CN114338059B - Application opening method, device, terminal and storage medium - Google Patents
Application opening method, device, terminal and storage medium Download PDFInfo
- Publication number
- CN114338059B CN114338059B CN202011040776.8A CN202011040776A CN114338059B CN 114338059 B CN114338059 B CN 114338059B CN 202011040776 A CN202011040776 A CN 202011040776A CN 114338059 B CN114338059 B CN 114338059B
- Authority
- CN
- China
- Prior art keywords
- user
- target application
- opening
- server
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012795 verification Methods 0.000 claims abstract description 84
- 230000001360 synchronised effect Effects 0.000 claims abstract description 49
- 230000008859 change Effects 0.000 claims description 44
- 230000008520 organization Effects 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 15
- 238000004891 communication Methods 0.000 description 12
- 230000006854 communication Effects 0.000 description 12
- 230000004913 activation Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 6
- 230000004044 response Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 230000007175 bidirectional communication Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 101100128816 Francisella novicida lpxK gene Proteins 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 101150102968 valB gene Proteins 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention discloses an application opening method, an application opening device, a terminal and a storage medium. Wherein the method comprises the following steps: responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; acquiring verification information input by the user on the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified. The embodiment of the invention can optimize the application opening flow and improve the application opening efficiency.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an application opening method, an application opening device, a terminal, and a storage medium.
Background
In the field of enterprise mobile office, applications in an enterprise work platform may not be suitable for all enterprises, and the requirements for the applications may be different in different industry directions. In very large enterprises, some application functions are not applicable to all enterprise employees, so the use scope of different employees can be set by an administrator.
However, if the user not in the use range wants to use the application, the administrator needs to send an opening request first, notify the user of registering related information according to the opening request, and then the administrator checks the user registering information to determine whether to open the application for the user.
Disclosure of Invention
The invention provides an application opening method, an application opening device, a terminal and a storage medium, which can simplify the opening flow of an application and improve the opening efficiency of the application.
In a first aspect, the present invention provides an application opening method, the method including:
responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application;
Detecting the authority of a user to the target application according to the synchronous configuration information;
If the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application;
acquiring verification information input by the user on the opening guide interface;
And sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
In some embodiments of the present invention, the synchronization configuration information includes user identity information and system configuration information corresponding to the target application;
And detecting the authority of the user corresponding to the terminal to the target application according to the synchronous configuration information, wherein the method comprises the following steps:
detecting whether user identity information corresponding to the target application is preset identification information or not;
if not, determining that the user does not have the use right for the target application;
Detecting whether the system configuration information has the opening information of the target application or not;
if yes, determining that the user has the opening authority for the target application.
In some embodiments of the invention, the method further comprises:
acquiring an identity change message sent by a server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed;
according to the identity change message, an identity synchronization request is sent to the server;
and acquiring the user identity information fed back by the server according to the identity synchronization request.
In some embodiments of the invention, the method further comprises:
A system configuration synchronization request is sent to a server, wherein the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add opening information of a target application to the system configuration information when detecting that the user identifier is located in a preset opening list of the target application;
And acquiring the system configuration information fed back by the server.
In some embodiments of the present invention, the user identifier is an identification code of the user or an identification code of an organization in which the user is located.
In some embodiments of the present invention, the activation information includes at least one of an activation identifier and link information of an activation guidance interface.
In some embodiments of the present invention, the sending a system configuration synchronization request to the server includes:
Acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list or the link information is changed;
And sending a system configuration synchronization request to the server according to the system configuration change message.
In some embodiments of the present invention, the displaying the open guiding interface of the target application includes:
Acquiring link information corresponding to the target application from the synchronous configuration information;
and displaying an opening guide interface of the target application according to the link information.
In some embodiments of the invention, the method further comprises:
Sending an application data synchronization request to a server;
acquiring the latest version number of the target application fed back by the server according to the application data synchronization request;
if the terminal does not store the version number of the target application or the stored version number is lower than the latest version number, an application data update request is sent to the server, and the latest version number of the target application is stored;
and acquiring the application data fed back by the server according to the application data updating request.
In a second aspect, the present invention provides an application opening device, the device comprising:
the first acquisition module is used for responding to the triggering operation of the target application in the working platform and acquiring the synchronous configuration information of the target application;
the detection module is used for detecting the authority of the user on the target application according to the synchronous configuration information;
The display module is used for displaying an opening guide interface of the target application if the user is detected to have no use right but opening right;
the second acquisition module is used for acquiring verification information input by the user on the opening guide interface; and
And the opening module is used for sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
In a third aspect, the present invention provides a terminal comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application;
Detecting the authority of a user to the target application according to the synchronous configuration information;
If the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application;
acquiring verification information input by the user on the opening guide interface;
And sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
In a fourth aspect, the present invention provides a storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps in the above application opening method.
When a target application in a working platform is triggered, synchronous configuration information of the target application is acquired; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application, and acquiring verification information input by the user at the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information passes, the back-and-forth interaction between the user and an administrator is not needed, the application opening flow is simplified, and the application opening efficiency is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a scenario of an application provisioning system provided in an embodiment of the present invention;
FIG. 2 is another schematic diagram of an application provisioning system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a distributed system for use in a blockchain system according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a block structure according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart of an application opening method according to an embodiment of the present invention;
FIG. 6 is an interface schematic diagram of a working platform in an application opening method according to an embodiment of the present invention;
FIG. 7 is another interface schematic diagram of a working platform in the application opening method provided in the embodiment of the present invention;
FIG. 8 is a schematic diagram of another interface of a working platform in the application opening method according to the embodiment of the present invention;
FIG. 9 is a schematic diagram of another interface of a working platform in the application opening method according to the embodiment of the present invention;
FIG. 10 is another flow chart of an application opening method provided in an embodiment of the present invention;
FIG. 11 is a timing diagram of an application opening method provided in an embodiment of the present invention;
FIG. 12 is a workflow diagram of logic modules provided in an embodiment of the present invention;
fig. 13 is a schematic structural diagram of an application opening device according to an embodiment of the present invention;
Fig. 14 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
In the description that follows, embodiments of the invention will be described with reference to steps and symbols performed by one or more computers, unless otherwise indicated. Thus, these steps and operations will be referred to in several instances as being performed by a computer, which as referred to herein performs operations that include processing units by the computer that represent electronic signals that represent data in a structured form. This operation transforms the data or maintains it in place in the computer's memory system, which may reconfigure or otherwise alter the computer's operation in a manner well known to those skilled in the art. The data structure maintained by the data is the physical location of the memory, which has specific characteristics defined by the data format. However, the principles of the present invention are described in the foregoing text and are not meant to be limiting, and one skilled in the art will recognize that various steps and operations described below may also be implemented in hardware.
The term "module" or "unit" as used herein may be considered a software object executing on the computing system. The various components, modules, engines, and services described herein may be viewed as implementing objects on the computing system. The apparatus and methods described herein are preferably implemented in software, but may of course also be implemented in hardware, all within the scope of the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
The embodiment of the invention provides an application opening method, an application opening device, a terminal and a storage medium.
Referring to fig. 1, fig. 1 is a schematic view of a scenario of an application provisioning system provided by an embodiment of the present invention, where the application provisioning system may include a terminal 10 and a server 20, where the terminal 10 and the server 20 are connected through a network, an application provisioning device is integrated in the server 20, and the server 20 may be a working platform server (i.e. a server loaded with a working platform), such as the server in fig. 1, and the terminal 10 may access the server 20. The server 20 in the embodiment of the present invention is mainly configured to obtain synchronous configuration information of a target application in a working platform in response to a trigger operation of the target application; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; acquiring verification information input by the user on the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
In the embodiment of the present invention, the server 20 may be an independent server, or may be a server network or a server cluster formed by servers, for example, the server 20 described in the embodiment of the present invention includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud server formed by a plurality of servers. Wherein the Cloud server is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing). In embodiments of the present invention, communication between the server and the terminal may be accomplished by any communication means, including, but not limited to, mobile communication based on the third generation partnership project (3rd Generation Partnership Project,3GPP), long term evolution (Long Term Evolution, LTE), worldwide interoperability for microwave access (Worldwide Interoperability for Microwave Access, wiMAX), or computer network communication based on the TCP/IP protocol family (TCP/IP Protocol Suite, TCP/IP), user datagram protocol (User Datagram Protocol, UDP), etc.
It is to be understood that the terminal 10 used in the embodiments of the present invention may be understood as a terminal device including both receiving and transmitting hardware, i.e. a device having receiving and transmitting hardware capable of performing bi-directional communication over a bi-directional communication link. Such a terminal device may include: a cellular or other communication device having a single-line display or a multi-line display or a cellular or other communication device without a multi-line display. The specific terminal 10 may be a desktop terminal or a mobile terminal, and the terminal 10 may be one of a mobile phone, a tablet computer, a notebook computer, and the like.
It will be appreciated by those skilled in the art that the application environment shown in fig. 1 is merely an application scenario of the present invention, and is not limited to the application scenario of the present invention, and other application environments may also include more or fewer servers than those shown in fig. 1, or a server network connection relationship, for example, only 1 server and 2 terminals are shown in fig. 1, and it will be appreciated that the statistical system may also include one or more other servers, or/and one or more terminals connected to a server network, and is not limited herein in particular.
In some embodiments of the present invention, the working platform may be an enterprise office platform, taking the server 20 as an example, which may specifically further include an enterprise office platform contact server, an enterprise office platform configuration management server, and a Web management server, where an enterprise user or developer may access the Web management server by using a Web browsing terminal to configure field configuration information on the enterprise office platform configuration management server, and set and store enterprise user information of enterprise staff of the enterprise office platform in the enterprise office platform contact server.
In addition, as shown in fig. 1, the application opening system may further include a memory 30, for storing data, such as application data of each application in the working platform, system configuration information, user identity information corresponding to the terminal, and so on, so that when the terminal synchronizes information, the corresponding data can be obtained from the memory and sent to the terminal.
As shown in fig. 2, the terminal 10 may include an application synchronization module 61, an identity management module 62, a system configuration module 63, a logic module 64, and a UI module 65. Server 20 may include a logic server 66, an open rights control module 67, and a WEB server 68. Wherein, in the terminal 10, the application synchronization module 61 is used for synchronizing application data and displaying an application entry on the working platform; the identity management module 62 is used for managing and synchronizing user identity information; the system configuration module 63 is used for synchronizing system configuration (system_config), including whether each application in the working platform performs configuration of an opening authority policy, and elements or web page link information required by a terminal display interface when a user has an opening authority; the logic module 64 is used for processing logic business, controlling the connection of the modules of the terminal and executing the strategy logic of the opening authority; the UI module 65 is used for displaying an application list in the working platform, and the Web browser is used as a presentation control, and uses the Web URL provided by the system configuration module 63 to obtain the Web display from the Web server, so as to guide the user to enable the related application function. In the server 20, the logic server 66 is used to provide application synchronization services, identity synchronization services, and system configuration services; the opening authority control module 67 is used for controlling the synchronous result of the system configuration module 63, thereby achieving the purpose of controlling the opening authority range; the WEB server 68 is used for presenting application functions in the form of WEB pages, guiding users to enable related applications, and is responsible for issuing WEB page information elements to realize dynamic update of WEB pages. It should be noted that, the schematic diagrams of the scenario of the application provisioning system shown in fig. 1 and 2 are only an example, and the statistical system and scenario described in the embodiment of the present invention are for more clearly describing the technical solution of the embodiment of the present invention, and do not constitute a limitation on the technical solution provided by the embodiment of the present invention, and those skilled in the art can know that, with the evolution of the statistical system and the appearance of a new service scenario, the technical solution provided by the embodiment of the present invention is equally applicable to similar technical problems.
The application provisioning system according to the embodiment of the present invention may be a distributed system formed by connecting a plurality of nodes 200 (any form of computing devices in an access network, such as a terminal 10 and a server 20, etc.) through a network communication.
Taking a distributed system as an example of a blockchain system, referring To fig. 3, fig. 3 is a schematic diagram of an alternative architecture of the distributed system 100 applied To the blockchain system according To an embodiment of the present invention, where the architecture is formed by a plurality of nodes (arbitrary computing devices in an access network, such as servers and user terminals) and clients, and a Peer-To-Peer (P2P, peer To Peer) network is formed between the nodes, where the P2P protocol is an application layer protocol running on top of a transmission control protocol (TCP, transmission Control Protocol) protocol. In a distributed system, any machine, such as a server, a terminal, may join to become a node, including a hardware layer, an intermediate layer, an operating system layer, and an application layer. In the embodiment of the present invention, the terminal 10 and the server 20 are each a node in a blockchain system.
Referring to the functionality of each node in the blockchain system shown in fig. 3, the functions involved include:
1) The routing, the node has basic functions for supporting communication between nodes.
Besides the routing function, the node can also have the following functions:
2) The application is used for being deployed in a block chain to realize specific service according to actual service requirements, recording data related to the realization function to form recorded data, carrying a digital signature in the recorded data to represent the source of task data, sending the recorded data to other nodes in the block chain system, and adding the recorded data into a temporary block when the source and the integrity of the recorded data are verified by the other nodes.
For example, the services implemented by the application include:
2.1 Wallet for providing electronic money transactions, including initiating a transaction (i.e., sending a transaction record of the current transaction to other nodes in the blockchain system, the other nodes, after verification, storing record data of the transaction in a temporary block of the blockchain in response to acknowledging that the transaction is valid; of course, the wallet also supports inquiry of remaining electronic money in the electronic money address;
2.2 The shared account book is used for providing the functions of storing, inquiring, modifying and the like of account data, sending record data of the operation on the account data to other nodes in the blockchain system, and after the other nodes verify to be effective, storing the record data into a temporary block as a response for acknowledging that the account data is effective, and also sending confirmation to the node initiating the operation.
2.3 A computerized agreement that can execute the terms of a contract, implemented by code deployed on a shared ledger for execution when certain conditions are met, for completing automated transactions based on actual business demand codes, such as querying the physical distribution status of the goods purchased by the buyer, transferring the electronic money of the buyer to the merchant's address after the buyer signs for the goods; of course, the smart contract is not limited to executing the contract for the transaction, and may execute a contract that processes the received information.
3) The blockchain comprises a series of blocks (blocks) which are connected with each other according to the generated sequence time, the new blocks are not removed once being added into the blockchain, and record data submitted by nodes in the blockchain system are recorded in the blocks.
Referring to fig. 4, fig. 4 is an optional Block Structure (Block Structure) provided in an embodiment of the present invention, where each Block includes a hash value of a transaction record stored in the Block (hash value of the Block) and a hash value of a previous Block, and each Block is connected by the hash value to form a Block chain. In addition, the block may include information such as a time stamp at the time of block generation. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains associated information for verifying the validity of its information (anti-counterfeiting) and generating the next block.
When the application enabling system is a blockchain system in the embodiment of the present invention, the server is a node in the blockchain system in the embodiment of the present invention, and the synchronization configuration information can be stored in the blockchain. Specifically, in the embodiment of the present invention, the method further includes: the synchronization configuration information is saved in the form of blocks into the blockchain. The specific manner of adding the blocks may refer to the description of the blockchain system described above, and will not be repeated here.
The following describes in detail specific embodiments.
In the present embodiment, description will be made in terms of an application opening device, which may be integrated in the terminal 10 in particular.
The invention provides an application opening method, which comprises the following steps: responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; acquiring verification information input by the user on the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
Referring to fig. 5, a flowchart of an embodiment of an application opening method in an embodiment of the present invention is shown, where the method includes:
401. And responding to the triggering operation of the target application in the working platform, and acquiring the synchronous configuration information of the target application.
In this embodiment, the working platform may be an enterprise office platform or an enterprise management platform, where the enterprise office platform is used as an effective office communication tool, so that communication efficiency inside an enterprise is improved, and a certain pushing effect is provided for improving productivity of the enterprise. The enterprise can use the enterprise office platform as an office communication tool to complete instant messaging (such as chat), telephone, mail and other office applications fitting office scenes in the office process.
In one example of the invention, an enterprise may implement an efficient office via an enterprise office platform. Applications in the work platform refer to various functions integrated in the work platform, for example, applications in the enterprise office platform may include chat, public fee phone, mail announcement, attendance checking, leave, reimbursement, etc. Various applications in the work platform can be displayed on a display interface of the terminal, for example, as shown in fig. 6, the enterprise office platform displays applications such as document management, contract management, flow management, task management, approval authorization, address book, document management, news management, client friend circle and the like on the display interface of the terminal.
For an enterprise, before an enterprise employee uses a work platform, the enterprise needs to register on the work platform by enterprise personnel (such as an enterprise administrator), and basic information of the enterprise, such as information of an enterprise name, industry classification of the enterprise, enterprise scale and the like, is filled in according to requirements. After registration is completed, the enterprise personnel may divide the enterprise personnel into a plurality of organizations, which are groups or parties, such as departments, groups, and the like, that are cooperatively associated with each other. Since the work platform is used by a plurality of organizations, when the organizations are divided, an organization identification code is allocated to each organization, that is, the organization identification codes of different organizations on the work platform are different. Taking the working platform as an enterprise office platform as an example, corpId (a number of the type of uint 64) corresponding to an organization is a unique identification code of the organization in the enterprise office platform.
Meanwhile, the enterprise staff needs to register on the working platform, and basic information of the staff, such as staff name, mobile phone number of the staff and the like, is filled in according to requirements. Because the working platform is used by a plurality of staff, when the staff registers on the working platform, a user identification code is correspondingly allocated to the staff, namely, different staff register different user identification codes on the working platform respectively so as to distinguish different staff. Taking the working platform as an enterprise office platform as an example, the VID (a number of the type of uint 64) corresponding to the employee is a unique identification code of the employee. The enterprise can add basic information of staff in the working platform in advance, such as a mobile phone number and the like, and can correlate the user identification code of the staff with the organization identification code of the organization where the staff is located according to the basic information of the staff after the staff registers and logs in the working platform.
The synchronous configuration information may include user identity information and system configuration information corresponding to each application in the working platform, and user identity information and system configuration information corresponding to different applications may be different. The synchronous configuration information of each application in the working platform can be synchronized from the server to the terminal in real time. When the user identity information corresponding to any application in the working platform is changed, the changed user identity information can be synchronized to the terminal. For example, the method further comprises: acquiring an identity change message sent by the server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed; according to the identity change message, an identity synchronization request is sent to the server; and acquiring user identity information corresponding to the target application fed back by the server according to the identity synchronization request.
Enterprise personnel (such as enterprise administrator) can modify the user identity information of each staff on the working platform, the user identity information can include super administrator, business administrator, customer service identity staff, common staff and the like, the super administrator can manage application use of the whole enterprise staff, the business administrator can be responsible for managing the customer service identity staff in jurisdiction, the customer service identity staff can use part of application and the like, and the user identity information can be set according to enterprise requirements. In addition, the same employee can correspond to different user identity information in different applications, for example, the user identity information corresponding to the address book application of the same employee is a customer service identity employee, and the user identity information corresponding to the client friend circle application is a common employee. Enterprise personnel may only modify user identity information corresponding to a certain application.
When the server detects that a user (employee) changes the user identity information of a target application, for example, the user identity information of the user in a client friend circle application is changed from a common employee to a customer service identity employee, the server sends an identity change message to a corresponding terminal according to the user identification code of the user, and the identity change message can be sent to the terminal through an instant message channel to prompt the user corresponding to the terminal to update the identity. The user corresponding to the terminal sends an identity synchronization request to the server by triggering the identity change message, the server feeds back the latest user identity information of the user in the target application to the terminal according to the identity synchronization request, and the terminal updates the user identity information of the user in the target application to the latest user identity information so as to ensure the real-time performance of the user identity information synchronization.
In addition, the terminal can synchronize the system configuration information in real time. The method further comprises the steps of: a system configuration synchronization request is sent to a server, wherein the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add opening information of a target application to the system configuration information when detecting that the user identifier is located in a preset opening list of the target application; and acquiring the system configuration information fed back by the server.
It should be noted that, enterprise personnel (such as an enterprise administrator) can select a required application to set an opening authority policy on the working platform, where the opening authority policy is to increase the setting of the opening authority based on the setting of the use authority, so as to guide a user with the opening authority to input verification information, and realize automatic opening of the application. For the application of setting the opening authority policy, an opening list needs to be further set, and the opening lists of different applications can be different. The opening list can be set by taking the user as a unit, namely the opening list can comprise identification codes of different users, and can also be set by taking the organization as a unit, namely the opening list can comprise identification codes of different organizations, so that the opening authority range is set by taking the user or the organization as a dimension. In addition, for the application for setting the opening permission policy, the link information of the opening guide interface or the required element information can be set on the working platform, and the opening guide interfaces corresponding to different applications can be different, namely the link information corresponding to different applications can be different.
After the terminal sends a system configuration synchronization request to the server, the server identifies a user identifier in the system configuration synchronization request, wherein the user identifier can be an identification code of a user or an identification code of an organization where the user is located, and respectively detects whether the user identifier is located in an opening list of each application provided with an opening authority policy. If the user identifier is located in an opening list of an application, adding opening information of the application into system configuration information and feeding back the system configuration information to a terminal; if the user identifier is not located in the opening list of a certain application, opening information of the application is not added to the system configuration information. The provisioning information may include at least one of a provisioning identifier and link information of a provisioning guidance interface of the target application. After synchronizing the system configuration information to the terminal, the terminal can acquire which applications are provided with the opening permission policies, and the user corresponding to the terminal has the opening permission for which applications.
The system configuration synchronization request may be triggered when relevant information configured in the work platform is changed. Specifically, the sending a system configuration synchronization request to the server includes: acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list or the link information is changed; and sending a system configuration synchronization request to the server according to the system configuration change message.
Enterprise personnel (such as enterprise administrators) can modify whether the application is provided with the opening authority policy on the working platform, for example, modify the application which is not provided with the opening authority policy into the application which is provided with the opening authority policy, add a corresponding opening authority list, modify the opening list of the application which is provided with the opening authority policy, for example, add user identification codes of different users in the opening list, and modify the link information of the application which is provided with the opening authority policy so as to change the opening guide interface of the application. The modification of the information can trigger the server to send a system configuration change message to the terminal, the system configuration change message can be sent through a data flow channel or an instant message channel, the data flow channel is a special message channel independent of the instant message channel, and the system configuration change message is sent through the data flow channel, so that the real-time performance of the synchronization of the system configuration message can be ensured, the problem of write-out diffusion of the server can be prevented, and meanwhile, the independent data flow channel cannot influence the instant message channel. And the user corresponding to the terminal sends a system configuration synchronization request to the server by triggering a system configuration change message, and the server re-detects whether the user identifier is positioned in an opening authority list of each application provided with an opening authority policy according to the system configuration synchronization request.
In addition, the terminal may synchronize application data from the server. Specifically, the method further comprises: sending an application data synchronization request to a server; acquiring the latest version number of the target application fed back by the server according to the application data synchronization request; if the terminal does not store the version number of the target application or the stored version number is lower than the latest version number, an application data update request is sent to the server, and the latest version number of the target application is stored; and acquiring the application data fed back by the server according to the application data updating request.
The synchronization of the application data may further include synchronization of related information of each application, such as a name, an icon, a profile, and side information of the application. Because the application in the working platform is more, in order to timely and effectively synchronize the relevant information of the application, the terminal can perform incremental synchronization at regular time so as to avoid the waste of data flow caused by full synchronization when the application data is not changed. The synchronization of the application data may be divided into meta information and detail information, wherein the meta information may be attribute information such as a version number of the application, and the detail information may be detailed information of the application data. The terminal firstly acquires meta information of each application from the server, if the terminal acquires meta information of an application for the first time, namely the meta information of the application is not stored in the terminal, the terminal marks the detail information of the application to be acquired, and stores the meta information of the application acquired at the time; if the terminal has acquired meta information of an application, that is, the terminal stores meta information of the application, but the version number of the meta information acquired this time is higher than the version number of the stored meta information, it indicates that the information of the application is updated in the server, the application information of the terminal has expired, the detail information of the application is required to be acquired, and the version number stored in the terminal is updated to the latest version number. And the terminal collects all the applications needing to acquire the detail information, and acquires the detail information of the applications in batches from the server to acquire updated application data. The application data is updated in an incremental synchronization mode, so that the real-time updating and performance of each application in the working platform are ensured, and meanwhile, the user traffic is saved.
After a user corresponding to the terminal logs in the working platform, the user can check each application on a display interface of the working platform of the terminal, and trigger the corresponding application through clicking operation on the application. When the target application is triggered for the first time, the latest synchronous configuration information corresponding to the target application can be obtained, namely, the user identity information and the system configuration information corresponding to the target application are obtained from the latest synchronous configuration information of the terminal.
402. And detecting the authority of the user corresponding to the terminal to the target application according to the synchronous configuration information.
In this embodiment, according to the user identity information and the system configuration information corresponding to the target application, the authority of the user corresponding to the terminal to the target application may be detected. Specifically, the detecting, according to the synchronization configuration information in step 402, the authority of the user corresponding to the terminal to the target application includes: detecting whether user identity information corresponding to the target application is preset identification information or not; if not, determining that the user does not have the use right for the target application; detecting whether the system configuration information has the opening information of the target application or not; if yes, determining that the user has the opening authority for the target application.
Enterprise personnel (e.g., enterprise administrators) may also set a range of use for each application in the work platform, which may be set based on user identity information. For example, for a client friend circle application, a super manager, a service manager and customer service identity staff are set to have use rights, and a common staff is set to have no use rights, so that the super manager, the service manager and the customer service identity staff are set to preset identification information. The application ranges of different applications may be different, i.e. the preset identification information corresponding to the different applications may be different.
Taking the application of the client friend circle as an example, after the user identity information corresponding to the terminal is obtained, if the user identity information is a super manager, a service manager or customer service identity staff, determining that the user corresponding to the terminal has the use authority for the client friend circle. If the user identity information is a common employee, determining that the user corresponding to the terminal does not have a use right, and continuously detecting whether the system configuration information has the opening information of the client friend circle application, wherein the opening information can comprise an opening identifier, if the system configuration information has the opening identifier of the client friend circle application, the user identifier corresponding to the terminal is indicated to be positioned in an opening list of the client friend circle application, the user has the opening right to the client friend circle application, and if the system configuration information does not have the opening identifier of the client friend circle application, the user identifier corresponding to the terminal is indicated to not set an opening right policy, or the user identifier corresponding to the terminal is not positioned in an opening list of the client friend circle application, and the user does not have the opening right to the client friend circle application.
403. And if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application.
In this embodiment, when it is detected that the user has a right to use the target application, a welcome interface is displayed on the terminal, as shown in fig. 7, and the user can use the target application by clicking a button that is used immediately; when the fact that the user does not have the use right to the target application and does not have the opening right is detected, displaying an unauthorized interface on the terminal, wherein the user cannot use the target application as shown in FIG. 8; when it is detected that the user does not have the use right but has the opening right to the target application, an opening guide interface of the target application is displayed on the terminal, as shown in fig. 9, the user can input related information required for opening the target application through guide information on the opening guide interface, and the opening guide interface can also display function introduction of the target application.
Specifically, the displaying the opening guide interface of the target application includes: acquiring link information corresponding to the target application from the synchronous configuration information; and displaying an opening guide interface of the target application according to the link information.
When the terminal synchronizes the system configuration information, if the user corresponding to the terminal has the opening authority to the target application, the server simultaneously adds the link information of the opening guide interface of the target application to the system configuration information and feeds back the link information to the terminal. Therefore, the terminal can acquire the link information (such as the webpage URL) of the opening guide interface of the target application when detecting that the user has the opening authority to the target application. And the terminal sends a link request to the server according to the link information, and the server feeds back corresponding display information according to the link request so that the terminal can display an opening guide interface of the target application.
404. And acquiring verification information input by the user on the opening guide interface.
In this embodiment, before the target application is opened for the user, the user identity needs to be further checked and verified, and the opening guide interface of the target application can guide the user to input verification information by itself. Different applications can set different verification modes, so that verification information input by a user in the opening guide interface of the different applications can be different. The verification mode can comprise face verification, fingerprint verification, iris verification and the like. If the verification mode is face verification, the verification information input by the user is guided to be a face image on the opening guide interface, the user prompts 'please verify the face' on the opening guide interface, meanwhile, a camera of the terminal is opened, the user aims the face at the camera according to the prompt, and the terminal acquires the face image of the user through the camera. If the verification mode is fingerprint verification, the verification information input by the user is guided to be fingerprint information on the opening guide interface, the user prompts 'please verify the fingerprint' on the opening guide interface, and the user places the finger in a fingerprint identification area of the terminal according to the prompt, so that the terminal obtains the fingerprint information of the user. If the verification mode is iris verification, the verification information input by the user is guided to be iris information on the opening guide interface, the user is prompted to check the iris on the opening guide interface, meanwhile, a camera of the terminal is opened, and the user aims the iris at the camera according to the prompt, so that the terminal can acquire iris information of the user through the camera.
For example, as shown in fig. 9, the client friend circle applies corresponding verification mode to human face verification, an image display area is provided on the guiding interface, the user can check the image shot by the camera in real time through the image display area to adjust the shooting angle in real time, and when the user aims the human face at the camera, namely, the image display area displays complete and clear human face image, the terminal can acquire the human face image to obtain verification information of the user.
405. And sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
In this embodiment, when the user registers on the working platform, more user information, such as face images, fingerprint information, iris information, etc., may be input, and the terminal sends the input user information to the server for storage. After a user inputs verification information through an opening guide interface of a target application, the terminal sends the verification information to the server, the server compares the verification information with pre-stored user information to verify the verification information, if the comparison result is that the information is matched, the verification is passed, the server opens the target application for the user, and the terminal jumps from the opening guide interface to the target application interface, namely the user can use the target application; if the comparison structure is that the information is not matched, the verification is not passed, namely, the user logged in the working platform and the user currently using the terminal are possibly not the same person, the server feeds back an opening failure identifier to the terminal, the terminal can display prompt information of 'opening failure' on an opening guide interface according to the opening failure identifier, the terminal is prevented from being abused by other people, and the safety of application opening is improved.
In this embodiment, when a target application in a working platform is triggered, synchronous configuration information of the target application is obtained; detecting the authority of the user corresponding to the terminal to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application, and acquiring verification information input by the user at the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information passes, the back-and-forth interaction between the user and an administrator is not needed, the application opening flow is simplified, the application opening efficiency is effectively improved, meanwhile, the application starting flexibility is improved, the application management is facilitated, in addition, the opening authority is set to meet the differentiated requirements of different staff in an enterprise, and the office efficiency is improved.
Referring to fig. 10, a flowchart of another embodiment of an application opening method in an embodiment of the present invention is shown, where the application opening method is applied to a terminal, and the application opening method includes:
501. and synchronizing application data of each application in the working platform.
As shown in fig. 11, when the terminal needs to synchronize application data, the application synchronization module 61 sends an application data synchronization request to the logic server 66 in the server, and the logic server 66 determines all updated applications and feeds back the application data of these applications to the application synchronization module 61 of the terminal.
502. User identity information of a user corresponding to the synchronous terminal in each application.
As shown in fig. 11, when the terminal needs to synchronize the user identity information, the identity management module 62 sends an identity synchronization request to the logic server 66 in the server, and the logic server 66 feeds back the updated user identity information to the identity management module 62 of the terminal.
503. Synchronizing system configuration information.
As shown in fig. 11, the open authority control module 67 in the server stores keys of each application and corresponding val (typically 0 or 1) in the form of a file, and each key corresponds to an open list.
When the terminal needs to synchronize the system configuration information, the system configuration module 63 sends a system configuration synchronization request containing the user identifier to the logic server 66, and the logic server 66 checks the opening list corresponding to each application key in the opening authority control module 67 and obtains a checking result. Specifically, the logic server 66 detects whether the user identifier is located in an open list corresponding to each application key in the open authority control module 67, if yes, the logic server 66 obtains valA, if not, the logic server 66 obtains valB (original file value), where valA is the open identifier. The logic server 66 sets system configuration information according to the val of each application and feeds back to the system configuration module 63.
504. And responding to the triggering operation of the target application in the working platform, detecting the authority of the user to the target application according to the synchronous information, and displaying a corresponding interface according to the authority.
When a user clicks a target application through a UI module 65 of the terminal and prepares to use the target application, a logic module 64 detects whether the target application registers or not, if not, the target application is prompted to register, and in the embodiment, the application in the default working platform completes the registering flow; if the user has been registered, the permission of the user to the target application is detected according to the synchronization information, the permission is different, and the interface displayed by the UI module 65 is different.
Specifically, as shown in fig. 12, the workflow of the logic module 64 is as follows:
601. when the target application in the working platform is triggered, detecting whether the user identity information corresponding to the target application is preset identification information, if so, executing step 603, and if not, executing step 602.
602. Detecting whether the system configuration information has an opening identifier of the target application, if so, executing step 604, and if not, executing step 605.
603. The control UI module displays a welcome interface of the target application.
604. And controlling the UI module to display an opening guide interface of the target application.
605. And controlling the UI module to display a non-authority interface of the target application. When the logic module 64 detects that the user does not have the use right but has the opening right to the target application, the UI module 65 is controlled to display the link information of the target application, the user clicks the link information to enable the UI module 65 to request the WEB server for the WEB data, the WEB server feeds back the corresponding WEB data, and the UI module 65 displays an opening guide interface according to the WEB data so as to guide the user to open the target application.
In addition, when the user stays on the UI interface, if the user identity information is changed, the UI interface needs to be refreshed in time, so that an observer mode is adopted, the UI controller serves as an observer of the logic layer, and when the user identity information is changed, the logic layer informs the observer, and the UI controller responds to the observer to refresh the interface.
505. And when the opening guide interface is displayed, acquiring verification information input by the user at the opening guide interface.
506. And sending the verification information to the server, so that the server opens the target application for the user after the verification information passes.
According to the embodiment of the invention, the opening authority range of the application is controlled by setting the opening list, and the on-line dynamic configuration and the guide flow adjustment of the opening authority range are supported, so that different enterprise users can conveniently manage the application, the customized effect is achieved, the application opening flow is optimized, and the application opening efficiency is improved.
In order to facilitate better implementation of the application opening method provided by the embodiment of the invention, the embodiment of the invention also provides a device based on the application opening method. The meaning of the nouns is the same as that in the application opening method, and specific implementation details can refer to the description in the method embodiment.
Referring to fig. 13, fig. 13 is a schematic structural diagram of an application opening device according to an embodiment of the present invention, where the application opening device 700 may include:
A first obtaining module 701, configured to obtain synchronous configuration information of a target application in a working platform in response to a trigger operation of the target application;
The detection module 702 is configured to detect, according to the synchronization configuration information, a right of a user to the target application;
A display module 703, configured to display an open guide interface of the target application if it is detected that the user does not have a use right but has an open right for the target application;
A second obtaining module 704, configured to obtain verification information input by the user at the open guide interface; and
And the opening module 705 is configured to send the verification information to a server, so that the server opens the target application for the user after the verification information passes.
In some embodiments of the present invention, the synchronization configuration information includes user identity information and system configuration information corresponding to the target application;
The detection module 702 is specifically configured to:
detecting whether user identity information corresponding to the target application is preset identification information or not;
if not, determining that the user does not have the use right for the target application;
Detecting whether the system configuration information has the opening information of the target application or not;
if yes, determining that the user has the opening authority for the target application.
In some embodiments of the present invention, the apparatus further includes an identity synchronization module, where the identity synchronization module is configured to:
acquiring an identity change message sent by a server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed;
according to the identity change message, an identity synchronization request is sent to the server;
and acquiring the user identity information fed back by the server according to the identity synchronization request.
In some embodiments of the present invention, the apparatus further includes a system configuration synchronization module, where the system configuration synchronization module is configured to:
A system configuration synchronization request is sent to a server, wherein the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add opening information of a target application to the system configuration information when detecting that the user identifier is located in a preset opening list of the target application;
And acquiring the system configuration information fed back by the server.
In some embodiments of the present invention, the user identifier is an identification code of the user or an identification code of an organization in which the user is located.
In some embodiments of the present invention, the activation information includes at least one of an activation identifier and link information of an activation guidance interface.
In some embodiments of the invention, the system configuration synchronization module is further configured to:
Acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list or the link information is changed;
And sending a system configuration synchronization request to the server according to the system configuration change message.
In some embodiments of the present invention, the display module 703 is further configured to:
Acquiring link information corresponding to the target application from the synchronous configuration information;
and displaying an opening guide interface of the target application according to the link information.
In some embodiments of the present invention, the apparatus further includes an application data synchronization module, where the application data synchronization module is configured to:
Sending an application data synchronization request to a server;
acquiring the latest version number of the target application fed back by the server according to the application data synchronization request;
if the terminal does not store the version number of the target application or the stored version number is lower than the latest version number, an application data update request is sent to the server, and the latest version number of the target application is stored;
and acquiring the application data fed back by the server according to the application data updating request.
When a target application in a working platform is triggered, synchronous configuration information of the target application is acquired; detecting the authority of the user corresponding to the terminal to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application, and acquiring verification information input by the user at the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information passes, the back-and-forth interaction between the user and an administrator is not needed, the application opening flow is simplified, and the application opening efficiency is effectively improved.
The embodiment of the invention also provides a terminal, as shown in fig. 14, which shows a schematic structural diagram of the terminal according to the embodiment of the invention, specifically:
The terminal may include one or more processing cores 'processors 801, one or more computer-readable storage media's memory 802, power supply 803, and input unit 804, among other components. It will be appreciated by those skilled in the art that the terminal structure shown in the drawings does not constitute a limitation of the terminal and may include more or less components than those illustrated, or may combine certain components, or may be arranged in different components. Wherein:
The processor 601 is a control center of the terminal, connects respective parts of the entire terminal using various interfaces and lines, and performs various functions of the server and processes data by running or executing software programs and/or modules stored in the memory 602 and calling data stored in the memory 602, thereby performing overall processing of the server. Optionally, the processor 601 may include one or more processing cores; preferably, the processor 601 may integrate an application processor and a modem processor, wherein the application processor primarily processes operating storage media, user interfaces, application programs, etc., and the modem processor primarily processes wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 601.
The memory 802 may be used to store software programs and modules, and the processor 801 executes various functional applications and data processing by executing the software programs and modules stored in the memory 802. The memory 802 may mainly include a storage program area and a storage data area, wherein the storage program area may store a storage medium, an application program (such as a sound playing function, an image playing function, etc.) required for operating at least one function, and the like; the storage data area may store data created according to the use of the terminal, etc. In addition, memory 802 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 802 may also include a memory controller to provide the processor 801 with access to the memory 802.
The terminal further comprises a power supply 803 for powering the various components, preferably the power supply 803 can be logically coupled to the processor 801 via a power management storage medium such that functions such as managing charging, discharging, and power consumption are performed via the power management storage medium. The power supply 803 may also include one or more of any components, such as a direct current or alternating current power supply, a rechargeable storage medium, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The server may further comprise an input unit 804, which input unit 804 may be used for receiving input digital or character information and for generating keyboard, mouse, joystick, optical or trackball signal inputs in connection with user settings and function control.
Although not shown, the terminal may further include a display unit or the like, which is not described herein. In this embodiment, the processor 801 in the terminal loads executable files corresponding to the processes of one or more application programs into the memory 802 according to the following instructions, and the processor 801 executes the application programs stored in the memory 802, so as to implement various functions as follows:
Responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; acquiring verification information input by the user on the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present invention provides a storage medium having stored therein a plurality of instructions capable of being loaded by a processor to perform the steps of any of the application opening methods provided by the embodiments of the present invention. For example, the instructions may perform the steps of:
Responding to the triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application; detecting the authority of a user to the target application according to the synchronous configuration information; if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; acquiring verification information input by the user on the opening guide interface; and sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the storage medium may include: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
The instructions stored in the storage medium can execute the steps in any application opening method provided by the embodiment of the present invention, so that the beneficial effects that any application opening method provided by the embodiment of the present invention can be achieved, and detailed descriptions of the previous embodiments are omitted herein.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the steps in the above-described method embodiments.
The application opening method, device, terminal and storage medium provided by the embodiment of the invention are described in detail, and specific examples are applied to illustrate the principle and implementation of the invention, and the description of the above embodiments is only used for helping to understand the method and core idea of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present invention, the present description should not be construed as limiting the present invention.
Claims (7)
1. An application opening method, which is characterized by being applied to a terminal, the method comprising:
Selecting a required application to set an opening authority strategy on a working platform, wherein the opening authority strategy is to increase the setting of the opening authority on the basis of setting the use authority so as to guide a user with the opening authority to input verification information and realize automatic opening of the application; the working platform is an enterprise office platform, and the enterprise office platform comprises a plurality of applications which are displayed on a display interface of the terminal;
Setting an open list, wherein the open list is set by taking a user as a unit, and the open list is also set by taking an organization as a unit;
Responding to triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application, wherein the synchronous configuration information comprises user identity information corresponding to the target application; various applications in the working platform are displayed on a display interface of the terminal;
detecting the authority of a user to the target application according to the user identity information in the synchronous configuration information;
if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; when the fact that the user has the use authority to the target application is detected, displaying an interface on the terminal so that the user can use the target application; when the fact that the user does not have the use right to the target application and does not have the opening right is detected, displaying an unauthorized interface on the terminal;
Acquiring verification information input by the user on the opening guide interface, wherein the verification information is biological characteristic information of the user;
the verification information is sent to a server, and the server opens the target application for the user after the verification information is verified;
the method further comprises the steps of:
Acquiring an identity change message sent by a server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed; according to the identity change message, an identity synchronization request is sent to the server; acquiring the user identity information fed back by the server according to the identity synchronization request;
Acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list is changed; according to the system configuration change message, a system configuration synchronization request is sent to the server; the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add the opening information of the target application to system configuration information when detecting that the user identifier is positioned in a preset opening list of the target application; and acquiring the system configuration information fed back by the server.
2. The application opening method according to claim 1, wherein the synchronization configuration information further includes system configuration information corresponding to the target application;
And detecting the authority of the user to the target application according to the user identity information in the synchronous configuration information, wherein the detecting comprises the following steps:
detecting whether user identity information corresponding to the target application is preset identification information or not;
if not, determining that the user does not have the use right for the target application;
Detecting whether the system configuration information has the opening information of the target application or not;
if yes, determining that the user has the opening authority for the target application.
3. The application opening method according to claim 1, wherein the displaying the opening guide interface of the target application includes:
Acquiring link information corresponding to the target application from the synchronous configuration information;
and displaying an opening guide interface of the target application according to the link information.
4. The application opening method according to claim 1, characterized in that the method further comprises:
Sending an application data synchronization request to a server;
acquiring the latest version number of the target application fed back by the server according to the application data synchronization request;
if the terminal does not store the version number of the target application or the stored version number is lower than the latest version number, an application data update request is sent to the server, and the latest version number of the target application is stored;
and acquiring the application data fed back by the server according to the application data updating request.
5. An application opening device, characterized by comprising:
The setting module is used for selecting a required application on the working platform to set an opening authority strategy, wherein the opening authority strategy is set by adding the opening authority on the basis of setting the use authority so as to guide a user with the opening authority to input verification information and realize automatic opening of the application; setting an open list, wherein the open list is set by taking a user as a unit, and the open list is also set by taking an organization as a unit; the working platform is an enterprise office platform, and the enterprise office platform comprises a plurality of applications which are displayed on a display interface of the terminal;
The first acquisition module is used for responding to the triggering operation of a target application in the working platform and acquiring synchronous configuration information of the target application, wherein the synchronous configuration information comprises user identity information corresponding to the target application; various applications in the working platform are displayed on a display interface of the terminal;
the detection module is used for detecting the authority of a user to the target application according to the user identity information in the synchronous configuration information;
The display module is used for displaying an opening guide interface of the target application if the user is detected to have no use right but opening right; when the fact that the user has the use authority to the target application is detected, displaying an interface on the terminal so that the user can use the target application; when the fact that the user does not have the use right to the target application and does not have the opening right is detected, displaying an unauthorized interface on the terminal;
the second acquisition module is used for acquiring verification information input by the user on the opening guide interface, wherein the verification information is biological characteristic information of the user; and
The opening module is used for sending the verification information to a server, so that the server opens the target application for the user after the verification information is verified;
The information acquisition module is used for acquiring an identity change message sent by a server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed; according to the identity change message, an identity synchronization request is sent to the server; acquiring the user identity information fed back by the server according to the identity synchronization request; acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list is changed; according to the system configuration change message, a system configuration synchronization request is sent to the server; the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add the opening information of the target application to system configuration information when detecting that the user identifier is positioned in a preset opening list of the target application; and acquiring the system configuration information fed back by the server.
6. A terminal comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
Selecting a required application to set an opening authority strategy on a working platform, wherein the opening authority strategy is to increase the setting of the opening authority on the basis of setting the use authority so as to guide a user with the opening authority to input verification information and realize automatic opening of the application; the working platform is an enterprise office platform, and the enterprise office platform comprises a plurality of applications which are displayed on a display interface of the terminal;
Setting an open list, wherein the open list is set by taking a user as a unit, and the open list is also set by taking an organization as a unit;
Responding to triggering operation of a target application in a working platform, and acquiring synchronous configuration information of the target application, wherein the synchronous configuration information comprises user identity information corresponding to the target application; various applications in the working platform are displayed on a display interface of the terminal;
detecting the authority of a user to the target application according to the user identity information in the synchronous configuration information;
if the fact that the user does not have the use right but has the opening right to the target application is detected, displaying an opening guide interface of the target application; when the fact that the user has the use authority to the target application is detected, displaying an interface on the terminal so that the user can use the target application; when the fact that the user does not have the use right to the target application and does not have the opening right is detected, displaying an unauthorized interface on the terminal;
Acquiring verification information input by the user on the opening guide interface, wherein the verification information is biological characteristic information of the user;
the verification information is sent to a server, and the server opens the target application for the user after the verification information is verified;
the method further comprises the steps of:
Acquiring an identity change message sent by a server through an instant message channel, wherein the identity change message is a push message sent by the server when the user identity corresponding to the target application is changed; according to the identity change message, an identity synchronization request is sent to the server; acquiring the user identity information fed back by the server according to the identity synchronization request;
Acquiring a system configuration change message sent by the server through a data flow channel or an instant message channel, wherein the system configuration change message is a push message sent by the server when the opening list is changed; according to the system configuration change message, a system configuration synchronization request is sent to the server; the system configuration synchronization request comprises a user identifier, and the system configuration synchronization request is used for indicating the server to add the opening information of the target application to system configuration information when detecting that the user identifier is positioned in a preset opening list of the target application; and acquiring the system configuration information fed back by the server.
7. A storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps of the application opening method of any one of claims 1 to 4.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011040776.8A CN114338059B (en) | 2020-09-28 | 2020-09-28 | Application opening method, device, terminal and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011040776.8A CN114338059B (en) | 2020-09-28 | 2020-09-28 | Application opening method, device, terminal and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114338059A CN114338059A (en) | 2022-04-12 |
| CN114338059B true CN114338059B (en) | 2024-06-14 |
Family
ID=81010652
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011040776.8A Active CN114338059B (en) | 2020-09-28 | 2020-09-28 | Application opening method, device, terminal and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114338059B (en) |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109347866A (en) * | 2018-11-26 | 2019-02-15 | 珠海格力电器股份有限公司 | Login method, device, system and computer readable storage medium |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2003229961A (en) * | 2002-02-04 | 2003-08-15 | Ntt Docomo Inc | Online sign-up method, online sign-up system |
| WO2013061150A1 (en) * | 2011-10-28 | 2013-05-02 | Avatar Software Private Limited | Method and system to authenticate user identity |
| KR101799343B1 (en) * | 2016-05-16 | 2017-11-22 | 주식회사 코인플러그 | Method for using, revoking certificate information and blockchain-based server using the same |
| CN107196915B (en) * | 2017-04-25 | 2020-02-14 | 北京潘达互娱科技有限公司 | Permission setting method, device and system |
| CN109086143B (en) * | 2017-06-14 | 2022-02-08 | 北京小米移动软件有限公司 | Application interaction method and device |
| CN109670297B (en) * | 2018-12-14 | 2021-05-07 | 泰康保险集团股份有限公司 | Method and device for opening service permission, storage medium and electronic equipment |
-
2020
- 2020-09-28 CN CN202011040776.8A patent/CN114338059B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109347866A (en) * | 2018-11-26 | 2019-02-15 | 珠海格力电器股份有限公司 | Login method, device, system and computer readable storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114338059A (en) | 2022-04-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11218372B2 (en) | Methods, apparatuses, and computer program products for facilitating synchronization of setting configurations | |
| US11050690B2 (en) | Method for providing recording and verification service for data received and transmitted by messenger service, and server using method | |
| KR102480096B1 (en) | Methods and systems for processing an ephemeral content message | |
| EP3782035B1 (en) | Systems, methods and media for a distributed social media network and system of record | |
| JP7538949B2 (en) | Inter-application data exchange via a group-based communication system that triggers user intervention | |
| US9882725B2 (en) | Policy-based signature authentication system and method | |
| CN118104218A (en) | Integrated workspace on a communications platform | |
| CN115668185B (en) | Method and apparatus for managing external approval provisioning and external messaging communication requests in a group-based communication system | |
| JP2022529967A (en) | Extracting data from the blockchain network | |
| US20180191685A1 (en) | Recurring transfer notifications and secure transfers | |
| US12354064B2 (en) | Method and apparatus for sharing data across groups | |
| CN113568970B (en) | Application business data management method, device, equipment and storage medium | |
| CN111291394B (en) | False information management method, false information management device and storage medium | |
| CN114638020A (en) | Block chain-based digital asset processing method and device and electronic equipment | |
| CN115767523A (en) | Method and apparatus for multi-agent messaging | |
| CN115001777A (en) | Cross-service portal system management method | |
| CN115204870A (en) | Block chain application management method and device, computer equipment and storage medium | |
| CN109040331B (en) | Electronic business card processing method and device, computing equipment and storage medium | |
| CN114338059B (en) | Application opening method, device, terminal and storage medium | |
| CN112995014B (en) | Method and device for mass sending of messages | |
| JP2016040658A (en) | Inventory support device, inventory support method and program | |
| CN113343216B (en) | Issuer management method, issuer management device, storage medium and server | |
| CN116862679B (en) | Block chain-based data processing method, device, equipment and readable storage medium | |
| US10880249B1 (en) | Systems and methods for a filter and message delivery platform | |
| HK40075342A (en) | Method and apparatus for managing blockchain application, computer device, and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |