CN111859868A - Operation authority control method and device, electronic equipment and storage medium - Google Patents

Operation authority control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111859868A
CN111859868A CN201911329379.XA CN201911329379A CN111859868A CN 111859868 A CN111859868 A CN 111859868A CN 201911329379 A CN201911329379 A CN 201911329379A CN 111859868 A CN111859868 A CN 111859868A
Authority
CN
China
Prior art keywords
node
target node
target
nodes
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911329379.XA
Other languages
Chinese (zh)
Inventor
肖锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Didi Infinity Technology and Development Co Ltd
Original Assignee
Beijing Didi Infinity Technology and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Didi Infinity Technology and Development Co Ltd filed Critical Beijing Didi Infinity Technology and Development Co Ltd
Priority to CN201911329379.XA priority Critical patent/CN111859868A/en
Publication of CN111859868A publication Critical patent/CN111859868A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/60Editing figures and text; Combining figures or text

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an operation authority control method, an operation authority control device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring a node identifier of an operated target node in a target mind map and a user set corresponding to the target mind map; determining node identifications of other nodes located on the same thought wire as the target node; determining other users except the current user operating the target node in the user set; and setting the operation authority of the other users at the target node and the other nodes as forbidden operation, so that the problem of operation conflict of the target thinking graph can be reduced.

Description

Operation authority control method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of information technology, and in particular, to an operation authority control method, an apparatus, an electronic device, and a storage medium.
Background
The thinking guide graph is a graphic tool for expressing divergent thinking, can quickly arrange personal knowledge points, and can record different thinking points on the same thinking guide line.
When thinking diagrams are shared, scenes need to be edited cooperatively, and the problem of real-time collaborative editing of multiple persons needs to be solved at this time. When multiple persons collaboratively edit, editing conflicts are easy to occur, for example, the node S1 in the mind map, the user a and the user B edit the node S1 simultaneously, and at this time, the content displayed by the node S1 in the terminal device of each user may be confused, which results in poor user experience.
Disclosure of Invention
In view of the above, an object of the present application is to provide an operation authority control method, apparatus, electronic device and storage medium, so as to reduce the problem of editing conflict occurring in a mind map.
In a first aspect, an embodiment of the present application provides an operation authority control method, where the method includes:
acquiring a node identifier of an operated target node in a target mind map and a user set corresponding to the target mind map;
determining node identifications of other nodes located on the same thought wire as the target node; determining other users except the current user operating the target node in the user set;
and setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
In one embodiment, determining node identities of other nodes on the same thought wire as the target node comprises:
acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
Setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
In one embodiment, the method further comprises:
acquiring an operation action of a current user operating the target node;
the determining node identifications of other nodes on the same thought wire as the target node includes:
based on the obtained operation action, determining node identifications of other nodes on the same thinking lead with the target node.
In one embodiment, determining node identities of other nodes on the same thought wire as the target node based on the obtained operation action includes:
if the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
Setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
In one embodiment, determining node identities of other nodes on the same thought wire as the target node based on the obtained operation action includes:
if the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
In one embodiment, the method further comprises:
and if the target node is not detected to have the operation action within the preset time length, changing the operation permission of the other users in the target node and the other nodes from forbidden operation to operation.
In one embodiment, the method further comprises:
and sending the node identification of the target node and the node identifications of other nodes to terminal equipment corresponding to other users, so that the terminal equipment changes the displayed target node and other nodes from a first presentation style to a second presentation style.
In a second aspect, an embodiment of the present application provides an operation authority control method, where the method includes:
receiving node identification of a target node with the operation authority of prohibiting operation in the target thinking graph and node identification of other nodes which are positioned on the same thinking lead with the target node;
changing the target node and the other nodes in the displayed target mind map from a first presentation style to a second presentation style.
In a third aspect, an embodiment of the present application provides an operation authority control device, including:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a node identifier of an operated target node in a target thinking graph and a user set corresponding to the target thinking graph;
The determining module is used for determining the node identifications of other nodes which are positioned on the same thinking lead with the target node; determining other users except the current user operating the target node in the user set;
and the setting module is used for setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
In one embodiment, the determining module is configured to determine node identities of other nodes located on the same thought wire as the target node according to the following steps:
acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
the setting module is used for setting the operation authority of the other users at the target node and the other nodes as forbidden operation according to the following steps:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
In one embodiment, the obtaining module is further configured to:
acquiring an operation action of a current user operating the target node;
the determining module is used for determining node identifications of other nodes on the same thinking wire as the target node according to the following steps:
based on the obtained operation action, determining node identifications of other nodes on the same thinking lead with the target node.
In one embodiment, the determining module is configured to determine node identities of other nodes located on the same thought wire as the target node according to the following steps:
if the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
the setting module is used for setting the operation authority of the other users at the target node and the other nodes as forbidden operation according to the following steps:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
In one embodiment, the determining module is configured to determine node identities of other nodes located on the same thought wire as the target node according to the following steps:
if the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
the setting module is used for setting the operation authority of the other users at the target node and the other nodes as forbidden operation according to the following steps:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
In one embodiment, the setup module is further configured to:
and if the target node is not detected to have the operation action within the preset time length, changing the operation permission of the other users in the target node and the other nodes from forbidden operation to operation.
In one embodiment, the method further comprises: a sending module, the sending module configured to:
and sending the node identification of the target node and the node identifications of other nodes to terminal equipment corresponding to other users, so that the terminal equipment changes the displayed target node and other nodes from a first presentation style to a second presentation style.
In a fourth aspect, an embodiment of the present application provides an operation authority control apparatus, including:
the receiving module is used for receiving the node identification of a target node with the operation permission of forbidding operation in the target thinking graph and the node identification of other nodes positioned on the same thinking wire with the target node;
and the display module is used for changing the target node and the other nodes in the displayed target thinking map from a first presentation style to a second presentation style.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the method according to the first aspect or to perform the steps of the method according to the second aspect.
In a fifth aspect, the present embodiments provide a computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, performing the steps of the method according to the first aspect, or performing the steps of the method according to the second aspect.
The operation authority control method and the operation authority control method provided by the embodiment of the application acquire the node identification of the operated target node in the target thinking graph, determine the node identifications of other nodes positioned on the same thinking wire with the target node in the user set corresponding to the target thinking graph, and determine the operation authority of other users at the target node and other nodes to be forbidden except other users outside the current user for operating the target node in the user set. Therefore, operation conflicts of the target mind map can be reduced, and the effective operation efficiency of the user on the target mind map is improved to a certain extent.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 illustrates a first flowchart of an operation authority control method provided in an embodiment of the present application;
fig. 2 shows a second flowchart of an operation authority control method provided in an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a first structure of an operation authority control device according to an embodiment of the present application;
fig. 4 is a second structural schematic diagram of an operation authority control device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 6 shows a schematic structural diagram of another electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and steps without logical context may be performed in reverse order or simultaneously. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
To enable those skilled in the art to use the present disclosure, the following embodiments are presented in conjunction with a specific application scenario, "travel scenario". It will be apparent to those skilled in the art that the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the application. Although the present application primarily focuses on travel scenarios, it should be understood that this is only one exemplary embodiment.
It should be noted that in the embodiments of the present application, the term "comprising" is used to indicate the presence of the features stated hereinafter, but does not exclude the addition of further features.
The information recommendation method in the embodiment of the application can be applied to a server and can also be applied to any other computing equipment with a processing function. In some embodiments, the server or computing device may include a processor. The processor may process information and/or data related to the service request to perform one or more of the functions described herein.
The thought graph comprises a plurality of thought wires, each thought wire comprises a plurality of nodes, different nodes store different knowledge points, a plurality of users can edit the same thought graph at the same time, when different users operate the same node in the thought graph or operate the nodes on the same thought wire, editing conflicts may exist, for example, a node S1 located at the upstream of a certain thought wire is being edited by a user A, and the user B also expects a node S2 located at the downstream of the thought wire, if the user A deletes the node S1 suddenly, the editing content of the node S2 is completely invalidated by the user B, the problem that editing conflicts occur everywhere in thinking is increased, and the experience of the users is reduced.
Based on this, the embodiment of the present application provides an operation authority control method, which obtains a node identifier of an operated target node in a target mind map, and a user set corresponding to the target mind map, determines node identifiers of other nodes located on the same mind wire as the target node, and determines that, in the user set, except for other users outside a current user for operating the target node, operation authorities of the other users at the target node and the other nodes are set as operation prohibition. Therefore, the problem of operation conflict of the target mind map can be reduced, the effective operation efficiency of the user on the target mind map is improved to a certain extent, and the experience degree of the user is improved.
An embodiment of the present application provides an operation authority control method, as shown in fig. 1, where the method is applied to a server, and the method specifically includes the following steps:
s101, acquiring a node identifier of an operated target node in a target mind map and a user set corresponding to the target mind map;
s102, determining node identifications of other nodes on the same thinking lead with the target node; determining other users except the current user operating the target node in the user set;
s103, setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
In S101, a target mind map includes a plurality of mind wires, each mind wire includes a plurality of nodes, each node can store data content, and the data content stored in the mind map can be the content of the communication field, the education field, the game field, the literature field, the financial field, and the like; the operated target is a node on which the current user is editing; the target mind map may be edited by a plurality of users on line at the same time, and of course, there may be a case where the user is browsing the content of the target mind map, but does not edit the content of the target mind map, and then the user editing the target mind map and the user browsing the content of the target mind map form a user set corresponding to the target mind map.
In S102, the node identifier may be a node name, and the node identifier may be represented by a number and a letter, and may be determined according to an actual situation; the same thinking lead generally comprises a plurality of nodes with sequential logical relations, and the next-level node of each node can be one or a plurality of and can be determined according to actual conditions; the operation authority of the user at the node represents the authority of the user at the node, the operation authority can comprise forbidden operation and operability, the operable representation user can edit the content of the node, and the forbidden operation representation user can not edit the node but only browse.
In the implementation process, considering that the content change of the node belonging to the upstream node of the same thinking conductor may affect the downstream node of the thinking conductor, for example, the node a is located upstream of the node B, and if the node a is deleted, the node B is also deleted accordingly. Therefore, when the user is editing the current node in the mind map, the user is concentrated on other users except the user corresponding to the current node in consideration of the upstream node and the downstream node of the mind wire to which the current node edited by the user belongs, and the operation authority of the upstream node and the downstream node is changed, which will be described in detail below.
In order to ensure that each user in the user set does not have editing conflict phenomenon when operating the target mind map, the operation authority of the user at the upstream node and the downstream node of the current node and the current node belonging to the same mind wire can be changed into forbidden operation, that is, when determining the node identification of other nodes on the same mind wire with the target node, the method can include the following steps:
acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
the setting of the operation authority of the other users at the target node and the other nodes as prohibited operation may include the following steps:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
Here, different thinking wires have the same root node, which is the root node of the target thinking graph, and the root node does not allow users in the user set to edit, and only users with administrator authority can edit the root node.
In the specific implementation process, aiming at the target node being operated, the thinking conductor to which the target node belongs is determined based on the node identification of the target node, and further, the node identifications of the root node and other nodes except the root node are obtained from the determined thinking conductor, so that the operation authorities of other users except the current user corresponding to the node in the user set and other nodes except the root node and the target node on the target node and the same thinking conductor with the target node are set as forbidden operation.
For example, the user set includes 5 users, respectively P1, P2, P3, P4, P5, user P1 is editing node B1 in the thought graph, users P2, P3, P4, P5 are editing other nodes, which is not illustrated here, and the upstream of node B1 includes nodes a1 and a0, where a0 is a root node of the thought graph, the next-level node of node B1 includes C1 and C2, the next-level node of C1 includes D1, the node identifications of nodes belonging to the same thought wire as node B1 are respectively a1, C1, C2, D1, and at this time, the operations of P2, P3, P4, P5 at a1, B1, C1, C2, D1 are set as the operation prohibition.
Considering that when the operation permissions of the nodes except the root node and the target node in the same thinking conductor are set as operation prohibition, other users can edit the nodes only after the operation permissions of the nodes which are operation prohibition are changed to be operable, if the editing time of the editing node by the editing user is longer, the waiting time of the other users is longer, and the nodes belonging to the same thinking conductor are not necessarily influenced by the target node which is being edited, so that the experience of the other users is greatly influenced, and the efficiency of the other users for editing the thinking conductor is reduced.
In order to improve the experience of the user and increase the attraction of the mind map to the user, when the operation authority for prohibiting the operation is set, the operation behavior of the user of the node being edited is considered, that is, the operation action of the current user operating the target node is obtained, and based on the obtained operation action, the node identification of other nodes on the same mind wire with the target node is determined.
Here, the operation action may include a content editing action that characterizes an editing action of a user in editing the content of the node and a content deleting action that characterizes a deleting action of the user in deleting the content of the node.
Considering that the different operation actions of the user at the node may not affect all nodes of the whole thought wire, but may affect the upstream node or the downstream node of the node, therefore, part of the nodes can be selected from other nodes belonging to the same thought wire as the edited node, and the operation authority of the selected part of the nodes is changed to be forbidden operation, so that when other users happen to edit other nodes in the current thought wire, the waiting time of other users can be reduced, and the experience of other users is improved.
The following describes the setting of the node state for different operation actions.
The first condition is as follows: when the operation action is a content deletion action.
Determining node identifications of other nodes located on the same thought wire as the target node based on the acquired operation actions, including:
if the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
Setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
In the specific implementation process, for a target node being operated, a thought wire to which the target node belongs is determined based on a node identifier of the target node, an operation action of a user at the target node is detected, if the detected operation action is a content deletion action, it is indicated that the user deletes part of content of the target node, and it is indicated that the user has a risk of deleting the target node to a certain extent, and if the target node is deleted, users operating downstream nodes of the thought wire all receive an influence, for example, the work of the user operating the downstream nodes is abandoned. At this time, the node identifiers of other nodes located after the target node, that is, the node identifiers of other nodes located downstream of the target node are acquired from the determined thinking leads, so that the operation authorities of other users except the current user corresponding to the target node in the user set at the target node and other nodes located downstream of the target node are set as operation prohibition.
For example, continuing with the previous example, user P1 is deleting the content of node B1 in the mind map, and node B1 includes nodes a1 and a0 upstream of node B1, where a0 is the root node of the mind map, the next level nodes of node B1 include C1 and C2, the next level nodes of C1 include D1, the node identifications of the nodes belonging to the same mind wire as node B1 and located after node B1 are C1, C2, D1, respectively, at which time the operating rights of P2, P3, P4, P5 at B1, C1, C2, D1, respectively, are set to prohibit operation.
Case two: when the operation action is a content editing action.
Determining node identifications of other nodes located on the same thought wire as the target node based on the acquired operation actions, including:
if the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
And setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
In the specific implementation process, for a target node being operated, based on a node identifier of the target node, a thought wire to which the target node belongs is determined, and an operation action of a user at the target node is detected, if the detected operation action is a content editing action, which indicates that the user is editing the node content of the target node, and other nodes located upstream of the node in the thought wire are deleted, the edited content of the user corresponding to the node is completely invalidated, in order to ensure that the work of the current user corresponding to the target node is not invalidated, at this time, node identifiers of other nodes located before the target node, that is, node identifiers of other nodes located upstream of the target node, are obtained from the determined thought wire, so that the user is concentrated on other users except the user corresponding to the target node, the operation authority of the target node and other nodes located upstream of the target node is set to disable operation. The other nodes before the target node include a root node, and when the operation authority is set, the root node may be set to prohibit operation, or the operation authority of the root node may not be set, which may be determined according to specific situations.
For example, continuing the previous example, user P1 is editing the content of node B1 in the mind map, and node B1 includes nodes a1 and a0 upstream of node B1, where a0 is the root node of the mind map, the next level nodes of node B1 include C1 and C2, the next level nodes of C1 include D1, the node identifications of the nodes belonging to the same mind wire as node B1 and located before node B1 are a0 and a1, respectively, and a0 is the root node, at which time the operating rights of P2, P3, P4, P5 at node a1 and node B1, respectively, are set to disable operation.
After setting the operation authority of other users on the target node and other nodes which are positioned on the same thinking lead with the target node as the forbidden operation, sending the node identification of the target node and the node identifications of other nodes to the terminal equipment corresponding to other users in the user set.
For example, continuing the previous example, taking the example that the user P1 is editing the content of node B1 in the mind map, setting the states of P2, P3, P4, and P5 at node a1 and node B1, respectively, to the operation disabled state, then sending the node identifications of node a1 and node B1 to P2, P3, P4, and P5, respectively.
The terminal device changes the displayed target node and the other nodes from a first presentation style to a second presentation style, that is, after receiving the node identifier with the operation permission of forbidden operation, the terminal device can change the presentation style of the node with the operation permission of forbidden operation from the first presentation style to the second presentation style in the target mind map, different presentation styles can be identified by colors or icons, the first presentation style represents that a user can edit the content of the node, and the second presentation style represents that the user cannot edit the content of the node.
When the presentation styles are identified by colors, a first presentation style of the contents of the target node and other nodes may be displayed by a black font, a second presentation style of the contents of the target node and other nodes may be displayed by a gray font, and when the contents are presented by the gray font, the contents may not be edited.
When the presentation style is identified by the icon, the first presentation style of the contents of the target node and other nodes may not display the icon, and the second presentation style of the contents of the target node and other nodes may display the lock icon to prompt the user that the node is not editable.
The method includes that a user in a user set edits node contents of different nodes in a target mind map, namely, the user is editing one node in the mind map at the previous moment, the user may edit another node in the mind map at the next moment, when the user is editing one node in the mind map, operation permissions of other users at the node and related nodes are forbidden to be operated by equipment, when the user leaves the node and operates other nodes, other users can operate the node, and at the moment, the operation permissions of the node and related nodes can be changed from forbidden to operation, so that other users can operate the node conveniently.
Specifically, if the target node is not detected to have the operation action within the preset time, the operation permission of the other users in the target node and the other nodes is changed from forbidden operation to operation.
Here, the preset time period is preset and may be several consecutive seconds, and is determined according to actual conditions.
In the specific implementation process, the operation action of the user on the target node is detected in real time for the target node being edited, if the operation action of the node is not detected within the preset time length, the node is not edited by the user, at this time, the user can be concentrated on other users except the user corresponding to the node, and the node operation authority of the node and other nodes belonging to the same thinking lead with the node is changed from operation prohibition to operation.
For example, the user set includes 5 users, respectively P1, P2, P3, P4, P5, the user P1 is editing the node B1 in the thought graph, the users P2, P3, P4, P5 are editing other nodes, which is not illustrated here, the node identifiers of the nodes of which the node B1 belongs to the same thought wire are respectively a1, C1, C2, D1, at this time, the operation rights of P2, P3, P4, P5 at a1, B1, C1, C2, D1 are changed from forbidden operation to operable.
In the case of the first case, the operation authority of each of the other nodes behind the target node, which belong to the same thinking line as the target node and are located outside the current user corresponding to the target node, may be changed from the operation prohibition to the operation operability.
For example, the user set includes 5 users, respectively P1, P2, P3, P4, and P5, the user P1 is performing content deletion operation on the node B1 in the thought graph, the users P2, P3, P4, and P5 are editing other nodes, which is not illustrated here, the node B1 belongs to the same thought wire, and the node identifications of the nodes located downstream of the node B1 are respectively C1, C2, and D1, at which time, the operation rights of the nodes P2, P3, P4, and P5 at B1, C1, C2, and D1, respectively, are changed from prohibited operation to operable operation.
In the second case, the other users except the current user corresponding to the target node may be collected, and the operation authority of each node before the target node and the node belonging to the same thinking line may be changed from the operation prohibition to the operation operability.
For example, the user set includes 5 users, P1, P2, P3, P4, P5 respectively, the user P1 is performing content editing actions on the node B1 in the thinking graph, the users P2, P3, P4, P5 are editing other nodes, which is not exemplified here, the node B1 belongs to the same thinking conductor, and the node of the node located upstream of the node B1 is identified as a1, at which time the operation rights of P2, P3, P4, P5 at a1 and B1 respectively are changed from prohibited to operable.
An embodiment of the present application further provides an operation authority control method, as shown in fig. 2, where the method is applied to a terminal device, and the terminal device is a terminal device of any user except a current user of an operation target node in a user set, and the method includes:
s201, receiving node identification of a target node with the operation authority of prohibiting operation in the target thinking graph and node identification of other nodes which are positioned on the same thinking wire with the target node;
s202, changing the target node and the other nodes in the displayed target thinking map from a first presentation style to a second presentation style.
Here, the other nodes on the same thought wire as the target node may be other nodes on the thought wire except the target node, or may be some of the other nodes, and may be determined according to actual conditions.
In a specific implementation process, taking an example that a user is operating a target node in a target mind map as an example for explanation, after receiving a node identifier of a target node whose operation authority is prohibited in the target mind map and node identifiers of other nodes located on the same mind wire as the target node, the terminal device of any other user concentrated by the user except for the current user operating the target node may change the target node and other nodes in the displayed target mind map from a first presentation style to a second presentation style, and the presentation styles of the target node and other nodes may refer to the above, which is not described herein again. Therefore, other users can determine the nodes which can be operated by themselves through the change of the presentation style, and select the nodes which can be edited by themselves for operation, so that the editing conflict between the other users and the current user for editing the target nodes at the same time is avoided, and meanwhile, the display disorder in the terminal equipment is also avoided.
Based on the same inventive concept, an operation authority control device corresponding to the operation authority control method is also provided in the embodiments of the present application, and because the principle of solving the problem of the device in the embodiments of the present application is similar to the operation authority control method described above in the embodiments of the present application, the implementation of the device can refer to the implementation of the method, and repeated details are not described again.
Referring to fig. 3, a schematic diagram of an operation authority control apparatus provided in an embodiment of the present application, where the apparatus is applied in a server, and the apparatus includes:
an obtaining module 31, configured to obtain a node identifier of an operated target node in a target mind map, and a user set corresponding to the target mind map;
a determining module 32 for determining node identifications of other nodes located on the same thought wire as the target node; determining other users except the current user operating the target node in the user set;
a setting module 33, configured to set the operation authority of the other user in the target node and the other node as a prohibition operation.
In one embodiment, the determining module 32 is configured to determine the node identification of other nodes located on the same thought wire as the target node according to the following steps:
Acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
the setting module 33 is configured to set the operation authority of the other user at the target node and the other node as a prohibited operation according to the following steps:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
In one embodiment, the obtaining module 31 is further configured to:
acquiring an operation action of a current user operating the target node;
the determination module 32 is configured to determine node identifications of other nodes located on the same thought wire as the target node according to the following steps:
based on the obtained operation action, determining node identifications of other nodes on the same thinking lead with the target node.
In one embodiment, the determining module 32 is configured to determine the node identification of other nodes located on the same thought wire as the target node according to the following steps:
If the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
the setting module 33 is configured to set the operation authority of the other user at the target node and the other node as a prohibited operation according to the following steps:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
In one embodiment, the determining module 32 is configured to determine the node identification of other nodes located on the same thought wire as the target node according to the following steps:
if the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
The setting module 33 is configured to set the operation authority of the other user at the target node and the other node as a prohibited operation according to the following steps:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
In one embodiment, the setting module 33 is further configured to:
and if the target node is not detected to have the operation action within the preset time length, changing the operation permission of the other users in the target node and the other nodes from forbidden operation to operation.
In one embodiment, the apparatus further comprises: a sending module 34, wherein the sending module 34 is configured to:
and sending the node identification of the target node and the node identifications of other nodes to terminal equipment corresponding to other users, so that the terminal equipment changes the displayed target node and other nodes from a first presentation style to a second presentation style.
Referring to fig. 4, a schematic diagram of an operation authority control apparatus provided in an embodiment of the present application is shown, where the apparatus is applied to a terminal device, and the apparatus includes:
A receiving module 41, configured to receive a node identifier of a target node in the target mind map, where the operation authority of the target node is prohibited from operating, and node identifiers of other nodes located on the same mind wire as the target node;
a display module 42, configured to change the target node and the other nodes in the displayed target mind map from a first presentation style to a second presentation style.
An embodiment of the present application further provides an electronic device 50, as shown in fig. 5, which is a schematic structural diagram of the electronic device 50 provided in the embodiment of the present application, and includes: a processor 51, a memory 52, and a bus 53. The memory 52 stores machine-readable instructions executable by the processor 51 (for example, execution instructions corresponding to the obtaining module 31, the determining module 32, and the setting module 33 in the apparatus in fig. 3, and the like), when the electronic device 50 runs, the processor 51 communicates with the memory 52 through the bus 53, and the machine-readable instructions, when executed by the processor 51, perform the following processes:
acquiring a node identifier of an operated target node in a target mind map and a user set corresponding to the target mind map;
determining node identifications of other nodes located on the same thought wire as the target node; determining other users except the current user operating the target node in the user set;
And setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
In one possible embodiment, the instructions executed by the processor 51 to determine the node identities of other nodes on the same thought wire as the target node include:
acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
In a possible implementation, the instructions executed by the processor 51 further include:
acquiring an operation action of a current user operating the target node;
the determining node identifications of other nodes on the same thought wire as the target node includes:
Based on the obtained operation action, determining node identifications of other nodes on the same thinking lead with the target node.
In a possible embodiment, the processor 51 executes instructions to determine node identifications of other nodes located on the same thought wire as the target node based on the acquired operation actions, including:
if the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
In a possible embodiment, the processor 51 executes instructions to determine node identifications of other nodes located on the same thought wire as the target node based on the acquired operation actions, including:
If the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
In a possible implementation, the instructions executed by the processor 51 further include:
and if the target node is not detected to have the operation action within the preset time length, changing the operation permission of the other users in the target node and the other nodes from forbidden operation to operation.
In a possible implementation, the instructions executed by the processor 51 further include:
and sending the node identification of the target node and the node identifications of other nodes to terminal equipment corresponding to other users, so that the terminal equipment changes the displayed target node and other nodes from a first presentation style to a second presentation style.
The embodiment of the application also provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the operation authority control method are executed.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when a computer program on the storage medium is executed, the operation authority control method can be executed, so as to solve the problem of editing conflict occurring in the mind map in the prior art. Therefore, the problem of operation conflict of the target mind map can be reduced, the effective operation efficiency of the user on the target mind map is improved to a certain extent, and the experience degree of the user is improved.
An embodiment of the present application further provides an electronic device 60, as shown in fig. 6, which is a schematic structural diagram of the electronic device 60 provided in the embodiment of the present application, and includes: a processor 61, a memory 62, and a bus 63. The memory 62 stores machine-readable instructions executable by the processor 61 (for example, execution instructions corresponding to the receiving module 41 and the displaying module 42 in the apparatus in fig. 4, and the like), when the electronic device 60 runs, the processor 61 communicates with the memory 62 through the bus 63, and the machine-readable instructions, when executed by the processor 61, perform the following processes:
receiving node identification of a target node with the operation authority of prohibiting operation in the target thinking graph and node identification of other nodes which are positioned on the same thinking lead with the target node;
changing the target node and the other nodes in the displayed target mind map from a first presentation style to a second presentation style.
The embodiment of the application also provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the operation authority control method are executed.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when a computer program on the storage medium is executed, the operation authority control method can be executed, so as to solve the problem of editing conflict occurring in the mind map in the prior art; the target node and other nodes in the target thought-chart are changed from the first presentation style to the second presentation style, so that the problem of operation conflict of the target thought-chart can be reduced, the effective operation efficiency of a user on the target thought-chart is improved to a certain extent, and the experience of the user is improved.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to corresponding processes in the method embodiments, and are not described in detail in this application. In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and there may be other divisions in actual implementation, and for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some communication interfaces, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing an electronic device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. An operation authority control method, characterized by comprising:
acquiring a node identifier of an operated target node in a target mind map and a user set corresponding to the target mind map;
determining node identifications of other nodes located on the same thought wire as the target node; determining other users except the current user operating the target node in the user set;
and setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
2. The method of claim 1, wherein determining node identifications of other nodes located on the same thought wire as the target node comprises:
acquiring a root node of a thinking wire to which the target node belongs;
determining node identifications of other nodes except the root node and the target node on the thinking conductor to which the target node belongs as node identifications of the other nodes;
Setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users on the target node and other nodes except the root node and the target node on the thinking conductor to which the target node belongs as forbidden operation.
3. The method of claim 1, further comprising:
acquiring an operation action of a current user operating the target node;
the determining node identifications of other nodes on the same thought wire as the target node includes:
based on the obtained operation action, determining node identifications of other nodes on the same thinking lead with the target node.
4. The method of claim 3, wherein determining node identifications of other nodes located on the same thought wire as the target node based on the obtained operational action comprises:
if the operation action of the target user at the target node is a content deleting action, determining other nodes which belong to the same thinking lead as the target node and are positioned behind the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned behind the target node as the node identification of the other node;
Setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned behind the target node as forbidden operation.
5. The method of claim 3, wherein determining node identifications of other nodes located on the same thought wire as the target node based on the obtained operational action comprises:
if the operation action of the target user at the target node is a content editing action, acquiring other nodes which belong to the same thinking lead as the target node and are positioned in front of the target node;
taking the node identification of each other node which belongs to the same thinking lead with the target node and is positioned before the target node as the node identification of the other node;
setting the operation authority of the other users at the target node and the other nodes as forbidden operation, including:
and setting the operation authority of other users at the target node and other nodes which belong to the same thinking lead with the target node and are positioned before the target node as forbidden operation.
6. The method of claim 1, further comprising:
and if the target node is not detected to have the operation action within the preset time length, changing the operation permission of the other users in the target node and the other nodes from forbidden operation to operation.
7. The method of claim 1, further comprising:
and sending the node identification of the target node and the node identifications of other nodes to terminal equipment corresponding to other users, so that the terminal equipment changes the displayed target node and other nodes from a first presentation style to a second presentation style.
8. An operation authority control method, characterized by comprising:
receiving node identification of a target node with the operation authority of prohibiting operation in the target thinking graph and node identification of other nodes which are positioned on the same thinking lead with the target node;
changing the target node and the other nodes in the displayed target mind map from a first presentation style to a second presentation style.
9. An operation authority control apparatus characterized by comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a node identifier of an operated target node in a target thinking graph and a user set corresponding to the target thinking graph;
The determining module is used for determining the node identifications of other nodes which are positioned on the same thinking lead with the target node; determining other users except the current user operating the target node in the user set;
and the setting module is used for setting the operation authority of the other users at the target node and the other nodes as forbidden operation.
10. An operation authority control apparatus characterized by comprising:
the receiving module is used for receiving the node identification of a target node with the operation permission of forbidding operation in the target thinking graph and the node identification of other nodes positioned on the same thinking wire with the target node;
and the display module is used for changing the target node and the other nodes in the displayed target thinking map from a first presentation style to a second presentation style.
11. An electronic device, comprising: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the method according to any one of claims 1 to 7 or to perform the steps of the method according to claim 8.
12. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1 to 7 or the steps of the method according to claim 8.
CN201911329379.XA 2019-12-20 2019-12-20 Operation authority control method and device, electronic equipment and storage medium Pending CN111859868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911329379.XA CN111859868A (en) 2019-12-20 2019-12-20 Operation authority control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911329379.XA CN111859868A (en) 2019-12-20 2019-12-20 Operation authority control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111859868A true CN111859868A (en) 2020-10-30

Family

ID=72970754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911329379.XA Pending CN111859868A (en) 2019-12-20 2019-12-20 Operation authority control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111859868A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130144917A1 (en) * 2011-12-05 2013-06-06 International Business Machines Corporation Integrating mind mapping technology with case modeling
US8949670B1 (en) * 2012-09-26 2015-02-03 Emc Corporation Method and system for translating mind maps to test management utility test cases
CN108509544A (en) * 2018-03-20 2018-09-07 腾讯科技(深圳)有限公司 The acquisition methods and device of mind map, equipment and readable storage medium storing program for executing
CN109408685A (en) * 2018-09-29 2019-03-01 天津字节跳动科技有限公司 Mind map methods of exhibiting and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130144917A1 (en) * 2011-12-05 2013-06-06 International Business Machines Corporation Integrating mind mapping technology with case modeling
US8949670B1 (en) * 2012-09-26 2015-02-03 Emc Corporation Method and system for translating mind maps to test management utility test cases
CN108509544A (en) * 2018-03-20 2018-09-07 腾讯科技(深圳)有限公司 The acquisition methods and device of mind map, equipment and readable storage medium storing program for executing
CN109408685A (en) * 2018-09-29 2019-03-01 天津字节跳动科技有限公司 Mind map methods of exhibiting and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GAO WENCHAO 等: "Research on the Application of Mind Map in "Artificial Intelligence" Teaching", 《ICEBT \'18: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS AND E-TECHNOLOGY》, 5 July 2018 (2018-07-05), pages 12, XP058889717, DOI: 10.1145/3241748.3241754 *
张睿 等: "思维导图在中医药科研项目数据管理***的应用", 《电子商务》, 30 June 2017 (2017-06-30), pages 195 - 196 *

Similar Documents

Publication Publication Date Title
CN112583700B (en) Group creation method, device, equipment and storage medium
CN107222315B (en) User information display method and system based on voice communication platform
CN109032720A (en) Folder icon display methods, system, readable storage medium storing program for executing and terminal
CN111565112B (en) Method and device for creating group, electronic equipment and readable storage medium
CN112464623A (en) RPA flow file generation method and device, computer equipment and storage medium
US20120185794A1 (en) Method and Apparatus for Managing Buttons on Taskbar
CN112148163B (en) Screen recording method and device and electronic equipment
CN115079872B (en) Document processing method, device, equipment and medium
CN111580730A (en) Background display method of application program, electronic device and storage medium
CN106462933A (en) Using content structure to socially connect users
CN112288397A (en) Flow template configuration method, flow execution method and device and electronic equipment
CN113282799A (en) Node operation method and device, computer equipment and storage medium
CN109582410A (en) Screenshot method, device, equipment and computer readable storage medium
CN112363789A (en) Page interaction method, device, terminal and storage medium
CN113521758B (en) Information interaction method and device, electronic equipment and storage medium
CN111641554B (en) Message processing method and device and computer readable storage medium
CN106714332A (en) Wireless network access method and apparatus
CN111859868A (en) Operation authority control method and device, electronic equipment and storage medium
CN111340914A (en) Map generation method and device, storage medium and vehicle
CN105847516A (en) Method and device for managing contact person information
CN112988663A (en) File storage method and electronic equipment
CN105094789A (en) Data exchanging method and device
CN110162748B (en) Document processing method, device, equipment and storage medium
CN112558853A (en) Session message processing method and device, electronic device and storage medium
CN108540377B (en) Information processing method and device for social application and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination