WO2024022361A1 - 一种权限控制方法、装置、设备及存储介质 - Google Patents

一种权限控制方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2024022361A1
WO2024022361A1 PCT/CN2023/109211 CN2023109211W WO2024022361A1 WO 2024022361 A1 WO2024022361 A1 WO 2024022361A1 CN 2023109211 W CN2023109211 W CN 2023109211W WO 2024022361 A1 WO2024022361 A1 WO 2024022361A1
Authority
WO
WIPO (PCT)
Prior art keywords
permission
target
target object
operation permission
authority
Prior art date
Application number
PCT/CN2023/109211
Other languages
English (en)
French (fr)
Inventor
江国洲
Original Assignee
北京字跳网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京字跳网络技术有限公司 filed Critical 北京字跳网络技术有限公司
Publication of WO2024022361A1 publication Critical patent/WO2024022361A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support

Definitions

  • the present application relates to the field of computer technology, and in particular to an authority control method, device, equipment and storage medium.
  • information can be shared through the network.
  • documents can be shared over the network.
  • embodiments of the present application provide a permission control method, device, equipment and storage medium.
  • embodiments of the present application provide a permission control method, which method includes:
  • the operation permission that is allowed to be set for the target operation of the target object is determined, wherein the operation permission that is allowed to be set is less than or equal to the first operation permission.
  • the method also includes:
  • the operation authority of the target operation of the target object is determined to be the second operation authority, a correspondence relationship between the second operation authority and the target operation of the target object is saved, wherein:
  • the operation permissions allowed to be set include the second operation permissions.
  • the second operation authority inherits the first operation authority; or,
  • the second operation permission is the operation permission set by the user.
  • the method also includes:
  • Send prompt information where the prompt information is used to prompt that the target operation permission for the target object cannot be set, and the target operation permission is an operation permission greater than the first operation permission.
  • the method also includes:
  • the operation authority of the target operation of the target object is updated.
  • updating the operation permission of the target operation of the target object based on the third operation permission includes:
  • the operation authority of the target operation of the target object is maintained as the second operation authority.
  • updating the operation permission of the target operation of the target object based on the third operation permission includes:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • embodiments of the present application provide a permission control method, which method includes:
  • a permission setting page In response to the permission setting operation, a permission setting page is displayed.
  • the permission setting page includes multiple operation permissions for the target object.
  • the multiple operation permissions include operation permissions that are allowed to be set.
  • the permissions that are allowed to be set are The operation permission is less than or equal to the first operation permission, and the first operation permission is the operation permission of the target operation of the parent object of the target object;
  • the operation permission of the target operation of the target object is set as the second operation permission.
  • the multiple operation permissions also include target operation permissions
  • the permission setting page also includes Prompt information including the target operation authority, where the target operation authority is an operation authority greater than the first operation authority, and the prompt information is used to prompt that the target operation authority cannot be set.
  • the method also includes:
  • the operation authority of the target operation of the target object is updated.
  • updating the operation permission of the target operation of the target object based on the third operation permission includes:
  • the operation authority of the target operation of the target object is maintained as the second operation authority.
  • updating the operation permission of the target operation of the target object based on the third operation permission includes:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • an authority control device which includes:
  • the first acquisition unit is used to acquire the first operation permission of the target operation of the parent object of the target object;
  • a determining unit configured to determine, based on the first operation permission, the operation permission that is allowed to be set for the target operation of the target object, wherein the operation permission that is allowed to be set is less than or equal to the first operation permission.
  • the device also includes:
  • a saving unit configured to save the correspondence between the second operation permission and the target operation of the target object when the operation permission of the target operation of the target object is determined to be the second operation permission. Relationship, wherein the operation permissions allowed to be set include the second operation permissions.
  • the second operation authority inherits the first operation authority; or,
  • the second operation permission is the operation permission set by the user.
  • the device also includes:
  • a sending unit configured to send prompt information, where the prompt information is used to prompt that the target operation permission for the target object cannot be set, and the target operation permission is an operation permission greater than the first operation permission.
  • the device also includes:
  • a second acquisition unit configured to acquire the third operation authority of the target operation of the parent object in response to the modification operation of the first operation authority
  • An update unit configured to update the operation authority of the target operation of the target object based on the third operation authority.
  • the update unit is used for:
  • the operation authority of the target operation of the target object is maintained as the second operation authority.
  • the update unit is used for:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • an authority control device which includes:
  • the receiving unit is used to receive the permission setting operation for the target operation of the target object
  • a display unit configured to display a permission setting page in response to the permission setting operation.
  • the permission setting page includes multiple operation permissions for the target object, and the multiple operation permissions include operation permissions that are allowed to be set, so The allowed set operation permission is less than or equal to the first operation permission, and the first operation permission is the operation permission of the target operation of the parent object of the target object;
  • a setting unit configured to set the operation permission of the target operation of the target object as the second operation permission in response to the user's selection operation for the second operation permission among the operation permissions that are allowed to be set.
  • the plurality of operation permissions also include a target operation permission
  • the permission setting page also includes prompt information for the target operation permission.
  • the target operation permission is an operation permission greater than the first operation permission, so The above prompt information is used to prompt that the target operation permission cannot be set.
  • the device also includes:
  • An acquisition unit configured to acquire the third operation authority of the target operation of the parent object in response to the modification operation of the first operation authority
  • An update unit configured to update the operation authority of the target operation of the target object based on the third operation authority.
  • the update unit is used for:
  • the operation authority of the target operation of the target object is maintained as the second operation authority.
  • the update unit is used for:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • embodiments of the present application provide a device, which includes a processor and a memory;
  • the processor is configured to execute instructions stored in the memory, so that the device performs the method described in any one of the first aspects above, or to cause the device to perform the method described in any one of the second aspects above. method.
  • embodiments of the present application provide a computer-readable storage medium, including instructions that instruct the device to perform the method described in any one of the first aspects above, or the instructions instruct the device to perform the second method above. The method described in any of the aspects.
  • embodiments of the present application provide a computer program product.
  • the computer program product When the computer program product is run on a computer, it causes the computer to execute the method described in any one of the above first aspects, or causes the computer to execute the above third aspect. The method described in any one of the two aspects.
  • An embodiment of the present application provides a permission control method, which includes: obtaining the first operation permission of a target operation of a parent object of a target object, and based on the first operation permission, determining that the target operation of the target object is allowed to be Set operation permissions, wherein the operation permissions allowed to be set are less than or equal to the first operation permissions.
  • the operation permissions that can be set are constrained by the first operation permission of the target operation of the target object's parent object.
  • the target operation of the target object The operation authority cannot be greater than the first operation authority. In this way, it is possible to avoid information security problems caused by excessive operation authority for the target operation of the target object. Therefore, using this solution, information security can be effectively guaranteed.
  • Embodiments of the present application provide a permission control method, which includes: after the user triggers a permission setting operation for a target operation of a target object, after receiving the permission setting operation, and in response to the permission setting operation, displaying a permission setting page .
  • the permission setting page includes multiple operation permissions for the target object.
  • the multiple operation permissions include the operation permissions that are allowed to be set.
  • the operation permissions that are allowed to be set are less than or equal to the first operation permissions.
  • the third operation permissions are An operation permission is the operation permission of the target operation of the parent object of the target object. Further, the user may trigger a selection operation for one of the operation permissions allowed to be set.
  • the operation permission of the target operation of the target object may be set to the second operation permission in response to the selection operation.
  • Operation permission it can be seen that in the embodiment of the present application, when setting the target operation of the target object, the operation permissions that can be set are constrained by the first operation permission of the target operation of the target object's parent object. The operation authority of the target operation cannot be greater than the first operation authority. In this way, information security problems caused by excessive operation authority of the target operation of the target object can be avoided. Therefore, using this solution, information security can be effectively guaranteed.
  • Figure 1 is a schematic flowchart of a permission control method provided by an embodiment of the present application
  • Figure 2 is a schematic flowchart of a permission setting method provided by an embodiment of the present application.
  • Figure 3 is a schematic structural diagram of an authority control device provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of another authority control device provided by an embodiment of the present application.
  • the inventor of this application discovered through research that information security issues may arise during the sharing of information. For example, for a target object, a user (such as the shared party) can trigger a corresponding operation for the target object. For some operations, it may cause major information security issues, such as adding collaboration groups, downloads, and comments. In order to avoid information security risks caused by improper operations mentioned above, the permissions of such operations can be controlled to ensure information security.
  • embodiments of the present application provide a permission control method, device, equipment and storage medium.
  • Figure 1 is a schematic flowchart of a permission control method provided by an embodiment of the present application.
  • the permission control method shown in Figure 1 can be executed by the server or by the client. It is executed on the terminal and is not specifically limited in the embodiments of this application.
  • the method may include the following steps: S101-S102.
  • the target object may be any object shared through the network.
  • the target object may be a file, such as a document.
  • the target object may be a folder.
  • the target object may also be a knowledge space, and the knowledge space may be understood as a space carrying knowledge (or content). Among them, in the knowledge space, files can serve as carriers of knowledge (or content).
  • the parent object of the target object refers to the object corresponding to the parent node of the node corresponding to the target object after the object is abstracted into nodes.
  • the parent object of the target object can also be any object shared through the network.
  • the parent object when the target object is a file, considering that one file may include multiple sub-files, the parent object may also be a file. In addition, considering that a folder may include multiple files, when the target object is a file, the parent object of the target object may be a folder.
  • the folder when the target object is a folder, the folder may include other folders. Therefore, the parent object of the target object may also be a folder. In addition, considering that the knowledge space may include multiple folders, the parent object of the target object may be the knowledge space.
  • the target object when the target object is a knowledge space, considering that the tenant space may include the knowledge space, the parent object of the target object may be the tenant space.
  • the tenant space mentioned this time refers to the space provided for tenants to carry knowledge (or content), where tenants refer to individual users or user organizations that use the technical solutions involved in this application.
  • the target operation may be an operation supported by the target object.
  • the target operation may be an operation that has a greater impact on information security, for example.
  • the target operation may be to add collaborators to the target object. The object adds one or more collaborators, downloads the target object, and comments on the target object.
  • the embodiment of the present application does not specifically limit the first operation permission.
  • the first operation permission may be the current operation permission of the target operation of the parent object. For example, if the target operation is downloading, then the The first operation permission may be, for example, readable and downloadable.
  • S102 Based on the first operation permission, determine the operation permission that is allowed to be set for the target operation of the target object, wherein the operation permission that is allowed to be set is less than or equal to the first operation permission.
  • the operation authority of the target operation of the target object in order to avoid information security problems caused by inappropriate operations being performed on the target object, in the embodiment of the present application, the operation authority of the target operation of the target object can be controlled. Specifically, the operation permission to which the target operation is allowed to be set for the target object may be determined based on the first operation permission of the parent object. For the target operation of the target object, the operation permissions that can be set are subject to the first operation permission of the target operation of the target object's parent object. The reason for this is that the parent object can accommodate a lot of content, and the many contents it accommodates have different requirements for information security. Therefore, the operation permissions of the target operations of the parent object can be set more loosely. Correspondingly, the operation authority of the target operation of the target object cannot be greater than the first operation authority. In this way, information security problems caused by excessive operation authority of the target operation of the target object can be avoided.
  • the relationship between the second operation permission and the target operation of the target object can be saved. corresponding relationship.
  • the second operation permission may be one of the operation permissions set by the target operation permission of the target object.
  • the second operation permission may be the operation permission set by the user.
  • the second operation permission can inherit the first operation permission by default. In this case, the second operation permission It can be the same as the first operation authority.
  • the user can actively set the operation permissions of the target operation for the target object, for example, The operation authority of the target operation of the target object is set to a second operation authority that is smaller than the first operation authority. If the target object has similar requirements for the operation permissions of the target operation compared to its parent object, the user may not actively set the operation permissions of the target operation for the target object. In this case, the The operation permission of the target operation of the target object can inherit the first operation permission.
  • Figure 2 is a schematic flowchart of a permission setting method provided by an embodiment of the present application.
  • the method shown in Figure 2 can be executed by the client or the server, and is not specifically limited in the embodiments of this application.
  • the method shown in Figure 1 can be executed by the server, and the method shown in Figure 2 can be executed by the client corresponding to the server.
  • the method shown in Figure 2 may include the following S201-S203.
  • S201 Receive the permission setting operation for the target operation of the target object.
  • the user can trigger a permission setting operation for a target operation of the target object through the first control. After the user triggers the permission setting operation for the target operation of the target object, the user can receive the permission setting operation.
  • the permission setting page includes multiple operation permissions for the target object.
  • the multiple operation permissions include operation permissions that are allowed to be set.
  • the permissions are allowed to be set.
  • the set operation permission is less than or equal to the first operation permission, and the first operation permission is the operation permission of the target operation of the parent object of the target object.
  • a permission setting page may be displayed, which may include multiple operation permissions for the target object.
  • the multiple operation permissions include the operation permissions set by the target operation permission of the target object.
  • the multiple operation permissions of the target operation of the target object can be divided into two parts.
  • One part is the target operation permission of the target object.
  • the other part of the set operation permission is the target operation permission
  • the target operation permission is the operation permission that is not allowed to be set for the target operation of the target object.
  • prompt information can be sent.
  • the server can send the prompt information to the client,
  • the prompt information is used to prompt that the target operation permission for the target object cannot be set, and the target operation permission is an operation permission greater than the first operation permission.
  • the permission setting page may also include the target operation permission and the prompt information of the target operation permission.
  • the user can determine that the target operation permission cannot be set based on the prompt information.
  • the plurality of operation permissions may be displayed in a drop-down menu, wherein the display style of the target operation permission is different from the display style of the operation permissions that are allowed to be set.
  • the target operation permission is displayed in gray, and the set operation permission is allowed to be displayed normally.
  • S203 In response to the user's selection operation for the second operation permission among the operation permissions allowed to be set, set the operation permission of the target operation of the target object as the second operation permission.
  • the user can trigger a selection operation with the second operation permission among the operation permissions that are allowed to be set displayed in the permission setting page.
  • the operation permission of the target operation of the target object may be set as the second operation permission.
  • "setting the operation permission of the target operation of the target object as the second operation permission” may, for example, save the difference between the second operation permission and the target operation of the target object.
  • the target operation permission does not support being selected, or in other words, the user After a selection operation is triggered for any one of the target operation permissions, the selection operation may not be responded to.
  • the operation permissions of the target operation of the target object's parent object may change, for example, the user modifies the operation permissions of the target operation of the parent object, and changes the operation permissions of the target operation of the parent object to The operation permission is modified from the first operation permission to the third operation permission.
  • the third operation permission can be obtained, and based on the third operation permission, the target object can be The operation permissions of the target operation are updated to avoid information security problems caused by the mismatch between the second operation permissions and the third operation permissions.
  • the third operation authority is greater than or equal to the second operation authority, it means that the second operation authority does not exceed the authority scope defined by the third operation authority.
  • the target The operation authority of the target operation of the object is the second operation authority, which theoretically does not bring about major information security problems. Therefore, in this case, the operation of the target operation of the target object can be maintained. The permission remains unchanged as the second operation permission.
  • the third operation authority is less than the second operation authority, it means that the second operation authority exceeds the authority scope defined by the third operation authority.
  • the target object The operation permission of the target operation is the second operation permission, which may bring about information security problems. Therefore, in this case, the operation permission of the target operation of the target object can be changed to the second operation permission.
  • the operating authority is modified to the third operating authority.
  • the user can also modify the operation permission of the target operation of the target object to a fourth operation permission smaller than the third operation permission.
  • the operation authority is not specifically limited in the embodiment of this application.
  • the embodiment of the present application also provides a device.
  • the device will be introduced below with reference to the accompanying drawings.
  • FIG. 3 is a schematic structural diagram of an authority control device provided by an embodiment of the present application.
  • the authority control device 300 shown in FIG. 3 may specifically include, for example: a first acquisition unit 301 and a determination unit 302.
  • the first obtaining unit 301 is used to obtain the first operation permission of the target operation of the parent object of the target object;
  • Determining unit 302 configured to determine, based on the first operation permission, the operation permission that is allowed to be set for the target operation of the target object, wherein the operation permission that is allowed to be set is less than or equal to the first operation permission.
  • the device also includes:
  • a saving unit configured to save the correspondence between the second operation permission and the target operation of the target object when the operation permission of the target operation of the target object is determined to be the second operation permission. Relationship, wherein the operation permissions allowed to be set include the second operation permissions.
  • the second operation authority inherits the first operation authority; or,
  • the second operation permission is the operation permission set by the user.
  • the device also includes:
  • a sending unit configured to send prompt information, where the prompt information is used to prompt that the target operation permission for the target object cannot be set, and the target operation permission is an operation permission greater than the first operation permission.
  • the device also includes:
  • a second acquisition unit configured to acquire the third operation authority of the target operation of the parent object in response to the modification operation of the first operation authority
  • An update unit configured to update the operation authority of the target operation of the target object based on the third operation authority.
  • the update unit is used for:
  • the update unit is used for:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • the device 300 is a device corresponding to the authority control method corresponding to Figure 1 provided by the above method embodiments, the specific implementation of each unit of the device 300 is the same concept as the above method embodiments. Therefore, regarding For the specific implementation of each unit of the device 300, reference may be made to the relevant descriptions of the above method embodiments, which will not be described again here.
  • the authority control device 400 shown in FIG. 4 may specifically include: a receiving unit 401, a display unit 402, and a setting unit 403.
  • the receiving unit 401 is configured to receive the permission setting operation for the target operation of the target object
  • the display unit 402 is configured to display a permission setting page in response to the permission setting operation.
  • the permission setting page includes multiple operation permissions for the target object, and the multiple operation permissions include operation permissions that are allowed to be set, The operation permission that is allowed to be set is less than or equal to the first operation permission, and the first operation permission is the operation permission of the target operation of the parent object of the target object;
  • the setting unit 403 is configured to set the operation permission of the target operation of the target object as the second operation permission in response to the user's selection operation for the second operation permission among the operation permissions that are allowed to be set. .
  • the plurality of operation permissions also include a target operation permission
  • the permission setting page also includes prompt information for the target operation permission, and the target operation permission is greater than the first operation permission.
  • the operation permission of the target is used to prompt that the target operation permission cannot be set.
  • the device also includes:
  • An acquisition unit configured to acquire the third operation authority of the target operation of the parent object in response to the modification operation of the first operation authority
  • An update unit configured to update the operation authority of the target operation of the target object based on the third operation authority.
  • the update unit is used for:
  • the operation authority of the target operation of the target object is maintained as the second operation authority.
  • the update unit is used for:
  • the operation permission of the target operation of the target object is modified from the second operation permission to the third operation permission.
  • the target objects include any of the following:
  • the parent object of the target object is a file or folder
  • the parent object of the target object is a folder or a knowledge space
  • the parent object of the target object is a tenant space.
  • the target operation includes any one or more of the following:
  • the device 400 is a device corresponding to the authority control method corresponding to FIG. 2 provided by the above method embodiments, the specific implementation of each unit of the device 400 is the same concept as the above method embodiments. Therefore, regarding all For the specific implementation of each unit of the device 400, reference may be made to the relevant descriptions of the above method embodiments, which will not be described again here.
  • An embodiment of the present application also provides a device, which includes a processor and a memory;
  • the processor is configured to execute instructions stored in the memory, so that the device executes the permission control method described in any one of the above method embodiments.
  • Embodiments of the present application provide a computer-readable storage medium, including instructions that instruct a device to execute the authority control method described in any one of the above method embodiments.
  • Embodiments of the present application provide a computer program product.
  • the computer program product When the computer program product is run on a computer, it causes the computer to execute the authority control method described in any one of the above method embodiments.

Abstract

本申请公开了一种权限控制方法,包括:获取目标对象的父对象的目标操作的第一操作权限,并基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。由此可见,在本申请实施例中,对于目标对象的目标操作而言,其所能够设置的操作权限,受到目标对象的父对象的目标操作的第一操作权限的约束,目标对象的目标操作的操作权限,不能大于所述第一操作权限,这样一来,能够避免目标对象的目标操作的操作权限过大而带来信息安全问题。因此,利用本方案,能够有效保障信息安全。

Description

一种权限控制方法、装置、设备及存储介质
本申请要求于2022年7月29日提交中国国家知识产权局、申请号为202210907326.7、申请名称为“一种权限控制方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,特别是涉及一种权限控制方法、装置、设备及存储介质。
背景技术
随着计算机技术的发展,信息可以通过网络进行共享。例如,文档可以通过网络进行共享。
但是信息在共享的过程中,可能会面临信息安全问题,因此,如何保证信息安全,是目前尚待解决的问题。
发明内容
为了解决或者部分解决上述技术问题,本申请实施例提供了一种权限控制方法、装置、设备及存储介质。
第一方面,本申请实施例提供了一种权限控制方法,所述方法包括:
获取目标对象的父对象的目标操作的第一操作权限;
基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
可选的,所述方法还包括:
在所述目标对象的所述目标操作的操作权限被确定为第二操作权限的情况下,保存所述第二操作权限和所述目标对象的所述目标操作之间的对应关系,其中,所述允许被设置的操作权限,包括所述第二操作权限。
可选的,
所述第二操作权限继承所述第一操作权限;或者,
所述第二操作权限为用户设置的操作权限。
可选的,所述方法还包括:
发送提示信息,所述提示信息用于提示针对所述目标对象的目标操作权限不可设置,所述目标操作权限为大于所述第一操作权限的操作权限。
可选的,所述方法还包括:
响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
第二方面,本申请实施例提供了一种权限控制方法,所述方法包括:
接收针对目标对象的目标操作的权限设置操作;
响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限;
响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
可选的,所述多个操作权限还包括目标操作权限,所述权限设置页面还包 括所述目标操作权限的提示信息,所述目标操作权限为大于所述第一操作权限的操作权限,所述提示信息用于提示所述目标操作权限不可设置。
可选的,所述方法还包括:
响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
第三方面,本申请实施例提供了一种权限控制装置,所述装置包括:
第一获取单元,用于获取目标对象的父对象的目标操作的第一操作权限;
确定单元,用于基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
可选的,所述装置还包括:
保存单元,用于在所述目标对象的所述目标操作的操作权限被确定为第二操作权限的情况下,保存所述第二操作权限和所述目标对象的所述目标操作之间的对应关系,其中,所述允许被设置的操作权限,包括所述第二操作权限。
可选的,
所述第二操作权限继承所述第一操作权限;或者,
所述第二操作权限为用户设置的操作权限。
可选的,所述装置还包括:
发送单元,用于发送提示信息,所述提示信息用于提示针对所述目标对象的目标操作权限不可设置,所述目标操作权限为大于所述第一操作权限的操作权限。
可选的,所述装置还包括:
第二获取单元,用于响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
更新单元,用于基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述更新单元,用于:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述更新单元,用于:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
第四方面,本申请实施例提供了一种权限控制装置,所述装置包括:
接收单元,用于接收针对目标对象的目标操作的权限设置操作;
展示单元,用于响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限;
设置单元,用于响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
可选的,所述多个操作权限还包括目标操作权限,所述权限设置页面还包括所述目标操作权限的提示信息,所述目标操作权限为大于所述第一操作权限的操作权限,所述提示信息用于提示所述目标操作权限不可设置。
可选的,所述装置还包括:
获取单元,用于响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
更新单元,用于基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述更新单元,用于:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述更新单元,用于:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
第五方面,本申请实施例提供了一种设备,所述设备包括处理器和存储器;
所述处理器用于执行所述存储器中存储的指令,以使得所述设备执行以上第一方面任一项所述的方法,或者,以使得所述设备执行以上第二方面任一项所述的方法。
第六方面,本申请实施例提供了一种计算机可读存储介质,包括指令,所述指令指示设备执行以上第一方面任一项所述的方法,或者,所述指令指示设备执行以上第二方面任一项所述的方法。
第七方面,本申请实施例提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得计算机执行以上第一方面任一项所述的方法,或者,使得计算机执行以上第二方面任一项所述的方法。
与现有技术相比,本申请实施例具有以下优点:
本申请实施例提供了一种权限控制方法,包括:获取目标对象的父对象的目标操作的第一操作权限,并基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。由此可见,在本申请实施例中,对于目标对象的目标操作而言,其所能够设置的操作权限,受到目标对象的父对象的目标操作的第一操作权限的约束,目标对象的目标操作的操作权限,不能大于所述第一操作权限,这样一来,能够避免目标对象的目标操作的操作权限过大而带来信息安全问题。因此,利用本方案,能够有效保障信息安全。
本申请实施例提供了一种权限控制方法,包括:在用户触发针对目标对象的目标操作的权限设置操作,接收到所述权限设置操作之后,并响应于所述权限设置操作,展示权限设置页面。所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限。进一步地,所述用户可以针对所述允许被设置的操作权限中的其中一个操作权限触发选择操作。在用户针对所述允许被设置的操作权限中的第二操作权限触发选择操作之后,可以响应于所述选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。 由此可见,在本申请实施例中,在对目标对象的目标操作进行设置时,其所能够设置的操作权限,受到目标对象的父对象的目标操作的第一操作权限的约束,目标对象的目标操作的操作权限,不能大于所述第一操作权限,这样一来,能够避免目标对象的目标操作的操作权限过大而带来信息安全问题。因此,利用本方案,能够有效保障信息安全。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的一种权限控制方法的流程示意图;
图2为本申请实施例提供的一种权限设置方法的流程示意图;
图3为本申请实施例提供的一种权限控制装置的结构示意图;
图4为本申请实施例提供的又一种权限控制装置的结构示意图。
具体实施方式
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的发明人经过研究发现,信息在共享的过程中,可能会面临信息安全问题。例如,对于目标对象而言,用户(例如被共享方)可以针对所述目标对象触发相应的操作。对于一些操作而言,其可能会带来较大的信息安全问题,例如,添加协作组、下载以及评论等。为了避免由于上述操作不当而带来信息安全隐患,可以对这类操作的权限控制,从而保证信息安全。
鉴于此,本申请实施例提供了一种权限控制方法、装置、设备及存储介质。
下面结合附图,详细说明本申请的各种非限制性实施方式。
示例性方法
参见图1,该图为本申请实施例提供的一种权限控制方法的流程示意图。在本实施例中,图1所示的权限控制方法,可以由服务端执行,也可以由客户 端执行,本申请实施例不做具体限定。
在一个示例中,所述方法例如可以包括以下步骤:S101-S102。
S101:获取目标对象的父对象的目标操作的第一操作权限。
在本申请实施例中,所述目标对象可以是通过网络共享的任意对象。在一个示例中,所述目标对象可以是文件,例如可以是文档。在又一个示例中,所述目标对象可以是文件夹。在另一个示例中,所述目标对象还可以是知识空间,所述知识空间可以理解成承载知识(或者内容)的空间。其中,在所述知识空间中,文件可以作为知识(或者内容)的载体。
在本申请实施例中,所述目标对象的父对象,指的是将对象抽象为节点之后,该目标对象的对应的节点的父节点所对应的对象。在本申请实施例中,与目标对象类似,目标对象的父对象,也可以是通过网络共享的任意对象。
在一个示例中,当所述目标对象为文件时,考虑到一个文件下可以包括多个子文件,因此,所述父对象也可以是文件。另外,考虑到文件夹中可以包括多个文件,因此,当所述目标对象为文件时,所述目标对象的父对象,可以是文件夹。
在又一个示例中,当所述目标对象为文件夹时,文件夹中可以包括其它文件夹,因此,所述目标对象的父对象也可以是文件夹。另外,考虑到知识空间中可以包括多个文件夹,因此,所述目标对象的父对象,可以是知识空间。
在另一个示例中,当所述目标对象为知识空间时,考虑到租户空间可以包括知识空间,因此,所述目标对象的父对象可以是租户空间。此次提及的租户空间,指的是为租户提供的用于承载知识(或者内容)的空间,其中租户是指使用本申请所涉及技术方案的个人用户或者用户组织。
在本申请实施例中,目标操作可以是目标对象所支持的操作,在一些示例中,所述目标操作,例如可以是对信息安全影响较大的操作。在一些示例中,考虑到为目标对象添加协作者、下载所述目标对象以及评论所述目标对象,均可能会带来较大的信息安全问题,因此,所述目标操作可以是为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象中的其中一项或者多项。
本申请实施例不具体限定所述第一操作权限,所述第一操作权限,可以是所述父对象的目标操作当前的操作权限。例如,所述目标操作为下载,则所述 第一操作权限,例如可以是可阅读者可下载。
S102:基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
在本申请实施例中,为了避免目标对象被执行不当操作而带来信息安全问题,在本申请实施例中,可以对目标对象的目标操作的操作权限进行控制。具体地,可以基于父对象的第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限。对于目标对象的目标操作而言,其所能够设置的操作权限,受到目标对象的父对象的目标操作的第一操作权限的约束。这么做的原因在于,父对象所能容纳的内容较多,其所容纳的众多内容中,其对信息安全的需求不同,因此,父对象的目标操作的操作权限,可以设置的较为宽松。相应的,目标对象的目标操作的操作权限,不能大于所述第一操作权限,这样一来,能够避免目标对象的目标操作的操作权限过大而带来信息安全问题。
在一个示例中,还可以在所述目标对象的所述目标操作的操作权限被确定为所述第二操作权限的情况下,保存所述第二操作权限和所述目标对象的目标操作之间的对应关系。其中,第二操作权限可以是所述目标对象的所述目标操作允许被设置的操作权限中的其中一个操作权限。
关于所述第二操作权限,需要说明的是,在一个示例中,若用户主动设置了所述目标对象的目标操作的操作权限,则所述第二操作权限可以为用户设置的操作权限。在又一个示例中,若所述用户未主动设置所述目标对象的目标操作的操作权限,则所述第二操作权限可以默认继承所述第一操作权限,对于这种情况,第二操作权限可以和第一操作权限相同。
在一个示例,若所述目标对象相对于其父对象而言,其对目标操作的操作权限有更加严格的要求,则所述用户可以主动设置所述目标对象的目标操作的操作权限,例如,将所述目标对象的目标操作的操作权限,设置为小于所述第一操作权限的第二操作权限。若所述目标对象相对于其父对象而言,其对目标操作的操作权限的要求类似,则所述用户可以不主动设置所述目标对象的目标操作的操作权限,对于这种情况,所述目标对象的目标操作的操作权限,可以继承所述第一操作权限。
接下来,结合图2,介绍用户设置目标对象的目标操作的操作权限的方式。 参见图2,该图为本申请实施例提供的一种权限设置方法的流程示意图。图2所示的方法,可以由客户端执行,也可以由服务端执行,本申请实施例不做具体限定。
在一个具体的示例中,图1所示的方法可以由服务端执行,图2所示的方法可以由与该服务端对应的客户端执行。
图2所示的方法,可以包括如下S201-S203。
S201:接收针对目标对象的目标操作的权限设置操作。
在一个示例中,用户可以通过第一控件触发针对所述目标对象的目标操作的权限设置操作。用户触发针对所述目标对象的目标操作的权限设置操作之后,可以接收所述权限设置操作。
S202:响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限。
在一个示例中,接收到所述权限设置操作之后,可以展示权限设置页面,该权限设置页面中可以包括针对所述目标对象的多个操作权限。该多个操作权限,包括所述目标对象的目标操作允许被设置的操作权限。
不难理解的是,针对目标对象的目标操作的多个操作权限,基于第一操作权限,可以将该多个操作权限划分成两个部分,一部分为所述目标对象的所述目标操作允许被设置的操作权限,另一部分为目标操作权限,目标操作权限为所述目标对象的所述目标操作不允许被设置的操作权限。在一个示例中,确定所述目标对象的所述目标操作允许被设置的操作权限之后,可以发送提示信息,例如当该方法由服务端执行时,服务端可以向客户端发送所述提示信息,该提示信息用于提示针对所述目标对象的目标操作权限不可设置,所述目标操作权限为大于所述第一操作权限的操作权限。在一个示例中,对于这种情况,所述权限设置页面中还可以包括所述目标操作权限以及目标操作权限的所述提示信息。相应的,用户可以基于所述提示信息,确定目标操作权限不可设置。
在一个示例中,可以以下拉菜单的方式显示所述多个操作权限,其中,所述目标操作权限的显示样式与所述允许被设置的操作权限的显示样式不同。例如,所述目标操作权限置灰显示,所述允许被设置的操作权限正常显示。
S203:响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
在一个示例中,用户可以在所述权限设置页面中显示的所述允许被设置的操作权限中的第二操作权限触发选择操作,相应的,在接收到针对第二操作权限触发选择操作之后,可以响应于所述选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。其中,“将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限”,例如可以是保存所述第二操作权限和所述目标对象的所述目标操作之间的对应关系。
在又一个示例中,为了避免用户在设置目标对象的目标操作的操作权限时,针对目标操作权限触发选择操作,在本申请实施例中,所述目标操作权限不支持被选择,或者说,用户针对所述目标操作权限中的任意一个操作权限触发选择操作之后,可以不响应该选择操作。
在一个示例中,考虑到目标对象的父对象的目标操作的操作权限可能会发生改变,例如,用户对所述父对象的目标操作的操作权限进行了修改,将所述父对象的目标操作的操作权限由第一操作权限修改为了第三操作权限,对于这种情况,在本申请实施例中,可以获取第三操作权限,并基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,从而避免由于前述第二操作权限与第三操作权限不匹配而带来信息安全问题。
在一个示例中,若所述第三操作权限大于或者等于所述第二操作权限,则说明所述第二操作权限未超出第三操作权限所限定的权限范围,对于这种情况,所述目标对象的所述目标操作的操作权限为所述第二操作权限,理论上不会带来较大的信息安全问题,因此,对于这种情况,可以维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
在又一个示例中,若所述第三操作权限小于所述第二操作权限,则说明所述第二操作权限超出了第三操作权限所限定的权限范围,对于这种情况,所述目标对象的所述目标操作的操作权限为所述第二操作权限,可能会带来信息安全问题,因此,对于这种情况,可以将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。当然,所述用户也可以将所述目标对象的所述目标操作的操作权限修改为小于所述第三操作权限的第四 操作权限,本申请实施例不做具体限定。
示例性设备
基于以上实施例提供的方法,本申请实施例还提供了一种装置,以下结合附图介绍该装置。
参见图3,该图为本申请实施例提供的一种权限控制装置的结构示意图。图3所示的权限控制装置300例如可以具体包括:第一获取单元301和确定单元302。
第一获取单元301,用于获取目标对象的父对象的目标操作的第一操作权限;
确定单元302,用于基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
可选的,所述装置还包括:
保存单元,用于在所述目标对象的所述目标操作的操作权限被确定为第二操作权限的情况下,保存所述第二操作权限和所述目标对象的所述目标操作之间的对应关系,其中,所述允许被设置的操作权限,包括所述第二操作权限。
可选的,
所述第二操作权限继承所述第一操作权限;或者,
所述第二操作权限为用户设置的操作权限。
可选的,所述装置还包括:
发送单元,用于发送提示信息,所述提示信息用于提示针对所述目标对象的目标操作权限不可设置,所述目标操作权限为大于所述第一操作权限的操作权限。
可选的,所述装置还包括:
第二获取单元,用于响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
更新单元,用于基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述更新单元,用于:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象 的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述更新单元,用于:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
由于所述装置300是与以上方法实施例提供的由与图1对应的权限控制方法对应的装置,所述装置300的各个单元的具体实现,均与以上方法实施例为同一构思,因此,关于所述装置300的各个单元的具体实现,可以参考以上方法实施例的相关描述部分,此处不再赘述。
参见图4,该图为本申请实施例提供的又一种权限控制装置的结构示意图。图4所示的权限控制装置400例如可以具体包括:接收单元401、展示单元402和设置单元403。
接收单元401,用于接收针对目标对象的目标操作的权限设置操作;
展示单元402,用于响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限;
设置单元403,用于响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
可选的,所述多个操作权限还包括目标操作权限,所述权限设置页面还包括所述目标操作权限的提示信息,所述目标操作权限为大于所述第一操作权限 的操作权限,所述提示信息用于提示所述目标操作权限不可设置。
可选的,所述装置还包括:
获取单元,用于响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
更新单元,用于基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
可选的,所述更新单元,用于:
若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
可选的,所述更新单元,用于:
若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
可选的,所述目标对象包括以下任意一项:
文件、文件夹、以及知识空间。
可选的,
当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
可选的,所述目标操作包括以下任意一项或者多项:
为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
由于所述装置400是与以上方法实施例提供的与图2对应的权限控制方法对应的装置,所述装置400的各个单元的具体实现,均与以上方法实施例为同一构思,因此,关于所述装置400的各个单元的具体实现,可以参考以上方法实施例的相关描述部分,此处不再赘述。
本申请实施例还提供了一种设备,所述设备包括处理器和存储器;
所述处理器用于执行所述存储器中存储的指令,以使得所述设备执行以上方法实施例任一项所述的权限控制方法。
本申请实施例提供了一种计算机可读存储介质,包括指令,所述指令指示设备执行以上方法实施例任一项所述的权限控制方法。
本申请实施例提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得计算机执行以上方法实施例任一项所述的权限控制方法。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。
以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (23)

  1. 一种权限控制方法,其特征在于,所述方法包括:
    获取目标对象的父对象的目标操作的第一操作权限;
    基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述目标对象的所述目标操作的操作权限被确定为第二操作权限的情况下,保存所述第二操作权限和所述目标对象的所述目标操作之间的对应关系,其中,所述允许被设置的操作权限,包括所述第二操作权限。
  3. 根据权利要求2所述的方法,其特征在于,
    所述第二操作权限继承所述第一操作权限;或者,
    所述第二操作权限为用户设置的操作权限。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    发送提示信息,所述提示信息用于提示针对所述目标对象的目标操作权限不可设置,所述目标操作权限为大于所述第一操作权限的操作权限。
  5. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
    基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
  6. 根据权利要求5所述的方法,其特征在于,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
    若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
  7. 根据权利要求5所述的方法,其特征在于,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
    若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
  8. 根据权利要求1所述的方法,其特征在于,所述目标对象包括以下任意一项:
    文件、文件夹、以及知识空间。
  9. 根据权利要求8所述的方法,其特征在于,
    当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
    当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
    当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
  10. 根据权利要求1所述的方法,其特征在于,所述目标操作包括以下任意一项或者多项:
    为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
  11. 一种权限控制方法,其特征在于,所述方法包括:
    接收针对目标对象的目标操作的权限设置操作;
    响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限;
    响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
  12. 根据权利要求11所述的方法,其特征在于,所述多个操作权限还包括目标操作权限,所述权限设置页面还包括所述目标操作权限的提示信息,所述目标操作权限为大于所述第一操作权限的操作权限,所述提示信息用于提示所述目标操作权限不可设置。
  13. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    响应于对所述第一操作权限的修改操作,获取所述父对象的目标操作的第三操作权限;
    基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新。
  14. 根据权利要求13所述的方法,其特征在于,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
    若所述第三操作权限大于或者等于所述第二操作权限,维持所述目标对象的所述目标操作的操作权限为所述第二操作权限不变。
  15. 根据权利要求13所述的方法,其特征在于,所述基于所述第三操作权限,对所述目标对象的所述目标操作的操作权限进行更新,包括:
    若所述第三操作权限小于所述第二操作权限,则将所述目标对象的所述目标操作的操作权限由所述第二操作权限修改为所述第三操作权限。
  16. 根据权利要求1所述的方法,其特征在于,所述目标对象包括以下任意一项:
    文件、文件夹、以及知识空间。
  17. 根据权利要求16所述的方法,其特征在于,
    当所述目标对象为文件时,所述目标对象的父对象为文件或者文件夹;
    当所述目标对象为文件夹时,所述目标对象的父对象为文件夹或者知识空间;
    当所述目标对象为知识空间时,所述目标对象的父对象为租户空间。
  18. 根据权利要求11所述的方法,其特征在于,所述目标操作包括以下任意一项或者多项:
    为所述目标对象添加协作者、下载所述目标对象、以及评论所述目标对象。
  19. 一种权限控制装置,其特征在于,所述装置包括:
    第一获取单元,用于获取目标对象的父对象的目标操作的第一操作权限;
    确定单元,用于基于所述第一操作权限,确定所述目标对象的所述目标操作允许被设置的操作权限,其中,所述允许被设置的操作权限小于或者等于所述第一操作权限。
  20. 一种权限控制装置,其特征在于,所述装置包括:
    接收单元,用于接收针对目标对象的目标操作的权限设置操作;
    展示单元,用于响应于所述权限设置操作,展示权限设置页面,所述权限设置页面包括针对所述目标对象的多个操作权限,所述多个操作权限包括允许被设置的操作权限,所述允许被设置的操作权限小于或者等于第一操作权限,所述第一操作权限为所述目标对象的父对象的所述目标操作的操作权限;
    设置单元,用于响应于用户针对所述允许被设置的操作权限中的第二操作权限的选择操作,将所述目标对象的所述目标操作的操作权限,设置为所述第二操作权限。
  21. 一种设备,其特征在于,所述设备包括处理器和存储器;
    所述处理器用于执行所述存储器中存储的指令,以使得所述设备执行如权利要求1至18中任一项所述的方法。
  22. 一种计算机可读存储介质,其特征在于,包括指令,所述指令指示设备执行如权利要求1至18中任一项所述的方法。
  23. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得计算机执行如权利要求1至18中任一项所述的方法。
PCT/CN2023/109211 2022-07-29 2023-07-26 一种权限控制方法、装置、设备及存储介质 WO2024022361A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210907326.7A CN115146317A (zh) 2022-07-29 2022-07-29 一种权限控制方法、装置、设备及存储介质
CN202210907326.7 2022-07-29

Publications (1)

Publication Number Publication Date
WO2024022361A1 true WO2024022361A1 (zh) 2024-02-01

Family

ID=83414498

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/109211 WO2024022361A1 (zh) 2022-07-29 2023-07-26 一种权限控制方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN115146317A (zh)
WO (1) WO2024022361A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115146317A (zh) * 2022-07-29 2022-10-04 北京字跳网络技术有限公司 一种权限控制方法、装置、设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1987884A (zh) * 2005-12-19 2007-06-27 国际商业机器公司 用于对资源内容进行访问控制的方法和系统
CN106302483A (zh) * 2016-08-19 2017-01-04 上海帜讯信息技术股份有限公司 分权管理方法及系统
CN107403105A (zh) * 2017-06-30 2017-11-28 华为技术有限公司 一种文件系统的权限设置方法及装置
CN110674516A (zh) * 2019-09-18 2020-01-10 腾讯科技(深圳)有限公司 电子票据管理系统权限配置方法、装置和计算机设备
US20200019718A1 (en) * 2018-05-29 2020-01-16 Infortrend Technology, Inc. Method for managing the access authority to cloud storage and the system therefor
CN114297668A (zh) * 2021-11-22 2022-04-08 北京达佳互联信息技术有限公司 权限配置方法、装置、服务器、程序和存储介质
CN115146317A (zh) * 2022-07-29 2022-10-04 北京字跳网络技术有限公司 一种权限控制方法、装置、设备及存储介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1987884A (zh) * 2005-12-19 2007-06-27 国际商业机器公司 用于对资源内容进行访问控制的方法和系统
CN106302483A (zh) * 2016-08-19 2017-01-04 上海帜讯信息技术股份有限公司 分权管理方法及系统
CN107403105A (zh) * 2017-06-30 2017-11-28 华为技术有限公司 一种文件系统的权限设置方法及装置
US20200019718A1 (en) * 2018-05-29 2020-01-16 Infortrend Technology, Inc. Method for managing the access authority to cloud storage and the system therefor
CN110674516A (zh) * 2019-09-18 2020-01-10 腾讯科技(深圳)有限公司 电子票据管理系统权限配置方法、装置和计算机设备
CN114297668A (zh) * 2021-11-22 2022-04-08 北京达佳互联信息技术有限公司 权限配置方法、装置、服务器、程序和存储介质
CN115146317A (zh) * 2022-07-29 2022-10-04 北京字跳网络技术有限公司 一种权限控制方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN115146317A (zh) 2022-10-04

Similar Documents

Publication Publication Date Title
JP6674532B2 (ja) 複数構内でのデジタルコンテンツアイテムのホスティングにおけるコンテンツアイテムブロック複製プロトコル
US10805388B2 (en) System, method, and computer program for enabling a user to access and edit via a virtual drive objects synchronized to a plurality of synchronization clients
JP6013594B2 (ja) ローカル支援されるクラウドベースのストレージ
CN109716319B (zh) 云存储同步中基于策略的水合行为
US20130239014A1 (en) File transfer methodology for a desktop sharing system
JP2017123140A (ja) オブジェクト記憶システムにおけるオブジェクトデータの更新方法及び更新装置
WO2024022361A1 (zh) 一种权限控制方法、装置、设备及存储介质
CN114265639B (zh) 将被本地删除的内容留存在存储服务处
US20160241535A1 (en) Terminal authentication and registration system, method for authenticating and registering terminal, and storage medium
US10795699B1 (en) Central storage management interface supporting native user interface versions
CA2744662A1 (en) Persisting file system information on mobile devices
JP2015507787A (ja) 自律ネットワーク・ストリーミング
US20220229811A1 (en) Binding local device folders to a content management system for synchronization
US20200311137A1 (en) Unified metadata search
KR101701110B1 (ko) 공동 편집 문서를 공유하는 방법 및 장치
US10084844B2 (en) System and method for improved user-controlled electronic file and trash management
US9160695B2 (en) Minimizing the effects of email attachments on communication networks
US20110208761A1 (en) Coordinating content from multiple data sources
WO2024045646A1 (zh) 管理集群访问权限的方法、装置和系统
US9792130B2 (en) Rebooting to a UEFI application from a UEFI supported system
JP2016212852A (ja) 情報処理装置、情報処理システムおよび方法
US10242024B1 (en) Dynamic reprioritization of content download during synchronization
US11836207B2 (en) User-initiated workflow to collect media
US9323777B1 (en) Distributed file-sharing across personal devices
CN113946550A (zh) 基于局域网去中心化实现文件共享的方法、装置、处理器及其计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845569

Country of ref document: EP

Kind code of ref document: A1