WO2022111290A1 - 展示方法、装置和电子设备 - Google Patents

展示方法、装置和电子设备 Download PDF

Info

Publication number
WO2022111290A1
WO2022111290A1 PCT/CN2021/129997 CN2021129997W WO2022111290A1 WO 2022111290 A1 WO2022111290 A1 WO 2022111290A1 CN 2021129997 W CN2021129997 W CN 2021129997W WO 2022111290 A1 WO2022111290 A1 WO 2022111290A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
target file
access
response
associated account
Prior art date
Application number
PCT/CN2021/129997
Other languages
English (en)
French (fr)
Inventor
陈颖媛
梁源辉
Original Assignee
北京字跳网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京字跳网络技术有限公司 filed Critical 北京字跳网络技术有限公司
Priority to JP2023532270A priority Critical patent/JP2023550819A/ja
Publication of WO2022111290A1 publication Critical patent/WO2022111290A1/zh
Priority to US17/816,414 priority patent/US12067136B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to a display method, apparatus, and electronic device.
  • Embodiments of the present disclosure provide a display method, apparatus, and electronic device. By displaying prompt information, a user can be prompted to access a target file, so that the user can efficiently access the target file.
  • an embodiment of the present disclosure provides a display method, including: in response to the current account not having access rights to access a target file, determining an associated account of the current account, wherein the user corresponding to the associated account and the current account The corresponding users are matched; based on the relevant authority of each associated account for the above-mentioned target file, prompt information is displayed, wherein the above-mentioned prompt information is used to prompt the way to access the above-mentioned target file, and the above-mentioned relevant authority includes at least one of the following: access authority, application permissions.
  • an embodiment of the present disclosure provides a display device, including: a first determining unit, configured to determine an associated account of the current account in response to the current account not having the access right to access the target file, wherein the associated account The corresponding user is matched with the user corresponding to the above-mentioned current account; the display unit is used to display prompt information based on the relevant authority of each associated account for the above-mentioned target file, wherein the above-mentioned prompt information is used to prompt the way to access the above-mentioned target file, the above-mentioned Relevant permissions at least one of the following: access permissions, application permissions.
  • embodiments of the present disclosure provide an electronic device, including: one or more processors; and a storage device for storing one or more programs, when the one or more programs are processed by the one or more programs The processor executes, so that the above-mentioned one or more processors implement the above-mentioned display method according to the first aspect.
  • an embodiment of the present disclosure provides a computer-readable medium on which a computer program is stored, and when the program is executed by a processor, implements the steps of the above-described method in the first aspect.
  • the associated account of the current account when the current account does not have the access authority to access the target file, the associated account of the current account will be determined first, and a prompt may be displayed according to the relevant authority of the associated account for the target file information.
  • the relevant permissions can include: access permissions and application permissions; therefore, corresponding prompt information can be displayed according to the permissions that the associated account has on the target file. That is, the prompt information can prompt the way to access the target file, so the user can efficiently access the target file according to the prompt of the prompt information.
  • FIG. 1 is a flowchart of one embodiment of a presentation method according to the present disclosure
  • FIG. 2 is a schematic diagram of interface display according to an embodiment of the display method of the present disclosure
  • FIG. 3 is a schematic diagram of interface display according to another embodiment of the display method of the present disclosure.
  • FIG. 4 is a schematic diagram of interface display according to another embodiment of the display method of the present disclosure.
  • FIGS. 5A and 5B are schematic diagrams of interface display according to still another embodiment of the display method of the present disclosure.
  • FIG. 6 is a schematic diagram of interface display according to still another embodiment of the display method of the present disclosure.
  • FIGS. 7A and 7B are schematic diagrams of interface display according to still another embodiment of the display method of the present disclosure.
  • FIG. 8 is a schematic diagram of interface display according to still another embodiment of the display method of the present disclosure.
  • FIG. 9 is a schematic diagram of interface display according to still another embodiment of the display method of the present disclosure.
  • FIG. 10 is a schematic structural diagram of an embodiment of a display device according to the present disclosure.
  • FIG. 11 is an exemplary system architecture in which a demonstration method of an embodiment of the present disclosure may be applied.
  • FIG. 12 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
  • the term “including” and variations thereof are open-ended inclusions, ie, "including but not limited to”.
  • the term “based on” is “based at least in part on.”
  • the term “one embodiment” means “at least one embodiment”; the term “another embodiment” means “at least one additional embodiment”; the term “some embodiments” means “at least some embodiments”. Relevant definitions of other terms will be given in the description below.
  • FIG. 1 shows a flow of an embodiment of a presentation method according to the present disclosure.
  • the presentation method can be applied to terminal equipment.
  • the display method includes the following steps:
  • Step 101 in response to the current account not having the access right to access the target file, determine the associated account of the current account.
  • the current account can be understood as: the account of the user currently logged in to the application.
  • the user indicated by the associated account matches the user indicated by the current account.
  • the current account and the associated account of the current account are accounts of the same user, that is, the current account and the associated account may be based on the same identity. account for registration.
  • the identity identifier may be the user's communication number, email address, and the like.
  • the target file can be an online file.
  • relevant permissions may only be opened to certain accounts, that is, a user cannot access the target file by using an account that does not have relevant permissions to the target file.
  • the current account does not have the access right to access the target file, which means that the current account cannot be used to access the target file.
  • the current account may have the application right for the target file, but the current account does not have the access right to the target file. That is, if the current account does not have access rights to the target file, it means that the current account cannot be used to access the target file. When the current account has application rights, the current account cannot be used to access the target file, but the current account can be used to apply for access to the target file. .
  • Step 102 displaying prompt information based on the relevant authority of each associated account for the target file.
  • the prompt information is used to indicate the way to access the target file.
  • the relevant rights include at least one of the following: access rights and application rights.
  • the access authority may be the authority to directly access the target file, that is, the user can directly access the target file by using an account having the access authority to the target file.
  • the request permission may be the permission to request access to the target file. That is, the user can send a request for instructing to apply for access to the target file by using an account with application authority.
  • the way to access the target file may include: direct access, first apply for access permission and then access.
  • the target file can be accessed by using an associated account that has access rights to the target file, and the request for acquiring the access right to the target file can be applied for using an associated account that has application rights to the target file.
  • the associated account of the current account will be determined first, and prompt information can be displayed according to the relevant authority of the associated account for the target file.
  • the relevant permissions can include: access permissions and application permissions; therefore, corresponding prompt information can be displayed according to the permissions that the associated account has on the target file. That is, the prompt information can prompt the way of accessing the target file, so the user can efficiently access the target file according to the prompt of the prompt information.
  • the prompt information may be text information, and the user may select a way to obtain the access permission of the target file according to the instructions of the prompt information.
  • the current account and the associated account may be accounts of the user within different groups of the same application.
  • a certain application A for office work may be used by various groups in the company (in some implementations, each group can be understood as a tenant) for office work. For example, if there are five groups, if the user is an office worker in the group, it may be necessary to register an account corresponding to the group; therefore, when a user needs to work in multiple groups (for example: processing flow personnel, personnel handling personnel, etc.), the user may have multiple accounts.
  • some files may be specific to the group (for example, the content recorded in an online file is the identity information of employees in the group), then these files may not be allowed to be disclosed to the public, that is, they may only be Only accounts in certain groups can apply for access.
  • the online file can be made public, it can be represented that not only accounts in a specific group can apply for access rights, but also accounts in other groups can apply for access rights.
  • step 102 may specifically include: in response to the current account having the application for accessing the target file Permission, display the application control; in response to the trigger operation on the application control, send the permission application request.
  • an application control 201 may be displayed on a display interface, and after a trigger operation is performed on the application control 201 , a permission application request may be sent.
  • the permission application request may be used for instructing to obtain the relevant permission of the target file.
  • the relevant authority may include an access authority for the target file (only the target file can be read, but cannot be edited), an editing authority (the target file can be edited and read), and the like.
  • the permission application request may include the current account and a specific application reason, and the specific application reason may be preset by the user or input by the user. That is, as shown in FIG. 3 , an application reason input box 301 may be displayed on the display interface, and the user may input specific application reasons in the input box.
  • step 102 (displaying prompt information based on the relevant permissions of each associated account with respect to the target file) may specifically include: in response to determining that the associated account includes a first-type associated account with access permission for the target file, Shows the first type of linked accounts and access controls.
  • the first type of linked account has access rights to the target file.
  • some accounts may be determined as accounts that can directly access the target file, that is, these accounts have access rights to the target file.
  • the associated account when the associated account includes the first type of associated account, it can be represented that a certain account of the user can directly access the target document. For example, if a user has 3 accounts, the currently logged-in account does not have access rights to the target file, and one of the other two associated accounts corresponding to this account has access rights to the target file, you can Directly display the associated account with the target file access permission, and display the access controls of the associated account. That is, at this time, an associated account with access rights to the target file can be understood as the first type of associated account.
  • the user can know which associated account is used to access the target file, that is, the efficiency of the user accessing the target file is further improved.
  • the first type of associated account and access control (the black circle in FIG. 4 can represent the access control) can be directly displayed.
  • the name of the first-type associated account, the group identifier of the first-type associated account, and the like may also be displayed.
  • the access control is triggered, the current account can be directly converted into the first-type associated account, and the first-type associated account can be used to access the target file.
  • the first type of associated account and the access identifier can be directly displayed, so that the user only needs to perform a trigger operation on the access control of the first type of associated account.
  • the target file is accessed using the first type of linked account. That is, the user can easily access the target file.
  • the account and access controls associated with the management account group are presented.
  • the management account group is the group owner to which the account associated with the target file belongs.
  • the accounts associated with the management account group can be understood as the first type of associated accounts. Therefore, these accounts can be displayed so that the user can use these accounts to access the target file.
  • the user grants relevant permissions in units of groups.
  • a management account group may be determined as an access permission group, and all accounts in the management account group have target files. access rights.
  • the accounts associated with the management account group may be understood as all accounts in the management account group.
  • step 102 (displaying prompt information based on the relevant authority of each associated account for the target file) may specifically include: in response to determining that the associated account does not include an account with relevant authority for the target file, hiding the associated account account list.
  • the associated account when the associated account does not have the relevant authority for the target file, it can be represented that the user cannot access the target file by using the associated account, and the associated account can be hidden in order to make the display interface tidy.
  • the account list of the associated account in response to determining that the associated account does not include an account with access rights to the target file, is hidden.
  • the current account does not have access rights
  • the associated accounts do not include accounts that have access rights to the target file. It can be represented that the authority of the account in the associated account with respect to the target file is the same as the authority of the current account with respect to the target file, or lower. Therefore, in order to show the simplicity of the interface, the account list of the associated account can be hidden.
  • the current account has the application permission for the target file, and the associated account also has the application permission for the target file, the user can directly use the current account to apply for the relevant permission of the target file. Therefore, in order to make the display interface look more concise, the associated account can be hidden.
  • the user when applying for the relevant permissions of the target file, the user can apply for the access permission for the target file (only the target file can be read, but not edited), editing permission (the target file can be edited and read. )Wait.
  • the presentation interface includes a collapse control, and in response to detecting a triggering operation for the collapse control, an account list of associated accounts is displayed.
  • the user can reveal the associated accounts by triggering the collapse control.
  • the displayed associated account may be an associated account with relevant permissions to the target file, that is, when an account does not have relevant permissions to the target file, the associated account will not be displayed.
  • FIG. 5A is a schematic interface diagram without displaying the account list, and after the collapse control 501 is triggered, the interface schematic diagram shown in FIG. 5B can be displayed. That is, the setting of the folding control 501 can make the entire display page more tidy, and at the same time, after the user triggers the folding control 501, the account list can also be displayed, so that the user can switch the application account (the account to which the user sends the application permission request).
  • the corresponding switching control (the white circle in FIG. 5A and FIG. 5B ) can be displayed, that is, when the user performs a trigger operation on the switching control, Then the application account can be determined as the account.
  • the management account group is the group to which the management account of the target file belongs.
  • the management account group can be understood as the group to which the management account of the target file belongs, the manager of the target file may often be active in the group; and then use the association in the management account group When an account sends a request to apply for access rights, the probability of obtaining the application rights is high. Furthermore, the associated accounts belonging to the management account group can be displayed in a predefined prominent position.
  • the pre-defined prominent position may be a top position, that is, when multiple second-type linked accounts are displayed in sequence, the linked accounts belonging to the management account group are displayed on top.
  • the associated account c may be displayed on top.
  • the associated accounts outside the management account group are more likely to obtain access rights to the target file. Therefore, by displaying the associated accounts belonging to the management account group in a predefined prominent position, the efficiency of the user accessing the target file can be further increased.
  • the account list of the associated account is hidden.
  • the associated account when the current account does not have the application right to access the target file, and the associated account does not include an account that has the access right and/or the application right to the target file. It can be represented that the user cannot use the associated account to obtain the relevant permissions of the target file at this time. Therefore, the account list of the associated account can be hidden.
  • some documents need to be kept confidential (ie, only users in the group can access, and other users cannot), therefore, accounts in some groups do not have application rights. Some documents may not need to be kept confidential, and all accounts in the group may have application rights. That is, it can be understood that the disclosure type of the target document can be divided into a group disclosure type and an open disclosure type.
  • the application controls can be displayed; if the associated account has the first type of account, the first type of account and the associated account can be displayed.
  • the access control is displayed, and other accounts except the first-type account in the associated account are hidden, as shown in FIG. 7A (the application control 701, the first-type associated account and the access control, and the folding control are shown in FIG. 7A ); if If the management account does not have the first type of account, the account list of the associated account can be hidden, as shown in FIG. 7B (the application control 701 and the folding control are shown in FIG. 7B ).
  • the application controls can be displayed. If the linked account has the first type of account, the first type of account and access controls can be displayed.
  • the second type of account and the switch control can be displayed (as shown in Figure 8, in Figure 8 Only the second type of account and switching controls are shown); if the associated account does not have the relevant permissions of the target file, the account list of the associated account can be hidden.
  • the second type of associated account and the switch control are displayed.
  • the toggle control is used to trigger a request to send a permission request.
  • the second-type associated account indicated by the trigger operation may be used as the application account, and the application control may be displayed.
  • a permission application request can be sent.
  • the current account does not have application rights for the target file, and indication information can also be displayed.
  • the indication information may indicate that the disclosure type of the target file is intra-group disclosure; as shown in FIG. 9 , indication information 901 may be displayed on the display interface. Indication information can be used to indicate that the current account is no longer managed in the account group, so the request for access permission cannot be sent.
  • the specific content of the indication information can be set according to the specific implementation manner, and the specific content of the indication information is not limited here, and only needs to be set reasonably according to the actual situation.
  • the user can conveniently know the current method to be used to obtain the access permission of the target file, so that the user can access the target file more efficiently.
  • step 102 in response to the current account not having the application right to access the target file, may specifically include: in response to determining that the associated account includes a Manage accounts associated with an account group, showing the accounts and toggle controls associated with managing an account group.
  • the management account group is a group to which the management account of the target file belongs.
  • the account that can send the permission application request can be displayed.
  • the account associated with the management account group can be understood as an account that can send permission application requests or an account that can be accessed directly. At this time, these accounts can be displayed so that the user can switch the application account, so as to realize the target file. Access.
  • the present disclosure provides an embodiment of a display device, which corresponds to the display method embodiment shown in FIG. 1 , and the device may specifically be Used in various electronic devices.
  • the display device of this embodiment includes: a first determination unit 1001, configured to determine the associated account of the current account in response to the current account not having the access authority to access the target file, wherein the associated account corresponding to the associated account The user is matched with the user corresponding to the above-mentioned current account; the display unit 1002 is used to display prompt information based on the relevant authority of each associated account for the above-mentioned target file, wherein the above-mentioned prompt information is used to prompt the way to access the above-mentioned target file, and the above-mentioned related Permissions include at least one of the following: access permissions, application permissions.
  • the above-mentioned display unit 1002 is specifically configured to: in response to the above-mentioned current account having the application right to access the above-mentioned target file, to display the application control; in response to detecting a trigger operation for the above-mentioned application control, to send a permission application request.
  • the above-mentioned display unit 1002 is further configured to: in response to determining that the associated account includes a first-type associated account with access rights to the above-mentioned target file, display the above-mentioned first-type associated account and the access control.
  • the above-mentioned display unit 1002 is further configured to: in response to detecting a trigger operation for the above-mentioned access control, switch to the above-mentioned first type of associated account, and display the above-mentioned target file.
  • the above-mentioned display unit 1002 is further configured to: in response to determining that the associated account includes an account associated with the management account group, display the above-mentioned account and access control associated with the management account group, wherein the above-mentioned account is The management account group is the group to which the management account of the above target file belongs.
  • the display unit 1002 is further configured to hide the account list of the associated account in response to determining that the associated account does not include an account having the relevant authority for the target file.
  • the display unit 1002 is further configured to hide the account list of the associated accounts in response to determining that the associated accounts do not include accounts having access rights to the target file.
  • the display interface includes a folding control
  • the above-mentioned display unit 1002 is further configured to: in response to detecting a triggering operation for the above-mentioned folding control, display the account list of the associated account.
  • the above-mentioned display unit 1002 is further configured to: determine whether the group to which each associated account belongs includes a management account group, wherein the above-mentioned management account group is the group to which the management account of the above-mentioned target file belongs; In response to determining that the group to which each associated account belongs includes the above-mentioned management account group, the associated accounts belonging to the above-mentioned management account group are displayed in a predefined prominent position.
  • the above-mentioned displaying unit 1002 in response to the current account not having the application right to access the target file, is further configured to: in response to determining that the associated account does not have the access right and/or application right to the above-mentioned target file. Account, hides the account list of linked accounts.
  • the above-mentioned displaying unit 1002 in response to the above-mentioned current account not having the application right to access the above-mentioned target file, is further configured to: in response to determining that the associated account includes a second type of association having the application right to the above-mentioned target file Accounts, showing the second type of linked accounts and toggle controls.
  • the above-mentioned apparatus further includes a switching unit 1003, configured to switch to the above-mentioned second type of associated account in response to detecting a trigger operation for the switch control; Trigger an operation to send a permission application request.
  • the above-mentioned display unit 1002 in response to the above-mentioned current account not having the application right to access the target file; is further configured to: in response to determining that the associated account includes an account associated with the management account group, display the above-mentioned An account and a switch control associated with a management account group, wherein the management account group is a group to which the management account of the target file belongs.
  • FIG. 11 illustrates an exemplary system architecture to which the presentation method of an embodiment of the present disclosure may be applied.
  • the system architecture may include terminal devices 1101 , 1102 , and 1103 , a network 1104 , and a server 1105 .
  • the network 1104 may be the medium used to provide the communication link between the end devices 1101 , 1102 , 1103 and the server 1105 .
  • the network 1104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
  • the terminal devices 1101, 1102, 1103 can interact with the server 1105 through the network 1104 to receive or send messages and the like.
  • Various client applications may be installed on the terminal devices 1101 , 1102 and 1103 , such as web browser applications, search applications, and news information applications.
  • the client applications in the terminal devices 1101, 1102, and 1103 can receive the user's instruction, and complete corresponding functions according to the user's instruction, such as adding corresponding information to the information according to the user's instruction.
  • the terminal devices 1101, 1102, and 1103 may be hardware or software.
  • the terminal devices 1101, 1102, and 1103 can be various electronic devices that have a display screen and support web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, Moving Picture Experts Compression Standard Audio Layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, Moving Picture Experts Compression Standard Audio Layer 4) Players, Laptops and Desktops, etc.
  • the terminal devices 1101, 1102, and 1103 are software, they can be installed in the electronic devices listed above. It can be implemented as multiple software or software modules (eg, software or software modules for providing distributed services), or as a single software or software module. There is no specific limitation here.
  • the server 1105 may be a server that provides various services, such as receiving information acquisition requests sent by terminal devices 1101 , 1102 , and 1103 , and acquiring display information corresponding to the information acquisition requests in various ways according to the information acquisition requests. And the related data of the displayed information is sent to the terminal devices 1101 , 1102 , and 1103 .
  • the information processing method provided by the embodiments of the present disclosure may be executed by a terminal device, and correspondingly, the display apparatus may be set in the terminal devices 1101 , 1102 , and 1103 .
  • the information processing method provided by the embodiments of the present disclosure may also be executed by the server 1105 , and accordingly, the information processing apparatus may be provided in the server 1105 .
  • terminal devices, networks and servers in FIG. 4 are only illustrative. There can be any number of terminal devices, networks, and servers according to implementation needs.
  • FIG. 12 shows a schematic structural diagram of an electronic device (eg, the terminal device or the server in FIG. 11 ) suitable for implementing an embodiment of the present disclosure.
  • Terminal devices in the embodiments of the present disclosure may include, but are not limited to, mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablets), PMPs (portable multimedia players), vehicle-mounted terminals (eg, mobile terminals such as in-vehicle navigation terminals), etc., and stationary terminals such as digital TVs, desktop computers, and the like.
  • the electronic device shown in FIG. 12 is only an example, and should not impose any limitation on the function and scope of use of the embodiments of the present disclosure.
  • the electronic device may include a processing device (eg, a central processing unit, a graphics processor, etc.) 1201 that may be loaded into a random access memory according to a program stored in a read only memory (ROM) 1202 or from a storage device 1208
  • the program in the (RAM) 1203 executes various appropriate operations and processes.
  • various programs and data required for the operation of the electronic device 1200 are also stored.
  • the processing device 1201, the ROM 1202, and the RAM 1203 are connected to each other through a bus 1204.
  • An input/output (I/O) interface 12011 is also connected to the bus 1204 .
  • I/O interface 1205 input devices 1205 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, a liquid crystal display (LCD), speakers, vibration An output device 1207 of a computer, etc.; a storage device 1208 including, for example, a magnetic tape, a hard disk, etc.; and a communication device 1209.
  • Communication means 1209 may allow electronic devices to communicate wirelessly or by wire with other devices to exchange data. While FIG. 12 shows an electronic device having various means, it should be understood that not all of the illustrated means are required to be implemented or available. More or fewer devices may alternatively be implemented or provided.
  • embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated in the flowchart.
  • the computer program may be downloaded and installed from the network via the communication device 1209 , or from the storage device 1208 , or from the ROM 1202 .
  • the processing apparatus 1201 the above-mentioned functions defined in the methods of the embodiments of the present disclosure are executed.
  • the computer-readable medium mentioned above in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the above two.
  • the computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. More specific examples of computer readable storage media may include, but are not limited to, electrical connections having one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device .
  • Program code embodied on a computer readable medium may be transmitted using any suitable medium including, but not limited to, electrical wire, optical fiber cable, RF (radio frequency), etc., or any suitable combination of the foregoing.
  • clients and servers can communicate using any currently known or future developed network protocols such as HTTP (HyperText Transfer Protocol), and can communicate with digital data in any form or medium.
  • Communication eg, a communication network
  • Examples of communication networks include local area networks (“LAN”), wide area networks (“WAN”), the Internet (eg, the Internet), and peer-to-peer networks (eg, ad hoc peer-to-peer networks), as well as any currently known or future development network of.
  • the above-mentioned computer-readable medium may be included in the above-mentioned electronic device; or may exist alone without being assembled into the electronic device.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the electronic device, the electronic device: in response to the current account not having the relevant authority to access the target file, determine the status of the current account. an associated account, wherein the user corresponding to the associated account is the user corresponding to the current account; based on the relevant authority of each associated account for the target file, prompt information is displayed, wherein the prompt information is used to prompt the way to access the target file,
  • the above-mentioned relevant permissions include at least one of the following: access permissions and application permissions.
  • Computer program code for performing operations of the present disclosure may be written in one or more programming languages, including but not limited to object-oriented programming languages—such as Java, Smalltalk, C++, and This includes conventional procedural programming languages - such as the "C" language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through Internet connection).
  • LAN local area network
  • WAN wide area network
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions.
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented in dedicated hardware-based systems that perform the specified functions or operations , or can be implemented in a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments of the present disclosure may be implemented in a software manner, and may also be implemented in a hardware manner. Wherein, the name of the unit does not constitute a limitation of the unit itself under certain circumstances.
  • the first determining unit 401 may also be described as "a unit for determining the associated account of the above-mentioned current account”.
  • exemplary types of hardware logic components include: Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), Systems on Chips (SOCs), Complex Programmable Logical Devices (CPLDs) and more.
  • FPGAs Field Programmable Gate Arrays
  • ASICs Application Specific Integrated Circuits
  • ASSPs Application Specific Standard Products
  • SOCs Systems on Chips
  • CPLDs Complex Programmable Logical Devices
  • a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with the instruction execution system, apparatus or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices, or devices, or any suitable combination of the foregoing.
  • machine-readable storage media would include one or more wire-based electrical connections, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), fiber optics, compact disk read only memory (CD-ROM), optical storage, magnetic storage, or any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read only memory
  • EPROM or flash memory erasable programmable read only memory
  • CD-ROM compact disk read only memory
  • magnetic storage or any suitable combination of the foregoing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

本公开实施例公开了的展示方法、装置和电子设备,在当前账户不具备访问目标文件的访问权限时,会先确定当前账户的关联账户,并可以根据关联账户针对目标文件的相关权限,展示提示信息。而相关权限可以包括:访问权限和申请权限;因此,可以根据关联账户对目标文件所具备的权限不同,展示相应的提示信息。也即,提示信息可以提示访问目标文件的方式,因此,用户可以根据提示信息的提示,高效率的访问目标文件。

Description

展示方法、装置和电子设备
相关申请的交叉引用
本申请要求于2020年11月30日提交的,申请号为202011384244.6、发明名称为“展示方法、装置和电子设备”的中国专利申请的优先权,该申请的全文通过引用结合在本申请中。
技术领域
本公开涉及互联网技术领域,尤其涉及一种展示方法、装置和电子设备。
背景技术
随着科学技术的发展,终端应用所具备的功能也越来越完善,例如,一些办公软件还支持浏览在线文档。而为了保证在线文档的隐私安全,通常会为用户账户设定访问权限,也即,当用户的账户具备了文档所要求的访问权限时,可以实现对在线文档的访问功能。
发明内容
提供该公开内容部分以便以简要的形式介绍构思,这些构思将在后面的具体实施方式部分被详细描述。该公开内容部分并不旨在标识要求保护的技术方案的关键特征或必要特征,也不旨在用于限制所要求的保护的技术方案的范围。
本公开实施例提供了一种展示方法、装置和电子设备,通过展示提示信息,可以提示用户访问目标文件的方式,从而可以使得用户可以高效 的访问到目标文件。
第一方面,本公开实施例提供了一种展示方法,包括:响应于当前账户不具备访问目标文件的访问权限,确定上述当前账户的关联账户,其中,上述关联账户对应的用户与上述当前账户对应的用户相匹配;基于各关联账户针对上述目标文件的相关权限,展示提示信息,其中,上述提示信息用于提示访问上述目标文件的方式,上述相关权限包括以下至少一项:访问权限、申请权限。
第二方面,本公开实施例提供了一种展示装置,包括:第一确定单元,用于响应于当前账户不具备访问目标文件的访问权限,确定上述当前账户的关联账户,其中,上述关联账户对应的用户与上述当前账户对应的用户相匹配;展示单元,用于基于各关联账户针对上述目标文件的相关权限,展示提示信息,其中,上述提示信息用于提示访问上述目标文件的方式,上述相关权限以下至少一项:访问权限、申请权限。
第三方面,本公开实施例提供了一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当上述一个或多个程序被上述一个或多个处理器执行,使得上述一个或多个处理器实现如第一方面上述的展示方法。
第四方面,本公开实施例提供了一种计算机可读介质,其上存储有计算机程序,该程序被处理器执行时实现如第一方面上述的展示方法的步骤。
本公开实施例提供的展示方法、装置和电子设备,在当前账户不具备访问目标文件的访问权限时,会先确定当前账户的关联账户,并可以根据关联账户针对目标文件的相关权限,展示提示信息。而相关权限可以包括:访问权限和申请权限;因此,可以根据关联账户对目标文件所具备的权限不同,展示相应的提示信息。也即,提示信息可以提示访问目标文件 的方式,因此,用户可以根据提示信息的提示,高效率的访问目标文件。
附图说明
结合附图并参考以下具体实施方式,本公开各实施例的上述和其他特征、优点及方面将变得更加明显。贯穿附图中,相同或相似的附图标记表示相同或相似的元素。应当理解附图是示意性的,原件和元素不一定按照比例绘制。
图1是根据本公开的展示方法的一个实施例的流程图;
图2是根据本公开的展示方法的一个实施例的界面展示示意图;
图3是根据本公开的展示方法的又一个实施例的界面展示示意图;
图4是根据本公开的展示方法的又一个实施例的界面展示示意图;
图5A和5B是根据本公开的展示方法的又一个实施例的界面展示示意图;
图6是根据本公开的展示方法的又一个实施例的界面展示示意图;
图7A和图7B是根据本公开的展示方法的又一个实施例的界面展示示意图;
图8是根据本公开的展示方法的又一个实施例的界面展示示意图;
图9是根据本公开的展示方法的又一个实施例的界面展示示意图;
图10是根据本公开的展示装置的一个实施例的结构示意图;
图11是本公开的一个实施例的展示方法可以应用于其中的示例性系统架构;
图12是根据本公开实施例提供的电子设备的基本结构的示意图。
具体实施方式
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实 现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。
应当理解,本公开的方法实施方式中记载的各个步骤可以按照不同的顺序执行,和/或并行执行。此外,方法实施方式可以包括附加的步骤和/或省略执行示出的步骤。本公开的范围在此方面不受限制。
本文使用的术语“包括”及其变形是开放性包括,即“包括但不限于”。术语“基于”是“至少部分地基于”。术语“一个实施例”表示“至少一个实施例”;术语“另一实施例”表示“至少一个另外的实施例”;术语“一些实施例”表示“至少一些实施例”。其他术语的相关定义将在下文描述中给出。
需要注意,本公开中提及的“第一”、“第二”等概念仅用于对不同的装置、模块或单元进行区分,并非用于限定这些装置、模块或单元所执行的功能的顺序或者相互依存关系。
需要注意,本公开中提及的“一个”、“多个”的修饰是示意性而非限制性的,本领域技术人员应当理解,除非在上下文另有明确指出,否则应该理解为“一个或多个”。
本公开实施方式中的多个装置之间所交互的消息或者信息的名称仅用于说明性的目的,而并不是用于对这些消息或信息的范围进行限制。
请参考图1,其示出了根据本公开的展示方法的一个实施例的流程。该展示方法可以应用于终端设备。如图1所示该展示方法,包括以下步骤:
步骤101,响应于当前账户不具备访问目标文件的访问权限,确定当前账户的关联账户。
在这里,当前账户可以理解为:用户当前登录应用的账户。
在这里,关联账户所指示的用户与当前账户所指示的用户相匹配,作 为示例,当前账户和当前账户的关联账户为同一用户的账户,也即,当前账户和关联账户可以为根据同一身份标识进行注册的账户。
作为示例,身份标识可以为用户的通信号码、邮箱等。
在这里,目标文件可以为在线文件。作为示例,在线文件在创建时,可能仅对某些账户开放了相关权限,也即,用户利用对目标文件不具备相关权限的账户,则无法对目标文件进行访问。
在这里,当前账户不具备访问目标文件的访问权限,则可以表征无法利用当前账户访问目标文件。
在一些实施例中,当前账户可以具备针对目标文件的申请权限,仅是,当前账户不具备目标文件的访问权限。也即,当前账户不具备目标文件的访问权限,则可以表征无法利用当前账户访问目标文件,当前账户具备申请权限时,也无法利用利用当前账户访问目标文件,但可以利用当前账户申请访问目标文件。
步骤102,基于各关联账户针对目标文件的相关权限,展示提示信息。
在这里,提示信息用于提示访问目标文件的方式。
在这里,相关权限包括以下至少一项:访问权限、申请权限。
在这里,访问权限可以是对目标文件直接进行访问的权限,也即,用户可以利用具备目标文件的访问权限的账户,直接访问目标文件。
在这里,申请权限可以是对目标文件申请访问的权限。也即,用户可以利用具备申请权限的账户,发送用于指示申请访问目标文件的请求。
在这里,访问目标文件的方式,可以包括:直接访问、先申请访问权限然后访问。
作为示例,可以利用对目标文件具备访问权限的关联账户访问目标文件,可以利用对目标文件具备申请权限的关联账户,申请获取目标文件访问权限的请求。
可以看出,在当前账户不具备访问目标文件的访问权限时,会先确定当前账户的关联账户,并可以根据关联账户针对目标文件的相关权限,展示提示信息。而相关权限可以包括:访问权限和申请权限;因此,可以根据关联账户对目标文件所具备的权限不同,展示相应的提示信息。也即,提示信息可以提示访问目标文件的方式,因此,用户可以根据提示信息的提示,高效率的访问目标文件。
在一些实施例中,提示信息可以为文本信息,用户可以根据提示信息指示,选择获取目标文件的访问权限的方式。
在一些实施例中,当前账户和关联账户可以是用户在同一应用的不同组群内的账户。举例说明,某个用于办公的应用A,可能在公司的各个组群(在一些实现方式中,每个组群均可以理解为租户)均使用应用A进行办公。比如,存在五个组群,若用户为组群内的办公人员时,则可能需要注册与该组群对应的账户;因此,当一个用户在需要在多个组群办公时(比如:处理流程的人员、处理人事的人员等),则该用户可能存在多个账户。
作为示例,某些文件可能是针对该组群特定的文件(例如,某个在线文件记录的内容为该组群内员工的身份信息),则这些文件可能不允许对外公开,也即,可能仅有特定组群中的账户才可以申请访问权限。相应的,当该在线文件可以对外公开时,则可以表征不仅特定组群中的账户可以申请访问权限,其它组群中的账户也可以申请访问权限。
在一些实施例中,当前账户不具备访问目标文件的访问权限;步骤102(基于各关联账户针对目标文件的相关权限,展示提示信息),具体可以包括:响应于当前账户具备访问目标文件的申请权限,展示申请控件;响应于对申请控件的触发操作,发送权限申请请求。
在一些实施例中,可以如图2所示,在展示界面展示申请控件201, 当针对申请控件201执行触发操作之后,可以发送权限申请请求。
在一些实施例中,权限申请请求可以为用于指示获取目标文件的相关权限。
在这里,相关权限可以包括针对目标文件的访问权限(仅能对目标文件进行阅读,而无法进行编辑)、编辑权限(可以对目标文件进行编辑和阅读)等。
在一些实施例中,权限申请请求中可以包括当前账户和具体申请理由,而具体申请理由可以是用户预设的,也可以是用户输入的。也即,如图3所示,在展示界面可以展示申请理由输入框301,用户可以在输入框中输入具体申请理由。
在一些实施例中,步骤102(基于各关联账户针对目标文件的相关权限,展示提示信息),具体可以包括:响应于确定关联账户中包括具备针对目标文件的访问权限的第一类型关联账户,展示第一类型关联账户和访问控件。
在这里,第一类型关联账户具备目标文件的访问权限。
在一些实施例中,当某个用户在创建目标文件时,可能将某些账户确定为可以直接对该目标文件进行访问的账户,也即,这些账户则具备对该目标文件的访问权限。
在一些实施例中,当关联账户中包括第一类型关联账户时,则可以表征该用户的某个账户可以直接访问该目标文档。举例说明,某个用户拥有3个账户,当前登录的账户不具备目标文件的访问权限,而与该账户对应的另两个关联账户中的其中一个关联账户具备目标文件的访问权限时,则可以直接将该具备目标文件访问权限的关联账户进行展示,并可以展示该关联账户的访问控件。也即,此时,具备目标文件访问权限的关联账户可以理解为第一类型关联账户。
在这里,通过将第一类型关联账户和访问控件进行展示的方式,可以使得用户可以获知利用具体哪个关联账户去访问目标文件,也即,进一步地提升了用户访问到目标文件的效率。
在一些实施例中,响应于检测到针对访问控件的触发操作,切换至第一类型关联账户,并展示目标文件。
可以如图4所示,可以将第一类型关联账户和访问控件(图4中的黑色圆框可以表征访问控件)直接进行展示。当然,在具体实施方式中,还可以展示第一类型关联账户的名称,以及第一类型关联账户的组群标识等。而当访问控件被触发时,则可以直接将当前账户转换为第一类型关联账户,并可以利用第一类型关联账户访问目标文件。
在一些实施例中,当关联账户中包括第一类型关联账户时,可以直接展示第一类型关联账户和访问标识,从而使得用户仅需对第一类型关联账户的访问控件进行触发操作,即可利用第一类型关联账户访问目标文件。也即,使得用户可以便捷地实现对目标文件的访问。
在一些实施例中,响应于确定关联账户中包括与关联账户相关联的账户,展示与管理账户组群相关联的账户和访问控件。
在这里,管理账户群组为目标文件关联账户所属的群主。
在一些实施例中,与管理账户组群相关联的账户可以理解为第一类型关联账户,因此,可以将这些账户进行展示,以便用户利用这些账户实现对目标文件的访问。
在一些实施例中,用户为了设置的方便性,以组群为单位授予相关权限,例如,可以将管理账户组群确定为访问权限群组,则管理账户群组中的所有账户均具备目标文件的访问权限。此时,与管理账户组群相关联的账户则可以理解为管理账户组群中的所有账户。
在一些实施例中,步骤102(基于各关联账户针对目标文件的相关权 限,展示提示信息),具体可以包括:响应于确定关联账户中不包括具备针对目标文件的相关权限的账户,隐藏关联账户的账户列表。
在一些实施例中,当关联账户不具备针对目标文件的相关权限时,则可以表征用户也无法利用关联账户访问目标文件,为了使展示界面的整洁,则可以将关联账户进行隐藏。
在一些实施例中,响应于确定关联账户中不包括具备针对目标文件的访问权限的账户,隐藏关联账户的账户列表。
在一些实施例中,当前账户不具备访问权限,且关联账户中不包括具备针对目标文件的访问权限的账户。则可以表征关联账户中的账户针对目标文件的权限与当前账户针对目标文件的权限相同,或者更低。因此,为了展示界面的简洁,可以隐藏关联账户的账户列表。
举例说明,当前账户具备目标文件的申请权限,而关联账户也具备目标文件的申请权限,则用户可以直接利用当前账户申请目标文件的相关权限。因此,为了使展示界面看起来更加简洁,可以将关联账户进行隐藏。
在这里需要说明的是,用户在申请目标文件相关权限时,可以申请针对目标文件的访问权限(仅能对目标文件进行阅读,而无法进行编辑)、编辑权限(可以对目标文件进行编辑和阅读)等。
在一些实施例中,展示界面包括折叠控件,响应于检测到针对折叠控件的触发操作,展示关联账户的账户列表。
在一些实施例中,用户可以通过触发折叠控件展示关联账户。
在一些实施例中,展示的关联账户可以是对目标文件具有相关权限的关联账户,也即,当某个账户对目标文件不具备相关权限时,则该关联账户则不会被展示。
在一些实施例中,可以如图5A和图5B所示,图5A为不展示账户列表的界面示意图,当折叠控件501被触发之后,则可以展示如图5B所 示的界面示意图。也即,折叠控件501的设置可以使整个展示页面更加整洁,同时,用户触发折叠控件501之后,也可以将账户列表展示出来,以便用户切换申请账户(用户发送申请权限请求的账户)。
在一些实施例中,对目标文件具备申请权限的账户在展示时,可以展示对应的切换控件(图5A和图5B中的白色圆框),也即,当用户针对切换控件执行触发操作时,则可以将申请账户确定为该账户。
在一些实施例中,还可以确定各关联账户所属的组群中是否包括管理账户组群,响应于确定各关联账户所属的组群中包括管理账户组群,将属于管理账户组群的关联账号,展示在预定义突出位置。
在这里,管理账户群组为目标文件的管理账户所属的群组。
在一些实施例中,由于管理账户组群可以理解为目标文件的管理账户所属的群组,因此,目标文件的管理者可能会经常活跃在该群组内;进而利用管理账户组群中的关联账户发送申请访问权限请求,获得申请权限的概率较大。进而可以将属于管理账户组群的关联账号,展示在预定义突出位置。
在一些实施例中,预定义的突出位置可以是顶置位置,也即,当依次显示多个第二类型关联账户时,将属于管理账户组群的关联账号进行顶置展示。如图6所示,若关联账户c属于管理账户组群的关联账号,则可以将关联账户c进行顶置展示。而属于管理账户组群的关联账号相较于,处于管理账户组群之外的关联账号具有更大的可能性获取到目标文件的访问权限。因此,通过将属于管理账户组群的关联账号,展示在预定义突出位置,可以进一步增加用户访问到目标文件的效率。
在一些实施例中,响应于当前账户不具备访问目标文件的申请权限,响应于确定关联账户中不包括具备针对目标文件的访问权限和/或申请权限的账户,隐藏关联账户的账户列表。
在一些实施例中,当前账户不具备访问目标文件的申请权限时,且关联账户中不包括具备针对目标文件的访问权限和/或申请权限的账户。则可以表征此时用户也无法利用关联账户获取目标文件的相关权限,因此,可以隐藏关联账户的账户列表。
在一些实施例中,某些文档是需要保密的(也即,仅有该组群内的用户才能访问,而其它用户不能访问),因此,某些组群中的账户则不具备申请权限。而某些文档可能无需保密,则可能组群内的账户均具备申请权限。也即,可以理解为目标文件的公开类型可以分为组内公开类型和开放公开类型。
也即,当目标文件的公开类型为开放公开类型时,当前账户与关联账户均具备申请权限,则可以展示申请控件;若关联账户中具备第一类型账户,则可以则将第一类型账户和访问控件进行展示,并将关联账户中除去第一类型账户的其它账户进行隐藏,如图7A所示(图7A中展示了申请控件701、第一类型关联账户和访问控件、折叠控件);若管理账户中不具备第一类型账户,则可以隐藏关联账户的账户列表,则可以如图7B所示(图7B中展示了申请控件701和折叠控件)。
当目标文件的公开类型为组内公开,当前账户具备申请权限,则可以展示申请控件,若关联账户中具备第一类型账户,则可以则将第一类型账户和访问控件进行展示。
若当前账户具备申请权限,但关联账户中具备第二类型账户(对目标文件具备申请权限的账户),则可以则将第二类型账户和切换控件进行展示(如图8所示,图8中仅展示了第二类型账户和切换控件);若关联账户不具备目标文件的相关权限,则可以隐藏关联账户的账户列表。
在一些实施例中,响应于当前账户不具备访问目标文件的申请权限;响应于确定关联账户中包括具备针对目标文件的申请权限的第二类型关 联账户,展示第二类型关联账户和切换控件。
在这里,切换控件用于触发发送权限申请请求。
在一些实施例中,响应于检测到针对切换控件的触发操作,切换至第二类型关联账户;响应于针对第二类型关联账户下的申请控件的触发操作,发送权限申请请求。
在一些实施例中,当针对切换控件执行触发操作之后,可以将触发操作所指示的第二类型关联账户作为申请账户,并可以展示申请控件。当针对申请控件执行触发操作之后,可以发送权限申请请求。
在一些实施例中,当前账户不具备目标文件的申请权限,还可以展示指示信息。
在一些实施例中,指示信息可以指示目标文件的公开类型为组内公开;如图9所示,可以在展示界面展示指示信息901。指示信息可以用于指示当前账户不再管理账户组群内,因此无法发送申请访问权限请求。当然,指示信息的具体内容,可以根据具体实施方式进行设定,在此并不对指示信息的具体内容进行限定,仅需根据实际情况进行合理设定即可。
在一些实施例中,通过展示指示信息或申请控件,使得用户可以便捷的获知当前获取目标文件访问权限应采取的方式,从而使得用户可以更加高效的访问到目标文件。
在一些实施例中,响应于当前账户不具备访问目标文件的申请权限,步骤102(基于各关联账户针对目标文件的相关权限,展示提示信息),具体可以包括:响应于确定关联账户中包括与管理账户组群相关联的账户,展示与管理账户组群相关联的账户和切换控件。
在这里,所述管理账户群组为所述目标文件的管理账户所属的群组。
在一些实施例中,当前账户不具备访问目标文件的申请权限时,则可以表征此时无法利用当前账户发送权限申请请求,因此,可以将能够发送 权限申请请求的账户进行展示。而在这里,管理账户组群相关联的账户可以理解为可以发送权限申请请求的账户或可以直接访问的账户,此时,可以将这些账户进行展示,以便用户切换申请账户,从而实现对目标文件的访问。
进一步参考图10,作为对上述各图所示方法的实现,本公开提供了一种展示装置的一个实施例,该装置实施例与图1所示的展示方法实施例相对应,该装置具体可以应用于各种电子设备中。
如图10所示,本实施例的展示装置包括:第一确定单元1001,用于响应于当前账户不具备访问目标文件的访问权限,确定上述当前账户的关联账户,其中,上述关联账户对应的用户与上述当前账户对应的用户相匹配;展示单元1002,用于基于各关联账户针对上述目标文件的相关权限,展示提示信息,其中,上述提示信息用于提示访问上述目标文件的方式,上述相关权限包括以下至少一项:访问权限、申请权限。
在一些实施例中,上述展示单元1002具体用于:响应于上述当前账户具备访问上述目标文件的申请权限,展示申请控件;响应于检测到针对上述申请控件的触发操作,发送权限申请请求。
在一些实施例中,上述展示单元1002具体还用于:响应于确定关联账户中包括具备针对上述目标文件的访问权限的第一类型关联账户,展示上述第一类型关联账户和访问控件。
在一些实施例中,上述展示单元1002具体还用于:响应于检测到针对上述访问控件的触发操作,切换至上述第一类型关联账户,并展示上述目标文件。
在一些实施例中,上述展示单元1002具体还用于:响应于确定关联账户中包括与管理账户组群相关联的账户,展示上述与管理账户组群相关联的账户和访问控件,其中,上述管理账户群组为上述目标文件的管理 账户所属的群组。
在一些实施例中,上述展示单元1002具体还用于:响应于确定关联账户中不包括具备针对上述目标文件的相关权限的账户,隐藏关联账户的账户列表。
在一些实施例中,上述展示单元1002具体还用于:响应于确定关联账户中不包括具备针对上述目标文件的访问权限的账户,隐藏关联账户的账户列表。
在一些实施例中,展示界面包括折叠控件,上述展示单元1002具体还用于:响应于检测到针对上述折叠控件的触发操作,展示关联账户的账户列表。
在一些实施例中,上述展示单元1002具体还用于:确定各关联账户所属的组群中是否包括管理账户组群,其中,上述管理账户群组为上述目标文件的管理账户所属的群组;响应于确定各关联账户所属的组群中包括上述管理账户组群,将属于上述管理账户组群的关联账号,展示在预定义突出位置。
在一些实施例中,响应于当前账户不具备访问目标文件的申请权限,上述展示单元1002具体还用于:响应于确定关联账户中不包括具备针对上述目标文件的访问权限和/或申请权限的账户,隐藏关联账户的账户列表。
在一些实施例中,响应于上述当前账户不具备访问上述目标文件的申请权限,上述展示单元1002具体还用于:响应于确定关联账户中包括具备针对上述目标文件的申请权限的第二类型关联账户,展示第二类型关联账户和切换控件。
在一些实施例中,上述装置还包括切换单元1003,用于响应于检测到针对切换控件的触发操作,切换至上述第二类型关联账户;响应于针对 上述第二类型关联账户下的申请控件的触发操作,发送权限申请请求。
在一些实施例中,响应于上述当前账户不具备访问所述目标文件的申请权限;上述展示单元1002具体还用于:响应于确定关联账户中包括与管理账户组群相关联的账户,展示上述与管理账户组群相关联的账户和切换控件,其中,上述管理账户群组为上述目标文件的管理账户所属的群组。
请参考图11,图11示出了本公开的一个实施例的展示方法可以应用于其中的示例性系统架构。
如图11所示,系统架构可以包括终端设备1101、1102、1103,网络1104,服务器1105。网络1104可以用以在终端设备1101、1102、1103和服务器1105之间提供通信链路的介质。网络1104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
终端设备1101、1102、1103可以通过网络1104与服务器1105交互,以接收或发送消息等。终端设备1101、1102、1103上可以安装有各种客户端应用,例如网页浏览器应用、搜索类应用、新闻资讯类应用。终端设备1101、1102、1103中的客户端应用可以接收用户的指令,并根据用户的指令完成相应的功能,例如根据用户的指令在信息中添加相应信息。
终端设备1101、1102、1103可以是硬件,也可以是软件。当终端设备1101、1102、1103为硬件时,可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型 便携计算机和台式计算机等等。当终端设备1101、1102、1103为软件时,可以安装在上述所列举的电子设备中。其可以实现成多个软件或软件模块(例如用来提供分布式服务的软件或软件模块),也可以实现成单个软件或软件模块。在此不做具体限定。
服务器1105可以是提供各种服务的服务器,例如接收终端设备1101、1102、1103发送的信息获取请求,根据信息获取请求通过各种方式获取信息获取请求对应的展示信息。并展示信息的相关数据发送给终端设备1101、1102、1103。
需要说明的是,本公开实施例所提供的信息处理方法可以由终端设备执行,相应地,展示装置可以设置在终端设备1101、1102、1103中。此外,本公开实施例所提供的信息处理方法还可以由服务器1105执行,相应地,信息处理装置可以设置于服务器1105中。
应该理解,图4中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。
下面参考图12,其示出了适于用来实现本公开实施例的电子设备(例如图11中的终端设备或服务器)的结构示意图。本公开实施例中的终端设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图12示出的电子设备仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。
如图12所示,电子设备可以包括处理装置(例如中央处理器、图形处理器等)1201,其可以根据存储在只读存储器(ROM)1202中的程序或者从存储装置1208加载到随机访问存储器(RAM)1203中的 程序而执行各种适当的动作和处理。在RAM 1203中,还存储有电子设备1200操作所需的各种程序和数据。处理装置1201、ROM1202以及RAM 1203通过总线1204彼此相连。输入/输出(I/O)接口12011也连接至总线1204。
通常,以下装置可以连接至I/O接口1205:包括例如触摸屏、触摸板、键盘、鼠标、摄像头、麦克风、加速度计、陀螺仪等的输入装置1205;包括例如液晶显示器(LCD)、扬声器、振动器等的输出装置1207;包括例如磁带、硬盘等的存储装置1208;以及通信装置1209。通信装置1209可以允许电子设备与其他设备进行无线或有线通信以交换数据。虽然图12示出了具有各种装置的电子设备,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在非暂态计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置1209从网络上被下载和安装,或者从存储装置1208被安装,或者从ROM1202被安装。在该计算机程序被处理装置1201执行时,执行本公开实施例的方法中限定的上述功能。
需要说明的是,本公开上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线 的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(射频)等等,或者上述的任意合适的组合。
在一些实施方式中,客户端、服务器可以利用诸如HTTP(HyperText Transfer Protocol,超文本传输协议)之类的任何当前已知或未来研发的网络协议进行通信,并且可以与任意形式或介质的数字数据通信(例如,通信网络)互连。通信网络的示例包括局域网(“LAN”),广域网(“WAN”),网际网(例如,互联网)以及端对端网络(例如,ad hoc端对端网络),以及任何当前已知或未来研发的网络。
上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:响应于当前账户不具备访问目标文件的相关权限,确定上述当前账户的关联账户,其中,上述 关联账户对应的用户为上述当前账户对应的用户;基于各关联账户针对上述目标文件的相关权限,展示提示信息,其中,上述提示信息用于提示访问上述目标文件的方式,上述相关权限包括以下至少一项:访问权限、申请权限。
可以以一种或多种程序设计语言或其组合来编写用于执行本公开的操作的计算机程序代码,上述程序设计语言包括但不限于面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本公开实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,第一确定单元401还可以被描述为“确定上述当前账户的关联账户的单元”。
本文中以上描述的功能可以至少部分地由一个或多个硬件逻辑部件来执行。例如,非限制性地,可以使用的示范类型的硬件逻辑部件包括:现场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、片上系统(SOC)、复杂可编程逻辑设备(CPLD)等等。
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。
以上描述仅为本公开的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本公开中所涉及的公开范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述公开构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本公开中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。
此外,虽然采用特定次序描绘了各操作,但是这不应当理解为要求这些操作以所示出的特定次序或以顺序次序执行来执行。在一定环境下,多任务和并行处理可能是有利的。同样地,虽然在上面论述中包含了若干具体实现细节,但是这些不应当被解释为对本公开的范围的限制。在单独的实施例的上下文中描述的某些特征还可以组合地实现在单个实施例中。相反地,在单个实施例的上下文中描述的各种特征也可以单独地或以任何合适的子组合的方式实现在多个实施例中。
尽管已经采用特定于结构特征和/或方法逻辑动作的语言描述了本主题,但是应当理解所附权利要求书中所限定的主题未必局限于上面描述的特定特征或动作。相反,上面所描述的特定特征和动作仅仅是实现权利要求书的示例形式。

Claims (16)

  1. 一种展示方法,其特征在于,包括:
    响应于当前账户不具备访问目标文件的访问权限,确定所述当前账户的关联账户,其中,所述关联账户对应的用户与所述当前账户对应的用户相匹配;
    基于各关联账户针对所述目标文件的相关权限,展示提示信息,所述相关权限包括以下至少一项:访问权限、申请权限。
  2. 根据权利要求1所述的方法,其特征在于,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:
    响应于所述当前账户具备访问所述目标文件的申请权限,展示申请控件;
    响应于检测到针对所述申请控件的触发操作,发送权限申请请求。
  3. 根据权利要求1所述的方法,其特征在于,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:
    响应于确定关联账户中包括具备针对所述目标文件的访问权限的第一类型关联账户,展示所述第一类型关联账户和访问控件。
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    响应于检测到针对所述访问控件的触发操作,切换至所述第一类型关联账户,并展示所述目标文件。
  5. 根据权利要求1所述的方法,其特征在于,所述基于各关联账户 针对所述目标文件的相关权限,展示提示信息,包括:响应于确定关联账户中包括与管理账户组群相关联的账户,展示所述与管理账户组群相关联的账户和访问控件,其中,所述管理账户群组为所述目标文件的管理账户所属的群组。
  6. 根据权利要求1所述的方法,其特征在于,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:
    响应于确定关联账户中不包括具备针对所述目标文件的相关权限的账户,隐藏关联账户的账户列表。
  7. 根据权利要求6所述的方法,其特征在于,所述响应于确定关联账户中不包括具备针对所述目标文件的相关权限的账户,隐藏关联账户的账户列表,包括:
    响应于确定关联账户中不包括具备针对所述目标文件的访问权限的账户,隐藏关联账户的账户列表。
  8. 根据权利要求1所述的方法,其特征在于,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:
    展示界面包括折叠控件,
    以及,所述方法还包括:
    响应于检测到针对所述折叠控件的触发操作,展示关联账户的账户列表。
  9. 根据权利要求8所述的方法,其特征在于,所述响应于检测到针对所述折叠控件的触发操作,展示所述关联账户的账户列表,包括:
    确定各关联账户所属的组群中是否包括管理账户组群,其中,所述管 理账户群组为所述目标文件的管理账户所属的群组;
    响应于确定各关联账户所属的组群中包括所述管理账户组群,将属于所述管理账户组群的关联账号,展示在预定义突出位置。
  10. 根据权利要求6所述的方法,其特征在于,响应于当前账户不具备访问目标文件的申请权限,
    以及,所述响应于确定关联账户中不包括具备针对所述目标文件的相关权限的账户,隐藏所述关联账户的账户列表,包括:
    响应于确定关联账户中不包括具备针对所述目标文件的访问权限和/或申请权限的账户,隐藏关联账户的账户列表。
  11. 根据权利要求1所述的方法,其特征在于,响应于所述当前账户不具备访问所述目标文件的申请权限,
    以及,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:
    响应于确定关联账户中包括具备针对所述目标文件的申请权限的第二类型关联账户,展示第二类型关联账户和切换控件。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    响应于检测到针对切换控件的触发操作,切换至所述第二类型关联账户;
    响应于针对所述第二类型关联账户下的申请控件的触发操作,发送权限申请请求。
  13. 根据权利要求1所述的方法,其特征在于,响应于所述当前账户不具备访问所述目标文件的申请权限;
    以及,所述基于各关联账户针对所述目标文件的相关权限,展示提示信息,包括:响应于确定关联账户中包括与管理账户组群相关联的账户,展示所述与管理账户组群相关联的账户和切换控件,其中,所述管理账户群组为所述目标文件的管理账户所属的群组。
  14. 一种展示装置,其特征在于,包括:
    第一确定单元,用于响应于当前账户不具备访问目标文件的访问权限,确定所述当前账户的关联账户,其中,所述关联账户对应的用户与所述当前账户对应的用户相匹配;
    展示单元,用于基于各关联账户针对所述目标文件的相关权限,展示提示信息,其中,所述提示信息用于提示访问所述目标文件的方式,所述相关权限以下至少一项:访问权限、申请权限。
  15. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-13中任一所述的方法。
  16. 一种计算机可读介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1-13中任一所述的方法。
PCT/CN2021/129997 2020-11-30 2021-11-11 展示方法、装置和电子设备 WO2022111290A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2023532270A JP2023550819A (ja) 2020-11-30 2021-11-11 呈示方法、装置及び電子機器
US17/816,414 US12067136B2 (en) 2020-11-30 2022-07-30 Display method, display device, and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011384244.6 2020-11-30
CN202011384244.6A CN112487451B (zh) 2020-11-30 2020-11-30 展示方法、装置和电子设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/816,414 Continuation US12067136B2 (en) 2020-11-30 2022-07-30 Display method, display device, and electronic device

Publications (1)

Publication Number Publication Date
WO2022111290A1 true WO2022111290A1 (zh) 2022-06-02

Family

ID=74938419

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/129997 WO2022111290A1 (zh) 2020-11-30 2021-11-11 展示方法、装置和电子设备

Country Status (4)

Country Link
US (1) US12067136B2 (zh)
JP (1) JP2023550819A (zh)
CN (1) CN112487451B (zh)
WO (1) WO2022111290A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062022A (zh) * 2022-06-16 2022-09-16 北京汉端科技有限公司 航空器手册拆分方法、装置、电子设备和计算机可读介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487451B (zh) 2020-11-30 2023-01-17 北京字跳网络技术有限公司 展示方法、装置和电子设备
CN114579014A (zh) * 2022-01-20 2022-06-03 北京达佳互联信息技术有限公司 文档展示方法及装置
CN114742576B (zh) * 2022-03-17 2024-05-31 北京有竹居网络技术有限公司 信息推送方法、装置和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550044A (zh) * 2016-11-24 2017-03-29 腾讯科技(深圳)有限公司 应用下载方法、下载服务器、下载客户端和应用下载系统
CN111324875A (zh) * 2020-02-17 2020-06-23 支付宝(杭州)信息技术有限公司 用户数据的操作权限控制、账户管理方法、装置和系统
CN111831990A (zh) * 2020-07-17 2020-10-27 深圳市丰巢科技有限公司 一种快递员账号管理方法、装置、电子设备及存储介质
CN112487451A (zh) * 2020-11-30 2021-03-12 北京字跳网络技术有限公司 展示方法、装置和电子设备

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08153072A (ja) 1994-09-30 1996-06-11 Toshiba Corp 計算機システム及び計算機システム管理方法
JP3827690B2 (ja) 2003-09-05 2006-09-27 松下電器産業株式会社 データ管理装置、データ管理方法及びそのプログラム
US20050055583A1 (en) 2003-09-05 2005-03-10 Matsushita Electric Industrial Co., Ltd. Data management apparatus, data management method and program thereof
JP2007066206A (ja) 2005-09-01 2007-03-15 Ricoh Co Ltd 文書参照者検索装置及び文書参照者検索方法
US8458775B2 (en) * 2006-08-11 2013-06-04 Microsoft Corporation Multiuser web service sign-in client side components
US8327428B2 (en) * 2006-11-30 2012-12-04 Microsoft Corporation Authenticating linked accounts
KR20120062514A (ko) * 2010-12-06 2012-06-14 한국전자통신연구원 SaaS 환경에서의 권한 관리 장치 및 방법
JP5320433B2 (ja) 2011-05-10 2013-10-23 株式会社日立ソリューションズ 統合検索装置、統合検索システム、統合検索方法
US20130066975A1 (en) * 2011-09-08 2013-03-14 Microsoft Corporation Group Opt-In Links
US9529993B2 (en) * 2012-03-02 2016-12-27 International Business Machines Corporation Policy-driven approach to managing privileged/shared identity in an enterprise
US9208298B2 (en) * 2012-06-18 2015-12-08 Google Inc. Pass through service login to application login
US9367624B2 (en) * 2012-12-21 2016-06-14 Yahoo! Inc. Identity workflow that utilizes multiple storage engines to support various lifecycles
US9953020B2 (en) * 2013-02-21 2018-04-24 Avaya Inc. Collaborative bookmarks
US9509672B1 (en) * 2013-11-08 2016-11-29 Ca, Inc. Providing seamless and automatic access to shared accounts
CN103618717B (zh) * 2013-11-28 2017-12-05 北京奇虎科技有限公司 多账户客户信息的动态认证方法、装置和系统
US9665614B2 (en) * 2014-03-25 2017-05-30 Google Inc. Preventing abuse in content sharing system
US9973505B2 (en) * 2015-01-14 2018-05-15 Samsung Electronics Co., Ltd. Method for controlling contents and electronic device thereof
US9591489B2 (en) * 2015-07-09 2017-03-07 International Business Machines Corporation Controlling application access to applications and resources via graphical representation and manipulation
US10565638B2 (en) * 2016-07-28 2020-02-18 International Business Machines Corporation Selectively shared account access
CN106991336B (zh) * 2017-04-01 2021-01-26 深圳天珑无线科技有限公司 文件管理方法及其装置
CN107273758A (zh) * 2017-05-03 2017-10-20 上海上讯信息技术股份有限公司 一种数据库访问方法及设备
US10853490B2 (en) * 2017-10-26 2020-12-01 Futurewei Technologies, Inc. Method and apparatus for managing hardware resource access in an electronic device
US10785181B2 (en) * 2017-12-19 2020-09-22 Microsoft Technology Licensing, Llc Sharing content to multiple public and private targets in a social network
US11019070B2 (en) * 2018-03-28 2021-05-25 Bank Of America Corporation Differentiating between activities of multiple users using shared accounts to access a computing system
CN110348236B (zh) * 2018-04-02 2024-07-26 腾讯科技(深圳)有限公司 一种文件的操作权限设置方法、装置和存储介质
US11159568B2 (en) * 2018-06-21 2021-10-26 Microsoft Technology Licensing, Llc Account management using account activity usage restrictions
US10769101B2 (en) * 2018-08-23 2020-09-08 Oath Inc. Selective data migration and sharing
US11165776B2 (en) * 2018-08-28 2021-11-02 International Business Machines Corporation Methods and systems for managing access to computing system resources
CN109472607A (zh) * 2018-09-18 2019-03-15 深圳壹账通智能科技有限公司 产品购买请求处理方法、装置、计算机设备和存储介质
US11244034B1 (en) * 2019-06-17 2022-02-08 Amazon Technologies, Inc. Identity and access management for human machine interface applications of industrial control systems
CN110334489A (zh) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 一种统一身份认证系统和方法
CN111709732A (zh) * 2020-06-17 2020-09-25 北京字节跳动网络技术有限公司 展示方法、装置和电子设备
US11620329B2 (en) * 2020-06-19 2023-04-04 Apple Inc. Virtual photos library

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550044A (zh) * 2016-11-24 2017-03-29 腾讯科技(深圳)有限公司 应用下载方法、下载服务器、下载客户端和应用下载系统
CN111324875A (zh) * 2020-02-17 2020-06-23 支付宝(杭州)信息技术有限公司 用户数据的操作权限控制、账户管理方法、装置和系统
CN111831990A (zh) * 2020-07-17 2020-10-27 深圳市丰巢科技有限公司 一种快递员账号管理方法、装置、电子设备及存储介质
CN112487451A (zh) * 2020-11-30 2021-03-12 北京字跳网络技术有限公司 展示方法、装置和电子设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062022A (zh) * 2022-06-16 2022-09-16 北京汉端科技有限公司 航空器手册拆分方法、装置、电子设备和计算机可读介质
CN115062022B (zh) * 2022-06-16 2023-08-18 北京汉端科技有限公司 航空器手册拆分方法、装置、电子设备和计算机可读介质

Also Published As

Publication number Publication date
US12067136B2 (en) 2024-08-20
CN112487451B (zh) 2023-01-17
JP2023550819A (ja) 2023-12-05
US20220366066A1 (en) 2022-11-17
CN112487451A (zh) 2021-03-12

Similar Documents

Publication Publication Date Title
WO2022111290A1 (zh) 展示方法、装置和电子设备
US9652465B2 (en) Aggregate service with enhanced cloud device management
WO2022073418A1 (zh) 权限控制方法、装置和电子设备
WO2022143855A1 (zh) 文档权限的处理方法、装置、电子设备和存储介质
US10594681B2 (en) Aggregate service with user interface
US10511608B2 (en) Aggregate service with file sharing
WO2023124767A1 (zh) 一种基于文档共享的提示方法、装置、设备及介质
WO2021190129A1 (zh) 页面处理方法、装置、电子设备及计算机可读存储介质
CN112256372B (zh) 信息处理方法、装置和电子设备
WO2022148485A1 (zh) 信息展示方法、装置和电子设备
CN115344688B (zh) 业务数据展示方法、装置、电子设备和计算机可读介质
WO2023160578A1 (zh) 信息处理方法、装置、终端和存储介质
US9509509B2 (en) Random identifier generation for offline database
US20140223320A1 (en) Information processing system, information processing device, and method
WO2023273889A1 (zh) 交互方法、装置和电子设备
US9282091B2 (en) Information processing system, information processing device, and authentication method
US20230379279A1 (en) Interaction method and apparatus, and electronic device
WO2023202540A1 (zh) 信息处理方法、装置、电子设备和存储介质
CN112131181A (zh) 存储路径的展示方法、装置以及电子设备
CN112699407A (zh) 业务数据的访问方法、装置、设备和存储介质
WO2023001276A1 (zh) 信息展示方法、装置、终端和存储介质
US10506040B2 (en) Aggregate service with enhanced remote device management
WO2022184037A1 (zh) 文档处理方法、装置、设备和介质
US20230396621A1 (en) Method and system for creating social media content collections
WO2023179739A1 (zh) 信息交互方法、装置和电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21896791

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023532270

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21896791

Country of ref document: EP

Kind code of ref document: A1