WO2024017271A1 - 内容空间的分享方法、装置、电子设备及存储介质 - Google Patents

内容空间的分享方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2024017271A1
WO2024017271A1 PCT/CN2023/108021 CN2023108021W WO2024017271A1 WO 2024017271 A1 WO2024017271 A1 WO 2024017271A1 CN 2023108021 W CN2023108021 W CN 2023108021W WO 2024017271 A1 WO2024017271 A1 WO 2024017271A1
Authority
WO
WIPO (PCT)
Prior art keywords
page
permission
sharing
content space
target
Prior art date
Application number
PCT/CN2023/108021
Other languages
English (en)
French (fr)
Inventor
江国洲
Original Assignee
北京字跳网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京字跳网络技术有限公司 filed Critical 北京字跳网络技术有限公司
Publication of WO2024017271A1 publication Critical patent/WO2024017271A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • Embodiments of the present disclosure relate to a content space sharing method, device, electronic device, and storage medium.
  • Content space is a knowledge system of different categories built by users according to their needs, including multiple pages with belonging relationships.
  • it is generally necessary to share the constructed content space.
  • the developer of product A in order to facilitate users to quickly learn about product A, the developer of product A will generally build a content space for product A and share it with users. Based on this, it involves the sharing of content space.
  • embodiments of the present disclosure provide a content space sharing method, device, electronic device, and storage medium to solve the problem of content space sharing.
  • an embodiment of the present disclosure provides a content space sharing method, including:
  • the page with the second permission is provided for access.
  • an embodiment of the present disclosure provides a content space sharing device, including:
  • a first response module configured to display the target in response to an opening operation on the target content space Content space, the target content space includes at least one page with an ownership relationship;
  • the second response module is configured to respond to changing the first sharing permission of the target content space to the first permission, and based on the affiliation relationship and the first permission, adjust the second sharing permission of the page to Second authority;
  • a third response module configured to provide a page with the second permission for an access opening operation in response to receiving an access request to the target content space with the first permission.
  • an embodiment of the present disclosure provides an electronic device, including: a memory and a processor, the memory and the processor are communicatively connected to each other, the memory stores computer instructions, and the processor By executing the computer instructions, the content space sharing method described in the first aspect or any implementation manner of the first aspect is executed.
  • embodiments of the present disclosure provide a computer-readable storage medium that stores computer instructions for causing the computer to execute the first aspect or any of the first aspects.
  • the content space sharing method sets sharing permissions for the target content space and the pages in the target content space respectively when sharing the target content space, so that when the target content space is shared externally as a whole, the sharing permissions can be set.
  • the sharing permissions of the parent page will affect the sharing permissions of the sub-page, thereby reducing the secondary sharing permissions of the page. Adjust the data processing volume to improve the efficiency of content space sharing.
  • Figure 1 is a flow chart of a content space sharing method according to an embodiment of the present disclosure
  • Figure 2 is a schematic diagram of a content space according to an embodiment of the present disclosure
  • Figures 3a-3b are schematic diagrams of the sharing interface of the content space according to an embodiment of the present disclosure.
  • Figure 4 is a flow chart of a content space sharing method according to an embodiment of the present disclosure.
  • Figure 5 is a schematic diagram of a content space according to an embodiment of the present disclosure.
  • Figure 6 is a flow chart of a content space sharing method according to an embodiment of the present disclosure.
  • Figures 7a-7b are schematic diagrams of a display interface of a content space according to an embodiment of the present disclosure.
  • Figure 8 is a structural block diagram of a content space sharing device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present disclosure.
  • the content space When sharing the content space, the content space is first built, then the access link is generated, and the access link is shared with users. Users can access the content space through this access link.
  • the content space since the content space includes multiple pages, some pages can be shared and some pages cannot be shared. Based on this, in order to ensure the security of non-shareable pages, these non-shareable pages usually need to be displayed in additional content spaces. This will cause pages that belong to the same content space to be split into two independent content spaces. , resulting in low correlation between pages, and managers need to switch between two independent content spaces when maintaining the content space, resulting in low maintenance efficiency.
  • the content space sharing method can share the target content space as a whole, and can independently set sharing permissions for each page. That is, after adjusting the first sharing permission of the target content space to the first permission, it is equivalent to sharing the target content space as a whole; at the same time, adjusting the second sharing permission of the page based on the first permission and the ownership relationship between pages, Realize independent adjustment of the second sharing permission of the page, and adjust the second sharing permission of the page in conjunction with the ownership of the page to ensure the adjustment of the association between pages.
  • Sharing permissions can be set individually for each page to ensure the relevance between pages. In addition, managers only need to maintain one target content space to achieve sharing and non-shareable content. The maintenance of shared pages does not require switching between content spaces, which improves the maintenance efficiency of content spaces.
  • the target content space when sharing the target content space, is generated
  • the access link can be opened through a web page or other application.
  • the target content space is built based on application A.
  • the instant messaging function of application B is used to share the access link. The user can directly click the access link in application B to access the target content space.
  • an embodiment of a content space sharing method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical sequence is shown in the flowcharts, in some cases the steps shown or described may be performed in a sequence different from that herein.
  • FIG. 1 is a flow chart of a content space sharing method according to an embodiment of the present disclosure, as shown in Figure 1 As shown, the process includes the following steps:
  • the target content space includes at least one page with a belonging relationship.
  • At least one page with the relationship can be stored in the form of a multi-tree, a linked list, or a data table.
  • the storage method of the target content space includes but is not limited to a multi-tree, a linked list, or a data table.
  • Table there is no restriction on its specific storage method here, as long as the corresponding storage method can represent the ownership relationship between at least one page.
  • the ownership relationship is used to represent the relationship between pages and sub-pages. For example, page A includes page B and page C. Then, page B and page C belong to page A, or page B and page C It can also be called a subpage of page A.
  • the content space may be a database or a document library
  • the pages in the content space may be table pages carrying content or data, or document pages carrying content or data.
  • the target content space may be stored in an electronic device, including but not limited to a user terminal or a server.
  • the sharing interface of the target content space is displayed.
  • a sharing switch or label can be set, and the user can open the sharing interface by selecting the corresponding switch or label.
  • the user opens the sharing of the target content space by selecting and interacting with the sharing interface. Accordingly, in response to the opening operation, it is possible to determine which target content space is currently being shared.
  • the target content space is stored in the form of a multi-tree.
  • the root node of the multi-tree is the root node of the target content space.
  • the relationship between the nodes of the multi-tree is related to the associated relationship. Department corresponds.
  • the heel node of the multi-tree is the root node of the target content space
  • the pages included in the target content space are the nodes of the multi-tree
  • the connection relationship between the nodes represents the ownership relationship between the pages.
  • page 1 corresponds to node 1
  • page 4 corresponds to node 4
  • page 5 corresponds to node 5
  • node 4 and node 5 are child nodes of node 1
  • page 4 and page 5 belong to page 1.
  • Node 1 and node 4 belong to the same branch
  • node 1 and node 5 belong to the same branch.
  • the first sharing permission of the target content space is adjusted to the first permission, that is, the sharing of the target content space is opened, so that the target content space provides overall external sharing.
  • the second sharing permission of the page is adjusted through permission diffusion, and the ownership relationship of the page is combined with the permission expansion. Use the ownership relationship to analyze the pages that belong to the same link, and then analyze the second sharing permissions on the pages that belong to the same link.
  • the second sharing permissions of the upper-level pages affect the second sharing permissions of the lower-level pages.
  • the ownership relationship represents the ownership between pages.
  • the ownership relationship is used to first query the unshareable upper-level pages, and then the second sharing permissions of all pages belonging to the upper-level pages are determined to be unshareable.
  • the second sharing permission of the upper-level page is not limited to the above-mentioned non-shareability. It can also be readable by people within the organization, editable by people within the organization, etc., and no further changes are made to it here. Limit, set according to actual needs. It only needs to be ensured that when permissions are spread, it needs to be combined with the ownership of the page, so that the second sharing permission can be accurately adjusted to the second permission for each page.
  • the target content space can be shared.
  • the user generates a sharing link of the target content space through sharing interaction with the electronic device.
  • the user can share the sharing link to realize the target content. Sharing of space.
  • sharing a sharing link you can directly copy the sharing link, or use the link to share it with other applications, etc., and set it according to actual needs.
  • Figure 3a shows a sharing page of the target content space, and the current status of the target content space is undisclosed.
  • the interface shown in Figure 3b is displayed.
  • a copy link (not shown in Figure 3b) is generated on this interface, where the copy link is the sharing link mentioned above.
  • FIG. 3a and FIG. 3b are only examples and do not limit the scope of the present disclosure.
  • the user can trigger the corresponding electronic device to send an access request to the target content space with the first permission to the electronic device in this embodiment. Accordingly, the request is responded to and the page with the second authority is provided for access. Since the sharing link is generated based on the target content space of the first authority and the page of the second authority, the user's identity information is carried in the access request, and the user's identity information is compared with the second authority's page. Yes, thereby providing the user with the corresponding second permission page for access.
  • sharing permissions are set for the target content space and the pages in the target content space respectively, so that when the target content space is shared externally as a whole, the sharing permissions can be set for the target content space as a whole.
  • the sharing permissions of the parent page will affect the sharing permissions of the sub-pages, thereby reducing the secondary sharing permissions adjustment of the page. data processing volume and improve the efficiency of content space sharing.
  • FIG. 4 is a flow chart of a content space sharing method according to an embodiment of the present disclosure, as shown in Figure 4 As shown, the process includes the following steps:
  • the target content space includes at least one page with a belonging relationship.
  • the above S22 includes:
  • the first target page whose sharing permission cannot be adjusted is obtained by analyzing the pages in the target content space. After generating pages in the target content space, users can set the permission attributes of each page. For example, setting the permission attributes to non-adjustable is equivalent to a locked page.
  • the above S221 includes:
  • the permission attribute of the page in the target content space and analyze the permission attribute.
  • the page is the first target page.
  • the authority attribute is used to represent the setting authority of the page, thereby ensuring the reliability of the determined first target page.
  • subpages with the first target page are queried based on the ownership relationship between the pages, that is, the second target page is obtained.
  • the permissions of the first target page cannot be adjusted, correspondingly, it is considered that the permissions of its sub-pages cannot be adjusted as well.
  • the target content space is stored in the form of a multi-tree. Based on this, the above S223 includes:
  • the node where the first target page is located is node 1
  • node 1 is determined as the parent node
  • the multi-fork tree is traversed, and the child nodes belonging to the same branch as node 1 are queried. That is, node 4 and node 5.
  • the pages corresponding to node 4 and node 5, page 4 and page 5, are determined as the second target page.
  • the target content space is stored in the form of a multi-tree, which can simplify subsequent query steps and improve the query efficiency of the second target page.
  • S223 Fix the sharing permissions of the first target page and the second target page, and adjust the second sharing permissions of other pages in the target content space to the second permissions of the first permission range.
  • the first authority scope is the same as the authority scope of the first authority.
  • the second sharing permissions of the first target page and the second target page are fixed, and Adjust the secondary sharing permissions of other pages in the target content space.
  • the second sharing permissions of other pages can be adjusted to the second permissions of the first permission range. For example, people on the Internet who have obtained the sharing link can read it.
  • the adjusted second permissions for the second sharing permissions of each page can be obtained. Furthermore, in the permission attribute of the page, you can also set the permissions when the page is not public.
  • the permissions of the page are readable by people who have obtained the link within the organization, or can be read by people who have obtained the link within the organization. Human editable etc.
  • the fixed first target page and the second sharing permission of the second target page here means that when the target content space is shared externally as a whole, the second permission of the first target page and the second target page is not Affected by the first permission; instead of not adjusting the second sharing permission, when adjusting the second sharing permission of the first target page and the second target page, they are adjusted to the default permissions defined in the permission attribute. , that is, the sharing permission under Open defined in the permission attribute.
  • the second sharing permission is the default sharing permission, and the sharing permission cannot be adjusted when the permissions are diffused.
  • its second authority includes the second authority within the first authority range, and the second authority within the first authority range.
  • the scope of the first authority is the same as the scope of the first authority
  • the scope of the second authority is the same as the scope of the first authority. different.
  • the first permission includes that people who obtain the link on the Internet can read
  • the second permission includes that people who obtain the link within the organization can read, people who obtain the link within the organization can edit, and people who obtain the link on the Internet can read. Or someone on the Internet who gets the link can edit it.
  • the above is just an example and does not limit the scope of protection. The specific settings can be made according to actual needs.
  • the second permission may include the second permission of the first permission scope, or the second permission of the second permission scope, or the second permission of the first permission scope.
  • the second authority further includes the second authority within the scope of the second authority. Wherein, the link is an access link to the target content space with the first authority.
  • the above S223 includes:
  • the root node when performing permission diffusion, is used as the starting point to determine whether the page corresponding to each node is the first target page.
  • the permission attributes of each page can be determined in advance, and the first target page and the second target page can be determined first; or the first target page and the second target page can be determined when the permissions are diffused.
  • the permission attributes of the pages corresponding to each node are analyzed in sequence. If the permission attribute is that permissions cannot be adjusted, the page is determined to be the first target page, and then based on the The relationship determines the second target page that belongs to the first target page. At this time, the second sharing permissions of the first target page and the second target page are fixed. If the permission attribute is not permission non-adjustable, perform permission diffusion on the page corresponding to the node, and adjust the second sharing permission to a second permission that is the same as the first permission.
  • the first target page is queried based on a multi-tree. Since the relationship between the nodes of the multi-tree can represent the ownership relationship between pages, using the node connection relationship of the multi-tree can improve the first target page. search efficiency.
  • the above S22 includes:
  • two independent storage spaces are maintained, one for storing the first sharing permission of the target content space, and the other for storing the second sharing permission of the page.
  • the two can be physically isolated and the permissions of the target content space and the page can be set independently.
  • the expression forms of the first permission data and the second permission data include but are not limited to databases, data tables, etc.
  • a data table is taken as an example.
  • the first permission data is a content space permission data table
  • the second permission data is a content space permission data table.
  • the permission data is a page permission data table.
  • Each table only needs to store its own business data to achieve physical isolation without affecting each other.
  • page permissions can be set independently, because the data in the page permissions data table is modified and will not be restricted by the data in the content space permissions data table. That is, different storage spaces are used to store the content space and the sharing permissions of the page respectively. Since the sharing permissions of multiple content spaces are stored in the first permission data, it is first necessary to use the identification of the target content space to determine the sharing permissions of the target content space in the first permission data, and then set it as a public identification . On this basis, the second sharing permission of the corresponding page is adjusted in the second permission data in combination with the ownership relationship of the page, and the second permission of the page is obtained.
  • the first permission data and the second permission data are respectively used to store the sharing permissions of the content space and the page.
  • the two permission data are independent of each other, so that the physical separation does not affect each other, thereby ensuring that the sharing permissions of the documents can be set independently.
  • step (3) of S22 above includes:
  • the second sharing permission of the page corresponding to the node when adjusting the second sharing permission of the page corresponding to the node, first Locate the page corresponding to the node in the second permission data, then set the external sharing field of the page corresponding to the node to the open flag, and then set the link sharing field based on the public access permission of the page, and set it to the same as the public access permission.
  • the corresponding sharing ID Regarding the permission attributes of public access permissions as mentioned above, that is, when building a content space, public access permissions and non-public access permissions can be set separately for the page. Then, when the page is made public, sharing permissions can be based on public access permissions. setting.
  • the link sharing field is set to 0 it means that the field is not set; when the link sharing field is set to 1, it means that link sharing is turned off; when the link sharing field is set to 2, it means that people in the organization who have obtained the link can read it; when the link When the sharing field is set to 3, it means that people in the organization who have obtained the link can edit it; when the link sharing field is set to 4, it means that people who have obtained the link on the Internet can read it; when the connection sharing field is set to 5, it means that people who have obtained the link on the Internet can read it. Can be edited by people. Based on this, when setting the external sharing field and link sharing field, you can set the corresponding specific values.
  • the external sharing field and the link sharing field in the second permission data are set to adjust the second sharing permissions of other pages, and when setting the link sharing field, it is also necessary to combine the public access of the page. Set permissions to ensure the reliability of page sharing.
  • the first sharing permission of the target content space when the user operates the overall external sharing switch of the target content space through interaction with the electronic device, the first sharing permission of the target content space will be changed to the first permission, and at the same time, an asynchronous task will be initiated to share the target content space with the second one based on the ownership relationship. Adjust the sharing permissions to obtain the second permission of the page.
  • the external sharing field of the target content space when turning on the overall external sharing of the target content space, change the external sharing field of the target content space to 1, indicating that the overall external sharing switch of the target content space is turned on; initiate an asynchronous task to diffuse permissions on the pages of the target content space, because the target
  • the data structure of the content space is a multi-tree, which is equivalent to adjusting the second sharing permissions of the page through the traversal of the multi-tree, that is, fixing the second sharing permissions of the first target page and the second target page, and changing the second sharing permissions of other pages.
  • the second sharing permission is adjusted to the second permission within the scope of the first permission. For example, set the external sharing field of other pages to 1 and the link sharing field to 4, indicating that the document's external sharing switch is on and the connection sharing setting is so that people on the Internet who have the link can read it.
  • the page during the process of traversing the multi-tree, if the page is a locked page, it means that the page will not be affected by the permission diffusion asynchronous task, thereby ensuring the independence of page permissions.
  • modify the external sharing field in the content space permission data table When the target content space is shared externally as a whole, modify the external sharing field in the content space permission data table; then traverse the multi-tree through the permission diffusion asynchronous task, and modify the external sharing field and link sharing field in the page permission data table.
  • traversing the permission diffusion asynchronous task if the page is found to be a locked page, the field data of the page in the page permission data table will not be modified, and the subpages of the page will no longer be permission diffused.
  • the content space sharing method provided by this embodiment uses the ownership relationship to determine the second target page belonging to the first target page.
  • the sharing permissions of the second target page It cannot be adjusted. Even when the first sharing permission is public, the sharing permission of the first target page will not be adjusted to ensure flexible management and control of the page's sharing permission.
  • the sharing method of the content space also includes:
  • the content space user can also turn off sharing of the target content space by interacting with the electronic device.
  • the user turns off sharing on the sharing interface, and in response to this operation, the first sharing permission of the target content space is adjusted to the third permission, that is, sharing is turned off.
  • the adjustment of the first sharing permission is the setting of the external sharing field of the target content space in the first permission data. If the external sharing field is 0, it means closed, and the external sharing field is 1, it means open. Then, set the external sharing field of the target content space in the first permission data to 0.
  • the second sharing permission of the page is adjusted to the fourth permission, that is, the non-public access permission, in combination with the ownership of the page.
  • the specific processing process of closing sharing is similar to the processing process of opening sharing described above. For details, see the above description.
  • the external sharing field of the target content space is set to 2, indicating that the entire external sharing switch of the target content space is closed; Initiate an asynchronous task to diffuse permissions on the page, because the target content space data structure is a multi-tree. By traversing the multi-tree, the page sharing permissions are changed, and the external sharing field is set to 2, indicating that the external sharing switch of the page is turned on. , but only those within your organization who have the link can read it. After the target content space is closed, the secondary sharing permissions of the page will be adjusted accordingly to ensure the reliability of the page in the target content space.
  • a content space sharing method is provided, which can be used for the above-mentioned electronic devices, such as user terminals or servers.
  • Figure 6 is a flow chart of a content space sharing method according to an embodiment of the present disclosure, as shown in Figure 6 As shown, the process includes the following steps:
  • S31 respond to the opening operation of the target content space to obtain the target content space.
  • the target content space includes at least one page with a belonging relationship.
  • the above S33 includes:
  • the access request carries user identity.
  • a sharing link is generated, and the user can access the target content space by using the sharing link.
  • the user sends an access request to the target content space by interacting with the shared link.
  • the access request carries the user identity, which includes whether the current accessing user is a user within the organization, a guest, etc. Different user identities have different access rights to pages in the target content space.
  • the sharing link when the user clicks on the sharing link, the sharing link jumps to the display page of the target content space.
  • the user identity is obtained during the jump. Accordingly, the user identity can be carried when sending the access request. .
  • S332 Authenticate the user's identity based on the second sharing permission and determine the page with access permission.
  • the second sharing permission of the page is used Authenticate the user's identity and determine which pages the user has access rights to. That is, determine the pages to which you have access.
  • the access permissions of different users have been defined when the page is made public, for example, people who get the link within the organization can read, or people who get the link on the Internet can read, etc. .
  • the pages with access permissions are determined.
  • S333 Determine the page tree based on the ownership relationship of the page with access rights to display the page tree.
  • the ownership relationship is used to determine the page tree, that is, the ownership relationship between the pages with access rights. Accordingly, the page tree can be displayed on the terminal that issues the access request.
  • the above-mentioned S333 includes: determining the page tree based on the ownership relationship of the page with access rights, so as to display the page tree in the page tree display area of the display interface.
  • the display interface also includes a page display area for displaying the page selected in the page tree display area.
  • the display interface of the terminal that issues the access request includes a page tree display area and a page display area.
  • the page tree display area displays the ownership relationship of the pages with access rights, and the page display area is used to display the specific content of the page.
  • FIG. 7a and FIG. 7b respectively show display interfaces corresponding to access requests of different user identities.
  • Figure 7a shows the display interface corresponding to anonymous users or visitors
  • Figure 7b shows the display page corresponding to members in the organization.
  • only the target page in the target content space can be accessed, that is, when sharing the target content space, only the sharing link of the target page is generated.
  • the sharing link By clicking on the sharing link, the user sends an access request to access the target document.
  • a visitor accesses a page link, not only will the user and the target page be authenticated, but the parent node page of the target page will also be queried to determine whether the user has reading permission for the parent node page. If the user has read permission to the parent node page, rendering and display will be performed; if the user does not have read permission to the parent node page, rendering and display will not be performed, and the authentication will continue until the root node.
  • This method allows access to the target page of the content space, and also displays the parent node page with access rights to the user to ensure the relevance of the page the user accesses in the content space.
  • the parent node page and the page can be displayed in the page tree.
  • the target pages are all displayed to the user, realizing the display of page free trees.
  • the content space sharing method provided by this embodiment uses the second sharing permission to authenticate the user's identity after obtaining the access request, determines the pages with access permission, and uses the form of a page tree to represent all pages with access permission. , easy for users to access.
  • enterprise A needs to share the function introduction of its product a to users. Then, the corresponding personnel in enterprise A need to build a content space for product a, which includes product a in the content space.
  • the functions, usage methods, common fault solutions, etc. are all pages in this content space.
  • the functions, usage methods, common fault solutions, and fault repair reports of Product A are public pages.
  • Product A corresponds to the contact of the R&D personnel.
  • the method is a non-public page. Therefore, when building the content space, set the permission attributes for each page.
  • the second sharing permissions for Product A’s functions, usage, common fault solutions, and fault repair reports are provided to people who have obtained the sharing link on the Internet.
  • the contact information for Product A’s corresponding R&D personnel is the organization. People with the shared link can edit it. Therefore, by setting independent sharing permissions for the page, the sharing permissions can be set independently for the page when sharing the content space.
  • module may be a combination of software and/or hardware that implements a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
  • This embodiment provides a content space sharing device, as shown in Figure 8, including:
  • the first response module 41 is configured to display the target content space in response to the opening operation of the target content space, where the target content space includes at least one page with a belonging relationship;
  • the second response module 42 is configured to respond to changing the first sharing permission of the target content space to the first permission, and adjust the second sharing permission of the page based on the ownership relationship and the first permission. It is the second authority;
  • the third response module 43 is configured to provide a page with the second permission for access in response to receiving an access request to the target content space with the first permission.
  • the second response module 42 includes:
  • the first acquisition unit is used to acquire the first unadjustable sharing permission in the target content space. target page;
  • a first determining unit configured to determine a second target page belonging to the first target page based on the belonging relationship
  • a first adjustment unit configured to fix the second sharing permissions of the first target page and the second target page, and adjust the second sharing permissions of other pages in the target content space to the second sharing permissions of the first permission range.
  • Second authority the scope of the first authority is the same as the scope of the first authority.
  • the first acquisition unit includes:
  • the first acquisition subunit is used to acquire the permission attribute of the page in the target content space
  • the first determination subunit is configured to determine that the page is the first target page when the permission attribute of the page is that permission cannot be adjusted.
  • the target content space is stored in the form of a multi-tree.
  • the root node of the multi-tree is the root node of the target content space.
  • the relationship between the nodes of the multi-tree is related to the relationship between the nodes of the multi-tree and the root node of the target content space.
  • the first determination unit includes:
  • a query subunit configured to use the node of the first target page in the multi-tree as a parent node, and query the child nodes that belong to the same branch as the parent node based on the relationship between the nodes;
  • the second determination subunit is used to determine the page corresponding to the child node as the second target page.
  • the first adjustment unit includes:
  • a judging subunit used to judge whether the page corresponding to the node of the multi-tree is the first target page, taking the root node as the starting point;
  • a fixing subunit configured to fix the second sharing permissions of the first target page and the second target page when the page corresponding to the node of the multi-tree is the first target page
  • the adjustment subunit is configured to adjust the second sharing permission of the page corresponding to the node to the second permission of the first permission range when the page corresponding to the node of the multi-tree is not the first target page.
  • adjustment module 42 includes:
  • the second acquisition unit is used to acquire first permission data and second permission data.
  • the first permission data is used to store the sharing permission of the content space
  • the second permission data is used to store the sharing permission of the page
  • a second adjustment unit configured to adjust the first permission number based on the identification of the target content space. According to the data, the sharing permission of the target content space is adjusted to public, and the first sharing permission is determined to be public;
  • a third adjustment unit is configured to adjust the second sharing permission of the corresponding page in the second permission data to the second permission based on the ownership relationship and the first permission.
  • the third adjustment unit includes:
  • the first setting subunit is used to set the external sharing field of the page corresponding to the node in the second permission data to the open flag;
  • the second setting subunit is configured to set the link sharing field of the page corresponding to the node in the second authority data as the sharing identifier of the second authority.
  • the third response module 43 includes:
  • An access request acquisition module configured to receive an access request to the target content space with the first permission, where the access request carries a user identity
  • An authentication module configured to authenticate the user identity based on the second sharing permission and determine the page with access permission
  • a determining module configured to determine a page tree based on the ownership relationship of the page with access rights to display the page tree.
  • the determining module includes:
  • the second determination unit is configured to determine the page tree based on the ownership relationship of the page with access rights, so as to display the page tree in the page tree display area of the display interface.
  • the display interface also includes a page display area, with The selected page is displayed in the page tree display area.
  • the device further includes:
  • Close response module used to respond to the closing operation of the target content space
  • the content space sharing device in this embodiment is presented in the form of a functional unit, where the unit refers to an ASIC circuit, a processor and memory that executes one or more software or fixed programs, and/or others that can provide the above functions. device.
  • An embodiment of the present disclosure also provides an electronic device having the content space division shown in FIG. 8 above. Enjoy the device.
  • Figure 9 is a schematic structural diagram of an electronic device provided by an optional embodiment of the present disclosure.
  • the electronic device may include: at least one processor 51, such as a CPU (Central Processing Unit, Central Processing Unit). processor), at least one communication interface 53, memory 54, and at least one communication bus 52.
  • the communication bus 52 is used to realize connection communication between these components.
  • the communication interface 53 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 53 may also include a standard wired interface and a wireless interface.
  • the memory 54 can be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • the memory 54 may optionally be at least one storage device located remotely from the aforementioned processor 51 .
  • the processor 51 can be combined with the device described in FIG. 8 , the memory 54 stores an application program, and the processor 51 calls the program code stored in the memory 54 to execute any of the above method steps.
  • the communication bus 52 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the communication bus 52 can be divided into an address bus, a data bus, a control bus, etc. For ease of presentation, only one thick line is used in Figure 9, but it does not mean that there is only one bus or one type of bus.
  • the memory 54 may include volatile memory (English: volatile memory), such as random access memory (English: random-access memory, abbreviation: RAM); the memory may also include non-volatile memory (English: non-volatile memory), such as flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid-state drive (English: solid-state drive, abbreviation: SSD); the memory 54 may also include the above types memory combination.
  • volatile memory such as random access memory (English: random-access memory, abbreviation: RAM)
  • non-volatile memory such as flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid-state drive (English: solid-state drive, abbreviation: SSD); the memory 54 may also include the above types memory combination.
  • the processor 51 can be a central processing unit (English: central processing unit, abbreviation: CPU), a network processor (English: network processor, abbreviation: NP) or a combination of CPU and NP.
  • CPU central processing unit
  • NP network processor
  • the processor 51 may further include a hardware chip.
  • the above-mentioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • ASIC application-specific integrated circuit
  • PLD programmable logic device
  • the above-mentioned PLD can be a complex programmable logic device (English: complex programmable logic device, Abbreviation: CPLD), field-programmable gate array (English: field-programmable gate array, abbreviation: FPGA), general array logic (English: generic array logic, abbreviation: GAL) or any combination thereof.
  • memory 54 is also used to store program instructions.
  • the processor 51 can call program instructions to implement the content space sharing method shown in any embodiment of the present application.
  • Embodiments of the present disclosure also provide a non-transitory computer storage medium that stores computer-executable instructions, and the computer-executable instructions can execute the content space sharing method in any of the above method embodiments.
  • the storage medium can be a magnetic disk, an optical disk, a read-only memory (ROM), a random access memory (RAM), a flash memory (Flash Memory), a hard disk (Hard disk). Disk Drive (abbreviation: HDD) or solid-state drive (Solid-State Drive, SSD), etc.; the storage medium may also include a combination of the above types of memories.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本公开提供一种内容空间的分享方法、装置、电子设备及存储介质,该方法包括响应于对目标内容空间的打开操作,显示所述目标内容空间,所述目标内容空间包括至少一个具有所属关系的页面;响应于将所述目标内容空间的第一分享权限变更为第一权限,基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限;响应于接收到对具有第一权限的所述目标内容空间的访问请求,提供具有第二权限的所述页面用于访问。在对目标内容空间进行分享时,针对目标内容空间以及目标内容空间中的页面分别进行设置分享权限,使得在对目标内容空间整体对外分享时,能够针对目标内容空间中的各个页面分别设置分享权限。

Description

内容空间的分享方法、装置、电子设备及存储介质
本申请要求于2022年7月21日递交的中国专利申请第202210863688.0号的优先权,在此全文引用上述中国专利申请公开的内容以作为本申请的一部分。
技术领域
本公开的实施例涉及一种内容空间的分享方法、装置、电子设备及存储介质。
背景技术
内容空间是用户根据需要构建的不同类别的知识体系,包括多个具有所属关系的页面。为了实现内容空间的共享,一般需要将所构建出的内容空间进行分享。例如,对于产品A,为了便于用户快速了解该产品A,产品A的开发商一般会构建针对产品A的内容空间,并将其分享至用户。基于此,就涉及到内容空间的分享问题。
发明内容
有鉴于此,本公开实施例提供了一种内容空间的分享方法、装置、电子设备及存储介质,以解决内容空间的分享问题。
根据第一方面,本公开实施例提供了一种内容空间的分享方法,包括:
响应于对目标内容空间的打开操作,显示所述目标内容空间,所述目标内容空间包括至少一个具有所属关系的页面;
响应于将所述目标内容空间的第一分享权限调整为第一权限,基于所述所属关系以及所述第一权限将所述页面的第二分享权限调整为第二权限;
响应于接收到具有所述第一权限的所述目标内容空间的访问请求,提供具有所述第二权限的所述页面用于访问。
根据第二方面,本公开实施例提供了一种内容空间的分享装置,包括:
第一响应模块,用于响应于对目标内容空间的打开操作,显示所述目标 内容空间,所述目标内容空间包括至少一个具有所属关系的页面;
第二响应模块,用于响应于将所述目标内容空间的第一分享权限变更为第一权限,并基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限;
第三响应模块,用于响应于接收到对具有所述第一权限的目标内容空间的访问请求,提供具有所述第二权限的页面用于访问打开操作。
根据第三方面,本公开实施例提供了一种电子设备,包括:存储器和处理器,所述存储器和所述处理器之间互相通信连接,所述存储器中存储有计算机指令,所述处理器通过执行所述计算机指令,从而执行第一方面或者第一方面的任意一种实施方式中所述的内容空间的分享方法。
根据第四方面,本公开实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行第一方面或者第一方面的任意一种实施方式中所述的内容空间的分享方法。
本公开实施例提供的内容空间的分享方法,在对目标内容空间进行分享时,针对目标内容空间以及目标内容空间中的页面分别进行设置分享权限,使得在对目标内容空间整体对外分享时,能够针对目标内容空间中的各个页面分别设置分享权限;同时在页面设置分享权限时,基于页面的所属关系进行设置,父页面的分享权限会影响子页面的分享权限,从而减少页面的第二分享权限调整的数据处理量,提高内容空间分享的效率。
附图说明
为了更清楚地说明本公开具体实施方式,下面将对具体实施方式中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本公开的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是根据本公开实施例的内容空间的分享方法的流程图;
图2是根据本公开实施例的内容空间的示意图;
图3a-图3b是根据本公开实施例中内容空间的分享界面示意图;
图4是根据本公开实施例的内容空间的分享方法的流程图;
图5是根据本公开实施例的内容空间的示意图;
图6是根据本公开实施例的内容空间的分享方法的流程图;
图7a-图7b是根据本公开实施例的内容空间的展示界面的示意图;
图8是根据本公开实施例的内容空间的分享装置的结构框图;以及
图9是本公开实施例提供的电子设备的硬件结构示意图。
具体实施方式
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在对内容空间进行共享时,是先构建内容空间,再生成***,并将***分享至用户。用户通过该***即可访问该内容空间。然而,由于内容空间中包括多个页面,有的页面是可以共享的,而有的页面是不可以共享的。基于此,为了保证不可共享页面的安全性,通常需要将这些不可共享的页面采用额外的内容空间进行展示,这就会造成将本属于同一个内容空间的页面拆分成两个独立的内容空间,导致页面之间的关联性较低,且管理人员在对内容空间进行维护时,需要在两个独立的内容空间之间进行切换,导致维护效率较低。
基于此,本公开实施例提供的内容空间的共享方法,对目标内容空间进行整体共享,且针对各个页面能够独立设置共享权限。即,在将目标内容空间的第一分享权限调整为第一权限之后,就相当于对目标内容空间进行整体共享;同时基于第一权限以及页面之间的所属关系调整页面的第二分享权限,实现页面第二分享权限的独立调整,且在页面的第二分享权限的调整时结合页面的所属关系进行,保证页面之间的关联调整。利用该方法就能够实现对目标内容空间整体分享时,针对各个页面单独设置分享权限,保证了页面之间的关联性,且管理人员仅需要维护一个目标内容空间,就能够实现对可共享以及不可共享的页面的维护,不需要在内容空间之间进行切换,提高了内容空间的维护效率。
在一些实施方式中,在对目标内容空间进行分享时,生成目标内容空间 的***,该***可以是通过网页、或其他应用打开。例如,目标内容空间基于应用A构建的,在生成***之后,利用应用B的即时消息传递功能进行***的分享,用户在应用B中直接点击该***即可访问该目标内容空间。
根据本公开实施例,提供了一种内容空间的分享方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机***中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
在本实施例中提供了一种内容空间的分享方法,可用于上述的电子设备,如用户终端或服务器等,图1是根据本公开实施例的内容空间的分享方法的流程图,如图1所示,该流程包括如下步骤:
S11,响应于对目标内容空间的打开操作,显示目标内容空间。
其中,所述目标内容空间包括至少一个具有所属关系的页面。
在一些实施方式中,至少一个具有所述关系的页面可以是采用多叉树或链表或数据表的形式进行存储,基于此,目标内容空间的存储方式包括但不限于多叉树、链表或数据表,在此对其具体存储方式并不做任何限定,只需保证对应存储方式能够表征出至少一个页面之间的所属关系即可。其中,所属关系用于表示页面与子页面的关系,例如,页面A而言,其包括有页面B以及页面C,那么,页面B与页面C就归属于页面A,或者,页面B与页面C也可以称之为页面A的子页面。
在一些实施方式中,内容空间可以为数据库或文档库,内容空间中的页面可以为承载内容或数据的表格页面,或者为承载内容或数据的文档页面。
在一些实施方式中,目标内容空间可以存储在电子设备中,电子设备包括不限于用户终端或服务器。当需要对目标内容空间进行分享时,显示该目标内容空间的分享界面,在分享界面上,可以设置有分享开关,或标签等,用户通过选择相应的开关或标签,实现打开操作。用户通过与该分享界面的选择交互,打开目标内容空间的分享,相应地,响应于该打开操作,即可确定当前是对哪个目标内容空间进行分享的。
在一些实施方式中,所述目标内容空间采用多叉树的形式存储,所述多叉树的根节点为目标内容空间的根节点,多叉树的节点之间的关系与所属关 系对应。如图2所示,多叉树的跟节点为目标内容空间的根节点,目标内容空间所包括的页面为多叉树的节点,节点之间的连接关系表示的是页面之间的所属关系。例如,页面1对应于节点1,页面4对应于节点4,页面5对应于节点5,节点4以及节点5为节点1的子节点,相应地,页面4以及页面5归属与页面1。节点1与节点4属于同一分支,节点1与节点5属于同一分支。利用多叉树的形式表征该目标内容空间,能够清楚直观地表征出页面之间的所属关系。
S12,响应于将目标内容空间的第一分享权限变更为第一权限,基于所属关系以及第一权限,将页面的第二分享权限调整为第二权限。
在一些实施方式中,响应于目标内容空间的打开操作之后,将该目标内容空间的第一分享权限调整为第一权限,即打开目标内容空间的分享,使得该目标内容空间提供整体对外分享。在第一分享权限调整为第一权限之后,通过权限扩散的方式调整页面的第二分享权限,在权限扩展时结合页面的所属关系。利用所属关系,分析出属于同一链路的页面,再对属于同一链路的页面上进行第二分享权限的分析,上层页面的第二分享权限影响下层页面的第二分享权限。
在一些实施方式中,所属关系表示的是页面之间的归属,从第二分享权限上而言,若上层页面不可共享的话,归属于该上层页面的页面也是不可共享的。基于此,利用所属关系先查询出不可共享的上层页面,再将归属与上层页面的所有页面的第二分享权限确定为不可共享。
在一些实施方式中,上层页面的第二分享权限并不限于上文所述的不可共享,也可以是为组织内人员可阅读、组织内人员可编辑等等,在此对其并不做任何限定,具体根据实际需求进行设置。只需保证在权限扩散时,需要结合页面的所属关系进行,从而对于各个页面而言,能够得到准确地将第二分享权限调整为第二权限。
S13,响应于接收到对具有第一权限的目标内容空间的访问请求,提供具有第二权限的页面用于访问。
在一些实施方式中,对页面的第二分享权限进行调整之后,即可实现对目标内容空间的分享。如上文所述,用户通过与电子设备的分享交互,生成目标内容空间的分享链接,用户对分享链接进行分享,即可实现对目标内容 空间的分享。在分享链接的分享时,可以是直接复制分享链接,也可以是利用链接至其他应用进行分享等等,具体根据实际需求进行设置。
在一些实施方式中,例如,图3a示出了目标内容空间的分享页面,当前目标内容空间的状态为未公开。当用户通过与电子设备交互,选择分享开关之后,显示如图3b所示的界面。在该界面上生成复制链接(图3b中未示出),其中,复制链接即为上文所述的分享链接。当然,图3a与图3b仅仅是一种示例,并不限定本公开的保护范围。
在一些实施方式中,用户通过与相应电子设备的交互,点击该分享链接,即可触发相应电子设备向本实施例中的电子设备发送对具有第一权限的目标内容空间的访问请求。相应地,响应于该请求,并提供具有第二权限的页面用于访问。由于在生成分享链接时,是基于第一权限的目标内容空间以及第二权限的页面生成的,那么,在该访问请求中携带有用户的身份信息,将用户的身份信息与第二权限进行比对,从而向该用户提供相应的第二权限的页面用于访问。
本实施例提供的内容空间的分享方法,在对目标内容空间进行分享时,针对目标内容空间以及目标内容空间中的页面分别进行设置分享权限,使得在对目标内容空间整体对外分享时,能够针对目标内容空间中的各个页面分别设置分享权限;同时在页面设置分享权限时,基于页面的所属关系进行设置,父页面的分享权限会影响子页面的分享权限,从而减少页面的第二分享权限调整的数据处理量,提高内容空间分享的效率。
在本实施例中提供了一种内容空间的分享方法,可用于上述的电子设备,如用户终端或服务器等,图4是根据本公开实施例的内容空间的分享方法的流程图,如图4所示,该流程包括如下步骤:
S21,响应于对目标内容空间的打开操作,显示目标内容空间。
在一些实施方式中,所述目标内容空间包括至少一个具有所属关系的页面。
详细请参见图1所示实施例的S11,在此不再赘述。
S22,响应于将目标内容空间的第一分享权限变更为第一权限,基于所属关系以及第一分享权限,将所述页面的第二分享权限调整为第二权限。
在一些实施方式中,上述S22包括:
S221,获取目标内容空间中分享权限不可调整的第一目标页面。
在响应于目标内容空间的打开操作之后,将其第一分享权限调整为第一权限。
在一些实施方式中,在第一分享权限调整为第一权限之后,通过对目标内容空间中的页面进行分析,获取到分享权限不可调整的第一目标页面。在目标内容空间中生成页面之后,用户可以对各个页面的权限属性进行设置,例如,将权限属性设置为不可调整,就相当于该页面为加锁页面。
在一些实施方式中,上述S221包括:
(1)获取目标内容空间中页面的权限属性。
(2)当页面的权限属性为权限不可调整时,确定页面为第一目标页面。
获取到目标内容空间中页面的权限属性,并对权限属性进行分析,当其权限属性为权限不可调整时,则该页面为第一目标页面。在构建目标内容空间时,对于各个文档可以单独设置其权限属性,若不想后续在权限扩散时,调整该文档的分享权限,则可以对其权限属性进行设置,将其设置为权限不可调整。利用权限属性表征页面的设置权限,保证了所确定出的第一目标页面的可靠性。
S222,基于所属关系确定归属于第一目标页面的第二目标页面。
在一些实施方式中,在目标内容空间中确定出第一目标页面之后,依据页面间的所属关系,查询出与第一目标页面的子页面,即得到第二目标页面。在本实施例中,若确定出第一目标页面的权限不可调整,相应地,认为其子页面的权限同样不可调整。
在一些实施方式,目标内容空间采用多叉树的形式存储。基于此,上述S223包括:
(1)以第一目标页面在多叉树中的节点为父节点,基于节点之间的关系查询与父节点属于同一分支的子节点。
(2)将子节点对应的页面确定为第二目标页面。
在一些实施方式中,如图5所示,第一目标页面所在的节点为节点1,将节点1确定为父节点,对多叉树进行遍历,查询到与节点1属于同一分支的子节点,即节点4以及节点5。在此基础上,将节点4与节点5对应的页面,页面4以及页面5确定为第二目标页面。
在一些实施方式中,在进行权限扩散时,通过对多叉树进行遍历,当发现页面1的权限属性为权限不可调整时,即页面1为加锁页面,此时不会修改页面1的分享权限,同时页面1的子页面,即页面4以及页面5页不在进行权限扩散。因此,通过该机制能够保证页面1及其子页面分享权限的关联,后续在进行可公开的页面展示时,由于页面及其子页面的分享权限是关联的,能够在界面上显示出页面树,利用页面树表征出页面的所属关系。
在一些实施方式中,采用多叉树的形式对目标内容空间进行存储,能够简化后续查询步骤,提高第二目标页面的查询效率。
S223,固定第一目标页面以及第二目标页面的分享权限,并对目标内容空间中其他页面的第二分享权限调整为第一权限范围的第二权限。
在一些实施方式中,,第一权限范围与第一权限的权限范围相同。
在一些实施方式中,通过以上分析,确定出第一目标页面以及第二目标页面的权限不可调整,那么,在权限扩散时,固定第一目标页面以及第二目标页面的第二分享权限,并对目标内容空间中的其他页面的第二分享权限进行调整。在进行调整时,可以将其他页面的第二分享权限调整为第一权限范围的第二权限,例如,互联网上获得分享链接的人可阅读。通过上述处理,就能够获得对各个页面第二分享权限调整后的第二权限。进一步地,在页面的权限属性中,也可以设置当该页面不公开时的权限,例如,在页面不公开时,该页面的权限为组织内获得链接的人可阅读,或组织内获得链接的人可编辑等等。需要说明的是,此处的固定第一目标页面以及第二目标页面的第二分享权限,是指在目标内容空间整体对外分享时,第一目标页面以及第二目标页面的第二权限是不受第一权限的影响;而不是不对第二分享权限进行调整,在对第一目标页面以及第二目标页面的第二分享权限进行调整时,是将其调整为权限属性中定义的预设权限,即权限属性中定义的打开下的分享权限。
在一些实施方式中,对于第一目标页面与第二目标页面而言,在目标内容空间整体对外分享时,其第二分享权限为预设的分享权限,该分享权限在权限扩散时不可调整。经过该步骤的调整操作,对于页面而言,其第二权限包括第一权限范围的第二权限,以及第一权限范围的第二权限。其中,第一权限范围与第一权限的权限范围相同,第二权限范围与第一权限的权限范围 不同。
在一些实施方式中,,第一权限包括互联网上获得链接的人可阅读,第二权限包括组织内获得链接的人可阅读、组织内获得链接的人可编辑、互联网上获得链接的人可阅读或互联网上获得链接的人可编辑。当然,上述仅仅是一种示例,并不限定其保护范围,具体根据实际需求进行设置。
在一些可选实施方式中,对于页面而言,其第二权限中可以包括第一权限范围的第二权限,或者,包括第二权限范围的第二权限,或者,即包括第一权限范围的第二权限又包括第二权限范围的第二权限。其中,链接为具有所述第一权限的目标内容空间的***。
在一些实施方式中,上述S223包括:
(1)以根节点为起点,判断多叉树的节点对应的页面是否为第一目标页面。
(2)当多叉树的节点对应的页面为第一目标页面时,固定第一目标页面以及第二目标页面的分享权限。
(3)当多叉树的节点对应的页面不是第一目标页面时,调整节点对应的页面的分享权限。
在一些实施方式中,在进行权限扩散时,以根节点为起点,依次判断各个节点对应的页面是否第一目标页面。如上文所述,可以事先对各个页面的权限属性进行确定,先确定出第一目标页面以及第二目标页面;也可以是在权限扩散时,进行第一目标页面以及第二目标页面的确定。
在一些实施方式中,以第二情况为例,从根节点开始,依次分析各个节点对应的页面的权限属性,若权限属性为权限不可调整,则确定该页面为第一目标页面,再基于所属关系确定出归属与该第一目标页面的第二目标页面,此时固定第一目标页面以及第二目标页面的第二分享权限。若权限属性不是权限不可调整,则对该节点对应的页面进行权限扩散,将第二分享权限调整为与第一权限的权限范围相同的第二权限。
在一些实施方式中,基于多叉树进行第一目标页面的查询,由于多叉树节点之间的关系能够表征页面之间的所属关系,利用多叉树的节点连接关系能够提高第一目标页面的搜索效率。
在一些实施方式中,上述S22包括:
(1)获取第一权限数据以及第二权限数据,所述第一权限数据用于存储内容空间的第一分享权限,所述第二权限数据用于存储页面的第二分享权限。
(2)基于目标内容空间的标识,将第一权限数据中目标内容空间的第一分享权限调整为第一权限。
(3)基于所属关系以及第一权限,将第二权限数据中对应页面的第二分享权限调整为第二权限。
在一些实施方式中,维护两个独立的存储空间,一个用于存储目标内容空间的第一分享权限,另一个用于存储页面的第二分享权限。通过独立的存储空间进行对目标内容空间以及页面的分享权限进行存储,能够从物理层面上实现两者的隔离,实现目标内容空间能够与页面独立设置权限。利用第一权限数据存储内容空间的分享权限,利用第二权限数据存储页面的分享权限。第一权限数据以及第二权限数据的表现形式包括但不限于数据库、数据表等等,在本实施例中以数据表为例,相应地,第一权限数据为内容空间权限数据表,第二权限数据为页面权限数据表,每个表只需要存储本业务数据,实现物理隔离不会互相影响。例如,可以单独设置页面权限,因为修改的是页面权限数据表中的数据,不会受到内容空间权限数据表中的数据的制约。即,采用不同的存储空间分别对内容空间以及页面的分享权限进行存储。由于在第一权限数据中存储有多个内容空间的分享权限,那么,首先需要利用目标内容空间的标识,在第一权限数据中确定出目标内容空间的分享权限,再将其设置为公开标识。在此基础上,再结合页面的所属关系在第二权限数据中进行对应页面的第二分享权限的调整,得到页面的第二权限。具体调整过程请参见上文所述。分别采用第一权限数据以及第二权限数据对内容空间以及页面的分享权限进行存储,两个权限数据相互独立,实现物理隔不会相互影响,从而保证能够实现单独设置文档的分享权限。
在另一些实施方式中,上述S22的步骤(3)包括:
3.1)将第二权限数据中节点对应的页面的对外分享字段设置为打开标识,所述第二权限数据用于存储页面的分享权限。
3.2)将第二权限数据中节点对应的页面的链接分享字段设置为第二权限的分享标识。
在一些实施方式中,在调整节点对应的页面的第二分享权限时,先在第 二权限数据中定位到节点对应的页面,再将该节点对应的页面的对外分享字段设置为打开标识,再基于该页面的公开访问权限对链接分享字段进行设置,将其设置为与公开访问权限对应的分享标识。关于公开访问权限如上文所述的权限属性,即,在构建内容空间时,针对页面可以分别设置公开访问权限以及非公开访问权限,那么,在页面公开时,就能够基于公开访问权限进行分享权限的设置。
在一些实施方式中,当对外分享字段设置为0时,表示该字段未设置;当对外分享字段设置为1时,表示打开标识;当对外分享字段设置为2时,表示关闭标识。当链接分享字段设置为0时,表示该字段未设置;当链接分享字段设置为1时,表示链接分享关闭;当链接分享字段设置为2时,表示组织内获得链接的人可阅读;当链接分享字段设置为3时,表示组织内获得链接的人可编辑;当链接分享字段设置为4时,表示互联网上获得链接的人可阅读;当连接分享字段设置为5时,表示互联网上获得链接的人可编辑。基于此,在进行对外分享字段以及链接分享字段设置时,就可以将其设置对应的具体数值。
在一些实施方式中,利用对第二权限数据中的对外分享字段以及连接分享字段进行设置,实现其他页面的第二分享权限的调整,且在链接分享字段设置时,还需要结合页面的公开访问权限进行设置,以保证页面分享的可靠性。
在一些实施方式中,用户通过与电子设备的交互操作目标内容空间整体对外分享开关时,会将目标内容空间的第一分享权限变更为第一权限,同时发起异步任务,基于所属关系对第二分享权限进行调整,从而得到页面的第二权限。例如,当打开目标内容空间整体对外分享时,变更目标内容空间的对外分享字段为1,表示目标内容空间整体对外分享开关为打开状态;发起异步任务对目标内容空间的页面进行权限扩散,因为目标内容空间的数据结构为多叉树,相当于通过多叉树的遍历,调整页面的第二分享权限,即,固定第一目标页面以及第二目标页面的第二分享权限,并将其他页面的第二分享权限调整为第一权限范围的第二权限。例如,将其他页面的对外分享字段设置为1,链接分享字段设置为4,表明该文档对外分享开关为打开状态、连接分享设置为互联网上获得链接的人可阅读。
在一些实施方式中,遍历多叉树的过程中,若页面为加锁页面,则表示该页面不会收到权限扩散异步任务的影响,从而保证页面权限的独立性。当目标内容空间整体对外分享时,修改内容空间权限数据表中的对外分享字段;然后通过权限扩散异步任务进行多叉树的遍历,修改页面权限数据表中的对外分享字段以及链接分享字段。权限扩散异步任务进行遍历时,当发现页面为加锁页面,则不会修改页面权限数据表中该页面的字段数据,同时该页面的子页面也不再进行权限扩散。
S23,响应于接收到对具有第一权限的目标内容空间的访问请求,提供具有第二权限的页面用于访问。
详细请参见图1所示实施例的S13,在此不再赘述。
本实施例提供的内容空间的分享方法,对于分享权限不可调整的第一目标页面而言,利用归属关系确定归属于第一目标页面的第二目标页面,相应地,第二目标页面的分享权限也不可调整,即使第一分享权限为公开时,也不会对第一目标页面的分享权限进行调整,保证页面的分享权限灵活管控。
在一些实施方式中,该内容空间的分享方法还包括:
(1)响应于对目标内容空间的关闭操作。
(2)将第一分享权限调整为第三权限,基于第三权限以及所属关系将页面的第二分享权限调整为第四权限。
在一些实施方式中,内容空间用户还可以通过与电子设备交互,关闭目标内容空间的共享。用户在分享界面上关闭分享,响应于该操作,将目标内容空间的第一分享权限调整为第三权限,即,关闭分享。对于第一分享权限的调整是对第一权限数据中目标内容空间的对外分享字段的设置。若对外分享字段为0表示关闭,对外分享字段为1表示打开,那么,将第一权限数据中目标内容空间的对外分享字段设置为0。
在一些实施方式中,在第一分享权限设置完成之后,再结合页面的所属关系将页面的第二分享权限调整为第四权限,即非公开访问权限。其中,关于分享关闭的具体处理过程与上文所述的分享打开的处理过程类似,具体详见上文所述。
在一些实施方式中,当关闭内容空间整体对外分享时,将目标内容空间的对外分享字段设置为2,表明目标内容空间整体对外分享开关为关闭状态; 发起异步任务对页面进行权限扩散,因为目标内容空间数据结构为多叉树,通过对多叉树进行遍历,变更页面分享权限,将对外分享字段设置为2,表明该页面对外分享开关为打开状态,但是仅组织内获得链接的人可阅读。在目标内容空间关闭后,对页面的第二分享权限进行对应的调整,保证目标内容空间中页面的可靠性。
在本实施例中提供了一种内容空间的分享方法,可用于上述的电子设备,如用户终端或服务器等,图6是根据本公开实施例的内容空间的分享方法的流程图,如图6所示,该流程包括如下步骤:
S31,响应于对目标内容空间的打开操作,以获得目标内容空间。
其中,所述目标内容空间包括至少一个具有所属关系的页面。
详细请参见图4所示实施例的S21,在此不再赘述。
S32,响应于将目标内容空间的第一分享权限变更为第一权限,基于所属关系以及第一权限,将页面的第二分享权限调整为第二权限。
详细请参见图4所示实施例的S22,在此不再赘述。
S33,响应于接收到对具有第一权限的目标内容空间的访问请求,提供具有第二权限的页面用于访问。
在一些实施方式中,上述S33包括:
S331,接收到对具有第一权限的目标内容空间的访问请求。
在一些实施方式中,所述访问请求中携带有用户身份。
在一些实施方式中,在分享目标内容空间之后,生成分享链接,用户利用该分享链接即可访问该目标内容空间。用户通过与分享链接的交互,发送对目标内容空间的访问请求。在访问请求中携带有用户身份,该用户身份包括当前访问用户是否为组织内用户,是否是访客等等,不同的用户身份对于目标内容空间内的页面具有不同的访问权限。
在一些实施方式中,用户点击分享链接时,通过分享链接跳转至目标内容空间的显示页面,其中,在跳转时获取到用户身份,相应地,在发送访问请求时即可携带该用户身份。
S332,基于第二分享权限对用户身份进行鉴权,确定具有访问权限的页面。
在一些实施方式中,在获取到用户身份之后,利用页面的第二分享权限 对用户身份进行鉴权,确定该用户对哪些页面具有访问权限。即,确定具有访问权限的页面。如上文所述,在确定第二分享权限时,已经定义了当页面公开时,不同用户的访问权限,例如,对于组织内获得链接的人可阅读,或互联网上获得链接的人可阅读等等。通过查询目标内容空间中的各个页面的第二分享权限,确定出具有访问权限的页面。
S333,基于具有访问权限的页面的所属关系确定页面树以显示页面树。
在一些实施方式中,由于页面之间存在所属关系,因此,在确定出具有访问权限的页面之后,利用所属关系确定出页面树,即具有访问权限的页面间的所属关系。相应地,在发出访问请求的终端即可显示该页面树。
在一些实施方式中,上述S333包括:基于具有访问权限的页面的所属关系确定页面树,以在显示界面的页面树显示区显示页面树。其中,所述显示界面还包括页面显示区,用于显示页面树显示区所选择的页面。在发出访问请求的终端的显示界面上包括有页面树显示区以及页面显示区,页面树显示区显示出具有访问权限的页面的所属关系,页面显示区用于显示页面的具体内容。
在一些实施方式中,图7a以及图7b分别示出了不同用户身份的访问请求对应的显示界面。其中,图7a显示的是匿名用户或访客对应的显示界面,图7b显示的是组织内成员对应的显示页面。通过对比图7a与图7b可知,对于目标内容空间中的不可公开内容,只有组织内成员才能访问,而对于匿名用户或访问仅能够访问目标内容空间中的可公开内容。
在一些实施方式中,也可以仅对目标内容空间中的目标页面进行访问,即,在分享目标内容空间时,仅生成目标页面的分享链接。用户通过点击该分享链接,发送访问目标文档的访问请求。当访客访问页面链接时,不仅会进行用户和目标页面进行鉴权,还会向上查询目标页面的父节点页面,判断用户是否对父节点页面拥有阅读权限。若用户对父节点页面有阅读权限,则进行渲染显示;若用户对父节点页面没有阅读权限,则不进行渲染展示,一直鉴权到根节点为止。该方式能够允许访问内容空间的目标页面时,将具有访问权限的父节点页面也同样展示给用户,以保证用户访问内容空间中页面的关联性,同时能够采用页面树的方式将父节点页面以及目标页面均展示给用户,实现页面游离树的展示。
本实施例提供的内容空间的分享方法,在获取到访问请求之后,利用第二分享权限对用户身份进行鉴权,确定具有访问权限的页面,并利用页面树的形式表征所有具有访问权限的页面,便于用户访问。
作为本公开实施例的一个具体应用示例,企业A需要将其产品a的功能介绍分享给用户,那么,在企业A的相应人员需要构建该产品a的内容空间,在该内容空间内包括产品a的功能、使用方式、常见故障解决、故障报修以及该产品a对应研发人员的联系方式等等。其中,对于功能、使用方式、常见故障解决等等均是该内容空间中的页面,其中,产品a的功能、使用方式、常见故障解决、故障报修为可公开页面,产品a对应研发人员的联系方式为不可公开页面。因此,在构建内容空间时,针对各个页面进行权限属性的设置。将该内容空间对外分享时,产品a的功能、使用方式、常见故障解决以及故障报修的第二分享权限为提供给互联网上获得分享链接的人可阅读,产品a对应研发人员的联系方式为组织内获得分享链接的人可编辑。因此,通过对页面进行独立的分享权限的设置,能够使得在对内容空间进行分享时,单独对页面设置分享权限。
在本实施例中还提供了一种内容空间的分享装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
本实施例提供一种内容空间的分享装置,如图8所示,包括:
第一响应模块41,用于响应于对目标内容空间的打开操作,显示所述目标内容空间,所述目标内容空间包括至少一个具有所属关系的页面;
第二响应模块42,用于响应于将所述目标内容空间的第一分享权限变更为第一权限,并基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限;
第三响应模块43,用于响应于接收到对具有所述第一权限的目标内容空间的访问请求,提供具有所述第二权限的页面用于访问。
在一些实施方式中,第二响应模块42包括:
第一获取单元,用于获取所述目标内容空间中分享权限不可调整的第一 目标页面;
第一确定单元,用于基于所述所属关系确定归属于所述第一目标页面的第二目标页面;
第一调整单元,用于固定所述第一目标页面以及所述第二目标页面的第二分享权限,并对所述目标内容空间中其他页面的第二分享权限调整为第一权限范围的第二权限,所述第一权限范围与所述第一权限的权限范围相同。
在一些实施方式中,第一获取单元包括:
第一获取子单元,用于获取所述目标内容空间中所述页面的权限属性;
第一确定子单元,用于当所述页面的权限属性为权限不可调整时,确定所述页面为所述第一目标页面。
在一些实施方式中,所述目标内容空间采用多叉树的形式存储,所述多叉树的根节点为所述目标内容空间的根节点,所述多叉树的节点之间的关系与所述所属关系对应,第一确定单元包括:
查询子单元,用于以所述第一目标页面在所述多叉树中的节点为父节点,基于所述节点之间的关系查询与所述父节点属于同一分支的子节点;
第二确定子单元,用于将所述子节点对应的页面确定为所述第二目标页面。
在一些实施方式中,第一调整单元包括:
判断子单元,用于以所述根节点为起点,判断所述多叉树的节点对应的页面是否为所述第一目标页面;
固定子单元,用于当所述多叉树的节点对应的页面为所述第一目标页面时,固定所述第一目标页面以及所述第二目标页面的第二分享权限;
调整子单元,用于当所述多叉树的节点对应的页面不是所述第一目标页面时,将所述节点对应的页面的第二分享权限调整为第一权限范围的第二权限。
在一些实施方式中,调整模块42包括:
第二获取单元,用于获取第一权限数据以及第二权限数据,所述第一权限数据用于存储内容空间的分享权限,所述第二权限数据用于存储所述页面的分享权限;
第二调整单元,用于基于所述目标内容空间的标识,将所述第一权限数 据中所述目标内容空间的分享权限调整为公开,确定所述第一分享权限为公开;
第三调整单元,用于基于所述所属关系以及所述第一权限,将所述第二权限数据中对应页面的第二分享权限调整为第二权限。
在一些实施方式中,第三调整单元包括:
第一设置子单元,用于将第二权限数据中所述节点对应的页面的对外分享字段设置为打开标识;
第二设置子单元,用于将所述第二权限数据中所述节点对应的页面的链接分享字段设置为所述第二权限的分享标识。
在一些实施方式中,所述第三响应模块43包括:
访问请求获取模块,用于接收到对具有所述第一权限的所述目标内容空间的访问请求,所述访问请求中携带有用户身份;
鉴权模块,用于基于所述第二分享权限对所述用户身份进行鉴权,确定具有访问权限的页面;
确定模块,用于基于所述具有访问权限的页面的所属关系确定页面树以显示所述页面树。
在一些实施方式中,确定模块包括:
第二确定单元,用于基于所述具有访问权限的页面的所属关系确定所述页面树,以在显示界面的页面树显示区显示所述页面树,所述显示界面还包括页面显示区,用于显示所述页面树显示区所选择的页面。
在一些实施方式中,所述装置还包括:
关闭响应模块,用于响应于对目标内容空间的关闭操作;
关闭调整模块,用于将所述第一分享权限调整为第三权限,基于所述第三权限,将所述页面的第二分享权限调整为第四权限。
本实施例中的内容空间的分享装置是以功能单元的形式来呈现,这里的单元是指ASIC电路,执行一个或多个软件或固定程序的处理器和存储器,和/或其他可以提供上述功能的器件。
上述各个模块的更进一步的功能描述与上述对应实施例相同,在此不再赘述。
本公开实施例还提供一种电子设备,具有上述图8所示的内容空间的分 享装置。
请参阅图9,图9是本公开可选实施例提供的一种电子设备的结构示意图,如图9所示,该电子设备可以包括:至少一个处理器51,例如CPU(Central Processing Unit,中央处理器),至少一个通信接口53,存储器54,至少一个通信总线52。其中,通信总线52用于实现这些组件之间的连接通信。其中,通信接口53可以包括显示屏(Display)、键盘(Keyboard),可选通信接口53还可以包括标准的有线接口、无线接口。存储器54可以是高速RAM存储器(Random Access Memory,易挥发性随机存取存储器),也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器54可选的还可以是至少一个位于远离前述处理器51的存储装置。其中处理器51可以结合图8所描述的装置,存储器54中存储应用程序,且处理器51调用存储器54中存储的程序代码,以用于执行上述任一方法步骤。
其中,通信总线52可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。通信总线52可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
其中,存储器54可以包括易失性存储器(英文:volatile memory),例如随机存取存储器(英文:random-access memory,缩写:RAM);存储器也可以包括非易失性存储器(英文:non-volatile memory),例如快闪存储器(英文:flash memory),硬盘(英文:hard disk drive,缩写:HDD)或固态硬盘(英文:solid-state drive,缩写:SSD);存储器54还可以包括上述种类的存储器的组合。
其中,处理器51可以是中央处理器(英文:central processing unit,缩写:CPU),网络处理器(英文:network processor,缩写:NP)或者CPU和NP的组合。
其中,处理器51还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(英文:application-specific integrated circuit,缩写:ASIC),可编程逻辑器件(英文:programmable logic device,缩写:PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(英文:complex programmable logic device, 缩写:CPLD),现场可编程逻辑门阵列(英文:field-programmable gate array,缩写:FPGA),通用阵列逻辑(英文:generic array logic,缩写:GAL)或其任意组合。
可选地,存储器54还用于存储程序指令。处理器51可以调用程序指令,实现如本申请任一实施例中所示的内容空间的分享方法。
本公开实施例还提供了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,该计算机可执行指令可执行上述任意方法实施例中的内容空间的分享方法。其中,所述存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)、随机存储记忆体(Random Access Memory,RAM)、快闪存储器(Flash Memory)、硬盘(Hard Disk Drive,缩写:HDD)或固态硬盘(Solid-State Drive,SSD)等;所述存储介质还可以包括上述种类的存储器的组合。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于***实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
可以理解的是,在本公开的具体实施方式中,涉及到用户信息以及内容空间等相关的数据,当本公开以上实施例运用到具体产品或技术中时,需要获得用户许可或者同意,且相关数据的收集、使用和处理需要遵守相关国家和地区的相关法律法规和标准。
虽然结合附图描述了本公开的实施例,但是本领域技术人员可以在不脱离本公开的精神和范围的情况下做出各种修改和变型,这样的修改和变型均落入由所附权利要求所限定的范围之内。

Claims (15)

  1. 一种内容空间的分享方法,包括:
    响应于对目标内容空间的打开操作,显示所述目标内容空间,所述目标内容空间包括至少一个具有所属关系的页面;
    响应于将所述目标内容空间的第一分享权限变更为第一权限,基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限;
    响应于接收到对具有所述第一权限的所述目标内容空间的访问请求,提供具有所述第二权限的所述页面用于访问。
  2. 根据权利要求1所述的方法,其中,所述基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为所述第二权限,包括:
    获取所述目标内容空间中分享权限不可调整的第一目标页面;
    基于所述所属关系确定归属于所述第一目标页面的第二目标页面;
    固定所述第一目标页面以及所述第二目标页面的第二分享权限,并将所述目标内容空间中其他页面的第二分享权限调整为第一权限范围的第二权限,所述第一权限范围与所述第一权限的权限范围相同。
  3. 根据权利要求2所述的方法,其中,所述获取所述目标内容空间中分享权限不可调整的第一目标页面,包括:
    获取所述目标内容空间中所述页面的权限属性;
    当所述页面的权限属性为权限不可调整时,确定所述页面为所述第一目标页面。
  4. 根据权利要求2或3所述的方法,其中,所述目标内容空间采用多叉树的形式存储,所述多叉树的根节点为所述目标内容空间的根节点,所述多叉树的节点之间的关系与所述所属关系对应,所述基于所述所属关系确定归属于所述第一目标页面的第二目标页面,包括:
    以所述第一目标页面在所述多叉树中的节点为父节点,基于所述节点之间的关系查询与所述父节点属于同一分支的子节点;
    将所述子节点对应的页面确定为所述第二目标页面。
  5. 根据权利要求4所述的方法,其中,所述固定所述第一目标页面以及所述第二目标页面的第二分享权限,并将所述目标内容空间中其他页面的第 二分享权限调整为第一权限范围的第二权限,包括:
    以所述根节点为起点,判断所述多叉树的节点对应的页面是否为所述第一目标页面;
    当所述多叉树的节点对应的页面为所述第一目标页面时,固定所述第一目标页面以及所述第二目标页面的第二分享权限;
    当所述多叉树的节点对应的页面不是所述第一目标页面时,将所述节点对应的页面的第二分享权限调整为第一权限范围的第二权限。
  6. 根据权利要求1-5任一项所述的方法,其中,所述响应于将所述目标内容空间的第一分享权限变更为第一权限,基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限,包括:
    获取第一权限数据以及第二权限数据,所述第一权限数据用于存储所述第一分享权限,所述第二权限数据用于存储所述第二分享权限;
    基于所述目标内容空间的标识,将所述第一权限数据中所述目标内容空间的第一分享权限调整为所述第一权限;
    基于所述所属关系以及所述第一权限,将所述第二权限数据中对应页面的第二分享权限调整为所述第二权限。
  7. 根据权利要求6所述的方法,其中,所述基于所述所属关系以及所述第一权限,将所述第二权限数据中对应页面的第二分享权限调整为所述第二权限,包括:
    将所述第二权限数据中所述节点对应的页面的对外分享字段设置为打开标识;
    将所述第二权限数据中所述节点对应的页面的链接分享字段设置为所述第二权限的分享标识。
  8. 根据权利要求1-7任一项所述的方法,其中,所述响应于接收到对具有所述第一权限的所述目标内容空间的访问请求,提供具有所述第二权限的所述页面用于访问,包括:
    接收到对具有所述第一权限的所述目标内容空间的访问请求,所述访问请求中携带有用户身份;
    基于所述第二权限对所述用户身份进行鉴权,确定具有访问权限的页面;
    基于所述具有访问权限的页面的所属关系确定页面树,以显示所述页面 树。
  9. 根据权利要求8所述的方法,其中,所述基于所述具有访问权限的页面的所属关系确定页面树,以显示所述页面树,包括:
    基于所述具有访问权限的页面的所属关系确定所述页面树,以在显示界面的页面树显示区显示所述页面树,所述显示界面还包括页面显示区,用于显示所述页面树显示区所选择的页面。
  10. 根据权利要求1-9任一项所述的方法,还包括:
    响应于对所述目标内容空间的关闭操作;
    将所述第一分享权限调整为第三权限,基于所述第三权限以及所述所属关系,将所述页面的第二分享权限调整为第四权限。
  11. 根据权利要求1-10任一项所述的方法,其中,所述第二权限中包括与所述第一权限的权限范围相同的第一权限范围,和/或,与所述第一权限的权限范围不同的第二权限范围。
  12. 根据权利要求11所述的方法,其中,所述第一权限包括互联网上获得链接的人可阅读,所述第二权限包括组织内获得链接的人可阅读、组织内获得链接的人可编辑、互联网上获得链接的人可阅读或互联网上获得链接的人可编辑,所述链接为具有所述第一权限的目标内容空间的***。
  13. 一种内容空间的分享装置,包括:
    第一响应模块,用于响应于对目标内容空间的打开操作,显示所述目标内容空间,所述目标内容空间包括至少一个具有所属关系的页面;
    第二响应模块,用于响应于将所述目标内容空间的第一分享权限变更为第一权限,并基于所述所属关系以及所述第一权限,将所述页面的第二分享权限调整为第二权限;
    第三响应模块,用于响应于接收到对具有所述第一权限的目标内容空间的访问请求,提供具有所述第二权限的页面用于访问。
  14. 一种电子设备,包括:
    存储器和处理器,所述存储器和所述处理器之间互相通信连接,所述存储器中存储有计算机指令,所述处理器通过执行所述计算机指令,从而执行权利要求1-12中任一项所述的内容空间的分享方法。
  15. 一种计算机可读存储介质,其中,所述计算机可读存储介质存储有 计算机指令,所述计算机指令用于使计算机执行权利要求1-12中任一项所述的内容空间的分享方法。
PCT/CN2023/108021 2022-07-21 2023-07-19 内容空间的分享方法、装置、电子设备及存储介质 WO2024017271A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210863688.0 2022-07-21
CN202210863688.0A CN115242503B (zh) 2022-07-21 2022-07-21 内容空间的分享方法、装置、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024017271A1 true WO2024017271A1 (zh) 2024-01-25

Family

ID=83674490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/108021 WO2024017271A1 (zh) 2022-07-21 2023-07-19 内容空间的分享方法、装置、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN115242503B (zh)
WO (1) WO2024017271A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242503B (zh) * 2022-07-21 2024-05-07 北京字跳网络技术有限公司 内容空间的分享方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015101302A1 (zh) * 2013-12-30 2015-07-09 腾讯科技(深圳)有限公司 数据共享方法、***、用户端及后台服务器
CN109787948A (zh) * 2017-11-14 2019-05-21 钉钉控股(开曼)有限公司 共享空间的访问方法、权限管理方法及装置
CN114490548A (zh) * 2020-11-13 2022-05-13 腾讯科技(深圳)有限公司 文件管理方法、装置、设备及计算机可读存储介质
CN115242503A (zh) * 2022-07-21 2022-10-25 北京字跳网络技术有限公司 内容空间的分享方法、装置、电子设备及存储介质

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427005B (zh) * 2013-08-20 2018-01-02 阿里巴巴集团控股有限公司 在cdn上实现请求精确调度的方法及***
CN103678555B (zh) * 2013-12-06 2017-08-25 北京奇虎科技有限公司 进行网页收藏的方法和进行网页收藏的装置
CN106817355B (zh) * 2015-12-01 2019-12-10 北京国双科技有限公司 网页权限的控制方法及装置
CN109669924A (zh) * 2018-12-24 2019-04-23 天津字节跳动科技有限公司 在线文档的共享方法、装置、电子设备和存储介质
CN113742601A (zh) * 2020-05-29 2021-12-03 腾讯科技(深圳)有限公司 内容分享方法、装置、计算机设备和存储介质
CN113806008A (zh) * 2021-02-02 2021-12-17 北京沃东天骏信息技术有限公司 集群访问方法、装置、电子设备及可读存储介质
CN113094674B (zh) * 2021-04-28 2024-04-02 深圳赛安特技术服务有限公司 页面展示方法、装置、电子设备及存储介质
CN113609834A (zh) * 2021-08-18 2021-11-05 北京字跳网络技术有限公司 信息处理方法、装置、设备及介质
CN114546560A (zh) * 2022-02-22 2022-05-27 浙江蓝卓工业互联网信息技术有限公司 数据分享方法及装置、存储介质及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015101302A1 (zh) * 2013-12-30 2015-07-09 腾讯科技(深圳)有限公司 数据共享方法、***、用户端及后台服务器
CN109787948A (zh) * 2017-11-14 2019-05-21 钉钉控股(开曼)有限公司 共享空间的访问方法、权限管理方法及装置
CN114490548A (zh) * 2020-11-13 2022-05-13 腾讯科技(深圳)有限公司 文件管理方法、装置、设备及计算机可读存储介质
CN115242503A (zh) * 2022-07-21 2022-10-25 北京字跳网络技术有限公司 内容空间的分享方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN115242503B (zh) 2024-05-07
CN115242503A (zh) 2022-10-25

Similar Documents

Publication Publication Date Title
US9721018B2 (en) System and method for displaying of most relevant vertical search results
CN110943961B (zh) 数据处理方法、设备以及存储介质
WO2013143403A1 (zh) 一种访问网站的方法和***
US11042662B2 (en) Data aggregation system for enabling query operations on restricted data that originates from multiple independent multiple sources
JP6506762B2 (ja) サードパーティアプリケーションのアクティビティデータの収集のためのシステムおよび方法
US11714693B2 (en) Data driven API conversion
US10853440B2 (en) Displaying an object having a link to a database record in response to a user selection of a highlighted reference
WO2024017271A1 (zh) 内容空间的分享方法、装置、电子设备及存储介质
US10645090B2 (en) Access control for objects having attributes defined against hierarchically organized domains containing fixed number of values
US20160012074A1 (en) System and method for providing contextual analytics data
US20190050376A1 (en) Automatic value formatting based on intrinsic structural semantics
US20220255914A1 (en) Identity information linking
CN110727417A (zh) 一种数据处理方法和装置
US11882154B2 (en) Template representation of security resources
WO2023179549A1 (zh) 一种文档块分享方法、装置、***及存储介质
WO2023092580A1 (zh) 页面显示方法、装置、存储介质及电子设备
US11693859B2 (en) Systems and methods for data retrieval from a database indexed by an external search engine
US9817891B1 (en) System, method, and computer program for creating metadata-based search queries
US11586696B2 (en) Enhanced web browsing
CN113391967A (zh) 防火墙的包过滤测试方法及装置
CN116827604A (zh) 应用登录控制方法、***、终端及存储介质
US11467868B1 (en) Service relationship orchestration service
CN113031928B (zh) web***生成方法及装置、电子设备和计算机可读存储介质
CN114996554A (zh) 数据库的查询方法、装置、存储介质及电子设备
WO2021121130A1 (zh) 信息采集方法、装置、计算机设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23842334

Country of ref document: EP

Kind code of ref document: A1