CN113449267A - Privilege management method and device - Google Patents

Privilege management method and device Download PDF

Info

Publication number
CN113449267A
CN113449267A CN202010224830.8A CN202010224830A CN113449267A CN 113449267 A CN113449267 A CN 113449267A CN 202010224830 A CN202010224830 A CN 202010224830A CN 113449267 A CN113449267 A CN 113449267A
Authority
CN
China
Prior art keywords
privilege
instruction
privilege management
management
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010224830.8A
Other languages
Chinese (zh)
Inventor
马达
李大明
王涵
邓家超
朱瑞莹
王立福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010224830.8A priority Critical patent/CN113449267A/en
Publication of CN113449267A publication Critical patent/CN113449267A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a privilege management method, a privilege management device, electronic equipment and a storage medium; the method comprises the following steps: responding to the running operation of the privilege management applet triggered by a client, running the privilege management applet in the client, and presenting a privilege management interface of the privilege management applet; receiving a privilege management instruction for a target application, the privilege management instruction being input by a target user based on the privilege management interface; presenting, in response to the privilege management instruction, privilege information of the target user at the target application, the privilege information including at least one of: the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state; by the method and the device, the privilege information can be managed conveniently by the user, and user experience is improved.

Description

Privilege management method and device
Technical Field
The present invention relates to the field of computer technology and block chain technology, and in particular, to a privilege management method and apparatus, an electronic device, and a storage medium.
Background
With the continuous development of internet technology, more and more internet products are enjoyed by users, such as various application clients including video clients, game clients, and the like. To improve user experience, many current application clients are also provided with privileges for the user. The privilege here means that a user in a specific scene (such as an internet cafe scene) enjoys more rights than a user outside the scene, such as game privileges of free use of game items in a game application, game experience revenue addition and the like, video viewing privileges of free viewing of VIP video in a video playing application, free viewing of advertisements and the like. Due to the wide variety of clients and privileges, it is often difficult for a user to effectively manage different clients and corresponding privileges.
In the related art, when a user needs to obtain the privilege content, the privilege status, and other related information of a client, the user usually obtains the information by consulting and feeding back to staff such as a customer service and an administrator. However, the way of obtaining privilege information by consulting staff is long in path and low in efficiency, and a great deal of waste is caused to time and human resources.
Disclosure of Invention
Embodiments of the present invention provide a privilege management method and apparatus, an electronic device, and a storage medium, which can implement convenient management of privilege information by a user and improve user experience.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a privilege management method, which comprises the following steps:
in response to a run operation of a privilege management applet triggered by a client, running the privilege management applet in the client and
presenting a privilege management interface of the privilege management applet; wherein the privilege management applet is configured to manage privileges of a user at least one application;
receiving a privilege management instruction for a target application, the privilege management instruction being input by a target user based on the privilege management interface;
presenting, in response to the privilege management instruction, privilege information of the target user at the target application, the privilege information including at least one of:
the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state.
In the above solution, before the presenting the privilege information of the target user in the target application, the method further includes:
analyzing the privilege management instruction to obtain a user identifier of the target user and an application identifier of the target application;
and acquiring the privilege information of the target user in the target application based on the user identification and the application identification.
An embodiment of the present invention further provides a privilege management apparatus, including:
the operating module is used for responding to the operating operation of the privilege management applet triggered by the client, operating the privilege management applet in the client and presenting a privilege management interface of the privilege management applet; wherein the privilege management applet is configured to manage privileges of a user at least one application;
a receiving module, configured to receive a privilege management instruction for a target application, where the privilege management instruction is input by a target user based on the privilege management interface;
a presentation module, configured to present privilege information of the target user at the target application in response to the privilege management instruction, the privilege information including at least one of:
the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state.
In the foregoing solution, the running module is further configured to respond to a scanning operation of the two-dimensional code for the privilege management applet by the first client;
running the privilege management applet in the first client.
In the foregoing solution, the running module is further configured to respond to a click operation for a privilege management function item presented in the second client;
running the privilege management applet in the second client.
In the above scheme, the presentation module is further configured to present, when the privilege management instruction is a privilege management instruction in a voice format, an instruction text corresponding to the identified privilege management instruction; and are
And presenting an editing function key corresponding to the instruction text, wherein the editing function key is used for indicating a function entrance for editing the identified instruction text.
In the above solution, the presenting module is further configured to present a confirmation button corresponding to the privilege management instruction; the confirmation button is used for confirming the identified instruction text or the edited instruction text.
In the above scheme, the presentation module is further configured to present a text editing interface corresponding to the instruction text in response to a click operation on the editing function key;
presenting the edited instruction text in response to an editing operation performed on the instruction text based on the text editing interface.
In the above scheme, the receiving module is further configured to present a text instruction input box in the privilege management interface;
receiving and presenting the privilege management instruction in a text form input based on the text instruction input box;
or, presenting a voice instruction entry in the privilege management interface;
receiving the privilege management instruction in a voice form entered based on the voice instruction entry.
In the above solution, the presenting module is further configured to present a privilege repair button corresponding to a target privilege when the privilege information includes a privilege status of the target privilege and the privilege status of the target privilege is an invalid status;
in response to the clicking operation of the privilege repair button, the target privilege is repaired based on the privilege repair mode corresponding to the target privilege, so that the privilege state of the target privilege is changed from the invalid state to the valid state.
In the above scheme, the apparatus further comprises:
the analysis module is used for analyzing the privilege management instruction to obtain a user identifier of the target user and an application identifier of the target application;
and acquiring the privilege information of the target user in the target application based on the user identification and the application identification.
In the above scheme, the apparatus further comprises:
and the storage module is used for storing the privilege information of the target user in the target application to the blockchain network.
An embodiment of the present invention further provides an electronic device, including:
a memory for storing executable instructions;
and the processor is used for realizing the privilege management method provided by the embodiment of the invention when executing the executable instructions stored in the memory.
The embodiment of the invention also provides a computer-readable storage medium, which stores executable instructions, and when the executable instructions are executed by a processor, the privilege management method provided by the embodiment of the invention is realized.
The embodiment of the invention has the following beneficial effects:
the method comprises the steps that a privilege management small program is operated through a client, a privilege management instruction of a target user for target application is received based on a privilege management interface of the privilege management small program, and then privilege information of the target user in the target application is obtained and presented in response to the privilege management instruction; therefore, when the user needs to acquire the privilege information of the target application, the privilege information of the target application can be directly acquired by operating the privilege management applet, so that the process that the user consults and feeds back to the staff is avoided, and the time is saved; and the privilege management applet is downloaded and operated through the client, installation is not needed, and the use is convenient and quick, so that the privilege information can be conveniently managed by a user, and the user experience is improved.
Drawings
Fig. 1 is a schematic view of an implementation scenario of a privilege management method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an electronic device provided in an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a privilege management method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a privilege management applet run by a first client according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a privilege management applet run by a second client according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a privilege management interface provided by an embodiment of the invention;
FIG. 7 is a diagram illustrating editing of an instruction text according to an embodiment of the present invention;
FIG. 8 is a diagram of privilege information provided by an embodiment of the invention with privileges in a disabled state;
fig. 9 is a schematic application architecture diagram of a blockchain network according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a block chain in a block chain network 900 according to an embodiment of the present invention;
fig. 11 is a functional architecture diagram of a blockchain network 900 according to an embodiment of the present invention;
FIG. 12 is a flowchart illustrating a privilege management method according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a privilege management apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
In the following description, references to the terms "first \ second \ third" are only to distinguish similar objects and do not denote a particular order, but rather the terms "first \ second \ third" are used to interchange specific orders or sequences, where appropriate, to enable embodiments of the invention described herein to be practiced in other than the order shown or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
1) The signature, namely the digital signature, is a section of digital string which can be generated only by a sender of the information and cannot be forged by others, and is also a valid proof for the authenticity of the information sent by the sender of the information; digital signatures typically define two complementary operations, one for signing and the other for verification, the application of asymmetric key cryptography and digital digest technology.
2) Transactions (transactions), equivalent to the computer term "Transaction," include operations that need to be committed to a blockchain network for execution and do not refer solely to transactions in the context of commerce, which embodiments of the present invention follow in view of the convention colloquially used in blockchain technology.
For example, a deployment (deployment) transaction is used to install a specified smart contract to a node in a blockchain network and is ready to be invoked; the Invoke (Invoke) transaction is used to append records of the transaction in the blockchain by invoking the smart contract and to perform operations on the state database of the blockchain, including update operations (including adding, deleting, and modifying key-value pairs in the state database) and query operations (i.e., querying key-value pairs in the state database).
3) A Block chain (Blockchain) is a storage structure for encrypted, chained transactions formed from blocks (blocks).
4) A Blockchain Network (Blockchain Network) incorporates new blocks into a set of nodes of a Blockchain in a consensus manner.
5) Ledger (legger) is a general term for blockchains (also called Ledger data) and state databases synchronized with blockchains. Wherein, the blockchain records the transaction in the form of a file in a file system; the state database records the transactions in the blockchain in the form of different types of Key (Key) Value pairs for supporting fast query of the transactions in the blockchain.
6) Intelligent Contracts (Smart Contracts), also known as chain codes (chaincodes) or application codes, are programs deployed in nodes of a blockchain network, and the nodes execute the intelligent Contracts called in received transactions to perform operations of updating or querying key-value data of a state database.
7) Consensus (Consensus), a process in a blockchain network, is used to agree on transactions in a block among a plurality of nodes involved, the agreed block is to be appended to the end of the blockchain, and the mechanisms for achieving Consensus include Proof of workload (PoW, Proof of Work), Proof of rights and interests (PoS, Proof of equity (DPoS), Proof of granted of shares (DPoS), Proof of Elapsed Time (PoET, Proof of Elapsed Time), and so on.
8) The applet is a program which is developed based on a front-end-oriented Language (such as JavaScript) and realizes services in a hypertext Markup Language (HTML) page, can be immediately interpreted and executed in the client after being downloaded by the client, and saves steps installed in the client.
9) In response to the condition or state on which the performed operation depends, one or more of the performed operations may be in real-time or may have a set delay when the dependent condition or state is satisfied; there is no restriction on the order of execution of the operations performed unless otherwise specified.
10) Privileges, users in a particular scene enjoy more rights than users outside the scene, such as gaming privileges in a gaming application (game items are used for free, game experience profits add up to 30%, etc.), video viewing privileges in a video playback application (VIP video is viewed for free, viewed ahead of time, viewed without advertisements, etc.).
11) Automatic Speech Recognition technology (ASR): the vocabulary content in the user's speech is converted into computer readable input and, through speech analysis, into text.
Based on the above explanations of terms and terms involved in the embodiments of the present invention, an implementation scenario of the privilege management method provided in the embodiments of the present invention is described below, referring to fig. 1, fig. 1 is a schematic diagram of an implementation scenario of the privilege management method provided in the embodiments of the present invention, in order to support an exemplary application, a terminal (including a terminal 200-1 and a terminal 200-2) is connected to a server 100 through a network 300, and the network 300 may be a wide area network or a local area network, or a combination of both networks, and uses a wireless or wired link to implement data transmission.
A terminal (e.g., terminal 200-1) for operating the privilege management applet in the client in response to an operation of the privilege management applet triggered by the client, and presenting a privilege management interface of the privilege management applet; receiving a privilege management instruction aiming at a target application, and sending the privilege management instruction to a server; ,
the server 100 is configured to analyze the received privilege management instruction to obtain a user identifier of the target user and an application identifier of the target application; based on the user identification and the application identification, privilege information of the target user in the target application is obtained and returned to the terminal;
and the terminal (such as the terminal 200-1) is used for presenting the received privilege information of the target user in the target application.
In practical applications, the server 100 may be a server configured independently to support various services, or may be a server cluster; the terminal (e.g., terminal 200-1) may be any type of user terminal such as a smartphone, tablet, laptop, etc., and may also be a wearable computing device, a Personal Digital Assistant (PDA), a desktop computer, a cellular phone, a media player, a navigation device, a game console, a television, or a combination of any two or more of these or other data processing devices.
The following describes in detail a hardware structure of an electronic device of the privilege management method provided in the embodiment of the present invention, where the electronic device includes, but is not limited to, a server or a terminal. Referring to fig. 2, fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and the electronic device 200 shown in fig. 2 includes: at least one processor 210, memory 250, at least one network interface 220, and a user interface 230. The various components in electronic device 200 are coupled together by a bus system 240. It is understood that the bus system 240 is used to enable communications among the components. The bus system 240 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 240 in fig. 2.
The Processor 210 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor, or the like.
The user interface 230 includes one or more output devices 231, including one or more speakers and/or one or more visual display screens, that enable the presentation of media content. The user interface 230 also includes one or more input devices 232, including user interface components that facilitate user input, such as a keyboard, mouse, microphone, touch screen display, camera, other input buttons and controls.
The memory 250 may be removable, non-removable, or a combination thereof. Exemplary hardware devices include solid state memory, hard disk drives, optical disk drives, and the like. Memory 250 optionally includes one or more storage devices physically located remotely from processor 210.
The memory 250 includes volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read Only Memory (ROM), and the volatile Memory may be a Random Access Memory (RAM). The memory 250 described in embodiments of the invention is intended to comprise any suitable type of memory.
In some embodiments, memory 250 is capable of storing data, examples of which include programs, modules, and data structures, or a subset or superset thereof, to support various operations, as exemplified below.
An operating system 251 including system programs for processing various basic system services and performing hardware-related tasks, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks;
a network communication module 252 for communicating to other computing devices via one or more (wired or wireless) network interfaces 220, exemplary network interfaces 220 including: bluetooth, wireless compatibility authentication (WiFi), and Universal Serial Bus (USB), etc.;
a presentation module 253 to enable presentation of information (e.g., a user interface for operating peripherals and displaying content and information) via one or more output devices 231 (e.g., a display screen, speakers, etc.) associated with the user interface 230;
an input processing module 254 for detecting one or more user inputs or interactions from one of the one or more input devices 232 and translating the detected inputs or interactions.
In some embodiments, the privilege management device provided by the embodiments of the present invention may be implemented in software, and fig. 2 shows the privilege management device 255 stored in the memory 250, which may be software in the form of programs and plug-ins, and includes the following software modules: an execution module 2551, a reception module 2552 and a presentation module 2553, which are logical and thus can be arbitrarily combined or further split according to the implemented functions, which will be described below.
In other embodiments, the privilege management Device provided in the embodiments of the present invention may be implemented by a combination of hardware and software, and by way of example, the privilege management Device provided in the embodiments of the present invention may be a processor in the form of a hardware decoding processor, which is programmed to execute the privilege management method provided in the embodiments of the present invention, for example, the processor in the form of the hardware decoding processor may be one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), or other electronic components.
Based on the above description of the implementation scenario of the privilege management method and the electronic device according to the embodiment of the present invention, the privilege management method provided by the embodiment of the present invention is described below. Referring to fig. 3, fig. 3 is a flowchart illustrating a privilege management method according to an embodiment of the present invention; in some embodiments, the privilege management method may be implemented by a server or a terminal alone, or implemented by a server and a terminal in cooperation, taking the terminal as an example, the privilege management method provided in the embodiments of the present invention includes:
step 301: and the terminal responds to the operation of the privilege management applet triggered by the client, operates the privilege management applet in the client and presents a privilege management interface of the privilege management applet.
In practical applications, the terminal is provided with a client, such as an instant messaging client. The terminal can trigger the operation of the privilege management applet through the set client. The privilege management applet is for managing privileges of the user at the at least one application. Here, the privilege may be that a user in a specific scene enjoys more rights in the same application than a user outside the scene, and the specific scene of the privilege may be an internet cafe scene or the like, such as a game privilege of "game item free use, game experience profit addition" or the like enjoyed by the user in the internet cafe scene, or a video viewing privilege of "VIP video free viewing, advertisement free viewing" or the like.
In some embodiments, the terminal may run the privilege management applet in the client in the following manner, so as to conveniently and quickly manage the privileges of the application: responding to a scanning operation of a two-dimensional code aiming at the privilege management small program through the first client; a privilege management applet is run in the first client.
In practical applications, the access route of the privilege management applet may be two-dimensional code. At this time, the terminal can scan the two-dimensional code of the privilege management applet through a first client with a two-dimensional code scanning function, such as an instant messaging client, so as to enter and operate the privilege management applet. Exemplarily, referring to fig. 4, fig. 4 is a schematic diagram of running the privilege management applet through the first client according to an embodiment of the present invention, where a user opens the first client, clicks a "scan" function entry for starting two-dimensional code scanning, scans the two-dimensional code of the privilege management applet through a presented scan frame, thereby entering the privilege management applet through the first client, and presents a privilege management interface of the privilege management applet.
By applying the embodiment, the privilege management applet can be conveniently accessed by a user through a mobile terminal such as a mobile phone by setting the two-dimensional code of the privilege management applet, and the two-dimensional code of the privilege management applet can be scanned by the mobile terminal provided with the client with the scanning function when the user needs to acquire privilege information in an internet bar scene, so that the user can access the privilege management applet to acquire the privilege information, and convenience is provided for the user.
In some embodiments, the terminal may also run the privilege management applet in the client by: responding to a click operation aiming at the privilege management function item presented in the second client; a privilege management applet is run in the second client.
In practical application, the access route of the privilege management applet can also be a function button of a preset privilege management function item, and the privilege management function item can be arranged in a privileged application client, such as a privileged video playing client; or to a client for managing applications, such as a client for managing gaming application privileges. At this time, when the terminal receives a click operation for the privilege management function item presented in the second client, the privilege management applet is run in the second client, and a privilege management interface of the privilege management applet is presented.
Illustratively, referring to fig. 5, fig. 5 is a schematic diagram of running a privilege management applet by a second client according to an embodiment of the present invention, where a user clicks a function button "privilege management" of a privilege management function item presented by the second client, and a terminal enters the privilege management applet in response to a click operation for the privilege management function item and presents a privilege management interface of the privilege management applet.
Step 302: a privilege management instruction for a target application is received.
Here, the privilege management instruction is input by the target user based on the privilege management interface, and is used for instructing to acquire privilege information of the target user in the target application. Therefore, the content of the privilege management instruction may include the name of the target application, the user identification information, and the like, for example, when the privilege management applet is run through the client, the account information of the client that is authorized by the user is prompted, which is equivalent to that the privilege management applet has already known the user information, or the name of the target application, and the like.
In practical application, after the terminal presents the privilege management interface, a user can input a privilege management instruction for the target application through the privilege management interface, and after the terminal receives the privilege management instruction input by the user, the terminal acquires the privilege information of the target application, which is acquired by the user through indication according to the privilege management instruction.
In some embodiments, the terminal may receive the privilege management instruction for the target application by: presenting a text instruction input box in the privilege management interface; receiving and presenting a privilege management instruction in a text form input based on a text instruction input box; or, presenting a voice instruction entry in the privilege management interface; a privilege management instruction in voice form is received that is entered based on the voice instruction entry.
In practical application, the privilege management interface of the privilege management applet can present a text instruction input box, a voice instruction entry, and both the text instruction input box and the voice instruction entry. Based on the method, the terminal receives the privilege management instruction in the text form input by the user based on the text instruction input box through the text instruction input box. Or the terminal receives the privilege management instruction in the voice form recorded based on the voice instruction entry through the presented voice instruction entry.
Exemplarily, referring to fig. 6, fig. 6 is a schematic diagram of a privilege management interface provided by an embodiment of the present invention. Here, as shown in fig. 6(1), the privilege management interface only includes a text instruction input box, and supports the user to input the privilege management instruction in text form; as shown in fig. 6(2), the privilege management interface only includes a voice command entry, and the user can enter the privilege management command in a voice form based on the voice command entry by pressing or clicking the voice command entry for a long time; as shown in fig. 6(3), the privilege management interface includes both a text instruction input box and a voice instruction entry, that is, the support user can select a corresponding instruction input mode as required.
By applying the embodiment, the privilege management instruction in the voice form can be input by a user in a voice input mode by setting the voice instruction inlet, so that privilege management through the mobile terminal is facilitated, and the use convenience of the privilege management applet at the mobile terminal is improved.
In some embodiments, when the privilege management instruction is a voice-form privilege management instruction, the terminal presents an instruction text corresponding to the identified privilege management instruction after receiving the recorded voice-form privilege management instruction; and presenting an editing function key corresponding to the instruction text, the editing function key being used to indicate a function entry for editing the identified instruction text.
In some embodiments, when the identified instruction text has an error, the terminal presents a text editing interface corresponding to the instruction text in response to a click operation for the editing function key; and presenting the edited instruction text in response to the editing operation performed on the instruction text based on the text editing interface.
In practical application, after receiving a privilege management instruction in a voice form input by a user in a voice mode, a terminal performs voice recognition on the privilege management instruction input by the user to obtain a corresponding instruction text, and presents the corresponding instruction text through a privilege management interface so as to facilitate the user to confirm the accuracy of the recognized privilege management instruction in the voice form.
And meanwhile, displaying an editing function key corresponding to the instruction text on the privilege management interface, wherein the editing function key is used for indicating a function entrance for editing the identified instruction text. In practical application, when the user finds that the recognized instruction text has errors or is not the instruction content wanted by the individual, the user can enter a text editing interface aiming at the instruction text by clicking an editing function key. The terminal responds to the click operation of a user for the editing function key and presents a text editing interface corresponding to the instruction text; when the user edits the instruction text through the text editing page, the terminal receives the editing operation of the user on the instruction text and displays the edited instruction text.
Exemplarily, referring to fig. 7, fig. 7 is an editing schematic diagram of an instruction text provided by an embodiment of the present invention; here, after the terminal recognizes the privilege management instruction in the form of voice entered by the user, the instruction text "true 1444274711" and the edit function key corresponding to the instruction text are recognized and presented. And when the user confirms that the identified instruction text does not accord with personal expectation, clicking the editing function key, and responding to the clicking operation aiming at the editing function key by the terminal to present a text editing interface. The user may edit the identified instruction text "true 1444274711" in the text editing interface, and the terminal, upon receiving an editing operation for the text instruction, presents the edited instruction text "diagnose 1444274711. "after the editing is finished, the user can exit the text editing interface by responding to the click operation of the confirmation button of the diagnosis text editing interface, and further present a privilege management interface containing the edited instruction text" diagnosis 1444274711 ".
By applying the embodiment, when the user finds that the recognized speech-form privilege management instruction is wrong or not consistent with the ideal state, the instruction text can be edited through the editing function key corresponding to the recognized instruction text to achieve the ideal state, so that the privilege management applet can more accurately provide privilege information for the user, and the user experience is improved.
In some embodiments, the terminal further presents a confirmation button corresponding to the privilege management instruction, the confirmation button being used for performing a confirmation operation on the identified instruction text or the edited instruction text.
In practical application, the terminal also presents a confirmation button corresponding to the privilege management instruction, and the confirmation button is used for the user to perform confirmation operation on the identified instruction text or the edited instruction text, so as to trigger the execution of the privilege management instruction.
Of course, in other embodiments, the confirmation button for the privilege management instruction may not exist, that is, the terminal directly executes the privilege management instruction after receiving the privilege management instruction.
Step 303: and presenting the privilege information of the target user in the target application in response to the privilege management instruction.
Here, the privilege information includes at least one of: the privilege recovery method comprises the following steps of obtaining the privilege content of each privilege of a target user in a target application, the privilege state of each privilege of the target user in the target application, and the corresponding privilege recovery mode when the privilege state is an invalid state.
In some embodiments, the terminal may determine the privilege information of the target user at the target application by: analyzing the privilege management instruction to obtain a user identifier of a target user and an application identifier of a target application; and acquiring privilege information of the target user in the target application based on the user identification and the application identification.
And after receiving the privilege management instruction, the terminal responds to the privilege management instruction to acquire the privilege information of the target user in the target application. Specifically, analyzing the received privilege management instruction to obtain a user identifier of a target user and an application identifier of a target application, which are carried in the privilege management instruction; and acquiring the privilege information of the target user in the target application based on the user identifier and the application identifier obtained by analysis. In practical application, the privilege data corresponding to the user identifier and the application identifier can be obtained from the relevant privilege data stored in the background according to the user identifier and the application identifier obtained through analysis.
In practical applications, the privilege information may include various privileged contents owned by the target user in the target application, such as privileges of free use of game items, 30% addition of experience revenue, and the like in the game application, or privileges of free viewing of pay video, advertisement exemption, and the like in the video playing application. Privilege status of the various privileges, such as whether valid or not, may also be included. Meanwhile, when the privilege state with some privileges is an invalid state, corresponding privilege repairing modes can be presented, such as opening a privilege switch, recharging privilege balance and the like.
In some embodiments, when the privilege information includes a privilege status of the target privilege, the privilege status of the target privilege is an invalid status, and the privilege repair mode corresponding to the target privilege is capable of being automatically executed, the terminal may further present a privilege repair button corresponding to the target privilege; and in response to the clicking operation of the privilege repair button, the target privilege is repaired based on the privilege repair mode corresponding to the target privilege, so that the privilege state of the target privilege is changed from the invalid state to the valid state.
In practical application, the types of privilege recovery modes can be classified into an automatic execution type and an artificial execution type, for example, when the privilege balance is insufficient, the user needs to actively recharge, and the privilege recovery modes are the artificial execution type; or when the privilege switch is not opened, the terminal can automatically open the privilege switch, and the privilege repairing mode is an automatic executable mode.
When the privilege information includes the information related to the target privilege in the disabled state, if the privilege repair mode corresponding to the target privilege belongs to the automatically executable class, that is, the privilege repair mode can be automatically executed, the terminal can also present a privilege repair button corresponding to the target privilege. The user may trigger an automatic repair process for the target privilege by clicking on the privilege repair button. The terminal receives the click operation of the privilege repair button of the user aiming at the target privilege, responds to the click operation, automatically executes the privilege repair mode corresponding to the target privilege, and repairs the target privilege, so that the privilege state of the target privilege is changed from an invalid state to a valid state.
Exemplarily, referring to fig. 8, fig. 8 is a schematic diagram of privilege information provided by an embodiment of the present invention, where the privilege is in a disabled state. Here, the target privilege is in the invalid state, and the reason why the target privilege is in the invalid state is that "the privilege switch is not turned on," so the corresponding privilege repair manner is "please turn on the privilege switch. Here, the privilege restoring mode may be executed manually or automatically, and in this case, a privilege restoring button corresponding to the privilege restoring mode may be presented. When the terminal receives the clicking operation of the user for the privilege restoring button, the privilege restoring mode can be automatically adopted, namely, the privilege switch is automatically opened to restore the target privilege, so that the privilege state of the target privilege is changed from the invalid state to the valid state. Of course, the user can turn on the privilege switch by itself if the user does not click the privilege restore button.
By applying the embodiment, the privilege management applet is set, so that a user can conveniently and quickly acquire the reason of privilege failure and the privilege repairing mode when finding out that the privilege of the target application fails, and then repair the privilege in an invalid state according to the provided privilege repairing mode, time consumption in the processes of user feedback, passive discovery of a developer and the like is reduced, the problem of user privilege abnormity is quickly solved, and user experience is improved.
By applying the embodiment of the invention, the privilege management small program is operated by the client, the privilege management instruction of the target user for the target application is received based on the privilege management interface of the privilege management small program, and the privilege information of the target user in the target application is acquired and presented in response to the privilege management instruction; therefore, when the user needs to acquire the privilege information of the target application, the privilege information of the target application can be directly acquired by operating the privilege management applet, so that the process that the user consults and feeds back to the staff is avoided, and the time is saved; and the privilege management applet is downloaded and operated through the client, installation is not needed, and the use is convenient and quick, so that the privilege information can be conveniently managed by a user, and the user experience is improved.
In some embodiments, after the server acquires the privilege information of the target user in the target application, the server may further store the privilege information in the blockchain network in combination with a blockchain technology, so that when the terminal acquires the privilege information of the target user in the target application, the terminal can directly acquire the privilege information from the blockchain network.
After the privilege information of the target user in the target application is acquired, generating a transaction for storing the privilege information, and sending the generated transaction to a node of the blockchain network, so that the node can agree with the transaction and then store the privilege information in the blockchain network; before storing the key information to the blockchain network, the server can also obtain the summary information of the key corresponding to the privilege information; and storing the obtained digest information of the key to the blockchain network.
Next, a block chain network according to an embodiment of the present invention will be described. Fig. 9 is a schematic view of an application architecture of a blockchain network according to an embodiment of the present invention, which includes a blockchain network 900 (exemplarily showing a consensus node 910-1 to a consensus node 910-3), an authentication center 1000, and a service entity 1100, which are respectively described below.
The type of blockchain network 900 is flexible and may be, for example, any of a public chain, a private chain, or a federation chain. Taking the public chain as an example, any electronic device (e.g., terminal/server) of the business entity may access the blockchain network 900 without authorization; taking the alliance chain as an example, after obtaining authorization, the electronic device under the jurisdiction of the service agent may access the blockchain network 900. And as such, becomes a client node in the blockchain network 900.
In some embodiments, the client node may act as a mere watcher of the blockchain network 900, i.e., provides functionality to support the business entity to initiate transactions (e.g., for uplink storage of data or querying of data on the chain), and may be implemented by default or selectively (e.g., depending on the specific business requirements of the business entity) with respect to the functions of the consensus node 910 of the blockchain network 900, such as a ranking function, a consensus service, and an accounting function, etc. Therefore, the data and the service processing logic of the service subject can be migrated to the blockchain network 900 to the maximum extent, and the credibility and traceability of the data and service processing process are realized through the blockchain network 900.
Consensus nodes in blockchain network 900 receive transactions submitted by client nodes (e.g., client node 1110 belonging to business entity 1100) from different business entities (e.g., business entity 1100), perform the transactions to update ledgers or query ledgers, and various intermediate or final results of performing the transactions may be returned to the business entity's client nodes for display.
An exemplary application of the blockchain is described below with an example in which a service agent accesses a blockchain network to achieve acquisition of privilege information.
Referring to fig. 9, the service entity 1100 involved in the privilege management method registers from the certificate authority 1000 to obtain a digital certificate, where the digital certificate includes a public key of the service entity and a digital signature signed by the certificate authority 1000 on the public key and identity information of the service entity, is used to be attached to a transaction together with a digital signature of the service entity for the transaction, and is sent to the blockchain network, so that the blockchain network takes the digital certificate and the signature from the transaction, verifies the authenticity of the message (i.e. whether the message is not tampered) and the identity information of the service entity sending the message, and verifies the blockchain network according to the identity, for example, whether the service entity has the right to initiate the transaction. Clients running on electronic devices (e.g., terminals or servers) hosted by the business entity may request access from the blockchain network 900 to become client nodes.
First, when acquiring privilege information of a target user in a target application, the client node 1110 of the service agent 1100 generates a transaction for acquiring the privilege information stored in the blockchain, specifies an intelligent contract that needs to be invoked to implement the acquisition operation of the privilege information, and parameters passed to the intelligent contract, and broadcasts the transaction to a consensus node in the blockchain network 900, where the transaction also carries a digital certificate of the client node 1110 and a signed digital signature (for example, obtained by encrypting a digest of the transaction using a private key in the digital certificate of the client node 1110).
Then, when the consensus node 910 of the blockchain network 900 receives the transaction, the digital certificate and the digital signature carried in the transaction are verified, and after the verification is successful, whether the service agent 1100 has the transaction right is determined according to the identity of the service agent 1100 carried in the transaction, and the transaction fails due to any verification judgment of the digital signature and the right verification. After verification is successful, the consensus node 910 itself digital signature (e.g., encrypted using the private key of node 910-1 to obtain a digest of the transaction) is signed and broadcast on the blockchain network 900.
Finally, after the transaction that is successfully verified is received by the consensus node 910 in the blockchain network 900, the transaction is filled into a new block and broadcast. When broadcasting a new block, the consensus node 910 in the blockchain network 900 performs a consensus process on the new block, and if the consensus is successful, adds the new block to the tail of the blockchain stored in the consensus node, updates the state database according to the result of the transaction, and executes the transaction in the new block: and for the submitted transaction for acquiring the privilege information, inquiring the key value pair corresponding to the privilege information from the state database, and returning a transaction result.
As an example of a block chain, referring to fig. 10, fig. 10 is a schematic structural diagram of a block chain in a block chain network 900 according to an embodiment of the present invention, where a header of each block may include hash values of all transactions in the block and also include hash values of all transactions in a previous block, a record of a newly generated transaction is filled in the block and is added to a tail of the block chain after being identified by nodes in the block chain network, so as to form a chain growth, and a chain structure based on hash values between blocks ensures tamper resistance and forgery prevention of transactions in the block.
An exemplary functional architecture of the blockchain network provided by the embodiment of the present invention is described below, referring to fig. 11, fig. 11 is a schematic functional architecture diagram of a blockchain network 900 provided by the embodiment of the present invention, which includes an application layer 1, a consensus layer 2, a network layer 3, a data layer 4, and a resource layer 5, and the following description is separately given below.
The resource layer 5 encapsulates the computing, storage, and communication resources that implement each node 910 in the blockchain network 900.
The data layer 4 encapsulates various data structures that implement the ledger, including blockchains implemented as files in a file system, key-value type state databases, and presence certificates (e.g., hash trees of transactions in blocks).
The network layer 3 encapsulates the functions of a Point-to-Point (P2P) network protocol, a data propagation mechanism and a data verification mechanism, an access authentication mechanism and service body identity management.
Wherein, the P2P network protocol implements communication between nodes 910 in the blockchain network 900, the data propagation mechanism ensures propagation of transactions in the blockchain network 900, and the data verification mechanism is used for implementing reliability of data transmission between nodes 910 based on cryptography methods (e.g. digital certificate, digital signature, public/private key pair); the access authentication mechanism is used for authenticating the identity of the service subject added to the block chain network 900 according to an actual service scene, and endowing the service subject with the authority of accessing the block chain network 900 when the authentication is passed; the business entity identity management is used to store the identity of the business entity that is allowed to access blockchain network 900, as well as the permissions (e.g., the types of transactions that can be initiated).
Consensus layer 2 encapsulates the functions of node 910 in blockchain network 900 for block-to-block consensus mechanisms (i.e., consensus mechanisms), transaction management, and ledger management. The consensus mechanism comprises consensus algorithms such as POS, POW and DPOS, and the pluggable consensus algorithm is supported.
The transaction management is configured to verify a digital signature carried in the transaction received by the node 910, verify identity information of the service entity, and determine whether the service entity has an authority to perform the transaction (read related information from the identity management of the service entity) according to the identity information; for the service agents authorized to access the blockchain network 900, the service agents all have digital certificates issued by the certificate authority, and the service agents sign the submitted transactions by using private keys in the digital certificates of the service agents, so that the legal identities of the service agents are declared.
The ledger administration is used to maintain blockchains and state databases. For the block with the consensus, adding the block to the tail of the block chain; executing the transaction in the acquired consensus block, updating the key-value pairs in the state database when the transaction comprises an update operation, querying the key-value pairs in the state database when the transaction comprises a query operation and returning a query result to the client node of the business entity. Supporting query operations for multiple dimensions of a state database, comprising: querying the chunk based on the chunk sequence number (e.g., hash value of the transaction); inquiring the block according to the block hash value; inquiring a block according to the transaction serial number; inquiring the transaction according to the transaction serial number; inquiring account data of a business main body according to an account (serial number) of the business main body; and inquiring the block chain in the channel according to the channel name.
The application layer 1 encapsulates various services that can be implemented by the blockchain network, including tracing, crediting, and verifying transactions.
In the following, the privilege management method provided by the embodiment of the present invention is continuously described by taking the case where the user runs the privilege management applet to manage the privileges of the internet bar in the application. Referring to fig. 12, fig. 12 is a schematic flowchart of a privilege management method provided in an embodiment of the present invention, where the privilege management method provided in the embodiment of the present invention includes:
step 1201: the terminal runs the privilege management applet and presents a privilege management interface of the privilege management applet.
Here, in practical applications, when a user finds that the internet bar privilege of the user in a target application (such as a game application) is invalid, the user can obtain corresponding privilege information by running the privilege management applet, and find the reason of the privilege invalid and the privilege repairing mode.
Specifically, a user may scan a two-dimensional code of the privilege management applet through a first client having a two-dimensional code scanning function to enter the privilege management applet.
The user can also enter the privilege management applet by clicking a privilege management function button, and in practical application, the privilege management function item can be arranged in a privileged application client, such as a privileged video playing client; or to a client for managing applications, such as a client for managing gaming application privileges. At this time, when the terminal receives a click operation for the privilege management function item presented in the second client, the privilege management applet is run in the second client, and a privilege management interface of the privilege management applet is presented.
Step 1202: a privilege management instruction for a target application is received.
Here, the privilege management instruction is input by the target user based on the privilege management interface, and is used for instructing to acquire privilege information of the target user in the target application. The privilege information may be privileges of each internet cafe corresponding to the game application, privileges in a failure state, reasons of privilege failure, and corresponding privilege repairing modes.
In practical applications, when a user finds that the internet bar privilege of the user in a target application (such as a game application) is invalid, a privilege management instruction for the target application is input through a privilege management interface. The content of the privilege management instructions may include the name of the target application, user identification information, and the like. Illustratively, when the user finds that the cyber cafe privilege of the game application is lost, the input privilege management instruction may be "diagnose + user identification + reason for loss of privilege," such as "diagnose 1444274711(QQ number) cause for loss of cyber cafe privilege. "
Specifically, the terminal may receive the privilege management instruction in the form of text input by the user through a text instruction input box of the privilege management interface. Or the terminal receives the recorded privilege management instruction in the voice form through the voice instruction inlet of the privilege management interface.
Step 1203: and when the privilege management instruction is a voice-form privilege management instruction, identifying the privilege management instruction, obtaining an instruction text and presenting the instruction text.
Here, the received privilege management instruction in the form of speech can be subjected to speech recognition through an ASR automatic speech recognition technology, and converted into a corresponding instruction text.
Step 1204: and displaying the editing function key corresponding to the instruction text.
Here, the edit function key is used to indicate a function entry for editing the recognized instruction text.
Step 1205: whether the instruction text needs to be edited.
In practical applications, when the user finds that the identified command text has an error or is not consistent with the ideal command text, the user can enter a text editing interface for the command text by clicking an editing function key, i.e., step 1206-step 1207 are executed. If the user finds that the recognized command text corresponds to the ideal state, step 1208 is performed.
Step 1206: and responding to the clicking operation of the editing function key, and presenting a text editing interface corresponding to the instruction text.
Step 1207: and presenting the edited instruction text in response to the editing operation performed on the instruction text based on the text editing interface.
Here, referring to fig. 7, after the terminal recognizes the privilege management instruction in the form of voice entered by the user, the instruction text "true 1444274711" is recognized and presented, and the edit function key corresponding to the instruction text is presented. And when the user confirms that the identified instruction text does not accord with personal expectation, clicking the editing function key, and responding to the clicking operation aiming at the editing function key by the terminal to present a text editing interface. The user may edit the identified instruction text "true 1444274711" in the text editing interface, and the terminal, upon receiving an editing operation for the text instruction, presents the edited instruction text "diagnose 1444274711. "after the editing is finished, the user can exit the text editing interface by responding to the click operation of the confirmation button of the diagnosis text editing interface, and further present a privilege management interface containing the edited instruction text" diagnosis 1444274711 ".
Step 1208: and sending the privilege management instruction to the server.
Step 1209: and the server responds to the privilege management instruction, analyzes the privilege management instruction and obtains the user identification of the target user and the application identification of the target application.
Step 1210: and acquiring privilege information of the target user in the target application based on the user identification and the application identification, and returning the privilege information to the terminal.
Here, the server searches the corresponding privilege information in the stored privilege-related data according to the analyzed information such as the user identifier, the application identifier and the like. The privilege information may include each item of privileged content owned by the target user in the target application, such as privileges in the game application, such as free use of game items, 30% addition of experience revenue, and the like, or privileges in the video playing application, such as free viewing of paid video, advertisement exemption, and the like. Privilege status of the various privileges, such as whether valid or not, may also be included. Meanwhile, when the privilege state with some privileges is an invalid state, corresponding privilege repairing modes can be presented, such as opening a privilege switch, recharging privilege balance and the like.
Specifically, for example, when the user finds that the internet bar privilege of the game application is invalid and sends a privilege management instruction for acquiring privilege information of the game application, the server determines and analyzes whether the current game terminal is in a login state, whether an internet bar privilege client is started, whether a privilege switch is turned on, whether the current game terminal is in a privileged internet bar (that is, whether an internet bar IP is in an IP white list), whether security verification passes, and the like according to the user identifier included in the privilege management instruction, so that the reason why the internet bar privilege of the user in the game application is invalid and a corresponding privilege repair mode are obtained.
For example, the reasons for the failure of the internet cafe privilege of the game application may include that the internet cafe privilege point (privilege balance) is insufficient, the privilege switch is not turned on, the internet cafe IP is not on the privileged internet cafe IP white list, etc.; the corresponding privilege repairing manner may be "please charge the internet bar privilege point", "please turn on the privilege switch", and the like, and specifically may refer to fig. 8, the privilege failure reason shown in fig. 8 is that "the privilege switch is not turned on", and the corresponding privilege repairing manner is "please turn on the privilege switch". "
Step 1211: and receiving and presenting privilege information containing the reason for the internet bar privilege failure and the privilege repair mode of the target application.
Here, when the privilege repair mode corresponding to the privilege of the target application can be automatically performed, the terminal may further present a privilege repair button corresponding to the privilege.
Step 1212: and in response to the clicking operation of the privilege repair button, the privilege of the target application is repaired based on the corresponding privilege repair mode, so that the privilege state of the privilege is changed from the invalid state to the valid state.
Step 1213: the target application is restarted to obtain privileges.
By applying the embodiment, the privilege management small program is set, so that a user can conveniently and quickly acquire the reason of privilege failure and the privilege repairing mode when finding out that the privilege of the target application is failed, the problem of privilege failure is solved in time, waiting is not needed, and the user experience is improved; in the scene of the internet bar, the privilege management applet is accessed by scanning the two-dimensional code, so that the user can conveniently operate through the mobile terminal; the mode of setting the voice input privilege management instruction further increases the use convenience of the privilege management applet at the mobile terminal.
Continuing with the description of the privilege management device 255 provided by the embodiments of the present invention, in some embodiments, the privilege management device may be implemented as a software module. Referring to fig. 13, fig. 13 is a schematic structural diagram of the privilege management device 255 according to the embodiment of the present invention, where the privilege management device 255 according to the embodiment of the present invention includes:
an operation module 2551, configured to, in response to an operation of a privilege management applet triggered by a client, operate the privilege management applet in the client and present a privilege management interface of the privilege management applet; wherein the privilege management applet is configured to manage privileges of a user at least one application;
a receiving module 2552, configured to receive a privilege management instruction for a target application, the privilege management instruction being input by a target user based on the privilege management interface;
a presenting module 2553, configured to present, in response to the privilege management instruction, privilege information of the target user in the target application, where the privilege information includes at least one of:
the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state.
In some embodiments, the running module 2551 is further configured to respond to a scan operation for the two-dimensional code of the privilege management applet by the first client;
running the privilege management applet in the first client.
In some embodiments, the running module 2551 is further configured to respond to a click operation on a privilege management function item presented in the second client;
running the privilege management applet in the second client.
In some embodiments, the presenting module 2553 is further configured to present, when the privilege management instruction is a privilege management instruction in a voice form, an instruction text corresponding to the identified privilege management instruction; and are
And presenting an editing function key corresponding to the instruction text, wherein the editing function key is used for indicating a function entrance for editing the identified instruction text.
In some embodiments, the presenting module 2553 is further configured to present a confirmation button corresponding to the privilege management instruction; the confirmation button is used for confirming the identified instruction text or the edited instruction text.
In some embodiments, the presenting module 2553 is further configured to present a text editing interface corresponding to the instruction text in response to a click operation on the editing function key;
presenting the edited instruction text in response to an editing operation performed on the instruction text based on the text editing interface.
In some embodiments, the receiving module 2552 is further configured to present a text instruction input box in the privilege management interface;
receiving and presenting the privilege management instruction in a text form input based on the text instruction input box;
or, presenting a voice instruction entry in the privilege management interface;
receiving the privilege management instruction in a voice form entered based on the voice instruction entry.
In some embodiments, the presenting module 2553 is further configured to present a privilege fix button corresponding to the target privilege when the privilege information includes a privilege status of the target privilege and the privilege status of the target privilege is an invalid status;
in response to the clicking operation of the privilege repair button, the target privilege is repaired based on the privilege repair mode corresponding to the target privilege, so that the privilege state of the target privilege is changed from the invalid state to the valid state.
In some embodiments, the apparatus further comprises:
the analysis module is used for analyzing the privilege management instruction to obtain a user identifier of the target user and an application identifier of the target application;
and acquiring the privilege information of the target user in the target application based on the user identification and the application identification.
In some embodiments, the apparatus further comprises:
and the storage module is used for storing the privilege information of the target user in the target application to the blockchain network.
An embodiment of the present invention further provides an electronic device, where the electronic device includes:
a memory for storing executable instructions;
and the processor is used for realizing the privilege management method provided by the embodiment of the invention when executing the executable instructions stored in the memory.
The embodiment of the invention also provides a computer-readable storage medium, which stores executable instructions, and when the executable instructions are executed by a processor, the privilege management method provided by the embodiment of the invention is realized.
In some embodiments, the computer-readable storage medium may be memory such as FRAM, ROM, PROM, EPROM, EEPROM, flash, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories. The computer may be a variety of computing devices including intelligent terminals and servers.
In some embodiments, executable instructions may be written in any form of programming language (including compiled or interpreted languages), in the form of programs, software modules, scripts or code, and may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
By way of example, executable instructions may correspond, but do not necessarily have to correspond, to files in a file system, and may be stored in a portion of a file that holds other programs or data, such as in one or more scripts in a hypertext Markup Language (HTML) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code).
By way of example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices at one site or distributed across multiple sites and interconnected by a communication network.
The above description is only an example of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.

Claims (10)

1. A privilege management method, the method comprising:
in response to a run operation of a privilege management applet triggered by a client, running the privilege management applet in the client and
presenting a privilege management interface of the privilege management applet; wherein the privilege management applet is configured to manage privileges of a user at least one application;
receiving a privilege management instruction for a target application, the privilege management instruction being input by a target user based on the privilege management interface;
presenting, in response to the privilege management instruction, privilege information of the target user at the target application, the privilege information including at least one of:
the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state.
2. The method of claim 1, wherein the running the privilege management applet in the client in response to a running operation of the privilege management applet triggered by the client comprises:
responding to a scanning operation of a two-dimensional code for the privilege management applet by a first client;
running the privilege management applet in the first client.
3. The method of claim 1, wherein the running the privilege management applet in the client in response to a running operation of the privilege management applet triggered by the client comprises:
responding to a click operation aiming at the privilege management function item presented in the second client;
running the privilege management applet in the second client.
4. The method of claim 1, wherein after receiving the privilege management instruction for the target application, the method further comprises:
when the privilege management instruction is a privilege management instruction in a voice form, presenting an instruction text corresponding to the identified privilege management instruction; and are
And presenting an editing function key corresponding to the instruction text, wherein the editing function key is used for indicating a function entrance for editing the identified instruction text.
5. The method of claim 4, wherein the method further comprises:
presenting a confirmation button corresponding to the privilege management instruction;
the confirmation button is used for confirming the identified instruction text or the edited instruction text.
6. The method of claim 4, wherein the method further comprises:
responding to the click operation aiming at the editing function key, and presenting a text editing interface corresponding to the instruction text;
presenting the edited instruction text in response to an editing operation performed on the instruction text based on the text editing interface.
7. The method of claim 1, wherein the receiving a privilege management instruction for a target application comprises:
presenting a text instruction input box in the privilege management interface;
receiving and presenting the privilege management instruction in a text form input based on the text instruction input box;
or, presenting a voice instruction entry in the privilege management interface;
receiving the privilege management instruction in a voice form entered based on the voice instruction entry.
8. The method of claim 1, wherein the method further comprises:
when the privilege information includes a privilege status of a target privilege and the privilege status of the target privilege is an invalid status, presenting a privilege fix button corresponding to the target privilege;
in response to the clicking operation of the privilege repair button, the target privilege is repaired based on the privilege repair mode corresponding to the target privilege, so that the privilege state of the target privilege is changed from the invalid state to the valid state.
9. The method of claim 1, wherein the method further comprises:
and storing the privilege information of the target user in the target application to a blockchain network.
10. A privilege management apparatus, the apparatus comprising:
the operating module is used for responding to the operating operation of the privilege management applet triggered by the client, operating the privilege management applet in the client and presenting a privilege management interface of the privilege management applet; wherein the privilege management applet is configured to manage privileges of a user at least one application;
a receiving module, configured to receive a privilege management instruction for a target application, where the privilege management instruction is input by a target user based on the privilege management interface;
a presentation module, configured to present privilege information of the target user at the target application in response to the privilege management instruction, the privilege information including at least one of:
the privilege content of each privilege of the target user in the target application, the privilege state of each privilege of the target user in the target application and a corresponding privilege repairing mode when the privilege state is an invalid state.
CN202010224830.8A 2020-03-26 2020-03-26 Privilege management method and device Pending CN113449267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010224830.8A CN113449267A (en) 2020-03-26 2020-03-26 Privilege management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010224830.8A CN113449267A (en) 2020-03-26 2020-03-26 Privilege management method and device

Publications (1)

Publication Number Publication Date
CN113449267A true CN113449267A (en) 2021-09-28

Family

ID=77807247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010224830.8A Pending CN113449267A (en) 2020-03-26 2020-03-26 Privilege management method and device

Country Status (1)

Country Link
CN (1) CN113449267A (en)

Similar Documents

Publication Publication Date Title
CN113711536B (en) Extracting data from a blockchain network
CN105684388B (en) Utilize the network-based single-sign-on of form filling agent application
WO2020015487A1 (en) Identity verification method, login method, apparatuses, and computer device
CN110555029A (en) ticket management method and device based on block chain and storage medium
EP4216077A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
US9971901B2 (en) Content management apparatus and content management method
CN112506747B (en) Business process monitoring method and device, electronic equipment and storage medium
CN111177246B (en) Service data processing method and device
CN111245825A (en) Applet login method, server and electronic device
CN110599697A (en) Vehicle sharing method, device and equipment based on block chain and storage medium
US20230120160A1 (en) Authentication aggregator
CN113746719A (en) Task information processing method and device, electronic equipment and storage medium
CN112766998A (en) Data processing method and device for business activities
CN112702419B (en) Data processing method, device, equipment and storage medium based on block chain
CN111178896B (en) Bus taking payment method, device and storage medium
CN112995014B (en) Method and device for mass sending of messages
CN112925589B (en) Calling method and device of expansion interface
CN111182529B (en) Police application processing method and device, electronic equipment and storage medium
CN112132554A (en) Government affair information processing method and device, electronic equipment and storage medium
CN112836186A (en) Page control method and device
CN113449267A (en) Privilege management method and device
CN111078569B (en) Method and device for testing optical character recognition application and storage medium
CN110661789B (en) Address resetting method, device, equipment and computer readable storage medium
CN116521509A (en) Intelligent contract testing method, device, equipment, storage medium and product
CN110134530B (en) Session content processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination