CN111814185A - Authority processing method and device, electronic equipment and storage medium - Google Patents

Authority processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111814185A
CN111814185A CN202010653439.XA CN202010653439A CN111814185A CN 111814185 A CN111814185 A CN 111814185A CN 202010653439 A CN202010653439 A CN 202010653439A CN 111814185 A CN111814185 A CN 111814185A
Authority
CN
China
Prior art keywords
audit
target
authority
option
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010653439.XA
Other languages
Chinese (zh)
Other versions
CN111814185B (en
Inventor
姜天宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Didi Infinity Technology and Development Co Ltd
Original Assignee
Beijing Didi Infinity Technology and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Didi Infinity Technology and Development Co Ltd filed Critical Beijing Didi Infinity Technology and Development Co Ltd
Priority to CN202010653439.XA priority Critical patent/CN111814185B/en
Publication of CN111814185A publication Critical patent/CN111814185A/en
Application granted granted Critical
Publication of CN111814185B publication Critical patent/CN111814185B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a permission processing method, a permission processing device, an electronic device and a storage medium, wherein the method comprises the following steps: responding to a first starting operation of the authority audit, providing a first interface, wherein the first interface displays a scope option for determining an authority audit scope and a starting control for starting an audit process; responding to the selection operation acting on the range option, and determining authority audit range information; responding to a second starting operation acting on the starting control, and determining target auditing equipment according to the authority auditing range information; according to the target audit equipment, the audit flow corresponding to the authority audit range information is started, and by the method, the duration consumed by the authority audit period is favorably shortened, and meanwhile, the manual workload is favorably reduced.

Description

Authority processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for processing an authority, an electronic device, and a storage medium.
Background
For an enterprise office system, the system comprises various authorities, each employee in the enterprise can be endowed with different authorities according to different posts and functions, and the employee can complete daily work by using the authority endowed to the employee after logging in the system.
For enterprises, the authority of an office system is required to be converged, and the risk of information leakage caused by the fact that the authority range is expanded is avoided, so that authority auditing of employees is required to be performed regularly. At present, when authority audit is conducted, a system administrator seeks authority operators to export data in an audit range from a database after the audit range is determined, and then the system administrator seeks personnel conducting subsequent authority audit processes to conduct authority audit, so that the authority audit mode wastes much time in an intermediate link, and the authority audit period is relatively long.
Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus, an electronic device, and a storage medium for processing an authority, so as to reduce a duration consumed by an authority audit cycle.
In a first aspect, an embodiment of the present application provides an authority processing method, where the method includes:
responding to a first starting operation of the authority audit, providing a first interface, wherein the first interface displays a scope option for determining an authority audit scope and a starting control for starting an audit process;
responding to the selection operation acting on the range option, and determining authority audit range information;
responding to a second starting operation acting on the starting control, and determining target auditing equipment according to the authority auditing range information;
and starting an audit flow corresponding to the authority audit range information according to the target audit equipment.
Optionally, the scope options include:
various subsystem options under the overall system, permission options included in the overall system, and all user options.
Optionally, the determining, in response to the selection operation performed on the scope option, the authority audit scope information includes:
responding to the selection operation of a target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option;
responding to the selection operation of a target user option acted under the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option;
and determining the authority auditing range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
Optionally, the determining target audit equipment according to the authority audit range information includes:
for each target subsystem option, determining manager equipment of the subsystem corresponding to the target subsystem option and auditing equipment allocated to the subsystem corresponding to the target subsystem option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
Optionally, the determining, in response to the selection operation performed on the scope option, the authority audit scope information includes:
responding to the selection operation of a target permission option acted under the permission option, and displaying a second window, wherein the second window displays candidate user options with permissions corresponding to the target permission option;
and responding to the selection operation of a target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
Optionally, the determining target audit equipment according to the authority audit range information includes:
for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs;
and determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option and auditing equipment distributed to the authority attributive subsystem corresponding to the target authority option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
Optionally, the starting, according to the target audit device, the audit flow corresponding to the authority audit range information includes:
for each manager device, determining authority audit range information corresponding to the manager device;
and sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
Optionally, auditing the authority audit range information corresponding to the manager device includes:
a reclaim right and a reserve right.
Optionally, the method further comprises:
obtaining audit duration set for the audit flow;
and sending the auditing time length to the target auditing equipment for display by the target auditing equipment.
Optionally, the method further comprises:
responding to the operation for carrying out time limit reminding on the target auditing equipment, and determining the target auditing equipment which is currently in an auditing state;
and sending prompt information for time limit reminding to the target auditing equipment in the auditing state at present.
Optionally, the method further comprises:
and obtaining audit result information fed back by the target audit equipment after the target audit equipment finishes the audit.
In a second aspect, an embodiment of the present application provides an authority processing apparatus, where the apparatus includes:
the display unit is used for responding to a first starting operation of the authority audit and providing a first interface, wherein the first interface displays a range option for determining an authority audit range and a starting control for starting an audit process;
the first determining unit is used for responding to the selection operation acted on the scope option and determining the Authority audit scope information;
the second determining unit is used for responding to second starting operation acting on the starting control and determining target auditing equipment according to the authority auditing range information;
and the starting unit is used for starting the audit flow corresponding to the authority audit range information according to the target audit equipment.
Optionally, the scope options include:
various subsystem options under the overall system, permission options included in the overall system, and all user options.
Optionally, the first determining unit, when determining the audit range information of the authority in response to the selection operation performed on the range option, includes:
responding to the selection operation of a target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option;
responding to the selection operation of a target user option acted under the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option;
and determining the authority auditing range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
Optionally, when determining the target audit device according to the authority audit range information, the second determining unit is configured to:
for each target subsystem option, determining manager equipment of the subsystem corresponding to the target subsystem option and auditing equipment allocated to the subsystem corresponding to the target subsystem option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
Optionally, the first determining unit, when determining the audit range information of the authority in response to the selection operation performed on the range option, includes:
responding to the selection operation of a target permission option acted under the permission option, and displaying a second window, wherein the second window displays candidate user options with permissions corresponding to the target permission option;
and responding to the selection operation of a target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
Optionally, when determining the target audit device according to the authority audit range information, the second determining unit is configured to:
for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs;
and determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option and auditing equipment distributed to the authority attributive subsystem corresponding to the target authority option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
Optionally, when the starting unit is configured to start the audit stream corresponding to the authority audit range information according to the target audit device, the starting unit includes:
for each manager device, determining authority audit range information corresponding to the manager device;
and sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
Optionally, auditing the authority audit range information corresponding to the manager device includes:
a reclaim right and a reserve right.
Optionally, the apparatus further comprises:
the first acquisition unit is used for acquiring the audit duration set for the audit flow;
and the first sending unit is used for sending the auditing time length to the target auditing equipment so as to be displayed by the target auditing equipment.
Optionally, the apparatus further comprises:
the third determining unit is used for responding the operation for reminding the time limit of the target auditing equipment and determining the target auditing equipment which is currently in the auditing state;
and the second sending unit is used for sending prompt information for time limit reminding to the target auditing equipment in the auditing state.
Optionally, the apparatus further comprises:
and the second acquisition unit is used for acquiring audit result information fed back by the target audit equipment after the target audit equipment finishes the audit.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor, a storage medium and a bus, wherein the storage medium stores machine-readable instructions executable by the processor, when the electronic device runs, the processor and the storage medium communicate through the bus, and the processor executes the machine-readable instructions to execute the steps of the permission processing method according to any one of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the authority processing method according to any one of the first aspect.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
in the application, when carrying out authority audit, a first interface which is displayed with a range option for determining an authority audit range and a start control for starting an audit process is provided through a first start operation, a user can select operation on the range option for determining the authority audit range to determine the authority audit range information, then a target audit device corresponding to the authority audit range information is determined through the start control for starting the audit process, then an audit flow corresponding to the authority audit range information is started according to the target audit device, by the method, the range option can be selected by self to obtain the authority audit range during the authority audit, and the audit flow of the authority audit range is started after the target audit device is determined, so that personnel participating in the authority audit process receive an audit task to carry out the authority audit, compared with the prior art, the method has the advantages that intermediate links are reduced, so that the duration consumed by the authority audit period is favorably shortened, and meanwhile, the manual workload is favorably reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic flowchart of a permission processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another permission processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another permission processing method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another permission processing method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another permission processing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a permission processing apparatus according to a second embodiment of the present application;
fig. 7 is a schematic structural diagram of another permission processing apparatus according to a second embodiment of the present application;
fig. 8 is a schematic structural diagram of another permission processing apparatus according to a second embodiment of the present application;
fig. 9 is a schematic structural diagram of another permission processing apparatus according to a second embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and steps without logical context may be performed in reverse order or simultaneously. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
When the prior art carries out authority audit, a system administrator seeks authority operators to export data in an audit range from a database after determining the audit range, so that the system administrator obtains an authority audit form, and then the system administrator gives the form to a person who carries out a subsequent authority audit process for authority audit after finding the person, namely: in the prior art, the authority audit is completely performed offline, which causes a system administrator to waste a lot of time in the whole authority audit process in the person finding process, thereby causing the time consumed by the authority audit period to be long and causing the work of the system administrator to be extremely tedious.
In order to solve the problems, the embodiment of the application provides an authority processing method, an authority processing device, electronic equipment and a storage medium, a range option can be selected by self during authority audit to obtain an authority audit range, and after target audit equipment is determined, an audit flow of the authority audit range is started, so that personnel participating in an authority audit flow receive an audit task to perform authority audit.
It should be noted in advance that, for an enterprise office system, the enterprise office system may include a plurality of subsystems, different subsystems correspond to different functions, and different subsystems correspond to different user groups, for example: subsystems under the enterprise office include: subsystem 1, subsystem 2 and subsystem 3, the function that subsystem 1 corresponds is the system that is used for enterprise technical staff to generate, the function that subsystem 2 corresponds is the system that is used for enterprise's personnel to manage, the function that subsystem 3 corresponds is the system that is used for enterprise's financial affairs to account, take subsystem 1 as an example, because the person who uses this subsystem is different in role and position, the authority of subsystem 1 that this person owns is different, for example: the rights that person 1 is useful for include: the authority used for viewing the task and the authority used for operating the task, and the authority owned by the person 2 includes: permissions for assigning tasks to other people and for viewing the tasks currently performed by all people under a certain department, the permissions possessed by person 3 include: for example, the authority for managing the personnel transactions of all persons under a certain department, and the like, for a certain user, the user may have the authority of at least one subsystem.
Example one
Fig. 1 is a schematic flowchart of a permission processing method according to an embodiment of the present application, and as shown in fig. 1, the method includes the following steps:
step 101, responding to a first starting operation of the authority audit, and providing a first interface, wherein a scope option for determining an authority audit scope and a starting control for starting an audit process are displayed on the first interface.
And 102, responding to the selection operation acted on the scope option, and determining the Authority audit scope information.
And 103, responding to a second starting operation acted on the starting control, and determining target auditing equipment according to the authority auditing range information.
And step 104, starting an audit flow corresponding to the authority audit range information according to the target audit equipment.
Specifically, in order to implement authority audit, a functional control for authority audit can be added to an enterprise office system, when authority is required to be audited, a first starting operation can be executed by clicking the functional control, a first interface is displayed on a display interface of the terminal device at the moment, a range option for determining an authority audit range and a starting control for starting an audit flow are displayed on the first interface, and a user can determine the authority audit range through selection operation acting on the range option, for example: the method comprises the following steps of using a user with specified authority as an audit range through a range option, or using the authority of the specified user as the audit range through the range option to determine the audit range, after the audit range is determined, acquiring authority audit range information according to an authority list maintained by an enterprise office system, wherein the authority list comprises the corresponding relation between the user and the authority, after the authority audit range information is determined, executing second starting operation by clicking a starting control for starting an audit process, wherein different users may correspond to different auditors, and different auditors use different audit devices, so after the second starting operation is executed, target audit devices corresponding to the audited users in the authority audit range information need to be determined, for example: if the higher level of the user is required to perform authority audit timing on the user, the higher level of the user can be determined according to a personnel architecture table maintained by an enterprise office system, then the equipment used by the higher level of the user is used as target audit equipment according to the corresponding relation between the user and the equipment, and after the target audit equipment is determined, the authority audit range information is sent to the corresponding target audit equipment so as to achieve the purpose of authority audit.
By the method, the range option can be selected by self to obtain the authority audit range during authority audit, and the audit flow of the authority audit range is started after the target audit equipment is determined, so that personnel participating in the authority audit process receive the audit task to perform the authority audit.
In one possible embodiment, the scope options include: various subsystem options under the overall system, permission options included in the overall system, and all user options.
Specifically, each subsystem option under the total system, an authority option included in the total system, and all user options are displayed in the first interface, and a user can arbitrarily select among the three options to determine an audit range, for example: a certain subsystem option may be selected to indicate that the right owned by the user under the subsystem is used as the audit range, or a certain right option may be selected to indicate that the user owning the right is used as the audit range, or a certain user may be selected to indicate that the right owned by the user is used as the audit range, and of course, the above options may also be collocated as required, for example: after a certain subsystem option is selected, a certain authority is selected, and then a certain user is selected, which means that the user with the authority under the subsystem is used as an audit range.
In a possible implementation, fig. 2 is a schematic flowchart of another permission processing method provided in the first embodiment of the present application, and as shown in fig. 2, when step 102 is executed, the following steps may be implemented:
step 201, responding to the selection operation of the target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option.
Step 202, responding to the selection operation of the target user option acted on the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option.
Step 203, determining the authority audit range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
Specifically, because the corresponding users under different subsystems are different, after the user selects the target subsystem option under the subsystem option, the candidate user option belonging to the target subsystem option can be displayed, then the target user option under the candidate user option is selected, the respective permissions owned by the users corresponding to the target user option are obtained, and the permissions owned by the target user under the target subsystem are shown as permission audit ranges.
In a possible embodiment, after obtaining the authority audit range information according to step 203, when step 103 is executed, for each target subsystem option, the manager device of the subsystem corresponding to the target subsystem option and the audit device allocated to the subsystem corresponding to the target subsystem option are determined, so that the manager device and the audit device are used as the target audit device.
Specifically, each subsystem is configured with a corresponding manager device and a corresponding audit device, after obtaining the authority audit range information according to step 203, it is necessary to determine the subsystem manager device corresponding to each target subsystem option and the audit device allocated to each target subsystem option, so as to use the determined manager device and audit device as target audit devices, and when performing authority audit on the authority audit range information obtained in step 203, the authority audit range information is displayed through the determined manager device and audit device, so that the personnel using the manager device and the audit device perform authority audit on the authority audit range information, for example: and performing authority audit on the authority audit range information corresponding to the target subsystem 1 by using manager equipment and audit equipment corresponding to the target subsystem 1, and performing authority audit on the authority audit range information corresponding to the target subsystem 2 by using manager equipment and audit equipment corresponding to the target subsystem 2.
In a possible implementation, fig. 3 is a schematic flowchart of another permission processing method provided in the first embodiment of the present application, and as shown in fig. 3, when step 102 is executed, the following steps may be implemented:
step 301, responding to the selection operation of the target permission option under the permission option, and displaying a second window, wherein the second window displays candidate user options having permissions corresponding to the target permission option.
Step 302, responding to the selection operation of the target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
Specifically, when performing permission audit, permission audit can be performed for users having certain permissions, for example: authority auditing is carried out on users with certain important authorities in an enterprise office system to avoid the situation that certain important authorities are used excessively, after the users can select and operate target authority options under authority options, a second window is displayed, candidate user options with the target authorities are displayed in the window, the users can determine the candidate user options corresponding to the target authority options through the second window, then, the selection operation is carried out on the candidate user options under the target authority options, and therefore the target user options under the target authority options are determined, namely: the determined authority auditing range information is used for performing authority auditing on a target user under the target authority, the method can be used for performing authority auditing on a specified user under the specified authority so as to determine whether the specified user should configure the authority, and the method can be used for performing key auditing on certain authorities.
In a possible implementation, fig. 4 is a schematic flowchart of another authority processing method provided in this embodiment, as shown in fig. 4, after obtaining the authority audit range information in step 302, when step 103 is executed, the following steps may be implemented:
step 401, for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs.
Step 402, determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option, and auditing equipment allocated to the authority attributive subsystem corresponding to the target authority option, so as to use the manager equipment and the auditing equipment as the target auditing equipment.
Specifically, since different subsystems correspond to different manager devices and audit devices, after the authority audit range information is obtained in step 302, according to each target authority option in the obtained authority audit range information, a subsystem to which the authority corresponding to the target authority option belongs is determined, and then the manager device corresponding to the subsystem to which the authority corresponding to the target authority option belongs and the audit device allocated to the subsystem to which the authority corresponding to the target authority option belongs are determined, for example: the authority audit range information comprises the following target authorities: the method comprises the steps of obtaining a target authority 1 and a target authority 2, wherein the subsystem to which the target authority 1 belongs is the subsystem 1, the subsystem to which the target authority 2 belongs is the subsystem 2, at the moment, manager equipment and audit equipment corresponding to the subsystem 1 are required to be used as target audit equipment corresponding to the target authority 1, and manager equipment and audit equipment corresponding to the subsystem 2 are required to be used as target audit equipment corresponding to the target authority 2.
In a possible implementation, fig. 5 is a schematic flowchart of another permission processing method provided in the first embodiment of the present application, and as shown in fig. 5, when step 104 is executed, the following steps may be implemented:
step 501, for each manager device, determining authority audit range information corresponding to the manager device.
And 502, sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
Specifically, because the authority audit range information that different administrator's equipment needs to audit is different, and different administrator's equipment disposes the audit equipment that corresponds respectively, when auditing authority audit range information, simultaneously, there is the order of auditing between administrator's equipment and the audit equipment, consequently, after determining authority audit range information, can determine the authority audit range information that each administrator's equipment corresponds, then according to predetermined audit order, send the authority audit range information that each administrator's equipment corresponds to corresponding target audit equipment in proper order and carry out the audit, for example: the method comprises the steps of firstly sending the data to manager equipment for auditing, and sending the data to auditing equipment for auditing after the manager equipment audits.
In a possible embodiment, auditing the authority audit range information corresponding to the administrator device includes: a reclaim right and a reserve right.
Specifically, when performing permission audit on the corresponding permission audit range information, the manager device may perform permission recovery operation and permission retention operation on the permission owned by a certain user, and then send the permission audit range information after the permission recovery operation to the audit device, so that the user of the audit device can perform permission audit.
In a feasible implementation scheme, after the audit flow corresponding to the authority audit range information is started, the audit duration set for the audit flow can be obtained, and then the audit duration is sent to the target audit equipment to be displayed by the target audit equipment.
Specifically, an input box for setting the audit duration may be displayed in the first interface, and the user may input a numerical value for indicating the audit duration in the input box, that is: and setting an audit period of the authority audit, taking the value input in the input box as an audit duration after the audit flow corresponding to the authority audit range information is started, and sending the audit duration to target audit equipment for displaying so as to remind personnel participating in the audit of the audit period of the authority audit.
In a feasible implementation scheme, after the audit flow corresponding to the authority audit range information is started, the operation for performing time limit reminding on the target audit equipment can be responded, the target audit equipment currently in the audit state is determined, and then prompt information for performing time limit reminding is sent to the target audit equipment currently in the audit state.
Specifically, after the audit flow corresponding to the authority audit range information is started, the user can also initiate to realize reminding so as to urge the personnel participating in the audit to accelerate the audit, for example: a control for displaying reminding by a user is also displayed on the first interface, and after clicking the control, the user sends prompt information for reminding the time limit to the target auditing equipment currently in the auditing state, for example: and the current authority audit range information is being subjected to authority audit timing by a user corresponding to the manager equipment, and the prompt information is displayed on the manager equipment, and the current authority audit range information is being subjected to authority audit timing by the user corresponding to the audited equipment, and the prompt information is displayed on the auditing equipment.
In a feasible implementation scheme, after the audit flow corresponding to the authority audit range information is started, audit result information fed back by the target audit equipment after the audit is completed can be obtained.
Specifically, after the device which performs the authority audit finally in the target audit device completes the authority audit, the audit result of the authority audit range information is returned to the device which initiates the audit flow for the user to refer.
Example two
Fig. 6 is a schematic structural diagram of a rights processing device according to a second embodiment of the present application, and as shown in fig. 6, the device includes:
the display unit 61 is configured to provide a first interface in response to a first start operation of the authority audit, where the first interface displays a scope option for determining an authority audit range and a start control for starting an audit process;
a first determining unit 62, configured to determine, in response to a selection operation applied to the scope option, authority audit scope information;
a second determining unit 63, configured to determine, in response to a second start operation acting on the start control, a target audit device according to the authority audit range information;
and the starting unit 64 is used for starting the audit flow corresponding to the authority audit range information according to the target audit equipment.
In one possible embodiment, the scope options include:
various subsystem options under the overall system, permission options included in the overall system, and all user options.
In a possible embodiment, the first determining unit 62 is configured to, in response to a selection operation applied to the scope option, determine the authorization audit scope information, including:
responding to the selection operation of a target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option;
responding to the selection operation of a target user option acted under the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option;
and determining the authority auditing range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
In a possible embodiment, the second determining unit 63, when determining the target audit device according to the authority audit range information, includes:
for each target subsystem option, determining manager equipment of the subsystem corresponding to the target subsystem option and auditing equipment allocated to the subsystem corresponding to the target subsystem option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
In a possible embodiment, the first determining unit 62 is configured to, in response to a selection operation applied to the scope option, determine the authorization audit scope information, including:
responding to the selection operation of a target permission option acted under the permission option, and displaying a second window, wherein the second window displays candidate user options with permissions corresponding to the target permission option;
and responding to the selection operation of a target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
In a possible embodiment, the second determining unit 63, when determining the target audit device according to the authority audit range information, includes:
for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs;
and determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option and auditing equipment distributed to the authority attributive subsystem corresponding to the target authority option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
In a possible embodiment, when the starting unit 64 is configured to start the audit stream corresponding to the authority audit range information according to the target audit device, the starting unit includes:
for each manager device, determining authority audit range information corresponding to the manager device;
and sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
In a possible embodiment, auditing the authority audit range information corresponding to the administrator device includes:
a reclaim right and a reserve right.
In a possible implementation, fig. 7 is a schematic structural diagram of another rights processing apparatus provided in example two of the present application, and as shown in fig. 7, the apparatus further includes:
a first obtaining unit 65, configured to obtain an audit duration set for the current audit flow;
a first sending unit 66, configured to send the audit time length to the target audit device, so that the target audit device displays the audit time length.
In a possible implementation, fig. 8 is a schematic structural diagram of another rights processing apparatus provided in example two of the present application, and as shown in fig. 8, the apparatus further includes:
a third determining unit 67, configured to determine, in response to an operation for performing time limit reminding on the target audit device, the target audit device currently in an audit state;
and a second sending unit 68, configured to send prompt information for performing time limit reminding to the target audit device currently in the audit state.
In a possible implementation, fig. 9 is a schematic structural diagram of another rights processing apparatus provided in example two of the present application, and as shown in fig. 9, the apparatus further includes:
and a second obtaining unit 69, configured to obtain audit result information fed back by the target audit device after the target audit device completes the audit.
EXAMPLE III
Fig. 10 is a schematic structural diagram of an electronic device according to a third embodiment of the present application, including: the electronic device comprises a processor 1001, a storage medium 1002 and a bus 1003, wherein the storage medium 1002 stores machine readable instructions executable by the processor 1001, when the electronic device executes the authority processing method, the processor 1001 and the storage medium 1002 communicate through the bus 1003, and the processor 1001 executes the machine readable instructions to execute the steps of the method according to any one of the first embodiment.
Example four
A fourth embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program performs the steps of the method according to the first embodiment.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to corresponding processes in the method embodiments, and are not described in detail in this application. In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and there may be other divisions in actual implementation, and for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some communication interfaces, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (24)

1. A method of privilege processing, the method comprising:
responding to a first starting operation of the authority audit, providing a first interface, wherein the first interface displays a scope option for determining an authority audit scope and a starting control for starting an audit process;
responding to the selection operation acting on the range option, and determining authority audit range information;
responding to a second starting operation acting on the starting control, and determining target auditing equipment according to the authority auditing range information;
and starting an audit flow corresponding to the authority audit range information according to the target audit equipment.
2. The method of claim 1, wherein the scope options comprise:
various subsystem options under the overall system, permission options included in the overall system, and all user options.
3. The method of claim 2, wherein determining Authority Audit Range information in response to a selection operation applied to the Range option comprises:
responding to the selection operation of a target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option;
responding to the selection operation of a target user option acted under the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option;
and determining the authority auditing range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
4. The method of claim 3, wherein determining a target audit device based on the Authority audit Range information comprises:
for each target subsystem option, determining manager equipment of the subsystem corresponding to the target subsystem option and auditing equipment allocated to the subsystem corresponding to the target subsystem option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
5. The method of claim 2, wherein determining Authority Audit Range information in response to a selection operation applied to the Range option comprises:
responding to the selection operation of a target permission option acted under the permission option, and displaying a second window, wherein the second window displays candidate user options with permissions corresponding to the target permission option;
and responding to the selection operation of a target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
6. The method of claim 5, wherein determining a target audit device based on the Authority audit trail Range information comprises:
for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs;
and determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option and auditing equipment distributed to the authority attributive subsystem corresponding to the target authority option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
7. The method as claimed in claim 4 or 6, wherein the starting of the audit flow corresponding to the authority audit range information according to the target audit device includes:
for each manager device, determining authority audit range information corresponding to the manager device;
and sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
8. The method of claim 7, wherein auditing the audit trail extent information corresponding to the administrator device comprises:
a reclaim right and a reserve right.
9. The method of claim 1, wherein the method further comprises:
obtaining audit duration set for the audit flow;
and sending the auditing time length to the target auditing equipment for display by the target auditing equipment.
10. The method of claim 1, wherein the method further comprises:
responding to the operation for carrying out time limit reminding on the target auditing equipment, and determining the target auditing equipment which is currently in an auditing state;
and sending prompt information for time limit reminding to the target auditing equipment in the auditing state at present.
11. The method of claim 1, wherein the method further comprises:
and obtaining audit result information fed back by the target audit equipment after the target audit equipment finishes the audit.
12. An authority processing apparatus, characterized in that the apparatus comprises:
the display unit is used for responding to a first starting operation of the authority audit and providing a first interface, wherein the first interface displays a range option for determining an authority audit range and a starting control for starting an audit process;
the first determining unit is used for responding to the selection operation acted on the scope option and determining the Authority audit scope information;
the second determining unit is used for responding to second starting operation acting on the starting control and determining target auditing equipment according to the authority auditing range information;
and the starting unit is used for starting the audit flow corresponding to the authority audit range information according to the target audit equipment.
13. The apparatus of claim 12, wherein the scope options comprise:
various subsystem options under the overall system, permission options included in the overall system, and all user options.
14. The apparatus as claimed in claim 13, wherein the first determining unit, when determining the audit trail extent information in response to the selection operation acting on the extent option, comprises:
responding to the selection operation of a target subsystem option acted under the subsystem option, and displaying a first window, wherein the first window displays candidate user options belonging to the target subsystem option;
responding to the selection operation of a target user option acted under the candidate user option, and acquiring the respective permissions owned by the users corresponding to the target user option;
and determining the authority auditing range information according to the target subsystem option, the target user option and the authority owned by the user corresponding to the target user option.
15. The apparatus of claim 14, wherein the second determining unit, when determining the target audit device according to the authority audit range information, is configured to:
for each target subsystem option, determining manager equipment of the subsystem corresponding to the target subsystem option and auditing equipment allocated to the subsystem corresponding to the target subsystem option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
16. The apparatus as claimed in claim 13, wherein the first determining unit, when determining the audit trail extent information in response to the selection operation acting on the extent option, comprises:
responding to the selection operation of a target permission option acted under the permission option, and displaying a second window, wherein the second window displays candidate user options with permissions corresponding to the target permission option;
and responding to the selection operation of a target user option acted on the candidate user option, and determining the authority audit range information according to the target authority option and the target user option.
17. The apparatus of claim 16, wherein the second determining unit, when determining the target audit device according to the authority audit range information, is configured to:
for each target permission option, determining a subsystem to which the permission corresponding to the target permission option belongs;
and determining manager equipment corresponding to the authority attributive subsystem corresponding to the target authority option and auditing equipment distributed to the authority attributive subsystem corresponding to the target authority option, so that the manager equipment and the auditing equipment are used as the target auditing equipment.
18. The apparatus according to claim 15 or 17, wherein the starting unit, when starting the audit stream corresponding to the authority audit range information according to the target audit device, is configured to:
for each manager device, determining authority audit range information corresponding to the manager device;
and sequentially sending the authority audit range information corresponding to the manager equipment to target audit equipment corresponding to the manager equipment for auditing according to a preset audit sequence.
19. The apparatus of claim 18, wherein auditing the audit trail extent information corresponding to the administrator device comprises:
a reclaim right and a reserve right.
20. The apparatus of claim 12, wherein the apparatus further comprises:
the first acquisition unit is used for acquiring the audit duration set for the audit flow;
and the first sending unit is used for sending the auditing time length to the target auditing equipment so as to be displayed by the target auditing equipment.
21. The apparatus of claim 12, wherein the apparatus further comprises:
the third determining unit is used for responding the operation for reminding the time limit of the target auditing equipment and determining the target auditing equipment which is currently in the auditing state;
and the second sending unit is used for sending prompt information for time limit reminding to the target auditing equipment in the auditing state.
22. The apparatus of claim 12, wherein the apparatus further comprises:
and the second acquisition unit is used for acquiring audit result information fed back by the target audit equipment after the target audit equipment finishes the audit.
23. An electronic device, comprising: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the method according to any one of claims 1 to 11.
24. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1 to 11.
CN202010653439.XA 2020-07-08 2020-07-08 Authority processing method and device, electronic equipment and storage medium Active CN111814185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010653439.XA CN111814185B (en) 2020-07-08 2020-07-08 Authority processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010653439.XA CN111814185B (en) 2020-07-08 2020-07-08 Authority processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111814185A true CN111814185A (en) 2020-10-23
CN111814185B CN111814185B (en) 2021-10-15

Family

ID=72842656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010653439.XA Active CN111814185B (en) 2020-07-08 2020-07-08 Authority processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111814185B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349190A (en) * 2001-12-03 2002-05-15 上海交通大学 Central network medium safety monitoring system
US20060248591A1 (en) * 2005-05-02 2006-11-02 Christopher Day Information security auditing and incident investigation system
US20070192478A1 (en) * 2001-09-25 2007-08-16 Louie David G System and method for configuring and viewing audit trails in an information network
CN107659618A (en) * 2017-09-03 2018-02-02 中国南方电网有限责任公司 A kind of cloud auditing system
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN109343863A (en) * 2018-09-06 2019-02-15 福建星瑞格软件有限公司 A kind of interface configuration method and system of HDFS permission
CN109615499A (en) * 2018-12-20 2019-04-12 泰康保险集团股份有限公司 Permission automates auditing method and system
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN110569664A (en) * 2019-08-27 2019-12-13 上海易点时空网络有限公司 Method and device for managing permission application

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070192478A1 (en) * 2001-09-25 2007-08-16 Louie David G System and method for configuring and viewing audit trails in an information network
CN1349190A (en) * 2001-12-03 2002-05-15 上海交通大学 Central network medium safety monitoring system
US20060248591A1 (en) * 2005-05-02 2006-11-02 Christopher Day Information security auditing and incident investigation system
CN107659618A (en) * 2017-09-03 2018-02-02 中国南方电网有限责任公司 A kind of cloud auditing system
CN107679749A (en) * 2017-09-30 2018-02-09 新奥(中国)燃气投资有限公司 The measures and procedures for the examination and approval and Current Authorization Management Platform of a kind of authority application
CN109343863A (en) * 2018-09-06 2019-02-15 福建星瑞格软件有限公司 A kind of interface configuration method and system of HDFS permission
CN109615499A (en) * 2018-12-20 2019-04-12 泰康保险集团股份有限公司 Permission automates auditing method and system
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN110569664A (en) * 2019-08-27 2019-12-13 上海易点时空网络有限公司 Method and device for managing permission application

Also Published As

Publication number Publication date
CN111814185B (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CA2874605C (en) Methods, systems and computer program products for collaborative tax return preparation
CN108629558B (en) Software development management system
CN106096905A (en) A kind of project management method and system
US20070094109A1 (en) Time and attendance method and system
CN107437222A (en) The processing method and system of online business data based on bank counter front end
CN109903180A (en) A kind of substation secondary peace arranges Information Management System
CN106896986A (en) Minutes generation method and device
CN111814185B (en) Authority processing method and device, electronic equipment and storage medium
CN110930105A (en) Task list processing method and device, computer equipment and storage medium
CN114416223A (en) Application program linkage method and device, computer equipment and storage medium
CN111353760B (en) Personnel account management method, device and system applied to enterprise
CN111147484B (en) Account login method and device
CN113743791A (en) Business evaluation method and device for business work order, electronic equipment and medium
CN110677494A (en) Access response method and device
US20200097870A1 (en) Work task commitment manager
CN106951449B (en) Service driving method and device
CN110796353A (en) Scheduling processing method and device
CN107948046B (en) Event state tracking method, device and system
CN109886640A (en) A kind of work transaction management method, system, electronic equipment and storage medium
WO2019012489A1 (en) An apparatus for analyzing mood
CN109447389B (en) Method and system for managing weighing service data
CN116415894A (en) Synchronous processing method and device for accessory standing accounts
CN118158278A (en) Terminal salesman task proxy method and device and electronic equipment
CN114661388A (en) View display method, device, server and storage medium
CN115357482A (en) Test data generation method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant