in the organizational structure of the enterprise such as M1level for general employees, M2 level for department managers, M3 levelfor department supervisors etc. If the group user A and the group user Bbelong to the same department, the server may assign a data searchpermission to group users with high levels to facilitate communicationsbetween enterprise leaders and employees.

“High level” can be defined using an absolute way. For example, if alevel of a management position of a group user is a predetermined levelsuch as M6 level, the server may determine the group user to be a highlevel employee. Alternatively, “high level” can be defined using arelative way. For example, the group user B's level is M5 level, whilethe group user A's level is M2 level. Since M5 level is 3 levels higherthan the M2 level and the discrepancy (i.e., 3 levels) is greater than apredetermined value (e.g., a random integer), the server may determinethat the group user B is the high level employee as compared with thegroup user A.

In implementations, in accordance with the “number hidden mode”illustrated in FIG. 4, the data search permission may be described asfollow. The group user B has no data search permission on “contactinformation (e.g., mobile phone numbers)” of the group user A to avoidleakage of the contact information of the group user A or harassment onthe group user A by the group user B. As illustrated in FIG. 5, supposethat the group user A is “little white.” When the group user B searchthe contract information of the group user A in the group contacts ofthe enterprise, the “contact information” may be displayed as “hidden,”false information or other information. The real contact information ofthe group user A will not be displayed.

In implementations, in addition to selectively hiding the contactinformation of the group user A, the server may impose defaultpermissions on other default data items. For example, the server may set“position hidden mode.” When the “post hidden mode” is turned on and thegroup user B does not satisfy a certain condition, the group user B doesnot have the data search permission on the “position” of the group userA in the enterprise. For example, as illustrated in FIG. 5, informationof a group user is presented in a user interface and “product manager”may not be displayed in the column of the “position.”

It should be noted that: 1) operation 308 is not necessary. Whenoperation 308 is not included, the server may determine that the datasearch permission of the group user B on the data of the group user A isirrelevant to the default data item if the operation 306 determines thatthe group user A and the group user B belong to different departments.In these instances, the server may allow permissions for a portion ofdata search of data of the group user A. 2). As illustrated in FIG. 5,while the group user B may not, in the user interface, view the contactinformation of the group user A, the group user B may still communicatewith the group user A.

The group user B may click “Call” or “Ding Click,” as illustrated inFIG. 5, to make a request to the server for communicating with the groupuser A using a mobile device. When the server receives the request, theserver may separately obtain the contact information of the group user Aand the group user B. The server may then establish a communicationchannel between the group user A and the group user B. In theseinstances, through an intermediary role of the server, while the groupuser B does not have the permission to view the contact information ofthe group user A, the group user B can communicate with the group userA. This ensures necessary corporation while avoiding leakage of thecontact information of the group user A to the group user B. In someimplementations, the communication method between the group user A andthe group user B may be determined by a trigger key initialized by thegroup user B. The present disclosure does not limit types ofcommunication methods.

2. Executive Mode

At 310, the server may separately obtain a level of a managementposition of the group user A and the group user B.

At 312, when the level of the management position of the group user B islower than the level of the management position of the group user A, anda discrepancy of levels between the first group user and the secondgroup user is greater than a predetermined value, the server maydetermine that the data search permission of the group user B on thedata of the group user A is irrelevant to a default data item.

In implementations, high level group users (e.g., leaders of theenterprise) are often busy, and do not want to be disturbed randomly.Therefore, enabling executive mode avoids disclosure and/or leakage ofcontact information of the high level group users to other group users.

For example, suppose that the group user B is an employee with level M1and the group user A is a manager with level M3. Further suppose thatthe predetermined number is 1, and M3 level is 2 levels higher than theM1 level. When the group user B searches the contract information of thegroup user A in the group contacts of the enterprise, as illustrated inFIG. 5, the group user B may not view the contract information of thegroup user A.

In instances, the group user B clicks “Call” or “Ding Click,” asillustrated in FIG. 5, to send the server a communication request. Theserver determines that the data search permission of the group user B onthe data of the group user A is irrelevant to the default data item andtherefore ignore or decline the communication request to completelyavoid interference from low levels group users and to avoid leakage ofthe contact information of high level group users.

In addition, similar to “Number hidden mode,” the server may setpermission configuration to hide other information in addition to thecontact information in the “executive model” to make the information notavailable to low level group users.

FIG. 6 is a diagram 600 illustrating information synchronization betweencontacts of an enterprise and instant message groups in accordance withthe implementations of the present disclosure. As illustrated in FIG. 6,in implementations, the synchronization combines instant messagingapplication and group contacts of an enterprise. The instant messagingapplication has an original function of instant messaging, and there arecorresponding instant messaging groups. These message groups may beformed based on the enterprise organizational structure (e.g., aninstant messaging group for an individual department of the enterprise)or by group users from different departments for other reasons.

FIG. 7 is a schematic flow diagram 700 illustrating a method formaintenance of instant messaging groups in accordance with theimplementations of the present disclosure. The method is implemented bya computing device (e.g., a server). The method may include thefollowing operations.

At 702, the server may receive an editing command for group contacts,which may be initialized by an administrative user of a group via agroup contact page of an instant messaging application.

At 704, the server may update the instant messaging group associatedwith a community organization based on updating status of the communityorganization when the editing command is applied to updating of thecommunity organization.

In these instances, the server may receive the editing command for thegroup contacts, and the editing command may be initialized by anadministrative user of the group via the group contact page of theinstant messaging application. Accordingly, when the editing command isapplied to updating of the community organization, based on updatedstatus of the community organization, the server may update the instantmessaging group associated with the community organization. Objects ofthe editing command may be a group user or a department of theenterprise. Editing methods may include adding, deleting or changingetc.

In these instances, a group user may be recorded in the group contactsof the enterprise and in one or more instant messaging groups. The groupuser may edit data of the group user in the group contacts. In otherwords, the instant message group may be updated automatically. Forexample, when an administrative user of the enterprise deletes a groupuser from the group contacts, the server may delete the group user fromall instant messaging groups of the enterprise. When the administrativeuser of the enterprise changes a department of a group user from 1 to 2in the group contacts, the server may change an instant messaging groupcorresponding the department 1 to another instant messaging groupcorresponding to the department 2. When the administrative user of theenterprise adds a group user in the group contacts, the server may,based on information of the department that the group user belongs toand according to the organizational structure of the enterprise, add thegroup user automatically to at least one corresponding instant messaginggroup.

Accordingly, the present disclosure breaks a barrier between groupcontacts and instant messaging groups and achieves data consistencybetween the group contacts and the instant messaging groups. Thisfurther avoids repeated operations on the group contacts and the instantmessaging groups (e.g., deletion in both the group contacts and theinstant messaging groups for an employee who departed from theenterprise). This also avoids safety risk due to leaking operations(e.g., an employee who departed from the enterprise). For example, suchemployee has departed the enterprise and therefore is deleted from thegroup contacts of the enterprise. However, the employee may not bedeleted from an instant messaging group such that information of theinstant messaging group may be at risk.

In implementations, an “administrative user of enterprise” refers to agroup user who has administrative privileges to manage the groupcontacts of the enterprise and functions as an “administrator.” Thegroup user may become an “administrative user” of the enterprise basedon information of the department that the group user belongs toaccording to the organizational structure of the enterprise or based onpermissions assigned by high level group users.

In implementations, when receiving an editing command for groupcontacts, the server may determine a level of an editing objectcorresponding to the editing command in the community organization. Whena level of a management permission is not lower than the level of theediting object, the server may execute the editing command; otherwise,the server may ignore or decline the editing command. In theseinstances, by comparison and judgment of managing privilege levels, theserver may enable the administrative user to manage the group contactsof the enterprise within the scope of the assigned permissions andenable group users with high level managing positions to manage theirinformation of the group contact of the enterprise. This further ensuresinformation security of the high level group users.

FIG. 8 is a schematic view of a computing device in accordance with theimplementations of the present disclosure. On the hardware level, FIG. 8is a diagram of a computing device 800. The computing device 800 may bea user device or a server for management of group user data. In anexemplary configuration, the computing device 800 includes one or moreprocessors 802, input/output interfaces 804, network interface 806, andmemory 808.

The memory 808 may include computer-readable media in the form ofvolatile memory, such as random-access memory (RAM) and/or non-volatilememory, such as read only memory (ROM) or flash RAM. The memory 808 isan example of computer-readable media.

Computer-readable media includes volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information such as computer readable instructions, datastructures, program modules, or other data. Examples of computer storagemedia include, but are not limited to, phase change memory (PRAM),static random-access memory (SRAM), dynamic random-access memory (DRAM),other types of random-access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM), flashmemory or other memory technology, compact disk read-only memory(CD-ROM), digital versatile disks (DVD) or other optical storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other non-transmission medium that maybe used to store information for access by a computing device. Asdefined herein, computer-readable media does not include transitorymedia such as modulated data signals and carrier waves.

Turning to the memory 808 in more detail, the memory 808 may include amanaging device for management of group user data 810, which is furtherdescribed in FIG. 9. FIG. 9 is a block diagram illustrating a device 900for management of data of an enterprise in accordance with theimplementations of the present disclosure.

As illustrated in FIG. 9, the managing device 900 may include anestablishing module 902, an acquiring module 904, a second receivingmodule 906, a first receiving module 908, a determining module 910, aselecting module 912, a request processing module 914, and a thirdreceiving module 916.

The first receiving module 902 may be configured to receive a requestfor searching data of a first group user. For example, the request maybe initialized by a second group user via an instant messagingapplication.

The determining module 910 may be configured to determine a data searchpermission of the second group user on the data of the first group user.

The selecting module 912 may be configured to select a data item of thefirst group user in accordance with the data search permission andreturn the data item to the second group user.

In implementations, the determining module 910 is configured to furtherseparately obtain a group department that the first group user and thesecond group user belong to under an organizational structure when ahidden model of a default data item for the first group user hasstarted. When the group department that the first group user belongs toand the group department that the second group user belongs to aredifferent group departments, the determining module 910 may furtherdetermine that the data search permission of the second group user onthe data of the first group user is irrelevant to the default data item.

In implementations, the determining module 910 is further configured todetermine that the second group user has a permission for searchingcomplete data of the first group user when the group department that thefirst group user belongs to and the group department that the secondgroup user belongs to are different group departments and if a level ofa management position of the second group user is a first predeterminedlevel or the level of the management position of the second group useris higher than a level of a management position of the first group user.

In implementations, the second receiving module 906 may be configured toreceive a request for communicating with the first group user. Therequest may be initiated by the second group user via a group contactpage of the instant messaging application. The data search permission ofthe second group user on the data of the first group user is irrelevantto the default data item, and the group contact page does not showcontact information of the first group user.

The acquiring module 904 may be configured to separately obtain contactinformation of the first group user and the second group user.

The establishing module 902 may be configured to establish acommunication connection between the first group user and the secondgroup user based on the contact information.

In implementations, the determining module 910 is configured to furtherseparately obtain a level of a management position of the first groupuser and the second group user under an organizational structure of theenterprise when an executive protection model for the first group userhas started. When the level of the management position of the secondgroup user is lower than the level of the management position of thefirst group user, and a discrepancy of the level of management positionbetween the first group user and the second group user is greater than apredetermined value, the determining module 910 may determine that thedata search permission of the second group user on the data of the firstgroup user is irrelevant to the default data item.

In implementations, the third receiving module 916 may be configured toreceive a request for communicating with the first group user. Therequest may be initiated by the second group user via a group contactpage of the instant messaging application.

The request processing module 914 may be configured to ignore or declinethe communication request when the data search permission of the secondgroup user on the data of the first group user is irrelevant to thedefault data item.

In implementations, the default data item may include contactinformation.

In implementations, the instant messaging application is a group instantmessaging application.

FIG. 10 is a schematic view of another computing device in accordancewith the implementations of the present disclosure. On the hardwarelevel, FIG. 10 is a diagram of a computing device 1000. The computingdevice 1000 may be a user device or a server for maintenance of instantmessaging groups. In one exemplary configuration, the computing device1000 includes one or more processors 1002, input/output interfaces 1004,network interface 1006, and memory 1008.

The memory 1008 may include computer-readable media in the form ofvolatile memory, such as random-access memory (RAM) and/or non-volatilememory, such as read only memory (ROM) or flash RAM. The memory 1008 isan example of computer-readable media.

Computer-readable media includes volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information such as computer readable instructions, datastructures, program modules, or other data. Examples of computer storagemedia include, but are not limited to, phase change memory (PRAM),static random-access memory (SRAM), dynamic random-access memory (DRAM),other types of random-access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM), flashmemory or other memory technology, compact disk read-only memory(CD-ROM), digital versatile disks (DVD) or other optical storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other non-transmission medium that maybe used to store information for access by a computing device. Asdefined herein, computer-readable media does not include transitorymedia such as modulated data signals and carrier waves.

Turning to the memory 1008 in more detail, the memory 1008 may include amaintenance device for maintenance of instant messaging groups, which isfurther described in FIG. 11. FIG. 11 is a block diagram illustrating adevice 1100 for maintenance of instant messaging groups in accordancewith the implementations of the present disclosure.

As illustrated in FIG. 11, the maintenance device 1100 may include acommand receiving module 1102, an updating module 1104, a leveldetermining module 1106, and a command processing module 1108.

The command receiving module 1102 may be configured to receive anediting command for group contacts, which may be initialized by anadministrative user of a group via a group contact page of an instantmessaging application.

The updating module 1104 may be configured to update the instantmessaging group associated with the community organization when theediting command is applied to updating of a community organization basedon updated status of the community organization.

In implementations, the level determining module 1106 may be configuredto determine a level of an editing object corresponding to the editingcommand in the community organization.

The command processing module 1108 may be configured to execute theediting command when a level of a management permission is not lowerthan the level of the editing object. The command processing module 1108may ignore or decline the editing command when a level of a managementpermission is lower than the level of the editing object.

Moreover, the term “comprising”, “including” or any other variationthereof are intended to cover a non-exclusive inclusion such that aseries of factors including the process, method, article or deviceinclude not only those elements, but may include other elements notexpressly listed or for inherent features. In the absence of additionalrestrictions, the statement “including a” defining element does notexclude the existence of additional identical elements in elements,methods, articles, or apparatuses.

The embodiments are merely for illustrating the present disclosure andare not intended to limit the scope of the present disclosure. It shouldbe understood for persons in the technical field that certainmodifications and improvements may be made and should be consideredunder the protection of the present disclosure without departing fromthe principles of the present disclosure.

What is claimed is:
 1. A method for management of group user data, themethod comprising: receiving, by one or more processors of a computingdevice, a request for searching data of a first group user, the requestinitialized by a second group user via an instant messaging application;determining, by the one or more processors, a data search permission ofthe second group user on the data of the first group user; selecting, bythe one or more processors, at least one data item of the first groupuser in accordance with the data search permission; and returning, bythe one or more processors, the at least one data item to a computingdevice associated with the second group user.
 2. The method of claim 1,wherein the determining the data search permission of the second groupuser on the data of the first group user comprises: separatelydetermining a group department that the first group user and the secondgroup user belong to under an organizational structure respectively whena hidden mode of a default data item for the first group user has beenset; and determining that the data search permission of the second groupuser on the data of the first group user is irrelevant to the defaultdata item when the group department that the first group user belongs toand the group department that the second group user belongs to aredifferent group departments.
 3. The method of claim 2, wherein thedetermining the data search permission of the second group user on thedata of the first group user comprises: determining that the secondgroup user has a permission for searching complete data of the firstgroup user if a level of a management position of the second group useris a first predetermined level or the level of the management positionof the second group user is higher than a level of a management positionof the first group user, when the group department that the first groupuser belongs to and the group department that the second group userbelongs to are different group departments.
 4. The method of claim 2,further comprising: receiving a request for communicating with the firstgroup user, the request initiated by the second group user via a groupcontact page of the instant messaging application, the data searchpermission of the second group user on the data of the first group userirrelevant to the default data item, and the group contact page notshowing contact information of the first group user; separatelyobtaining the contact information of the first group user and the secondgroup user; and establishing a communication connection between thefirst group user and the second group user based on the contactinformation.
 5. The method of claim 1, wherein the determining the datasearch permission of the second group user on the data of the firstgroup user comprises: separately obtaining a level of a managementposition of the first group user and a level of a management position ofthe second group user under an organizational structure when anexecutive protection mode for the first group user has set; anddetermining that the data search permission of the second group user onthe data of the first group user is irrelevant to a default data itemwhen the level of the management position of the second group user islower than the level of the management position of the first group userand a discrepancy of levels of management positions between the firstgroup user and the second group user is greater than a predeterminedvalue.
 6. The method of claim 5, further comprising: receiving a requestfor communicating with the first group user, the request initiated bythe second group user via a group contact page of the instant messagingapplication; and ignoring or declining the communication request whenthe data search permission of the second group user on the data of thefirst group user is irrelevant to the default data item.
 7. The methodof claim 2, wherein the default data item comprises contact information.8. The method of claim 1, wherein the instant messaging application is agroup instant messaging application.
 9. A method for maintaining aninstant messaging group, the method comprising: receiving, by the one ormore processors of a computing device, an editing command for groupcontacts, the editing command initialized by an administrative user of agroup via a group contact page of an instant messaging application; andupdating, by the one or more processors, at least one instant messaginggroup associated with a community organization based on updated statusof the community organization when the editing command is applied toupdating of the community organization, wherein the at least one instantmessaging group is used for multiple group users to exchange IM messagestherebetween.
 10. The method of claim 9, further comprising: determininga level of an editing object corresponding to the editing command in thecommunity organization; and executing the editing command when a levelof a management permission is not lower than the level of the editingobject, or ignoring or declining the editing command when a level of amanagement permission is lower than the level of the editing object. 11.A device for management of group user data, wherein the devicecomprising: one or more processors; and memory to maintain a pluralityof components executable by the one or more processors, the plurality ofcomponents comprising: a first receiving module configured to receive arequest for searching data of a first group user, the requestinitialized by a second group user via an instant messaging application,a determining module configured to determine a data search permission ofthe second group user on the data of the first group user, and aselecting module configured to: select a data item of the first groupuser in accordance with the data search permission, and return the dataitem to a computing device associated with the second group user. 12.The device of claim 11, wherein the determining module is configured tofurther: separately determine a group department that the first groupuser and the second group user belong to under an organizationalstructure respectively when a hidden model of a default data item forthe first group user has started; and determine that the data searchpermission of the second group user on the data of the first group useris irrelevant to the default data item when the group department thatthe first group user belongs to and the group department that the secondgroup user belongs to are different group departments.
 13. The device ofclaim 12, wherein the determining module is further configured to:determine that the second group user has a permission for searchingcomplete data of the first group user if a level of a managementposition of the second group user is a first predetermined level or thelevel of the management position of the second group user is higher thana level of a management position of the first group user, when the groupdepartment that the first group user belongs to and the group departmentthat the second group user belongs to are different group departments.14. The device of claim 12, wherein the plurality of components furthercomprise: a second receiving module configured to receive a request forcommunicating with the first group user, the request initiated by thesecond group user via a group contact page of the instant messagingapplication, wherein the data search permission of the second group useron the data of the first group user is irrelevant to the default dataitem, and the group contact page does not show contact information ofthe first group user; an acquiring module configured to separatelyobtain contact information of the first group user and the second groupuser respectively; and an establishing module configured to establish acommunication connection between the first group user and the secondgroup user based on the contact information.
 15. The device of claim 11,wherein the determining module is configured to further: separatelyobtain a level of a management position of the first group user and alevel of a management position of the second group user under anorganizational structure when an executive protection model for thefirst group user has started; and determine that the data searchpermission of the second group user on the data of the first group useris irrelevant to a default data item when: the level of the managementposition of the second group user is lower than the level of themanagement position of the first group user, and a discrepancy of levelsof management positions between the first group user and the secondgroup user is greater than a predetermined value.
 16. The device ofclaim 15, wherein the plurality of components further comprise: a thirdreceiving module configured to receive a request for communicating withthe first group user, the request initiated by the second group user viaa group contact page of the instant messaging application; and a requestprocessing module configured to ignore or decline the communicationrequest when the data search permission of the second group user on thedata of the first group user is irrelevant to the default data item. 17.The device of claim 12, wherein the default data item comprises contactinformation.
 18. The device of claim 11, wherein the instant messagingapplication is a group instant messaging application.
 19. A device formaintaining an instant messaging group, the device comprising: one ormore processors; and memory to maintain a plurality of componentsexecutable by the one or more processors, the plurality of componentscomprising: a command receiving module configured to receive an editingcommand for group contacts, the editing command initialized by anadministrative user of a group via a group contact page of an instantmessaging application, and an updating module configured to update theinstant messaging group associated with a community organization basedon updated status of the community organization when the editing commandis applied to updating of the community organization.
 20. The device ofclaim 19, wherein the plurality of components further comprise: a leveldetermining module configured to determine a level of an editing objectcorresponding to the editing command in the community organization; anda command processing module configured to: execute the editing commandwhen a level of a management permission is not lower than the level ofthe editing object, or ignore or decline the editing command when thelevel of the management permission is lower than the level of theediting object.