WO2022073418A1 - 权限控制方法、装置和电子设备 - Google Patents

权限控制方法、装置和电子设备 Download PDF

Info

Publication number
WO2022073418A1
WO2022073418A1 PCT/CN2021/119688 CN2021119688W WO2022073418A1 WO 2022073418 A1 WO2022073418 A1 WO 2022073418A1 CN 2021119688 W CN2021119688 W CN 2021119688W WO 2022073418 A1 WO2022073418 A1 WO 2022073418A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
reader
document
subdocument
user
Prior art date
Application number
PCT/CN2021/119688
Other languages
English (en)
French (fr)
Inventor
陈伟
陈学家
Original Assignee
北京字跳网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京字跳网络技术有限公司 filed Critical 北京字跳网络技术有限公司
Publication of WO2022073418A1 publication Critical patent/WO2022073418A1/zh
Priority to US17/877,692 priority Critical patent/US20220374538A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9558Details of hyperlinks; Management of linked annotations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/031Protect user input by software means

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to an authority control method, device and electronic device.
  • online documents may be used in the process of users' office work (online documents can enable multiple users to read, change, etc. on documents at the same time).
  • the publisher of the online document can authorize the user; that is, some users can be granted the right to edit the online document, and some users only have the right to read the online document.
  • Users who have editing rights to the online document may add some content to the online document when reading the online document, such as adding some explanatory content. If these explanatory content is directly added to the online document, the It may not be compatible with the online documentation, so a link to the explanatory content can be placed in the online documentation, ie, the user can click on the link and see the explanatory content.
  • Embodiments of the present disclosure provide an authority control method, apparatus, and electronic device, which can distinguish subdocument links that have not been shared from subdocument links that have been shared, so as to facilitate users to share subdocument links that are shared.
  • an embodiment of the present disclosure provides an authority control method, including: in response to determining that a document includes a target subdocument link, displaying first prompt information associated with the target subdocument link, wherein the above target subdocument link
  • the indicated target sub-document opens a first user right to at least one reader of the above-mentioned document; based on the operation on the above-mentioned first prompt information, the target reader among the above-mentioned at least one reader is determined, and the above-mentioned target reader is related to the above-mentioned target reader.
  • the above-mentioned first user authority of the target subdocument is changed to the second user authority.
  • an embodiment of the present disclosure provides an authority control apparatus, including: a display unit, configured to display first prompt information associated with the target subdocument link in response to determining that the document includes a target subdocument link, wherein: The target subdocument indicated by the above-mentioned target subdocument link opens the first user authority to at least one reader of the above-mentioned document; the modifying unit is configured to determine the target reader in the above-mentioned at least one reader based on the operation for the above-mentioned first prompt information , and changing the first user right of the target reader on the target subdocument to a second user right.
  • embodiments of the present disclosure provide an electronic device, including: one or more processors; and a storage device for storing one or more programs, when the one or more programs are processed by the one or more programs.
  • the above-mentioned one or more processors implement the above-mentioned permission control method according to the first aspect.
  • an embodiment of the present disclosure provides a computer-readable medium on which a computer program is stored, and when the program is executed by a processor, implements the steps of the permission control method described in the first aspect.
  • the authority control method, device and electronic device provided by the embodiments of the present disclosure can prompt the user that the target subdocument needs to be shared through the first prompt information, so that the reader of the document can have the second user authority of the target subdocument.
  • the user that is, can be understood as making the reader who reads the document, have access to the target subdocument.
  • By actively prompting the reader of the document to open the second user authority of the target subdocument it can reduce the probability that the reader who has the first user authority of the target subdocument sends an authorization request during the process of reading the document, and can also reduce the probability of sending an authorization request.
  • the consumption of communication resources can improve the user's speed of reading documents, and can improve the user's information acquisition efficiency.
  • the user can be reminded that the target sub-document needs to be shared through the first prompt information, so that the reader of the document can read the document without sending an authorization request to realize the document. read. Therefore, the operation of the document reader to send the document authorization request can be reduced, the consumption of communication resources can also be reduced, the speed of reading the document can be improved, and the information acquisition efficiency of the user can be improved.
  • FIG. 1 is a flowchart of an embodiment of a permission control method according to the present disclosure
  • FIGS. 2A and 2B are schematic diagrams of a document display interface according to an embodiment of the permission control method of the present disclosure
  • FIG. 3 is a schematic diagram of a document display interface according to another embodiment of the permission control method of the present disclosure.
  • FIG. 4 is a schematic diagram of a document display interface according to yet another embodiment of the authority control method of the present disclosure.
  • 5A and 5B are schematic diagrams of a document display interface according to still another embodiment of the permission control method of the present disclosure.
  • FIG. 6 is a flowchart of another embodiment of a permission control method according to the present disclosure.
  • FIG. 7 is a schematic diagram of a document display interface according to yet another embodiment of the authority control method of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an embodiment of an authority control apparatus according to the present disclosure.
  • FIG. 9 is an exemplary system architecture to which the permission control method of an embodiment of the present disclosure can be applied.
  • FIG. 10 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
  • the term “including” and variations thereof are open-ended inclusions, ie, "including but not limited to”.
  • the term “based on” is “based at least in part on.”
  • the term “one embodiment” means “at least one embodiment”; the term “another embodiment” means “at least one additional embodiment”; the term “some embodiments” means “at least some embodiments”. Relevant definitions of other terms will be given in the description below.
  • FIG. 1 shows a flow of an embodiment of a permission control method according to the present disclosure.
  • the permission control method can be applied to terminal devices.
  • the access control method includes the following steps:
  • Step 101 in response to determining that the document includes a target subdocument link, displaying first prompt information associated with the target subdocument link.
  • the target subdocument indicated by the target subdocument link opens the first user right to at least one reader of the document.
  • the target subdocument is open to readers with the first user authority (the reader here refers to the reader of the document), and cannot access, edit, share, copy, etc. one or more of the target subdocument. operate.
  • at least one reader can access the document, but not the target subdocument.
  • a document can be understood as an online document.
  • the creator of the document can open some permissions (eg, access permissions, editing permissions, sharing permissions, etc.) to some users, and these have relevant permissions to the document
  • the user of the document can be understood as the reader of the document.
  • target subdocument link can be understood as a link to other online documents.
  • Step 102 Determine a target reader among at least one reader based on the operation on the first prompt information, and change the target reader's first user authority on the target subdocument to a second user authority.
  • a reader whose target subdocument has opened the second user authority can perform one or more operations of accessing, editing, sharing, copying, and the like on the target subdocument.
  • a reader whose target subdocument has opened the second user authority can access the document and can also access the target subdocument.
  • a target reader among at least one reader can access the document and also the target subdocument, while a non-target reader among the at least one reader can only access the document but not the target subdocument.
  • the above-mentioned readers may all refer to user accounts that have access capability to the document.
  • a user who is capable of editing and forwarding a document may also be referred to as a reader of the document.
  • the first prompt message can be displayed to remind the user who is currently browsing the document, the document At least one reader of 's does not yet have access to the target subdocument.
  • the user can determine the target reader among the at least one reader of the document by triggering the first prompt message, and open the second user authority for the target sub-document to the target reader, so that the target reader in the at least one reader The reader has access to the target subdocument. In this way, the sharing efficiency of the target sub-document can be improved, that is, the reader of the document can be enabled to access the target sub-document added later.
  • the user since the document is an online document, the user may be required to log in to a login account that matches the user before reading the document. That is, when the creator of the document needs to open the second user authority about the document to some users, he only needs to select the login accounts of these users and associate the online document with the login account.
  • the user corresponding to the selected login account can be understood as the reader of the document. In this way, some users (readers of the document) can access the document, while other users cannot access the document.
  • readers of some documents may only have a reading function for the document, while readers of some documents may have an editing function for the document.
  • a user with editing functions for a document when a user with editing functions for a document is reading the document, he may feel that a certain part of the document is not fully explained, or that some part of the document needs to be explained. Make edits (eg, add some content).
  • the user who has the editing function for the document can create another online document to record the content that needs to be added to the document, and can add the link of the created online document to the document.
  • a user with editing functions for a document may know some online documents that can be used to explain the document, so that links to these online documents can also be added to the document; and the links added to the document can be understood as sub-document links.
  • the creator of the document can open different permissions for different accounts when creating the document, so that the readers of some documents can only read the document, while the users of some documents can edit the document. .
  • each sub-document link may correspond to a sub-document, and the sub-document may also be an online document. Therefore, each sub-document may also open a second user right to some users.
  • the reader of the document may be different from the user who has opened the second user right of the sub-document.
  • the first user right of the target sub-document may be opened by default for the readers of these documents. Readers of this part of the document cannot access the target subdocument.
  • an example is given:
  • the target subdocument any subdocument link in the document that needs to be shared can be understood as a target subdocument link, and the document indicated by the target subdocument link can be understood as a target subdocument
  • users who open the second user authority may Only include: Little A, Little B, Little C, Little Wang.
  • the users who have opened the second user authority of the target subdocument do not cover the readers of the document (because Xiao D and Xiao E do not have the second user authority of the target subdocument, that is, the target subdocument does not have Xiao D and Xiao E opened. E's second user right), at this time, the first prompt information associated with the target subdocument link can be generated and displayed.
  • the target subdocument when the target subdocument is added to the document, all readers of the document will be granted the first user authority on the target subdocument by default. Since the target subdocument is also an online document, the target subdocument may have Some users open the second user authority. Further, users who have opened the second user authority of the target subdocument can be compared with the readers of the document (here, the user account can be used for comparison), and the same user can be opened with the second user authority. That is, if the target subdocument opens the second user right to users who cannot cover the readers of the document, the document readers who are not covered (which can be understood as at least one reader) can be understood as being only opened about the target subdocument. First user rights. At this time, the first prompt information may be displayed to prompt that the target sub-document needs to be shared.
  • the display position of the first prompt information may correspond to the target sub-document link, for example, it is displayed to the right of the sub-document link.
  • the specific display position of the first prompt information is not limited here, and it only needs to be reasonably set according to the actual situation, for example, it can also be displayed on the left, above, and below the link of the sub-document.
  • the first prompt information may be used to prompt some readers of the document that they do not have the second user right to the sub-document.
  • the target subdocument does not open the second user right to at least one reader of the document.
  • the first prompt information may be 'text information' or 'identification information' or the like.
  • the content of the 'text information' may be 'to be shared', that is, as shown in FIG. 2A .
  • the shape of the 'identification information' may be a circular mark, as shown in FIG. 2B . It should be noted that this is only an example, and in the specific implementation manner, the content of the 'text information' and the shape of the 'identification information' can be set according to specific conditions, which are not limited here.
  • the first prompt information may also be in other forms, for example, the reader identification of the reader who does not have the second user authority to the target subdocument may also be directly displayed.
  • the first prompt information is only used to remind the user that the target sub-document has not been shared, and the specific form of the first prompt information can be limited according to the actual situation, and the specific form of the first prompt information is not limited here. .
  • the first prompt information associated with the link to the target subdocument when the first prompt information associated with the link to the target subdocument is displayed, it may indicate that the number of users who have the second user right to the target subdocument needs to be increased.
  • the user when the first prompt information is 'identification information', the user can click on the 'identification information', so that the display interface can display the reading of the reader who has opened the first user authority of the target subdocument user ID.
  • the reader IDs of the small D and the small E can be displayed, and the user can select the displayed reader IDs (for example, you can click the check box on the right side of the small D and the small E, and the small D and the small E can be checked. Selected), so that the selected reader ID can be linked with the target sub-document link, in other words, the reader corresponding to the selected reader ID can be opened with the second user authority.
  • the first user authority of Xiao D on the target subdocument can be changed to the second user authority.
  • the number of users who have the second user right to the target subdocument is increased.
  • the user can be prompted that the target subdocument needs to be shared, so that the reader of the document can have the second user authority of the target subdocument, that is, can It is understood that readers who read the document can access the target subdocument.
  • By actively prompting the reader of the document to open the second user authority of the target subdocument it can reduce the probability that the reader who has the first user authority of the target subdocument sends an authorization request during the process of reading the document, and can also reduce the probability of sending an authorization request.
  • the consumption of communication resources can improve the user's speed of reading documents, and can improve the user's information acquisition efficiency.
  • the subdocument link addition operation in response to detecting the subdocument link addition operation in the document, it is determined whether the subdocument link added by the subdocument link addition operation is the target subdocument link.
  • readers of certain documents may edit the document, ie, these readers may perform an add sub-document link operation to add sub-document links into the document.
  • the sub-document link adding operation can be understood as a copy-paste operation.
  • a reader of some documents can copy the sub-document link first, and then paste it into the document.
  • the subdocument link added by the subdocument link adding operation when the subdocument link added by the subdocument link adding operation is a target subdocument link, it can be represented that the added subdocument is a subdocument that needs to be shared, and at this time, the first prompt information can be displayed.
  • the first prompt information may include a reader identifier of a reader whose target subdocument has opened the first user right.
  • the target subdocument in response to determining that the added subdocument link is a target subdocument link, the target subdocument may be directly displayed. The reader ID of the reader whose document has opened the first user right.
  • the user can be more intuitively reminded to share the target subdocument, thereby further prompting the efficiency of the target subdocument being shared.
  • the readers of the document include: Xiao A, Xiao B, Xiao C, Xiao D, Xiao E
  • the users who have the second user authority on the target subdocument include: Xiao A, Xiao B, Xiao C, Xiao Wang, this , the users who have the second user right to the target subdocument do not cover the users who have the second user right to the document (does not cover small D and small E), in other words, it can be understood that the target subdocument has the Open the first user authority, therefore, the account IDs of Xiao D and Xiao E can be directly displayed at this time, as shown in Figure 3.
  • the reader ID of the reader who has opened the first user authority of the target subdocument can be displayed immediately, so that the document can be easily edited.
  • the readers who open the first user authority to these target subdocuments open the second user authority about the target subdocument (here can be understood as changing this part of the readers from opening the first user authority to opening the second user authority User rights).
  • the readers who have the editing function for the document can immediately increase the number of readers who have the second user right to the target sub-document.
  • the user can be immediately prompted to share the target subdocument, and there is no need for some users who only have the first user authority to the target subdocument to read the document with the editing function.
  • the user sends an authorization request, thereby further improving the information acquisition efficiency of the user.
  • the first prompt information includes a trigger control, and in response to detecting a trigger operation for the trigger control, a reader identifier of a reader whose target subdocument has opened the first user right may be displayed.
  • the first prompt information may be as shown in FIG. 2A or FIG. 2B
  • the trigger control may be set at the first prompt information, that is, when the reader with the editing function of the document executes the first prompt information
  • the display interface may display the reader ID of the reader whose target subdocument has the first user authority opened, as shown in FIG. 3 .
  • the document may have multiple readers with editing functions.
  • the following uses editors to represent readers with editing functions.
  • an editor of the document Editor A
  • editor A can display the screen shown in Figure 3 after adding the target subdocument link, that is, can directly display
  • the target subdocument opens the second user right of the target subdocument to the readers indicated by the two reader identifiers. If editor A may only open the second user authority for the target subdocument to Xiao D, but does not open the second user authority for the target subdocument to Xiao E, then another editor of the document (Editor B) In the process document, when browsing to the link of the target sub-document, the screen shown in FIG. 2A or FIG.
  • FIG. 2B can be displayed.
  • editor B can trigger the first prompt information in FIG. 2A or FIG. 2B. operation (for example: click, long press, etc.), so that the interface can display the screen shown in Figure 4, that is, the reader ID of the reader who has opened the first user authority of the target subdocument at this time (at this time, Only small E) is shown.
  • editor A after editor A adds the link to the target subdocument, editor A opens the second user right of the target subdocument to all readers. However, the creator of the document may have added some readers later, for example, Xiaohong and Xiaoli. At this time, Xiaohong and Xiaoli may not have opened the second user authority about the target subdocument, and may need to open the second user authority about the target subdocument to Xiaohong and Xiaoli. That is, at this time, when editor B is in the process document and browses to the link of the target sub-document, the link of the target sub-document will also display the first prompt information.
  • the editor of the document when the editor of the document reads the document, the editor of the document can perform a trigger operation on the trigger control, thereby displaying the reader ID of the reader whose target subdocument has opened the first user authority, And through the selection operation to the reader identification, the target reader is selected, and the first user authority of the target reader is changed to the second user authority, so that the reader of the document can quickly obtain information about the target subdocument.
  • the second user authority in other words, improves the efficiency with which the target subdocument is shared.
  • step 102 (determining a target reader among the at least one reader based on the operation on the first prompt information) may specifically include:
  • the reader indicated by the selected reader identification is determined as the target reader.
  • the reader indicated by the displayed reader ID is a reader for which the target sub-document has the first user right.
  • the editor of the document when the editor of the document reads the document, it may not be clear whether all the displayed reader IDs need to be granted the second user right for the target subdocument. Therefore, the editor of the document may only select one of the sub-documents.
  • the reader ID that needs to be granted the second user authority, and the selected reader ID can be understood as the target reader ID.
  • the reader indicated by the target reader identifier can be understood as the target reader, so that the second user authority of the target sub-document can be opened to the target reader.
  • the user can also open the second user authority about the target subdocument to multiple document readers at one time, that is, the efficiency of opening the second user authority about the target subdocument to the document readers can be further improved .
  • the first prompt information includes a select-all control, and in this case, in response to detecting a triggering operation for the select-all control, all readers indicated by the displayed reader identification are determined as target readers.
  • the efficiency of opening the second user right of the target subdocument to the reader of the document can be further improved. That is, the user can open the second user right of the target subdocument to the reader of the document at one time.
  • the second user authority includes at least one sub-second user authority.
  • the second user authority may include a reading function for the target subdocument, an editing function for the target subdocument, etc., while the target subdocument has an editing function, etc. Having the reading function can be understood as a sub-second user right, and having the editing function on the target sub-document can also be understood as another sub-second user right.
  • step 102 (determining a target reader among at least one reader based on the operation on the first prompt information, and changing the target reader's first user authority for the target subdocument to a second user authority) Specifically, it can be:
  • the reader identification corresponding to the second user authority identification; the reader indicated by the reader identification corresponding to the target sub-second user authority identification is determined as the target reader, and the target reader's first user authority about the target subdocument is determined. Change to the target child second user permission.
  • the sub-second user authority identifier is associated with the reader identifier used to indicate the reader. That is, for each reader identification, there may be a corresponding sub-second user authority identification.
  • the sub-second user authority identification can be displayed at the corresponding position where the reader identification is displayed, and the user can perform a selection operation on the sub-second user authority identification to open each reader's sub-section for the target sub-document.
  • the sub-second user authority identification can be displayed (the second user authority identification includes: 'editing authority identification' 501 (a certain sub-second user authority identification) and 'reading authority identification' 502 (another sub-second user authority identification) Two user authority identifiers)), if the editor of the document needs to open the editing authority for the target subdocument to a certain reader, the selection operation can be performed on the 'editing authority identifier' 501.
  • the editor of the document can also open at least one reader with different sub-second user rights about the target sub-document. Open editing permissions on the target subdocument. In this way, the editor of the document can set different sub-second user rights for different readers in advance, so that the reader of the document will not send authorization to the editor of the document when reading the document. ask.
  • the editor of the document may also first determine a part of the readers as target readers (readers who need to open the same sub-second user authority about the target sub-document), if the sub-second user is open to this part of the readers If the user rights are the same, the sub-second user rights for the target sub-document can be opened to these readers at the same time. That is, as shown in FIG.
  • small D, small F and small K can be target readers, that is, the editor of the document can first select small D, small F and small K, and then the interface can display 'Edit The permission identifier '501' and the 'reading permission marker' 502, if the editor of the document performs a selection operation on the 'reading permission marker' 502, the reading permission on the target subdocument can be opened for the small D, the small F and the small K at the same time.
  • both the 'editing authority identification' 501 and the 'reading authority identification' 502 may represent the sub-second user authority identification.
  • the target sub-second user authority on the target sub-document can be opened to the reader indicated by the reader identifier.
  • the technical solution provided by the present application not only simplifies the way of opening the sub-second user rights to readers, but also allows each reader to open a specific sub-second user authority separately.
  • a sub-second user authority (reading authority or editing authority), and specific sub-second user authority can also be opened for multiple readers. That is, the efficiency of opening the rights of the sub-second user is improved.
  • the document display interface may include viewing controls, and the permission control method may further include steps 601 to 603 , and the specific implementation details of steps 601 and 602 are at steps 101 and 102 It has been described in detail, and for the sake of brevity of the specification, it will not be repeated here.
  • Step 603 in response to detecting a triggering operation for the viewing control, displaying a list of subdocument links.
  • the list of subdocument links is generated from the subdocument links in the document.
  • the sub-document link list may include all sub-document links in the document, that is, all sub-document links added to the document may be displayed in the sub-document link list.
  • the editor of the document can view all subdocument links added to the document by triggering the view control.
  • second prompt information associated with the target subdocument link is displayed.
  • multiple subdocument links may be added to the document, and some subdocument links indicated by some subdocument links may already be shared, and some subdocument links indicated by some subdocument links may still need to be shared (target The target subdocument indicated by the subdocument link needs to be shared), and in order to facilitate the user to view the sharing status of each subdocument link, the view control can be displayed on the display interface, and the subdocument can be displayed when the trigger operation for the view control is detected.
  • the link list is shown in Figure 7, and the sub-document link list includes all sub-document links added to the document. That is, the second hint information may be displayed for the target sub-document link, and the second hint information may be used to indicate the sub-document link that has not been shared (as shown in FIG. 7 ).
  • the editor of the document can be made to know the sharing status of each sub-document link more clearly, and the editor of the document can be reminded that there is no sub-document to be shared. That is, the efficiency of sharing the target subdocument can be further accelerated.
  • the currently logged-in account is an account that has sharing rights to the document.
  • the sub-document link can be added to the document.
  • the subdocument indicated by the document link opens the second user right. That is, the display interface can display the above-mentioned first prompt information, the above-mentioned second prompt information, etc. only if the currently logged-in account is an account with sharing rights to the document (which can be understood as the editor of the document).
  • the present disclosure provides an embodiment of an authority control apparatus.
  • the apparatus embodiment corresponds to the authority control method embodiment shown in FIG. 1 .
  • the apparatus Specifically, it can be applied to various electronic devices.
  • the authority control apparatus of this embodiment includes: a presentation unit 801, configured to, in response to determining that the document includes a target subdocument link, present first prompt information associated with the target subdocument link, wherein the above target subdocument link is displayed.
  • the target subdocument indicated by the subdocument link opens the first user right to at least one reader of the above-mentioned document;
  • the modifying unit 802 is configured to determine the target reader in the above-mentioned at least one reader based on the operation for the above-mentioned first prompt information, and changing the first user right of the target reader on the target sub-document to a second user right.
  • the above-mentioned authority control apparatus further includes: a first determining unit 803, configured to, in response to detecting an operation of adding a sub-document link in the above-mentioned document, determine whether the sub-document link added by the above-mentioned sub-document link adding operation is a sub-document link added by the above-mentioned sub-document link adding operation Target subdocument link.
  • a first determining unit 803 configured to, in response to detecting an operation of adding a sub-document link in the above-mentioned document, determine whether the sub-document link added by the above-mentioned sub-document link adding operation is a sub-document link added by the above-mentioned sub-document link adding operation Target subdocument link.
  • the above-mentioned first prompt information includes a reader identifier of a reader whose target sub-document has opened the first user authority
  • the above-mentioned authority control apparatus further includes: a second determining unit 804, configured to respond to determining the added sub-document The document link is a target sub-document link, and displays the reader ID of the reader whose target sub-document has opened the first user authority.
  • the above-mentioned first prompt information includes a trigger control; the above-mentioned permission control apparatus further includes: a trigger unit 805, configured to, in response to detecting a trigger operation for the above-mentioned trigger control, display that the above-mentioned target sub-document opens the first user authority The reader ID of the reader.
  • the modifying unit 802 is further configured to, in response to detecting a selection operation for the displayed reader identification, determine the above-mentioned target reader for the reader indicated by the selected reader identification.
  • the above-mentioned first prompt information includes a select-all control; the modifying unit 802 is further configured to, in response to detecting a triggering operation for the above-mentioned select-all control, determine that the readers indicated by the displayed reader IDs are all target readers.
  • the above modification unit 802 is further configured to: display a sub-second user authority identifier used to indicate the sub-second user authority, wherein the sub-second user authority identifier and the reader identifier used to indicate the reader Associated; in response to detecting the selection operation for the sub-second user authority identification, determine the selected target sub-second user authority identification, and determine the reader identification corresponding to the above-mentioned target sub-second user authority identification; The reader indicated by the reader identification corresponding to the target sub-second user authority identification is determined as the target reader, and the first user authority of the target reader on the target sub-document is changed to the target sub-second user authority.
  • the document display interface includes a viewing control; the above-mentioned authority control apparatus further includes: a viewing unit 806, configured to display a sub-document link list in response to detecting a trigger operation for the above-mentioned viewing control, wherein the above-mentioned sub-document links The list is generated from the subdocument links in the above document.
  • the viewing unit 806 is further configured to, in response to determining that the target subdocument link is included in the subdocument link list, display second prompt information associated with the target subdocument link.
  • FIG. 9 shows an exemplary system architecture to which the permission control method according to an embodiment of the present disclosure can be applied.
  • the system architecture may include terminal devices 901 , 902 , and 903 , a network 904 , and a server 905 .
  • the network 904 may be the medium used to provide the communication link between the end devices 901 , 902 , 903 and the server 905 .
  • Network 904 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
  • the terminal devices 901, 902, 903 can interact with the server 905 through the network 904 to receive or send messages and the like.
  • Various client applications may be installed on the terminal devices 901 , 902 and 903 , such as web browser applications, search applications, and news information applications.
  • the client applications in the terminal devices 901, 902, and 903 can receive the user's instruction, and perform corresponding functions according to the user's instruction, for example, adding corresponding information to the information according to the user's instruction.
  • the terminal devices 901, 902, and 903 may be hardware or software.
  • the terminal devices 901, 902, and 903 can be various electronic devices that have a display screen and support web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, Moving Picture Experts Compression Standard Audio Layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, Moving Picture Experts Compression Standard Audio Layer 4) Players, Laptops and Desktops, etc.
  • the terminal devices 901, 902, and 903 are software, they can be installed in the electronic devices listed above. It can be implemented as a plurality of software or software modules (eg, software or software modules for providing distributed services), or can be implemented as a single software or software module. There is no specific limitation here.
  • the server 905 may be a server that provides various services, such as receiving information acquisition requests sent by the terminal devices 901, 902, and 903, and acquiring display information corresponding to the information acquisition requests in various ways according to the information acquisition requests. And the relevant data of the displayed information is sent to the terminal devices 901 , 902 and 903 .
  • the information processing method provided by the embodiments of the present disclosure may be executed by a terminal device, and correspondingly, the authority control apparatus may be set in the terminal devices 901 , 902 , and 903 .
  • the information processing method provided by the embodiments of the present disclosure may also be executed by the server 905 , and accordingly, the information processing apparatus may be provided in the server 905 .
  • terminal devices, networks and servers in Fig. 9 are merely illustrative. There can be any number of terminal devices, networks and servers according to implementation needs.
  • FIG. 10 it shows a schematic structural diagram of an electronic device (eg, a terminal device or a server in FIG. 9 ) suitable for implementing an embodiment of the present disclosure.
  • Terminal devices in the embodiments of the present disclosure may include, but are not limited to, such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablets), PMPs (portable multimedia players), vehicle-mounted terminals (eg, mobile terminals such as in-vehicle navigation terminals), etc., and stationary terminals such as digital TVs, desktop computers, and the like.
  • the electronic device shown in FIG. 10 is only an example, and should not impose any limitation on the function and scope of use of the embodiments of the present disclosure.
  • the electronic device may include a processing device (eg, a central processing unit, a graphics processor, etc.) 1001, which may be loaded into a random access memory according to a program stored in a read only memory (ROM) 1002 or from a storage device 908
  • the program in (RAM) 1003 executes various appropriate operations and processes.
  • various programs and data required for the operation of the electronic device 1000 are also stored.
  • the processing device 1001, the ROM 1002, and the RAM 1003 are connected to each other through a bus 1004.
  • An input/output (I/O) interface 1005 is also connected to the bus 1004 .
  • I/O interface 1005 input devices 1006 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, a liquid crystal display (LCD), speakers, vibration
  • An output device 1007 such as a computer
  • a storage device 1008 including, for example, a magnetic tape, a hard disk, etc.
  • Communication means 1009 may allow electronic devices to communicate wirelessly or by wire with other devices to exchange data. While FIG. 10 illustrates an electronic device having various means, it should be understood that not all of the illustrated means are required to be implemented or available. More or fewer devices may alternatively be implemented or provided.
  • embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated in the flowchart.
  • the computer program may be downloaded and installed from the network via the communication device 1009 , or from the storage device 1008 , or from the ROM 1002 .
  • the processing apparatus 1001 the above-mentioned functions defined in the methods of the embodiments of the present disclosure are executed.
  • the computer-readable medium mentioned above in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the above two.
  • the computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. More specific examples of computer readable storage media may include, but are not limited to, electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), fiber optics, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the foregoing.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device .
  • Program code embodied on a computer readable medium may be transmitted using any suitable medium including, but not limited to, electrical wire, optical fiber cable, RF (radio frequency), etc., or any suitable combination of the foregoing.
  • clients and servers can communicate using any currently known or future developed network protocols such as HTTP (HyperText Transfer Protocol), and can communicate with digital data in any form or medium.
  • Communication eg, a communication network
  • Examples of communication networks include local area networks (“LAN”), wide area networks (“WAN”), the Internet (eg, the Internet), and peer-to-peer networks (eg, ad hoc peer-to-peer networks), as well as any currently known or future development network of.
  • the above-mentioned computer-readable medium may be included in the above-mentioned electronic device; or may exist alone without being assembled into the electronic device.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the electronic device, the electronic device: in response to determining that the document includes a link to the target sub-document, displaying a link to the above-mentioned target sub-document Associated first prompt information, wherein the target subdocument indicated by the target subdocument link opens a first user right to at least one reader of the document; based on the operation on the first prompt information, determine the at least one reader and change the first user authority of the target reader with respect to the target subdocument to a second user authority.
  • Computer program code for performing operations of the present disclosure may be written in one or more programming languages, including but not limited to object-oriented programming languages—such as Java, Smalltalk, C++, and This includes conventional procedural programming languages - such as the "C" language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through Internet connection).
  • LAN local area network
  • WAN wide area network
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions.
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented in dedicated hardware-based systems that perform the specified functions or operations , or can be implemented in a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments of the present disclosure may be implemented in a software manner, and may also be implemented in a hardware manner.
  • the name of the unit does not constitute a limitation of the unit itself in some cases, for example, the display unit 801 may also be described as "a unit that displays the first prompt information associated with the target subdocument link".
  • exemplary types of hardware logic components include: Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), Systems on Chips (SOCs), Complex Programmable Logical Devices (CPLDs) and more.
  • FPGAs Field Programmable Gate Arrays
  • ASICs Application Specific Integrated Circuits
  • ASSPs Application Specific Standard Products
  • SOCs Systems on Chips
  • CPLDs Complex Programmable Logical Devices
  • a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with the instruction execution system, apparatus or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices, or devices, or any suitable combination of the foregoing.
  • machine-readable storage media would include one or more wire-based electrical connections, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), fiber optics, compact disk read only memory (CD-ROM), optical storage, magnetic storage, or any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read only memory
  • EPROM or flash memory erasable programmable read only memory
  • CD-ROM compact disk read only memory
  • magnetic storage or any suitable combination of the foregoing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开实施例公开了的权限控制方法、装置和电子设备,当文档的阅读者中若存在至少一个阅读者被目标子文档开放第一用户权限,则可以展示第一提示信息,以提示当前正在浏览文档的用户,文档的至少一个阅读者还不能对目标子文档进行访问。而用户此时可以通过触发第一提示信息,确定文档的至少一个阅读者中的目标阅读者,并对目标阅读者开放针对目标子文档的第二用户权限,以使至少一个阅读者中的目标阅读者具备对目标子文档的访问能力。而通过这种方式,则可以提升目标子文档被共享的效率,也即,可以使得文档的阅读者,可以实现对后期加入的目标子文档的访问。

Description

权限控制方法、装置和电子设备
相关申请的交叉引用
本申请要求于2020年10月10日提交的,申请号为202011081251.9、发明名称为“权限控制方法、装置和电子设备”的中国专利申请的优先权,该申请的全文通过引用结合在本申请中。
技术领域
本公开涉及互联网技术领域,尤其涉及一种权限控制方法、装置和电子设备。
背景技术
随着科学技术的发展,在用户办公的过程中,可能会使用在线文档(在线文档可以使多个用户同时对文档进行阅读、更改等)。而在线文档的发布者在对在线文档进行发布后,可以对用户进行授权;也即,可以授予部分用户对在线文档有编辑的权限,部分用户对在线文档仅有阅读的权限。而对在线文档有编辑权限的用户,在阅读在线文档时,可能会为在线文档增加一些内容,如:增加了一些解释性的内容,而这些解释性的内容若直接加在在线文档内,则可能与在线文档不相搭配,因此,可以将解释性的内容的链接放入在线文档中,也即,用户点击链接,即可看见解释性的内容。
发明内容
提供该公开内容部分以便以简要的形式介绍构思,这些构思将在后面的具体实施方式部分被详细描述。该公开内容部分并不旨在标识要求 保护的技术方案的关键特征或必要特征,也不旨在用于限制所要求的保护的技术方案的范围。
本公开实施例提供了一种权限控制方法、装置和电子设备,可以将未进行共享的子文档链接与已经共享完毕的子文档链接进行区分,从而便于用户对位共享的子文档链接进行共享。
第一方面,本公开实施例提供了一种权限控制方法,包括:响应于确定文档中包括目标子文档链接,展示与目标子文档链接相关联的第一提示信息,其中,上述目标子文档链接指示的目标子文档向上述文档的至少一个阅读者开放第一用户权限;基于针对上述第一提示信息的操作,确定上述至少一个阅读者中的目标阅读者,以及将上述目标阅读者关于所述目标子文档的上述第一用户权限变更为第二用户权限。
第二方面,本公开实施例提供了一种权限控制装置,包括:展示单元,用于响应于确定文档中包括目标子文档链接,展示与目标子文档链接相关联的第一提示信息,其中,上述目标子文档链接指示的目标子文档向上述文档的至少一个阅读者开放第一用户权限;修改单元,用于基于针对上述第一提示信息的操作,确定上述至少一个阅读者中的目标阅读者,以及将上述目标阅读者关于所述目标子文档的上述第一用户权限变更为第二用户权限。
第三方面,本公开实施例提供了一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当上述一个或多个程序被上述一个或多个处理器执行,使得上述一个或多个处理器实现如第一方面上述的权限控制方法。
第四方面,本公开实施例提供了一种计算机可读介质,其上存储有计算机程序,该程序被处理器执行时实现如第一方面上述的权限控制方法的步骤。
本公开实施例提供的权限控制方法、装置和电子设备,通过第一提示信息,可以提示用户该目标子文档需要进行共享,从而使得对文档的阅读者可以具备目标子文档的第二用户权限的用户,也即,可以理解为使得阅读文档的阅读者,可以访问目标子文档。而通过主动提示对文档的阅读者开放关于目标子文档的第二用户权限的方式,可以减少目标子文档开放第一用户权限的阅读者在阅读文档过程中,发送授权请求的概率,也可以减少通信资源的消耗,可以提升用户阅读文档的速度,并可以提高了用户的信息获取效率。
而在相关技术中,当对在线文档有编辑权限的用户为在线文档添加解释性文档的链接之后,当其它用户点击解释性文档的链接时,需要先向添加解释性文档的用户账户发请求,请求阅读该解释性文档,而仅有当添加解释性文档的用户同意授权之后,才能阅读解释性文档。
可以看出,在本申请中,通过第一提示信息,可以提示用户该目标子文档需要进行共享,从而使得文档的阅读者在阅读文档时,可以无需再发送授权请求,即可实现对文档的阅读。从而可以减少了文档阅读者发送文档授权请求的操作,也可以减少通信资源的消耗,并提升了阅读文档的速度,提高了用户的信息获取效率。
附图说明
结合附图并参考以下具体实施方式,本公开各实施例的上述和其他特征、优点及方面将变得更加明显。贯穿附图中,相同或相似的附图标记表示相同或相似的元素。应当理解附图是示意性的,原件和元素不一定按照比例绘制。
图1是根据本公开的权限控制方法的一个实施例的流程图;
图2A和图2B是根据本公开的权限控制方法的一个实施例的文档展示界面的示意图;
图3是根据本公开的权限控制方法的另一个实施例的文档展示界面的示意图;
图4是根据本公开的权限控制方法的又一个实施例的文档展示界面的示意图;
图5A和图5B是根据本公开的权限控制方法的又一个实施例的文档展示界面的示意图;
图6是根据本公开的权限控制方法的另一个实施例的流程图;
图7是根据本公开的权限控制方法的又一个实施例的文档展示界面的示意图;
图8是根据本公开的权限控制装置的一个实施例的结构示意图;
图9是本公开的一个实施例的权限控制方法可以应用于其中的示例性系统架构;
图10是根据本公开实施例提供的电子设备的基本结构的示意图。
具体实施方式
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。
应当理解,本公开的方法实施方式中记载的各个步骤可以按照不同的顺序执行,和/或并行执行。此外,方法实施方式可以包括附加的步骤和/或省略执行示出的步骤。本公开的范围在此方面不受限制。
本文使用的术语“包括”及其变形是开放性包括,即“包括但不限于”。术语“基于”是“至少部分地基于”。术语“一个实施例”表示“至少一个实施 例”;术语“另一实施例”表示“至少一个另外的实施例”;术语“一些实施例”表示“至少一些实施例”。其他术语的相关定义将在下文描述中给出。
需要注意,本公开中提及的“第一”、“第二”等概念仅用于对不同的装置、模块或单元进行区分,并非用于限定这些装置、模块或单元所执行的功能的顺序或者相互依存关系。
需要注意,本公开中提及的“一个”、“多个”的修饰是示意性而非限制性的,本领域技术人员应当理解,除非在上下文另有明确指出,否则应该理解为“一个或多个”。
本公开实施方式中的多个装置之间所交互的消息或者信息的名称仅用于说明性的目的,而并不是用于对这些消息或信息的范围进行限制。
请参考图1,其示出了根据本公开的权限控制方法的一个实施例的流程。该权限控制方法可以应用于终端设备。如图1所示该权限控制方法,包括以下步骤:
步骤101,响应于确定文档中包括目标子文档链接,展示与目标子文档链接相关联的第一提示信息。
在这里,目标子文档链接指示的目标子文档向文档的至少一个阅读者开放第一用户权限。
在这里,目标子文档开放第一用户权限的阅读者(这里的阅读者指代的是文档的阅读者),对目标子文档不能进行访问、编辑、分享、复制等中的一种或多种操作。作为示例,至少一个阅读者可以访问文档,而不能访问目标子文档。
在本实施例中,文档可以理解为在线文档,在创建文档时,文档的创建者可以对一些用户开放一些权限(如:访问权限、编辑权限、分享权限等),而这些对文档具有相关权限的用户则可以理解为文档的阅读者。
在这里,目标子文档链接可以理解为其它在线文档的链接。
步骤102,基于针对第一提示信息的操作,确定至少一个阅读者中的目标阅读者,以及将目标阅读者关于目标子文档的第一用户权限变更为第二用户权限。
在这里,目标子文档开放第二用户权限的阅读者可以对目标子文档进行访问、编辑、分享、复制等中的一种或多种操作。作为示例,目标子文档开放第二用户权限的阅读者可以访问文档,也可访问目标子文档。
在这里,至少一个阅读者中的目标阅读者可以访问文档,也可访问目标子文档,而至少一个阅读者中的非目标阅读者,则仅能访问文档,而不能访问目标子文档。
在本实施例中,上述阅读者均可以指代对文档具备访问能力的用户账号。作为示例,对文档具备编辑能力、转发能力的用户,也可以称为文档的阅读者。
根据步骤101-步骤102可以看出,当文档的阅读者中若存在至少一个阅读者被目标子文档开放第一用户权限,则可以展示第一提示信息,以提示当前正在浏览文档的用户,文档的至少一个阅读者还不能对目标子文档进行访问。而用户此时可以通过触发第一提示信息,确定文档的至少一个阅读者中的目标阅读者,并对目标阅读者开放针对目标子文档的第二用户权限,以使至少一个阅读者中的目标阅读者具备对目标子文档的访问能力。而通过这种方式,则可以提升目标子文档被共享的效率,也即,可以使得文档的阅读者,可以实现对后期加入的目标子文档的访问。
在一些实施例中,由于文档为在线文档,进而可能需要用户登录与自己匹配的登录账号之后才能阅读文档。也即,文档的创建者需要对某些用户开放关于文档的第二用户权限时,仅需将这些用户的登录账号选取出来,并将该在线文档与登录账号进行关联即可。在这里,选取出来的登录账号对应的用户,则可以理解为文档的阅读者。而通过这种方式,使得某 些用户(文档的阅读者)可以对文档实现访问,而其它用户无法对文档进行访问。
在一些实施例中,一些文档的阅读者可能仅对文档具备阅读功能,而某些文档的阅读者,可以对文档具备编辑功能。
作为示例,当对文档具备编辑功能的用户在阅读文档时,可能觉得文档的某处解释不够完善,或者觉得文档的某处需要进行解释,此时,对文档具备编辑功能的用户可能会对文档进行编辑(例如,加入一些内容)。而当需要加入的内容较多时,对文档具备编辑功能的用户可以另外创建一个在线文档记录这些需要加入至文档的内容,并可以将创建的这个在线文档的链接加入至文档内。又或者,对文档具备编辑功能的用户可能知道可以用于解释文档的一些在线文档,从而也可将这些在线文档的链接添加至文档内;而加入至文档内的链接可以理解为子文档链接。
在这里,文档的创建者在创建文档时,可以针对不同的账户开放不同的权限,从而可以使得某些文档的阅读者仅能对文档具备阅读功能,而某些文档的用户对文档具备编辑功能。
在一些实施例中,每个子文档链接可以对应一个子文档,而子文档也可以是在线文档,因此,每个子文档也可以对一些用户开放第二用户权限。
在这里,文档的阅读者与子文档开放第二用户权限的用户可能不同。作为示例,文档的阅读者中不具备子文档开放第二用户权限的用户,则可以为这些文档的阅读者默认开放目标子文档的第一用户权限。而这部分文档的阅读者,则无法访问目标子文档。为了便于理解,进行举例说明:
当文档的阅读者包括小A、小B、小C、小D、小E。而目标子文档(在文档中的任一需要进行共享子文档链接均可以理解为目标子文档链接,而目标子文档链接所指示的文档可以理解为目标子文档)开放第二用户权限的用户可能仅包括:小A、小B、小C、小王。此时,目标子文档 开放第二用户权限的用户没有涵盖文档的阅读者(因为,小D和小E不具备目标子文档的第二用户权限,也即,目标子文档没有开放小D和小E的第二用户权限),此时,则可以生成并展示与目标子文档链接相关联的第一提示信息。
作为示例,当将目标子文档加入至文档内时,默认为文档的所有阅读者开放关于目标子文档的第一用户权限,而由于目标子文档也为在线文档,可能目标子文档之前已经对某些用户开放第二用户权限。进而可以将目标子文档开放第二用户权限的用户与文档的阅读者进行对比(在这里,可以利用用户账户进行对比),将相同的用户,开放第二用户权限。也即,若目标子文档开放第二用户权限的用户不能涵盖文档的阅读者,则没有被涵盖的文档阅读者(可以理解为至少一个阅读者)则可以理解为仅被开放关于目标子文档的第一用户权限。而此时则可以展示第一提示信息,以提示目标子文档需要被共享。
在一些实施例中,第一提示信息的展示位置可以与目标子文档链接相对应,例如,展示在子文档链接的右方。当然,在此,并不对第一提示信息的具体展示位置进行限制,仅需根据实际情况进行合理设置即可,如,还可以展示在子文档链接的左方、上方、下方等。
在一些实施例中,第一提示信息可以用于提示文档的部分阅读者,对子文档不具备第二用户权限。换言之,目标子文档没有向文档的至少一个阅读者开放第二用户权限。
在一些实施例中,第一提示信息可以是‘文本信息’,也可以是‘标识信息’等。例如,当第一提示信息为‘文本信息’时,‘文本信息’的内容可以为‘待共享’,也即,如图2A所示。当第一提示信息为‘标识信息’时,‘标识信息’的形状可以为圆形标识,如图2B所示。需要说明的是,此处仅是举例说明,在具体实施方式中,‘文本信息’的内容和 ‘标识信息’的形状可以根据具体情况进行设定,在此并不进行限定。
当然,在具体实施方式中,第一提示信息也可以是其它形式,例如,还可以直接展示出对目标子文档不具备第二用户权限的阅读者的阅读者标识。
可以看出,第一提示信息仅是用于提示用户目标子文档还未被共享,而第一提示信息的具体形式,可以根据实际情况进行限定,在此并不对第一提示信息具体形式进行限定。
在一些实施例中,当展示了与目标子文档链接相关联的第一提示信息时,则可以表征需要增加对目标子文档具备第二用户权限的用户的数量。
在一些实施例中,当第一提示信息为‘标识信息’时,用户可以对‘标识信息’进行点击操作,从而,展示界面可以展示对开放目标子文档的第一用户权限的阅读者的阅读者标识。如图3所示,可以展示小D和小E的阅读者标识,而用户可以对展示的阅读者标识进行选取(如可以点击对小D和小E右边选取框,对小D和小E进行选取),从而便可将选取出的阅读者标识,与目标子文档链接建立联系,换言之,可以将选取出的阅读者标识所对应的阅读者开放第二用户权限。如,选取出小D,则可以将小D关于目标子文档的第一用户权限变更为第二用户权限。从而也就增加了对目标子文档具备第二用户权限的用户数量。
而在相关技术中,当在线文档开放第二用户权限的用户为在线文档添加解释性文档的链接之后,在其它用户点击解释性文档的链接时,需要先向添加解释性文档的用户账户发送授权请求,请求希望自己也被开放针对这个在线文档的第二用户权限,而仅有当添加解释性文档的用户同意该请求之后,才能对其它用户开放关于这个在线文档的第二用户权限。
可以看出,在本申请中,通过第一提示信息,可以提示用户该目标子 文档需要进行共享,从而使得对文档的阅读者可以具备目标子文档的第二用户权限的用户,也即,可以理解为使得阅读文档的阅读者,可以访问目标子文档。而通过主动提示对文档的阅读者开放关于目标子文档的第二用户权限的方式,可以减少目标子文档开放第一用户权限的阅读者在阅读文档过程中,发送授权请求的概率,也可以减少通信资源的消耗,可以提升用户阅读文档的速度,并可以提高了用户的信息获取效率。
在一些实施例中,响应于检测到在文档中的子文档链接添加操作,确定子文档链接添加操作添加的子文档链接是否为目标子文档链接。
在一些实施例中,某些文档的阅读者可以向对文档进行编辑,也即,这些阅读者可以执行将子文档链接添加操作,以将子文档链接添加至文档内。
在这里,子文档链接添加操作可以理解为复制粘贴操作,如,某些文档的阅读者可以先将子文档链接进行复制,之后将其粘贴在文档内。
在一些实施例中,当子文档链接添加操作添加的子文档链接为目标子文档链接时,可以表征该添加的子文档为需要进行共享的子文档,此时,则可以展示第一提示信息。
在一些实施例中,第一提示信息可以包括目标子文档开放第一用户权限的阅读者的阅读者标识,此时,响应于确定添加的子文档链接为目标子文档链接,可以直接展示目标子文档开放第一用户权限的阅读者的阅读者标识。
在这里,通过直接展示目标子文档开放第一用户权限的阅读者的阅读者标识的方式,可以更直观的提醒用户对目标子文档进行共享,从而可以进一步的提示目标子文档被共享的效率。
举例说明:文档的阅读者包括:小A、小B、小C、小D、小E,对目标子文档具备第二用户权限的用户包括:小A、小B、小C、小王,此 时,对目标子文档具备第二用户权限的用户没有涵盖到对文档具备第二用户权限的用户(没有涵盖到小D和小E),换言之,可以理解为目标子文档对小D和小E开放第一用户权限,因此,此时可以直接展示小D和小E的账户标识,如图3所示。
可以看出,在对文档具备编辑功能的阅读者将目标子文档连接加入至文档之后,可以立即展示目标子文档开放第一用户权限的阅读者的阅读者标识,从而可以便于对文档具备编辑功能的阅读者,向这些被目标子文档开放第一用户权限的阅读者,开放关于目标子文档的第二用户权限(这里可以理解为将这部分阅读者从开放第一用户权限变更为开放第二用户权限)。换言之,在将子文档链接加入至文档之后,对文档具备编辑功能的阅读者即可立即增加对目标子文档具备第二用户权限的阅读者数量。
也即,当将目标子文档链接加入文档之后,即可立即提示用户对目标子文档进行共享,也就无需某些对目标子文档仅具备第一用户权限的用户向对文档具备编辑功能的阅读者发送授权请求,从而,可以进一步提高了用户的信息获取效率。
在一些实施例中,第一提示信息包括触发控件,在响应于检测到针对触发控件的触发操作时,可以展示目标子文档开放第一用户权限的阅读者的阅读者标识。
在一些实施例中,第一提示信息可以如图2A或图2B所示,而触发控件可以设置在第一提示信息处,也即,当对文档具备编辑功能的阅读者对第一提示信息执行触发操作之后,展示界面可以展示目标子文档开放第一用户权限的阅读者的阅读者标识,如图3所示的画面。
在一些实施例中,文档可能多个具备编辑功能的阅读者,为了便于理解,下面以编辑者表征对文档具备编辑功能的阅读者。当文档的某个编辑 者(编辑者A)为文档添加了目标子文档链接,而编辑者A在添加完目标子文档链接后,可以展示如图3所示的画面,也即,可以直接展示目标子文档对这两个阅读者标识所指示的阅读者开放目标子文档的第二用户权限。若编辑者A可能仅向小D开放针对目标子文档的第二用户权限,而没有向小E开放针对目标子文档的第二用户权限,则此时文档的另一编辑者(编辑者B)在流程文档时,当浏览到目标子文档链接处时,可以展示如图2A或图2B所示的画面,此时,编辑者B可以通过对图2A或图2B中的第一提示信息执行触发操作(例如:点击、长按等操作),从而界面即可展示如图4所示的画面,也即,将此时目标子文档开放第一用户权限的阅读者的阅读者标识(此时,仅有小E)进行展示。
当然,在一些实施例中,编辑者A在添加完目标子文档链接后,编辑者A将所用阅读者均开放目标子文档的第二用户权限。但是,文档的创建者,可能后续又增加了一些阅读者,例如,小红和小李。此时,小红和小李则可能没有开放关于目标子文档的第二用户权限,则可能需要向小红和小李开放关于目标子文档的第二用户权限。也即,此时,当编辑者B在流程文档,且浏览到目标子文档链接处时,目标子文档链接也将展示第一提示信息。
在一些实施例中,通过设置触发控件,在文档的编辑者在阅读文档时,可以通过对触发控件执行触发操作,从而即可展示目标子文档开放第一用户权限的阅读者的阅读者标识,并通过对阅读者标识的选取操作,选取出目标阅读者,并将目标阅读者的第一用户权限更改为第二用户权限,因此,使得文档的阅读者可以较快的获得关于目标子文档的第二用户权限,换言之,提升了目标子文档被共享的效率。
在一些实施例中,步骤102(基于针对第一提示信息的操作,确定至少一个阅读者中的目标阅读者)具体可以包括:
响应于检测到针对展示的阅读者标识的选取操作,将选取出的阅读者标识指示的阅读者,确定为目标阅读者。
在本实施例中,展示的阅读者标识所指示的阅读者为目标子文档开放第一用户权限的阅读者。
在一些实施例中,文档的编辑者在阅读文档时,可能不清楚是否需要对展示的阅读者标识全部授予针对目标子文档的第二用户权限,因此,文档的编辑者可能仅会选取出其中需要授予第二用户权限的阅读者标识,而选取出的阅读者标识,则可以理解为目标阅读者标识。而目标阅读者标识所指示的阅读者可以理解为目标阅读者,从而即可向目标阅读者开放目标子文档的第二用户权限。
而通过这种方式,用户也可以一次性向多个文档阅读者开放关于目标子文档的第二用户权限,也即,可以进一步提升对文档的阅读者开放关于目标子文档的第二用户权限的效率。
在一些实施例中,第一提示信息包括全选控件,此时,响应于检测到针对全选控件的触发操作,将展示的阅读者标识所指示的阅读者均确定为目标阅读者。
在一些实施例中,通过设置全选控件,可以进一步提升对文档的阅读者开放关于目标子文档的第二用户权限的效率。也即,使得用户可以一次性对文档的阅读者开放关于目标子文档的第二用户权限。
在一些实施例中,第二用户权限包括至少一个子第二用户权限,作为示例,第二用户权限可以包括对目标子文档具备阅读功能、对目标子文档具备编辑功能等,而对目标子文档具备阅读功能可以理解为一个子第二用户权限,而对目标子文档具备编辑功能也可以理解为另一个子第二用户权限。
在本实施例中,步骤102(基于针对第一提示信息的操作,确定至少 一个阅读者中的目标阅读者,以及将目标阅读者针对目标子文档的第一用户权限变更为第二用户权限)具体可以为:
展示用于指示子第二用户权限的子第二用户权限标识,响应于检测到针对子第二用户权限标识的选取操作,确定选取出的目标子第二用户权限标识,以及确定与目标子第二用户权限标识对应的阅读者标识;将与目标子第二用户权限标识对应的阅读者标识所指示的阅读者,确定为目标阅读者,以及将目标阅读者关于目标子文档的第一用户权限变更为目标子第二用户权限。
在这里,子第二用户权限标识与用于指示阅读者的阅读者标识相关联。也即,每个阅读者标识,都可以存在对应的子第二用户权限标识。
在一些实施例中,可以在展示阅读者标识的相应位置处展示子第二用户权限标识,而用户可以对子第二用户权限标识执行选取操作,开放每一个阅读者针对目标子文档的子第二用户权限。如图5A所示,可以展示子第二用户权限标识(第二用户权限标识包括:‘编辑权限标识’501(某一子第二用户权限标识)和‘阅读权限标识’502(另一子第二用户权限标识)),若文档的编辑者需要对某一阅读者开放针对目标子文档的编辑权限,则可以对‘编辑权限标识’501执行选取操作。
可以看出,文档的编辑者还可以对至少一个阅读者,开放关于目标子文档不同的子第二用户权限,例如,对某个阅读者开放针对目标子文档的阅读权限,对另一阅读者开放针对目标子文档的编辑权限。而通过这种方式,使得文档的编辑者,可以提前设置好不同阅读者的不同的子第二用户权限,从而,使得文档的阅读者在阅读文档时,不会在去向文档的编辑者发送授权请求。
在本实施例中,不仅提升了对目标子文档的共享效率,还可以针对不同阅读者开放不同的子第二用户权限,从而可以避免某些文档阅读者发 送权限更改请求(如某些阅读者可能需要拥有针对目标子文档的编辑权限,但是确仅授予了针对目标子文档的阅读权限),也就可以进一步提升用户信息获取的效率。
在一些实施例中,文档的编辑者还可以先确定一部分阅读者为目标阅读者(需要开放关于目标子文档相同子第二用户权限的阅读者),若对这部分阅读者开放的子第二用户权限相同,则可以对这些阅读者同时开放针对目标子文档的子第二用户权限。也即,如图5B所示,小D、小F和小K可以为目标阅读者,也即,文档的编辑者可以先选取出小D、小F和小K,然后,界面可以展示‘编辑权限标识’501和‘阅读权限标识’502,若文档的编辑者对‘阅读权限标识’502执行选取操作,即可同时为小D、小F和小K开放关于目标子文档的阅读权限。需要说明的是,在这里,‘编辑权限标识’501和‘阅读权限标识’502,均可以表征子第二用户权限标识。
可以看出,由于仅需对子第二用户权限标识执行选取操作,即可对阅读者标识所指示的阅读者开放关于目标子文档的目标子第二用户权限,相较于相关技术中需要阅读者通过发送请求的方式获取具体某个子第二用户权限的方式,本申请所提供的技术方案不仅简化了对阅读者开放子第二用户权限的方式,且可以单独为每个阅读者开放具体某个子第二用户权限(阅读权限或编辑权限),还可以为多个阅读者开放具体子第二用户权限。也即,提升了子第二用户权限开放的效率。
在一些实施例中,如图6所示,文档展示界面可以包括查看控件,而权限控制方法还可以包括步骤601-步骤603,而步骤601和步骤602的具体实现细节在步骤101和步骤102处已经进行了详细的叙述,为了说明书的简洁,在此不再进行赘述。
步骤603,响应于检测到针对查看控件的触发操作,展示子文档链接 列表。
在这里,子文档链接列表根据文档中的子文档链接生成。
在一些实施例中,子文档链接列表中可以包括文档中的所有子文档链接,也即,为文档添加的所有子文档链接,均可以在子文档链接列表中进行展示。换言之,文档的编辑者通过对查看控件执行触发操作,即可查看对文档所添加的所有子文档链接。
在一些实施例中,当确定子文档链接列表中包括目标子文档连接,展示与目标子文档连接关联的第二提示信息。
在一些实施例中,文档中可能添加了多个子文档链接,而某些子文档链接所指示的子文档可能已经被共享,而某些子文档链接所指示的子文档可能还需要被共享(目标子文档链接所指示的目标子文档需要被共享),而为了便于用户查看每个子文档链接的共享情况,可以在展示界面展示查看控件,当检测到针对查看控件的触发操作时,可以展示子文档链接列表,如图7所示,而子文档链接列表中包括了对文档所添加的所有子文档链接。也即,针对目标子文档链接可以展示第二提示信息,而第二提示信息可以用于指示还未被共享的子文档链接(如图7所示)。
而通过第二提示信息,可以使得文档的编辑者较为清晰的获知每个子文档链接的共享情况,且可以提醒文档的编辑者未没有共享的子文档进行共享。也即,可以进一步的加快对目标子文档进行共享的效率。
在一些实施例中,当前登录的账户为对文档拥有共享权限的账户。
在一些实施例中,由于文档的阅读者仅能对文档进行阅读,而文档的编辑者可以对文档进行编辑和阅读,而对文档进行编辑则可以对文档添加子文档链接,则可以对该子文档链接所指示的子文档开放第二用户权限。也即,仅有当前登录的账户为对文档具有共享权限的账户(可以理解为文档的编辑者),展示界面才能展示上述第一提示信息、上述第二提示 信息等。
进一步参考图8,作为对上述各图所示方法的实现,本公开提供了一种权限控制装置的一个实施例,该装置实施例与图1所示的权限控制方法实施例相对应,该装置具体可以应用于各种电子设备中。
如图8所示,本实施例的权限控制装置包括:展示单元801,用于响应于确定文档中包括目标子文档链接,展示与目标子文档链接相关联的第一提示信息,其中,上述目标子文档链接指示的目标子文档向上述文档的至少一个阅读者开放第一用户权限;修改单元802,用于基于针对上述第一提示信息的操作,确定上述至少一个阅读者中的目标阅读者,以及将上述目标阅读者关于上述目标子文档的上述第一用户权限变更为第二用户权限。
在一些实施例中,上述权限控制装置还包括:第一确定单元803,用于响应于检测到在上述文档中的子文档链接添加操作,确定上述子文档链接添加操作添加的子文档链接是否为目标子文档链接。
在一些实施例中,上述第一提示信息包括上述目标子文档开放第一用户权限的阅读者的阅读者标识,上述权限控制装置还包括:第二确定单元804,用于响应于确定添加的子文档链接为目标子文档链接,展示上述目标子文档开放第一用户权限的阅读者的阅读者标识。
在一些实施例中,上述第一提示信息包括触发控件;上述权限控制装置还包括:触发单元805,用于响应于检测到针对上述触发控件的触发操作,展示上述目标子文档开放第一用户权限的阅读者的阅读者标识。
在一些实施例中,修改单元802具体还用于响应于检测到针对展示的阅读者标识的选取操作,将选取出的阅读者标识指示的阅读者,确定上述目标阅读者。
在一些实施例中,上述第一提示信息包括全选控件;修改单元802具体还用于响应于检测到针对上述全选控件的触发操作,将展示的阅读者标识所指示的阅读者均确定为目标阅读者。
在一些实施例中,上述修改单元802具体还用于:展示用于指示子第二用户权限的子第二用户权限标识,其中,子第二用户权限标识与用于指示阅读者的阅读者标识相关联;响应于检测到针对子第二用户权限标识的选取操作,确定选取出的目标子第二用户权限标识,以及确定与上述目标子第二用户权限标识对应的阅读者标识;将与上述目标子第二用户权限标识对应的阅读者标识所指示的阅读者,确定为目标阅读者,以及将上述目标阅读者关于上述目标子文档的上述第一用户权限变更为目标子第二用户权限。
在一些实施例中,文档展示界面包括查看控件;上述权限控制装置还包括:查看单元806,用于响应于检测到针对上述查看控件的触发操作,展示子文档链接列表,其中,上述子文档链接列表根据上述文档中的子文档链接生成。
在一些实施例中,查看单元806具体还用于响应于确定上述子文档链接列表中包括目标子文档连接,展示与目标子文档连接关联的第二提示信息。
请参考图9,图9示出了本公开的一个实施例的权限控制方法可以应用于其中的示例性系统架构。
如图9所示,系统架构可以包括终端设备901、902、903,网络904,服务器905。网络904可以用以在终端设备901、902、903和服务器905之间提供通信链路的介质。网络904可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
终端设备901、902、903可以通过网络904与服务器905交互,以接收或发送消息等。终端设备901、902、903上可以安装有各种客户端应用,例如网页浏览器应用、搜索类应用、新闻资讯类应用。终端设备901、902、903中的客户端应用可以接收用户的指令,并根据用户的指令完成相应的功能,例如根据用户的指令在信息中添加相应信息。
终端设备901、902、903可以是硬件,也可以是软件。当终端设备901、902、903为硬件时,可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。当终端设备901、902、903为软件时,可以安装在上述所列举的电子设备中。其可以实现成多个软件或软件模块(例如用来提供分布式服务的软件或软件模块),也可以实现成单个软件或软件模块。在此不做具体限定。
服务器905可以是提供各种服务的服务器,例如接收终端设备901、902、903发送的信息获取请求,根据信息获取请求通过各种方式获取信息获取请求对应的展示信息。并展示信息的相关数据发送给终端设备901、902、903。
需要说明的是,本公开实施例所提供的信息处理方法可以由终端设备执行,相应地,权限控制装置可以设置在终端设备901、902、903中。此外,本公开实施例所提供的信息处理方法还可以由服务器905执行,相应地,信息处理装置可以设置于服务器905中。
应该理解,图9中的终端设备、网络和服务器的数目仅仅是示意 性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。
下面参考图10,其示出了适于用来实现本公开实施例的电子设备(例如图9中的终端设备或服务器)的结构示意图。本公开实施例中的终端设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图10示出的电子设备仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。
如图10所示,电子设备可以包括处理装置(例如中央处理器、图形处理器等)1001,其可以根据存储在只读存储器(ROM)1002中的程序或者从存储装置908加载到随机访问存储器(RAM)1003中的程序而执行各种适当的动作和处理。在RAM 1003中,还存储有电子设备1000操作所需的各种程序和数据。处理装置1001、ROM1002以及RAM 1003通过总线1004彼此相连。输入/输出(I/O)接口1005也连接至总线1004。
通常,以下装置可以连接至I/O接口1005:包括例如触摸屏、触摸板、键盘、鼠标、摄像头、麦克风、加速度计、陀螺仪等的输入装置1006;包括例如液晶显示器(LCD)、扬声器、振动器等的输出装置1007;包括例如磁带、硬盘等的存储装置1008;以及通信装置1009。通信装置1009可以允许电子设备与其他设备进行无线或有线通信以交换数据。虽然图10示出了具有各种装置的电子设备,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以 被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在非暂态计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置1009从网络上被下载和安装,或者从存储装置1008被安装,或者从ROM1002被安装。在该计算机程序被处理装置1001执行时,执行本公开实施例的方法中限定的上述功能。
需要说明的是,本公开上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于: 电线、光缆、RF(射频)等等,或者上述的任意合适的组合。
在一些实施方式中,客户端、服务器可以利用诸如HTTP(HyperText Transfer Protocol,超文本传输协议)之类的任何当前已知或未来研发的网络协议进行通信,并且可以与任意形式或介质的数字数据通信(例如,通信网络)互连。通信网络的示例包括局域网(“LAN”),广域网(“WAN”),网际网(例如,互联网)以及端对端网络(例如,ad hoc端对端网络),以及任何当前已知或未来研发的网络。
上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:响应于确定文档中包括目标子文档链接,展示与上述目标子文档链接相关联的第一提示信息,其中,上述目标子文档链接指示的目标子文档向上述文档的至少一个阅读者开放第一用户权限;基于针对上述第一提示信息的操作,确定上述至少一个阅读者中的目标阅读者,以及将上述目标阅读者关于上述目标子文档的上述第一用户权限变更为第二用户权限。
可以以一种或多种程序设计语言或其组合来编写用于执行本公开的操作的计算机程序代码,上述程序设计语言包括但不限于面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利 用因特网服务提供商来通过因特网连接)。
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本公开实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,展示单元801还可以被描述为“展示与目标子文档链接相关联的第一提示信息的单元”。
本文中以上描述的功能可以至少部分地由一个或多个硬件逻辑部件来执行。例如,非限制性地,可以使用的示范类型的硬件逻辑部件包括:现场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、片上系统(SOC)、复杂可编程逻辑设备(CPLD)等等。
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁 性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。
以上描述仅为本公开的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本公开中所涉及的公开范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述公开构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本公开中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。
此外,虽然采用特定次序描绘了各操作,但是这不应当理解为要求这些操作以所示出的特定次序或以顺序次序执行来执行。在一定环境下,多任务和并行处理可能是有利的。同样地,虽然在上面论述中包含了若干具体实现细节,但是这些不应当被解释为对本公开的范围的限制。在单独的实施例的上下文中描述的某些特征还可以组合地实现在单个实施例中。相反地,在单个实施例的上下文中描述的各种特征也可以单独地或以任何合适的子组合的方式实现在多个实施例中。
尽管已经采用特定于结构特征和/或方法逻辑动作的语言描述了本主题,但是应当理解所附权利要求书中所限定的主题未必局限于上面描述的特定特征或动作。相反,上面所描述的特定特征和动作仅仅是实现权利要求书的示例形式。

Claims (13)

  1. 一种权限控制方法,其特征在于,包括:
    响应于确定文档中包括目标子文档链接,展示与所述目标子文档链接相关联的第一提示信息,其中,所述目标子文档链接指示的目标子文档向所述文档的至少一个阅读者开放第一用户权限;
    基于针对所述第一提示信息的操作,确定所述至少一个阅读者中的目标阅读者,以及将所述目标阅读者关于所述目标子文档的所述第一用户权限变更为第二用户权限。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    响应于检测到在所述文档中的子文档链接添加操作,确定所述子文档链接添加操作添加的子文档链接是否为目标子文档链接。
  3. 根据权利要求2所述的方法,其特征在于,所述第一提示信息包括所述目标子文档开放第一用户权限的阅读者的阅读者标识;
    以及,所述方法还包括:
    响应于确定添加的子文档链接为目标子文档链接,展示所述目标子文档开放第一用户权限的阅读者的阅读者标识。
  4. 根据权利要求1所述的方法,其特征在于,所述第一提示信息包括触发控件;
    以及,所述方法还包括:
    响应于检测到针对所述触发控件的触发操作,展示所述目标子文档开放第一用户权限的阅读者的阅读者标识。
  5. 根据权利要求3或4所述的方法,其特征在于,所述基于针对所述第一提示信息的操作,确定所述至少一个阅读者中的目标阅读者,包括:
    响应于检测到针对展示的阅读者标识的选取操作,将选取出的阅读者标识指示的阅读者,确定所述目标阅读者。
  6. 根据权利要求1所述的方法,其特征在于,所述第一提示信息包括全选控件;
    以及,所述方法还包括:
    响应于检测到针对所述全选控件的触发操作,将展示的阅读者标识所指示的阅读者均确定为目标阅读者。
  7. 根据权利要求1所述的方法,其特征在于,第二用户权限包括至少一个子第二用户权限;以及
    所述基于针对所述第一提示信息的操作,确定所述至少一个阅读者中的目标阅读者,以及将所述目标阅读者关于所述目标子文档的所述第一用户权限变更为第二用户权限,包括:
    展示用于指示子第二用户权限的子第二用户权限标识,其中,子第二用户权限标识与用于指示阅读者的阅读者标识相关联;
    响应于检测到针对子第二用户权限标识的选取操作,确定选取出的目标子第二用户权限标识,以及确定与所述目标子第二用户权限标识对应的阅读者标识;
    将与所述目标子第二用户权限标识对应的阅读者标识所指示的阅读者,确定为目标阅读者,以及将所述目标阅读者关于所述目标子文档的所述第一用户权限变更为目标子第二用户权限。
  8. 根据权利要求1所述的方法,其特征在于,文档展示界面包括查 看控件;以及
    所述方法还包括:
    响应于检测到针对所述查看控件的触发操作,展示子文档链接列表,其中,所述子文档链接列表根据所述文档中的子文档链接生成。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    响应于确定所述子文档链接列表中包括目标子文档链接,展示与目标子文档链接关联的第二提示信息。
  10. 根据权利要求1所述的方法,其特征在于,所述提示信息包括以下至少一项:
    文本信息和标识信息。
  11. 一种权限控制装置,其特征在于,包括:
    展示单元,用于响应于确定文档中包括目标子文档链接,展示与所述目标子文档链接相关联的第一提示信息,其中,所述目标子文档链接指示的目标子文档向所述文档的至少一个阅读者开放第一用户权限;
    修改单元,用于基于针对所述第一提示信息的操作,确定所述至少一个阅读者中的目标阅读者,以及将所述目标阅读者关于所述目标子文档的所述第一用户权限变更为第二用户权限。
  12. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-10中任一所述的方法。
  13. 一种计算机可读介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1-10中任一所述的方法。
PCT/CN2021/119688 2020-10-10 2021-09-22 权限控制方法、装置和电子设备 WO2022073418A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/877,692 US20220374538A1 (en) 2020-10-10 2022-07-29 Permission control method and device and electronic equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011081251.9A CN112257104A (zh) 2020-10-10 2020-10-10 权限控制方法、装置和电子设备
CN202011081251.9 2020-10-10

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/877,692 Continuation US20220374538A1 (en) 2020-10-10 2022-07-29 Permission control method and device and electronic equipment

Publications (1)

Publication Number Publication Date
WO2022073418A1 true WO2022073418A1 (zh) 2022-04-14

Family

ID=74241947

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/119688 WO2022073418A1 (zh) 2020-10-10 2021-09-22 权限控制方法、装置和电子设备

Country Status (3)

Country Link
US (1) US20220374538A1 (zh)
CN (1) CN112257104A (zh)
WO (1) WO2022073418A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220374538A1 (en) * 2020-10-10 2022-11-24 Beijing Zitiao Network Technology Co., Ltd. Permission control method and device and electronic equipment

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114491608B (zh) * 2022-02-17 2023-10-13 北京字跳网络技术有限公司 权限处理方法、装置、设备及介质
CN114884933A (zh) * 2022-04-21 2022-08-09 北京字跳网络技术有限公司 信息处理方法、装置、电子设备和存储介质
CN117094007A (zh) * 2022-05-11 2023-11-21 北京字跳网络技术有限公司 一种文档的访问方法、装置、设备、介质及程序产品
CN115033920A (zh) * 2022-06-21 2022-09-09 北京字跳网络技术有限公司 对象访问方法、装置、电子设备、存储介质及程序产品

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333076A (zh) * 2011-07-21 2012-01-25 上海互联网软件有限公司 文件共享系统及方法、网络信息整合系统及方法
CN103347091A (zh) * 2013-07-19 2013-10-09 百度在线网络技术(北京)有限公司 文档注释的共享方法与云端服务器
CN105337838A (zh) * 2014-07-07 2016-02-17 鸿富锦精密工业(深圳)有限公司 群组资料分享系统及方法
CN111581924A (zh) * 2020-04-30 2020-08-25 北京字节跳动网络技术有限公司 邮件处理方法、装置、电子设备及存储介质
CN112257104A (zh) * 2020-10-10 2021-01-22 北京字跳网络技术有限公司 权限控制方法、装置和电子设备

Family Cites Families (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0426593A3 (en) * 1989-11-02 1993-10-13 International Business Machines Corporation User access of multiple documents based on document relationship classification
EP1056010A1 (en) * 1999-05-28 2000-11-29 Hewlett-Packard Company Data integrity monitoring in trusted computing entity
US6996720B1 (en) * 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
AUPQ498500A0 (en) * 2000-01-07 2000-02-03 Flixco Pty Limited Information system
AU4166601A (en) * 2000-02-23 2001-09-03 Ipdn Corp Methods and devices for storing, distributing, and accessing intellectual property in digital form
JP3307625B2 (ja) * 2000-02-25 2002-07-24 株式会社ガーラ 電子掲示板システムおよびメールサーバー
US7702521B2 (en) * 2001-03-07 2010-04-20 Thomas Layne Bascom Method for users of a network to provide other users with access to link relationships between documents
US20030028495A1 (en) * 2001-08-06 2003-02-06 Pallante Joseph T. Trusted third party services system and method
JP2003330398A (ja) * 2002-05-17 2003-11-19 Sony Corp 広告提供方法及び広告提供サーバ
US20040225513A1 (en) * 2002-07-27 2004-11-11 Brad Haeberle Method and system for obtaining service contract information
US20040148288A1 (en) * 2002-07-27 2004-07-29 Brad Haeberle Method and system for obtaining operational data and service information for a building site
US7308411B2 (en) * 2004-04-01 2007-12-11 Leo Software, Inc. Method of presenting leasing arrangements
US7940179B2 (en) * 2005-01-12 2011-05-10 British Telecommunications Public Limited Company Radio frequency identification tag security systems
US7503075B2 (en) * 2005-01-12 2009-03-10 Microsoft Corporation Access trimmed user interface
US7574746B2 (en) * 2005-03-31 2009-08-11 International Business Machines Corporation Access validation and management of access permissions to referenced shared resources in a networked environment
US20070027706A1 (en) * 2005-08-01 2007-02-01 Murray Frank H System and methods for interactive evaluation of media content
KR100763193B1 (ko) * 2005-10-13 2007-10-04 삼성전자주식회사 Drm 라이센스 제공 방법 및 시스템
US20070094333A1 (en) * 2005-10-20 2007-04-26 C Schilling Jeffrey Video e-mail system with prompter and subtitle text
US7874013B2 (en) * 2006-04-10 2011-01-18 Sawteeth, Inc. Secure and granular index for information retrieval
US7735060B2 (en) * 2006-06-29 2010-06-08 Augusta Systems, Inc. Method and system for rapidly developing and deploying sensor-enabled software applications
US7844576B2 (en) * 2006-10-19 2010-11-30 Research In Motion Limited Method and system for synchronising bookmarks
US8010622B2 (en) * 2007-03-28 2011-08-30 Michael R. Dolan System and method of user definition of and participation in communities and management of individual and community information and communication
CH700706B1 (de) * 2007-09-18 2010-10-15 Roger Deuber Elektronische Bestellvorrichtung für Restaurantbetriebe.
WO2010105246A2 (en) * 2009-03-12 2010-09-16 Exbiblio B.V. Accessing resources based on capturing information from a rendered document
US20110178837A1 (en) * 2010-01-18 2011-07-21 Siemens Ag Systems and Methods for Managing Goodwill Activities in a Business Entity
US8434134B2 (en) * 2010-05-26 2013-04-30 Google Inc. Providing an electronic document collection
JP2012073936A (ja) * 2010-09-29 2012-04-12 Dainippon Screen Mfg Co Ltd コンテンツ配信サーバー、プログラム、コンテンツ配信システム及びコンテンツ取得サーバー
US8826407B2 (en) * 2010-11-24 2014-09-02 Skai, Inc. System and method for access control and identity management
BR112013015089A2 (pt) * 2010-12-16 2016-08-09 Nike International Ltd métodos e sistemas para incentivar a atividade atlética
EP2689378A2 (en) * 2011-03-21 2014-01-29 N-Trig Ltd. System and method for authentication with a computer stylus
JP5242737B2 (ja) * 2011-05-17 2013-07-24 グリー株式会社 広告提供システム及び広告提供方法
JP5681585B2 (ja) * 2011-08-04 2015-03-11 株式会社野村総合研究所 ファイル配信装置
CA2846620A1 (en) * 2011-08-26 2013-03-07 Scholastic Inc. Interactive electronic reader with parental control
US8935265B2 (en) * 2011-08-30 2015-01-13 Abbyy Development Llc Document journaling
WO2013052900A1 (en) * 2011-10-07 2013-04-11 Divringi Murat Systems, methods, and apparatuses for associating flexible internet based information with physical objects
US9384073B2 (en) * 2012-03-01 2016-07-05 Google Inc. Cross-extension messaging using a browser as an intermediary
JP5974564B2 (ja) * 2012-03-15 2016-08-23 富士通株式会社 物品管理システムおよび物品管理方法
US8880602B2 (en) * 2012-03-23 2014-11-04 Apple Inc. Embedding an autograph in an electronic book
US9710502B2 (en) * 2012-04-03 2017-07-18 Expedox Llc Document management
JP5567067B2 (ja) * 2012-05-31 2014-08-06 楽天株式会社 特典付与システム、特典付与方法、特典付与装置、特典付与プログラム、特典関連情報表示プログラム及び特典関連情報表示方法
US20140095327A1 (en) * 2012-10-02 2014-04-03 Martini Media Network, Inc. Apparatus and Method for Preserving Advertisements in a Web Page with Dynamically Served Advertisements
US9219633B2 (en) * 2012-10-10 2015-12-22 Mina Group Llc Recipe exchange and management system
US20130218829A1 (en) * 2013-03-15 2013-08-22 Deneen Lizette Martinez Document management system and method
US9438687B2 (en) * 2013-12-17 2016-09-06 Microsoft Technology Licensing, Llc Employing presence information in notebook application
US9679162B2 (en) * 2014-02-24 2017-06-13 Google Inc. Application permission settings
US9913642B2 (en) * 2014-03-26 2018-03-13 Ethicon Llc Surgical instrument comprising a sensor system
US9658995B2 (en) * 2014-04-07 2017-05-23 International Business Machines Corporation Content sharing web page overlay system
US20150378560A1 (en) * 2014-06-30 2015-12-31 Kobo Inc. Unlocking content on a computing device from a preview
US9633200B2 (en) * 2014-09-26 2017-04-25 Oracle International Corporation Multidimensional sandboxing for financial planning
US11615073B2 (en) * 2015-01-30 2023-03-28 Splunk Inc. Supplementing events displayed in a table format
US10305728B2 (en) * 2015-02-06 2019-05-28 Assa Abloy Ab Discovering, identifying, and configuring devices with opaque addresses in the internet of things environment
US10003551B2 (en) * 2015-03-30 2018-06-19 Cavium, Inc. Packet memory system, method and device for preventing underrun
US10282539B2 (en) * 2015-06-12 2019-05-07 AVAST Software s.r.o. Authentication and secure communication with application extensions
JP6631091B2 (ja) * 2015-08-24 2020-01-15 富士ゼロックス株式会社 情報処理装置及び情報処理プログラム
CN105979294A (zh) * 2015-11-26 2016-09-28 乐视致新电子科技(天津)有限公司 一种基于用户的数据处理方法及装置
US9571500B1 (en) * 2016-01-21 2017-02-14 International Business Machines Corporation Context sensitive security help
US10230731B2 (en) * 2016-06-02 2019-03-12 Microsoft Technology Licensing, Llc. Automatically sharing a document with user access permissions
US10776502B2 (en) * 2016-06-12 2020-09-15 Apple Inc. Diversification of public keys
US11201981B1 (en) * 2016-06-20 2021-12-14 Pipbin, Inc. System for notification of user accessibility of curated location-dependent content in an augmented estate
US20180183835A1 (en) * 2016-12-25 2018-06-28 Steven Mark Bryant Forward one-time-use physical access verification apparatus, system, and method of operation
US10860729B2 (en) * 2017-06-29 2020-12-08 Salesforce.Com, Inc. Permission management of cloud-based documents
JP2019016072A (ja) * 2017-07-05 2019-01-31 富士ゼロックス株式会社 情報処理装置及びプログラム
US10637845B2 (en) * 2017-07-21 2020-04-28 International Business Machines Corporation Privacy-aware ID gateway
US10691643B2 (en) * 2017-11-20 2020-06-23 International Business Machines Corporation Deduplication for files in cloud computing storage and communication tools
US10305683B1 (en) * 2017-12-29 2019-05-28 Entefy Inc. System and method of applying multiple adaptive privacy control layers to multi-channel bitstream data
US10083245B1 (en) * 2018-02-14 2018-09-25 Capital One Services, Llc Providing secure storage of content and controlling content usage by social media applications
CN110348236B (zh) * 2018-04-02 2024-07-26 腾讯科技(深圳)有限公司 一种文件的操作权限设置方法、装置和存储介质
WO2020102696A1 (en) * 2018-11-15 2020-05-22 Airside Mobile, Inc. Methods and apparatus for encrypting, storing, and/or sharing sensitive data
WO2020191078A1 (en) * 2019-03-19 2020-09-24 Nike Innovate C.V. Controlling access to a secure computing resource
US11922712B2 (en) * 2019-07-26 2024-03-05 Patnotate Llc Technologies for content analysis
WO2021021966A1 (en) * 2019-07-29 2021-02-04 2Key New Economics Ltd. Decentralized protocol for maintaining cryptographically proven multi-party-state-chains utilizing aggregated signatures
US11113449B2 (en) * 2019-11-10 2021-09-07 ExactNote, Inc. Methods and systems for creating, organizing, and viewing annotations of documents within web browsers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333076A (zh) * 2011-07-21 2012-01-25 上海互联网软件有限公司 文件共享系统及方法、网络信息整合系统及方法
CN103347091A (zh) * 2013-07-19 2013-10-09 百度在线网络技术(北京)有限公司 文档注释的共享方法与云端服务器
CN105337838A (zh) * 2014-07-07 2016-02-17 鸿富锦精密工业(深圳)有限公司 群组资料分享系统及方法
CN111581924A (zh) * 2020-04-30 2020-08-25 北京字节跳动网络技术有限公司 邮件处理方法、装置、电子设备及存储介质
CN112257104A (zh) * 2020-10-10 2021-01-22 北京字跳网络技术有限公司 权限控制方法、装置和电子设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220374538A1 (en) * 2020-10-10 2022-11-24 Beijing Zitiao Network Technology Co., Ltd. Permission control method and device and electronic equipment

Also Published As

Publication number Publication date
CN112257104A (zh) 2021-01-22
US20220374538A1 (en) 2022-11-24

Similar Documents

Publication Publication Date Title
WO2022073418A1 (zh) 权限控制方法、装置和电子设备
US11601385B2 (en) Conversion of text relating to media content and media extension apps
JP6876790B2 (ja) カーネルイベントトリガ
US10554599B2 (en) Conversion of detected URL in text message
WO2022127838A1 (zh) 文档处理方法、装置和电子设备
WO2022111290A1 (zh) 展示方法、装置和电子设备
US20220229873A1 (en) Document sharing processing method, apparatus, device, medium, and system
WO2022111591A1 (zh) 页面生成方法和装置、存储介质和电子设备
WO2022053004A1 (zh) 邮件处理方法、装置、电子设备及计算机可读介质
WO2022218034A1 (zh) 交互方法、装置和电子设备
WO2022022619A1 (zh) 一种文档编辑方法、装置和电子设备
CN112183045B (zh) 在线文档处理方法、装置和电子设备
WO2022148485A1 (zh) 信息展示方法、装置和电子设备
CN115344688B (zh) 业务数据展示方法、装置、电子设备和计算机可读介质
CN115079884B (zh) 会话消息的显示方法、装置、设备及存储介质
WO2023160578A1 (zh) 信息处理方法、装置、终端和存储介质
US20240095389A1 (en) Information processing method and apparatus, terminal, and storage medium
WO2022022473A1 (zh) 信息处理方法、装置和电子设备
US20220012784A1 (en) Verified-Party Content
CN112131181A (zh) 存储路径的展示方法、装置以及电子设备
WO2022184065A1 (zh) 电子文档的处理方法、装置、终端和存储介质
CN112307393A (zh) 信息发布方法、装置和电子设备
WO2022184037A1 (zh) 文档处理方法、装置、设备和介质
CN111475749A (zh) 信息展示目标的优化方法、装置、电子设备及可读介质
CN115422131B (zh) 业务审核知识库检索方法、装置、设备和计算机可读介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21876936

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21876936

Country of ref document: EP

Kind code of ref document: A1