CN113312588A - Method, device, equipment and storage medium for managing operation authority of online document - Google Patents
Method, device, equipment and storage medium for managing operation authority of online document Download PDFInfo
- Publication number
- CN113312588A CN113312588A CN202110335618.3A CN202110335618A CN113312588A CN 113312588 A CN113312588 A CN 113312588A CN 202110335618 A CN202110335618 A CN 202110335618A CN 113312588 A CN113312588 A CN 113312588A
- Authority
- CN
- China
- Prior art keywords
- authority
- online document
- party
- usage code
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000007726 management method Methods 0.000 claims abstract description 45
- 230000004044 response Effects 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012546 transfer Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 7
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 238000007639 printing Methods 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 6
- 230000032683 aging Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 208000003580 polydactyly Diseases 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an operation authority management method, device, equipment and storage medium of an online document. The method comprises the following steps: in response to a permission opening request of an access party aiming at an online document, determining an operation permission item corresponding to the permission opening request, generating a first usage code corresponding to the operation permission item, and providing the first usage code to the access party; responding to the input request of the access party, and acquiring a second usage code provided by the access party; and opening corresponding authority to the access party according to the second use code. Therefore, the authority management of the creator of the online document can be facilitated, and the cooperation efficiency of the document can be improved.
Description
Technical Field
The invention relates to the field of automatic office, in particular to an operation authority management method and device, equipment and a storage medium for an online document.
Background
With the development of computer and network technologies, collaborative office is becoming more and more common, and multiple users can perform corresponding operations on online documents, such as editing the online documents, through collaborative office synchronization.
Currently, a creator of an online document may protect the online document from modification by setting access rights to the online document, for example, only setting viewable rights to the online document, and an accessing party of the online document may only browse the online document. If the access party of the online document wants to have the editing authority, a request for acquiring the editing authority needs to be sent to the creator of the online document, and the creator of the online document correspondingly sets/modifies the access authority of the online document according to the corresponding request for acquiring the authority of the access party of the online document. Because the access parties of the online documents are different, the access rights which the access parties of the online documents need to obtain are different, so that the times for setting/modifying the access rights are more and the operation is redundant.
Disclosure of Invention
The invention provides an operation authority management method, device, equipment and storage medium of an online document, which aim to overcome the defect that the access authority of an access party for managing the online document by a creation side of the online document is inconvenient in the related art.
Specifically, the invention is realized by the following technical scheme:
in a first aspect, a method for managing operation rights of an online document is provided, which includes:
in response to a permission opening request of an access party aiming at an online document, determining an operation permission item corresponding to the permission opening request, generating a first usage code corresponding to the operation permission item, and providing the first usage code to the access party;
responding to the input request of the access party, and acquiring a second usage code provided by the access party;
and opening corresponding authority to the access party according to the second use code.
Optionally, in a case that the permission opening request is from an accessing party, determining an operation permission item corresponding to the permission opening request includes:
determining user information of the access party, and sending the user information to a creator of the online document, so that the creator configures authority configuration information for the access party corresponding to the user information;
and determining the operation authority item according to the authority configuration information returned by the creator.
Optionally, in a case that the permission opening request is from a creator, determining an operation permission item corresponding to the permission opening request includes:
acquiring authority configuration information carried by the authority opening request, wherein the authority configuration information is configured for the access party by the creator;
and determining the operation authority item according to the authority configuration information.
Optionally, providing the first usage code to the accessing party comprises:
sending the first usage code to the creator to send the first usage code to the accessing party through the creator;
or determining user information of an access party to which the permission opening request is directed, and directly sending the first usage code to the corresponding access party according to the user information.
Optionally, opening a corresponding right to the access party according to the second usage code includes:
verifying whether the second usage code matches the first usage code;
and opening corresponding authority to the access party according to the operation authority item corresponding to the first use code under the condition that the verification result is that the second use code is matched with the first use code.
Optionally, the permission opening request includes: user information of the accessing party;
after determining the operation authority item corresponding to the authority opening request and generating the first use code corresponding to the operation authority item, the method further comprises the following steps:
establishing a corresponding relation among the user information, the first use code and the operation authority item;
verifying whether the second usage code matches the first usage code, comprising:
determining a first usage code matched with the user information of the access party providing the second usage code according to the corresponding relation;
verifying whether the second usage code is the same as the matched first usage code.
Optionally, the permission opening request includes: document identification of the online document and user information of the accessing party;
after determining the operation authority item corresponding to the authority opening request and generating the first use code corresponding to the operation authority item, the method further comprises the following steps:
establishing a corresponding relation among user information, document identification, a first use code and an operation authority item;
verifying whether the second usage code matches the first usage code, comprising:
determining target user information of an accessing party providing the second usage code and target document identification of an online document currently accessed by the accessing party;
determining a first usage code matched with the target user information and the target document identification according to the corresponding relation;
verifying whether the second usage code is the same as the matched first usage code.
Optionally, in a case that the first usage code includes an effective operation duration, the method further includes: starting timing at a preset moment after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the timing duration reaches the effective operation duration;
and/or, in case that the first usage code contains a valid number of operations, the method further comprises: and counting the operation times of the access party after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the operation times reach the effective operation times.
Optionally, in a case that the operation right item is a right management item, opening an access right that governs the accessing party and other accessing parties to the online document to the accessing party.
Optionally, the accessing party transfers the right corresponding to the operation right item to the other accessing party.
In a second aspect, a method for managing operation rights of an online document is provided, which includes:
sending a permission opening request initiated by an access party of the online document;
receiving a first usage code; the first use code is generated according to an operation authority item determined by the authority opening request;
inputting a second use code;
receiving the authority opened by an access party of the online document, and operating the online document according to the opened authority; wherein the permission is determined according to the second usage code.
Optionally, receiving authority configuration information of the access party corresponding to the user information according to the user information of the access party; and determining the operation authority item according to the authority configuration information.
Optionally, the determining the right according to the second usage code includes:
verifying whether the second usage code matches the first usage code;
and opening corresponding authority to the access party according to the operation authority item corresponding to the first use code under the condition that the verification result is that the second use code is matched with the first use code.
Optionally, in a case that the first usage code includes an effective operation duration, the method further includes: starting timing at a preset moment after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the timing duration reaches the effective operation duration;
and/or, in case that the first usage code contains a valid number of operations, the method further comprises: and counting the operation times of the access party after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the operation times reach the effective operation times.
Optionally, in a case that the operation right item is a right management item, opening an access right that governs the accessing party and other accessing parties to the online document to the accessing party.
Optionally, the accessing party transfers the right corresponding to the operation right item to the other accessing party.
In a third aspect, a method for managing operation rights of an online document is provided, including:
sending an authority opening request aiming at an access party of an online document to a server managing the online document, so that the server determines an operation authority item corresponding to the authority opening request aiming at the authority opening request, generates a first usage code corresponding to the operation authority item, and provides the first usage code to the access party;
acquiring a second usage code provided by the visitor according to the first usage code;
and sending the second usage code to the server, so that the server opens corresponding authority to the access party according to the second usage code.
In a fourth aspect, there is provided an operation right management apparatus for an online document, comprising:
the determining module is used for responding to a permission releasing request of an access party, determining an operation permission item corresponding to the permission releasing request, generating a first usage code corresponding to the operation permission item, and providing the first usage code to the access party;
the acquisition module is used for responding to the input request of the access party and acquiring a second use code provided by the access party;
and the permission release module is used for opening corresponding permission to the access party according to the second use code.
In a fifth aspect, an electronic device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the method for managing the operation right of an online document according to any one of the above items.
In a sixth aspect, there is provided a computer readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, implementing the steps of the method for managing operation authority of an online document according to any one of the above.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
according to the embodiment of the invention, by means of the use code, the creator of the online document can endow all or part of the authority owned by the creator of the online document to the access party of the appointed online document, so that the appointed user can operate the online document and/or manage the access authority of the user and other users to the document content, the authority management of the creator of the online document is simplified, and the cooperation efficiency of the document can be improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is an architectural diagram illustrating an online document system in accordance with an exemplary embodiment of the present invention;
FIG. 2a is a flowchart illustrating a method for managing operation rights of an online document according to an exemplary embodiment of the present invention;
FIG. 2b is a flowchart illustrating another method for managing operation rights of an online document according to an exemplary embodiment of the present invention;
FIG. 2c is a flowchart illustrating another method for managing operation rights of an online document according to an exemplary embodiment of the present invention;
FIG. 3a is a schematic diagram illustrating a user interface of an online document application in accordance with an exemplary embodiment of the present invention;
FIG. 3b is a diagram illustrating an operation right configuration window of an online document according to an exemplary embodiment of the present invention;
FIG. 3c is a diagram illustrating one method of setting a window with an age dependent usage code in accordance with an exemplary embodiment of the present invention;
FIG. 3d is a diagram illustrating a window for validating a usage code in accordance with an exemplary embodiment of the present invention;
FIG. 3e is a diagram illustrating a user interface of another online document application, according to an illustrative embodiment of the present invention;
FIG. 4 is a block diagram illustrating an operation right management apparatus for an online document according to an exemplary embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. Depending on context, the word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "under … …".
FIG. 1 is an architectural diagram illustrating an online document system in accordance with an exemplary embodiment of the present invention. As shown in fig. 1, the system may include a server 11, a network 12, and several electronic devices, such as a first cell phone 13, a second cell phone 14, a computer 15, and so on. Of course, mobile phones and computers are only some types of electronic devices that can be used. Indeed, it is clear that the user may also use electronic devices of the type such as: tablet devices, notebook computers, Personal Digital Assistants (PDAs), wearable devices (e.g., smart glasses, smart watches, etc.), etc., which are not limited by one or more embodiments of the present invention.
One or more of the first mobile phone 13, the second mobile phone 14 and the computer 15 interact with the server 11 through a network 12, and the network 12 may be a wired or wireless network, such as Wi-Fi (wireless local area network), 4G (fourth generation mobile communication technology), and the like.
The server 11 may be a physical server or a virtual server. The server 11 may run a server-side program of an application to implement a related service function of the application, for example, when the server 11 runs an online document program, the related service function of the online document application may be implemented. In one or more embodiments of the present invention, the server 11 may cooperate with an online document application running on the electronic device to manage access rights to an online document.
The Application can be an online document Application (Application), and the online document Application can be used for viewing, creating, editing and sharing an online document by an access party of the online document at any time and any place; the online document application can also be used for a plurality of online document visitors to view and/or edit the opened online documents at the same time, and synchronously update the edited online documents in real time. The document types of the online document may include: text documents, table documents, presentation documents (Power Point), and Portable documents (Portable Document Format), among others.
The online document application can be loaded through a browser and displayed to an access party of the online document in a webpage form; the online document application can also be loaded and displayed through other application programs, such as a social application program, an instant messaging application program, an office application program and the like.
In the related art, only the creator of the online document can manage (set/modify) operations of viewing, editing, printing, and the like of the online document by the accessing party of the online document. In order to facilitate management of an operation right of an online document, an embodiment of the present invention provides an operation right management method for an online document, where a creator of an online document may assign all or part of an operation right of the online document to a specified access party of the online document, and a type of the operation right of the creator of the online document to the online document includes: management rights of access rights and document operation rights. The access party of the online document assigned with the management authority can manage the access authority of the access party and other access parties of the online document to the online document, and the operation corresponding to the access authority comprises the operations of viewing, editing, printing and the like of the online document. An accessing party of the online document to which the operation authority is assigned may perform operations such as renaming of the online document, format conversion of the online document (e.g., converting a presentation document into a text document), page layout modification of the online document (e.g., modifying a table structure of a table document), and the like, which are different from operations corresponding to the access authority of the online document.
The following further describes a specific implementation process of the creator of the online document allocating the operation right of the creator to the online document to the accessing party of the online document.
FIG. 2a is a flowchart illustrating an operation right management method for an online document, which may be applied to a server, according to an exemplary embodiment of the present invention, and the method may include the following steps:
Wherein the visitor to the online document is a user other than the creator of the online document who is already registered with the online document system.
The operation permission opening request for the access party of the online document can be from the access party of the online document or from the creation party of the online document, that is, the access party of the online document or the creation party of the online document can request to open the permission of the access party, but the opening modes are different.
The server side can determine the user type according to the user information of the user sending the operation permission opening request, wherein the user type comprises an access party of the online document and a creation party of the online document. Specifically, the server stores the corresponding relationship between the document identifier of the online document and the user information of the creator of the online document, and through the matching of the user information, it can be determined whether the user sending the operation permission opening request is the creator of the online document or the visitor of the online document. The user information may include, but is not limited to, a user account or a user name, etc.
If the operation permission opening request is from an access party of the online document, the operation permission opening request can be triggered by the access party of the online document performing unauthorized operation in a certain operation area in a user interface of the online document application, where the unauthorized operation refers to performing an action without operation permission on the operation area, for example, performing editing in the operation area without editing permission.
Referring to the user interface of an online document application shown in fig. 3a, the operation areas may be, but are not limited to, an operation area 31 for renaming a document, an operation area 32 for regional rights, and an operation area 33 for document contents, which are shown in the figure. In an exemplary embodiment, unauthorized operation may be determined by: if an access party (hereinafter, referred to as "access party a") of one online document only allows to access the document content of one online document (hereinafter, referred to as "document a") in a viewing manner, and if the access party a triggers an "add area" control in an operation area 32 of the area authority, the user interface generates an operation authority opening request of the operation area 32 of which the operation authority requirement is the area authority, and sends the operation authority opening request to the server. Further, the user interface may also generate a prompt like "operation not authorized currently" or the like to prompt the accessing party a to request the creator of the document a (hereinafter, simply referred to as "creator b") to open the operation authority of the operation area 32 for which the area authority is open. Of course, an operation permission opening control may also be set in each operation area, and an operation permission opening request is generated by triggering the operation permission opening control and sent to the server.
The server side can send the received operation authority opening request to the online document application, the operation authority opening request can contain user information and operation authority requirement information, and the operation authority requirement information contains operation authority items which are requested to be opened by an online document access party. And the online document application acquires the user information and the operation authority requirement information of the operation authority opening request, presents the user information and the operation authority requirement information to a user interface of the online document application and displays the user information and the operation authority requirement information to the creator b. And the creator b determines whether to configure the authority configuration corresponding to the operation authority requirement information for the access party a corresponding to the user information or not according to the user information and the operation authority requirement information displayed on the user interface. The authority configuration of the operation authority requirement information is configured by the creator b according to the actual situation, specifically:
when the creator b configures corresponding authority configuration for the access party a according to the operation authority requirement information, the creator b configures authority configuration information corresponding to the operation authority requirement information for the access party a, where the authority configuration information includes operation authority items identical to the operation authority requirement information, for example, the operation authority items of the operation area 32 of the area authority are included in the operation authority requirement information, and then the authority configuration information also includes the operation authority items of the operation area 32 of the area authority. And under the condition that the server receives the authority configuration information returned by the creator b, determining an operation authority item according to the authority configuration information and generating a first use code corresponding to the operation authority item.
When the creator b does not configure the corresponding authority configuration for the access party a according to the operation authority requirement information, there are the following two cases.
In the first case, the creator b does not configure the authority configuration for the access party a according to the operation authority requirement information, but configures the authority configuration for the access party a by itself. In this case, the authority configuration information may contain an operation authority item different from the operation authority requirement information, such as an operation authority item of the operation area 32 of which the operation authority requirement information contains the area authority, and the authority configuration information contains an operation authority item of the operation area 31 of which the document is renamed; for example, the operation authority requirement information includes an operation authority item of the operation area 32 of the area authority, and the authority configuration information includes an operation authority item of the operation area 31 of the document renaming and an operation authority item of the operation area 32 of the area authority. And under the condition that the server receives the authority configuration information returned by the creator b, determining an operation authority item according to the authority configuration information and generating a first use code corresponding to the operation authority item.
In case two, the creator b does not configure any rights configuration for the accessor a. Under the condition, the creator b does not return the authority configuration information to the server, and the server sends an operation authority refusal opening response to the access party a under the condition that the server does not receive the authority configuration information returned by the creator b within the preset time length. The preset time period may be set according to actual needs, and may be set to, for example, 5 seconds, 8 seconds, and the like, but is not limited to the time period limit.
In addition, the authority configuration of the operation authority requirement information can be configured by a server, and the specific steps are as follows: according to user information and operation authority requirement information displayed on a user interface, when a creator b determines that an access party a corresponding to the user information is configured with authority configuration corresponding to the operation authority requirement information, a first preset operation is executed, wherein the first preset operation can be, for example, clicking an enter key, after a server receives click enter key information returned by the creator b, the creator b is determined to determine to perform corresponding authority configuration, and the server determines an operation authority item according to the operation authority requirement information and generates a first use code corresponding to the operation authority item; when the creator b determines that the access party a corresponding to the user information is not configured with the authority configuration corresponding to the operation authority requirement information, executing a second predetermined operation, wherein the second predetermined operation may be, for example, clicking an esc key, and after receiving the information of clicking a esc key returned by the creator b, the server determines that the creator b does not perform the corresponding authority configuration, and sends an operation authority refusal opening response to the access party a; or under the condition that the server side does not receive response information which is returned by the creator b and aims at the operation permission opening request within the preset time length, the creator b is judged not to carry out corresponding permission configuration, and the server side sends operation permission refusal opening response to the access party a.
The method comprises the following steps that the operation authority type of the online document is corresponding to the operation authority type of the online document possessed by a creator of the online document, and the type corresponding to the operation authority item comprises the following steps: one is a right management item, and the access party of the online document, which is assigned with the right corresponding to the right management item, can manage the access right of the access party and other access parties of the online document, namely, set/modify the access right of the online document, such as viewing, editing, printing and the like, for the access party and other access parties of the online document; the other is a document operation item, an accessing party of the online document assigned with the right corresponding to the right management item can perform online operation on the online document, and the online operation on the online document can include, but is not limited to, renaming of the online document, format conversion of the online document, page layout modification of the online document, and the like, which are different from the processes of viewing, editing, printing, and the like of the online document.
The operation permission opening request can also be generated when the access party registers in the online document application, in this scenario, the operation permission opening request may only contain user information, and the server may send the operation permission opening request to all or part of the creator of the online document registered in the online document application, so that the creator of the online document receiving the operation permission opening request configures permission configuration information for the access party of the online document. And the server side can determine the operation authority item according to the authority configuration information and generate a first use code corresponding to the operation authority item.
If the operation permission opening request is from the creator of the online document, in this scenario, the permission configuration information is configured by the creator of the online document actively for the visitor of the online document, referring to fig. 3b, the creator of the online document may configure the permission configuration information for the visitor of all or part of the online document registered in the online document application through the operation permission configuration window shown in the figure, generate the operation permission opening request according to the permission configuration information, and send the operation permission opening request to the server. The creator of the online document can distribute all or part of the operation authority of the creator for the online document to the access party of the specified online document in a mode of configuring authority configuration information. The server side can determine the operation authority item according to the authority configuration information carried by the operation authority opening request and generate a first use code corresponding to the operation authority item.
The configuration authority configuration information comprises at least one operation authority item. For a table document, the operation right items shown in fig. 3b may be, but are not limited to being, included, and the definition of each operation right item is as follows:
an operation region editing authority item, in which an accessing party of the online document having the operation authority item can perform editing operation on all operation regions in the user interface of the online document application, for example, the operation region 31 renamed to the document shown in fig. 3a, the operation region 32 of the region authority and the operation region 33 of the document content can all be edited;
setting a permission item for the helper, wherein the access party of the online document with the operation permission item can manage the operation permission of the access party and other access parties of the online document to the online document;
deleting the row and column authority items in the worksheet, wherein the access party of the online document with the operation authority items can modify the list structure of the form document;
the term of removing the protection authority of the current sheet refers to the open state of the current sheet, and under the condition of being in the completely open state, any access party of the online document can check, edit, print and the like on the online document.
It can be understood that the above operation authority items are examples set for form documents, and are not exhaustive, and for different types of online documents, corresponding operation authority items may be set according to actual requirements.
The first usage code can be generated by the server when determining the operation authority item; the first usage code may be selected by the server from a plurality of generated usage codes, for example, the server stores a plurality of randomly generated usage codes in advance, and the server selects one of the plurality of usage codes as the first usage code when determining the operation authority item. The first usage code may be represented by, but not limited to, a character string consisting of a plurality of digits, or a character string consisting of digits plus english alphabets, or a character string consisting of digits plus special symbols.
When configuring the authority configuration information, the creator of the online document may further set a valid operation duration and/or a valid operation number that allow the visitor of the online document to operate the online document. The limitation on the operation timeliness of the access party of the online document can be realized by setting the effective operation duration and/or the effective operation times of the first use code through the server. The effective operation duration of each first user code is set to be T, for example, T is a real number greater than 0; or setting the effective operation times of each first use code as F, wherein F is a positive integer.
Referring to fig. 3c, a window for setting usage codes with aging in which a creator of an online document can set the aging for a first usage code is shown. Taking the setting of the effective operation duration as an example, the creator of the online document may select the corresponding effective operation duration in a selection box popped up after triggering the "xxx" lower triangular control 38 in the drawing, and the creator of the online document may also input any duration in the editing box by double-clicking the "24-hour" editing box, so as to set the effective operation duration of the first usage code, and after completing the time efficiency setting, by triggering the "acquire usage code" control 39, the client of the creator of the online document may generate an operation permission start request according to the permission configuration information and the effective operation duration, and send the operation permission start request to the server. Similar to the setting of the effective operation duration of the first use code, the effective operation times can be set for the first use code by setting the window of the use code with the time efficiency, the specific setting mode of the effective operation times is similar to the setting mode of the effective operation duration, and the specific implementation process is not repeated here.
In order to ensure that the user identity with the aging is the creator of the online document, the user identity may also be verified by using a window with an aging use code, referring to fig. 3c, the creator of the online document may input its contact information (e.g., a mobile phone number, a mailbox, etc.) in a user information input box 36, and obtain an authentication code from the server by triggering an "acquire authentication code" control 37, where the authentication code may be randomly generated by the server, and the server returns the authentication code to the creator of the online document through the contact information provided by the creator of the online document. And the user interface of the online document application of the creator generates an operation permission opening request according to the verification code, the permission configuration information and the effective operation duration of the first use code provided by the creator of the online document and sends the operation permission opening request to the server. When receiving an operation authority opening request, the server side firstly verifies the identity of a creator of the online document according to the verification code, under the condition that the verification code provided by the creator of the online document is the same as the verification code of the server side, the verification is passed, after the identity of the creator of the online document is confirmed, the server side determines the first usage code, generates the first usage code corresponding to the operation authority item, and sets the time efficiency for the first usage code.
The server may add an identification bit in the first usage code to distinguish whether the authority corresponding to the operation authority item included in the authority configuration information configured by the creator of the online document for the access party of the online document is all or part of the operation authority possessed by the creator of the online document. For example, the first bit of the first usage code is used as the identification bit, "0" indicates that all the management rights of the operation right are open, and "1" indicates that the management rights of the operation right are partially open. In the case that the first use code is "0", the management right of the access side of the online document to the operation right of the online document, which is possessed by the creator of the online document, can be opened to the access side of the specified online document, and in an exemplary embodiment, in the case that the management right of the operation right of the access side of the online document to the online document, which is possessed by the creator of the online document, includes right n1, right n2 and right n3, right n1, right n2 and right n3 are opened to the access side of the specified online document. In the case that the first usage code has a first bit of "1", the management right of the access side of the online document to the operation right of the online document, which is possessed by the creator of the online document, may be partially opened to the access side of the specified online document, and in an exemplary embodiment, in the case that the entire management right of the operation right of the access side of the online document to the online document, which is possessed by the creator of the online document, includes the right n1, the right n2, and the right n3, the creator of the online document opens one or two of the right n1, the right n2, and the right n3 to the access side of the specified online document according to work requirement and other factors.
In an exemplary embodiment, in a case that a creator of an online document assigns all rights owned by the creator to the online document to a specified access party of the online document, when determining an operation right item corresponding to an operation right opening request, a server generates a universal code corresponding to the operation right item, where the universal code may be a special case of a usage code and may characterize all releases of the rights. The universal code may be expressed in a form of, but not limited to, a character string composed of multiple digits, or a character string composed of digits plus English letters, or a character string composed of digits plus special symbols.
The server may remove the authority limit for the access party of the specified online document configured with the universal code, and at this time, the access party of the specified online document has the management right of the operation authority of the access party of all online documents to the online document, that is, the management right of the access party of the specified online document is equal to the management right of the creator of the online document, and it may perform corresponding operation on any operation area in the user interface of the online document application according to the requirement, for example, operate the operation area 32 of the area authority shown in fig. 3a to manage the operation authority of the access party of the online document; operating the operation area 33 of the document content shown in fig. 3a, viewing, editing, printing, etc. of the online document are realized; the operation area 31 for renaming a document shown in fig. 3a is operated to change the name of an online document.
In one embodiment, the server may send the generated first usage code to a creator of the online document, so as to send the first usage code to an accessing party of the specified online document through the creator of the online document. For example, in the case where the operation permission opening request is from the creator of the online document, the server may return the first usage code to the creator of the online document that sent the operation permission opening request, and the creator of the online document sends the first usage code to the specified accessing party of the online document. In the case that the operation right opening request is from the accessing party of the online document, similarly, the server may first send the first usage code to the creating party of the online document, and the creating party of the online document determines whether to send the first usage code to the accessing party of the online document.
In another embodiment, the server may send the first usage code directly to the visitor to the online document. For example, in a case where the operation right opening request is from a creator of the online document, the server may transmit the first usage code to an accessing party of the online document corresponding to the user information provided by the creator of the online document. Under the condition that the operation permission opening request comes from the access party of the online document, the server side can determine the access party of the online document according to the user information carried in the operation permission opening request, and directly returns the first use code to the access party of the online document.
The server side can send the first usage code through the online document application, for example, the server side sends the first usage code to the online document application, and the online document application presents the first usage code to a creator of the online document (or an accessing party of the online document) through a user interface; the server can also query the contact ways such as the mailbox, the telephone number and the like reserved by the creator of the online document (or the visitor of the online document) during the registration of the online document application, and send the first usage code to the creator of the online document (or the visitor of the online document) in the ways of short message, mailbox and the like.
After the server determines the first usage code and the operation authority item corresponding to the operation authority opening request, prompt information can be generated and displayed to an access party of the online document through a user interface, or a window for popping up the verification usage code is triggered on the user interface, so that the access party of the online document inputs a second usage code in a corresponding area of the user interface according to the prompt information, or the second usage code is input in the window for popping up the verification usage code. Taking the window for verifying the usage code shown in fig. 3d as an example, the accessing party of the online document may input the second usage code in the usage code input box 40 in the window, and by triggering the "verification" control 41, the user interface generates an input request according to the second usage code input by the accessing party of the online document, and sends the input request to the server.
The window for verifying the usage code may also be popped up by the accessing party of the online document without performing an unauthorized operation in an operation area of the user interface of the online document application, and the accessing party of the online document may input the second usage code in the usage code input box 40 of the window for verifying the usage code, so that the user interface generates an input request according to the second usage code input by the accessing party of the online document and sends the input request to the server.
And step 204a, opening corresponding authority to the access party according to the second use code.
In one embodiment, the client opens the corresponding right to the access party by verifying the second usage code. Specifically, the client verifies whether the second use code is matched with the first use code, and opens corresponding operation authority to an access party of the online document according to the operation authority item corresponding to the first use code under the condition that the verification result is that the second use code is matched with the first use code.
After the server determines the operation authority item and the corresponding first usage code, the server may further establish a corresponding relationship between the first usage code and the operation authority item, so that when an access party of the online document operates the online document, the server can be used to verify whether a second usage code provided by the access party of the online document matches the first usage code stored by the server.
Under the condition that the operation authority opening request contains the document identification of the online document and/or the user information of the access party of the online document, after the operation authority item and the corresponding first use code are determined, the server side can establish the corresponding relation among the document identification and/or the user information, the first use code and the operation authority item. Referring to table 1, taking the example that the operation permission opening request includes the document identifier and the user information, the server may establish a corresponding relationship among the document identifier, the user information, the first usage code and the operation permission item, so that when the access party of the online document is operated, the server may be used to verify whether the second usage code provided by the access party of the online document matches the first usage code stored by the server.
TABLE 1
Under the condition that the server stores the corresponding relation between the first usage code and the permission configuration item, the server can inquire whether the first usage code identical to the second usage code exists in the corresponding relation when receiving the second usage code, if so, the verification is passed, and then the corresponding operation permission is opened to the access party of the online document according to the operation permission item corresponding to the first usage code identical to the second usage code. If not, the verification is not passed, and a similar prompt of 'error using code' can be returned to the access party of the online document.
Under the condition that the server stores the corresponding relation among the first usage code, the user information and the authority configuration item, the server can firstly confirm the user information of the access party of the online document providing the second usage code when receiving the second usage code, and determine the first usage code corresponding to the user information according to the corresponding relation. If the first usage code is the same as the second usage code, the verification is passed, and the corresponding operation authority is opened to the access party of the online document according to the operation authority item of the first usage code passing the verification. If the first usage code is different from the second usage code, which indicates that the verification is not passed, a similar prompt of "usage code error" may be returned to the accessing party of the online document. The user information is combined to verify the use code, so that the risk that an access party of a certain online document without permission operates the online document due to leakage of the use code can be prevented.
It is understood that, in the case where the creator of a plurality of online documents configures the right configuration information for the access party of the same online document at the same time or for a period of time (for example, 11/1/9: 00-9: 30/2020), for different online documents, the user information of the access party of the online document corresponds to a plurality of first usage codes. When the usage codes are verified, the server side can determine a plurality of first usage codes corresponding to the user information of the access party of the online document according to the corresponding relation among the first usage codes, the user information and the authority configuration items, verify and match the second usage codes and the first usage codes one by one, and open corresponding operation authorities to the access party of the online document according to the operation authority items of the verified first usage codes.
The server can also store the corresponding relation of the first usage code, the user information, the document identification and the authority configuration item, so that the first usage code is uniquely determined according to the document identification and the user information of the online document currently accessed by the access party of the online document when the usage code verification is carried out, and whether the second usage code is matched with the uniquely determined first usage code is verified, and the verification times of the usage code are reduced.
Referring to fig. 3e, in the case where the visitor of the online document accesses the online document (named "student pickup vehicle registry"), and the server opens the right corresponding to the operation region editing right item for the visitor of the online document, the visitor of the online document can set/modify the access right for the online document in the operation region 32 of the region right for himself or herself, which is equivalent to the creator of the online document giving the management right of the access right for the online document that he or she owns to the visitor of the online document. For example, referring to interface area 34 shown in FIG. 3e, the access rights for Zhang III, the visitor to the online document, are configured to view only column D; the access right of the online document with the access party Lifours is configured to be editable for the D column; referring to the interface area 35 shown in FIG. 3e, the access privileges of the accessing party Zhang III for online documents are configured to view only columns A-C. The access party of the online document can also set/modify the operation type of the document.
The access party having the management authority for the access authority of the online document can transfer the management authority owned by the access party to other access parties, namely, the access party can release all or part of the authority owned by the access party to other access parties. The specific implementation manner that the access party of the online document releases the permission to other access parties is consistent with the implementation manner that the creator of the online document releases the permission to the access party, and the specific implementation manner is not described in detail.
The visitor of the online document can also add an interface area in the operation area 32 of the area authority by selecting the specified document operation area in the table and triggering the "+ add area" control, and add the visitor of the online document and the corresponding access authority type in the interface area. Each interface region may correspond to a sub-region of the operation region 33 of the document content, and the size of the sub-region may be set according to actual requirements, for example, in fig. 3e, the sub-region of the interface region 34 is the D-th row, and the sub-regions of the interface region 35 are rows a to C. If the online document is a table document, the sub-area may be a specific table or a specific row and column in the specific table. If the online document is a text document or a presentation document, the sub-regions may be designated pages.
In the case that the server opens the document operation authority for the online document for the accessing party of the online document, the accessing party of the online document can execute the document operation corresponding to the document operation authority in the document operation area, and the document operation type is not limited to renaming, document type conversion, document page layout modification and the like of the online document, and is different from processing of accessing, editing, printing and the like of the document content of the online document. Under the condition that the operation authority item opened by the creator of the online document for the visitor of the online document is 'document table structure editing', the visitor of the online document can change the table structure of the online document, for example, delete rows and columns of the online document in a table form, modify table fields and the like; in the case where the operation right item opened by the creator of the online document for the visitor of the online document is "document format conversion", the visitor of the online document may convert the presentation document into a text document.
If the server sets the effective operation duration for the first use code, the server can also start timing at a preset time after the operation permission item is started for the access party of the online document, close the permission released to the access party of the online document under the condition that the timing duration reaches the effective operation duration, and prompt the access party of the online document to lose effectiveness of the use code. The server side can start timing immediately after the operation authority item is started for the access party of the online document, can start timing when the access party of the online document inputs the second use code, and can start timing when the second use code is acquired.
If the server sets the effective operation times for the first use code, the server can also count the operation times of the online document operated by the access party of the online document, and close the authority released to the access party of the online document under the condition that the operation times reach the effective operation times. The operation times may be counted as +1 operation times when the control in the user interface is triggered once, or as +1 operation times when the second use code is input once.
It should be noted that, after the authority is opened for the access party of the online document, the creation party of the online document can still manage the access authority of the user for the document content and can operate the online document, and under the condition that the access authority configuration of the creation party of the online document and the access party of the online document endowed with the authority for the online document and the operation of the online document are repeated or conflicted, the last modified version can be used as the final version; the versions set or modified each time by the creator of the online document and the visitor of the online document can also be saved and the corresponding user information and modification time are recorded to ensure the historical traceability, and of course, the version which is shown to the visitor of the online document can be the last modified version.
According to the embodiment of the invention, by means of the use code, the creator of the online document can endow all or part of the operation authority owned by the creator of the online document to the designated access party of the online document, so that the access party of the designated online document can manage the access authority of the creator of the online document and other access parties of the online document to the online document, the authority management of the creator of the online document is simple and convenient, and the cooperation efficiency of the document can be improved.
It should be noted that the operation right management method of any embodiment is not limited to be applied to a server, and the operation right management method of any embodiment may also be applied to a client, that is, a step of executing the operation right management method by a terminal installed with an online document application (client); the operation authority management method of any of the above embodiments may also be applied to a system including a client and a server, that is, the steps of the operation authority management method of the online document are realized through the interaction between the client and the server.
FIG. 2b is a flowchart illustrating another method for managing operation authority of an online document, which is applied to a client, according to an exemplary embodiment of the present invention, and includes the following steps:
step 201b, sending the permission opening request initiated by the access party of the online document.
The client sending the permission opening request may be a client of an accessing party of the online document, that is, the permission opening request may be triggered by the accessing party of the online document.
When the client sending the permission opening request is the client of the access party of the online document, after the client of the access party sends the permission opening request to the server, the server forwards the permission opening request to the creator, so that the creator determines whether to configure permission configuration for the access party according to the operation permission requirement information contained in the permission opening request. If the creator returns the authority configuration information to the server through the client of the creator, the server determines the operation authority item according to the authority configuration information, generates a first usage code corresponding to the operation authority item, and provides the first usage code to the client of the access party.
Step 202b, receiving a first use code; and the first use code is generated according to the operation authority item determined by the authority opening request.
After receiving the first usage code, the client can display the first usage code on the user interface so as to inform the access party of the first usage code; the client can also acquire contact ways such as a mailbox, a telephone number and the like of the access party of the online document, and inform the access party of the online document of the first use code in ways such as a short message, a mailbox and the like.
Step 203b, inputting a second use code.
The second usage code is provided by an accessing party of the online document. Specifically, the method comprises the following steps: after the client informs the access party of the online document of the first usage code, the client triggers a user interface to pop up a window for verifying the usage code, so that the access party of the online document provides a second usage code in the popped window for verifying the usage code; or the client displays the usage code input area so that the visitor of the online document provides the second usage code in the usage code writing area. Therefore, the client can acquire the second use code provided by the access party of the online document and input the second use code into the server.
And the client sends the second usage code to the server so that the server opens corresponding authority to the access party according to the second usage code. The specific implementation manner of the server opening the corresponding permission to the access party according to the second usage code is similar to that in step 204a, for the verification process of the second usage code, the opening process of the corresponding permission, and the management process of the first usage code according to the effective operation duration and the effective operation frequency, reference may be made to the explanation part of step 204a, and details are not repeated here.
Step 204b, receiving the authority opened by the access party of the online document, and operating the online document according to the opened authority; wherein the permission is determined according to the second usage code.
The client receives the authority opened by the access party of the online document, and the access party of the online document can operate the online document according to the opened authority.
The following describes a specific implementation process for implementing the operation authority management of the online document through the interaction between the client and the server. FIG. 2c is a flowchart illustrating another method for managing operation rights of an online document according to an exemplary embodiment of the present invention, the method comprising the steps of:
The client generating the permission opening request may be a client of an access party of the online document, or may be a client of a creator of the online document, that is, the permission opening request may be triggered by the creator of the online document, or may be triggered by the access party of the online document.
If the client sending the permission opening request is the client of the access party of the online document, after the client of the access party sends the permission opening request to the server, the server forwards the permission opening request to the creator, so that the creator determines whether to configure permission configuration for the access party according to the operation permission requirement information contained in the permission opening request. If the creating party returns the authority configuration information to the server, the server determines the operation authority item according to the authority configuration information, generates a first use code corresponding to the operation authority item, and provides the first use code to the access party.
If the client sending the permission opening request is the client of the creator of the online document, the client of the creator sends the permission opening request to the server, so that the server determines an operation permission item corresponding to the permission opening request aiming at the permission opening request, generates a first usage code corresponding to the operation permission item, and provides the first usage code to the access party.
For a specific implementation manner of step 203c, reference may be made to the above-mentioned explanation portion of step 201a, which is not described herein again.
And step 204c, the server sends the first using code to the client.
The server side sends the first usage code to the client side, so that the client side displays the first usage code to an access party of the online document through a user interface; or the client displays the first usage code to the creator of the online document through the user interface, and then the creator of the online document provides the first usage code to the visitor of the online document.
For a specific implementation manner of step 205c, reference may be made to the above-mentioned explanation portion of step 203b, which is not described herein again.
And step 206c, the client sends the second use code to the server.
And step 207c, the server opens corresponding authority to the access party according to the second use code.
The specific implementation manner of the server opening the corresponding right to the access party according to the second usage code is similar to that in step 204a, and is not described here again.
Corresponding to the above-mentioned embodiment of the operation right management method of the online document, the invention also provides an embodiment of an operation right management device of the online document.
FIG. 4 is a block diagram illustrating an apparatus for managing operation authority of an online document according to an exemplary embodiment of the present invention, where the apparatus may include:
a determining module 41, configured to, in response to a permission release request for an accessing party of an online document, determine an operation permission item corresponding to the permission release request and generate a first usage code corresponding to the operation permission item, and provide the first usage code to the accessing party of the online document;
an obtaining module 42, configured to obtain, in response to an input request of an accessing party of the online document, a second usage code provided by the accessing party of the online document;
and the permission releasing module 43 is configured to, when it is verified that the second usage code matches the first usage code, open a corresponding permission to the accessing party of the online document according to the operation permission item corresponding to the first usage code.
Optionally, in a case that the permission opening request is from an accessing party of an online document, the determining module includes:
the first determining unit is used for determining the user information of the access party of the online document and sending the user information to the creator of the online document so that the creator of the online document configures authority configuration information for the access party of the online document corresponding to the user information;
and the second determining unit is used for determining the operation authority item according to the authority configuration information returned by the creator of the online document.
Optionally, in a case that the permission opening request is from a creator of an online document, the determining module is configured to:
an obtaining unit, configured to obtain permission configuration information carried by the permission opening request, where the permission configuration information is configured by a creator of the online document for an access party of the online document;
and the determining unit is used for determining the operation authority item according to the authority configuration information.
Optionally, the determining module further comprises:
a sending unit, configured to send the first usage code to a creator of the online document, so as to send the first usage code to an accessing party of the online document through the creator of the online document;
or, the determining unit is configured to determine user information of an access party of the online document to which the permission opening request is directed, and directly send the first usage code to the access party of the corresponding online document according to the user information.
Optionally, the permission opening request includes: user information of an accessing party of the online document;
the device further comprises:
the establishing module is used for establishing a corresponding relation among the user information, the first use code and the operation authority item;
the authentication module includes:
a determining unit, configured to determine, according to the correspondence, a first usage code that matches user information of an accessing party of the online document that provides the second usage code;
and the verification unit is used for verifying whether the second using code is the same as the matched first using code or not.
Optionally, the permission opening request includes: document identification of the online document and user information of an accessing party of the online document;
the device further comprises:
the establishing module is used for establishing the corresponding relation among the user information, the document identification, the first use code and the operation authority item;
the verification module is to:
the determining unit is used for determining target user information of an access party of the online document providing the second usage code and a target document identifier of the online document currently accessed by the access party of the online document, and determining a first usage code matched with the target user information and the target document identifier according to the corresponding relation;
and the verification unit is used for verifying whether the second using code is the same as the matched first using code or not.
Optionally, the operation right item includes: a rights management item;
the device further comprises:
and the prompting module is used for prompting the access party of the online document to finish the opening of the authority so as to enable the access party of the online document to configure the access authority aiming at the document content of the online document for the access party of the online document and/or other access parties of the online document according to the authority corresponding to the authority management item.
Optionally, the operation right item includes: a document operation type and a document operation area;
and the prompting module is further used for prompting the access party of the online document to complete the opening of the authority so as to enable the access party of the online document to execute the operation corresponding to the document operation type in the document operation area.
Optionally, in a case that the first usage code includes an effective operation duration, the method further includes: starting timing at a preset moment after the corresponding authority is opened to the access party of the online document, and closing the corresponding authority under the condition that the timing duration reaches the effective operation duration;
and/or, in case that the first usage code contains a valid number of operations, the method further comprises: and counting the operation times of the access party of the online document after the corresponding authority is opened to the access party of the online document, and closing the corresponding authority under the condition that the operation times reach the effective operation times.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Fig. 5 is a schematic diagram of an electronic device according to an exemplary embodiment of the present invention, and illustrates a block diagram of an exemplary electronic device 50 suitable for implementing embodiments of the present invention. The electronic device 50 shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 5, the electronic device 50 may be embodied in the form of a general purpose computing device, which may be, for example, a server device. The components of the electronic device 50 may include, but are not limited to: the at least one processor 51, the at least one memory 52, and a bus 53 connecting the various system components (including the memory 52 and the processor 51).
The bus 53 includes a data bus, an address bus, and a control bus.
The memory 52 may include volatile memory, such as Random Access Memory (RAM)521 and/or cache memory 522, and may further include Read Only Memory (ROM) 523.
The processor 51 executes various functional applications and data processing, such as the methods provided by any of the above embodiments, by running a computer program stored in the memory 52.
The electronic device 50 may also communicate with one or more external devices 54 (e.g., a keyboard, a pointing device, etc.). Such communication may be through an input/output (I/O) interface 55. Moreover, the model-generated electronic device 50 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via a network adapter 56. As shown, network adapter 56 communicates with the other modules of model-generated electronic device 50 over bus 53. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the model-generating electronic device 50, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk array) systems, tape drives, and data backup storage systems, etc.
It should be noted that although in the above detailed description several units/modules or sub-units/modules of the electronic device are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module according to embodiments of the invention. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method provided in any of the above embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (20)
1. An operation authority management method for an online document, comprising:
in response to a permission opening request of an access party aiming at an online document, determining an operation permission item corresponding to the permission opening request, generating a first usage code corresponding to the operation permission item, and providing the first usage code to the access party;
responding to the input request of the access party, and acquiring a second usage code provided by the access party;
and opening corresponding authority to the access party according to the second use code.
2. The method according to claim 1, wherein in the case that the permission opening request is from an accessing party, determining an operation permission item corresponding to the permission opening request comprises:
determining user information of the access party, and sending the user information to a creator of the online document, so that the creator configures authority configuration information for the access party corresponding to the user information;
and determining the operation authority item according to the authority configuration information returned by the creator.
3. The method according to claim 1, wherein in the case that the permission opening request is from a creator, determining an operation permission item corresponding to the permission opening request comprises:
acquiring authority configuration information carried by the authority opening request, wherein the authority configuration information is configured for the access party by the creator;
and determining the operation authority item according to the authority configuration information.
4. The method of claim 1, wherein providing the first usage code to the accessing party comprises:
sending the first usage code to a creator of the online document to send the first usage code to the visitor through the creator;
or determining user information of an access party to which the permission opening request is directed, and directly sending the first usage code to the corresponding access party according to the user information.
5. The method of claim 1, wherein opening the corresponding right to the accessing party according to the second usage code comprises:
verifying whether the second usage code matches the first usage code;
and opening corresponding authority to the access party according to the operation authority item corresponding to the first use code under the condition that the verification result is that the second use code is matched with the first use code.
6. The method of claim 5, wherein the permission opening request comprises: user information of the accessing party;
after determining the operation authority item corresponding to the authority opening request and generating the first use code corresponding to the operation authority item, the method further comprises the following steps:
establishing a corresponding relation among the user information, the first use code and the operation authority item;
verifying whether the second usage code matches the first usage code, comprising:
determining a first usage code matched with the user information of the access party providing the second usage code according to the corresponding relation;
verifying whether the second usage code is the same as the matched first usage code.
7. The method of claim 5, wherein the permission opening request comprises: document identification of the online document and user information of the accessing party;
after determining the operation authority item corresponding to the authority opening request and generating the first use code corresponding to the operation authority item, the method further comprises the following steps:
establishing a corresponding relation among user information, document identification, a first use code and an operation authority item;
verifying whether the second usage code matches the first usage code, comprising:
determining target user information of an accessing party providing the second usage code and target document identification of an online document currently accessed by the accessing party;
determining a first usage code matched with the target user information and the target document identification according to the corresponding relation;
verifying whether the second usage code is the same as the matched first usage code.
8. The method of claim 1,
in the case where the first usage code contains an effective operation duration, the method further includes: starting timing at a preset moment after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the timing duration reaches the effective operation duration;
and/or, in case that the first usage code contains a valid number of operations, the method further comprises: and counting the operation times of the access party after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the operation times reach the effective operation times.
9. The method according to claim 1, wherein in a case where the operation right item is a right management item, an access right that governs the accessing party and other accessing parties to an online document is opened to the accessing party.
10. The method of claim 9, wherein the access party transfers the right corresponding to the operation right item to other access parties.
11. An operation authority management method for an online document, comprising:
sending a permission opening request initiated by an access party of the online document;
receiving a first usage code; the first use code is generated according to an operation authority item determined by the authority opening request;
inputting a second use code;
receiving the authority opened by an access party of the online document, and operating the online document according to the opened authority; wherein the permission is determined according to the second usage code.
12. The method of claim 11, wherein the authority configuration information of the access party corresponding to the user information is received according to the user information of the access party; and determining the operation authority item according to the authority configuration information.
13. The method of claim 11, wherein the permission determined from the second usage code comprises:
verifying whether the second usage code matches the first usage code;
and opening corresponding authority to the access party according to the operation authority item corresponding to the first use code under the condition that the verification result is that the second use code is matched with the first use code.
14. The method of claim 11, wherein in the case that the first usage code contains a valid duration of operation, the method further comprises: starting timing at a preset moment after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the timing duration reaches the effective operation duration;
and/or, in case that the first usage code contains a valid number of operations, the method further comprises: and counting the operation times of the access party after the corresponding authority is opened to the access party, and closing the corresponding authority under the condition that the operation times reach the effective operation times.
15. The method according to claim 11, wherein in a case where the operation right item is a right management item, an access right that governs the accessing party and other accessing parties to an online document is opened to the accessing party.
16. The method of claim 15, wherein the access party transfers the right corresponding to the operation right item to other access parties.
17. An operation authority management method for an online document, comprising:
sending an authority opening request aiming at an access party of an online document to a server managing the online document, so that the server determines an operation authority item corresponding to the authority opening request aiming at the authority opening request, generates a first usage code corresponding to the operation authority item, and provides the first usage code to the access party;
acquiring a second usage code provided by the visitor according to the first usage code;
and sending the second usage code to the server, so that the server opens corresponding authority to the access party according to the second usage code.
18. An operation right management apparatus for an online document, comprising:
the determining module is used for responding to a permission releasing request of an access party, determining an operation permission item corresponding to the permission releasing request, generating a first usage code corresponding to the operation permission item, and providing the first usage code to the access party;
the acquisition module is used for responding to the input request of the access party and acquiring a second use code provided by the access party;
and the permission release module is used for opening corresponding permission to the access party according to the second use code.
19. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for managing the operation right of an online document according to any one of claims 1 to 10 or claims 11 to 16 or claim 17 when executing the computer program.
20. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of the method for the operational rights management of an online document of any of claims 1 to 10 or claims 11 to 16 or claim 17.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110335618.3A CN113312588A (en) | 2021-03-29 | 2021-03-29 | Method, device, equipment and storage medium for managing operation authority of online document |
PCT/CN2021/143684 WO2022206080A1 (en) | 2021-03-29 | 2021-12-31 | Operation permission management method and apparatus for online document, and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110335618.3A CN113312588A (en) | 2021-03-29 | 2021-03-29 | Method, device, equipment and storage medium for managing operation authority of online document |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113312588A true CN113312588A (en) | 2021-08-27 |
Family
ID=77372002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110335618.3A Pending CN113312588A (en) | 2021-03-29 | 2021-03-29 | Method, device, equipment and storage medium for managing operation authority of online document |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113312588A (en) |
WO (1) | WO2022206080A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022206080A1 (en) * | 2021-03-29 | 2022-10-06 | 北京金山办公软件股份有限公司 | Operation permission management method and apparatus for online document, and device and storage medium |
CN115952525A (en) * | 2023-02-23 | 2023-04-11 | 天津联想协同科技有限公司 | Online document region authority setting method and device, server and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9807073B1 (en) * | 2014-09-29 | 2017-10-31 | Amazon Technologies, Inc. | Access to documents in a document management and collaboration system |
US20180218133A1 (en) * | 2017-01-31 | 2018-08-02 | Ent. Services Development Corporation Lp | Electronic document access validation |
CN111241792A (en) * | 2020-01-19 | 2020-06-05 | Oppo广东移动通信有限公司 | Document online editing method and device and terminal equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231690A (en) * | 2020-10-26 | 2021-01-15 | 腾讯科技(深圳)有限公司 | Authority management method and related device |
CN113312588A (en) * | 2021-03-29 | 2021-08-27 | 珠海金山办公软件有限公司 | Method, device, equipment and storage medium for managing operation authority of online document |
-
2021
- 2021-03-29 CN CN202110335618.3A patent/CN113312588A/en active Pending
- 2021-12-31 WO PCT/CN2021/143684 patent/WO2022206080A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9807073B1 (en) * | 2014-09-29 | 2017-10-31 | Amazon Technologies, Inc. | Access to documents in a document management and collaboration system |
US20180218133A1 (en) * | 2017-01-31 | 2018-08-02 | Ent. Services Development Corporation Lp | Electronic document access validation |
CN111241792A (en) * | 2020-01-19 | 2020-06-05 | Oppo广东移动通信有限公司 | Document online editing method and device and terminal equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022206080A1 (en) * | 2021-03-29 | 2022-10-06 | 北京金山办公软件股份有限公司 | Operation permission management method and apparatus for online document, and device and storage medium |
CN115952525A (en) * | 2023-02-23 | 2023-04-11 | 天津联想协同科技有限公司 | Online document region authority setting method and device, server and storage medium |
CN115952525B (en) * | 2023-02-23 | 2023-08-11 | 天津联想协同科技有限公司 | Online document region authority setting method, device, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2022206080A1 (en) | 2022-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11252203B2 (en) | Method for processing message in group session, storage medium, and computer device | |
US11887176B2 (en) | Method for registering customized device, server, and terminal | |
US8478255B2 (en) | Portable terminal device, address book transfer device, information display method and address book transfer method used in portable terminal device, and computer program | |
CN111580820B (en) | Applet generation method and device | |
CN103023875B (en) | A kind of account management system and method | |
US20060107062A1 (en) | Portable personal mass storage medium and information system with secure access to a user space via a network | |
CN103119975B (en) | User account recovers | |
EP1782155B1 (en) | Methods and apparatuses for automatically selecting a profile | |
CN111352740B (en) | Application interaction processing method and device | |
CN101103354A (en) | Providing a service based on an access right to a shared data | |
JP2015528947A (en) | Method and system for secure communication of personal information | |
CN101313552A (en) | Distributed computing architecture and associated method of providing a portable user environment | |
CN106796632A (en) | To the Remote Visit and Control of data storage | |
CN103607416A (en) | Method and application system for authenticating identity of network terminal machine | |
CN105308900A (en) | Virtual mobile phone interface system and method thereof | |
CN113312588A (en) | Method, device, equipment and storage medium for managing operation authority of online document | |
CN102822835B (en) | Portable personal secure network access system | |
CN104348895A (en) | Method and device for sharing data among programs in mobile terminal | |
JP2006191384A (en) | Mobile and content transmission method | |
CN107005558B (en) | Location-based user disambiguation | |
CN112560006B (en) | Single sign-on method and system under multi-application system | |
KR101328118B1 (en) | Method for providing log in service based on passdata | |
CN112738007B (en) | Management authority transfer synchronous updating method, device and computer readable storage medium | |
CN113946739A (en) | Sensitive data query method, device, equipment and storage medium | |
KR101621002B1 (en) | Method for providing log in service using image array |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |