CN108629003A - content loading method and device - Google Patents
content loading method and device Download PDFInfo
- Publication number
- CN108629003A CN108629003A CN201810415867.1A CN201810415867A CN108629003A CN 108629003 A CN108629003 A CN 108629003A CN 201810415867 A CN201810415867 A CN 201810415867A CN 108629003 A CN108629003 A CN 108629003A
- Authority
- CN
- China
- Prior art keywords
- data
- identifier
- result set
- preset quantity
- access rights
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
A kind of content loading method of disclosure offer and device.Content loading method includes:Response contents loading messages obtain user identifier and the first preset quantity data identifier;Access rights of the user identifier to the data identifier are inquired, there will be the corresponding data of the data identifier of access rights that result set is added;When data bulk in the result set reaches the second preset quantity, the data in the result set are shown.The content loading method that the disclosure provides can improve the efficiency of load authority content, optimize user experience.
Description
Technical field
This disclosure relates to which database technical field, adds in particular to a kind of authority content based on relational database
Support method and device.
Background technology
It generally requires to filter out the sightless data of user in high-dimensional permission system, for better user experience,
It generally requires to filter out the data that user haves no right to check in the Resources list.
In the related technology, it is usually display data identifier (key, key) to the mode of user's showing resource list or a small amount of
Data items.Since one group of data has been generally associated with multiple tables of data, in the presence of the permission of complicated dimension, such as access key value
To the black and white lists in memory database, it is also necessary to the data source being associated with other than local data base, therefore user generally require it is more
Secondary click data identifier or data items obtain the further information of data repeatedly to access database or other data sources.
In the process, if the authority information of data is located in the tables of data or other data sources of relatively deep, data are difficult in time
It is filtered, is easy to happen user and clicks repeatedly last the case where finding to have no right to consult data.
Therefore, it is necessary to it is a kind of can when loading the Resources list the sightless data of high efficiency filter user method.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part
Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Invention content
The disclosure is designed to provide a kind of content loading method and content loading device, at least to a certain degree
On overcome the problems, such as to filter due to the limitation and defect of the relevant technologies and have no right to check that data efficiency is low.
According to the first aspect of the embodiments of the present disclosure, a kind of content loading method is provided, including:Response contents load disappears
Breath obtains user identifier and the first preset quantity data identifier;The user identifier is inquired to identify the data
The access rights of symbol will have the corresponding data of the data identifier of access rights that result set is added;In the result set
Data bulk when reaching the second preset quantity, show the data in the result set.
It is described that user identifier and the first preset quantity data is taken to identify in a kind of exemplary embodiment of the disclosure
Symbol includes:
The data identifier is stored with Hash sheet form.
In a kind of exemplary embodiment of the disclosure, the inquiry user identifier is to the data identifier
Access rights, will have the corresponding data of the data identifier of access rights that result set is added to include:
The validity of the corresponding data of the data identifier is inquired, valid data are recorded;
Judge access rights of the user identifier to the valid data, the user identifier there are into access rights
Valid data the result set is added.
In a kind of exemplary embodiment of the disclosure, it is default that the data bulk in the result set reaches second
When quantity, show that the data in the result set include:
When data bulk in the result set reaches the second preset quantity, the data identifier of current queries is recorded
For node identifier, to be with next data identifier of the node identifier in next response contents loading messages
Starting point obtains the first preset quantity data identifier.
In a kind of exemplary embodiment of the disclosure, the acquisition user identifier and the first preset quantity data are known
It Fu not include the sequence for obtaining the user identifier;Access of the inquiry user identifier to the data identifier
Permission includes:
Access right of the user identifier to the data identifier is inquired in data permission table according to the sequence
Limit.
In a kind of exemplary embodiment of the disclosure, the content loading messages include under page open message and the page
Draw message.
In a kind of exemplary embodiment of the disclosure, further include:
After inquiring the first preset quantity data identifier, if the data bulk in the result set is not up to second
Preset quantity shows the data in the result set.
According to the second aspect of the embodiment of the present disclosure, a kind of content loading device is provided, including:
Data load-on module is set as response contents loading messages, obtains user identifier and the first preset quantity number
According to identifier;
Permission filtering module is set as the access rights for inquiring the user identifier to the data identifier, will have
Result set is added in the corresponding data of the data identifier of access rights;
Result display module when being set as the data bulk in the result set and reaching the second preset quantity, shows institute
State the data in result set.
According to the third aspect of the disclosure, a kind of content loading device is provided, including:Memory;And belonging to being coupled to
The processor of memory, the processor are configured as, based on the instruction being stored in the memory, executing as above-mentioned arbitrary
Method described in one.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is provided, program is stored thereon with, the program
The content loading method as described in above-mentioned any one is realized when being executed by processor.
The disclosure provide content loading method, by loading page automatic fitration user have no right the data checked,
It directly displays user to have the right the entire fields of the data checked, the efficiency that user checks permissions data can be improved.Pass through setting
The data bulk loaded every time, and the display data when getting the data of minimum displaying quantity every time, can improve data and add
Carry speed.In addition, by the way that data identifier to be loaded is stored as Hash table, page load response speed can be further increased
Degree promotes user experience.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 schematically shows the flow chart of content loading method in disclosure exemplary embodiment.
Fig. 2 schematically shows the flow chart of content loading method in disclosure exemplary embodiment.
Fig. 3 schematically shows the flow chart of content loading method in disclosure exemplary embodiment.
Fig. 4 schematically shows a kind of block diagram of content loading device in one exemplary embodiment of the disclosure.
Fig. 5 schematically shows the block diagram of a kind of electronic equipment in one exemplary embodiment of the disclosure.
Fig. 6 schematically shows a kind of schematic diagram of computer readable storage medium in one exemplary embodiment of the disclosure.
Specific implementation mode
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot
Structure or characteristic can be in any suitable manner incorporated in one or more embodiments.In the following description, it provides perhaps
More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can
It is omitted with technical solution of the disclosure one or more in the specific detail, or others side may be used
Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and
So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, identical reference numeral indicates same or similar portion in figure
Point, thus repetition thereof will be omitted.Some block diagrams shown in attached drawing are functional entitys, not necessarily necessary and object
The entity managed or be logically independent is corresponding.Software form may be used to realize these functional entitys, or in one or more
These functional entitys are realized in hardware module or integrated circuit, or in heterogeneous networks and/or processor device and/or microcontroller
These functional entitys are realized in device.
Disclosure example embodiment is described in detail below in conjunction with the accompanying drawings.
Fig. 1 schematically shows the flow chart of content loading method in disclosure exemplary embodiment.With reference to figure 1, content adds
Support method 100 may include:
Step S1, response contents loading messages obtain user identifier and the first preset quantity data identifier;
Step S2 inquires access rights of the user identifier to the data identifier, will there is the institute of access rights
It states the corresponding data of data identifier and result set is added;
Step S3 when the data bulk in the result set reaches the second preset quantity, is shown in the result set
Data.
The disclosure provide content loading method, by loading page automatic fitration user have no right the data checked,
It directly displays user to have the right the entire fields of the data checked, the efficiency that user checks permissions data can be improved.Pass through setting
The data bulk loaded every time, and the display data when getting the data of minimum displaying quantity every time, can improve data and add
Carry speed.
In the following, each step to content loading method 100 is described in detail.
In step S1, response contents loading messages obtain user identifier and the first preset quantity data identifier.
In a kind of exemplary embodiment of the disclosure, the content loading messages include under page open message and the page
Draw message.Page open message include paging displaying content in each page opening message and the content that continuously shows in
The opening message of first screen.It includes showing that checking for content disappears other than the first screen in the content continuously shown that the page, which pulls down message,
Breath.
Since the method that the disclosure provides is mainly used for hiding its data for having no right to check to user, directly displays it and have the right
The data checked, therefore when user opens the page, user identifier (User ID) and the first preset quantity number can be obtained
According to identifier, for the judgement of further permission and data screening.At this point, the first preset quantity for example can be more than one page
The value of data bulk.For example, average every page when having 10 data, the first preset quantity for example can be 20 or more.First
Preset quantity is bigger, and data response speed can more be protected, but correspondingly EMS memory occupation is more;First preset quantity
Smaller, EMS memory occupation is smaller, but is correspondingly possible to cannot be satisfied the page presentation for realizing the condition that meets after primary load,
It also needs to load data again.The setting of first preset quantity can voluntarily be set by those skilled in the art according to actual conditions
It sets, the disclosure does not do this particular determination.
When user pulls down the page, the first preset quantity can be identical as the data being arranged for the first screen data, can also
Progress adjust automatically is pulled down according to the page.For example, the first screen data are 10, it is automatic to add when user opens the first screen page
20 data are carried for screening;After user pulls down page half, it can both continue to load other 20 data for screening, it can also root
The ratio that screen is accounted for according to the page of user's drop-down is multiplied by the load quantity of the first screen, continues to load other 10 data for sieving
Choosing.The adjustable strategies of first preset quantity can be voluntarily arranged by those skilled in the art according to actual conditions, and the disclosure is to this
Do not do particular determination.
In a kind of exemplary embodiment of the disclosure, user identifier and the first preset quantity data identifier packet are taken
It includes and the data identifier is stored with Hash sheet form.
Hash table (Hashtable also cries hash table) is directly to access memory storage locations (Value) according to key (Key)
Data structure.In Hash table, the data of required inquiry can be mapped to interior by calculating a function about key assignments
A position records to access in depositing, to accelerate search speed.This mapping function is referred to as hash function, stores the array of record
Referred to as hash table or Hash table.By storing these data identifiers with Hash sheet form, the efficiency of data identification can be improved.
Step S2 inquires access rights of the user identifier to the data identifier, will there is the institute of access rights
It states the corresponding data of data identifier and result set is added.
Fig. 2 is a flow chart of the embodiment of the present disclosure.With reference to figure 2, in some embodiments, step S2 may include:
Step S21 inquires the validity of the corresponding data of the data identifier, records valid data;
Step S22 judges access rights of the user identifier to the valid data, the user identifier is had
The result set is added in the valid data of access rights.
In a kind of exemplary embodiment of the disclosure, user identifier and the first preset quantity data identifier are obtained
Sequence including obtaining user identifier, inquiry user identifier includes existing according to the sequence to the access rights of data identifier
Access rights of the user identifier to data identifier are inquired in data permission table.
For example, can be sorted according to user identifier sequentially identifies the corresponding data (value) of data identifier (key)
Validity.Validity can for example be whether the data are deleted.In query process, the complete of valid data can be directly acquired
Integer field is known without being repeated in loop body according to data when to ensure that the permission for carrying out valid data in next step judges
Other fields that load data Fu not gone, being equivalent to merging, repeatedly independent SQL query operates for one query, reduces database
The number of inquiry operation, reduces that network takes and the operations such as morphology, grammar parser take as far as possible.
Next, can judge whether user identifier has access rights to valid data in several ways, if so,
Result set is added in the valid data.For example, for the high-dimensional access rights for being related to multi-table query, can pass through
The return values of Canview functions identifies.The parameter of Canview functions is user identifier and data identifier, and return value is
Whether the user identifier has access rights to the data that data identifier is directed toward, and has permission return 1, and lack of competence returns to 0.No matter
Why is the method for search access right, is not necessarily to user's operation, has been greatly saved interaction time and the access times to database, has carried
High response efficiency, optimizes user experience.
Step S3 when the data bulk in the result set reaches the second preset quantity, is shown in the result set
Data.
Pre-set minimum i.e. the second preset quantity of display number parameter, the data bulk in result set can be obtained
The data in result set, i.e. user, which have permission the complete word of the valid data of reading, to be shown to user when reaching the second preset value
Section.Second preset quantity can be the quantity of page of data.For example, the quantity of page of data is 10, it is arranged in step sl
The first preset quantity be 20, this step setting the second preset quantity may be 10.To from 20 data
In a whole page data can be shown to user when filtering out 10 or 10 or more the data for meeting condition, effectively prevent using
Family, which is perceived, lacks data that are invalid or having no right access.
When user pulls down the page, the second preset quantity both can be identical as the setting of the first screen, can also be under the page
Draw situation variation.As in the previous example, when user pulls down the page of page half, both 10 new datas can be equally returned to the first screen, even if
It is only capable of showing 5 new datas to user, can also directly return to 5 new datas, add again after user continues to pull down the page
It carries.In disclosure exemplary embodiment, it sets the second preset quantity to fixed value, so as to save computing resource, pre-
First load data pull down the page again with standby user, promote response speed.
In addition, if after inquiring the first preset quantity data identifier, the data bulk in result set is not up to
Two preset quantities, then may determine that whether the first preset quantity data have covered last number in data to be viewed
According to if it is, the data in result set do not have the possibility further increased to explanation at this time, can directly displaying in result set
Data;If it is not, then the first preset quantity identifier can be obtained again automatically, is inquired and sieved in new data
Choosing, until the data in result set reach the second preset quantity.
In one embodiment, it can also be limited with the second preset quantity and data identifier is inquired in batches, and root
The inquiry of next batch is judged whether to according to query result.For example, if the first preset quantity is 20, the second preset quantity is
10, preceding 10 data identifiers can be inquired first, if the data bulk after inquiry in result set reaches 10,
Without carrying out second batch inquiry;Otherwise, 10 data identifiers later are inquired, then the data number that judging result is concentrated
Whether amount reaches 10, and the data of concentration are returned the result if reaching, if not up to, can obtain the first present count again
Amount data identifier, carries out again the inquiry of next batch, until the data bulk in result set reaches 10 or not new
Until data identifier can obtain.
In addition, when the data bulk in result set reaches the second preset quantity, it can be by the Data Identification of current queries
Symbol is recorded as node identifier, thus in next response contents loading messages with next Data Identification of the node identifier
Symbol is that starting point obtains the first preset quantity data identifier.For example, if by 20 data identifiers obtained
After result set is added in the entire fields of the corresponding data of 15 data identifiers, the data that judging result is concentrated are default equal to second
15th data identifier can be recorded as node identifier by quantity 10, to next time obtain data identifier when from
16th data identifier starts quantity.In some embodiments, for improve can next time obtain data identifier when it is straight
Obtain the difference for taking the first preset quantity and last time institute's remainder amount.Or the above example explanation, in first time shows result set
When data, also 5 data identifiers are not queried, then obtain data identifier again and the first preset quantity is still 20
When, can obtain 15 data identifiers again makes total data identifier to be checked reach 20 again.
On the basis of not changing legacy data library structure, the data content for efficiently realizing filtering permission adds the disclosure
It carries.By way of after recycling the first paging of execution and obtaining data identifier to data identifier filtered access permission, efficiently solve
The paging loading problem of high-dimensional permission resource in relevant database.To accelerate to execute, database query operations are reduced
Number once loads all fields of data when inquiring data validity and is not only data identifier, ensure that filtering is visited
It asks when permission without other fields for repeatedly going load data according to data identifier in loop body, it is repeatedly only to be equivalent to merging
Vertical SQL query is one query operation, reduces network as far as possible and takes and the consumption of the operations such as morphology, grammar parser
When, response speed can be promoted.Further, since the method that the disclosure provides is without precisely limiting every page data number, Ke Yiguang
It is general to apply in the wireless drop-down load mechanism that mobile Internet terminal uses.
The above method 100 is described in detail below by concrete application scene.
Fig. 3 is the flow chart of an embodiment of the present disclosure.
It can obtain the first preset quantity data identifier in step S301 with reference to figure 3 and be stored in sequential identity array
Fileds, array interior element quantity size are set as the first preset quantity.
For example, when the first preset quantity be equal to 13 when, obtain 13 data identifiers after, array fields be [2,3,4,
5,6,7,8,9,10,11,12,13,14], size is equal to 13.
In step S302, sequential identity array fields is converted into Ha Biaoxi, with Map<Mark:Position>Form it is slow
It stores away.
Hash table can be initialized according to fields and caches (data identifier key and data in the embodiments of the present disclosure
The relationship of entire fields value use "=>" connection):
{ 2=>1,3=>2,4=>3,5=>4,6=>5,7=>6,8=>7,9=>8,10=>9,11=>10,12=>
11,13=>12,14=>13}.
The mode of caching for example can be initialization i=0, the handle when i is less than size<fileds[i]:i>Key-value pair write
Enter Hash table, i is from increasing 1, until i is equal to size.
In step S033, every page of minimum display number parameter (the second preset quantity) per_page, query node ginseng are obtained
Number end_id and result set results is initialized if above-mentioned parameter is not present.Such as per_page=5 can be initialized,
End_id=0, results are empty set.
Whether it is less than per_page in step S304, judging result collection results, if yes then enter step S35, otherwise
Into S39.
In step S305, judge whether end_id+1 is less than size, if so, entering step S306 is arranged mark to be checked
Array fields2 is fields [end_id+1~end], and fields2 is otherwise set as sky array.
After initializing end_id=0, due to end_id+1<13, so fields2=[2,3,4,5,6,7,8,9,10,
11,12,13,14].
In step S307, using fields2 as the range of in sentences, data base querying is gone with limit=per_page
Interim set tmp is added in the entire fields of valid data by the valid data in fields2.
Valid data can be inquired by tables of data as shown in Table 1.
Table 1
Identify id | Whether deleted is deleted | Permission relevant field CanView | Resource content content |
1 | It is no | 1 | ... |
2 | It is | 1 | ... |
3 | It is no | 0 | ... |
4 | It is no | 1 | ... |
5 | It is no | 1 | ... |
6 | It is | 1 | ... |
7 | It is no | 1 | ... |
8 | It is no | 0 | ... |
9 | It is no | 1 | ... |
10 | It is | 1 | ... |
11 | It is no | 1 | ... |
12 | It is no | 1 | ... |
13 | It is no | 0 | ... |
14 | It is no | 1 | ... |
15 | It is no | 1 | ... |
In table 1, data identifier id field determines that a data, deleted indicate whether this data has been deleted by soft
It removes, it is 1 to be, no is 0.To simplify irrelevant contents, the multiple data content fields being likely to occur in table 1 are merged display for one
A field content.
Can using the data of fields2 as query context, by deleted whether be 0 go database execution once have
Imitate SQL query, and return to the entire fields of valid data, ultimately generate interim set tmp=[resouce4, resource5,
Resource7, resource8].
In step S308, judge whether interim set tmp is empty, if so, indicate subsequently without available resources,
End loop jumps to step S311, otherwise enters step S309.
In step S309, using CanView function pairs set tmp filtered access permission temporarily, result set is obtained
Results, while the last one data identifier of interim findings collection is obtained by end_id=map.get (id) updates.
As shown in table 1, it is assumed that active user user, data identifier ID, can by function CanView (ID,
User high-dimensional rights field (may relate to other database tables)) is converted into the field CanView that value is 0 or 1.Root
Judged according to CanView function pairs tmp, the set of data of the CanView fields equal to 1 can be obtained.If looked into for the first time
It askes and obtains result set results=[resouce4, resource5, resource7], update end_id=map.get at this time
(8) it is 7.
In step S310, judge that the number of elements that results includes is less than per_page, if so, return to step S305,
Otherwise S311 is entered step.
Continued access step S309, when the number of elements 3 for finding that results includes is less than size, return to step S35, update
Fields2=[9,10,11,12,13,14] continues SQL of database execution using new end_id and fields2 and looks into
Ask, obtain valid data interim set tmp=[resource9, resource11, resource12, resource13,
Resource14], permission filter operation is then executed according to CanView functions again, obtaining new results is
[resouce4, resource5, resource7, resource9, resource11, resource12, resource14], hair
The number of elements that existing results includes is more than or equal to size, enters step S39.
In step S39, end_id and final result collection results is returned.Wherein end_id for client or front end again
Make requests on content load when used as parameter, expression current data screened where.
Subsequently the continuous drop-down paging of identical fields load is only needed since step S33, and can repeat to make
With map, inquiry only needs the time complexity of (1) O.
The advantageous effects of the application include at least:
(1) there is unlimited drop-down paging load mode of the invention good adaptability to be based in mobile internet era
Relational database permission filtering it is various comprising the website of permission system in be required for using, have wide range of applications.
(2) it solves and standard SQL language is used only in relational database to complicated permission filtering realization difficulty and multilist
The low problem of joint efficiency.
(3) data positional information is stored by Hash table so that repeat the time complexity that searching data only needs (1) O.
(4) execution efficiency is high on computer and relevant database, is no longer needed in loop body in the filtering permission stage
In SQL query is performed a plurality of times.
Corresponding to above method embodiment, the disclosure also provides a kind of content loading device, can be used for executing above-mentioned side
Method embodiment.
Fig. 4 schematically shows a kind of block diagram of content loading device in one exemplary embodiment of the disclosure.
With reference to figure 4, content loading device 400 may include:
Data load-on module 402 is set as response contents loading messages, obtains user identifier and the first preset quantity
Data identifier;
Permission filtering module 404 is set as the access rights for inquiring the user identifier to the data identifier, will
There are the corresponding data of the data identifier of access rights that result set is added;
Result display module 406, when being set as the data bulk in the result set and reaching the second preset quantity, display
Data in the result set.
Since each function of device 400 has been described in detail in its corresponding embodiment of the method, the disclosure in this not
It repeats again.
It should be noted that although being referred to several modules or list for acting the equipment executed in above-detailed
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
The feature and function of module either unit can embody in a module or unit.Conversely, an above-described mould
Either the feature and function of unit can be further divided into and embodied by multiple modules or unit block.
In an exemplary embodiment of the disclosure, a kind of electronic equipment that can realize the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or
Program product.Therefore, various aspects of the invention can be embodied in the following forms, i.e.,:It is complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 5.The electronics that Fig. 5 is shown
Equipment 500 is only an example, should not bring any restrictions to the function and use scope of the embodiment of the present invention.
As shown in figure 5, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap
It includes but is not limited to:Above-mentioned at least one processing unit 510, above-mentioned at least one storage unit 520, connection different system component
The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit has program stored therein code, and said program code can be held by the processing unit 510
Row so that the processing unit 510 executes various according to the present invention described in above-mentioned " illustrative methods " part of this specification
The step of illustrative embodiments.For example, the processing unit 510 can execute step S1 as shown in fig. 1:Response contents
Loading messages obtain user identifier and the first preset quantity data identifier;Step S2:Inquire the user identifier pair
The access rights of the data identifier will have the corresponding data of the data identifier of access rights that result set is added;Step
Rapid S3:When data bulk in the result set reaches the second preset quantity, the data in the result set are shown.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 5201 and/or cache memory unit 5202, it can further include read-only memory unit (ROM) 5203.
Storage unit 520 can also include program/utility with one group of (at least one) program module 5205
5204, such program module 5205 includes but not limited to:Operating system, one or more application program, other program moulds
Block and program data may include the realization of network environment in each or certain combination in these examples.
Bus 530 can be to indicate one or more in a few class bus structures, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use the arbitrary bus structures in a variety of bus structures
Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 communicate, and/or with make
Any equipment that the electronic equipment 500 can be communicated with one or more of the other computing device (such as router, modulation /demodulation
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with
By network adapter 560 and one or more network (such as LAN (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500.
It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not
It is limited to:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and
Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be expressed in the form of software products, the software product can be stored in one it is non-volatile
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with
Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also
In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute
State program code for make the terminal device execute described in above-mentioned " illustrative methods " part of this specification according to this hair
The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 6, describing the program product for realizing the above method according to the embodiment of the present invention
600, portable compact disc read only memory (CD-ROM) may be used and include program code, and can in terminal device,
Such as it is run on PC.However, the program product of the present invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device either device use or
It is in connection.
The arbitrary combination of one or more readable mediums may be used in described program product.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or the arbitrary above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include:It is electrical connection, portable disc, hard disk, random access memory (RAM) with one or more conducting wires, read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
In carry readable program code.The data-signal of this propagation may be used diversified forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, which can send, propagate either transmission for used by instruction execution system, device or device or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with any combination of one or more programming languages for executing the program that operates of the present invention
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It executes on computing device, partly execute on a user device, being executed as an independent software package, partly in user's calculating
Upper side point is executed or is executed in remote computing device or server completely on a remote computing.It is being related to far
In the situation of journey computing device, remote computing device can pass through the network of any kind, including LAN (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of the processing included by method according to an exemplary embodiment of the present invention
It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable
Sequence.In addition, being also easy to understand, these processing for example can be executed either synchronously or asynchronously in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope of the disclosure and design are wanted by right
It asks and points out.
Claims (10)
1. a kind of content loading method, which is characterized in that including:
Response contents loading messages obtain user identifier and the first preset quantity data identifier;
Access rights of the user identifier to the data identifier are inquired, there will be the data identifier of access rights
Result set is added in corresponding data;
When data bulk in the result set reaches the second preset quantity, the data in the result set are shown.
2. content loading method as described in claim 1, which is characterized in that described to take user identifier and the first preset quantity
A data identifier includes:
The data identifier is stored with Hash sheet form.
3. content loading method as described in claim 1, which is characterized in that the inquiry user identifier is to the number
According to the access rights of identifier, there will be the corresponding data of the data identifier of access rights that result set is added to include:
The validity of the corresponding data of the data identifier is inquired, valid data are recorded;
Judge access rights of the user identifier to the valid data, the user identifier is had into having for access rights
It imitates data and the result set is added.
4. content loading method as described in claim 1, which is characterized in that the data bulk in the result set reaches
When to the second preset quantity, show that the data in the result set include:
When data bulk in the result set reaches the second preset quantity, the data identifier of current queries is recorded as saving
Point identifier, thus in next response contents loading messages using next data identifier of the node identifier as starting point
Obtain the first preset quantity data identifier.
5. content loading method as described in claim 1, which is characterized in that the acquisition user identifier and the first present count
Amount data identifier includes the sequence for obtaining the user identifier;The inquiry user identifier knows the data
The access rights not accorded with include:
Access rights of the user identifier to the data identifier are inquired in data permission table according to the sequence.
6. content loading method as described in claim 1, which is characterized in that the content loading messages include that page open disappears
Breath and the page pull down message.
7. content loading method as described in claim 1, which is characterized in that further include:
After inquiring the first preset quantity data identifier, preset if the data bulk in the result set is not up to second
Quantity shows the data in the result set.
8. a kind of content loading device, which is characterized in that including:
Data load-on module is set as response contents loading messages, obtains user identifier and the first preset quantity data are known
It does not accord with;
Permission filtering module is set as the access rights for inquiring the user identifier to the data identifier, will there is access
Result set is added in the corresponding data of the data identifier of permission
Result display module shows the knot when being set as the data bulk in the result set and reaching the second preset quantity
The data that fruit is concentrated.
9. a kind of electronic equipment, which is characterized in that including:
Memory;And
The processor of memory, the processor belonging to being coupled to are configured as based on the instruction being stored in the memory,
Execute such as claim 1-7 any one of them content loading methods.
10. a kind of computer readable storage medium, is stored thereon with program, realized when which is executed by processor as right is wanted
Seek 1-7 any one of them content loading methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810415867.1A CN108629003B (en) | 2018-05-03 | 2018-05-03 | Content loading method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810415867.1A CN108629003B (en) | 2018-05-03 | 2018-05-03 | Content loading method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108629003A true CN108629003A (en) | 2018-10-09 |
CN108629003B CN108629003B (en) | 2021-05-11 |
Family
ID=63695308
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810415867.1A Active CN108629003B (en) | 2018-05-03 | 2018-05-03 | Content loading method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108629003B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761088A (en) * | 2020-07-01 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Method and device for processing position data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663144A (en) * | 2012-05-22 | 2012-09-12 | 山西优府信息技术开发有限公司 | Complex permission information paging scheme |
CN103942213A (en) * | 2013-01-21 | 2014-07-23 | 腾讯科技(深圳)有限公司 | Data paging method and device |
CN104615726A (en) * | 2015-02-06 | 2015-05-13 | 北京神舟航天软件技术有限公司 | Method for displaying a large number of business objects based on lazy loading technique |
US20160055163A1 (en) * | 2012-03-27 | 2016-02-25 | Varonis Systems, Ltd. | Method and apparatus for enterprise-level filtered search |
CN105843956A (en) * | 2016-04-14 | 2016-08-10 | 北京搜狐新媒体信息技术有限公司 | Paging query method and system |
CN106126753A (en) * | 2016-08-23 | 2016-11-16 | 易联众信息技术股份有限公司 | The method of increment extractions based on big data |
CN107515879A (en) * | 2016-06-16 | 2017-12-26 | 伊姆西公司 | Method and electronic equipment for file retrieval |
CN107784009A (en) * | 2016-08-29 | 2018-03-09 | 中兴通讯股份有限公司 | Data query, data query processing method and processing device |
-
2018
- 2018-05-03 CN CN201810415867.1A patent/CN108629003B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160055163A1 (en) * | 2012-03-27 | 2016-02-25 | Varonis Systems, Ltd. | Method and apparatus for enterprise-level filtered search |
CN102663144A (en) * | 2012-05-22 | 2012-09-12 | 山西优府信息技术开发有限公司 | Complex permission information paging scheme |
CN103942213A (en) * | 2013-01-21 | 2014-07-23 | 腾讯科技(深圳)有限公司 | Data paging method and device |
CN104615726A (en) * | 2015-02-06 | 2015-05-13 | 北京神舟航天软件技术有限公司 | Method for displaying a large number of business objects based on lazy loading technique |
CN105843956A (en) * | 2016-04-14 | 2016-08-10 | 北京搜狐新媒体信息技术有限公司 | Paging query method and system |
CN107515879A (en) * | 2016-06-16 | 2017-12-26 | 伊姆西公司 | Method and electronic equipment for file retrieval |
CN106126753A (en) * | 2016-08-23 | 2016-11-16 | 易联众信息技术股份有限公司 | The method of increment extractions based on big data |
CN107784009A (en) * | 2016-08-29 | 2018-03-09 | 中兴通讯股份有限公司 | Data query, data query processing method and processing device |
Non-Patent Citations (2)
Title |
---|
周明涛: "《Dreamweaver UltraDev 4动态网页设计》", 31 August 2001 * |
王欣欣,等: "《数据结构实用教程 C语言版》", 29 February 2016 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113761088A (en) * | 2020-07-01 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Method and device for processing position data |
Also Published As
Publication number | Publication date |
---|---|
CN108629003B (en) | 2021-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111931102B (en) | Page construction method, device and system | |
CN104756074A (en) | Rules engine as a platform for mobile applications | |
US9485306B2 (en) | Methods, apparatuses, and computer program products for facilitating a data interchange protocol | |
CN110764748B (en) | Code calling method, device, terminal and storage medium | |
CN110019080A (en) | Data access method and device | |
CN110377462A (en) | Interface test method, device and terminal device | |
CN115757400B (en) | Data table processing method, device, electronic equipment and computer readable medium | |
US9454348B2 (en) | Methods, apparatuses, and computer program products for facilitating a data interchange protocol modeling language | |
US20170364487A1 (en) | Method of generating hierarchical data structure | |
CN114374602B (en) | Master control equipment configuration method and device, cloud server and storage medium | |
CN109933381A (en) | A kind of loading method and device of kernel | |
CN110019552A (en) | User pays close attention to the method and apparatus that state updates | |
CN104361040A (en) | Method and device for customized query | |
WO2014117072A1 (en) | Systems and methods for semantic url handling | |
CN108959294A (en) | A kind of method and apparatus accessing search engine | |
CN108629003A (en) | content loading method and device | |
Sheng et al. | Techniques on developing context‐aware web services | |
CN109905435A (en) | Resource subscription method and system, storage medium, electronic equipment | |
US20100274823A1 (en) | Method, apparatus and computer program product for providing an adaptive context model framework | |
US20240248945A1 (en) | Information display method and apparatus, terminal, and storage medium | |
CN115686506A (en) | Data display method and device, electronic equipment and storage medium | |
CN111382389B (en) | Multi-theme page generation method and device, electronic equipment and storage medium | |
CN110555070A (en) | Method and apparatus for outputting information | |
CN116564311B (en) | Device control method, device, electronic device and readable storage medium | |
CN116383266A (en) | Cloud resource retrieval method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |