CN108052526A - Monitoring area right management method, device and storage medium - Google Patents
Monitoring area right management method, device and storage medium Download PDFInfo
- Publication number
- CN108052526A CN108052526A CN201711087500.3A CN201711087500A CN108052526A CN 108052526 A CN108052526 A CN 108052526A CN 201711087500 A CN201711087500 A CN 201711087500A CN 108052526 A CN108052526 A CN 108052526A
- Authority
- CN
- China
- Prior art keywords
- node
- permission
- monitoring area
- area
- father
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2246—Trees, e.g. B+trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application discloses a kind of monitoring area right management method, device and storage medium, and wherein method includes:The instruction of monitoring area authority distribution is received, the monitoring area authority distribution instruction includes user identifier, predistribution monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;It obtains the corresponding permission node of the user identifier and obtains N number of bottom node, the N is positive integer;The child node for obtaining the bottom included in the corresponding predistribution node of the predistribution monitoring area obtains Q bottom node, and the Q is positive integer;The corresponding node tree of the user identifier is generated according to the incidence relation between the Authorization Attributes, the pre-stored Q bottom node and N number of bottom node.The embodiment of the present application improves the flexibility of zone permission management.
Description
Technical field
This application involves field of computer technology, and in particular to a kind of monitoring area right management method, device and storage
Medium.
Background technology
Administrator distributes different monitoring areas using user for each system, distributes to user's by node tree storage
The corresponding area data of monitoring area.However, there are multiple nodes in system, and the number of the child node between each node is not
Fixed, how efficiently to generate the corresponding node tree of user is those skilled in the art's technical problem to be solved.
The content of the invention
The embodiment of the present application proposes a kind of monitoring area right management method, device and storage medium, supports infinite stages
Regional structure improves definite user right and generates the efficiency of node tree, convenient for improving the flexibility of zone permission management.
In a first aspect, the embodiment of the present application provides a kind of monitoring area right management method, this method includes:
The instruction of monitoring area authority distribution is received, the monitoring area authority distribution instruction includes user identifier, predistribution
Monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;
The corresponding permission node of the user identifier is obtained, obtains N number of bottom node, the N is positive integer;
The child node of the bottom included in the corresponding predistribution node of the predistribution monitoring area is obtained, obtains Q
Bottom node, the Q are positive integer;
According between the Authorization Attributes, the pre-stored Q bottom node and N number of bottom node
Incidence relation generates the corresponding node tree of the user identifier.
Second aspect, the embodiment of the present application provide a kind of monitoring area rights management device, which includes:
Receiving unit, for receiving the instruction of monitoring area authority distribution, the monitoring area authority distribution instruction includes using
Family mark, predistribution monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;
Acquiring unit for obtaining the corresponding permission node of the user identifier, obtains N number of bottom node, the N is
Positive integer;The child node of the bottom included in the corresponding predistribution node of the predistribution monitoring area is obtained, obtains Q most
Bottom layer node, the Q are positive integer;
Generation unit, for according to the Authorization Attributes, the pre-stored Q bottom node and it is described it is N number of most
Incidence relation between bottom layer node generates the corresponding node tree of the user identifier.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer storage media
Computer program is stored with, the computer program includes program instruction, if described program instruction makes institute when being executed by processor
State the method that processor performs above-mentioned first aspect.
The embodiment of the present application receives the instruction of monitoring area authority distribution, obtains and is included in the instruction of monitoring area authority distribution
User identifier, predistribution monitoring area and the corresponding Authorization Attributes of predistribution monitoring area, it is corresponding N number of to obtain user identifier
Bottom node Q bottom node corresponding with predistribution monitoring area, according to Authorization Attributes, pre-stored Q most bottoms
The corresponding node tree of incidence relation generation user identifier between node layer and N number of bottom node.That is, it is opened from bottom
Begin to determine the node in node tree layer by layer, improve definite user right and generate the efficiency of node tree, convenient for improving
The flexibility of zone permission management.
Description of the drawings
It in order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application
Some embodiments, for those of ordinary skill in the art, without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Wherein:
Fig. 1 is a kind of flow diagram of monitoring area right management method provided by the embodiments of the present application;
Figure 1A is a kind of structure diagram of the corresponding node tree of all monitoring areas provided by the embodiments of the present application;
Figure 1B is a kind of structure diagram of the corresponding node tree of user provided by the embodiments of the present application;
Fig. 1 C are the structure diagrams of the corresponding node tree of another user provided by the embodiments of the present application;
Fig. 1 D are the structure diagrams of the corresponding node tree of another user provided by the embodiments of the present application;
Fig. 2 is a kind of structure diagram of monitoring area rights management device provided by the embodiments of the present application;
Fig. 2A is a kind of structure diagram of generation unit provided by the embodiments of the present application;
Fig. 3 is a kind of structure diagram of terminal provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, the technical solution in the embodiment of the present application is carried out clear, complete
Site preparation describes, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall in the protection scope of this application.
The type of the monitoring area of the application is by taking branch office, local police station and video-frequency monitor as an example, in practical applications, such
Type can also include other forms, such as municipal public security bureau, Department of Public Security of Shanxi Province etc..
The application is stored with the corresponding node tree of all monitoring areas, except root in the corresponding node tree of all monitoring areas
Each node outside node includes the father node and identifies ID, and all nodes comprising child node further include its child list.
That is, the father node of any node and the situation of child node can be inquired about by the node tree, to inquire about between each node
Incidence relation provide guarantee, search efficiency can be improved.
When adding node or deletion of node, the corresponding node tree of all monitoring areas is updated.And database is every
Addition or the node deleted synchronize in a period of time (for example, one minute) is to all monitoring areas, generate new node
Tree improves the reliability of data.
Each user corresponds to a node tree, is stored on the node tree and distributes to the monitoring area that the user possesses permission
Corresponding area data.Wherein, each node in node tree corresponds to a monitoring area, and the type of each node is the section
The type of the corresponding monitoring area of point, the mark of the mark monitoring area corresponding with the node of each node are consistent.
Such as:Assuming that the first branch office is identified as 111, then in node tree destination node corresponding with the first branch office mark
For 111, the type of destination node is branch office, and stored on destination node be the corresponding monitoring area of the first branch office number of regions
According to.
It should be noted that the node tree in the embodiment of the present application supports infinite stages regional structure, you can is supervised according to video
The corresponding position of monitoring area of visual organ is classified, and the monitoring area in local police station is divided into multiple regions, each region Ke Bao
It includes multiple video-frequency monitors or includes the subregion of multiple video-frequency monitors.
The incidence relation between monitoring area that may be present is now taken an example for illustration, the first branch office may include that first sends
Institute and the second local police station, wherein:First local police station may include the first video-frequency monitor, the second video-frequency monitor, the 3rd video prison
Visual organ, the 4th video-frequency monitor, the 5th video-frequency monitor and the 6th video-frequency monitor, the second local police station may include that the 7th video is supervised
Visual organ and the 8th video-frequency monitor.First local police station is divided into first area and second area, first area may include that first regards
Frequency monitor, the first subregion and the second video-frequency monitor, the first subregion may include the 3rd video-frequency monitor and the 4th video
Monitor, second area may include the 5th video-frequency monitor and the 6th video-frequency monitor.As shown in Figure 1A, using the first branch office as root
The node tree of node includes five node layers.
Optionally, the area attribute of all monitoring areas is cached in table form, which may include each monitoring
It is one or more in mark, type, the mark of higher level's monitoring area, the mark of subordinate's monitoring area or the number in region etc.
Area attribute can search the area attribute of the monitoring area by tabling look-up.
Table 1 describes the area attribute of above-mentioned example, according to table 1, the higher level in the first local police station and the second local police station
Monitoring area is the first branch office;Higher level's monitoring area of first area and second area is the first local police station;7th video monitor
Higher level's monitoring area of device and the 8th video-frequency monitor is the second local police station;First video-frequency monitor, the first subregion and second
Higher level's monitoring area of video-frequency monitor is first area;Higher level's monitored space of 3rd video-frequency monitor and the 4th video-frequency monitor
Domain is the first subregion;Higher level's monitoring area of 5th video-frequency monitor and the 6th video-frequency monitor is second area.
Table 1
Monitoring area | Subordinate's monitoring area |
First branch office | First local police station and the second local police station |
First local police station | First area and second area |
Second local police station | 7th video-frequency monitor and the 8th video-frequency monitor |
First area | First video-frequency monitor, the first subregion and the second video-frequency monitor |
Second area | 5th video-frequency monitor and the 6th video-frequency monitor |
First subregion | 3rd video-frequency monitor and the 4th video-frequency monitor |
Permission according to user determines the permission node of user and non-permission node, it will be understood that if permission node exists
Child node, then the child node of the permission node is also permission node;If a node is non-permission node, the father of the node saves
Point, the father node of father node etc. of the node are until root node is non-permission node.
The corresponding node tree of user includes the permission node of user and the associated superior node of permission node, without including
With the not associated non-permission node of permission node, i.e., the node not comprising child node is permission node in node tree, and includes son
The node of node, when child node is permission node, which is just permission node, is otherwise non-permission node.
In this application, the corresponding area data of permission node of user is stored in database, and supports permission node
The corresponding area data of child node between data merge, using the permission node of highest level as permission Area Node, and
It is stored using the permission Area Node as storage unit, then the power of highest level in user and each branch is included in database
Incidence relation between limit so as to reduce the stored number of area data, saves memory space, can improve search efficiency.
As an example it is assumed that node tree as shown in Figure 1A is the node tree of all monitoring areas, if Figure 1B is user's mark
Know for 888 corresponding node trees, the permission node according to Figure 1A and Figure 1B in the permission tree of user is the first video monitor
Device node, the second video-frequency monitor node, the 3rd video-frequency monitor node, the 5th video-frequency monitor node, the 7th video monitor
Device node, the 8th video-frequency monitor node and second local police station's node;Non- permission node in the permission tree of user is the first son
Area Node, first area node, second area node, first branch office's node and first local police station's node;Permission Area Node
For the first video-frequency monitor node, the second video-frequency monitor node, the 3rd video-frequency monitor node, the 5th video-frequency monitor node
With second local police station's node, then database store respectively and the first video-frequency monitor node, the second video-frequency monitor node,
Three video-frequency monitor nodes, the 5th video-frequency monitor node and the corresponding area data of second local police station's node, and second sends
The corresponding area data of institute's node is the 7th video-frequency monitor node and the merging data of the 8th video-frequency monitor node.
When logging in system by user, pass through the use stored in the corresponding node tree of all monitoring areas and database of storage
Incidence relation between family and permission Area Node determines the permission node of the user and the associated superior node of permission node, and
The corresponding node tree of the user is generated, then user can carry out looking into for data by the corresponding operating area of login system interior joint tree
It askes or edits.
Optionally, the corresponding node tree of the user is cached in preset duration, it is equal before avoiding operating the node tree every time
It regenerates, causes the waste of resource.And when preset duration reaches, the corresponding node of the user stored in caching is discharged
Tree, so as to save memory space.If in preset duration, administrator distributes permission for user, then deletes the node in caching
Tree, regenerates new node tree.
The embodiment of the present application proposes a kind of monitoring area right management method, device and storage medium, supports infinite stages
Regional structure improves definite user right and generates the efficiency of node tree, convenient for improving the flexibility of zone permission management.Under
It describes in detail in face of the embodiment of the present application.
Fig. 1 is referred to, Fig. 1 is a kind of flow signal of monitoring area right management method provided by the embodiments of the present application
Figure, as shown in Figure 1, the monitoring area right management method includes:
101st, the instruction of monitoring area authority distribution is received.
In the embodiment of the present application, user identifier, predistribution monitored space are included at least in the instruction of monitoring area authority distribution
Domain Authorization Attributes corresponding with predistribution monitoring area, for distributing predistribution monitoring area pair for the corresponding user of user identifier
The permission for the predistribution node answered, i.e., when Authorization Attributes are addition, and do not include predistribution node in the permission node of user,
To user add predistribution node permission, when Authorization Attributes for delete, and the permission node of user include predistribution node
When, delete user predistribution node permission.The particular content that the embodiment of the present application is instructed for monitoring area authority distribution
It does not limit.
102nd, obtain the corresponding permission node of user identifier and obtain N number of bottom node.
In the embodiment of the present application, N is positive integer, and N number of bottom node is the permission node of user.N number of bottom
The node that node can inquire about each branch's bottom in the corresponding node tree of the user in the buffer is obtained;Number can also be passed through
Permission Area Node is obtained according to the corresponding permission node of the area data stored in storehouse, and combines pre-stored each node
Child list searches the child node of the bottom included in the permission Area Node, is specially:Obtain the user identifier pair
The permission Area Node answered obtains multiple permission Area Nodes;Obtain the bottom included in the multiple permission Area Node
Child node, obtain N number of bottom node.
103rd, the child node for obtaining the bottom included in the corresponding predistribution node of predistribution monitoring area obtains Q most
Bottom layer node.
Wherein, Q is positive integer, and Q bottom node is the predistribution node of user, i.e., when Authorization Attributes for addition,
And when not including Q bottom node in N number of bottom node, the permission of Q bottom node is added to user;When permission category
Property to delete, and when N number of bottom node includes Q bottom node, delete the permission of the Q bottom node of user.
104th, according to the incidence relation between Authorization Attributes, pre-stored Q bottom node and N number of bottom node
Generate the corresponding node tree of user identifier.
Optionally, according to the Authorization Attributes, the pre-stored Q bottom node and N number of most bottom
Incidence relation between node layer determines the permission node in the Q bottom node and N number of bottom node, obtains
Multiple permission nodes;Using the multiple permission node as destination node collection, iteration performs:The destination node is obtained to concentrate often
The corresponding father node of one node, obtains multiple father nodes;The permission section included according to each father node in the multiple father node
In point whether all nodes in the child list comprising the father node determine permission node in the multiple father node and
Non- permission node;Using the multiple father node as the destination node collection, when root node is included in the multiple father node,
Terminate iteration;The node tree is generated according to the incidence relation between the definite permission node and non-permission node.
Wherein, whether saved in the permission node included according to each father node in the multiple father node comprising the father
All nodes in the child list of point determine the permission node in the multiple father node and non-permission node, including:If
The child node of a father node in multiple father nodes includes all nodes in the child list of the father node, it is determined that should
Father's section is permission node, and otherwise, which is non-permission node.
Due to possible between the corresponding permission Area Node of allocated permission node in actual conditions and predistribution node
In the presence of complicated connection relation, such as:Permission Area Node is spaced multiple nodes with predistribution node.According to permission category
Property, the incidence relation between pre-stored Q bottom node and N number of bottom node each layer of section is determined since bottom
The permission node of user and the associated father node of permission node in point determine the institute included in the corresponding node tree of user identifier
There is the connection relation between node and each node, so as to generate node tree, improve the efficiency for the permission node that user possesses
With generation node tree efficiency, convenient for improve zone permission management flexibility.
For example, the instruction of monitoring area authority distribution is received, wherein user identifier is 888, and predistribution monitoring area is
The corresponding monitoring area of 4th video-frequency monitor node, and the corresponding Authorization Attributes of the 4th video-frequency monitor node are addition, Q is a
Bottom node is the 4th video-frequency monitor node.According to the permission section that the user possesses in 888 searching data storehouse of user identifier
Domain node node tree corresponding with all monitoring areas of storage, the N number of bottom node for obtaining the user are:First video is supervised
Visual organ node, the second video-frequency monitor node, the 3rd video-frequency monitor node, the 5th video-frequency monitor node, the 7th video prison
Visual organ node and the 8th video-frequency monitor node, corresponding node tree is as shown in Figure 1B.When for user add the 4th video
During the permission of monitor node, according to the incidence relation between the 4th video-frequency monitor node of storage and N number of bottom node
It determines the 4th video-frequency monitor node and N number of bottom node is permission node in the node tree of user;Obtain above-mentioned power
Limiting the corresponding father node of node is:First sub-district domain node, second local police station's node, first area node and second area section
Point, whether all nodes in the child list comprising the father node determine in the permission node included according to above-mentioned father node
Permission node is the first sub-district domain node, second local police station's node and first area node, and non-permission node is second area section
Point;The father node for obtaining second local police station's node, first area node and second area node again obtains first local police station's node
With first branch office's node, arranged according to the permission node that first local police station's node and second area node include not comprising its child node
All nodes in table determine first local police station's node and first branch office's node is non-permission node, and first branch office's node is
Root node, it is determined that the node and the incidence relation of each node included in the corresponding node tree of user, obtained node tree is such as
Shown in Fig. 1 C.
Again for example, the instruction of monitoring area authority distribution is received, wherein user identifier is 888, pre-allocates monitoring area
For the corresponding monitoring area of the 3rd video-frequency monitor node, and the corresponding Authorization Attributes of the 3rd video-frequency monitor node is delete, Q
A bottom node is the 3rd video-frequency monitor node.According to the permission that the user possesses in 888 searching data storehouse of user identifier
Area Node node tree corresponding with all monitoring areas of storage, the N number of bottom node for obtaining the user are:First video
Monitor node, the second video-frequency monitor node, the 3rd video-frequency monitor node, the 5th video-frequency monitor node, the 7th video
Monitor node and the 8th video-frequency monitor node, corresponding node tree is as shown in Figure 1B.It is regarded when deleting the 3rd for user
During the permission of frequency monitor node, closed according to the association between the 3rd video-frequency monitor node of storage and N number of bottom node
System defines the competence node as all nodes in N number of bottom node in addition to the 3rd video-frequency monitor node;It obtains above-mentioned
The corresponding father node of permission node is:Second local police station's node, first area node and second area node are saved according to above-mentioned father
Whether all nodes in the child list comprising the father node define the competence node as second local police station's node to point child node,
Non- permission node is first area node and second area node;Second local police station's node, first area node and are obtained again
The father node of two Area Nodes obtains first local police station's node and first branch office's node, according to first local police station's node and the secondth area
All nodes that the permission node that domain node includes does not include in its child list determine first local police station's node and first point
Office's node is non-permission node, and first branch office's node is root node, it is determined that the section included in the corresponding node tree of user
The incidence relation of point and each node, obtained node tree is as shown in figure iD.
Optionally, the area data for the child node that the permission node in the node tree includes is merged;With highest level pair
The permission node answered is stored for storage unit.
That is, the permission node in node tree is obtained, by the region for merging the child node included in permission node
Data, and stored with the corresponding permission node of highest level, memory space can be saved, beneficial to raising search efficiency.
For example, permission tree as shown in Figure 1B is obtained after the 4th video-frequency monitor node is added such as Fig. 1 C institutes
The permission tree shown, the permission node that permission tree includes are:First video-frequency monitor node, the second video-frequency monitor node, the 3rd
Video-frequency monitor node, the 4th video-frequency monitor node, the 5th video-frequency monitor node, the 7th video-frequency monitor node, the 8th
Video-frequency monitor node, the first sub-district domain node, first area node and second local police station's node then merge the 3rd video monitor
Device node and the corresponding area data of the 4th video-frequency monitor node obtain the area data of the first sub-district domain node, remerge
The area data of one video-frequency monitor node, the second video-frequency monitor node and the first sub-district domain node obtains first area node
Area data;Merge the 7th video-frequency monitor node and the corresponding area data of the 8th video-frequency monitor node obtains the second group
Go out the area data of institute's node, i.e. database includes first area node, second local police station's node and the 5th video-frequency monitor
The area data of node.If without the merging of data, the first video-frequency monitor node, the second video are stored in database
Monitor node, the 3rd video-frequency monitor node, the 4th video-frequency monitor node, the 5th video-frequency monitor node, the 7th video
Monitor node and the 8th video-frequency monitor node totally 7 datas, and after the data for passing through permission node merge, in database
3 datas are stored with, so as to reduce the quantity of area data, memory space is saved, search efficiency can be improved.
It should be noted that monitoring area authority distribution instruction by with permission administrator send, i.e., administrator according to
It can only so check the node area data corresponding with editor's corresponding authority node in oneself extent of competence.Due to each administrator
Permission it is inconsistent, that is to say, that sending the permission of the administrator of monitoring area authority distribution instruction may can check that user marks
Know corresponding node tree, it is also possible to can only see the node tree of part, in some instances it may even be possible to which invisible node tree, i.e. administrator distribute
During permission, without showing the node tree of user and the corresponding area data of node tree, so as to improve the safety of rights management
Property.
Optionally, the method further includes:According to each in N number of bottom node and the Q bottom node
The Authorization Attributes of node judge whether the Q bottom node includes the node of unmodified permission, disappear if so, sending prompting
Breath.
It is appreciated that the Authorization Attributes of each bottom node are to possess permission in N number of bottom node, and Q is a most
The Authorization Attributes of bottom layer node Authorization Attributes corresponding with predistribution monitoring area are consistent.The node of unmodified permission refers to Q
Authorization Attributes of bottom node interior joint and user possesses the power of the node before the instruction of monitoring area authority distribution is received
It is consistent to limit attribute.That is, when pre-allocating the corresponding Authorization Attributes of monitoring area to add, if in Q bottom node
During comprising a node in N number of bottom node, which is the node of unmodified permission;When predistribution monitoring area corresponds to
Authorization Attributes for delete when, if in Q bottom node do not include N number of bottom node in any one node, this
Node is the node of unmodified permission.
Prompting message is used to inform the node for sending the administrator of monitoring area authority distribution instruction there are unmodified permission,
The permission of the node of i.e. unmodified permission does not make an amendment, this sub-distribution be modification authority node permission, operation can be improved
Practicability.
Above-mentioned unmodified permission node can be informed with individual joint form, can also be accused by the form of merge node
Know, do not limit herein.
It should be noted that the application is only illustrated with a predistribution monitoring area, may include in actual conditions more
A predistribution monitoring area, wherein each predistribution monitoring area can carry out permission point according to the method involved by the application
Match somebody with somebody.
Referring to Fig. 2, Fig. 2 is a kind of structural representation of monitoring area rights management device provided by the embodiments of the present application
Figure, as shown in Fig. 2, the device 200 may include:
Receiving unit 201, for receiving the instruction of monitoring area authority distribution, the monitoring area authority distribution instruction includes
User identifier, predistribution monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;
Acquiring unit 202 for obtaining the corresponding permission node of the user identifier, obtains N number of bottom node, described
N is positive integer;The child node of the bottom included in the corresponding predistribution node of the predistribution monitoring area is obtained, obtains Q
A bottom node, the Q are positive integer;
Generation unit 203, for according to the Authorization Attributes, the pre-stored Q bottom node and described N number of
Incidence relation between bottom node generates the corresponding node tree of the user identifier.
As a kind of optional embodiment, the acquiring unit 202 is specifically used for obtaining the corresponding power of the user identifier
Area Node is limited, obtains multiple permission Area Nodes, the permission Area Node is the permission node of highest level;Described in acquisition
The child node of the bottom included in multiple permission Area Nodes obtains N number of bottom node.
As a kind of optional embodiment, as shown in Figure 2 A, the generation unit 203 includes:
Determining module 2031, for according to the Authorization Attributes, the pre-stored Q bottom node and institute
It states the incidence relation between N number of bottom node and determines permission in the Q bottom node and N number of bottom node
Node obtains multiple permission nodes;
Iteration module 2032, for using the multiple permission node as destination node collection, iteration to perform:Obtain the mesh
The corresponding father node of each node in set of node is marked, obtains multiple father nodes;According to each father node in the multiple father node
Comprising permission node in whether comprising the father node child list in all nodes determine in the multiple father node
Permission node and non-permission node;Using the multiple father node as the destination node collection, in the multiple father node
During comprising root node, terminate iteration;
Generation module 2033, for being generated according to the incidence relation between the definite permission node and non-permission node
The node tree.
As a kind of optional embodiment, described device 200 further includes:
Combining unit 204, the area data for the child node that the permission node for merging in the node tree includes;
Storage unit 205, for being stored using the corresponding permission node of highest level as storage unit.
As a kind of optional embodiment, described device 200 further includes:
Prompt unit 206, for according to each node in N number of bottom node and the Q bottom node
Authorization Attributes judge whether the Q bottom node includes the node of unmodified permission, if so, sending prompting message.
It will be appreciated that the function of each functional unit of the device 200 of the present embodiment can be according to above-mentioned Fig. 1 embodiments of the method
Method specific implementation, details are not described herein again.
Implement the embodiment of the present application, receive the instruction of monitoring area authority distribution, obtain in the instruction of monitoring area authority distribution
Comprising user identifier, predistribution monitoring area and the corresponding Authorization Attributes of predistribution monitoring area, obtain user identifier and correspond to
N number of bottom node and the corresponding Q bottom node of predistribution monitoring area, it is a according to Authorization Attributes, pre-stored Q
The corresponding node tree of incidence relation generation user identifier between bottom node and N number of bottom node.That is, the bottom of from
Layer starts to determine the node in node tree layer by layer, improves definite user right and generates the efficiency of node tree, is convenient for
Improve the flexibility of zone permission management.
Fig. 3 is referred to, Fig. 3 is a kind of structure diagram of terminal provided by the embodiments of the present application.As shown in figure 3, this reality
Applying the terminal in example can include:One or more processors 301;One or more input equipments 302, one or more output
Equipment 303 and memory 304.Above-mentioned processor 301, input equipment 302, output equipment 303 and memory 304 pass through bus
305 connections.Memory 304 is for storing instruction and data, processor 301 are used to perform the instruction of the storage of memory 302.
Wherein, for receiving the instruction of monitoring area authority distribution, the monitoring area authority distribution instructs input equipment 302
Including user identifier, predistribution monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;Memory 304 is additionally operable to
Store the incidence relation between Q bottom node and N number of bottom node;Processor 301 is used to obtain the user identifier
Corresponding permission node, obtains N number of bottom node, and the N is positive integer;The predistribution monitoring area is obtained to correspond to
Predistribution node in the child node of the bottom that includes, obtain the Q bottom node, the Q is positive integer;According to institute
The incidence relation stated between Authorization Attributes, the pre-stored Q bottom node and N number of bottom node generates the use
Family identifies corresponding node tree.
In the specific implementation, processor 301, input equipment 302, the output equipment 303 described in the embodiment of the present application can
The realization method described in monitoring area right management method provided by the embodiments of the present application is performed, it is real also to can perform the application
The realization method of the described monitoring area rights management device of example is applied, details are not described herein.
A kind of computer readable storage medium, above computer readable storage medium are provided in another embodiment of the application
Matter is stored with computer program, and above computer program includes program instruction, and above procedure instruction makes when being executed by a processor
Above-mentioned processor performs the realization method described in monitoring area right management method.
Those of ordinary skill in the art may realize that each exemplary lists described with reference to the embodiments described herein
Member and algorithm steps can be realized with the combination of electronic hardware, computer software or the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are performed actually with hardware or software mode, specific application and design constraint depending on technical solution.Specially
Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not
It is considered as beyond scope of the present application.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of said units, only
Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied
It closes or is desirably integrated into another system or some features can be ignored or does not perform.In addition, shown or discussed phase
Coupling, direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection or electricity, the connection of mechanical or other forms.
The above-mentioned unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected to realize the embodiment of the present application scheme according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also
It is that unit is individually physically present or two or more units integrate in a unit.It is above-mentioned integrated
The form that hardware had both may be employed in unit is realized, can also be realized in the form of SFU software functional unit.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and is independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Equipment (can be personal computer, server or the network equipment etc.) performs the complete of each embodiment above method of the application
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (Read-Only Memory,
ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can store program
The medium of code.
It is above above-mentioned, it is only the specific embodiment of the application, but the protection domain of the application is not limited thereto, and it is any
In the technical scope that those familiar with the art discloses in the application, various equivalent modifications can be readily occurred in or replaced
It changes, these modifications or substitutions should all cover within the protection domain of the application.Therefore, the protection domain of the application should be with right
It is required that protection domain subject to.
Claims (10)
1. a kind of monitoring area right management method, which is characterized in that including:
The instruction of monitoring area authority distribution is received, the monitoring area authority distribution instruction includes user identifier, predistribution monitoring
Region and the corresponding Authorization Attributes of the predistribution monitoring area;
The corresponding permission node of the user identifier is obtained, obtains N number of bottom node, the N is positive integer;
The child node of the bottom included in the corresponding predistribution node of the predistribution monitoring area is obtained, obtains Q most bottoms
Node layer, the Q are positive integer;
According to the association between the Authorization Attributes, the pre-stored Q bottom node and N number of bottom node
Relation generates the corresponding node tree of the user identifier.
2. according to the method described in claim 1, it is characterized in that, described obtain the corresponding permission node of the user identifier,
N number of bottom node is obtained, including:
The corresponding permission Area Node of the user identifier is obtained, obtains multiple permission Area Nodes, the permission Area Node
For the permission node of highest level;
The child node of the bottom included in the multiple permission Area Node is obtained, obtains N number of bottom node.
3. method according to claim 1 or 2, which is characterized in that described according to the Authorization Attributes, pre-stored institute
It states the incidence relation between Q bottom node and N number of bottom node and generates the corresponding node tree of the user identifier,
Including:
According between the Authorization Attributes, the pre-stored Q bottom node and N number of bottom node
Incidence relation determines the permission node in the Q bottom node and N number of bottom node, obtains multiple permission sections
Point;
Using the multiple permission node as destination node collection, iteration performs:
It obtains the destination node and concentrates the corresponding father node of each node, obtain multiple father nodes;
Whether the child node comprising the father node arranges in the permission node included according to each father node in the multiple father node
All nodes in table determine permission node and non-permission node in the multiple father node;
Using the multiple father node as the destination node collection, when including root node in the multiple father node, terminate to change
Generation;
The node tree is generated according to the incidence relation between the definite permission node and non-permission node.
4. according to the method described in claim 3, it is characterized in that, described according to the Authorization Attributes, pre-stored institute
It states the incidence relation between Q bottom node and N number of bottom node and generates the corresponding node tree of the user identifier
Afterwards, the method further includes:
Merge the area data for the child node that the permission node in the node tree includes;
It is stored using the corresponding permission node of highest level as storage unit.
5. method according to claim 1 or 2, which is characterized in that the method further includes:
Judge the Q most according to the Authorization Attributes of each node in N number of bottom node and the Q bottom node
Whether bottom layer node includes the node of unmodified permission, if so, sending prompting message.
6. a kind of monitoring area rights management device, which is characterized in that including:
Receiving unit, for receiving the instruction of monitoring area authority distribution, the monitoring area authority distribution instruction includes user's mark
Know, pre-allocate monitoring area and the corresponding Authorization Attributes of the predistribution monitoring area;
Acquiring unit for obtaining the corresponding permission node of the user identifier, obtains N number of bottom node, and the N is just whole
Number;The child node of the bottom included in the corresponding predistribution node of the predistribution monitoring area is obtained, obtains the Q bottom
Node, the Q are positive integer;
Generation unit, for according to the Authorization Attributes, the pre-stored Q bottom node and N number of bottom
Incidence relation between node generates the corresponding node tree of the user identifier.
7. device according to claim 6, which is characterized in that the acquiring unit is specifically used for obtaining the user identifier
Corresponding permission Area Node, obtains multiple permission Area Nodes, and the permission Area Node is the permission node of highest level;
The child node of the bottom included in the multiple permission Area Node is obtained, obtains N number of bottom node.
8. the device according to claim 6 or 7, which is characterized in that the generation unit includes:
Determining module, for according to the Authorization Attributes, the pre-stored Q bottom node and it is described it is N number of most
Incidence relation between bottom layer node determines the permission node in the Q bottom node and N number of bottom node, obtains
To multiple permission nodes;
Iteration module, for using the multiple permission node as destination node collection, iteration to perform:Obtain the destination node collection
In the corresponding father node of each node, obtain multiple father nodes;According to the power that each father node includes in the multiple father node
Whether all nodes in the child list comprising the father node determine permission section in the multiple father node in limit node
Point and non-permission node;Using the multiple father node as the destination node collection, root section is included in the multiple father node
During point, terminate iteration;
Generation module, for generating the node according to the incidence relation between the definite permission node and non-permission node
Tree.
9. device according to claim 8, which is characterized in that described device further includes:
Combining unit, the area data for the child node that the permission node for merging in the node tree includes;
Storage unit, for being stored using the corresponding permission node of highest level as storage unit.
10. a kind of computer readable storage medium, which is characterized in that the computer storage media is stored with computer program,
The computer program includes program instruction, and described program instruction makes the processor perform such as right when being executed by a processor
It is required that 1-5 any one of them methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711087500.3A CN108052526B (en) | 2017-11-07 | 2017-11-07 | Monitoring area authority management method and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711087500.3A CN108052526B (en) | 2017-11-07 | 2017-11-07 | Monitoring area authority management method and device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108052526A true CN108052526A (en) | 2018-05-18 |
CN108052526B CN108052526B (en) | 2020-06-16 |
Family
ID=62118972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711087500.3A Active CN108052526B (en) | 2017-11-07 | 2017-11-07 | Monitoring area authority management method and device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108052526B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035256A (en) * | 2019-02-27 | 2019-07-19 | 视联动力信息技术股份有限公司 | A kind for the treatment of method and apparatus monitoring access authorization for resource |
CN110324678A (en) * | 2019-05-29 | 2019-10-11 | 视联动力信息技术股份有限公司 | Method, apparatus, electronic equipment and the readable storage medium storing program for executing of transmitting, monitoring resource |
CN110474910A (en) * | 2019-08-19 | 2019-11-19 | 甘肃万华金慧科技股份有限公司 | A kind of right management method |
CN110505096A (en) * | 2019-08-27 | 2019-11-26 | 西安闻泰电子科技有限公司 | Internet of things equipment management method, device, equipment and medium |
CN110839140A (en) * | 2018-08-17 | 2020-02-25 | 视联动力信息技术股份有限公司 | Method and device for generating monitoring directory |
CN111079121A (en) * | 2018-10-19 | 2020-04-28 | 杭州海康威视系统技术有限公司 | Equipment resource management method and device |
CN112685606A (en) * | 2020-12-31 | 2021-04-20 | 上海氪邦智能技术有限公司 | Authority rule configuration/management method, system, computer medium and terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060190588A1 (en) * | 2003-07-11 | 2006-08-24 | Nippon Telegraph And Telephone Corp. | System management method, system management device, system management program, and storage medium containing system management program |
CN101996218A (en) * | 2009-08-21 | 2011-03-30 | 上海博科资讯股份有限公司 | Method for realizing data access authority control |
CN102402652A (en) * | 2010-09-16 | 2012-04-04 | 金蝶软件(中国)有限公司 | Method, system and terminal for controlling authority |
CN102457521A (en) * | 2010-11-02 | 2012-05-16 | 株式会社日立制作所 | Access right management device, access right management system, access right management method and access right management program |
CN106789984A (en) * | 2016-12-08 | 2017-05-31 | 浙江齐治科技股份有限公司 | A kind of access rights specification and visualization method and system |
-
2017
- 2017-11-07 CN CN201711087500.3A patent/CN108052526B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060190588A1 (en) * | 2003-07-11 | 2006-08-24 | Nippon Telegraph And Telephone Corp. | System management method, system management device, system management program, and storage medium containing system management program |
CN101996218A (en) * | 2009-08-21 | 2011-03-30 | 上海博科资讯股份有限公司 | Method for realizing data access authority control |
CN102402652A (en) * | 2010-09-16 | 2012-04-04 | 金蝶软件(中国)有限公司 | Method, system and terminal for controlling authority |
CN102457521A (en) * | 2010-11-02 | 2012-05-16 | 株式会社日立制作所 | Access right management device, access right management system, access right management method and access right management program |
CN106789984A (en) * | 2016-12-08 | 2017-05-31 | 浙江齐治科技股份有限公司 | A kind of access rights specification and visualization method and system |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110839140A (en) * | 2018-08-17 | 2020-02-25 | 视联动力信息技术股份有限公司 | Method and device for generating monitoring directory |
CN110839140B (en) * | 2018-08-17 | 2021-09-10 | 视联动力信息技术股份有限公司 | Method and device for generating monitoring directory |
CN111079121A (en) * | 2018-10-19 | 2020-04-28 | 杭州海康威视系统技术有限公司 | Equipment resource management method and device |
CN111079121B (en) * | 2018-10-19 | 2022-08-05 | 杭州海康威视系统技术有限公司 | Equipment resource management method and device |
CN110035256A (en) * | 2019-02-27 | 2019-07-19 | 视联动力信息技术股份有限公司 | A kind for the treatment of method and apparatus monitoring access authorization for resource |
CN110035256B (en) * | 2019-02-27 | 2020-11-20 | 视联动力信息技术股份有限公司 | Processing method and device for monitoring resource permission |
CN110324678A (en) * | 2019-05-29 | 2019-10-11 | 视联动力信息技术股份有限公司 | Method, apparatus, electronic equipment and the readable storage medium storing program for executing of transmitting, monitoring resource |
CN110474910A (en) * | 2019-08-19 | 2019-11-19 | 甘肃万华金慧科技股份有限公司 | A kind of right management method |
CN110505096A (en) * | 2019-08-27 | 2019-11-26 | 西安闻泰电子科技有限公司 | Internet of things equipment management method, device, equipment and medium |
CN112685606A (en) * | 2020-12-31 | 2021-04-20 | 上海氪邦智能技术有限公司 | Authority rule configuration/management method, system, computer medium and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN108052526B (en) | 2020-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108052526A (en) | Monitoring area right management method, device and storage medium | |
CN108134764B (en) | Distributed data sharing and exchanging method and system | |
CN102523111B (en) | Support the network management system of customizable group | |
CN104636437B (en) | A kind of processing method and processing device of event notification method, monitor | |
CN105763522A (en) | Authorization processing method and device | |
CN104731951B (en) | A kind of data query method and device | |
CN113220422B (en) | Method and system for modifying Pod network interface based on operation of CNI plug-in K8s | |
WO2016070604A1 (en) | Resource access method and device | |
CN103207813B (en) | The method and apparatus for managing resource | |
CN110138881A (en) | A kind of distributed memory system and its storage method | |
CN111478953B (en) | Self-construction method, device, system, equipment and storage medium of server cluster | |
CN111030840A (en) | Method and device for generating topological graph, electronic equipment and storage medium | |
CN110633120A (en) | Configuration software control processing method, device, server, user terminal and system | |
KR101783298B1 (en) | Method for creating and managing node information from input data based on graph database and server using the same | |
EP3602387A1 (en) | Identifiers for integrity protection of digitally coded copies | |
CN102298560A (en) | Equipment managing apparatus, equipment managing method, and equipment managing system | |
CN106126720A (en) | The method and device that the collection of browser of mobile terminal is managed | |
CN115567596B (en) | Cloud service resource deployment method, device, equipment and storage medium | |
CN110611591B (en) | Network topology establishing method and device | |
CN109508226B (en) | Openstack-based virtual machine life cycle management method | |
CN104820682B (en) | A kind of bullet train demand data example construction method and device | |
CN104898933B (en) | A kind of processing method and processing device of bullet train demand data | |
CN105511988A (en) | Encrypted data management method and device and electronic equipment | |
WO2016062050A1 (en) | Method, device and system for micro-module management | |
CN115603923A (en) | Access Control List (ACL) policy management method, device and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |