CN115840963A - Shared document information collection method and system based on identity control - Google Patents

Shared document information collection method and system based on identity control Download PDF

Info

Publication number
CN115840963A
CN115840963A CN202211548711.3A CN202211548711A CN115840963A CN 115840963 A CN115840963 A CN 115840963A CN 202211548711 A CN202211548711 A CN 202211548711A CN 115840963 A CN115840963 A CN 115840963A
Authority
CN
China
Prior art keywords
content
identity
authority
block
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211548711.3A
Other languages
Chinese (zh)
Inventor
董博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN202211548711.3A priority Critical patent/CN115840963A/en
Publication of CN115840963A publication Critical patent/CN115840963A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Document Processing Apparatus (AREA)

Abstract

The invention relates to a shared document information collection method and system based on identity control, which adds an identity to a content block edited by a client and sets corresponding operation authority aiming at the identity, realizes the use of displacement identities distributed to various users, and controls the display and modification authority of the content edited by the users in a shared document, thereby fully ensuring the safety of information data and the prevention of leakage of sensitive information while keeping the advantage of efficiently collecting information of the shared document, ensuring the safety of filling content in the shared document, avoiding the mistaken modification and deletion of information input by others due to the misoperation of the users, and improving the availability of the collected information of the shared document.

Description

Shared document information collection method and system based on identity control
Technical Field
The invention relates to the technical field of multi-user shared document information collection and information security, in particular to a shared document information collection method and system based on identity identification control.
Background
With the development of science and technology and the change of office modes, the cooperation modes of company teams become various, and the online office scenes are increasingly increased. To improve work efficiency and save labor costs in the information collection process, teams use shared document collection tools increasingly frequently when collecting information. For example, various organizations such as companies and schools use shared tables to collect required information, all clients respectively edit information of respective responsible parts on the same interface, and finally collect the information into complete information data, so that the execution efficiency is remarkably improved.
Because the existing shared document tools are mostly open collected information, the risk of personal information leakage exists, personal privacy information cannot be protected, and potential safety hazards exist. For the information security problem, the prior art generally adopts a user login authority control mode for protection, that is, a user must firstly verify the identity authority of the user and can operate a shared document after the user passes the identity authority, so that the condition that unauthorized people contact the shared document is avoided. However, the user login authority control cannot prevent the situations of mistaken filling and mistaken modification of filling information by others in the shared document editing process, so that the problem of information collection pollution exists, sensitive information cannot be completely prevented from being browsed by persons without authority, and the information leakage risk cannot be completely solved.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a shared document information collection method and system based on identity control, which control the display and modification authority of the content edited by a user in a shared document by using a displacement identity distributed to each user, thereby ensuring the safety of information data and the leakage prevention of sensitive information while maintaining the advantage of efficiently collecting information in the shared document, ensuring the safety of filling content in the shared document, avoiding the mistaken modification and the mistaken deletion of information input by other people due to the misoperation of the user, and improving the availability of the collected information in the shared document.
In order to achieve the above purpose, the technical scheme adopted by the invention comprises the following steps:
a shared document information collection method based on identity control is characterized by comprising the following steps:
s1, configuring unique identity marks corresponding to all clients;
s2, adding the identity to a content block edited by the client;
s3, setting operation authorities corresponding to the identity marks, wherein the operation authorities comprise whether the operation authorities can be displayed, modified and deleted;
and S4, executing the operable items corresponding to the content blocks by using the set operation authority, wherein the operable items comprise display block contents, modification block contents and deletion blocks.
Further, the method further comprises:
allocating content identifications respectively corresponding to the content blocks;
and setting the control authority corresponding to the content identifier, or setting the content identifier without corresponding control authority, wherein the control authority comprises whether the content identifier can be displayed, whether the content identifier can be modified and whether the content identifier can be deleted.
Further, the step S4 further includes:
judging whether the content identification corresponding to the content block is set with a control authority, and executing the operable item corresponding to the content block according to the operation authority when the content identification corresponding to the content block is judged not to be set with the control authority;
when the content identification corresponding to the content block is judged to set the control authority, further judging whether the control authority is consistent with the set value of the operation authority, and executing the operable item corresponding to the content block according to the operation authority when the control authority is judged to be consistent with the set value of the operation authority;
and when the control authority is judged to be inconsistent with the set value of the operation authority, the content block is not permitted to execute the corresponding operable item.
Further, the method further comprises:
s5, receiving an operable item application of the corresponding content block;
s6, feeding back the operable item application to the client according to the identity corresponding to the content block;
and S7, temporarily modifying the operation authority corresponding to the identity according to the application of the operable item.
Further, the step S6 further includes feeding back the initiator information of the actionable item application to the client.
Further, the method further comprises:
and S8, feeding back the corresponding executable operable item information to the client in real time according to the identity corresponding to the content block.
The invention also relates to a shared document information collection system based on the identity identification control, which is characterized by comprising the following steps:
the first identification management module is used for configuring content identifications respectively corresponding to the content blocks;
the second identification management module is used for configuring unique identification corresponding to each client;
the first authority management module is used for setting the control authority corresponding to the content identification;
the second authority management module is used for setting the operation authority corresponding to the identity;
and the execution module is used for executing the operable items corresponding to the content blocks according to the set control authority and the set operation authority.
The invention also relates to a computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the above-mentioned method.
The invention also relates to an electronic device, characterized in that it comprises a processor and a memory;
the memory is used for storing the identity identification and the content identification;
the processor is used for executing the method by calling the identity identification and the content identification.
The invention also relates to a computer program product comprising a computer program and/or instructions, characterized in that the computer program and/or instructions, when executed by a processor, implement the steps of the above-mentioned method.
The beneficial effects of the invention are as follows:
by adopting the shared document information collection method and system based on identity control, the displacement identity distributed to each user is used for controlling the display and modification authority of the content edited by the user in the shared document, so that the information data safety and sensitive information leakage are fully ensured while the advantage of efficiently collecting information of the shared document is kept, the content filling safety in the shared document can be ensured, the mistaken modification and the mistaken deletion of information input by other people due to the misoperation of the user can be avoided, and the availability of the collected information of the shared document is improved. Furthermore, the user can realize dynamic authority control and change informed rights of the edited content by setting notification feedback triggering operation matched with the identity, and the requirement of more flexibly sharing document collection information is met.
Drawings
FIG. 1 is a flow chart of a method for collecting shared document information based on ID control according to the present invention.
FIG. 2 is a schematic diagram of a shared document information collection system based on ID control according to the present invention.
Detailed Description
For a clearer understanding of the contents of the present invention, reference will be made to the accompanying drawings and examples.
The invention relates to a shared document information collection method based on identity identification control, which comprises the following steps:
s1, configuring content identifications respectively corresponding to each content block; configuring unique identity marks corresponding to the clients; and setting the control authority corresponding to the content identifier, or setting the content identifier without corresponding control authority, wherein the control authority comprises whether the content identifier can be displayed, whether the content identifier can be modified and whether the content identifier can be deleted.
In use, the content identification corresponding to each content block can be selected not to be configured according to actual needs, and only the unique identity identification corresponding to each client can be used. For the case where the content id and the id are configured at the same time, it proves that the protection for the sensitive information needs to consider the protection requirement of the client user (content editor) and the protection requirement of the content itself at the same time. Preferably, different protection requirements of the user and the content can be considered through the simultaneous action of the content identification and the identity identification.
The content block may be a data block or a specific information part arbitrarily defined according to needs, such as a certain row to be edited, a table, a text box, etc. of the shared document.
And S2, adding the identity to the content block edited by the client.
In use, the identity identifiers can be added to all the edited content blocks, or the identity identifiers can be added to the content blocks with the need in a selected part. Preferably, the identity identifiers may be preferentially added to all the edited content blocks, and the subsequent operation permission steps are adopted for specific control. Because the operation authority can be set and changed according to the requirement, the method has better adaptability to the content block with the possibility of generating the change of the authority and avoids repeatedly executing the step of adding the identity.
And S3, setting operation authorities corresponding to the identity marks, wherein the operation authorities comprise whether the operation authorities can be displayed, modified and deleted.
The operation authorities have an existing correlation relationship, for example, when setting a modifiable authority, it is necessary to set exposable authorities at the same time, but at the same time, the operation authorities that cannot be displayed but can be deleted can also be set. The specific authority setting can be selected completely according to the needs of the user, and even if the setting has some conflict, such as the setting can not be displayed but can be modified, the execution of the operation authority is not prevented.
An alternative simplification includes presetting the operating properties of the content blocks, such as exclusive or shared, and default matching the preset operating right settings, such as exclusive property of the content blocks default set to non-show, non-modifiable, and shared property of the content blocks default set to show, modifiable.
And S4, executing the operable items corresponding to the content blocks by using the set operation authority, wherein the operable items comprise display block contents, modification block contents and deletion blocks. Specifically, under the condition that the identity identification and the content identification exist at the same time, whether the content identification corresponding to the content block sets the control authority is judged, and when the content identification corresponding to the content block is judged not to set the control authority, the operable item corresponding to the content block is executed according to the operation authority; when the content identification corresponding to the content block is judged to be set with the control authority, whether the control authority is consistent with the set value of the operation authority is further judged, and when the control authority is judged to be consistent with the set value of the operation authority, the operable item corresponding to the content block is executed according to the operation authority; and when the control authority is judged to be inconsistent with the set value of the operation authority, the content block is not permitted to execute the corresponding operable item.
Specifically, for example, if the identity is set to be exposable, and there is no content identifier or the content identifier is set to be exposable, the operable item corresponding to the content block includes the content of the display block; when the identity identifier is set to be displayable but the content identifier is set to be not displayable, the operable item of the corresponding content block does not include the content of the display block.
And S5, receiving the operable item application of the corresponding content block.
The operable item application is sent when the client-side user except the content block editor wishes to operate the content block. The operable item application may be an application for clearly changing one or more operation authorities, or may be a corresponding application automatically issued when the content block is subjected to related operations by other client users.
And S6, feeding back the operable item application and the initiator information of the operable item application to the client according to the identity corresponding to the content block.
In order to ensure that the content block editor can correctly process the application of the operable item, it is necessary to obtain specific information of the application sender as a reference so as to ensure that the user with the authority can execute the corresponding operable item.
And S7, temporarily modifying the operation authority corresponding to the identity according to the application of the operable item.
For the case that the operation need does exist, the temporary modification of the operation authority can be applied in a mode of sending an operable item application to an original content block editor. The temporary modification is a single authorized operation performed to meet the specific operation requirement of a specific user, and the operation authority needs to be restored to the original setting after the modification time is agreed, so as to ensure the security of sensitive information. The user who applies for the operable item can execute the corresponding operable item according to the temporarily modified operation authority.
And S8, feeding back the corresponding executable operable item information to the client in real time according to the identity corresponding to the content block.
The shared document information collection method based on the identity control can be applied to the front-end application field such as the online document editing of a webpage end and the like, and can also be applied to the back-end application field such as the multi-user shared document of a database and the like. The implementation of the method according to the invention is further illustrated by the following specific examples.
Assuming that a shared document needs to be published at a webpage end (cloud platform) information publisher G end to collect information from a plurality of different clients (C1, C2), the following steps can be performed:
1. and establishing a document server on the cloud platform, and allocating a unique identity as a client ID for the client.
2. And the issuing client sends a shared document information collection issuing instruction to the document server, and the document server issues the shared document information table according to the issuing instruction. Wherein the collection instruction comprises the unique identification of the client, the collection subject, the collection content and the like.
For example, the C1 endpoint clicks on the shared document table, the document server assigns a UUID, when C1 clicks on the first row (first content block), and clicks on the lock button. The server database compares the table index ID =1 with the UUID C1 Binding (UUID) C1 ,id=1),UUID C1 With editing rights for the first line. When UUID is used C1 Click the submit button after the edit is completed, row _ status =1, uuid C1 Exclusive to ID =1 line.
3. The editing client clicks a shared information collection document table, the document server distributes a unique identity to the editing client, the editing client selects a line to be filled, and a locking button is clicked to lock the line.
And after a row locking button is clicked, the database table binds the index ID with the unique identity of the operation client, the editing client is an exclusive person of the row, and the row mode is changed from the sharing mode to the exclusive mode. When the unique identity of the editor is consistent with the unique identity of the monopolizer, the attribute of the field of the locked line is edited by changing the textbox by label, otherwise, the edited field is label; (the label attribute is a read-only attribute, and the textbox attribute is an edit attribute).
When other editing clients click the line, the front end of the document server judges whether the unique identity is the unique identity of the exclusive person in the line, if not, the field of the line only has label attribute; and the document server sends a message to the client to prompt that the current row is occupied, so that the data of the current row cannot be operated by mistake.
4. After the client finishes the information collection, the client clicks to submit, the row of data is inserted into the database table, the mode state of the row is still the exclusive state, and the field row _ status is changed into 1 (0 is the editing state, and 1 is the submitting state). When the client modifies the line data, the front end of the server judges, if the unique identity of the client is consistent with the unique identity of the monopost, the field attribute of the locked line is changed into the textbox attribute by the label attribute, and the textbox attribute is edited, otherwise, the field is the label attribute; the present row field row _ status becomes 0 when modified.
For example, the C2 endpoint clicks the first row, and the server front end determines whether the unique id is the unique id of the exclusive person or the shared person in the row. If not, the row is indicated to be occupied.
5. When the current client modifies the field data of other lines, the document server sends a notification message to the monopost of the current line to prompt whether to determine authorization or cancel authorization to modify the data content. And after the exclusive persons agree to the authorization, the sharing person field of the exclusive person row in the database table is written into the unique identity of the current client.
When a sharer clicks the line to edit, the front end of the server judges whether the unique identity is the unique identity of the monopost or the unique identity of the sharer, if the unique identity is the unique identity of the sharer, the field attribute label changes the textbox, and then the modification can be carried out, otherwise, the modification is not allowed.
And after the sharer finishes modifying the content, clicking and submitting, and sending a message for modifying the specific field and the content to the monopost by the document server to prompt whether to confirm the modification. After the monopolizing person confirms, the document server database stores the modified data content, and meanwhile, the replace emptying action is carried out on the shared herringbone segment in the database table, so that a single authorization mechanism is realized.
For example, the C2 terminal selects the first row and clicks the edit button. The document server gives the first line exclusive person UUID C1 And sending a message notice. After the monopolizing person authorizes, the UUID is transmitted C2 The sharer field is inserted. C2, the end point is clicked and submitted, the document server sends a notification message to the monopost, and after the monopost confirms authorization, the server updates the modified content and clears the shared field value.
6. The issuing client sends a generating instruction to the document server, and the document server generates a shared document information collection table according to key fields such as the unique identity of the issuing client, the collection subject and the like. In the generation process, a row _ status state column in a database table is checked, if the state of 0 exists, the document server returns a message to the issuing client to prompt that a certain row is being edited, otherwise, a shared information collection table is immediately generated and sent to the information management client.
For example, the G-side sends a shared document generation instruction to the server, and the server database checks whether the shared document table has row _ status all 1, thereby generating a table.
Assuming that a shared document needs to be published at the database server information publisher G side to collect information from a plurality of different clients (C1, C2), the following steps may be performed:
1. and establishing a document server on the cloud platform, and allocating a unique identity as a client ID for the client.
2. And the issuing client sends a shared document information collection issuing instruction to the document server, and the document server issues the shared document information table according to the issuing instruction. Wherein the collection instruction comprises the unique identification of the client, the collection subject, the collection content and the like.
For example, the C1 endpoint clicks on the shared document table (original table), and the document server assigns a UUID C1 And the server generates according to the original table, takes the temporary table added with the control field as a query table, returns a query result to be empty, and releases the temporary table.
3. An editing client clicks a shared information collection document table (hereinafter referred to as an original table), a document server distributes a unique identity identifier to the editing client, the server generates and adds a control field is _ show according to the original table, a temporary table of the is _ edge is used as a query table, a query result is empty, and the temporary table is deleted; and selecting the row to be filled in by the editing client, and clicking a locking button to lock the row.
The server database table binds the index ID with the unique ID of the editing client, the unique ID information of the editing client is inserted into the exclusive person field of the current row (current content block) of the original table of the database, the exclusive person field is the exclusive person of the current row, the row mode is changed from the sharing mode to the exclusive mode, and the information is written into the sharing document table.
For example, C1 clicks on the first row and clicks on the lock button. UUID is transmitted by server database C1 Inserting a current line exclusitor field, filling in content by C1, inserting information data into an original table after clicking a submit button, inserting a line state field row _ status =1, UUID C1 Being the exclusive person of the first line.
4. After the client finishes filling in the collected information, the client clicks to submit, the row of data is inserted into the database shared document table, and the field row _ status becomes 1 (0 is in an editing state, and 1 is in a submitting state).
5. When other clients click on the shared document collection table, the server generates a temporary table, wherein the fields and the content of the temporary table are added with the fields of the is _ show and the is _ edge on the basis of the original table.
When the client-side identity is inconsistent with the exclusive person unique identity in the temporary table, the field is _ show is changed to 0, the field is _ exit is changed to 0, namely the field is not displayed and can not be edited, the field is returned to other client-side interfaces as a query result, the temporary table is deleted at the same time, and the server displays the exclusive person unique identity on the shared document table Row.
For example, the C2 endpoint clicks on the shared file table, and the server assigns the UUID C2 And simultaneously displaying the temporary table generated by the original table as a result table.
6. When the exclusive person in the line clicks the shared document table, the server judges that the unique identity of the client is consistent with the unique identity of the exclusive person in the table, the displayed content is returned and can be edited, and the content of other inconsistent unique identities is not displayed and can not be edited.
7. The issuing client sends a generating instruction to the document server, and the document server generates a shared document information collection table according to key fields such as the unique identity of the issuing client and the collection subject. In the generation process, a row _ status state column in an original table of the database is checked, if the state of 0 exists, the document server returns a message to the publishing client to prompt that a certain row is edited, otherwise, a shared information collection table is immediately generated and sent to the information management client.
For example, the G-side sends a shared document generation instruction to the server, and the server database checks whether the shared document table has row _ status all 1, thereby generating a table.
In another aspect, the present invention further relates to an identity control-based shared document information collection system, whose structure is shown in fig. 2, including:
the first identification management module is used for configuring content identifications respectively corresponding to the content blocks;
the second identification management module is used for configuring unique identity identifications corresponding to the clients;
the first authority management module is used for setting the control authority corresponding to the content identification;
the second authority management module is used for setting the operation authority corresponding to the identity;
and the execution module is used for executing the operable items corresponding to the content blocks according to the set control authority and the set operation authority.
By using this system, the above-described arithmetic processing method can be executed, and a corresponding technical effect can be achieved.
Embodiments of the present invention also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, the computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all the steps of the method in the above embodiments.
Embodiments of the present invention also provide an electronic device for executing the method, as an implementation apparatus of the method, the electronic device at least has a processor and a memory, in particular, the memory stores data and related computer programs, such as an identity identifier and a content identifier, etc., which are required for executing the method, and all steps of implementing the method are executed by invoking the data and programs in the memory by the processor, and corresponding technical effects are obtained.
Preferably, the electronic device may comprise a bus architecture, which may include any number of interconnected buses and bridges linking together various circuits including one or more processors and memory. The bus may also link various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the receiver and transmitter. The receiver and transmitter may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium. The processor is responsible for managing the bus and general processing, while the memory may be used to store data used by the processor in performing operations.
Additionally, the electronic device may further include a communication module, an input unit, an audio processor, a display, a power source, and the like. The processor (or controller, operational controls) employed may include a microprocessor or other processor device and/or logic device that receives input and controls the operation of various components of the electronic device; the memory may be one or more of a buffer, a flash memory, a hard drive, a removable medium, a volatile memory, a non-volatile memory or other suitable devices, and may store the above-mentioned related data information, and may also store a program for executing the related information, and the processor may execute the program stored in the memory to realize information storage or processing, etc.; the input unit is used for providing input to the processor, and can be a key or a touch input device; the power supply is used for supplying power to the electronic equipment; the display is used for displaying display objects such as images and characters, and may be an LCD display, for example. The communication module is a transmitter/receiver that transmits and receives signals via an antenna. The communication module (transmitter/receiver) is coupled to the processor to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal. Based on different communication technologies, a plurality of communication modules, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be disposed in the same electronic device. The communication module (transmitter/receiver) is also coupled to a speaker and a microphone via an audio processor to provide audio output via the speaker and receive audio input from the microphone to implement the usual telecommunication functions. The audio processor may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor is also coupled to the central processor, so that recording on the local machine can be realized through the microphone, and sound stored on the local machine can be played through the loudspeaker.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are also within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A shared document information collection method based on identity control is characterized by comprising the following steps:
s1, configuring unique identity marks corresponding to all clients;
s2, adding the identity to a content block edited by the client;
s3, setting operation authorities corresponding to the identity marks, wherein the operation authorities comprise whether the operation authorities can be displayed, modified and deleted;
and S4, executing the operable items corresponding to the content blocks by using the set operation authority, wherein the operable items comprise display block contents, modification block contents and deletion blocks.
2. The method of claim 1, wherein the method further comprises:
allocating content identifications respectively corresponding to the content blocks;
and setting the control authority corresponding to the content identifier, or setting the content identifier without corresponding control authority, wherein the control authority comprises whether the content identifier can be displayed, whether the content identifier can be modified and whether the content identifier can be deleted.
3. The method of claim 2, wherein the step S4 further comprises:
judging whether the content identification corresponding to the content block sets a control authority or not, and executing the operable item corresponding to the content block according to the operation authority when the content identification corresponding to the content block is judged not to set the control authority;
when the content identification corresponding to the content block is judged to be set with the control authority, whether the control authority is consistent with the set value of the operation authority is further judged, and when the control authority is judged to be consistent with the set value of the operation authority, the operable item corresponding to the content block is executed according to the operation authority;
and when the control authority is judged to be inconsistent with the set value of the operation authority, the content block is not permitted to execute the corresponding operable item.
4. The method of claim 1, wherein the method further comprises:
s5, receiving an operable item application of the corresponding content block;
s6, feeding back the operable item application to the client according to the identity corresponding to the content block;
and S7, temporarily modifying the operation authority corresponding to the identity according to the application of the operable item.
5. The method of claim 4, wherein the step S6 further comprises feeding back initiator information of the actionable item application to the client.
6. The method of claim 4, wherein the method further comprises:
and S8, feeding back the corresponding executable operable item information to the client in real time according to the identity corresponding to the content block.
7. An identity control-based shared document information collection system, comprising:
the first identification management module is used for configuring content identifications respectively corresponding to the content blocks;
the second identification management module is used for configuring unique identity identifications corresponding to the clients;
the first authority management module is used for setting the control authority corresponding to the content identification;
the second authority management module is used for setting the operation authority corresponding to the identity;
and the execution module is used for executing the operable items corresponding to the content blocks according to the set control authority and the set operation authority.
8. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 6.
9. An electronic device comprising a processor and a memory;
the memory is used for storing the identity identification and the content identification;
the processor is configured to execute the method of any one of claims 1 to 6 by invoking an identity and a content identity.
10. A computer program product comprising a computer program and/or instructions, characterized in that the computer program and/or instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 6.
CN202211548711.3A 2022-12-05 2022-12-05 Shared document information collection method and system based on identity control Pending CN115840963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211548711.3A CN115840963A (en) 2022-12-05 2022-12-05 Shared document information collection method and system based on identity control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211548711.3A CN115840963A (en) 2022-12-05 2022-12-05 Shared document information collection method and system based on identity control

Publications (1)

Publication Number Publication Date
CN115840963A true CN115840963A (en) 2023-03-24

Family

ID=85578040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211548711.3A Pending CN115840963A (en) 2022-12-05 2022-12-05 Shared document information collection method and system based on identity control

Country Status (1)

Country Link
CN (1) CN115840963A (en)

Similar Documents

Publication Publication Date Title
US20200403981A1 (en) Method and System for Digital Rights Management of Documents
US7568005B2 (en) Enhanced application behavior in the presence of application sharing
US8087060B2 (en) Chaining information card selectors
MXPA04001931A (en) Method to initiate server based collaboration on e-mail attachments.
US10831697B2 (en) Board portal subsidiary management system, method, and computer program product
US11128717B2 (en) Private editing of shared files
US10095482B2 (en) Systems, methods, and media for graphical task creation
CN107087009A (en) A kind of realization method and system of collaborative share
CN101477658B (en) Method, apparatus and system for establishing combined document
JP7154842B2 (en) Permission management for cloud-based documents
US10956868B1 (en) Virtual reality collaborative workspace that is dynamically generated from a digital asset management workflow
CN113177190A (en) Document content sharing method and electronic equipment
CN116756711A (en) Data processing method, device, equipment and medium
CN113344522A (en) Supervision and management method and device of project management system
US20130205229A1 (en) Systems, methods and interfaces for using a messaging program across a multiple applications and communications environment
CN115840963A (en) Shared document information collection method and system based on identity control
US20090177755A1 (en) Script serving apparatus and method
JP2020522054A (en) Data distribution type integrated management system
US20090272797A1 (en) Dynamic information card rendering
CN113641360A (en) Method, device and equipment for configuring system front end and storage medium
JP2002109450A (en) Electronic form supply device, electronic form utilization device and storage medium
JP2002342286A (en) Electronic information management system and server and client
CN115310108A (en) Electronic document sharing control method and system based on data extraction
CN113344517A (en) Problem management method and device of project management system
CN113344520A (en) Investigation management method and device of project management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination