CN108446168A - A kind of the browse right setting method and device of affairs - Google Patents
A kind of the browse right setting method and device of affairs Download PDFInfo
- Publication number
- CN108446168A CN108446168A CN201810202880.9A CN201810202880A CN108446168A CN 108446168 A CN108446168 A CN 108446168A CN 201810202880 A CN201810202880 A CN 201810202880A CN 108446168 A CN108446168 A CN 108446168A
- Authority
- CN
- China
- Prior art keywords
- target
- target user
- permission
- user
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/466—Transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Abstract
This application discloses the browse right setting methods and device of a kind of affairs.This method is:Receive the instruction that target transaction is sent to target user;Whether detection target user has permission browsing objective affairs;When having permission browsing objective affairs, target transaction is sent to target user;When without permission browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;When with when, transmitting terminal interface display prompt message and addition rights option;After detecting that addition rights option is triggered, browse right is added to target user, and target transaction is sent to target user;When detection does not have the permission of modification target transaction, display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user.By the above method, solve the problems, such as that the setting in the related technology to browse right is excessively cumbersome, and then achieved the effect that the setting procedure of simplified browse right.
Description
Technical field
This application involves office collaboration software fields, a kind of browse right setting method in particular to affairs and
Device.
Background technology
Office collaboration software is wide as a kind of office auxiliary tool effectively improving team collaboration's ability and working efficiency
In the enterprise of the general different scales applied to every field.Employee user in enterprise can initiate thing by collaboration software of handling official business
Business, and other are set and has permission the user for browsing the affairs.After affairs initiation, user can need other users to understand
When the affair related information, which is sent to other users.However, in some cases, receiving the user of the affairs simultaneously
The permission of the affairs is not browsed, and send the user of the affairs before transmitting and not to be noted this point, then send the thing
The user of object needs to exit current transmission operation, and the operation of browse right opening is carried out into the interface of setting browse right,
Carry out the operation of affairs transmission again later.The above-mentioned setting to browse right is excessively cumbersome.
For the excessively cumbersome problem of the setting to browse right in the related technology, effective solution side is not yet proposed at present
Case.
Invention content
This application provides the browse right setting methods and device of a kind of affairs, to solve in the related technology to weigh browsing
Excessively cumbersome problem is arranged in limit.
According to the one side of the application, a kind of browse right setting method of affairs is provided.This method includes:It receives
The instruction that target transaction is sent to target user triggered by transmission end subscriber;Whether detection target user has permission browsing mesh
Mark affairs;When detecting that target user has permission browsing objective affairs, target transaction is sent to target user;When detecting
When target user does not have permission browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;When
When sending end subscriber has the permission of modification target transaction, in transmitting terminal interface display prompt message and rights option is added,
Wherein, addition rights option is used to add the permission of browsing objective affairs to target user;Rights option quilt is added when detecting
After triggering, the permission of browsing objective affairs is added to target user, and target transaction is sent to target user;When detection is sent
When end subscriber does not have the permission of modification target transaction, in transmitting terminal interface display prompt message and delivery option;When detecting
After delivery option is triggered, target transaction is sent to target user.
Further, whether detection target user has permission browsing objective affairs and includes:Obtain the corresponding power of target transaction
Limit list, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain target user's
Identification information;Whether the identification information of detection target user is stored in permissions list;When the mark letter for detecting target user
Breath is stored in permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have
There is the permission of browsing objective affairs.
Further, whether detection target user has permission browsing objective affairs and includes:Obtain target transaction corresponding the
One permissions list and the second permissions list, wherein the first permissions list is for storing the user's for having permission browsing objective affairs
Identification information, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, are grouped by multiple use
Family forms;Obtain the identification information of the identification information and the grouping where target user of target user;Detect the mark of target user
Know whether information is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in second
In permissions list;When detecting the identification information storage of target user in the first permissions list and/or where target user
The identification information storage of grouping then judges that target user has the permission of browsing objective affairs, otherwise in the second permissions list
Judge that target user does not have the permission of browsing objective affairs.
Further, after detecting that addition rights option is triggered, the power of browsing objective affairs is added to target user
Limit, and target transaction is sent to target user and includes:The identification information of target user is added in permissions list;By target
Affairs are sent to target user.
Further, after detecting that addition rights option is triggered, the power of browsing objective affairs is added to target user
Limit, and target transaction is sent to target user and includes:The identification information of target user is added in the first permissions list;It will
Target transaction is sent to target user.
According to the another aspect of the application, a kind of browse right setting device of affairs is provided.The device includes:It receives
Unit, for receiving the instruction that target transaction is sent to target user triggered by transmission end subscriber;First detection unit is used
In detection, whether target user has permission browsing objective affairs;Transmission unit, for detecting that target user has permission browsing
When target transaction, target transaction is sent to target user;Second detection unit, for detecting target user without power
When limiting browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;First display unit is used for
When sending end subscriber has the permission of modification target transaction, in transmitting terminal interface display prompt message and rights option is added,
Wherein, addition rights option is used to add the permission of browsing objective affairs to target user;Adding device, for adding detecting
After adding rights option to be triggered, the permission of browsing objective affairs is added to target user, and target transaction is sent to target and is used
Family;Second display unit is used to, when detection sends end subscriber and do not have the permission of modification target transaction, show at transmitting terminal interface
Show prompt message and delivery option;Transmission unit, for after detecting that delivery option is triggered, target to be sent to target user
Affairs.
Further, first detection unit includes:First acquisition module, for obtaining the corresponding permission row of target transaction
Table, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Second acquisition module, is used for
Obtain the identification information of target user;Whether first detection module, the identification information for detecting target user are stored in permission
In list;First judgment module then judges target for working as the identification information storage for detecting target user in permissions list
User has the permission of browsing objective affairs, otherwise judges that target user does not have the permission of browsing objective affairs.
Further, first detection unit includes:Third acquisition module, for obtaining corresponding first permission of target transaction
List and the second permissions list, wherein the first permissions list is used to store the mark letter for the user for having permission browsing objective affairs
Breath, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;
4th acquisition module, the identification information of the grouping where identification information and target user for obtaining target user;Second inspection
Module is surveyed, whether the identification information for detecting target user is stored in the first permissions list, where detection target user
Whether the identification information of grouping is stored in the second permissions list;When detecting the identification information storage of target user in the first power
The identification information storage of the grouping in list and/or where target user is limited in the second permissions list, then judges target user
Otherwise permission with browsing objective affairs judges that target user does not have the permission of browsing objective affairs.
Further, adding device includes:First add module, for the identification information of target user to be added to permission
In list;First sending module, for target transaction to be sent to target user.
Further, adding device includes:Second add module, for the identification information of target user to be added to first
In permissions list;Second sending module, for target transaction to be sent to target user.
According to the another aspect of the application, a kind of storage medium is provided, above-mentioned storage medium includes the program of storage,
In, program executes the browse right setting method of the affairs of above-mentioned any one.
According to the another aspect of the application, a kind of processor is provided, above-mentioned processor is for running program, wherein journey
The browse right setting method of the affairs of above-mentioned any one is executed when sort run.
The application is by the following method:Receive the finger that target transaction is sent to target user triggered by transmission end subscriber
It enables;Whether detection target user has permission browsing objective affairs;It, will when detecting that target user has permission browsing objective affairs
Target transaction is sent to target user;When detecting that target user does not have permission browsing objective affairs, detection transmitting terminal is used
Whether family has the permission of modification target transaction;When sending permission of the end subscriber with modification target transaction, in transmitting terminal circle
Face display reminding information and addition rights option, wherein addition rights option is used to add browsing objective thing to target user
The permission of business;After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user;When detection, which sends end subscriber, does not have the permission of modification target transaction, at transmitting terminal interface
Display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user, is solved
The excessively cumbersome problem of setting to browse right in the related technology, and then reached the effect of the setting procedure of simplified browse right
Fruit.
Description of the drawings
The attached drawing constituted part of this application is used for providing further understanding of the present application, the schematic reality of the application
Example and its explanation are applied for explaining the application, does not constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the flow chart according to the browse right setting method of affairs provided by the embodiments of the present application;And
Fig. 2 is the schematic diagram that device is arranged according to the browse right of affairs provided by the embodiments of the present application.
Specific implementation mode
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described embodiment is only
The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
The every other embodiment that member is obtained without making creative work should all belong to the model of the application protection
It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way
Data can be interchanged in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit
Process, method, system, product or equipment those of are not necessarily limited to clearly to list step or unit, but may include without clear
It is listing to Chu or for these processes, method, product or equipment intrinsic other steps or unit.
According to an embodiment of the present application, a kind of browse right setting method of affairs is provided.
Fig. 1 is the flow chart according to the browse right setting method of the affairs of the embodiment of the present application.As shown in Figure 1, the party
Method includes the following steps:
Step S101 receives the instruction that target transaction is sent to target user triggered by transmission end subscriber.
It should be noted that above-mentioned target transaction is the affairs that user is created using office cooperative system, which can be with
It is one of forms such as task, application, report.User can add in above-mentioned affairs in text information, pictorial information, attachment etc.
Hold, while the user or it should be understood that the information in the affairs that are jointly processed by the affairs can be set by the way that browse right is arranged
User.
Optionally, it sends user and target user is want to server transmission by the client operation interface for cooperative system of handling official business
Send the instruction of target transaction.Above-mentioned target user is the user in above-mentioned transmission user communication record, sends user and is sending mesh
When marking affairs, by recalling address list come selection target user.
Optionally, sending user can also be by the name or coding of input user come selection target user.
Whether step S102, detection target user have permission browsing objective affairs.
Optionally, whether detection target user has permission browsing objective affairs and includes:Obtain the corresponding permission of target transaction
List, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the mark of target user
Know information;Whether the identification information of detection target user is stored in permissions list;When the identification information for detecting target user
It is stored in permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have
The permission of browsing objective affairs.
Optionally, the identification information of above-mentioned user is user corresponding ID, in the corresponding permissions list of above-mentioned target transaction
The information of storage is the ID for the user for having permission browsing objective affairs.
Optionally, whether detection target user has permission browsing objective affairs and includes:Obtain target transaction corresponding first
Permissions list and the second permissions list, wherein the first permissions list is used to store the mark for the user for having permission browsing objective affairs
Know information, the second permissions list is used to store the identification information for the grouping for having permission browsing objective affairs, is grouped by multiple users
Composition;Obtain the identification information of the identification information and the grouping where target user of target user;Detect the mark of target user
Whether information is stored in the first permissions list, and whether the identification information for detecting the grouping where target user is stored in the second power
It limits in list;When detect the identification information storage of target user in the first permissions list and/or where target user point
The identification information storage of group then judges that target user has the permission of browsing objective affairs, otherwise sentences in the second permissions list
Disconnected target user does not have the permission of browsing objective affairs.
Optionally, the information stored in above-mentioned first permissions list is the ID for the user for having permission browsing objective affairs, on
State the ID that the information stored in the second permissions list is the grouping for having permission browsing objective affairs.
It should be noted that according to the difference of department, the user of the same enterprise can be divided into multiple groupings.And then it is being arranged
When the browse right of affairs, user can directly select targeted packets, and so all users then in the targeted packets have
The permission of browsing objective affairs.Therefore, when whether detection user has the permission of browsing objective affairs, when the first permission
The ID of the user is stored in list, then the user has the permission of browsing objective affairs.When not stored in the first permissions list
There is the ID of the user, but be stored with the ID that user place is grouped in the second permissions list, then the user still has permission clear
Look at target transaction.
Target transaction is sent to target and used by step S103 when detecting that target user has permission browsing objective affairs
Family.
Step S104, when detecting that target user does not have permission browsing objective affairs, whether detection sends end subscriber
Permission with modification target transaction.
It should be noted that the setting of the above-mentioned browse right to above-mentioned target transaction is also required to modification authority.Cause
This, only sending end subscriber has the permission for changing above-mentioned target transaction, could be configured to the browse right of target transaction.
The permission of the above-mentioned above-mentioned target transaction of modification includes the permission for the content for changing target transaction and the browsing power of modification target transaction
The permission of limit.
Optionally, whether the permission with modification target transaction includes above-mentioned detection transmission end subscriber:Obtain above-mentioned target
The corresponding modification authority list of affairs, wherein modification authority list is used to store the mark for the user for having permission modification target transaction
Know information;Obtain the identification information for sending end subscriber;Whether the identification information that detection sends end subscriber is stored in modification authority row
In table;When detect send end subscriber identification information storage be then judged as that the transmission end subscriber has in modification authority list
Otherwise the modification authority of target transaction does not have the modification authority of target transaction.
Step S105 prompts to believe when sending permission of the end subscriber with modification target transaction in transmitting terminal interface display
Breath and addition rights option, wherein addition rights option is used to add the permission of browsing objective affairs to target user.
It should be noted that the prompt message of above-mentioned display, which is the current target user of prompt, does not have browsing objective affairs
Permission, and ask whether to add permission for the user.Above-mentioned addition rights option is to be shown in the figure of client end interface, user
The figure is clicked, then user end to server sends the instruction that permission is added to the user.
Step S106 adds the power of browsing objective affairs to target user after detecting that addition rights option is triggered
Limit, and target transaction is sent to target user.
Optionally, after detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user,
And target transaction is sent to target user and includes:The identification information of target user is added in permissions list;By target thing
Business is sent to target user.
It should be noted that the process that the identification information of target user is added to permissions list is, from client to clothes
The permission for device request target affairs of being engaged in changes interface, and server the ID of target user is written in the permissions list of target transaction,
The modification of target transaction is saved in database.
Optionally, after detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user,
And target transaction is sent to target user and includes:The identification information of target user is added in the first permissions list;By mesh
Mark affairs are sent to target user.
It should be noted that when adding the permission of browsing objective affairs to user, in order to avoid adding to non-targeted user
Weighting limit, is not written above-mentioned second permissions list by the ID of the grouping where the user, but only will be in the ID write-ins of the user
It states in the first permissions list.
Step S107, when detection, which sends end subscriber, does not have the permission of modification target transaction, in transmitting terminal interface display
Prompt message and delivery option;
It should be noted that not having the permission of modification target transaction due to sending end subscriber, mesh can not will be browsed
The permission of mark affairs is added to target user.Therefore, above-mentioned prompt message does not have for prompting the user with current goal user
The permission of browsing objective affairs, if continue target transaction being sent to target user.
Step S108 sends target transaction after detecting that delivery option is triggered to target user.
It should be noted that in above-mentioned steps S108, the target transaction sent to target user, target user's lack of competence
Browsing.
The browse right setting method of affairs provided by the embodiments of the present application is incited somebody to action by receiving by what transmission end subscriber triggered
Target transaction is sent to the instruction of target user;Whether detection target user has permission browsing objective affairs;When detecting target
When user has permission browsing objective affairs, target transaction is sent to target user;When detect target user do not have permission
When browsing objective affairs, detection sends whether end subscriber has the permission of modification target transaction;There is modification when sending end subscriber
When the permission of target transaction, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option is used
In the permission for adding browsing objective affairs to target user;After detecting that addition rights option is triggered, add to target user
Add the permission of browsing objective affairs, and target transaction is sent to target user;Do not have modification mesh when detection sends end subscriber
When marking the permission of affairs, in transmitting terminal interface display prompt message and delivery option;After detecting that delivery option is triggered, to
Target user sends target transaction.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
The embodiment of the present application also provides a kind of browse rights of affairs, and device is arranged, it should be noted that the application is real
The browse right setting device for applying the affairs of example can be used for executing the browsing power for affairs that the embodiment of the present application is provided
Limit setting method.The browse right of affairs provided by the embodiments of the present application setting device is introduced below.
Fig. 2 is the schematic diagram that device is arranged according to the browse right of the affairs of the embodiment of the present application.As shown in Fig. 2, the dress
Set including:Receiving unit 10, transmission unit 30, second detection unit 40, the first display unit 50, adds first detection unit 20
Add unit 60, the second display unit 70 and transmission unit 80.
Specifically, target transaction is sent to target user by receiving unit 10 for receiving by what transmission end subscriber triggered
Instruction;First detection unit 20, for detecting whether target user has permission browsing objective affairs;Transmission unit 30, is used for
When detecting that target user has permission browsing objective affairs, target transaction is sent to target user;Second detection unit 40,
For when detecting that target user does not have permission browsing objective affairs, detection to send whether end subscriber has modification target thing
The permission of business;First display unit 50 is used for when sending permission of the end subscriber with modification target transaction, at transmitting terminal interface
Display reminding information and addition rights option, wherein addition rights option is used to add browsing objective affairs to target user
Permission;Adding device 60, for after detecting that addition rights option is triggered, browsing objective affairs to be added to target user
Permission, and target transaction is sent to target user;Second display unit 70 is repaiied for not having in detection transmission end subscriber
When changing the permission of target transaction, in transmitting terminal interface display prompt message and delivery option;Transmission unit 80, for detecting
After delivery option is triggered, target transaction is sent to target user.
Optionally, first detection unit 20 includes:First acquisition module, for obtaining the corresponding permission row of target transaction
Table, wherein permissions list is used to store the identification information for the user for having permission browsing objective affairs;Second acquisition module, is used for
Obtain the identification information of target user;Whether first detection module, the identification information for detecting target user are stored in permission
In list;First judgment module then judges target for working as the identification information storage for detecting target user in permissions list
User has the permission of browsing objective affairs, otherwise judges that target user does not have the permission of browsing objective affairs.
Optionally, first detection unit 20 includes:Third acquisition module, for obtaining corresponding first permission of target transaction
List and the second permissions list, wherein the first permissions list is used to store the mark letter for the user for having permission browsing objective affairs
Breath, the second permissions list are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;
4th acquisition module, the identification information of the grouping where identification information and target user for obtaining target user;Second inspection
Module is surveyed, whether the identification information for detecting target user is stored in the first permissions list, where detection target user
Whether the identification information of grouping is stored in the second permissions list;When detecting the identification information storage of target user in the first power
The identification information storage of the grouping in list and/or where target user is limited in the second permissions list, then judges target user
Otherwise permission with browsing objective affairs judges that target user does not have the permission of browsing objective affairs.
Optionally, adding device 60 includes:First add module, for the identification information of target user to be added to permission
In list;First sending module, for target transaction to be sent to target user.
Optionally, adding device 60 includes:Second add module, for the identification information of target user to be added to first
In permissions list;Second sending module, for target transaction to be sent to target user.
Device is arranged in the browse right of affairs provided by the embodiments of the present application, is received by receiving unit 10 and is used by transmitting terminal
The instruction that target transaction is sent to target user of family triggering;It is clear whether the detection target user of first detection unit 20 has permission
Look at target transaction;Transmission unit 30 is sent to mesh when detecting that target user has permission browsing objective affairs, by target transaction
Mark user;For second detection unit 40 when detecting that target user does not have permission browsing objective affairs, detection sends end subscriber
Whether there is the permission of modification target transaction;First display unit 50 is sending permission of the end subscriber with modification target transaction
When, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option to target user for adding
Add the permission of browsing objective affairs;Adding device 60 adds clear after detecting that addition rights option is triggered to target user
It lookes at the permission of target transaction, and target transaction is sent to target user;Second display unit 70 sends end subscriber not in detection
When with the permission for changing target transaction, in transmitting terminal interface display prompt message and delivery option;Transmission unit 80 is detecting
After being triggered to delivery option, target transaction is sent to target user, solves the setting in the related technology to browse right
In cumbersome problem, and then the setting procedure of simplified browse right is achieved the effect that.
The browse right setting device of affairs includes processor and memory, and the above-mentioned receiving unit 10, first that connects detects list
Member 20, transmission unit 30, second detection unit 40, the first display unit 50, adding device 60, the second display unit 70 and transmission
Units 80 etc. are used as program unit storage in memory, and above procedure unit stored in memory is executed by processor
To realize corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be arranged one
Or more, the setting procedure of simplified browse right is made by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include at least one deposit
Store up chip.
An embodiment of the present invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor
The browse right setting method of existing affairs.
An embodiment of the present invention provides a kind of processor, processor is for running program, wherein program executes thing when running
The browse right setting method of business.
An embodiment of the present invention provides a kind of equipment, equipment include processor, memory and storage on a memory and can
The program run on a processor, processor realize following steps when executing program:Receive by transmission end subscriber trigger by mesh
Mark affairs are sent to the instruction of target user;Whether detection target user has permission browsing objective affairs;When detect target use
When family has permission browsing objective affairs, target transaction is sent to target user;When detect target user do not have permission it is clear
Look at target transaction when, detection send end subscriber whether have modification target transaction permission;There is modification mesh when sending end subscriber
When marking the permission of affairs, in transmitting terminal interface display prompt message and addition rights option, wherein addition rights option is used for
The permission of browsing objective affairs is added to target user;After detecting that addition rights option is triggered, added to target user
The permission of browsing objective affairs, and target transaction is sent to target user;Do not have modification target when detection sends end subscriber
When the permission of affairs, in transmitting terminal interface display prompt message and delivery option;After detecting that delivery option is triggered, to mesh
It marks user and sends target transaction.
Whether detection target user, which has permission browsing objective affairs, includes:The corresponding permissions list of target transaction is obtained,
In, permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the identification information of target user;
Whether the identification information of detection target user is stored in permissions list;When detecting the identification information storage of target user in power
It limits in list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have browsing objective
The permission of affairs.
Whether detection target user, which has permission browsing objective affairs, includes:Obtain corresponding first permissions list of target transaction
With the second permissions list, wherein the first permissions list is used to store the identification information for the user for having permission browsing objective affairs, the
Two permissions lists are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;It obtains
The identification information of the identification information and the grouping where target user of target user;Whether the identification information of detection target user is deposited
It is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in the second permissions list;
When the mark letter for detecting grouping of the identification information storage of target user in the first permissions list and/or where target user
Breath is stored in the second permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge target user
Permission without browsing objective affairs.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user and include:The identification information of target user is added in permissions list;Target transaction is sent
To target user.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user and include:The identification information of target user is added in the first permissions list;By target transaction
It is sent to target user.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when being executed on data processing equipment, are adapted for carrying out just
The program of beginningization there are as below methods step:Receive the finger that target transaction is sent to target user triggered by transmission end subscriber
It enables;Whether detection target user has permission browsing objective affairs;It, will when detecting that target user has permission browsing objective affairs
Target transaction is sent to target user;When detecting that target user does not have permission browsing objective affairs, detection transmitting terminal is used
Whether family has the permission of modification target transaction;When sending permission of the end subscriber with modification target transaction, in transmitting terminal circle
Face display reminding information and addition rights option, wherein addition rights option is used to add browsing objective thing to target user
The permission of business;After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user;When detection, which sends end subscriber, does not have the permission of modification target transaction, at transmitting terminal interface
Display reminding information and delivery option;After detecting that delivery option is triggered, target transaction is sent to target user.
Whether detection target user, which has permission browsing objective affairs, includes:The corresponding permissions list of target transaction is obtained,
In, permissions list is used to store the identification information for the user for having permission browsing objective affairs;Obtain the identification information of target user;
Whether the identification information of detection target user is stored in permissions list;When detecting the identification information storage of target user in power
It limits in list, then judges that target user has the permission of browsing objective affairs, otherwise judge that target user does not have browsing objective
The permission of affairs.
Whether detection target user, which has permission browsing objective affairs, includes:Obtain corresponding first permissions list of target transaction
With the second permissions list, wherein the first permissions list is used to store the identification information for the user for having permission browsing objective affairs, the
Two permissions lists are used to store the identification information for the grouping for having permission browsing objective affairs, and grouping is made of multiple users;It obtains
The identification information of the identification information and the grouping where target user of target user;Whether the identification information of detection target user is deposited
It is stored in the first permissions list, whether the identification information for detecting the grouping where target user is stored in the second permissions list;
When the mark letter for detecting grouping of the identification information storage of target user in the first permissions list and/or where target user
Breath is stored in the second permissions list, then judges that target user has the permission of browsing objective affairs, otherwise judge target user
Permission without browsing objective affairs.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user and include:The identification information of target user is added in permissions list;Target transaction is sent
To target user.
After detecting that addition rights option is triggered, the permission of browsing objective affairs is added to target user, and by mesh
Mark affairs are sent to target user and include:The identification information of target user is added in the first permissions list;By target transaction
It is sent to target user.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, the application can be used in one or more wherein include computer usable program code computer
The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application be with reference to according to the method, apparatus of the embodiment of the present application and the flow chart of computer program product and/or
Block diagram describes.It should be understood that each flow that can be realized by computer program instructions in flowchart and/or the block diagram and/or
The combination of flow and/or box in box and flowchart and/or the block diagram.These computer program instructions can be provided to arrive
All-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one
Machine so that the instruction executed by computer or the processor of other programmable data processing devices generates flowing
The device for the function of being specified in one flow of journey figure or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
It these are only embodiments herein, be not intended to limit this application.To those skilled in the art,
The application can have various modifications and variations.It is all within spirit herein and principle made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of claims hereof.
Claims (10)
1. a kind of browse right setting method of affairs, which is characterized in that the method includes:
Receive the instruction that target transaction is sent to target user triggered by transmission end subscriber;
Detect whether the target user has permission the browsing target transaction;
When detecting that the target user has permission the browsing target transaction, the target transaction is sent to the target
User;
When detecting that the target user does not have the permission browsing target transaction, detect whether the transmission end subscriber has
There is the permission for changing the target transaction;
When the transmission end subscriber has the permission for changing the target transaction, in transmitting terminal interface display prompt message and
Add rights option, wherein the addition rights option is used to add the power for browsing the target transaction to the target user
Limit;
After detecting that the addition rights option is triggered, the power for browsing the target transaction is added to the target user
Limit, and the target transaction is sent to the target user;
When detecting the permission for sending end subscriber without the modification target transaction, carried in the transmitting terminal interface display
Show information and delivery option;
After detecting that the delivery option is triggered, the target transaction is sent to the target user.
2. according to the method described in claim 1, it is characterized in that, whether the detection target user has permission browsing institute
Stating target transaction includes:
Obtain the corresponding permissions list of the target transaction, wherein the permissions list has permission the browsing mesh for storing
Mark the identification information of the user of affairs;
Obtain the identification information of the target user;
Whether the identification information for detecting the target user is stored in the permissions list;
When the identification information storage for detecting the target user is in the permissions list, then judge that the target user has
The permission of the target transaction is browsed, otherwise judges that the target user does not have the permission for browsing the target transaction.
3. according to the method described in claim 1, it is characterized in that, whether the detection target user has permission browsing institute
Stating target transaction includes:
Obtain corresponding first permissions list of the target transaction and the second permissions list, wherein first permissions list is used
The identification information for the user for browsing the target transaction is had permission in storage, second permissions list has permission clear for storage
Look at the target transaction grouping identification information, the grouping is made of multiple users;
Obtain the identification information of the identification information and the grouping where the target user of the target user;
Whether the identification information for detecting the target user is stored in first permissions list, detects the target user institute
The identification information of grouping whether be stored in second permissions list;
When detecting the identification information storage of the target user in first permissions list and/or target user institute
Grouping identification information storage in second permissions list, then judge that the target user has and browse the target
Otherwise the permission of affairs judges that the target user does not have the permission for browsing the target transaction.
4. according to the method described in claim 2, it is characterized in that, described ought detect that the addition rights option is triggered
Afterwards, the permission for browsing the target transaction is added to the target user, and the target transaction is sent to the target and is used
Family includes:
The identification information of the target user is added in the permissions list;
The target transaction is sent to the target user.
5. according to the method described in claim 3, it is characterized in that, described ought detect that the addition rights option is triggered
Afterwards, the permission for browsing the target transaction is added to the target user, and the target transaction is sent to the target and is used
Family includes:
The identification information of the target user is added in first permissions list;
The target transaction is sent to the target user.
6. device is arranged in the browse rights of affairs a kind of, which is characterized in that described device includes:
Receiving unit, for receiving the instruction that target transaction is sent to target user triggered by transmission end subscriber;
First detection unit, for detecting whether the target user has permission the browsing target transaction;
Transmission unit, for detect the target user have permission browse the target transaction when, by the target transaction
It is sent to the target user;
Second detection unit, for when detecting that the target user does not have the permission browsing target transaction, detecting institute
It states and sends whether end subscriber has the permission for changing the target transaction;
First display unit is used for when the transmission end subscriber has the permission for changing the target transaction, in transmitting terminal circle
Face display reminding information and addition rights option, wherein the addition rights option is used to add to the target user clear
Look at the permission of the target transaction;
Adding device, for after detecting that the addition rights option is triggered, being added described in browsing to the target user
The permission of target transaction, and the target transaction is sent to the target user;
Second display unit is used for when detecting the permission for sending end subscriber without the modification target transaction, in institute
State transmitting terminal interface display prompt message and delivery option;
Transmission unit, for after detecting that the delivery option is triggered, the target transaction to be sent to the target user.
7. device according to claim 6, which is characterized in that the first detection unit includes:
First acquisition module, for obtaining the corresponding permissions list of the target transaction, wherein the permissions list is for storing
Have permission the identification information for the user for browsing the target transaction;
Second acquisition module, the identification information for obtaining the target user;
Whether first detection module, the identification information for detecting the target user are stored in the permissions list;
First judgment module is then sentenced for working as the identification information storage for detecting the target user in the permissions list
The target user of breaking has the permission for browsing the target transaction, otherwise judges that the target user does not have and browses the mesh
Mark the permission of affairs.
8. device according to claim 7, which is characterized in that the first detection unit includes:
Third acquisition module, for obtaining corresponding first permissions list of the target transaction and the second permissions list, wherein institute
The first permissions list is stated for storing the identification information for having permission the user for browsing the target transaction, second permissions list
For storing the identification information for having permission the grouping for browsing the target transaction, the grouping is made of multiple users;
4th acquisition module, the mark of the grouping where identification information and the target user for obtaining the target user
Information;
Whether the second detection module, the identification information for detecting the target user are stored in first permissions list,
Whether the identification information for detecting the grouping where the target user is stored in second permissions list;
When detecting the identification information storage of the target user in first permissions list and/or target user institute
Grouping identification information storage in second permissions list, then judge that the target user has and browse the target
Otherwise the permission of affairs judges that the target user does not have the permission for browsing the target transaction.
9. a kind of storage medium, which is characterized in that storage medium include storage program, wherein program execution profit require 1 to
The browse right setting method of any one of 5 affairs.
10. a kind of processor, which is characterized in that processor is for running program, wherein perform claim requires 1 when program is run
To the browse right setting method of any one of 5 affairs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810202880.9A CN108446168A (en) | 2018-03-12 | 2018-03-12 | A kind of the browse right setting method and device of affairs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810202880.9A CN108446168A (en) | 2018-03-12 | 2018-03-12 | A kind of the browse right setting method and device of affairs |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108446168A true CN108446168A (en) | 2018-08-24 |
Family
ID=63194721
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810202880.9A Pending CN108446168A (en) | 2018-03-12 | 2018-03-12 | A kind of the browse right setting method and device of affairs |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108446168A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941412A (en) * | 2019-11-28 | 2020-03-31 | 南京崔斯特文化创意有限公司 | Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging |
CN110955882A (en) * | 2018-09-26 | 2020-04-03 | 北京国双科技有限公司 | User permission setting method and device |
CN111708758A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Construction method and application method of judicial-assisted case management database |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102769602A (en) * | 2011-05-03 | 2012-11-07 | 中国移动通信集团山东有限公司 | Method, system and device for temporary permission control |
US20130086182A1 (en) * | 2011-09-29 | 2013-04-04 | International Business Machines Corporation | Short message service system |
CN103095642A (en) * | 2011-10-27 | 2013-05-08 | 中兴通讯股份有限公司 | Multi-media messaging method and multi-media messaging method |
CN103368765A (en) * | 2012-04-10 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Management system permission adding method and device |
CN105743973A (en) * | 2016-01-22 | 2016-07-06 | 上海科牛信息科技有限公司 | Multi-user multi-device real-time synchronous cloud cooperation method and system |
CN106506550A (en) * | 2016-12-27 | 2017-03-15 | Tcl集团股份有限公司 | A kind of shared method and apparatus of smart machine control authority |
-
2018
- 2018-03-12 CN CN201810202880.9A patent/CN108446168A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102769602A (en) * | 2011-05-03 | 2012-11-07 | 中国移动通信集团山东有限公司 | Method, system and device for temporary permission control |
US20130086182A1 (en) * | 2011-09-29 | 2013-04-04 | International Business Machines Corporation | Short message service system |
CN103095642A (en) * | 2011-10-27 | 2013-05-08 | 中兴通讯股份有限公司 | Multi-media messaging method and multi-media messaging method |
CN103368765A (en) * | 2012-04-10 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Management system permission adding method and device |
CN105743973A (en) * | 2016-01-22 | 2016-07-06 | 上海科牛信息科技有限公司 | Multi-user multi-device real-time synchronous cloud cooperation method and system |
CN106506550A (en) * | 2016-12-27 | 2017-03-15 | Tcl集团股份有限公司 | A kind of shared method and apparatus of smart machine control authority |
Non-Patent Citations (2)
Title |
---|
CHANG 等: ""Transmitting multiple secrets securely in broadcasting networks"", 《1993 PROCEEDINGS OF IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY》 * |
王昕: ""可跨域电子文档安全监管系统的设计与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955882A (en) * | 2018-09-26 | 2020-04-03 | 北京国双科技有限公司 | User permission setting method and device |
CN110941412A (en) * | 2019-11-28 | 2020-03-31 | 南京崔斯特文化创意有限公司 | Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging |
CN110941412B (en) * | 2019-11-28 | 2023-09-22 | 南京崔斯特文化创意有限公司 | Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures |
CN111708758A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Construction method and application method of judicial-assisted case management database |
CN111708758B (en) * | 2020-06-09 | 2022-12-30 | 孟磊 | Construction method and application method of judicial assistance case management database |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9858626B2 (en) | Social sharing of security information in a group | |
Roland et al. | Security vulnerabilities of the NDEF signature record type | |
CN110189121B (en) | Data processing method and device, block chain client and block chain link point | |
CN101984692B (en) | A kind of method and device for preventing Malware from sending data | |
CN108960863A (en) | A kind of food block chain retroactive method, device and electronic equipment | |
CN107656825A (en) | Message treatment method, apparatus and system | |
CN108509806A (en) | A kind of big data precision marketing system and equipment with secret protection | |
CN107979525A (en) | A kind of red packet distribution method, equipment and medium | |
CN108446168A (en) | A kind of the browse right setting method and device of affairs | |
CN109146699A (en) | Blind date friend-making integrated management approach and system based on block chain | |
CN104572907A (en) | Business object acquisition method and device | |
CN111132172A (en) | Method, device and medium for preventing telecommunication fraud based on block chain | |
CN110442502A (en) | A kind of method, apparatus buried a little, equipment and storage medium | |
CN107276970A (en) | One kind is unbinded, binding method and device | |
CN107423583B (en) | A kind of software protecting device remapping method and device | |
Schapranow et al. | Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains | |
CN102946401B (en) | A kind of data creation method, device and equipment | |
CN104956393B (en) | It is communicated using user descriptors with the third party that social networking system user carries out | |
CN108492119A (en) | Information anti-fake authentication method, device, equipment and medium based on block chain | |
CN112597525B (en) | Data processing method and device based on privacy protection and server | |
CN111600942B (en) | Report processing method, device and equipment | |
JP2017027552A (en) | Information collection system and information management system | |
CN108512803A (en) | Remind the method and device of change account bound phone number | |
CN106657674A (en) | Conversation data batch processing method and terminal | |
CN106204125A (en) | A kind of pricing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 514000 Fifth Floor, World Business Center, Meizhou City, Guangdong Province Applicant after: GUANGDONG 115 TECHNOLOGY CO., LTD. Address before: 523808 6th Floor, Building 17, Songkeyuan, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province Applicant before: GUANGDONG 115 TECHNOLOGY CO., LTD. |
|
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180824 |