CN108446168A - A kind of the browse right setting method and device of affairs - Google Patents

A kind of the browse right setting method and device of affairs Download PDF

Info

Publication number
CN108446168A
CN108446168A CN201810202880.9A CN201810202880A CN108446168A CN 108446168 A CN108446168 A CN 108446168A CN 201810202880 A CN201810202880 A CN 201810202880A CN 108446168 A CN108446168 A CN 108446168A
Authority
CN
China
Prior art keywords
target
target user
permission
user
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810202880.9A
Other languages
Chinese (zh)
Inventor
龙金华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG 115 TECHNOLOGY Co Ltd
Original Assignee
GUANGDONG 115 TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG 115 TECHNOLOGY Co Ltd filed Critical GUANGDONG 115 TECHNOLOGY Co Ltd
Priority to CN201810202880.9A priority Critical patent/CN108446168A/en
Publication of CN108446168A publication Critical patent/CN108446168A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/466Transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

This application discloses the browse right setting methods and device of a kind of affairs.This method is:Receive the instruction that target transaction is sent to target user;Whether detection target user has permission browsing objective affairs;When having permission browsing objective affairs, target transaction is sent to target user;When without permission browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;When with when, transmitting terminal interface display prompt message and addition rights option;After detecting that addition rights option is triggered, browse right is added to target user, and target transaction is sent to target user;When detection does not have the permission of modification target transaction, display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user.By the above method, solve the problems, such as that the setting in the related technology to browse right is excessively cumbersome, and then achieved the effect that the setting procedure of simplified browse right.

Description

A kind of the browse right setting method and device of affairs
Technical field
This application involves office collaboration software fields, a kind of browse right setting method in particular to affairs and Device.
Background technology
Office collaboration software is wide as a kind of office auxiliary tool effectively improving team collaboration's ability and working efficiency In the enterprise of the general different scales applied to every field.Employee user in enterprise can initiate thing by collaboration software of handling official business Business, and other are set and has permission the user for browsing the affairs.After affairs initiation, user can need other users to understand When the affair related information, which is sent to other users.However, in some cases, receiving the user of the affairs simultaneously The permission of the affairs is not browsed, and send the user of the affairs before transmitting and not to be noted this point, then send the thing The user of object needs to exit current transmission operation, and the operation of browse right opening is carried out into the interface of setting browse right, Carry out the operation of affairs transmission again later.The above-mentioned setting to browse right is excessively cumbersome.
For the excessively cumbersome problem of the setting to browse right in the related technology, effective solution side is not yet proposed at present Case.
Invention content
This application provides the browse right setting methods and device of a kind of affairs, to solve in the related technology to weigh browsing Excessively cumbersome problem is arranged in limit.
According to the one side of the application, a kind of browse right setting method of affairs is provided.This method includes:It receives The instruction that target transaction is sent to target user triggered by transmission end subscriber;Whether detection target user has permission browsing mesh Mark affairs;When detecting that target user has permission browsing objective affairs, target transaction is sent to target user;When detecting When target user does not have permission browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;When When sending end subscriber has the permission of modification target transaction, in transmitting terminal interface display prompt message and rights option is added, Wherein, addition rights option is used to add the permission of browsing objective affairs to target user;Rights option quilt is added when detecting After triggering, the permission of browsing objective affairs is added to target user, and target transaction is sent to target user;When detection is sent When end subscriber does not have the permission of modification target transaction, in transmitting terminal interface display prompt message and delivery option;When detecting After delivery option is triggered, target transaction is sent to target user.
Further, whether detection target user has permission browsing objective affairs and includes:Obtain the corresponding power of target transaction Limit list, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain target user's Identification information;Whether the identification information of detection target user is stored in permissions list;When the mark letter for detecting target user Breath is stored in permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have There is the permission of browsing objective affairs.
Further, whether detection target user has permission browsing objective affairs and includes:Obtain target transaction corresponding the One permissions list and the second permissions list, wherein the first permissions list is for storing the user's for having permission browsing objective affairs Identification information, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, are grouped by multiple use Family forms;Obtain the identification information of the identification information and the grouping where target user of target user;Detect the mark of target user Know whether information is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in second In permissions list;When detecting the identification information storage of target user in the first permissions list and/or where target user The identification information storage of grouping then judges that target user has the permission of browsing objective affairs, otherwise in the second permissions list Judge that target user does not have the permission of browsing objective affairs.
Further, after detecting that addition rights option is triggered, the power of browsing objective affairs is added to target user Limit, and target transaction is sent to target user and includes:The identification information of target user is added in permissions list;By target Affairs are sent to target user.
Further, after detecting that addition rights option is triggered, the power of browsing objective affairs is added to target user Limit, and target transaction is sent to target user and includes:The identification information of target user is added in the first permissions list;It will Target transaction is sent to target user.
According to the another aspect of the application, a kind of browse right setting device of affairs is provided.The device includes:It receives Unit, for receiving the instruction that target transaction is sent to target user triggered by transmission end subscriber;First detection unit is used In detection, whether target user has permission browsing objective affairs;Transmission unit, for detecting that target user has permission browsing When target transaction, target transaction is sent to target user;Second detection unit, for detecting target user without power When limiting browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;First display unit is used for When sending end subscriber has the permission of modification target transaction, in transmitting terminal interface display prompt message and rights option is added, Wherein, addition rights option is used to add the permission of browsing objective affairs to target user;Adding device, for adding detecting After adding rights option to be triggered, the permission of browsing objective affairs is added to target user, and target transaction is sent to target and is used Family;Second display unit is used to, when detection sends end subscriber and do not have the permission of modification target transaction, show at transmitting terminal interface Show prompt message and delivery option;Transmission unit, for after detecting that delivery option is triggered, target to be sent to target user Affairs.
Further, first detection unit includes:First acquisition module, for obtaining the corresponding permission row of target transaction Table, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Second acquisition module, is used for Obtain the identification information of target user;Whether first detection module, the identification information for detecting target user are stored in permission In list;First judgment module then judges target for working as the identification information storage for detecting target user in permissions list User has the permission of browsing objective affairs, otherwise judges that target user does not have the permission of browsing objective affairs.
Further, first detection unit includes:Third acquisition module, for obtaining corresponding first permission of target transaction List and the second permissions list, wherein the first permissions list is used to store the mark letter for the user for having permission browsing objective affairs Breath, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users; 4th acquisition module, the identification information of the grouping where identification information and target user for obtaining target user;Second inspection Module is surveyed, whether the identification information for detecting target user is stored in the first permissions list, where detection target user Whether the identification information of grouping is stored in the second permissions list;When detecting the identification information storage of target user in the first power The identification information storage of the grouping in list and/or where target user is limited in the second permissions list, then judges target user Otherwise permission with browsing objective affairs judges that target user does not have the permission of browsing objective affairs.
Further, adding device includes:First add module, for the identification information of target user to be added to permission In list;First sending module, for target transaction to be sent to target user.
Further, adding device includes:Second add module, for the identification information of target user to be added to first In permissions list;Second sending module, for target transaction to be sent to target user.
According to the another aspect of the application, a kind of storage medium is provided, above-mentioned storage medium includes the program of storage, In, program executes the browse right setting method of the affairs of above-mentioned any one.
According to the another aspect of the application, a kind of processor is provided, above-mentioned processor is for running program, wherein journey The browse right setting method of the affairs of above-mentioned any one is executed when sort run.
The application is by the following method:Receive the finger that target transaction is sent to target user triggered by transmission end subscriber It enables;Whether detection target user has permission browsing objective affairs;It, will when detecting that target user has permission browsing objective affairs Target transaction is sent to target user;When detecting that target user does not have permission browsing objective affairs, detection transmitting terminal is used Whether family has the permission of modification target transaction;When sending permission of the end subscriber with modification target transaction, in transmitting terminal circle Face display reminding information and addition rights option, wherein addition rights option is used to add browsing objective thing to target user The permission of business;After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user;When detection, which sends end subscriber, does not have the permission of modification target transaction, at transmitting terminal interface Display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user, is solved The excessively cumbersome problem of setting to browse right in the related technology, and then reached the effect of the setting procedure of simplified browse right Fruit.
Description of the drawings
The attached drawing constituted part of this application is used for providing further understanding of the present application, the schematic reality of the application Example and its explanation are applied for explaining the application, does not constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the flow chart according to the browse right setting method of affairs provided by the embodiments of the present application;And
Fig. 2 is the schematic diagram that device is arranged according to the browse right of affairs provided by the embodiments of the present application.
Specific implementation mode
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described embodiment is only The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained without making creative work should all belong to the model of the application protection It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way Data can be interchanged in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit Process, method, system, product or equipment those of are not necessarily limited to clearly to list step or unit, but may include without clear It is listing to Chu or for these processes, method, product or equipment intrinsic other steps or unit.
According to an embodiment of the present application, a kind of browse right setting method of affairs is provided.
Fig. 1 is the flow chart according to the browse right setting method of the affairs of the embodiment of the present application.As shown in Figure 1, the party Method includes the following steps:
Step S101 receives the instruction that target transaction is sent to target user triggered by transmission end subscriber.
It should be noted that above-mentioned target transaction is the affairs that user is created using office cooperative system, which can be with It is one of forms such as task, application, report.User can add in above-mentioned affairs in text information, pictorial information, attachment etc. Hold, while the user or it should be understood that the information in the affairs that are jointly processed by the affairs can be set by the way that browse right is arranged User.
Optionally, it sends user and target user is want to server transmission by the client operation interface for cooperative system of handling official business Send the instruction of target transaction.Above-mentioned target user is the user in above-mentioned transmission user communication record, sends user and is sending mesh When marking affairs, by recalling address list come selection target user.
Optionally, sending user can also be by the name or coding of input user come selection target user.
Whether step S102, detection target user have permission browsing objective affairs.
Optionally, whether detection target user has permission browsing objective affairs and includes:Obtain the corresponding permission of target transaction List, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the mark of target user Know information;Whether the identification information of detection target user is stored in permissions list;When the identification information for detecting target user It is stored in permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have The permission of browsing objective affairs.
Optionally, the identification information of above-mentioned user is user corresponding ID, in the corresponding permissions list of above-mentioned target transaction The information of storage is the ID for the user for having permission browsing objective affairs.
Optionally, whether detection target user has permission browsing objective affairs and includes:Obtain target transaction corresponding first Permissions list and the second permissions list, wherein the first permissions list is used to store the mark for the user for having permission browsing objective affairs Know information, the second permissions list is used to store the identification information for the grouping for having permission browsing objective affairs, is grouped by multiple users Composition;Obtain the identification information of the identification information and the grouping where target user of target user;Detect the mark of target user Whether information is stored in the first permissions list, and whether the identification information for detecting the grouping where target user is stored in the second power It limits in list;When detect the identification information storage of target user in the first permissions list and/or where target user point The identification information storage of group then judges that target user has the permission of browsing objective affairs, otherwise sentences in the second permissions list Disconnected target user does not have the permission of browsing objective affairs.
Optionally, the information stored in above-mentioned first permissions list is the ID for the user for having permission browsing objective affairs, on State the ID that the information stored in the second permissions list is the grouping for having permission browsing objective affairs.
It should be noted that according to the difference of department, the user of the same enterprise can be divided into multiple groupings.And then it is being arranged When the browse right of affairs, user can directly select targeted packets, and so all users then in the targeted packets have The permission of browsing objective affairs.Therefore, when whether detection user has the permission of browsing objective affairs, when the first permission The ID of the user is stored in list, then the user has the permission of browsing objective affairs.When not stored in the first permissions list There is the ID of the user, but be stored with the ID that user place is grouped in the second permissions list, then the user still has permission clear Look at target transaction.
Target transaction is sent to target and used by step S103 when detecting that target user has permission browsing objective affairs Family.
Step S104, when detecting that target user does not have permission browsing objective affairs, whether detection sends end subscriber Permission with modification target transaction.
It should be noted that the setting of the above-mentioned browse right to above-mentioned target transaction is also required to modification authority.Cause This, only sending end subscriber has the permission for changing above-mentioned target transaction, could be configured to the browse right of target transaction. The permission of the above-mentioned above-mentioned target transaction of modification includes the permission for the content for changing target transaction and the browsing power of modification target transaction The permission of limit.
Optionally, whether the permission with modification target transaction includes above-mentioned detection transmission end subscriber:Obtain above-mentioned target The corresponding modification authority list of affairs, wherein modification authority list is used to store the mark for the user for having permission modification target transaction Know information;Obtain the identification information for sending end subscriber;Whether the identification information that detection sends end subscriber is stored in modification authority row In table;When detect send end subscriber identification information storage be then judged as that the transmission end subscriber has in modification authority list Otherwise the modification authority of target transaction does not have the modification authority of target transaction.
Step S105 prompts to believe when sending permission of the end subscriber with modification target transaction in transmitting terminal interface display Breath and addition rights option, wherein addition rights option is used to add the permission of browsing objective affairs to target user.
It should be noted that the prompt message of above-mentioned display, which is the current target user of prompt, does not have browsing objective affairs Permission, and ask whether to add permission for the user.Above-mentioned addition rights option is to be shown in the figure of client end interface, user The figure is clicked, then user end to server sends the instruction that permission is added to the user.
Step S106 adds the power of browsing objective affairs to target user after detecting that addition rights option is triggered Limit, and target transaction is sent to target user.
Optionally, after detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, And target transaction is sent to target user and includes:The identification information of target user is added in permissions list;By target thing Business is sent to target user.
It should be noted that the process that the identification information of target user is added to permissions list is, from client to clothes The permission for device request target affairs of being engaged in changes interface, and server the ID of target user is written in the permissions list of target transaction, The modification of target transaction is saved in database.
Optionally, after detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, And target transaction is sent to target user and includes:The identification information of target user is added in the first permissions list;By mesh Mark affairs are sent to target user.
It should be noted that when adding the permission of browsing objective affairs to user, in order to avoid adding to non-targeted user Weighting limit, is not written above-mentioned second permissions list by the ID of the grouping where the user, but only will be in the ID write-ins of the user It states in the first permissions list.
Step S107, when detection, which sends end subscriber, does not have the permission of modification target transaction, in transmitting terminal interface display Prompt message and delivery option;
It should be noted that not having the permission of modification target transaction due to sending end subscriber, mesh can not will be browsed The permission of mark affairs is added to target user.Therefore, above-mentioned prompt message does not have for prompting the user with current goal user The permission of browsing objective affairs, if continue target transaction being sent to target user.
Step S108 sends target transaction after detecting that delivery option is triggered to target user.
It should be noted that in above-mentioned steps S108, the target transaction sent to target user, target user's lack of competence Browsing.
The browse right setting method of affairs provided by the embodiments of the present application is incited somebody to action by receiving by what transmission end subscriber triggered Target transaction is sent to the instruction of target user;Whether detection target user has permission browsing objective affairs;When detecting target When user has permission browsing objective affairs, target transaction is sent to target user;When detect target user do not have permission When browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;There is modification when sending end subscriber When the permission of target transaction, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option is used In the permission for adding browsing objective affairs to target user;After detecting that addition rights option is triggered, add to target user Add the permission of browsing objective affairs, and target transaction is sent to target user;Do not have modification mesh when detection sends end subscriber When marking the permission of affairs, in transmitting terminal interface display prompt message and delivery option;After detecting that delivery option is triggered, to Target user sends target transaction.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
The embodiment of the present application also provides a kind of browse rights of affairs, and device is arranged, it should be noted that the application is real The browse right setting device for applying the affairs of example can be used for executing the browsing power for affairs that the embodiment of the present application is provided Limit setting method.The browse right of affairs provided by the embodiments of the present application setting device is introduced below.
Fig. 2 is the schematic diagram that device is arranged according to the browse right of the affairs of the embodiment of the present application.As shown in Fig. 2, the dress Set including:Receiving unit 10, transmission unit 30, second detection unit 40, the first display unit 50, adds first detection unit 20 Add unit 60, the second display unit 70 and transmission unit 80.
Specifically, target transaction is sent to target user by receiving unit 10 for receiving by what transmission end subscriber triggered Instruction;First detection unit 20, for detecting whether target user has permission browsing objective affairs;Transmission unit 30, is used for When detecting that target user has permission browsing objective affairs, target transaction is sent to target user;Second detection unit 40, For when detecting that target user does not have permission browsing objective affairs, detection to send whether end subscriber has modification target thing The permission of business;First display unit 50 is used for when sending permission of the end subscriber with modification target transaction, at transmitting terminal interface Display reminding information and addition rights option, wherein addition rights option is used to add browsing objective affairs to target user Permission;Adding device 60, for after detecting that addition rights option is triggered, browsing objective affairs to be added to target user Permission, and target transaction is sent to target user;Second display unit 70 is repaiied for not having in detection transmission end subscriber When changing the permission of target transaction, in transmitting terminal interface display prompt message and delivery option;Transmission unit 80, for detecting After delivery option is triggered, target transaction is sent to target user.
Optionally, first detection unit 20 includes:First acquisition module, for obtaining the corresponding permission row of target transaction Table, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Second acquisition module, is used for Obtain the identification information of target user;Whether first detection module, the identification information for detecting target user are stored in permission In list;First judgment module then judges target for working as the identification information storage for detecting target user in permissions list User has the permission of browsing objective affairs, otherwise judges that target user does not have the permission of browsing objective affairs.
Optionally, first detection unit 20 includes:Third acquisition module, for obtaining corresponding first permission of target transaction List and the second permissions list, wherein the first permissions list is used to store the mark letter for the user for having permission browsing objective affairs Breath, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users; 4th acquisition module, the identification information of the grouping where identification information and target user for obtaining target user;Second inspection Module is surveyed, whether the identification information for detecting target user is stored in the first permissions list, where detection target user Whether the identification information of grouping is stored in the second permissions list;When detecting the identification information storage of target user in the first power The identification information storage of the grouping in list and/or where target user is limited in the second permissions list, then judges target user Otherwise permission with browsing objective affairs judges that target user does not have the permission of browsing objective affairs.
Optionally, adding device 60 includes:First add module, for the identification information of target user to be added to permission In list;First sending module, for target transaction to be sent to target user.
Optionally, adding device 60 includes:Second add module, for the identification information of target user to be added to first In permissions list;Second sending module, for target transaction to be sent to target user.
Device is arranged in the browse right of affairs provided by the embodiments of the present application, is received by receiving unit 10 and is used by transmitting terminal The instruction that target transaction is sent to target user of family triggering;It is clear whether the detection target user of first detection unit 20 has permission Look at target transaction;Transmission unit 30 is sent to mesh when detecting that target user has permission browsing objective affairs, by target transaction Mark user;For second detection unit 40 when detecting that target user does not have permission browsing objective affairs, detection sends end subscriber Whether there is the permission of modification target transaction;First display unit 50 is sending permission of the end subscriber with modification target transaction When, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option to target user for adding Add the permission of browsing objective affairs;Adding device 60 adds clear after detecting that addition rights option is triggered to target user It lookes at the permission of target transaction, and target transaction is sent to target user;Second display unit 70 sends end subscriber not in detection When with the permission for changing target transaction, in transmitting terminal interface display prompt message and delivery option;Transmission unit 80 is detecting After being triggered to delivery option, target transaction is sent to target user, solves the setting in the related technology to browse right In cumbersome problem, and then the setting procedure of simplified browse right is achieved the effect that.
The browse right setting device of affairs includes processor and memory, and the above-mentioned receiving unit 10, first that connects detects list Member 20, transmission unit 30, second detection unit 40, the first display unit 50, adding device 60, the second display unit 70 and transmission Units 80 etc. are used as program unit storage in memory, and above procedure unit stored in memory is executed by processor To realize corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be arranged one Or more, the setting procedure of simplified browse right is made by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include at least one deposit Store up chip.
An embodiment of the present invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor The browse right setting method of existing affairs.
An embodiment of the present invention provides a kind of processor, processor is for running program, wherein program executes thing when running The browse right setting method of business.
An embodiment of the present invention provides a kind of equipment, equipment include processor, memory and storage on a memory and can The program run on a processor, processor realize following steps when executing program:Receive by transmission end subscriber trigger by mesh Mark affairs are sent to the instruction of target user;Whether detection target user has permission browsing objective affairs;When detect target use When family has permission browsing objective affairs, target transaction is sent to target user;When detect target user do not have permission it is clear Look at target transaction when, detection send end subscriber whether have modification target transaction permission;There is modification mesh when sending end subscriber When marking the permission of affairs, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option is used for The permission of browsing objective affairs is added to target user;After detecting that addition rights option is triggered, added to target user The permission of browsing objective affairs, and target transaction is sent to target user;Do not have modification target when detection sends end subscriber When the permission of affairs, in transmitting terminal interface display prompt message and delivery option;After detecting that delivery option is triggered, to mesh It marks user and sends target transaction.
Whether detection target user, which has permission browsing objective affairs, includes:The corresponding permissions list of target transaction is obtained, In, permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the identification information of target user; Whether the identification information of detection target user is stored in permissions list;When detecting the identification information storage of target user in power It limits in list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have browsing objective The permission of affairs.
Whether detection target user, which has permission browsing objective affairs, includes:Obtain corresponding first permissions list of target transaction With the second permissions list, wherein the first permissions list is used to store the identification information for the user for having permission browsing objective affairs, the Two permissions lists are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;It obtains The identification information of the identification information and the grouping where target user of target user;Whether the identification information of detection target user is deposited It is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in the second permissions list; When the mark letter for detecting grouping of the identification information storage of target user in the first permissions list and/or where target user Breath is stored in the second permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge target user Permission without browsing objective affairs.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user and include:The identification information of target user is added in permissions list;Target transaction is sent To target user.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user and include:The identification information of target user is added in the first permissions list;By target transaction It is sent to target user.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when being executed on data processing equipment, are adapted for carrying out just The program of beginningization there are as below methods step:Receive the finger that target transaction is sent to target user triggered by transmission end subscriber It enables;Whether detection target user has permission browsing objective affairs;It, will when detecting that target user has permission browsing objective affairs Target transaction is sent to target user;When detecting that target user does not have permission browsing objective affairs, detection transmitting terminal is used Whether family has the permission of modification target transaction;When sending permission of the end subscriber with modification target transaction, in transmitting terminal circle Face display reminding information and addition rights option, wherein addition rights option is used to add browsing objective thing to target user The permission of business;After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user;When detection, which sends end subscriber, does not have the permission of modification target transaction, at transmitting terminal interface Display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user.
Whether detection target user, which has permission browsing objective affairs, includes:The corresponding permissions list of target transaction is obtained, In, permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the identification information of target user; Whether the identification information of detection target user is stored in permissions list;When detecting the identification information storage of target user in power It limits in list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have browsing objective The permission of affairs.
Whether detection target user, which has permission browsing objective affairs, includes:Obtain corresponding first permissions list of target transaction With the second permissions list, wherein the first permissions list is used to store the identification information for the user for having permission browsing objective affairs, the Two permissions lists are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;It obtains The identification information of the identification information and the grouping where target user of target user;Whether the identification information of detection target user is deposited It is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in the second permissions list; When the mark letter for detecting grouping of the identification information storage of target user in the first permissions list and/or where target user Breath is stored in the second permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge target user Permission without browsing objective affairs.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user and include:The identification information of target user is added in permissions list;Target transaction is sent To target user.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh Mark affairs are sent to target user and include:The identification information of target user is added in the first permissions list;By target transaction It is sent to target user.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, the application can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application be with reference to according to the method, apparatus of the embodiment of the present application and the flow chart of computer program product and/or Block diagram describes.It should be understood that each flow that can be realized by computer program instructions in flowchart and/or the block diagram and/or The combination of flow and/or box in box and flowchart and/or the block diagram.These computer program instructions can be provided to arrive All-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one Machine so that the instruction executed by computer or the processor of other programmable data processing devices generates flowing The device for the function of being specified in one flow of journey figure or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
It these are only embodiments herein, be not intended to limit this application.To those skilled in the art, The application can have various modifications and variations.It is all within spirit herein and principle made by any modification, equivalent replacement, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of browse right setting method of affairs, which is characterized in that the method includes:
Receive the instruction that target transaction is sent to target user triggered by transmission end subscriber;
Detect whether the target user has permission the browsing target transaction;
When detecting that the target user has permission the browsing target transaction, the target transaction is sent to the target User;
When detecting that the target user does not have the permission browsing target transaction, detect whether the transmission end subscriber has There is the permission for changing the target transaction;
When the transmission end subscriber has the permission for changing the target transaction, in transmitting terminal interface display prompt message and Add rights option, wherein the addition rights option is used to add the power for browsing the target transaction to the target user Limit;
After detecting that the addition rights option is triggered, the power for browsing the target transaction is added to the target user Limit, and the target transaction is sent to the target user;
When detecting the permission for sending end subscriber without the modification target transaction, carried in the transmitting terminal interface display Show information and delivery option;
After detecting that the delivery option is triggered, the target transaction is sent to the target user.
2. according to the method described in claim 1, it is characterized in that, whether the detection target user has permission browsing institute Stating target transaction includes:
Obtain the corresponding permissions list of the target transaction, wherein the permissions list has permission the browsing mesh for storing Mark the identification information of the user of affairs;
Obtain the identification information of the target user;
Whether the identification information for detecting the target user is stored in the permissions list;
When the identification information storage for detecting the target user is in the permissions list, then judge that the target user has The permission of the target transaction is browsed, otherwise judges that the target user does not have the permission for browsing the target transaction.
3. according to the method described in claim 1, it is characterized in that, whether the detection target user has permission browsing institute Stating target transaction includes:
Obtain corresponding first permissions list of the target transaction and the second permissions list, wherein first permissions list is used The identification information for the user for browsing the target transaction is had permission in storage, second permissions list has permission clear for storage Look at the target transaction grouping identification information, the grouping is made of multiple users;
Obtain the identification information of the identification information and the grouping where the target user of the target user;
Whether the identification information for detecting the target user is stored in first permissions list, detects the target user institute The identification information of grouping whether be stored in second permissions list;
When detecting the identification information storage of the target user in first permissions list and/or target user institute Grouping identification information storage in second permissions list, then judge that the target user has and browse the target Otherwise the permission of affairs judges that the target user does not have the permission for browsing the target transaction.
4. according to the method described in claim 2, it is characterized in that, described ought detect that the addition rights option is triggered Afterwards, the permission for browsing the target transaction is added to the target user, and the target transaction is sent to the target and is used Family includes:
The identification information of the target user is added in the permissions list;
The target transaction is sent to the target user.
5. according to the method described in claim 3, it is characterized in that, described ought detect that the addition rights option is triggered Afterwards, the permission for browsing the target transaction is added to the target user, and the target transaction is sent to the target and is used Family includes:
The identification information of the target user is added in first permissions list;
The target transaction is sent to the target user.
6. device is arranged in the browse rights of affairs a kind of, which is characterized in that described device includes:
Receiving unit, for receiving the instruction that target transaction is sent to target user triggered by transmission end subscriber;
First detection unit, for detecting whether the target user has permission the browsing target transaction;
Transmission unit, for detect the target user have permission browse the target transaction when, by the target transaction It is sent to the target user;
Second detection unit, for when detecting that the target user does not have the permission browsing target transaction, detecting institute It states and sends whether end subscriber has the permission for changing the target transaction;
First display unit is used for when the transmission end subscriber has the permission for changing the target transaction, in transmitting terminal circle Face display reminding information and addition rights option, wherein the addition rights option is used to add to the target user clear Look at the permission of the target transaction;
Adding device, for after detecting that the addition rights option is triggered, being added described in browsing to the target user The permission of target transaction, and the target transaction is sent to the target user;
Second display unit is used for when detecting the permission for sending end subscriber without the modification target transaction, in institute State transmitting terminal interface display prompt message and delivery option;
Transmission unit, for after detecting that the delivery option is triggered, the target transaction to be sent to the target user.
7. device according to claim 6, which is characterized in that the first detection unit includes:
First acquisition module, for obtaining the corresponding permissions list of the target transaction, wherein the permissions list is for storing Have permission the identification information for the user for browsing the target transaction;
Second acquisition module, the identification information for obtaining the target user;
Whether first detection module, the identification information for detecting the target user are stored in the permissions list;
First judgment module is then sentenced for working as the identification information storage for detecting the target user in the permissions list The target user of breaking has the permission for browsing the target transaction, otherwise judges that the target user does not have and browses the mesh Mark the permission of affairs.
8. device according to claim 7, which is characterized in that the first detection unit includes:
Third acquisition module, for obtaining corresponding first permissions list of the target transaction and the second permissions list, wherein institute The first permissions list is stated for storing the identification information for having permission the user for browsing the target transaction, second permissions list For storing the identification information for having permission the grouping for browsing the target transaction, the grouping is made of multiple users;
4th acquisition module, the mark of the grouping where identification information and the target user for obtaining the target user Information;
Whether the second detection module, the identification information for detecting the target user are stored in first permissions list, Whether the identification information for detecting the grouping where the target user is stored in second permissions list;
When detecting the identification information storage of the target user in first permissions list and/or target user institute Grouping identification information storage in second permissions list, then judge that the target user has and browse the target Otherwise the permission of affairs judges that the target user does not have the permission for browsing the target transaction.
9. a kind of storage medium, which is characterized in that storage medium include storage program, wherein program execution profit require 1 to The browse right setting method of any one of 5 affairs.
10. a kind of processor, which is characterized in that processor is for running program, wherein perform claim requires 1 when program is run To the browse right setting method of any one of 5 affairs.
CN201810202880.9A 2018-03-12 2018-03-12 A kind of the browse right setting method and device of affairs Pending CN108446168A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810202880.9A CN108446168A (en) 2018-03-12 2018-03-12 A kind of the browse right setting method and device of affairs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810202880.9A CN108446168A (en) 2018-03-12 2018-03-12 A kind of the browse right setting method and device of affairs

Publications (1)

Publication Number Publication Date
CN108446168A true CN108446168A (en) 2018-08-24

Family

ID=63194721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810202880.9A Pending CN108446168A (en) 2018-03-12 2018-03-12 A kind of the browse right setting method and device of affairs

Country Status (1)

Country Link
CN (1) CN108446168A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941412A (en) * 2019-11-28 2020-03-31 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging
CN110955882A (en) * 2018-09-26 2020-04-03 北京国双科技有限公司 User permission setting method and device
CN111708758A (en) * 2020-06-09 2020-09-25 孟磊 Construction method and application method of judicial-assisted case management database

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769602A (en) * 2011-05-03 2012-11-07 中国移动通信集团山东有限公司 Method, system and device for temporary permission control
US20130086182A1 (en) * 2011-09-29 2013-04-04 International Business Machines Corporation Short message service system
CN103095642A (en) * 2011-10-27 2013-05-08 中兴通讯股份有限公司 Multi-media messaging method and multi-media messaging method
CN103368765A (en) * 2012-04-10 2013-10-23 阿里巴巴集团控股有限公司 Management system permission adding method and device
CN105743973A (en) * 2016-01-22 2016-07-06 上海科牛信息科技有限公司 Multi-user multi-device real-time synchronous cloud cooperation method and system
CN106506550A (en) * 2016-12-27 2017-03-15 Tcl集团股份有限公司 A kind of shared method and apparatus of smart machine control authority

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769602A (en) * 2011-05-03 2012-11-07 中国移动通信集团山东有限公司 Method, system and device for temporary permission control
US20130086182A1 (en) * 2011-09-29 2013-04-04 International Business Machines Corporation Short message service system
CN103095642A (en) * 2011-10-27 2013-05-08 中兴通讯股份有限公司 Multi-media messaging method and multi-media messaging method
CN103368765A (en) * 2012-04-10 2013-10-23 阿里巴巴集团控股有限公司 Management system permission adding method and device
CN105743973A (en) * 2016-01-22 2016-07-06 上海科牛信息科技有限公司 Multi-user multi-device real-time synchronous cloud cooperation method and system
CN106506550A (en) * 2016-12-27 2017-03-15 Tcl集团股份有限公司 A kind of shared method and apparatus of smart machine control authority

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHANG 等: ""Transmitting multiple secrets securely in broadcasting networks"", 《1993 PROCEEDINGS OF IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY》 *
王昕: ""可跨域电子文档安全监管系统的设计与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955882A (en) * 2018-09-26 2020-04-03 北京国双科技有限公司 User permission setting method and device
CN110941412A (en) * 2019-11-28 2020-03-31 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging
CN110941412B (en) * 2019-11-28 2023-09-22 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures
CN111708758A (en) * 2020-06-09 2020-09-25 孟磊 Construction method and application method of judicial-assisted case management database
CN111708758B (en) * 2020-06-09 2022-12-30 孟磊 Construction method and application method of judicial assistance case management database

Similar Documents

Publication Publication Date Title
US9858626B2 (en) Social sharing of security information in a group
Roland et al. Security vulnerabilities of the NDEF signature record type
CN110189121B (en) Data processing method and device, block chain client and block chain link point
CN101984692B (en) A kind of method and device for preventing Malware from sending data
CN108960863A (en) A kind of food block chain retroactive method, device and electronic equipment
CN107656825A (en) Message treatment method, apparatus and system
CN108509806A (en) A kind of big data precision marketing system and equipment with secret protection
CN107979525A (en) A kind of red packet distribution method, equipment and medium
CN108446168A (en) A kind of the browse right setting method and device of affairs
CN109146699A (en) Blind date friend-making integrated management approach and system based on block chain
CN104572907A (en) Business object acquisition method and device
CN111132172A (en) Method, device and medium for preventing telecommunication fraud based on block chain
CN110442502A (en) A kind of method, apparatus buried a little, equipment and storage medium
CN107276970A (en) One kind is unbinded, binding method and device
CN107423583B (en) A kind of software protecting device remapping method and device
Schapranow et al. Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains
CN102946401B (en) A kind of data creation method, device and equipment
CN104956393B (en) It is communicated using user descriptors with the third party that social networking system user carries out
CN108492119A (en) Information anti-fake authentication method, device, equipment and medium based on block chain
CN112597525B (en) Data processing method and device based on privacy protection and server
CN111600942B (en) Report processing method, device and equipment
JP2017027552A (en) Information collection system and information management system
CN108512803A (en) Remind the method and device of change account bound phone number
CN106657674A (en) Conversation data batch processing method and terminal
CN106204125A (en) A kind of pricing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 514000 Fifth Floor, World Business Center, Meizhou City, Guangdong Province

Applicant after: GUANGDONG 115 TECHNOLOGY CO., LTD.

Address before: 523808 6th Floor, Building 17, Songkeyuan, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Applicant before: GUANGDONG 115 TECHNOLOGY CO., LTD.

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180824