CN114884668A - Resource management method and computer-readable storage medium - Google Patents
Resource management method and computer-readable storage medium Download PDFInfo
- Publication number
- CN114884668A CN114884668A CN202210263688.7A CN202210263688A CN114884668A CN 114884668 A CN114884668 A CN 114884668A CN 202210263688 A CN202210263688 A CN 202210263688A CN 114884668 A CN114884668 A CN 114884668A
- Authority
- CN
- China
- Prior art keywords
- target
- information
- application
- resource
- permission information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 53
- 238000003860 storage Methods 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 claims abstract description 68
- 238000004519 manufacturing process Methods 0.000 claims description 56
- 238000012217 deletion Methods 0.000 claims description 19
- 230000037430 deletion Effects 0.000 claims description 19
- 238000013468 resource allocation Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 4
- 238000009826 distribution Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 20
- 230000015654 memory Effects 0.000 description 26
- 238000010586 diagram Methods 0.000 description 19
- 238000013475 authorization Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 10
- 230000003993 interaction Effects 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a resource management method and a computer-readable storage medium. Wherein, the method comprises the following steps: sending object information of a target object to an application server; acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and allocating the allowed resource corresponding to the target application based on the target resource permission information. The method and the device solve the technical problem that the utilization rate of the allowed resources is low in the process of managing the applied allowed resources in the prior art.
Description
Technical Field
The present application relates to the field of application management, and in particular, to a resource management method and a computer-readable storage medium.
Background
License (License) is a format contract in the computer field, which is signed by a software author and a user to specify and limit the right of the software user to use the software and the obligation that the author should have to fulfill.
In practical application, the ISV server may provide an application, sell the application in an application store, and an administrator may purchase the application by placing an order through the application store, and may obtain the license right corresponding to the application after payment is successful, and then the administrator may assign the license right corresponding to the application to a user, so that the user can use the application for office work.
For example, in an actual application, the application center allocates the license of the application to the user a, but the user a may not use the application for a long time, and the license allocated to the user cannot be recovered in time, and under the condition that the application license resources in an enterprise are limited, other users who need the license may not obtain the used resources, so that the resource utilization rate of the application license is reduced.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a resource management method and a computer-readable storage medium, so as to at least solve the technical problem in the prior art that the utilization rate of licensed resources is low in the process of managing the licensed resources of an application.
According to an aspect of an embodiment of the present application, there is provided a resource management method, including: sending object information of a target object to an application server; acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and allocating the allowed resource corresponding to the target application based on the target resource permission information.
According to another aspect of the embodiments of the present application, there is also provided a resource management method, including: acquiring object information of a target object sent by an application center, wherein the application center is used for distributing and managing allowed resources of a target application; updating the resource permission information according to the object information to obtain target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for a target application; and sending the target resource permission information to the application center so that the application center allocates the permission resource corresponding to the target application based on the target resource permission information.
According to another aspect of the embodiments of the present application, there is also provided a resource management method, including: receiving a resource updating instruction, displaying object information of a target object, and sending the object information to an application server; displaying target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; responding to the resource allocation instruction, and allocating the allowed resources corresponding to the target application based on the target resource permission information; and displaying the allocation result of the permitted resource.
According to another aspect of the embodiments of the present application, there is also provided a resource management apparatus, including: the first sending module is used for sending the object information of the target object to the application server; the first acquisition module is used for acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and the first allocation module is used for allocating the allowed resource corresponding to the target application based on the target resource permission information.
According to another aspect of the embodiments of the present application, there is also provided a resource management apparatus, including: the second acquisition module is used for acquiring the object information of the target object sent by the application center, wherein the application center is used for carrying out distribution management on the allowed resource of the target application; the updating module is used for updating the resource permission information according to the object information to obtain target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for a target application; and the second sending module is used for sending the target resource permission information to the application center so that the application center allocates the permission resource corresponding to the target application based on the target resource permission information.
According to another aspect of the embodiments of the present application, there is also provided a resource management apparatus, including: the third sending module is used for receiving the resource updating instruction, displaying the object information of the target object and sending the object information to the application server; the first display module is used for displaying target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; the second allocation module is used for responding to the resource allocation instruction and allocating the allowed resources corresponding to the target application based on the target resource permission information; and the second display module is used for displaying the distribution result of the allowed resources.
According to another aspect of the embodiments of the present application, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the above-mentioned resource management method when running.
According to another aspect of embodiments of the present application, there is also provided an electronic device, including one or more processors; a memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to carry out the method for executing a program, wherein the program is arranged to carry out the method for resource management as described above when executed.
According to another aspect of the embodiments of the present application, there is also provided a resource management system, including: a processor; and a memory coupled to the processor for storing executable instructions of the processor; wherein the processor is configured to execute the instructions to implement the resource management method as described above.
In the embodiment of the application, a method that an application server updates resource permission information corresponding to a target application is adopted, after object information of a target object is sent to the application server, the application server updates the resource permission information of the target application according to the object information to obtain the target resource permission information, then, an application center obtains the target resource permission information fed back by the application server and allocates permission resources corresponding to the target application based on the target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
In the above process, the application server may update the resource permission information corresponding to the target application, and the resource permission information includes object information of at least one authorized object, so in the present application, the application server may manage the permission resource of the target application, that is, the application server may update the authorized object corresponding to the target application, that is, in the present application, the application server may flexibly adjust the authorization information of the target application, so that when the target application is not used by the target object for a long time, the application server may retrieve the permission resource corresponding to the target object and reallocate the permission resource, thereby improving the utilization rate of the permission resource of the application.
Therefore, the scheme provided by the application achieves the purpose of flexibly managing the application allowed resources, so that the technical effect of improving the utilization rate of the application allowed resources is achieved, and the technical problem that the utilization rate of the application allowed resources is low in the process of managing the application allowed resources in the prior art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of an electronic device for implementing a resource management method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative electronic device according to an embodiment of the present application;
FIG. 3 is a flow chart of a method of resource management according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative interaction between an application center and an application server according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an alternative interaction between an application center and an application server according to an embodiment of the present application;
FIG. 6 is an interaction diagram illustrating an alternative login flow for a target application according to an embodiment of the present application;
FIG. 7 is a flow chart of a method of resource management according to an embodiment of the present application;
FIG. 8 is a flow chart of a method of resource management according to an embodiment of the present application;
FIG. 9 is a diagram of a resource management apparatus according to an embodiment of the present application;
FIG. 10 is a diagram of a resource management apparatus according to an embodiment of the present application;
FIG. 11 is a diagram of a resource management apparatus according to an embodiment of the present application;
fig. 12 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
There is also provided, in accordance with an embodiment of the present application, an embodiment of a method for resource management, it being noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Fig. 1 shows a hardware configuration block diagram of an electronic device (or mobile device) for implementing the resource management method. As shown in fig. 1, the electronic device 10 (or mobile device 10) may include one or more processors (shown as 102a, 102b, … …, 102n in the figures) which may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, a memory 104 for storing data, and a transmission module 106 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a universal serial BUS (BUS) port (which may be included as one of the ports of the BUS), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, electronic device 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuitry may be a single, stand-alone processing module, or incorporated in whole or in part into any of the other elements in the electronic device 10 (or mobile device). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 can be used for storing software programs and modules of application software, such as program instructions/data storage devices corresponding to the resource management method in the embodiment of the present application, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implementing the above-mentioned resource management method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor, which may be connected to the electronic device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the electronic device 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the electronic device 10 (or mobile device).
Fig. 1 shows a block diagram of a hardware structure, which may be taken as an exemplary block diagram of not only the electronic device 10 (or the mobile device) described above, but also an exemplary block diagram of the server described above, and in an alternative embodiment, fig. 2 shows an embodiment that uses the electronic device 10 (or the mobile device) shown in fig. 1 as a sending end in a block diagram. As shown in fig. 2, the electronic device 10 (or mobile device) may be connected or electronically connected to one or more servers 208 via a data network connection. In an alternative embodiment, the electronic device 10 (or mobile device) may be any mobile computing device or the like. The data network connection may be a local area network connection, a wide area network connection, an internet connection, or other type of data network connection. The electronic device 10 (or mobile device) may execute to connect to a network service executed by a server (e.g., a secure server) or a group of servers. The web server 210 is a web-based user service such as social networking, cloud resources, email, online payment, or other online applications.
It should be noted that, in this embodiment, the application center may execute the method provided in this embodiment, where the application center is configured to allocate the allowed resource of the application to the user.
Under the above operating environment, the present application provides a resource management method as shown in fig. 3. Fig. 3 is a flowchart of a resource management method according to a first embodiment of the present application, and as shown in fig. 3, the method includes the following steps:
step S302, object information of the target object is transmitted to the application server.
In step S302, the application server is a server for generating an application, and the server may be, but is not limited to, an ISV (Independent Software developers) server, where the ISV is an enterprise specialized in development, production, sales, and service of Software.
In addition, in step S302, the target object may be an object to be authorized, or may also be an object to be deleted, where the object to be authorized is an object to which the application center has not allocated the allowed resource of the target application, and the object to be deleted is an object to which the application center has allocated the allowed resource of the target application, but the operation on the target application does not meet the preset condition, for example, the object to be deleted is an object that does not use the target application for a long time.
In addition, in step S302, the object information of the target object may include, but is not limited to, identification information of the target object (for example, an account and a password required for the target object to log in the target application), an identification of a tenant corresponding to the target object, an order number of the tenant that purchases the target application through an application market, and the like, where the tenant is an object for purchasing the target application, the target object is a user using the target application, and the tenant allocates a licensed resource corresponding to the target application, that is, an application License (i.e., License) corresponding to the target application to the target object.
Optionally, the administrator may send the object information of the target object to the application center through a terminal device (e.g., a mobile phone, a computer, etc.), and after receiving the object information of the target object, the application center sends the object information to the application server, so that the application server updates the resource permission information of the target application according to the object information of the target object.
Step S304, obtaining target resource permission information fed back by the application server according to the object information, where the target resource permission information is obtained by the application server updating the resource permission information according to the object information.
In step S304, the application server further stores resource permission information corresponding to applications, where the applications may be cloud applications, and each application corresponds to one resource permission information. The resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
In addition, in step S304, the application server updates the resource permission information based on the object information of the target object, for example, the target object may be a newly-added authorized object, and then the application server adds the object information of the target object to the resource permission information; for another example, if the target object is an object to be deleted, the application server deletes the object information of the target object from the resource permission information.
It should be noted that, through step S304, the application server may update the resource permission information corresponding to the target application, so that the application center may allocate the permitted resource of the target application based on the updated target resource permission information, and avoid the problem of low utilization rate of the permitted resource due to the fact that the permitted resource cannot be updated and allocated in real time in the prior art.
Step S306, based on the target resource permission information, the permission resource corresponding to the target application is distributed.
In step S306, the licensed resource corresponding to the target application may be the total number of application licenses purchased by the enterprise tenant, where the target resource license information at least includes an object identifier of an authorized object, the total number of application licenses, and the number of allocated application licenses.
Optionally, after receiving the target resource permission information fed back by the application server, the application center may allocate an application license to the authorized object according to the object identifier of the authorized object in the target resource permission information, so that the authorized object obtains the operation right for the target application.
Based on the schemes defined in steps S302 to S306, it can be known that, in the embodiment, after the application server updates the resource permission information corresponding to the target application and sends the object information of the target object to the application server, the application server updates the resource permission information of the target application according to the object information to obtain the target resource permission information, then, the application center obtains the target resource permission information fed back by the application server, and allocates the permitted resource corresponding to the target application based on the target resource permission information, where the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
It is easy to note that the application server may update the resource permission information corresponding to the target application, and the resource permission information includes object information of at least one authorized object, so in this application, the application server may manage the permitted resource of the target application, that is, the application server may update the authorized object corresponding to the target application, that is, in this application, the application server may flexibly adjust the authorization information of the target application, so that when the target application is not used by the target object for a long time, the application server may retrieve the permitted resource corresponding to the target object and reallocate the permitted resource, thereby improving the utilization rate of the permitted resource of the application.
Therefore, the scheme provided by the application achieves the purpose of flexibly managing the application allowed resources, so that the technical effect of improving the utilization rate of the application allowed resources is achieved, and the technical problem that the utilization rate of the application allowed resources is low in the process of managing the application allowed resources in the prior art is solved.
In an alternative embodiment, before sending the object information of the target object to the application server, the administrator purchases the target application through the cloud market and acquires the licensed resources returned by the application server. Specifically, when purchase information of the target application is detected, the application center updates a production state corresponding to the target application to a production progress state, where the production state at least includes: the production progress state and the production completion state.
Optionally, fig. 4 shows an interaction schematic diagram between an optional application center and an application server, as shown in fig. 4, an administrator first purchases a target application through a cloud market, after the administrator completes the operation of placing an order and paying, the cloud market notifies the application center that the administrator has placed an order and completed payment, at this time, the application center updates the production state of the target application to a generation progress state, so that the administrator knows that the application server is producing the target application.
Further, after the production state corresponding to the target application is updated to the production progress state, the application center sends production state query information to the application server to obtain the production state fed back by the application server, and when the production state is the production completion state, resource permission information is obtained from the application server. For example, in fig. 4, the application center sends the order number of the target application purchased by the administrator and the identifier of the tenant to the application server, and the application server queries the production state of the target application corresponding to the order number through the order number and the identifier of the tenant, that is, the application server synchronously calls the production state of the target application. Meanwhile, the application center polls the application server to inquire the production state of the target application corresponding to the order number. After the application server finishes the production of the target application, the application server returns the resource permission information corresponding to the target application to the application center. After receiving the resource permission information sent by the application server, the application center updates the production state of the target application to a generation completion state, stores the resource permission information, and then establishes an association relationship between the resource permission information and the order number, so that the resource can be intensively permitted to be provided for the application center for hosting at one time under the condition that the application server does not develop resource investment, and then the application center can distribute the permitted resource in real time, thereby improving the utilization rate of the permitted resource.
It should be noted that, before sending the order number and the tenant identifier to the application server, the application center needs to encrypt the tenant identifier to avoid leakage of tenant information.
In addition, it should be noted that the production state of the target application produced by the application server is obtained in real time, so that the tenant can know the production state of the target application in real time, the production process of the target application is more transparent, and the purchase experience of the tenant for purchasing the target application is improved.
After the application server completes production of the target application, the application center can acquire the resource permission information of the target application, and then after the target object is determined, the application center can send the object information of the target object to the application server, so that the application server updates the resource permission information of the target application.
Specifically, the application center first obtains an object type of the target object, account information required by the target object to log in the target application, tenant information of an object for purchasing the target application, and order information corresponding to the purchase target application, and sends the object type, the account information, the tenant information, and the order information to the application server. The object type represents an update type of the resource permission information updated by the application server, and the update type comprises at least one of the following types: deleting, adding and modifying, wherein the object information at least comprises an object type, account information, tenant information and order information.
Optionally, after receiving the object information of the target object sent by the application center, the application server determines the object type corresponding to the target object from the object information, and determines the update type corresponding to the resource permission information according to the object type.
Specifically, when the object type representation deletes the resource permission information, the application server releases the permission resource corresponding to the target object, and deletes the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, the application server allocates permission resources for the target object, and increases object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, the application server modifies object information corresponding to the target object in the resource permission information to obtain target resource permission information.
Optionally, fig. 5 shows a schematic diagram of an interaction between an optional application center and an application server, and as can be seen from fig. 5, the interaction process mainly includes two processes of object addition and object deletion. As shown in fig. 5, in the process of adding the target object in the resource permission information, the application center sends the tenant identifier, the account information, and the order number to the application server, and the application server can update the object information of the target object to the resource permission information corresponding to the target application and return the updated resource permission information to the application center, where the application server can update the update result of whether the resource permission information is updated successfully, the object identifier of the authorized object, the total number of application licenses, and the number of allocated application licenses. After receiving the updated resource permission information (i.e., the target resource permission information) returned by the application server, the application center performs reconciliation check on the updated resource permission information to ensure that the authorization status of each authorized object adjusted in real time is an accurate status.
In addition, in fig. 5, in the process of deleting the target object in the resource permission information, the application center sends the tenant identifier, the account information, and the order number to the application server, and the application server can delete the object information of the target object from the resource permission information corresponding to the target application to update the resource permission information corresponding to the target application, and return the updated resource permission information to the application center, where the application server can update the result of updating whether the resource permission information is successfully updated, the object identifier of the authorized object, the total number of application licenses, and the number of allocated application licenses. After receiving the updated resource permission information (i.e., the target resource permission information) returned by the application server, the application center performs reconciliation check on the updated resource permission information to ensure that the authorization status of each authorized object adjusted in real time is an accurate status.
It should be noted that, in the processes of object addition and object deletion, the tenant identities fed back to the application server by the application center are encrypted tenant identities. It is easy to notice that, by encrypting the tenant identification, leakage of tenant information can be avoided, and security of tenant information is improved.
In addition, as can be seen from fig. 5, before updating the resource permission information of the target application, the application center needs to determine the target object, where in this embodiment, the application center may determine the target object from the information included in the instruction by receiving the instruction sent by the administrator; in addition, the application center can also determine the target object from a plurality of objects using the target application according to the operation information of each object on the target application.
In the embodiment of determining the target object based on the instruction sent by the administrator, the application center receives the permission resource updating instruction, and analyzes the permission resource updating instruction to obtain the target object and the object type corresponding to the target object. For example, if the administrator needs to delete the object information corresponding to the target object from the resource permission information, the administrator may input the object identifier of the target object to the terminal device, then the terminal device generates a permission resource update instruction, and sends the permission resource update instruction to the application center, the application center parses the object identifier of the target object and the object type corresponding to the target object from the permission resource update instruction, and the application server may determine that the operation to be performed on the resource permission information is the deletion operation according to the object type corresponding to the target object.
It should be noted that, as can be seen from the above, the administrator can perform addition or deletion operation on the object information of the target object in the progress of the resource permission information, and the addition or deletion operation on the resource permission information is substantially adjustment operation on the operation authority of the target application, that is, the administrator can flexibly adjust the authorization of the application, and through the addition, deletion and other operations, the application center interfaces to the application server through the real-time interface to change the latest state of the authorization of the target application.
In the embodiment of determining the target object based on the operation information of the object to the target application, the application center acquires operation data of at least one authorized object for operating the target application, then determines the target object from the at least one authorized object based on the operation data, and determines that the object type of the target object is a deletion type, wherein the deletion type represents that the application server performs a deletion operation on the resource permission information.
In the foregoing scenario, the target object is an object corresponding to object information that needs to be deleted from the resource permission information, and the operation data may include, but is not limited to, a usage time of the authorized object for using the target application for the last time. That is, in this embodiment, the application center may determine whether to delete the authorized object from the resource permission information according to the operation data of each authorized object operating the target application, that is, the application center determines whether to reserve the authorization right of the authorized object according to the operation data of each authorized object operating the target application.
In an optional embodiment, in the process of determining the target object from the at least one authorized object based on the operation data, the application center determines the use time of the at least one authorized object for using the target object for the last time from the operation data, and determines an object whose time difference satisfies a preset condition from the at least one authorized object according to a time difference between the use time and the current time, so as to obtain the target object, where the time difference is greater than or equal to a preset time duration under the preset condition. For example, if the authorized object a does not use the target application for a long time (e.g., one month), the application center may determine that the authorized object a is the target object.
In addition, the application center may further obtain the starting times and the usage duration of at least one authorized target application from the operation data, and determine the target object from at least one authorized object according to the starting times and the usage duration, for example, if the starting times of the authorized object a starting the target application within a preset duration (e.g., one month) is less than 5 times (i.e., the preset starting times), and the total duration of the authorized object a using the target object within the preset duration (i.e., the usage duration) is less than 5 hours (i.e., the preset usage duration), the application center may determine that the authorized object a uses the target application less frequently, and the application center may determine that the authorized object a is the target object.
It should be noted that, as can be seen from the foregoing, in this embodiment, the application center may obtain operation data of the target application used by the object, and the operation data is helpful for an administrator to obtain the use condition of the target application, so that the administrator may reasonably allocate the permitted resource according to the use condition of the target application, thereby improving the utilization rate of the permitted resource of the target application.
Further, after the target object is determined, the application center sends the object information of the target object to the application server, and then the application server can update the resource permission information according to the object information of the target object, and send the updated resource permission information to the application center, and then the application center can allocate the permission resource corresponding to the target application based on the updated resource permission information.
Specifically, the application center acquires token information of the terminal device sent by the application server, and sends object information corresponding to the token information and tenant information of an object for purchasing the target application to the application server, so that the application server determines the operation authority of the terminal device on the target application according to the object information and the tenant information. The terminal equipment requests the application server to acquire the operation authority of the target application.
Optionally, fig. 6 shows an interaction diagram of a login flow of an optional target application, in fig. 6, a terminal device obtains token information token of the terminal device through a gRPC (Remote Procedure call), where the terminal device may obtain a local token using an Eds-account-client-sdk-1.0-snapshot authorization account helper. After receiving the request information sent by the terminal device, the application server requests an interface (i.e., an OpenAPI interface in fig. 6) from the application center, and sends the token to the application center, so that the application center determines, according to the token, object information and a tenant identifier corresponding to the terminal device requesting authorization by using a getUserByToken () method, and sends the object information and the tenant identifier corresponding to the terminal device requesting authorization to the application server. After receiving the object information and the tenant identification corresponding to the terminal device, the application server determines whether the terminal device has the login authority of the login target application according to the object information and the tenant identification corresponding to the terminal device, and after determining that the terminal device has the login authority, the application server can send information such as an account, a password and a login link of the login target application of the terminal device to the terminal device through a mailbox, so that the terminal device logs in the target application and has corresponding operation authority.
It should be noted that, in the above embodiment, the application server provides a feedback channel in the reverse direction of the user, the user may actively apply for the licensed resource of the target application, and the administrator may perform an approval and allocate the licensed resource, thereby improving the flexibility of the licensed resource allocation.
Based on the above, in the present application, the application server may update the resource permission information corresponding to the target application, and the application center may allocate the permitted resource of the target application based on the updated resource permission information, so that an administrator may purchase the application permission as needed according to the situation of the administrator, allocate the user right in real time, reduce the application use cost, and improve the utilization efficiency. Namely, the scheme provided by the application realizes real-time authorization management and realizes time-sharing multiplexing of application resources. In addition, in the application, data feedback can be provided according to the use condition of the user, and the authorization decision of an administrator is facilitated.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the resource management method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
Example 2
The present application further provides a resource management method as shown in fig. 7, in this embodiment, an application server may execute the solution provided in this embodiment, where fig. 7 is a flowchart of the resource management method according to the embodiment of the present application, and as shown in fig. 7, the method includes the following steps:
step S702, acquiring object information of a target object sent by an application center, where the application center is used to perform allocation management on allowed resources of a target application.
In step S702, the target object may be an object to be authorized, or may also be an object to be deleted, where the object to be authorized is an object to which the application center has not allocated the allowed resource of the target application, and the object to be deleted is an object to which the application center has allocated the allowed resource of the target application, but the operation on the target application does not meet the preset condition, for example, the object to be deleted is an object that does not use the target application for a long time.
In addition, in step S702, the object information of the target object may include, but is not limited to, identification information of the target object (for example, an account and a password required by the target object to log in the target application), an identification of a tenant corresponding to the target object, an order number of the tenant that purchases the target application through an application market, and the like, where the tenant is an object for purchasing the target application, the target object is a user using the target application, and the tenant allocates a licensed resource corresponding to the target application, that is, an application License (i.e., License) corresponding to the target application to the target object.
Optionally, the administrator may send the object information of the target object to the application center through a terminal device (e.g., a mobile phone, a computer, etc.), and after receiving the object information of the target object, the application center sends the object information to the application server, so that the application server updates the resource permission information of the target application according to the object information of the target object.
Step S704, updating the resource permission information according to the object information to obtain target resource permission information, where the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
In step S704, the application server further stores resource permission information corresponding to applications, where the applications may be cloud applications, and each application corresponds to one resource permission information.
In addition, in step S704, the application server updates the resource permission information based on the object information of the target object, for example, the target object may be a newly-added authorized object, and then the application server adds the object information of the target object to the resource permission information; for another example, if the target object is an object to be deleted, the application server deletes the object information of the target object from the resource permission information.
It should be noted that, through step S704, the application server may update the resource permission information corresponding to the target application, so that the application center may allocate the permitted resource of the target application based on the updated target resource permission information, and avoid the problem of low utilization rate of the permitted resource due to the fact that the permitted resource cannot be updated and allocated in real time in the prior art.
Step S706, sending the target resource permission information to the application center, so that the application center allocates the permitted resource corresponding to the target application based on the target resource permission information.
In step S706, the licensed resource corresponding to the target application may be the total number of application licenses purchased by the enterprise tenant, where the target resource license information at least includes an object identifier of an authorized object, the total number of application licenses, and the number of allocated application licenses.
Optionally, after the resource permission information is updated, the application server sends the updated target resource permission information to the application center, and the application center may allocate an application license to the authorized object according to the object identifier of the authorized object in the target resource permission information, so that the authorized object obtains the operation right for the target application.
Based on the schemes defined in steps S702 to S706, it can be known that, in the embodiment, after the application server updates the resource permission information corresponding to the target application and acquires the object information of the target object sent by the application center, the application server updates the resource permission information according to the object information to obtain the target resource permission information, and sends the target resource permission information to the application center, so that the application center allocates the permitted resource corresponding to the target application based on the target resource permission information. The application center is used for distributing and managing the allowed resource of the target application, the resource allowed information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on the target application.
It is easy to note that the application server may update the resource permission information corresponding to the target application, and the resource permission information includes object information of at least one authorized object, so in this application, the application server may manage the permitted resource of the target application, that is, the application server may update the authorized object corresponding to the target application, that is, in this application, the application server may flexibly adjust the authorization information of the target application, so that when the target application is not used by the target object for a long time, the application server may retrieve the permitted resource corresponding to the target object and reallocate the permitted resource, thereby improving the utilization rate of the permitted resource of the application.
Therefore, the scheme provided by the application achieves the purpose of flexibly managing the application allowed resources, so that the technical effect of improving the utilization rate of the application allowed resources is achieved, and the technical problem that the utilization rate of the application allowed resources is low in the process of managing the application allowed resources in the prior art is solved.
In an optional embodiment, after the object information of the target object sent by the application center is obtained, the application server may update the resource permission information according to the object information to obtain the target resource permission information.
Specifically, the application server may determine an object type corresponding to the target object from the object information, and then update the resource permission information according to the object type. When the object type representation deletes the resource permission information, releasing the permission resource corresponding to the target object, and deleting the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, allocating permission resources for the target object, and increasing object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, modifying object information corresponding to the target object in the resource permission information to obtain target resource permission information.
It should be noted that the object type of the target object represents an update type corresponding to the resource permission information, that is, the application server performs different operations on the resource permission information according to different objects, for example, when the target object is determined to be a newly added object, the application server performs an adding operation on the resource permission information, and allocates a permission resource corresponding to the target application to the target object; for another example, when it is determined that the target object is a deletion object, the application server deletes relevant information corresponding to the target object from the resource permission information, and releases the permitted resource allocated to the target object; for another example, when the target object is determined to be a modification object, the application server modifies the relevant information corresponding to the target object in the resource permission information, and the permitted resource of the target object is not released in the modification process.
In addition, it should be noted that, before allocating the licensed resource to the target object, the application server needs to detect whether there is a remaining resource in the licensed resource of the target application, and if there is a remaining resource in the licensed resource of the target application, allocate the licensed resource to the target object; if the target application's licensed resources do not have the remaining resources, the application center no longer allocates licensed resources for the target object.
Specifically, the application server detects whether the number of the allowed resources corresponding to the target application in the resource permission information is greater than or equal to a preset number, and determines that the target object is an authorized object when the number of the allowed resources corresponding to the target application is less than the preset number; and when the number of the allowed resources corresponding to the target application is greater than or equal to the preset number, sending prompt information to the application center, wherein the prompt information is used for prompting that the remaining resources corresponding to the allowed resources corresponding to the target application are the preset resource number.
In the above process, the preset number is the total number of application licenses corresponding to the target application purchased by the administrator, that is, the application server allocates the licensed resources to the target object when the licensed resources are not completely allocated; under the condition that the resources are completely allocated, the application server generates prompt information to remind an administrator that the resources are completely allocated and no available resources exist at present, and the administrator needs to perform corresponding adjustment.
In addition, it should be further noted that, in this embodiment, the process of updating the license resource information by the application server is already described in embodiment 1, and is not described herein again.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the resource management method according to the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but the former is a better implementation in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
Example 3
Under the above operating environment, the present application provides a resource management method as shown in fig. 8. Fig. 8 is a flowchart of a resource management method according to an embodiment of the present application, and as shown in fig. 8, the method includes the following steps:
step S802, receiving the resource updating instruction, displaying the object information of the target object, and sending the object information to the application server.
In step S802, the target object may be an object to be authorized, or may also be an object to be deleted, where the object to be authorized is an object to which the application center has not allocated the allowed resource of the target application, and the object to be deleted is an object to which the application center has allocated the allowed resource of the target application, but the operation on the target application does not meet the preset condition, for example, the object to be deleted is an object that does not use the target application for a long time.
In addition, in step S802, the application server is a server for generating an application, and the server may be, but is not limited to, an ISV (Independent Software developers) server, where the ISV is an enterprise specialized in development, production, sales, and service of Software.
In addition, in step S802, the object information of the target object may include, but is not limited to, identification information of the target object (for example, an account and a password required by the target object to log in the target application), an identification of a tenant corresponding to the target object, an order number of the tenant that purchases the target application through an application market, and the like, where the tenant is an object for purchasing the target application, the target object is a user using the target application, and the tenant allocates a licensed resource corresponding to the target application, that is, an application License (i.e., License) corresponding to the target application to the target object.
Optionally, the administrator may send the object information of the target object to the application center through the terminal device (e.g., a mobile phone, a computer, etc.), and after receiving the object information of the target object, the application center sends the object information to the application server, and displays the object information of the target object (e.g., displays an identifier of the target object, account information, etc.) on the terminal device, so that the application server updates the resource permission information of the target application according to the object information of the target object.
Step S804, displaying target resource permission information fed back by the application server according to the object information, where the target resource permission information is obtained by the application server updating the resource permission information according to the object information, the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
In step S804, the application server further stores resource permission information corresponding to applications, where the applications may be cloud applications, and each application corresponds to one resource permission information. Optionally, the application server updates the resource permission information based on the object information of the target object, for example, if the target object may be an authorized object that is newly added, the application server adds the object information of the target object to the resource permission information; for another example, if the target object is an object to be deleted, the application server deletes the object information of the target object from the resource permission information.
It should be noted that, through step S804, the application server may implement updating of the resource permission information corresponding to the target application, so that the application center may allocate the permitted resource of the target application based on the updated target resource permission information, and avoid the problem of low utilization rate of the permitted resource due to the fact that the permitted resource cannot be updated and allocated in real time in the prior art.
Optionally, after obtaining the target resource permission information returned by the application server, the application center may display the target resource permission information, so that the administrator knows the object to be allocated corresponding to the permitted resource corresponding to the target application.
Step S806, responding to the resource allocation instruction, allocates the granted resource corresponding to the target application based on the target resource grant information.
In step S806, after checking the target resource permission information returned by the application server, the administrator may click on the resource allocation control in the application center to implement allocation of the permitted resource of the target application. The application center may be responsive to the resource allocation instructions to effect allocation of the licensed resources to the target application.
It should be noted that the licensed resource corresponding to the target application may be the total number of application licenses purchased by the enterprise tenant, where the target resource license information at least includes an object identifier of an authorized object, the total number of application licenses, and the number of allocated application licenses.
Optionally, after receiving the target resource permission information fed back by the application server, the application center may allocate an application license to the authorized object according to the object identifier of the authorized object in the target resource permission information, so that the authorized object obtains the operation right for the target application.
Step S808 displays the result of the allocation of the granted resource.
In step S808, after completing the allocation of the licensed resources, the application center displays the allocation result of the licensed resources, so that the administrator timely knows the allocation information of the licensed resources of the target application, for example, information on whether the allocation is successful, the number of the application licenses allocated, the number of the application licenses unallocated, and the like.
Based on the schemes defined in steps S802 to S808, it can be known that, in the embodiment, in a manner that the application server updates the resource permission information corresponding to the target application, after receiving the resource update instruction, the application center displays the object information of the target object and sends the object information to the application server, and then displays the target resource permission information fed back by the application server according to the object information, responds to the resource allocation instruction, allocates the permitted resource corresponding to the target application based on the target resource permission information, and displays the allocation result of the permitted resource. The target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application.
It is easy to note that the application server may update the resource permission information corresponding to the target application, and the resource permission information includes object information of at least one authorized object, so in this application, the application server may manage the permitted resource of the target application, that is, the application server may update the authorized object corresponding to the target application, that is, in this application, the application server may flexibly adjust the authorization information of the target application, so that when the target application is not used by the target object for a long time, the application server may retrieve the permitted resource corresponding to the target object and reallocate the permitted resource, thereby improving the utilization rate of the permitted resource of the application.
Therefore, the scheme provided by the application achieves the purpose of flexibly managing the application allowed resources, so that the technical effect of improving the utilization rate of the application allowed resources is achieved, and the technical problem that the utilization rate of the application allowed resources is low in the process of managing the application allowed resources in the prior art is solved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the resource management method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
Example 4
According to an embodiment of the present application, there is also provided an apparatus for implementing the resource management method, as shown in fig. 9, the apparatus 90 includes: a first sending module 901, a first obtaining module 903 and a first distributing module 905.
The first sending module 901 is configured to send object information of a target object to an application server; a first obtaining module 903, configured to obtain target resource permission information fed back by the application server according to the object information, where the target resource permission information is obtained by updating, by the application server, the resource permission information according to the object information, where the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right to a target application; a first allocating module 905, configured to allocate, based on the target resource permission information, a permission resource corresponding to the target application.
It should be noted here that the first sending module 901, the first obtaining module 903, and the first distributing module 905 correspond to steps S302 to S306 in embodiment 1, and the three modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in the first embodiment. It should be noted that the above modules may be implemented in the electronic device 10 provided in the first embodiment as a part of an apparatus.
Example 5
According to an embodiment of the present application, there is also provided an apparatus for implementing the resource management method, as shown in fig. 10, the apparatus 100 includes: a second obtaining module 1001, an updating module 1003 and a second sending module 1005.
The second obtaining module 1001 is configured to obtain object information of a target object sent by an application center, where the application center is configured to perform allocation management on a permitted resource of a target application; an updating module 1003, configured to update the resource permission information according to the object information to obtain target resource permission information, where the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right to a target application; a second sending module 1005, configured to send the target resource permission information to the application center, so that the application center allocates the permitted resource corresponding to the target application based on the target resource permission information.
It should be noted here that the second obtaining module 1001, the updating module 1003, and the second sending module 1005 correspond to steps S702 to S706 in embodiment 2, and the three modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in the second embodiment.
Example 6
According to an embodiment of the present application, there is also provided an apparatus for implementing the resource management method, as shown in fig. 11, the apparatus 110 includes: a third sending module 1101, a first display module 1103, a second assignment module 1105, and a second display module 1107.
The third sending module 1101 is configured to receive a resource update instruction, display object information of a target object, and send the object information to an application server; a first display module 1103, configured to display target resource permission information fed back by the application server according to the object information, where the target resource permission information is obtained by updating, by the application server, the resource permission information according to the object information, where the resource permission information at least includes object information of at least one authorized object, and the at least one authorized object is an object having an operation right to a target application; a second allocating module 1105, configured to respond to the resource allocation instruction, and allocate, based on the target resource permission information, a permitted resource corresponding to the target application; a second display module 1107, configured to display the allocation result of the granted resource.
It should be noted that the third sending module 1101, the first display module 1103, the second distributing module 1105 and the second display module 1107 correspond to steps S802 to S808 in embodiment 3, and the four modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in the third embodiment.
Example 7
According to an embodiment of the present application, there is also provided a system for implementing the resource management method, where the system includes: a processor and a memory.
The memory is connected with the processor and used for storing executable instructions of the processor; wherein the processor is configured to execute the instructions to implement the resource management method as in the above embodiments.
It should be noted that, in the embodiment, a manner that the application server updates the resource permission information corresponding to the target application is adopted, after the object information of the target object is sent to the application server, the application server updates the resource permission information of the target application according to the object information to obtain the target resource permission information, then, the application center obtains the target resource permission information fed back by the application server, and allocates the permitted resource corresponding to the target application based on the target resource permission information, where the resource permission information at least includes object information of at least one authorized object, and at least one authorized object is an object having an operation right for the target application.
It is easy to note that the application server may update the resource permission information corresponding to the target application, and the resource permission information includes object information of at least one authorized object, so in this application, the application server may manage the permitted resource of the target application, that is, the application server may update the authorized object corresponding to the target application, that is, in this application, the application server may flexibly adjust the authorization information of the target application, so that when the target application is not used by the target object for a long time, the application server may retrieve the permitted resource corresponding to the target object and reallocate the permitted resource, thereby improving the utilization rate of the permitted resource of the application.
Therefore, the scheme provided by the application achieves the purpose of flexibly managing the application allowed resources, so that the technical effect of improving the utilization rate of the application allowed resources is achieved, and the technical problem that the utilization rate of the application allowed resources is low in the process of managing the application allowed resources in the prior art is solved.
In addition, it should be further noted that the processor in this embodiment may execute the method provided in embodiment 1, and a specific execution process is not described herein again.
Example 8
Embodiments of the present application may provide an electronic device, which may be any one of computer terminal devices in a computer terminal group. Alternatively, in this embodiment, the electronic device may be replaced with a terminal device such as a mobile terminal.
Optionally, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of a computer network.
In this embodiment, the electronic device may execute the program code of the following steps in the resource management method: sending object information of a target object to an application server; acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and allocating the allowed resources corresponding to the target application based on the target resource permission information.
Optionally, fig. 12 is a block diagram of an electronic device according to an embodiment of the present application. As shown in fig. 12, the electronic device 10 may include: one or more processors 1202 (only one of which is shown), a memory 1204, and a peripheral interface 1206.
The memory may be configured to store software programs and modules, such as program instructions/modules corresponding to the resource management method and apparatus in the embodiments of the present application, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, so as to implement the above-mentioned resource management method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, which may be connected to the electronic device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: sending object information of a target object to an application server; acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and allocating the allowed resource corresponding to the target application based on the target resource permission information.
Optionally, the processor may further execute the program code of the following steps: the method comprises the steps of obtaining an object type of a target object, account information required by the target object for logging in a target application, tenant information of an object for purchasing the target application and order information corresponding to the purchase target application, wherein the object type represents an update type for updating resource permission information by an application server, and the update type comprises at least one of the following types: deleting, adding and modifying, wherein the object information at least comprises an object type, account information, tenant information and order information; and sending the object type, the account information, the tenant information and the order information to an application server.
Optionally, the processor may further execute the program code of the following steps: receiving a permission resource update instruction before transmitting object information of a target object to an application server; and analyzing the allowed resource updating instruction to obtain the target object and the object type corresponding to the target object.
Optionally, the processor may further execute the program code of the following steps: before sending object information of a target object to an application server, acquiring operation data of at least one authorized object for operating a target application; and determining a target object from the at least one authorized object based on the operation data, and determining that the object type of the target object is a deletion type, wherein the deletion type represents that the application server performs a deletion operation on the resource permission information.
Optionally, the processor may further execute the program code of the following steps: determining the use time of the target object used by at least one authorized object for the last time from the operation data; according to the time difference between the using time and the current time; and determining an object with a time difference value meeting a preset condition from at least one authorized object to obtain a target object, wherein the time difference value is greater than or equal to a preset time length under the preset condition.
Optionally, the processor may further execute the program code of the following steps: obtaining token information of the terminal equipment sent by the application server, wherein the terminal equipment requests the application server to obtain the operation authority of the target application; and sending object information corresponding to the token information and tenant information of an object for purchasing the target application to the application server, so that the application server determines the operation authority of the terminal device on the target application according to the object information and the tenant information.
Optionally, the processor may further execute the program code of the following steps: before sending object information of a target object to an application server, when purchase information of a target application is detected, updating a production state corresponding to the target application to a production progress state, wherein the production state at least comprises: the production progress state and the production completion state.
Optionally, the processor may further execute the program code of the following steps: after the production state corresponding to the target application is updated to be a production progress state, sending production state query information to the application server to obtain the production state fed back by the application server; and when the production state is the production completion state, acquiring the resource permission information from the application server.
Optionally, in this embodiment, the application server is configured to determine an object type corresponding to the target object from the object information, and determine an update type corresponding to the resource permission information according to the object type; when the object type representation deletes the resource permission information, the application server releases the permission resource corresponding to the target object and deletes the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, the application server allocates permission resources for the target object, and increases object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, the application server modifies object information corresponding to the target object in the resource permission information to obtain target resource permission information.
Optionally, the processor may further execute the program code of the following steps: acquiring object information of a target object sent by an application center, wherein the application center is used for distributing and managing allowed resources of a target application; updating the resource permission information according to the object information to obtain target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for a target application; and sending the target resource permission information to the application center so that the application center allocates the permission resource corresponding to the target application based on the target resource permission information.
Optionally, the processor may further execute the program code of the following steps: determining an object type corresponding to the target object from the object information, wherein the object type represents an update type corresponding to the resource permission information; when the object type representation deletes the resource permission information, releasing the permission resource corresponding to the target object, and deleting the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, allocating permission resources for the target object, and increasing object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, modifying object information corresponding to the target object in the resource permission information to obtain target resource permission information.
Optionally, the processor may further execute the program code of the following steps: before distributing the allowed resources for the target object, detecting whether the number of the allowed resources corresponding to the target application in the resource permission information is greater than or equal to a preset number; when the number of the allowed resources corresponding to the target application is smaller than the preset number, determining the target object as an allowed authorized object; and when the number of the allowed resources corresponding to the target application is greater than or equal to the preset number, sending prompt information to the application center, wherein the prompt information is used for prompting that the remaining resources corresponding to the allowed resources corresponding to the target application are the preset resource number.
Optionally, the processor may further execute the program code of the following steps: receiving a resource updating instruction, displaying object information of a target object, and sending the object information to an application server; displaying target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; responding to the resource allocation instruction, and allocating the allowed resources corresponding to the target application based on the target resource permission information; and displaying the allocation result of the permitted resource.
It can be understood by those skilled in the art that the structure shown in fig. 12 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 12 is a diagram illustrating a structure of the electronic device. For example, the electronic device 10 may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 12, or have a different configuration than shown in FIG. 12.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Example 9
Embodiments of the present application also provide a computer-readable storage medium. Optionally, in this embodiment, the computer-readable storage medium may be configured to store program codes executed by the resource management method provided in the foregoing embodiment.
Optionally, in this embodiment, the computer-readable storage medium may be located in any one of a group of computer terminals in a computer network, or in any one of a group of mobile terminals.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: sending object information of a target object to an application server; acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; and allocating the allowed resource corresponding to the target application based on the target resource permission information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: the method comprises the steps of obtaining an object type of a target object, account information required by the target object for logging in a target application, tenant information of an object for purchasing the target application and order information corresponding to the purchase target application, wherein the object type represents an update type for updating resource permission information by an application server, and the update type comprises at least one of the following types: deleting, adding and modifying, wherein the object information at least comprises an object type, account information, tenant information and order information; and sending the object type, the account information, the tenant information and the order information to an application server.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: receiving a permission resource update instruction before transmitting object information of a target object to an application server; and analyzing the allowed resource updating instruction to obtain the target object and the object type corresponding to the target object.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: before sending object information of a target object to an application server, acquiring operation data of at least one authorized object for operating a target application; and determining a target object from the at least one authorized object based on the operation data, and determining that the object type of the target object is a deletion type, wherein the deletion type represents that the application server performs a deletion operation on the resource permission information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: determining the use time of the target object used by at least one authorized object for the last time from the operation data; according to the time difference between the using time and the current time; and determining an object with a time difference value meeting a preset condition from at least one authorized object to obtain a target object, wherein the time difference value is greater than or equal to a preset time length under the preset condition.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: obtaining token information of the terminal equipment sent by the application server, wherein the terminal equipment requests the application server to obtain the operation authority of the target application; and sending object information corresponding to the token information and tenant information of an object for purchasing the target application to the application server, so that the application server determines the operation authority of the terminal device on the target application according to the object information and the tenant information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: before sending object information of a target object to an application server, when purchase information of a target application is detected, updating a production state corresponding to the target application to a production progress state, wherein the production state at least comprises: the production progress state and the production completion state.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: after the production state corresponding to the target application is updated to be a production progress state, sending production state query information to the application server to obtain the production state fed back by the application server; and when the production state is the production completion state, acquiring the resource permission information from the application server.
Optionally, in this embodiment, the application server is configured to determine an object type corresponding to the target object from the object information, and determine an update type corresponding to the resource permission information according to the object type; when the object type representation deletes the resource permission information, the application server releases the permission resource corresponding to the target object and deletes the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, the application server allocates permission resources for the target object, and increases object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, the application server modifies object information corresponding to the target object in the resource permission information to obtain target resource permission information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: acquiring object information of a target object sent by an application center, wherein the application center is used for distributing and managing allowed resources of a target application; updating the resource permission information according to the object information to obtain target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for a target application; and sending the target resource permission information to the application center so that the application center allocates the permission resource corresponding to the target application based on the target resource permission information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: determining an object type corresponding to the target object from the object information, wherein the object type represents an update type corresponding to the resource permission information; when the object type representation deletes the resource permission information, releasing the permission resource corresponding to the target object, and deleting the object information corresponding to the target object from the resource permission information to obtain the target resource permission information; when the object type representation performs increasing operation on the resource permission information, allocating permission resources for the target object, and increasing object information corresponding to the target object in the resource permission information to obtain target resource permission information; and when the object type representation modifies the resource permission information, modifying object information corresponding to the target object in the resource permission information to obtain target resource permission information.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: before distributing the allowed resources for the target object, detecting whether the number of the allowed resources corresponding to the target application in the resource permission information is greater than or equal to a preset number; when the number of the allowed resources corresponding to the target application is smaller than the preset number, determining the target object as an allowed authorized object; and when the number of the allowed resources corresponding to the target application is greater than or equal to the preset number, sending prompt information to the application center, wherein the prompt information is used for prompting that the remaining resources corresponding to the allowed resources corresponding to the target application are the preset resource number.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: receiving a resource updating instruction, displaying object information of a target object, and sending the object information to an application server; displaying target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application; responding to the resource allocation instruction, and allocating the allowed resources corresponding to the target application based on the target resource permission information; and displaying the allocation result of the permitted resource.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.
Claims (14)
1. A method for resource management, comprising:
sending object information of a target object to an application server;
acquiring target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application;
and distributing the allowed resource corresponding to the target application based on the target resource permission information.
2. The method of claim 1, wherein sending object information of the target object to the application server comprises:
acquiring an object type of the target object, account information required by the target object to log in the target application, tenant information of an object for purchasing the target application, and order information corresponding to purchase of the target application, wherein the object type represents an update type for updating the resource permission information by the application server, and the update type includes at least one of the following: deleting, adding and modifying the object information, wherein the object information at least comprises the object type, the account information, the tenant information and the order information;
and sending the object type, the account information, the tenant information and the order information to the application server.
3. The method of claim 2, wherein prior to sending the object information of the target object to the application server, the method further comprises:
receiving a permission resource updating instruction;
and analyzing the permission resource updating instruction to obtain the target object and the object type corresponding to the target object.
4. The method of claim 2, wherein prior to sending the object information of the target object to the application server, the method further comprises:
obtaining operation data of the at least one authorized object for operating the target application;
and determining the target object from the at least one authorized object based on the operation data, and determining the object type of the target object as a deletion type, wherein the deletion type characterizes that the application server performs a deletion operation on the resource permission information.
5. The method of claim 4, wherein determining the target object from the at least one authorized object based on the operational data comprises:
determining, from the operational data, a time of last use of the target object by the at least one authorized object;
according to the time difference between the service time and the current time;
and determining an object of which the time difference value meets a preset condition from the at least one authorized object to obtain the target object, wherein the time difference value is greater than or equal to a preset time length under the preset condition.
6. The method of claim 1, wherein allocating the licensed resource corresponding to the target application based on the target resource license information comprises:
obtaining token information of the terminal equipment sent by the application server, wherein the terminal equipment requests the application server to obtain the operation authority of the target application;
and sending object information corresponding to the token information and tenant information of an object for purchasing the target application to the application server, so that the application server determines the operation authority of the terminal device on the target application according to the object information and the tenant information.
7. The method of claim 1, wherein prior to sending the object information of the target object to the application server, the method further comprises:
when the purchase information of the target application is detected, updating a production state corresponding to the target application to a production progress state, wherein the production state at least comprises: the production progress state and the production completion state.
8. The method of claim 7, wherein after updating the production state corresponding to the target application to a production progress state, the method further comprises:
sending production state query information to the application server to acquire a production state fed back by the application server;
and when the production state is the production completion state, acquiring the resource permission information from the application server.
9. The method according to claim 1, wherein the application server is configured to determine an object type corresponding to the target object from the object information, and determine an update type corresponding to the resource permission information according to the object type; wherein,
when the object type representation deletes the resource permission information, the application server releases the permission resource corresponding to the target object, and deletes the object information corresponding to the target object from the resource permission information to obtain the target resource permission information;
when the object type representation performs an increasing operation on the resource permission information, the application server allocates the permission resource for the target object, and adds object information corresponding to the target object to the resource permission information to obtain the target resource permission information;
and when the object type representation modifies the resource permission information, the application server modifies object information corresponding to the target object in the resource permission information to obtain the target resource permission information.
10. A method for resource management, comprising:
acquiring object information of a target object sent by an application center, wherein the application center is used for distributing and managing allowed resources of a target application;
updating the resource permission information according to the object information to obtain target resource permission information, wherein the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right for the target application;
and sending the target resource permission information to the application center so that the application center allocates the permission resource corresponding to the target application based on the target resource permission information.
11. The method of claim 10, wherein updating the resource permission information according to the object information to obtain target resource permission information comprises:
determining an object type corresponding to the target object from the object information, wherein the object type represents an update type corresponding to the resource permission information;
when the object type representation deletes the resource permission information, releasing the permission resource corresponding to the target object, and deleting the object information corresponding to the target object from the resource permission information to obtain the target resource permission information;
when the object type representation performs increasing operation on the resource permission information, allocating the permission resource for the target object, and adding object information corresponding to the target object to the resource permission information to obtain the target resource permission information;
and when the object type representation modifies the resource permission information, modifying object information corresponding to the target object in the resource permission information to obtain the target resource permission information.
12. The method of claim 11, wherein prior to allocating the granted resources for the target object, the method further comprises:
detecting whether the number of the allowed resources corresponding to the target application in the resource permission information is greater than or equal to a preset number;
when the number of the allowed resources corresponding to the target application is smaller than the preset number, determining the target object as an authorized object;
and when the number of the allowed resources corresponding to the target application is greater than or equal to the preset number, sending a prompt message to the application center, wherein the prompt message is used for prompting that the remaining resources corresponding to the allowed resources corresponding to the target application are the preset number of resources.
13. A method for resource management, comprising:
receiving a resource updating instruction, displaying object information of a target object, and sending the object information to an application server;
displaying target resource permission information fed back by the application server according to the object information, wherein the target resource permission information is obtained by updating the resource permission information by the application server according to the object information, the resource permission information at least comprises object information of at least one authorized object, and the at least one authorized object is an object having an operation right on a target application;
responding to a resource allocation instruction, and allocating the allowed resource corresponding to the target application based on the target resource permission information;
and displaying the distribution result of the permitted resources.
14. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is arranged to execute the resource management method of any one of claims 1 to 13 when running.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210263688.7A CN114884668B (en) | 2022-03-17 | 2022-03-17 | Resource management method and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210263688.7A CN114884668B (en) | 2022-03-17 | 2022-03-17 | Resource management method and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114884668A true CN114884668A (en) | 2022-08-09 |
CN114884668B CN114884668B (en) | 2024-09-10 |
Family
ID=82666778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210263688.7A Active CN114884668B (en) | 2022-03-17 | 2022-03-17 | Resource management method and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114884668B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9313230B1 (en) * | 2014-09-22 | 2016-04-12 | Amazon Technologies, Inc. | Policy approval layer |
EP3188069A1 (en) * | 2015-12-28 | 2017-07-05 | Palantir Technologies, Inc. | Network-based permissioning system |
EP3244338A1 (en) * | 2016-05-12 | 2017-11-15 | BlackBerry Limited | Requesting resource access permissions |
CN110290144A (en) * | 2019-07-01 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of user right information update method, system, storage medium and electronic equipment |
CN110401629A (en) * | 2019-05-20 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of method and relevant apparatus of activation authorization |
EP3629547A1 (en) * | 2018-09-28 | 2020-04-01 | Atlassian Pty Ltd | Managing content authorization in a federated application system |
US20200104473A1 (en) * | 2018-09-27 | 2020-04-02 | International Business Machines Corporation | Authorization of resource access |
CN111131242A (en) * | 2019-12-24 | 2020-05-08 | 北京格林威尔科技发展有限公司 | Authority control method, device and system |
CN111737681A (en) * | 2020-06-08 | 2020-10-02 | 海尔优家智能科技(北京)有限公司 | Resource acquisition method and device, storage medium and electronic device |
CN112231643A (en) * | 2020-09-29 | 2021-01-15 | 新华三信息安全技术有限公司 | License management method and device |
CN112261115A (en) * | 2020-10-19 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Resource allocation method, device and computer storage medium |
US20210234864A1 (en) * | 2020-01-27 | 2021-07-29 | Microsoft Technology Licensing, Llc | Authentication framework for resource access across organizations |
CN113271289A (en) * | 2020-12-15 | 2021-08-17 | 全芯智造技术有限公司 | Method, system and computer storage medium for resource authorization and access |
CN113347242A (en) * | 2021-05-28 | 2021-09-03 | Oppo广东移动通信有限公司 | Cross-device resource access method and device, storage medium and electronic device |
CN113778623A (en) * | 2021-08-26 | 2021-12-10 | 北京达佳互联信息技术有限公司 | Resource processing method and device, electronic equipment and storage medium |
CN113852621A (en) * | 2021-09-18 | 2021-12-28 | 中汽创智科技有限公司 | License information determination method and device based on Jenkins server and storage medium |
CN114124488A (en) * | 2021-11-11 | 2022-03-01 | 上海传英信息技术有限公司 | Information control method, intelligent terminal and storage medium |
-
2022
- 2022-03-17 CN CN202210263688.7A patent/CN114884668B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9313230B1 (en) * | 2014-09-22 | 2016-04-12 | Amazon Technologies, Inc. | Policy approval layer |
EP3188069A1 (en) * | 2015-12-28 | 2017-07-05 | Palantir Technologies, Inc. | Network-based permissioning system |
EP3244338A1 (en) * | 2016-05-12 | 2017-11-15 | BlackBerry Limited | Requesting resource access permissions |
US20200104473A1 (en) * | 2018-09-27 | 2020-04-02 | International Business Machines Corporation | Authorization of resource access |
EP3629547A1 (en) * | 2018-09-28 | 2020-04-01 | Atlassian Pty Ltd | Managing content authorization in a federated application system |
CN110401629A (en) * | 2019-05-20 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of method and relevant apparatus of activation authorization |
CN110290144A (en) * | 2019-07-01 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of user right information update method, system, storage medium and electronic equipment |
CN111131242A (en) * | 2019-12-24 | 2020-05-08 | 北京格林威尔科技发展有限公司 | Authority control method, device and system |
US20210234864A1 (en) * | 2020-01-27 | 2021-07-29 | Microsoft Technology Licensing, Llc | Authentication framework for resource access across organizations |
CN111737681A (en) * | 2020-06-08 | 2020-10-02 | 海尔优家智能科技(北京)有限公司 | Resource acquisition method and device, storage medium and electronic device |
CN112231643A (en) * | 2020-09-29 | 2021-01-15 | 新华三信息安全技术有限公司 | License management method and device |
CN112261115A (en) * | 2020-10-19 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Resource allocation method, device and computer storage medium |
CN113271289A (en) * | 2020-12-15 | 2021-08-17 | 全芯智造技术有限公司 | Method, system and computer storage medium for resource authorization and access |
CN113347242A (en) * | 2021-05-28 | 2021-09-03 | Oppo广东移动通信有限公司 | Cross-device resource access method and device, storage medium and electronic device |
CN113778623A (en) * | 2021-08-26 | 2021-12-10 | 北京达佳互联信息技术有限公司 | Resource processing method and device, electronic equipment and storage medium |
CN113852621A (en) * | 2021-09-18 | 2021-12-28 | 中汽创智科技有限公司 | License information determination method and device based on Jenkins server and storage medium |
CN114124488A (en) * | 2021-11-11 | 2022-03-01 | 上海传英信息技术有限公司 | Information control method, intelligent terminal and storage medium |
Non-Patent Citations (1)
Title |
---|
许静;苗炬;许峥;: "云计算环境下应用资源访问控制架构研究", 无线电工程, no. 04 * |
Also Published As
Publication number | Publication date |
---|---|
CN114884668B (en) | 2024-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110490305B (en) | Machine learning model processing method based on block chain network and node | |
CN108540433B (en) | User identity verification method and device | |
CN110417918B (en) | Distributed storage method and device for archive information, electronic equipment and medium | |
CN110351363B (en) | Data backup method, device and computer readable storage medium | |
CN105812479B (en) | Request method and device and acquisition method and device for use permission | |
CN110730153A (en) | Account configuration method, device and system of cloud equipment and data processing method | |
CN109639643B (en) | Block chain-based client manager information sharing method, electronic device and readable storage medium | |
CN103312801A (en) | Application devices, interaction method and system for data between application devices and server | |
CN112494934A (en) | Cloud game data processing method, device, equipment and storage medium | |
CN113761552B (en) | Access control method, device, system, server and storage medium | |
WO2023151505A1 (en) | Method, apparatus and system for obtaining identity authentication information, and storage medium | |
CN109885424A (en) | A kind of data back up method, device and computer equipment | |
CN113141404B (en) | Intelligent gateway and data sharing system | |
CN113904774A (en) | Block chain address authentication method and device and computer equipment | |
CN112488707A (en) | Service flow supervision method and system | |
CN114884668B (en) | Resource management method and computer readable storage medium | |
CN116668020A (en) | Device connection method, electronic device, and storage medium | |
CN108629635B (en) | Expense allocation method and device, electronic equipment and medium | |
CN110366164A (en) | The method of remote control terminal, terminal, calculates equipment and storage medium at server | |
CN114157425B (en) | Method and device for responding to service request | |
US10482397B2 (en) | Managing identifiers | |
CN116776302A (en) | Configuration method and device of business template editing permission, storage medium and electronic equipment | |
CN108200013B (en) | Cloud-based remote security access method, device and system | |
CN113452513A (en) | Key distribution method, device and system | |
CN110971425A (en) | Method and device for restarting group and requesting to restart group |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |