WO2022245291A2 - Method and apparatus for managing resources, computer device and storage medium - Google Patents

Method and apparatus for managing resources, computer device and storage medium Download PDF

Info

Publication number
WO2022245291A2
WO2022245291A2 PCT/SG2022/050326 SG2022050326W WO2022245291A2 WO 2022245291 A2 WO2022245291 A2 WO 2022245291A2 SG 2022050326 W SG2022050326 W SG 2022050326W WO 2022245291 A2 WO2022245291 A2 WO 2022245291A2
Authority
WO
WIPO (PCT)
Prior art keywords
resource
node
organization structure
target
resources
Prior art date
Application number
PCT/SG2022/050326
Other languages
French (fr)
Other versions
WO2022245291A3 (en
Inventor
Fan Yang
Junjie Li
Original Assignee
Envision Digital International Pte. Ltd.
Shanghai Envision Digital Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Envision Digital International Pte. Ltd., Shanghai Envision Digital Co., Ltd. filed Critical Envision Digital International Pte. Ltd.
Publication of WO2022245291A2 publication Critical patent/WO2022245291A2/en
Publication of WO2022245291A3 publication Critical patent/WO2022245291A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2246Trees, e.g. B+trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing

Definitions

  • the present disclosure relates to the field of Internet of things (loT) technologies, and in particular, relates to a method and apparatus for managing resources, and a computer de vice and a storage medium thereof.
  • LoT Internet of things
  • An application portal platform is a middle platform that is increasingly widespread.
  • the large-middle platform concept requires unified management of permissions and core resources of all applications.
  • the application portal platform involves how a user uses and displays resources in an application. Permission management is required when the user uses and displays resources in the application.
  • Permission management is required when the user uses and displays resources in the application.
  • a permission management system for the user is usually set up to return resources that the user has permissions to view to the application according to the user's permissions.
  • Embodiments of the present disclosure provide a method and apparatus for managing resources, and a computer device and a storage medium thereof.
  • a method for managing resources is provided.
  • the method is applicable to a server of an application portal platform, wherein the application portal platform is integrated with at least two applications.
  • the method includes: receiving a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; querying, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a function service, and a resource; querying, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; querying, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service being a function service corresponding to the target function page; acquiring, based on the first resource
  • an apparatus for managing resources is provided.
  • the apparatus is applicable to a server of an application portal platform, wherein the application portal platform is integrated with at least two applications.
  • the apparatus includes: a request receiving module, configured to receive a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; a first resource set querying module, configured to query, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a functional service, and a resource; a second resource set querying module, configured to query, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; a third resource set querying module, configured to query, in each of the first organization structure trees, a third resource set composed
  • a computer device includes: a processor, and a memory' configured to store at least one at least one instruction, at least one program, a code set, or an instruction set, wherein the processor, when loading and executing the at least one instruction, the at least one program, the code set, or the instruction set, is caused to perform the method for managing resources.
  • a non-transitory computer-readable storage medium stores at least one instruction, at least one program, a code set, or an instruction set, wherein the at least one instruction, the at least one program, the code set or the instruction set, when loaded and executed by a processor of a computer device, causes the computer device to perform the method for managing resources.
  • a computer program product includes at least one computer instruction stored in a computer-readable storage medium.
  • the at least one computer instruction when loaded and executed by a processor of a computer device, causes the computer device to execute the methods for managing resources according to the above embodiments in the above aspects.
  • the permissions of the user, the application and the function service to the resources are realized by the first organization structure tree, and the resources corresponding to pennissions that simultaneously meet the user, the application, and the sendee function may be directly- acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the sendee function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management.
  • the foregoing general description and the following detailed description are only exemplary and explanatory and are not restrictive of the present disclosure.
  • FIG. 1 is a schematic diagram of a system for managing resources according to an exemplary embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for managing resources according to an exemplary- embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of an organization structure tree according to the embodiment illustrated in FIG. 2;
  • FIG. 4 is a flowchart of a method for managing resources according to an exemplary- embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of an organization structure tree according to the embodiment illustrated in FIG. 4;
  • FIG. 6 is a schematic diagram of user resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
  • FIG. 7 is a schematic diagram of application resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
  • FIG. 8 is a schematic diagram of service resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
  • FIG. 9 is a diagram of a resource display structure according to the embodiment illustrated in FIG. 4:
  • FIG. 10 is a block diagram of an apparatus for managing resources according to an exemplary embodiment of the present disclosure.
  • FIG, 11 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present disclosure.
  • an organization structure refers to a logical node created in a system that may have a parent-child relationship.
  • One organization structure may include only one node, or may include one node and descendant nodes thereof.
  • one or more organization structures may constitute one organization structure tree, including one root node and descendant nodes thereof.
  • the organization structure tree may also be considered as a tree-like organization structure.
  • a resource refers to an entity that is abstracted for permission management.
  • a resource may be an entity corresponding to an loT device.
  • a resource may be device information (e.g., location, name, serial number, on line or not, operating status, rotational speed, pitch, generated power and continuous operation hours) corresponding to a wind turbine, or a resource may be device information (e.g., location, name, serial number, on line or not, intensity of illumination, ambient temperature, and generated power) corresponding to a solar power panel.
  • each function point in an application may be abstracted as a permission point in a permission management system, for managing resource pemiissions corresponding to the function point.
  • the function points in the application include operation status management of the wind turbine, pitch management of the wind turbine, and generated power query of the wind turbine.
  • Different function points may manage/query the same or different wind turbines.
  • the function point for operation status management of the wind turbine may manage wind turbines 1 to 10
  • the function point for pitch management of the wind turbine may manage wind turbines 1 to 7
  • the function point for generated power query of the wind turbine may query wind turbines 2 to 15.
  • three permission points may be set correspondingly, and each perm ission point is configured to manage the permission of the corresponding function point.
  • the permission herein may refer to which wind turbines the corresponding function nodes have the permissions to manage/query.
  • an application and a function (e.g., a menu function) in the application may correspond to an account.
  • This account is called a service account.
  • the service account which resources the application and the function/permission point corresponding to the service account have the permissions to use may be determined.
  • FIG. 1 is a schematic diagram of a system for managing resources according to an exemplary embodiment of the present disclosure. As illustrated in FIG. 1, the system includes a terminal 110 and a server 120.
  • a client of an application portal platform is installed in the terminal 110.
  • the application portal platform is integrated with at least two applications, and a user can log in to the application portal platform by the client in the terminal 110 and use any application integrated in the application portal platform.
  • the terminal 110 may be, but not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, or the like.
  • the server 120 is a server for the application portal platform.
  • the server 120 provides background resource management services for an application.
  • the server 120 may be a server, or may be a server cluster composed of several servers, or may include one or more virtualization platforms, or may be a cloud computing service center.
  • the server 120 may be a stand-alone physical server, or a server cluster or distributed system composed of a plurality of physical servers, or a cloud server.
  • the terminal and the server may be directly or indirectly connected by means of wired or wireless communication, which is not limited in the present disclosure.
  • the aforementioned wired network or wireless network uses standard communication technologies and/or protocols.
  • the network is usually the Internet, but it may also be any network, including but not limited to any combination of a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a mobile or wireless network, a dedicated network, or a virtual dedicated network.
  • technologies and/or formats including HyperText Markup Language (HTML), Extensible Markup Language (XML), and the like are used to represent data exchanged over a network.
  • HTML HyperText Markup Language
  • XML Extensible Markup Language
  • SSL Secure Socket Layer
  • TLS Transport Layer Security
  • VPN virtual private network
  • IPsec Internet Protocol Security
  • FIG. 2 is a flowchart of a method for managing resources according to an exemplary embodiment of the present disclosure.
  • the method is applicable to a server of an application portal platform to conduct permission management on resources displayed during use of an application by a user.
  • the application portal platform is integrated with at least two applications.
  • the server may be the server 120 in the system illustrated in FIG. 1. As illustrated in FIG. 2, the method may include the following steps.
  • a terminal sends a resource management request to the server, and the server receives the resource management request from the terminal.
  • the resource management request is configured to request a resource displayed on a target function page of a target application.
  • a user upon logging in to the application portal platform over a client of the application portal platform, a user needs to view a resource on a current application page in the process of using an application of the application portal platform, and at this time, the terminal sends the resource management request to the server.
  • step 202 the server queries, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user.
  • the target user corresponds to the terminal.
  • the first organization structure tree includes at least one node, and the node is configured to mount at least one of a user, an application, a function sen/ice, and a resource.
  • FIG. 3 is a schematic diagram of an organization structure tree according to an exemplary embodiment of the present disclosure. As illustrated in FIG. 3, the organization structure tree includes a root node 31 , and a child node 32 and a child node 33 of the root node, wherein the child node 32 further corresponds to a child node 34 and a child node 35.
  • an application 1 is mounted on the root node 31 ; a user 1 and a resource 1 are mounted on the child node 32; a function service 1 and a resource 2 are mounted on the child node 33; a user 2, a function sen/ice 2, and a resource 3 are mounted on the child node 34; and a resource 4 is mounted on the child node 35.
  • a universal permission management solution based on a tree-like organization structure is adopted.
  • this management solution does not depend on an original structure (e.g., an asset tree structure) of the resource in the system, an application menu structure, or the like.
  • Various resources or roles may be bound to the organization structure tree, which is an authorization relationship tree and thus is universal and may be used as a supplement to the existing permission management system.
  • the relationship of the organization structure tree is extensible. In this way, not only the resources available to the user are managed, but also other relationships such as the resources available to the application and the service functions/permission points in the application are reflected.
  • the first resource set composed of the resources which the target user has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the user and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
  • step 203 the server queries, in each of the first organization structure trees, a second resource set composed of a resource corresponding to the target application.
  • the first resource set composed of the resources which the target application has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the application and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
  • step 204 the server queries, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service.
  • the target function service corresponds to the target function page.
  • the third resource set composed of the resources which the target function sendee has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the function sendee and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
  • step 205 the server acquires, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request.
  • the resource corresponding to the resource management request may be acquired in response to acquiring the resources that the target user, the target application and the target function sendee have permissions to access respecti vely .
  • step 206 the server sends the resource corresponding to the resource management request to the terminal, and the terminal receives the resource corresponding to the resource management request.
  • step 207 the terminal displays, on the target function page, the resource corresponding to the resource management request.
  • the permissions of the user, the application and the service function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the service function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management.
  • FIG. 4 is a flowchart of a method for managing resources according to an exemplary embodiment of the present disclosure.
  • the method is applicable to a server of an application portal platform to conduct permission management on a resource displayed during use of an application by a user.
  • the application portal platfonn is integrated with at least two applications.
  • the server may be the server 120 in the system illustrated in FIG. 1 .
  • the method may include the following steps.
  • a terminal sends a resource management request to the server, and the server receives the resource management request from the terminal.
  • the resource management request is configured to request a resource displayed on a target function page of a target application.
  • the target application in the application portal platform, and the corresponding target function page (also called a function menu) in the target application are opened.
  • the terminal sends the resource management request to the server.
  • the resource management request includes an identifier (such as user account/user serial number) of the target user, an identifier (such as application name and identifier of called interface) of the target application, an identifier of a service function corresponding to the target function page, and the like.
  • each of first organization structure trees includes at least one node, and each node is configured to mount at least one of a user, an application, a function service, and a resource.
  • the concept of custom role that integrates the application and the resource in the application to integrate application usage permissions, and to group the resources by using a resource group.
  • the application is bound by the root node of the organization structure tree to determine resource and interface permissions available to the application.
  • an organization structure may be borrowed to display the resources, and the nodes’ resources, roles, operation types, and other permissions may be inherited by mounting the users on different nodes.
  • roles, resources, and other permissions may be independently assigned to the users to meet special cases, thereby achieving more flexible use.
  • the users may be repeatedly mounted to different nodes on the tree to meet the scenario of one person with multiple identities.
  • each of the first organization structure trees may have the following mounting rules:
  • node permissions have an inheritance relationship, i.e., a parent node has a permission of a descendant node;
  • an application programming interface (API) and an application (APP) may be mounted on the root node;
  • a resource group is a collection of resources and roles are a collection of in -APP permissions (i.e., the management of the APP is accurate to an in-app menu and permission point);
  • permissions for in-APP menus i.e,, function services
  • have a reverse inheritance relationship i.e., having permissions for sub-menus and also permissions for parent menus;
  • FIG. 5 is a schematic diagram of an organization structure tree according to an exemplary embodiment of the present disclosure.
  • a first organization structure tree includes the following contents:
  • resource groups (Gn in FIG. 5, representing the nth resource group, each including multiple resources);
  • roles (Rn in FIG. 5, representing the n th role, in which one and the last multiple function services/function menus/permission points may be bound to one role).
  • step 402 the server queries, in each of the first organization structure trees, a first resource set composed of resources corresponding to the target user.
  • the target user is a user corresponding to the terminal.
  • One target user may be mounted in multiple different first organization structure trees and the same target user may be mounted in multiple places of one organization structure tree. Therefore, in an embodiment of the present disclosure, the server may query, from each of the first organization structure trees, the resource that the target user has a permission to access, and form the first resource set by the queried resource.
  • querying, in each of the first organization structure trees, the first resource set composed of the resources corresponding to the target user includes: querying, from each of the first organization structure trees, a resource under a node where the target user is mounted, and a resource under a descendant node of the node where the target user is mounted; querying, from each of the first organization structure trees, a resource under anode where a user group including the target user is mounted; querying, from each of the first organization structure trees, a resource where the target user is mounted; and acquiring the first resource set by taking a union of the resource under the node where the target user is mounted, the resource under the descendant node of the node where the target user is mounted, the resource under the node where the user group including the target user is mounted, and the resource where the target user is mounted.
  • the resources corresponding to one target user in the first organization structure tree may be divided into the following types of resources:
  • resources that are mounted on the same node including an independent resource and a resource group) as the target user, and resources under a child node corresponding to the node where the target user is mounted;
  • resources mounted on the same node as the user group including the target user including the target user; and [00100] resources mounted directly on the target user (for example, in the first organization structure tree, resources may not only be mounted on a tree node but also be directly mounted on an individual user).
  • the server may take a union thereof to acquire the first resource set.
  • querying, from each of the first organization structure trees, the resource under the node where the target user is mounted, and the resource under the descendant node of the node where the target user is mounted includes: querying, from each of the first organization structure trees, a node where the target user is mounted, and a descendant node of the node where the target user is mounted; and acquiring, in the node where the target user is mounted and the descendant node of the node where the target user is mounted, a resource under a node that enables automatic authorization.
  • a node that enables automatic authorization may be detected, and the resource under the node that enables automatic authorization may be acquired as the resource under the node where the target user is mounted and the resource under the descendant node of the node where the target user is mounted.
  • FIG. 6 is a schematic diagram of user resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure.
  • a user may be mounted on any node of the organization structure, and permissions required by the user are application menus/service functions/ permission points and resources.
  • the resource permissions of the user include resource permissions contained by all of the resources and resource groups of its mounted node and its descendant nodes.
  • the user may be mounted on multiple nodes, and a union of the resources is taken.
  • the resource permissions of the user U2 include all resources in A2, G2, and G4.
  • the application menus/service functions/permission points for which the user has permissions include the application menus/service functions/permission points contained m all roles of the node where the user is located and its descendant nodes. As illustrated in FIG, 6, the user U2 has in-application permissions including all permissions bound in R2, R4, and R5. It should be noted that the permissions in the roles also belong to the application. Therefore, the permission of using a specific application is an intersection with the in-application permissions. [00107] In step 403, the server queries, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application.
  • querying, in each of the first organization structure trees, the second resource set composed of the resources corresponding to the target application includes: querying, from each of the first organization structure trees, a first organization structure tree where the target application is mounted; and acquiring a set composed of resources under all nodes in the first organization structure tree where the target application is mounted as the second resource set.
  • the server when the application is mounted on the root node of the organization structure tree, the server takes a set composed of the resources under the enthe organization structure tree mounted with the application as the second resource set.
  • FIG. 7 is a schematic diagram of application resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure.
  • Use of the application often includes display, statistics, monitoring, and control of assets, and thus the application needs to specify the available assets. Moreover, when in use, the application may inevitably call an interface registered to the system, and thus the available interface may also be defined.
  • the application mounted on the root node of the organization structure tree may have the following permissions:
  • step 404 the server queries, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service.
  • the target function service corresponds to the target function page.
  • querying, in each of the first organization structure trees, the third resource set composed of the resources corresponding to the target function service includes: querying, from each of the first organization structure trees, a resource group under a node where the target function sendee is mounted; and acquiring a set composed of resources in the resource group under the node where the target function service is mounted as the third resource set, [00116]
  • the function sendee is represented by a sendee account in the organization structure tree, and resource permissions for the functional service may be achieved by the resource group mounted on the organization structure tree.
  • FIG. 8 is a schematic diagram of service resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure.
  • a node tree corresponding to a service function is constructed as illustrated in FIG. 8, and the use of the service function is facilitated by authorizing the use of the resource group.
  • APP represents the service account of the service function, and the service account has permissions of resources 0 to 12.
  • each resource group is mapped to its contained resources.
  • a display structure of the resources is returned according to the overall structure of the node tree and resources together, and a category- field may be used to distinguish nodes from resources.
  • step 405 the server acquires, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request.
  • acquiring, based on the first resource set, the second resource set, and the third resource set, the resource corresponding to the resource management request includes: acquiring a resource corresponding to the resource management request by taking an intersection of the first resource set, the second resource set, and the third resource set.
  • the acquired resource needs to simultaneously satisfy the target user, the target application and the target function service, it is necessary to take an intersection of the first resource set, the second resource set, and the third resource set, so as to acquire resources that simultaneously satisfy the target user, the target application and the target function service.
  • the acquired set is a subset of an asset list authorized for the service account in the platform:
  • the acquired set is a subset of an asset list under an organization structure bound for the application in the platform.
  • the acquired set is a subset of all asset perm issions that the user has.
  • step 406 the server establishes a second organization structure tree based on the resource corresponding to the resource management request, and the resource corresponding to the resource management request is mounted on each node in the second organization structure tree.
  • FIG. 9 is a diagram of a resource display structure according to an exemplary embodiment of the present disclosure.
  • the second organization structure tree includes a node and a resource, as well as amounting relationship between the node and the resource.
  • the application makes a visual display according to business requirements with reference to data returned by an interface.
  • the data structure returned by the interface is defined as follows.
  • step 407 the server sends the second organization structure tree to the terminal, and the terminal receives the second organization structure tree.
  • the target user is a monitoring person responsible for monitoring multiple devices, including R0, R1, R5, R8, R13, R14, and R15.
  • the target application is wind farm management having the resource permissions of R0, R1, R2, R3, R4, R5, R6, R7, R8, R9, R10, R11, and R12, including various devices such as a fan and a booster station.
  • the service account of the target sendee function corresponds to a fan monitoring function in the application and has the resource permissions of R0, R1, R2, R3, R4, R5, R6, and R7, all of which are fans.
  • the platform In response to the target user entering a menu of the fan monitoring function, the platform automatically screens resources according to the current user, the service account of the current service function and the current application, and returns the resources according to the structure of the node tree for display.
  • the screening strategy is the intersection of the foregoing three pemiissions.
  • the returned data includes R0, R1, R5 and R8, and a complete node tree structure containing these four resources (nodes not related to these four resources may be pruned).
  • step 408 the terminal displays the resource corresponding to the resource management request on the target function page according to the second organization structure tree.
  • an application when in use, may request a resource from the platform based on the user and the service account, and these returned resources have the following several features. [00135] First, these returned resources are filtered by the user, the application, and the sendee account, and it is unnecessary for the application to tell which resources are available in which scenarios.
  • the returned resources already have a specific display structure based on the node tree, the application side only needs to consider the requirements for visualization and business display, and no further processing of the returned structure is required.
  • each organization structure tree may accomplish various different permission management, which greatly reduces the complexity of management.
  • the use of the extensible resource mounting solution allows for the expansion of additional requirements of management.
  • the permission management solution according to the present disclosure is flexible in use and easy to expand, and may be used as a supplement to the existing system for improvement, or may become an independent management system.
  • the preset role of the technical solution involved in the present disclosure may be set as a node administrator or the like.
  • the custom role may be customized by die user, or the existing role definition may be used directly.
  • the user's permission to use the resources in the application may be determined by the trinity permission system of the user, the application and the resource, and the authorization mode of mounting by the organization structure tree enables the resource permissions returned by the interface to accurately meet the requirements of the current application,
  • permission objects of multiple types/dimensions/granularity such as applications, function pages in applications, and users
  • permission objects of multiple types/dimensions/granularity are pre-mounted on each node on the organization structure tree together with resources, and the permission relationship between the permission objects and the resources is established based on the mounting relationship of the nodes.
  • the only requirement is to search for the resources mounted on the nodes where the permission objects are located and on the descendant nodes; and for multiple permission objects, the only requirement is to take an intersection of the resources of the permission objects. Therefore, the technical solutions according to the embodiments of the present disclosure can support single-type/single-dimensional/single-granularity permission management, and can also flexibly support multi-type/multi-dimensional/multi-granularity permission management.
  • the permissions of the user, the application and the service function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the sen/ice function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the appli cation, thereby expanding the scope of permission management and increasing application scenarios of permission management.
  • FIG. 10 is a block diagram of an apparatus for managing resources according to an exemplary- embodiment of the present disclosure. As illustrated in FIG, 10, the apparatus is applicable to a server of an application portal platfonn to execute all or part of the steps of the method illustrated in the embodiment corresponding to FIG. 2 or FIG. 4.
  • the application portal platfomi integrated with at least two applications.
  • the server may be the server 120 in the system illustrated in FIG. 1.
  • the apparatus may include: a request receiving module 1001, configured to receive a resource management request from a tenninal, the resource management request being configured to request a resource displayed on a target function page of a target application; a first resource set querying module 1002, configured to query ' , in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the tenninal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a functional sendee, and a resource; a second resource set querying module 1003, configured to query ' , in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; a third resource set querying module 1004, configured to query, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service being a function service corresponding to the target function page;
  • the first resource set querying module 1002 is configured to: query, from each of the first organization structure trees, a resource under a node where the target user is mounted, and a resource under a descendant node of the node where the target user is mounted; query, from each of the first organization structure trees, a resource under a node where a user group including the target user is mounted; query, from each of the first organization structure trees, a resource where the target user is mounted; and acquire the first resource set by taking a union of the resource under the node where the target user is mounted, the resource under the descendant node of the node where the target user is mounted, the resource under the node where the user group including the target user is mounted, and the resource where the target user is mounted.
  • the first resource querying module 1002 when querying, from each of the first organization structure trees, the resource under the node where the target user is mounted, and the resource under the descendant node of the node where the target user is mounted, is configured to: query, from each of the first organization structure trees, a node where the target user is mounted, and a descendant node of the node where the target user is mounted; and acquire, in the node where the target user is mounted and the descendant node of the node where the target user is mounted, a resource under a node that enables automatic authorization;
  • the second resource set querying module 1003 is configured to: query, from each of the first organization structure trees, the first organization structure tree where the target application is mounted; and acquire a set composed of resources under all nodes in the first organization structure tree where the target application is mounted as the second resource set.
  • the third resource set querying module 1004 is configured to: query, from each of the first organization structure trees, a resource group under a node where the target function sendee is mounted; and acquire a set composed of resources in the resource group under the node where the target function service is mounted as the third resource set.
  • the resource acquiring module 1005 is configured to acquire a resource corresponding to the resource management request by taking an intersection of the first resource set, the second resource set, and the third resource set,
  • the resource sending module 1006 is configured to: establish a second organization structure tree based on the resource corresponding to the resource management request, each node in the second organizational structure tree being mounted with the resource corresponding to the resource management request; and send the second organization structure tree to the terminal.
  • the permissions of the user, the application and the sendee function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the service function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management.
  • FIG. 11 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present disclosure.
  • the computer device 1100 includes a central processing unit (CPU) 1101, a system memory 1104 including a random-access memory (RAM) 1102 and a read-only memory (ROM) 1103, and a system bus 1105 connecting the system memory 1104 and the CPU 1101.
  • the computer device 1100 further includes a basic input/output (170) system 1106 which helps to transmit information among various components within the computer device, and a mass storage device 1107 for storing an operating system 1113, an application 1114 and other program modules 1115.
  • the basic I/O system 1106 includes a display 1108 for displaying information and an input device 1109, such as a mouse, a keyboard and the like, for inputting information by the user. Both the display 1108 and the input device 1109 are connected to the CPU 1101 over an input/output controller 1110 connected to the system bus 1105.
  • the basic I/O system 1106 may also include the input/output controller 1110 for receiving and processing input from a plurality of other devices, such as the keyboard, the mouse, or an electronic stylus. Similarly, the input/output controller 1110 further provides output to the display, a printer or other types of output devices.
  • the mass storage device 1107 is connected to the CPU 1101 over a mass storage controller (not illustrated) connected to the system bus 1105.
  • the mass storage device 1107 and a computer-readable medium associated therewith provide non-volatile storage for the computer device 1100. That is, the mass storage device 1107 may include the computer-readable medium (not illustrated), such as a hard disk or a compact disc read-only memory (CD-ROM) driver.
  • the computer-readable medium may include a computer storage medium and a communication medium.
  • the computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as a computer-readable instruction, a data structure, a program module or other data.
  • the computer storage medium includes a RAM, a ROM, an erasable programmable read only memory ; (EPROM), an electrically erasable programmable read-only memory (EEPROM), a CD-ROM, a digital video disc (DVD) or other optical storage; and a tape cassette, a magnetic tape, a magnetic disk storage or other magnetic storage devices.
  • a computer device 1100 may also be operated by being connected by a network such as the Internet to a remote computer device.
  • the computer device 1100 may be connected to the network 1112 by a network interface unit 1111 connected to the system bus 1105, or that is, the computer device 1100 may be connected to other types of networks or remote computer systems (not illustrated) by using the network interface unit 1111.
  • the memory further includes one or more programs stored in the memory.
  • the CPU 1101 implements all or part of the steps executed by the server in the method illustratedm FIG. 2 or FIG. 4 by executing the one or more programs.
  • the functions described in the embodiments of the present disclosure may be implemented by using hardware, software, firmware or any combination thereof.
  • software When software is used for implementation, these functions may be stored in a computer-readable storage medium or transmited as one or more instructions or codes in the computer-readable storage medium.
  • the computer-readable storage medium includes a computer storage medium and a communication medium.
  • the communication medium includes any medium that transfers a computer program from one place to another place.
  • the storage medium may be any usable medium accessible to a general-purpose or special-purpose computer.
  • An embodiment of the present disclosure further provides a non-transitory computer-readable storage medium.
  • the non-transitory computer-readable storage medium stores at least one program code that is loadable and executable by a processor of a computer device.
  • the at least one program code when loaded and executed by the processor, causes the computer device to perform the steps performed by the server in the method illustrated in FIG. 2 or FIG. 4.
  • An embodiment of the present disclosure further provides a computer program product or a computer program.
  • the computer program product or the computer program includes one or at least one computer instruction stored in a computer-readable storage medium.
  • the at least one computer instruction when loaded and executed by a processor of a computer device, causes die computer device to perform all or part of the steps performed by the server in the method illustrated in FIG. 2 or FIG. 4.

Abstract

Disclosed are a method and apparatus for managing resources, and a computer device and a storage medium thereof. The method includes: receiving a request, transmitted by a terminal, for displaying resources in a target function page of a target application; querying, in respective first organization structure trees, first resource sets composed of resources corresponding to a target user, second resource sets composed of resources corresponding to the target application, and third resource sets composed of resources corresponding to a target function service; and acquiring the resources corresponding to a resource management request and transmitting the same to the terminal based on the first, second and third resource sets.

Description

METHOD AND APPARATUS FOR MANAGING RESOURCES,
COMPUTER DEVICE AND STORAGE MEDIUM
TECHNICAU FIEUD
[0001] The present disclosure relates to the field of Internet of things (loT) technologies, and in particular, relates to a method and apparatus for managing resources, and a computer de vice and a storage medium thereof.
BACKGROUND
[0002] An application portal platform is a middle platform that is increasingly widespread. The large-middle platform concept requires unified management of permissions and core resources of all applications.
[0003] The application portal platform involves how a user uses and displays resources in an application. Permission management is required when the user uses and displays resources in the application. In the related art, in such a scenario, a permission management system for the user is usually set up to return resources that the user has permissions to view to the application according to the user's permissions.
[0004] However, the solution in the related art, which only conducts permission management on resources for the user, leads to a single management approach and is hence inapplicable to scenarios where various types of resources need to be managed.
SUMMARY
[0005] Embodiments of the present disclosure provide a method and apparatus for managing resources, and a computer device and a storage medium thereof.
[0006] According to one aspect of the embodiments of the present disclosure, a method for managing resources is provided. The method is applicable to a server of an application portal platform, wherein the application portal platform is integrated with at least two applications. [0007] The method includes: receiving a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; querying, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a function service, and a resource; querying, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; querying, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service being a function service corresponding to the target function page; acquiring, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request; and sending the resource corresponding to the resource management request to the terminal.
[0008] According to another aspect of the embodiments of the present disclosure, an apparatus for managing resources is provided. The apparatus is applicable to a server of an application portal platform, wherein the application portal platform is integrated with at least two applications. [0009] The apparatus includes: a request receiving module, configured to receive a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; a first resource set querying module, configured to query, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a functional service, and a resource; a second resource set querying module, configured to query, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; a third resource set querying module, configured to query, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function sendee being a function sendee corresponding to the target function page; a resource acquiring module, configured to acquire, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request; and a resource sending module, configured to send the resource corresponding to the resource management request to the terminal .
[0010] According to still another aspect of the embodiments of the present disclosure, a computer device is provided. The computer device includes: a processor, and a memory' configured to store at least one at least one instruction, at least one program, a code set, or an instruction set, wherein the processor, when loading and executing the at least one instruction, the at least one program, the code set, or the instruction set, is caused to perform the method for managing resources.
[0011] According to yet still another aspect of the embodiments of the present disclosure, a non-transitory computer-readable storage medium is provided. The non-transitory computer-readable storage medium stores at least one instruction, at least one program, a code set, or an instruction set, wherein the at least one instruction, the at least one program, the code set or the instruction set, when loaded and executed by a processor of a computer device, causes the computer device to perform the method for managing resources.
[0012] According to yet still another aspect of the embodiments of the present disclosure, a computer program product is provided. The computer program product includes at least one computer instruction stored in a computer-readable storage medium. The at least one computer instruction, when loaded and executed by a processor of a computer device, causes the computer device to execute the methods for managing resources according to the above embodiments in the above aspects.
[0013] The technical solutions according to the embodiments of the present disclosure may have the following beneficial effects.
[0014] The permissions of the user, the application and the function service to the resources are realized by the first organization structure tree, and the resources corresponding to pennissions that simultaneously meet the user, the application, and the sendee function may be directly- acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the sendee function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management. [0015] It should be understood that both the foregoing general description and the following detailed description are only exemplary and explanatory and are not restrictive of the present disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS [0016] The accompanying drawings, which are incorporated in and constitute part of the description, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0017] FIG. 1 is a schematic diagram of a system for managing resources according to an exemplary embodiment of the present disclosure;
[0018] FIG. 2 is a flowchart of a method for managing resources according to an exemplary- embodiment of the present disclosure;
[0019] FIG. 3 is a schematic diagram of an organization structure tree according to the embodiment illustrated in FIG. 2;
[0020] FIG. 4 is a flowchart of a method for managing resources according to an exemplary- embodiment of the present disclosure;
[0021] FIG. 5 is a schematic diagram of an organization structure tree according to the embodiment illustrated in FIG. 4; [0022] FIG. 6 is a schematic diagram of user resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
[0023] FIG. 7 is a schematic diagram of application resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
[0024] FIG. 8 is a schematic diagram of service resource permissions in an organization structure tree according to the embodiment illustrated in FIG. 4;
[0025] FIG. 9 is a diagram of a resource display structure according to the embodiment illustrated in FIG. 4:
[0026] FIG. 10 is a block diagram of an apparatus for managing resources according to an exemplary embodiment of the present disclosure; and
[0027] FIG, 11 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present disclosure.
DETAILED DESCRIPTION
[0028] Reference are not made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise represented. The embodiments set forth in the description do not represent all embodiments consistent with the present disclosure. Instead, these embodiments hereinafter are merely examples ones of apparatuses and methods consistent with aspects related to the present disclosure as recited in the appended claims.
[0029] It should be understood that the term "several" herein refers to one or more, and the term "a plurality oft herein refers to two or more. The term "and/or" herein describes the associated relationship of the associated objects, indicating three relationships, for example, A and/or B, can represent that: A exists alone, A and B exist concurrently, B exists alone. The symbol 7" generally indicates an "OR" relationship between the contextual objects.
[0030] For ease of understanding, terms according to the embodiments of the present disclosure are explained hereinafter.
[0031] (1) Organization structure
[0032] hi various embodiments of the present disclosure, an organization structure refers to a logical node created in a system that may have a parent-child relationship. One organization structure may include only one node, or may include one node and descendant nodes thereof. [0033] In various embodiments of the present disclosure, one or more organization structures may constitute one organization structure tree, including one root node and descendant nodes thereof. The organization structure tree may also be considered as a tree-like organization structure. [0034] (2) Resource
[0035] In the embodiments of the present disclosure, a resource refers to an entity that is abstracted for permission management.
[0036] In some embodiments, in the case that the technical solutions according to the various embodiments of the present disclosure are applicable to the field of loT, a resource may be an entity corresponding to an loT device. For example, a resource may be device information (e.g., location, name, serial number, on line or not, operating status, rotational speed, pitch, generated power and continuous operation hours) corresponding to a wind turbine, or a resource may be device information (e.g., location, name, serial number, on line or not, intensity of illumination, ambient temperature, and generated power) corresponding to a solar power panel.
[0037] (3) Permission point
[0038] In the embodiments of the present disclosure, each function point in an application may be abstracted as a permission point in a permission management system, for managing resource pemiissions corresponding to the function point.
[0039] In some embodiments, if an application is an application for managing a wind turbine, the function points in the application include operation status management of the wind turbine, pitch management of the wind turbine, and generated power query of the wind turbine. Different function points may manage/query the same or different wind turbines. For example, the function point for operation status management of the wind turbine may manage wind turbines 1 to 10, the function point for pitch management of the wind turbine may manage wind turbines 1 to 7, and the function point for generated power query of the wind turbine may query wind turbines 2 to 15. [0040] For the above three function points, three permission points may be set correspondingly, and each perm ission point is configured to manage the permission of the corresponding function point. For example, the permission herein may refer to which wind turbines the corresponding function nodes have the permissions to manage/query.
[0041] (4) Service account
[0042] In the embodiments of the present disclosure, an application and a function (e.g., a menu function) in the application may correspond to an account. This account is called a service account. By using the service account, which resources the application and the function/permission point corresponding to the service account have the permissions to use may be determined.
[0043] FIG. 1 is a schematic diagram of a system for managing resources according to an exemplary embodiment of the present disclosure. As illustrated in FIG. 1, the system includes a terminal 110 and a server 120.
[0044] A client of an application portal platform is installed in the terminal 110. [0045] In some embodiments, the application portal platform is integrated with at least two applications, and a user can log in to the application portal platform by the client in the terminal 110 and use any application integrated in the application portal platform.
[0046] The terminal 110 may be, but not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, or the like.
[0047] The server 120 is a server for the application portal platform.
[0048] The server 120 provides background resource management services for an application. [0049] The server 120 may be a server, or may be a server cluster composed of several servers, or may include one or more virtualization platforms, or may be a cloud computing service center. [0050] The server 120 may be a stand-alone physical server, or a server cluster or distributed system composed of a plurality of physical servers, or a cloud server.
[0051] The terminal and the server may be directly or indirectly connected by means of wired or wireless communication, which is not limited in the present disclosure.
[0052] In some embodiments, the aforementioned wired network or wireless network uses standard communication technologies and/or protocols. The network is usually the Internet, but it may also be any network, including but not limited to any combination of a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a mobile or wireless network, a dedicated network, or a virtual dedicated network. In some embodiments, technologies and/or formats including HyperText Markup Language (HTML), Extensible Markup Language (XML), and the like are used to represent data exchanged over a network. In addition, conventional encryption technologies such as Secure Socket Layer (SSL), Transport Layer Security (TLS), virtual private network (VPN), Internet Protocol Security (IPsec) and the like may be used to encrypt all or some links. In other embodiments, customized and/or dedicated data communication technologies may also be used in place of or in addition to the above data communi cation technologies ,
[0053] FIG. 2 is a flowchart of a method for managing resources according to an exemplary embodiment of the present disclosure. The method is applicable to a server of an application portal platform to conduct permission management on resources displayed during use of an application by a user. The application portal platform is integrated with at least two applications. The server may be the server 120 in the system illustrated in FIG. 1. As illustrated in FIG. 2, the method may include the following steps.
[0054] In step 201, a terminal sends a resource management request to the server, and the server receives the resource management request from the terminal. The resource management request is configured to request a resource displayed on a target function page of a target application. [0055] In some embodiments, upon logging in to the application portal platform over a client of the application portal platform, a user needs to view a resource on a current application page in the process of using an application of the application portal platform, and at this time, the terminal sends the resource management request to the server.
[0056] In step 202, the server queries, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user. The target user corresponds to the terminal. The first organization structure tree includes at least one node, and the node is configured to mount at least one of a user, an application, a function sen/ice, and a resource.
[0057] In some embodiments, the permissions of various users, applications, and function sendees to the resources are managed in the form of the organization structure trees. FIG. 3 is a schematic diagram of an organization structure tree according to an exemplary embodiment of the present disclosure. As illustrated in FIG. 3, the organization structure tree includes a root node 31 , and a child node 32 and a child node 33 of the root node, wherein the child node 32 further corresponds to a child node 34 and a child node 35.
[0058] In FIG. 3, an application 1 is mounted on the root node 31 ; a user 1 and a resource 1 are mounted on the child node 32; a function service 1 and a resource 2 are mounted on the child node 33; a user 2, a function sen/ice 2, and a resource 3 are mounted on the child node 34; and a resource 4 is mounted on the child node 35.
[0059] In the technical solutions according to the embodiments of the present disclosure, a universal permission management solution based on a tree-like organization structure is adopted. First, this management solution does not depend on an original structure (e.g., an asset tree structure) of the resource in the system, an application menu structure, or the like. Various resources or roles (such as function/permission points) may be bound to the organization structure tree, which is an authorization relationship tree and thus is universal and may be used as a supplement to the existing permission management system. At the same time, the relationship of the organization structure tree is extensible. In this way, not only the resources available to the user are managed, but also other relationships such as the resources available to the application and the service functions/permission points in the application are reflected.
[0060] In some embodiments, the first resource set composed of the resources which the target user has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the user and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
[0061] In step 203, the server queries, in each of the first organization structure trees, a second resource set composed of a resource corresponding to the target application. [0062] In some embodiments, the first resource set composed of the resources which the target application has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the application and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
[0063] In step 204, the server queries, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service. The target function service corresponds to the target function page.
[0064] In some embodiments, the third resource set composed of the resources which the target function sendee has a permission to access in the first organization structure tree may be queried based on the mounting relationship between the function sendee and the node in the first organization structure tree, as well as that between the resource and the node in the first organization structure tree.
[0065] In step 205, the server acquires, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request.
[0066] In some embodiments, the resource corresponding to the resource management request may be acquired in response to acquiring the resources that the target user, the target application and the target function sendee have permissions to access respecti vely .
[0067] In step 206, the server sends the resource corresponding to the resource management request to the terminal, and the terminal receives the resource corresponding to the resource management request.
[0068] In step 207, the terminal displays, on the target function page, the resource corresponding to the resource management request.
[0069] In summary, m the technical solutions according to the embodiments of the present disclosure, the permissions of the user, the application and the service function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the service function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management.
[0070] FIG. 4 is a flowchart of a method for managing resources according to an exemplary embodiment of the present disclosure. The method is applicable to a server of an application portal platform to conduct permission management on a resource displayed during use of an application by a user. The application portal platfonn is integrated with at least two applications. The server may be the server 120 in the system illustrated in FIG. 1 . As illustrated in FIG. 4, the method may include the following steps.
[0071] in step 401, a terminal sends a resource management request to the server, and the server receives the resource management request from the terminal. The resource management request is configured to request a resource displayed on a target function page of a target application.
[0072] In some embodiments, after a target user opens a client of the application portal platform in the terminal and completes the login, the target application in the application portal platform, and the corresponding target function page (also called a function menu) in the target application are opened. After that, the terminal sends the resource management request to the server. In one possible implementation, the resource management request includes an identifier (such as user account/user serial number) of the target user, an identifier (such as application name and identifier of called interface) of the target application, an identifier of a service function corresponding to the target function page, and the like.
[0073] In some embodiments, various first organization structure trees are preset in the server, each of first organization structure trees includes at least one node, and each node is configured to mount at least one of a user, an application, a function service, and a resource.
[0074] In some embodiments, it is possible to use the concept of custom role that integrates the application and the resource in the application to integrate application usage permissions, and to group the resources by using a resource group. The application is bound by the root node of the organization structure tree to determine resource and interface permissions available to the application. Meanwhile, an organization structure may be borrowed to display the resources, and the nodes’ resources, roles, operation types, and other permissions may be inherited by mounting the users on different nodes. At the same time, roles, resources, and other permissions may be independently assigned to the users to meet special cases, thereby achieving more flexible use. The users may be repeatedly mounted to different nodes on the tree to meet the scenario of one person with multiple identities. Optionally, because the number of resources is usually large, it is recommended not to mount the same resource in multiple places on the same organization structure tree to avoid confusion in permission management.
[0075] In some embodiments, each of the first organization structure trees may have the following mounting rules:
[0076] (1) multiple organization structures (i.e., nodes) form a tree-structure (there may be only one node):
[0077] (2) node permissions have an inheritance relationship, i.e., a parent node has a permission of a descendant node; [0078] (3) an application programming interface (API) and an application (APP) may be mounted on the root node;
[0079] (4) resources, resource groups, users and roles (including function services/permission points) may be mounted on each node;
[0080] (5) an unlimited number of APPs, APIs, resources, resource groups, users, roles, and the like may be bound to an organization structure tree;
[0081] (6) only some of the above entities may be bound to an organization structure tree, or other entities may be bound by extension according to specific scenarios;
[0082] (7) a resource group is a collection of resources and roles are a collection of in -APP permissions (i.e., the management of the APP is accurate to an in-app menu and permission point); [0083] (8) permissions for in-APP menus (i.e,, function services) have a reverse inheritance relationship, i.e., having permissions for sub-menus and also permissions for parent menus;
[0084] (9) the organization structure tree achieves both an authorization role and a role of the APP of displaying the resource structure; and
[0085] (10) permissions have been filtered and a display structure has been constructed before resource data is provided to the APP.
[0086] For example, FIG. 5 is a schematic diagram of an organization structure tree according to an exemplary embodiment of the present disclosure. As illustrated in FIG. 5, a first organization structure tree includes the following contents:
[0087] organization structure nodes (Sn in FIG. 5, representing the nth organization structure node);
[0088] a tree-bound application (APP in FIG. 5, mounted at the root node of the tree);
[0089] users (Un in FIG. 5, representing the nth user);
[0090] resources (An in FIG, 5, representing the nth resource);
[0091] resource groups (Gn in FIG. 5, representing the nth resource group, each including multiple resources);
[0092] an application programming interface (API in FIG. 5, mounted at the root node of the tree); and
[0093] roles (Rn in FIG. 5, representing the nth role, in which one and the last multiple function services/function menus/permission points may be bound to one role).
[0094] in step 402, the server queries, in each of the first organization structure trees, a first resource set composed of resources corresponding to the target user. The target user is a user corresponding to the terminal.
[0095] One target user may be mounted in multiple different first organization structure trees and the same target user may be mounted in multiple places of one organization structure tree. Therefore, in an embodiment of the present disclosure, the server may query, from each of the first organization structure trees, the resource that the target user has a permission to access, and form the first resource set by the queried resource.
[0096] In some embodiments, querying, in each of the first organization structure trees, the first resource set composed of the resources corresponding to the target user includes: querying, from each of the first organization structure trees, a resource under a node where the target user is mounted, and a resource under a descendant node of the node where the target user is mounted; querying, from each of the first organization structure trees, a resource under anode where a user group including the target user is mounted; querying, from each of the first organization structure trees, a resource where the target user is mounted; and acquiring the first resource set by taking a union of the resource under the node where the target user is mounted, the resource under the descendant node of the node where the target user is mounted, the resource under the node where the user group including the target user is mounted, and the resource where the target user is mounted.
[0097] In some embodiments, the resources corresponding to one target user in the first organization structure tree may be divided into the following types of resources:
[0098] resources that are mounted on the same node (including an independent resource and a resource group) as the target user, and resources under a child node corresponding to the node where the target user is mounted;
[0099] resources mounted on the same node as the user group including the target user; and [00100] resources mounted directly on the target user (for example, in the first organization structure tree, resources may not only be mounted on a tree node but also be directly mounted on an individual user).
[00101] For the above three types of resources, the server may take a union thereof to acquire the first resource set.
[00102] In some embodiments, querying, from each of the first organization structure trees, the resource under the node where the target user is mounted, and the resource under the descendant node of the node where the target user is mounted includes: querying, from each of the first organization structure trees, a node where the target user is mounted, and a descendant node of the node where the target user is mounted; and acquiring, in the node where the target user is mounted and the descendant node of the node where the target user is mounted, a resource under a node that enables automatic authorization.
[00103] In some embodiments, in the case that the resources under the node where the target user is mounted and under its descendant node are acquired as the resources available to the target riser, a node that enables automatic authorization may be detected, and the resource under the node that enables automatic authorization may be acquired as the resource under the node where the target user is mounted and the resource under the descendant node of the node where the target user is mounted.
[00104] FIG. 6 is a schematic diagram of user resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure. A user may be mounted on any node of the organization structure, and permissions required by the user are application menus/service functions/ permission points and resources.
[00105] The resource permissions of the user include resource permissions contained by all of the resources and resource groups of its mounted node and its descendant nodes. The user may be mounted on multiple nodes, and a union of the resources is taken. As illustrated in FIG. 6, the resource permissions of the user U2 include all resources in A2, G2, and G4.
[00106] The application menus/service functions/permission points for which the user has permissions include the application menus/service functions/permission points contained m all roles of the node where the user is located and its descendant nodes. As illustrated in FIG, 6, the user U2 has in-application permissions including all permissions bound in R2, R4, and R5. It should be noted that the permissions in the roles also belong to the application. Therefore, the permission of using a specific application is an intersection with the in-application permissions. [00107] In step 403, the server queries, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application.
[00108] In some embodiments, querying, in each of the first organization structure trees, the second resource set composed of the resources corresponding to the target application includes: querying, from each of the first organization structure trees, a first organization structure tree where the target application is mounted; and acquiring a set composed of resources under all nodes in the first organization structure tree where the target application is mounted as the second resource set.
[00109] In some embodiments, when the application is mounted on the root node of the organization structure tree, the server takes a set composed of the resources under the enthe organization structure tree mounted with the application as the second resource set.
[00110] FIG. 7 is a schematic diagram of application resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure. Use of the application often includes display, statistics, monitoring, and control of assets, and thus the application needs to specify the available assets. Moreover, when in use, the application may inevitably call an interface registered to the system, and thus the available interface may also be defined. [00111] As illustrated in FIG. 7, the application mounted on the root node of the organization structure tree may have the following permissions:
[00112] (1) resources mounted on the enthe tree and resources contained in the resource group; and
[00113] (2) all interface permissions mounted on the root node of the organization structure tree. [00114] In step 404, the server queries, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service. The target function service corresponds to the target function page.
[00115] In some embodiments, querying, in each of the first organization structure trees, the third resource set composed of the resources corresponding to the target function service includes: querying, from each of the first organization structure trees, a resource group under a node where the target function sendee is mounted; and acquiring a set composed of resources in the resource group under the node where the target function service is mounted as the third resource set, [00116] In some embodiments, the function sendee is represented by a sendee account in the organization structure tree, and resource permissions for the functional service may be achieved by the resource group mounted on the organization structure tree.
[00117] FIG. 8 is a schematic diagram of service resource permissions in an organization structure tree according to an exemplary embodiment of the present disclosure. A node tree corresponding to a service function is constructed as illustrated in FIG. 8, and the use of the service function is facilitated by authorizing the use of the resource group. As illustrated in FIG. 8, APP represents the service account of the service function, and the service account has permissions of resources 0 to 12. During query of the resource permissions of the service function, each resource group is mapped to its contained resources. In some embodiments, a display structure of the resources is returned according to the overall structure of the node tree and resources together, and a category- field may be used to distinguish nodes from resources.
[00118] In step 405, the server acquires, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request.
[00119] In some embodiments, acquiring, based on the first resource set, the second resource set, and the third resource set, the resource corresponding to the resource management request includes: acquiring a resource corresponding to the resource management request by taking an intersection of the first resource set, the second resource set, and the third resource set.
[00120] In some embodiments, because the acquired resource needs to simultaneously satisfy the target user, the target application and the target function service, it is necessary to take an intersection of the first resource set, the second resource set, and the third resource set, so as to acquire resources that simultaneously satisfy the target user, the target application and the target function service.
[00121] The resource acquired in the technical solutions according to the present disclosure follows the following principles:
[00122] (1) the acquired set is a subset of an asset list authorized for the service account in the platform:
[00123] (2) the acquired set is a subset of an asset list under an organization structure bound for the application in the platform; and
[00124] (3) the acquired set is a subset of all asset perm issions that the user has.
[00125] In step 406, the server establishes a second organization structure tree based on the resource corresponding to the resource management request, and the resource corresponding to the resource management request is mounted on each node in the second organization structure tree. [00126] In some embodiments, FIG. 9 is a diagram of a resource display structure according to an exemplary embodiment of the present disclosure. The second organization structure tree includes a node and a resource, as well as amounting relationship between the node and the resource. [00127] The application makes a visual display according to business requirements with reference to data returned by an interface. The data structure returned by the interface is defined as follows.
Figure imgf000016_0001
Figure imgf000017_0001
[00128] In step 407, the server sends the second organization structure tree to the terminal, and the terminal receives the second organization structure tree.
[00129] In some embodiments, it is assumed that the target user is a monitoring person responsible for monitoring multiple devices, including R0, R1, R5, R8, R13, R14, and R15. [00130] It is assumed that the target application is wind farm management having the resource permissions of R0, R1, R2, R3, R4, R5, R6, R7, R8, R9, R10, R11, and R12, including various devices such as a fan and a booster station.
[00131] It is assumed that the service account of the target sendee function corresponds to a fan monitoring function in the application and has the resource permissions of R0, R1, R2, R3, R4, R5, R6, and R7, all of which are fans.
[00132] In response to the target user entering a menu of the fan monitoring function, the platform automatically screens resources according to the current user, the service account of the current service function and the current application, and returns the resources according to the structure of the node tree for display. The screening strategy is the intersection of the foregoing three pemiissions. At this time, the returned data includes R0, R1, R5 and R8, and a complete node tree structure containing these four resources (nodes not related to these four resources may be pruned).
[00133] In step 408, the terminal displays the resource corresponding to the resource management request on the target function page according to the second organization structure tree.
[00134] In some embodiments, when in use, an application may request a resource from the platform based on the user and the service account, and these returned resources have the following several features. [00135] First, these returned resources are filtered by the user, the application, and the sendee account, and it is unnecessary for the application to tell which resources are available in which scenarios.
[00136] Second, the returned resources already have a specific display structure based on the node tree, the application side only needs to consider the requirements for visualization and business display, and no further processing of the returned structure is required.
[00137] In the technical solutions according to the embodiments of the present disclosure, each organization structure tree may accomplish various different permission management, which greatly reduces the complexity of management. Moreover, the use of the extensible resource mounting solution allows for the expansion of additional requirements of management.
[00138] In addition, the permission management solution according to the present disclosure is flexible in use and easy to expand, and may be used as a supplement to the existing system for improvement, or may become an independent management system.
[00139] In addition, the preset role of the technical solution involved in the present disclosure may be set as a node administrator or the like. The custom role may be customized by die user, or the existing role definition may be used directly.
[00140] In the technical solutions according to the embodiments of the present disclosure, in the application portal platform, the user's permission to use the resources in the application may be determined by the trinity permission system of the user, the application and the resource, and the authorization mode of mounting by the organization structure tree enables the resource permissions returned by the interface to accurately meet the requirements of the current application,
[00141] In other words, in the embodiments of the present disclosure, permission objects of multiple types/dimensions/granularity, such as applications, function pages in applications, and users, are pre-mounted on each node on the organization structure tree together with resources, and the permission relationship between the permission objects and the resources is established based on the mounting relationship of the nodes. During query of the resources, for single permission objects, the only requirement is to search for the resources mounted on the nodes where the permission objects are located and on the descendant nodes; and for multiple permission objects, the only requirement is to take an intersection of the resources of the permission objects. Therefore, the technical solutions according to the embodiments of the present disclosure can support single-type/single-dimensional/single-granularity permission management, and can also flexibly support multi-type/multi-dimensional/multi-granularity permission management.
[00142] In addition, when the resource structure is displayed in the application, the mounting relationship between the node tree structure and the resource on the nodes is used as the resource display structure, the redundant nodes in the structure are pruned, and the application side only- needs to care about data visualization and business processing without processing the data structure, which greatly simplifies the processing logic of the application side.
[00143] In summary, in the technical solutions according to the embodiments of the present disclosure, the permissions of the user, the application and the service function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the sen/ice function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the appli cation, thereby expanding the scope of permission management and increasing application scenarios of permission management.
[00144] FIG. 10 is a block diagram of an apparatus for managing resources according to an exemplary- embodiment of the present disclosure. As illustrated in FIG, 10, the apparatus is applicable to a server of an application portal platfonn to execute all or part of the steps of the method illustrated in the embodiment corresponding to FIG. 2 or FIG. 4. The application portal platfomi integrated with at least two applications. The server may be the server 120 in the system illustrated in FIG. 1.
[00145] As illustrated in FIG. 10, the apparatus may include: a request receiving module 1001, configured to receive a resource management request from a tenninal, the resource management request being configured to request a resource displayed on a target function page of a target application; a first resource set querying module 1002, configured to query', in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the tenninal, the first organization structure tree including at least one node, the node being configured to mount at least one of a user, an application, a functional sendee, and a resource; a second resource set querying module 1003, configured to query', in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; a third resource set querying module 1004, configured to query, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service being a function service corresponding to the target function page; a resource acquiring module 1005, configured to acquire, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request; and a resource sending module 1006, configured to send the resource corresponding to the resource management request to the terminal. [00146] In some embodiments, the first resource set querying module 1002 is configured to: query, from each of the first organization structure trees, a resource under a node where the target user is mounted, and a resource under a descendant node of the node where the target user is mounted; query, from each of the first organization structure trees, a resource under a node where a user group including the target user is mounted; query, from each of the first organization structure trees, a resource where the target user is mounted; and acquire the first resource set by taking a union of the resource under the node where the target user is mounted, the resource under the descendant node of the node where the target user is mounted, the resource under the node where the user group including the target user is mounted, and the resource where the target user is mounted.
[00147] in some embodiments, when querying, from each of the first organization structure trees, the resource under the node where the target user is mounted, and the resource under the descendant node of the node where the target user is mounted, the first resource querying module 1002 is configured to: query, from each of the first organization structure trees, a node where the target user is mounted, and a descendant node of the node where the target user is mounted; and acquire, in the node where the target user is mounted and the descendant node of the node where the target user is mounted, a resource under a node that enables automatic authorization;
[00148] In some embodiments, the second resource set querying module 1003 is configured to: query, from each of the first organization structure trees, the first organization structure tree where the target application is mounted; and acquire a set composed of resources under all nodes in the first organization structure tree where the target application is mounted as the second resource set. [00149] In some embodiments, the third resource set querying module 1004 is configured to: query, from each of the first organization structure trees, a resource group under a node where the target function sendee is mounted; and acquire a set composed of resources in the resource group under the node where the target function service is mounted as the third resource set.
[00150] In some embodiments, the resource acquiring module 1005 is configured to acquire a resource corresponding to the resource management request by taking an intersection of the first resource set, the second resource set, and the third resource set,
[00151] In some embodiments, the resource sending module 1006 is configured to: establish a second organization structure tree based on the resource corresponding to the resource management request, each node in the second organizational structure tree being mounted with the resource corresponding to the resource management request; and send the second organization structure tree to the terminal.
[00152] In summary, in the technical solutions according to the embodiments of the present disclosure, the permissions of the user, the application and the sendee function to the resources are implemented by the first organization structure tree, and the resources corresponding to permissions that simultaneously meet the user, the application, and the service function may be directly acquired by the first organization structure tree in response to receiving the request from the user to display the resource on the service function page of the application, thereby expanding the scope of permission management and increasing application scenarios of permission management.
[00153] FIG. 11 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present disclosure. The computer device 1100 includes a central processing unit (CPU) 1101, a system memory 1104 including a random-access memory (RAM) 1102 and a read-only memory (ROM) 1103, and a system bus 1105 connecting the system memory 1104 and the CPU 1101. The computer device 1100 further includes a basic input/output (170) system 1106 which helps to transmit information among various components within the computer device, and a mass storage device 1107 for storing an operating system 1113, an application 1114 and other program modules 1115.
[00154] The basic I/O system 1106 includes a display 1108 for displaying information and an input device 1109, such as a mouse, a keyboard and the like, for inputting information by the user. Both the display 1108 and the input device 1109 are connected to the CPU 1101 over an input/output controller 1110 connected to the system bus 1105. The basic I/O system 1106 may also include the input/output controller 1110 for receiving and processing input from a plurality of other devices, such as the keyboard, the mouse, or an electronic stylus. Similarly, the input/output controller 1110 further provides output to the display, a printer or other types of output devices. [00155] The mass storage device 1107 is connected to the CPU 1101 over a mass storage controller (not illustrated) connected to the system bus 1105. The mass storage device 1107 and a computer-readable medium associated therewith provide non-volatile storage for the computer device 1100. That is, the mass storage device 1107 may include the computer-readable medium (not illustrated), such as a hard disk or a compact disc read-only memory (CD-ROM) driver. [00156] Without loss of generality, the computer-readable medium may include a computer storage medium and a communication medium. The computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as a computer-readable instruction, a data structure, a program module or other data. The computer storage medium includes a RAM, a ROM, an erasable programmable read only memory; (EPROM), an electrically erasable programmable read-only memory (EEPROM), a CD-ROM, a digital video disc (DVD) or other optical storage; and a tape cassette, a magnetic tape, a magnetic disk storage or other magnetic storage devices. Certainly, it will be known by a person skilled in the art that the computer storage medium is not limited to above. The above system memory 1104 and the mass storage device 1107 may be collectively referred to as the memory. [00157] According to various embodiments of the present disclosure, the computer device 1100 may also be operated by being connected by a network such as the Internet to a remote computer device. That is, the computer device 1100 may be connected to the network 1112 by a network interface unit 1111 connected to the system bus 1105, or that is, the computer device 1100 may be connected to other types of networks or remote computer systems (not illustrated) by using the network interface unit 1111.
[00158] The memory further includes one or more programs stored in the memory. The CPU 1101 implements all or part of the steps executed by the server in the method illustratedm FIG. 2 or FIG. 4 by executing the one or more programs.
[00159] A person skilled in the art should be aware that in one or more examples above, the functions described in the embodiments of the present disclosure may be implemented by using hardware, software, firmware or any combination thereof. When software is used for implementation, these functions may be stored in a computer-readable storage medium or transmited as one or more instructions or codes in the computer-readable storage medium. The computer-readable storage medium includes a computer storage medium and a communication medium. The communication medium includes any medium that transfers a computer program from one place to another place. The storage medium may be any usable medium accessible to a general-purpose or special-purpose computer.
[00160] An embodiment of the present disclosure further provides a non-transitory computer-readable storage medium. The non-transitory computer-readable storage medium stores at least one program code that is loadable and executable by a processor of a computer device. The at least one program code, when loaded and executed by the processor, causes the computer device to perform the steps performed by the server in the method illustrated in FIG. 2 or FIG. 4.
[00161] An embodiment of the present disclosure further provides a computer program product or a computer program. The computer program product or the computer program includes one or at least one computer instruction stored in a computer-readable storage medium. The at least one computer instruction, when loaded and executed by a processor of a computer device, causes die computer device to perform all or part of the steps performed by the server in the method illustrated in FIG. 2 or FIG. 4.
[00162] Other embodiments of the present disclosure will be apparent to diose skilled in the art from consideration of die description and practice of the present disclosure. The present disclosure is intended to cover any variations, uses, or adaptations of the present disclosure following the general principles thereof and including common knowledge or commonly used technical measures which are not disclosed herein. The description and the embodiments are to be considered as exemplary only, with a true scope and spirit of the present disclosure indicated by the following claims.
[00163] It should be appreciated that the present disclosure is not limited to the exact construction that has been described above and illustrated in the accompanying drawings, and that various modifications and changes can be made without departing from the scope thereof. It is intended that the scope of the present disclosure is only limited by the appended claims.

Claims

CLAIMS What is claimed is:
1. A method for managing resources, applicable to a server of an application portal platform, the application portal platform being integrated with at least two applications, the method comprising: receiving a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; querying, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree comprising at least one node, the node being configured to mount at least one of a user, an application, a function service, and a resource; querying, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; querying, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service corresponding to the target function page; acquiring, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request; and sending the resource corresponding to the resource management request to the terminal.
2. The method according to claim 1, wherein querying, in each of the first organization structure trees, the first resource set composed of the resources corresponding to the target user comprises: querying, from each of the first organization structure trees, a resource under a node where the target user is mounted, and a resource under a descendant node of the node where the target user is mounted; querying, from each of the first organization structure trees, a resource under a node where a user group including the target user is mounted; querying, from each of the first organization structure trees, a resource where the target user is mounted; and acquiring the first resource set by taking a union of the resource under the node where the target user is mounted, the resource under the descendant node of the node where the target user is mounted, the resource under the node where the user group including the target user is mounted, and the resource where the target user is mounted.
3. The method according to claim 2, wherein querying, from each of the first organization structure trees, the resource under the node where the target user is mounted, and the resource under the descendant node of the node where the target user is mounted comprises: querying, from each of the first organization structure trees, a node where the target user is mounted, and a descendant node of the node where the target user is mounted; and acquiring, in the node where the target user is mounted and the descendant node of the node where the target user is mounted, a resource under a node that enables automatic authorization.
4. The method according to claim 1, wherein querying, in each of the first organization structure tree, the second resource set composed of the resources corresponding to the target application comprises: querying, from each of the first organization structure trees, the first organization structure tree where the target application is mounted; and acquiring a set composed of resources under all nodes in the first organization structure tree where the target application is mounted as the second resource set.
5. The method according to claim 1, wherein querying, in each of the first organization structure trees, the third resource set composed of the resources corresponding to the target function service comprises: querying, from each of the first organization structure trees, a resource group under a node where the target function service is mounted; and acquiring a set composed of resources in the resource group under the node where the target function service is mounted as the third resource set.
6. The method according to claim 1, wherein acquiring, based on the first resource set, the second resource set, and the third resource set, the resource corresponding to the resource management request comprises: acquiring a resource corresponding to the resource management request by taking an intersection of the first resource set, the second resource set, and the third resource set.
7. The method according to claim 1, wherein sending the resource corresponding to the resource management request to the terminal comprises: establishing a second organization structure tree based on the resource corresponding to the resource management request, each node in the second organizational structure tree being mounted with the resource corresponding to the resource management request; and sending the second organization structure tree to the terminal.
8. An apparatus for managing resources, applicable to a server of an application portal platform, the application portal platform being a platform integrated with at least two applications, the apparatus comprising: a request receiving module, configured to receive a resource management request from a terminal, the resource management request being configured to request a resource displayed on a target function page of a target application; a first resource set querying module, configured to query, in each of first organization structure trees, a first resource set composed of resources corresponding to a target user, the target user corresponding to the terminal, the first organization structure tree comprising at least one node, the node being configured to mount at least one of a user, an application, a functional service, and a resource; a second resource set querying module, configured to query, in each of the first organization structure trees, a second resource set composed of resources corresponding to the target application; a third resource set querying module, configured to query, in each of the first organization structure trees, a third resource set composed of resources corresponding to a target function service, the target function service being a function service corresponding to the target function page; a resource acquiring module, configured to acquire, based on the first resource set, the second resource set, and the third resource set, a resource corresponding to the resource management request; and a resource sending module, configured to send the resource corresponding to the resource management request to the terminal.
9. A computer device, comprising: a processor, and a memory configured to at least one instruction, at least one program, a code set, or an instruction set, wherein the processor, when loading and executing the at least one instruction, the at least one program, the code set or the instruction set, is caused to perform the method for managing resources as defined in any one of claims 1 to 7.
10. A non-transitory computer-readable storage medium storing at least one program code, wherein the program code, when loaded and executed by a processor of a computer device, causes the computer device to perform the method for managing resources as defined in any one of claims 1 to 7.
PCT/SG2022/050326 2021-05-20 2022-05-17 Method and apparatus for managing resources, computer device and storage medium WO2022245291A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110553396.2A CN113204427A (en) 2021-05-20 2021-05-20 Resource management method, resource management device, computer equipment and storage medium
CN202110553396.2 2021-05-20

Publications (2)

Publication Number Publication Date
WO2022245291A2 true WO2022245291A2 (en) 2022-11-24
WO2022245291A3 WO2022245291A3 (en) 2023-02-02

Family

ID=77032130

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2022/050326 WO2022245291A2 (en) 2021-05-20 2022-05-17 Method and apparatus for managing resources, computer device and storage medium

Country Status (2)

Country Link
CN (1) CN113204427A (en)
WO (1) WO2022245291A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113744105A (en) * 2021-09-08 2021-12-03 数字广东网络建设有限公司 Government affair resource management method, device, equipment and storage medium

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8793286B2 (en) * 2010-12-09 2014-07-29 International Business Machines Corporation Hierarchical multi-tenancy management of system resources in resource groups
US10044522B1 (en) * 2012-08-21 2018-08-07 Amazon Technologies Inc. Tree-oriented configuration management service
US9369473B2 (en) * 2013-09-06 2016-06-14 Cisco Technology, Inc. Method and system for extending network resources campus-wide based on user role and location
CN106930902A (en) * 2015-12-30 2017-07-07 天津银箭科技有限公司 Wind turbines remote real time monitoring system based on industrial technology of Internet of things
CN106055967A (en) * 2016-05-24 2016-10-26 福建星海通信科技有限公司 SAAS platform user organization permission management method and system
US11601436B2 (en) * 2017-05-09 2023-03-07 Intel Corporation Internet of things (IoT) network domain resource model
KR102102220B1 (en) * 2018-02-27 2020-04-20 아주대학교산학협력단 Permission management process and permission management apparatus
CN109242420B (en) * 2018-08-22 2023-10-13 中国平安人寿保险股份有限公司 Authority control method, authority control device, electronic equipment and storage medium
CN111107131B (en) * 2019-11-05 2023-07-21 远景智能国际私人投资有限公司 Management method and device of Internet of things equipment, server and storage medium
CN111191210B (en) * 2019-12-10 2022-09-27 未鲲(上海)科技服务有限公司 Method and device for controlling data access authority, computer equipment and storage medium
CN111008873B (en) * 2019-12-19 2023-06-30 北京奇艺世纪科技有限公司 User determination method, device, electronic equipment and storage medium
CN111818155A (en) * 2020-07-07 2020-10-23 腾讯科技(深圳)有限公司 Equipment control method and device based on Internet of things and computer program product
KR102220331B1 (en) * 2020-07-16 2021-02-24 설상법 PHOTOVOLTAIC POWER GENERATION HAVING ABILITY OF SAFETY BASED ON IoT AND METHOD THERE OF
CN111935131A (en) * 2020-08-06 2020-11-13 中国工程物理研究院计算机应用研究所 SaaS resource access control method based on resource authority tree
CN112199197B (en) * 2020-10-23 2023-07-18 网易(杭州)网络有限公司 Server management method and system
CN112600743A (en) * 2020-12-24 2021-04-02 珠海格力电器股份有限公司 Method, device and system for acquiring device control authority and storage medium

Also Published As

Publication number Publication date
WO2022245291A3 (en) 2023-02-02
CN113204427A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
US11544154B2 (en) Systems and methods for monitoring distributed database deployments
US11882099B1 (en) Trusted tunnel bridge
US9110976B2 (en) Supporting compliance in a cloud environment
US9600477B2 (en) Acquiring information dynamically regarding a hardware component in the cloud computing system while on the floor of the data center
CN111274268B (en) Internet of things data transmission method and device, medium and electronic equipment
CA2855191A1 (en) Systems and methods for dynamic service integration
AU2011323987A1 (en) Methods and systems for providing access to data and measurements in a management system
EP2633664B1 (en) Method and system for establishing secure authenticated bidirectional server communication
CN109587233A (en) Cloudy Container Management method, equipment and computer readable storage medium
CN111813418B (en) Distributed link tracking method, device, computer equipment and storage medium
US20230269277A1 (en) Systems and methods for determining risk ratings of roles on cloud computing platform
US11089107B1 (en) Management of connected sensor devices
WO2022245291A2 (en) Method and apparatus for managing resources, computer device and storage medium
US11676345B1 (en) Automated adaptive workflows in an extended reality environment
US11895237B1 (en) Scaled authentication of endpoint devices
WO2021012554A1 (en) Method and apparatus for updating data field in block chain, medium, and electronic device
US20210157949A1 (en) Event data tagged with consent records
CN112580065A (en) Data query method and device
CN107347024A (en) A kind of method and apparatus for storing Operation Log
CN109471849B (en) Model processing method and device, storage medium and electronic equipment
CN111126883B (en) Block chain-based research and development project information management method and device and electronic equipment
CN117009327B (en) Data processing method and device, computer equipment and medium
EP4350533A1 (en) Computer-implemented method and system for processing a service with sovereign data
CN114465766B (en) SSH-based remote access method and device, electronic equipment and storage medium
CN116450465B (en) Data processing method, device, equipment and medium

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE