主权项 |
1. A method of managing an electronic document suitable for implementation by a server in a telecommunications network, the method comprising:
defining a plurality of public identifiers and respective associated secret identifiers for said document, each public identifier and associated secret identifier being associated with at least one defined field of said document, each secret identifier being an internal identifier for the associated at least one defined field of said document, said public identifiers and said associated secret identifiers not being stored in said document, and said secret identifiers being unavailable for public access; receiving a request from a client device, said request including at least a user identifier and an electronic document identifier that references said document; obtaining at least a portion of said secret identifiers for said document based on said electronic document identifier; obtaining, for each field identified by a secret identifier in the portion of said secret identifiers, at least one selected public identifier associated with the field identified by the secret identifier in accordance with a predetermined field access definition associated with the field, wherein a predetermined field access definition associated with a field comprises a first access level indicating whether the user is authorized to access data stored in a content of the field, and a second access level indicating whether the user is authorized to access a list of sub-fields stored in the content of the field; determining for each field associated with each one of said selected public identifiers whether first access level criteria to access the data is met that is established in accordance with said user identifier; retrieving the data of each said field that meets said first access level criteria, such that the data of each field of said document is independently accessed based on said secret identifier associated with a respective field; determining for each field associated with each one of said selected public identifiers whether second access level criteria to access the list of sub-fields is met; retrieving the list of sub-fields of each said field that meets said second access level criteria, such that the list of sub-fields of each field of said document is independently accessed based on said secret identifier associated with a respective field, wherein obtaining the at least a portion of said secret identifiers includes obtaining secret identifiers of sub-fields in the list of sub-fields retrieved; and sending said retrieved data to said client device. |