CN110909386A - Unified authorization access method and system for multiple data sources - Google Patents

Unified authorization access method and system for multiple data sources Download PDF

Info

Publication number
CN110909386A
CN110909386A CN201911144833.4A CN201911144833A CN110909386A CN 110909386 A CN110909386 A CN 110909386A CN 201911144833 A CN201911144833 A CN 201911144833A CN 110909386 A CN110909386 A CN 110909386A
Authority
CN
China
Prior art keywords
user
query
result set
data sources
metadata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911144833.4A
Other languages
Chinese (zh)
Inventor
张定信
肖俊鑫
刘仕强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Linewell Software Co Ltd
Linewell Software Co Ltd
Original Assignee
Fujian Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Linewell Software Co Ltd filed Critical Fujian Linewell Software Co Ltd
Priority to CN201911144833.4A priority Critical patent/CN110909386A/en
Publication of CN110909386A publication Critical patent/CN110909386A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a unified authorization access method and a system for multiple data sources, which are used for collecting metadata information of the multiple data sources; when a user initiates an inquiry request, the authority of the user is verified, after the verification is passed, an inquiry statement is executed, a result set is summarized, desensitization is carried out on the result set according to a configured desensitization rule, and the desensitized inquiry result set is returned. The invention can support the unified authorization access control of various data sources.

Description

Unified authorization access method and system for multiple data sources
Technical Field
The invention relates to the technical field of big data security, in particular to a unified authorization access method and a system for multiple data sources.
Background
Some schemes for authorizing access to a data source already exist in the prior art schemes, but most of the technical schemes are for authorizing access to a single data source and cannot support uniform authorized access of multiple data sources.
Patent application publication No. CN 109525570A discloses a group-client-oriented data hierarchical security access control method, which comprises a distributed application program transceiving module, a data encryption and decryption processing module, a key negotiation module, a data concurrent processing module, a hierarchical access control module, a database connection module and a MySQL database module. The distributed application program transceiver module is responsible for monitoring cross-platform application program service requests; the data encryption and decryption processing module is responsible for data encryption and decryption and ensures the reliability of a data source; the key negotiation module is responsible for generating a session key; the data concurrent processing module is responsible for analyzing the service request data; the layered access control module is responsible for judging whether the user has the authority of accessing the layered data; the database connection module is responsible for establishing a database connection pool and improving the data reading and writing efficiency of the system; and the MySQL database module is responsible for modularly storing group client data. The method can provide a layered and extensible data access control method for group customers with different enterprise scales. The technical scheme also performs authorization access control on the data source, but the scheme cannot support uniform authorization access of various data sources, only performs authorization access control based on mysql, and even cannot support user concurrent query quantity control.
The application of patent application publication number CN 103870548A discloses an access control method for a spatial database, in which authorization of the spatial database is realized by adding access rules to an R + tree, the R + tree added with the access rules is searched according to an access request, after a spatial entity is obtained from the spatial database according to a search result, each pair of spatial entities is further cut according to the access request and the corresponding access rules, and the cut spatial entity is returned to a user. The access control method not only supports the authorization of the space entity, but also supports the authorization after the entity is split in a fine-grained manner, the access control rule can only cover a part of the space entity, and simultaneously combines the two queries of access rule judgment and space retrieval into one query, determines the result of user query in one query and returns corresponding information, thereby improving the authorization query efficiency and ensuring the response speed when accessing the space vector data with the authority limit. The technical scheme also performs authorized access control on the database, but the scheme cannot support uniform authorized access of various data sources, can only perform authorized access control on the spatial database based on an R + tree mode, and cannot support user concurrent query quantity control.
Disclosure of Invention
In view of this, the present invention provides a method and a system for unified authorization access for multiple data sources, which can support unified authorization access control for multiple data sources.
The invention is realized by adopting the following scheme: a method of uniform authorized access to multiple data sources, comprising the steps of:
collecting metadata information of various data sources;
when a user initiates an inquiry request, the authority of the user is verified, after the verification is passed, an inquiry statement is executed, a result set is summarized, desensitization is carried out on the result set according to a configured desensitization rule, and the desensitized inquiry result set is returned.
Furthermore, the number of concurrent queries of the user is configured, and the number of concurrent queries of the same user is limited.
Further, the collecting metadata information of the multiple data sources specifically includes: collecting metadata information of a registered data source at fixed time, judging whether a collecting plug-in of the current data source exists in the system or not, if so, collecting the metadata of the data source, if not, compiling the metadata collecting plug-in corresponding to the data source, loading the metadata collecting plug-in of the data source, and finishing the metadata information collection of the data source; and after the metadata is collected, the collected metadata information is displayed on a metadata authorization configuration page.
Further, when a user initiates a query request, the authority verification is performed on the user, after the verification is passed, a query statement is executed and a result set is collected, finally desensitization is performed on the result set according to a configured desensitization rule, and the query result set after desensitization is returned specifically includes the following steps:
step S1: after initiating a query request, the user carries out identity personal identification on the user;
step S2: judging whether the current query number of the user exceeds a preset query concurrency number of the same user, if so, enabling the current request of the user to be in a waiting state, otherwise, entering a step S3;
step S3: analyzing the query sentence sent by the user by grammar to obtain a grammar tree, and judging whether the user has the access authority of a corresponding table, if so, entering a step S4, otherwise, rejecting the request of the user;
step S4: judging whether the user has the access authority of the corresponding table field, if so, entering a step S5, otherwise, rejecting the request of the user;
step S5: and executing the query statement and summarizing the result set, desensitizing the result set according to the desensitization rule configured currently, and returning the desensitized query result set to the user.
Further, step S2 is specifically: and submitting query sentences sent by a user to a query queue matched with the user in real time, wherein the queue has the limit of preset sentence capacity, when the capacity in the queue reaches the upper limit, the submitted sentences enter a waiting stage, and when the queue is idle, the originally waiting sentences are re-executed so as to limit the number of query concurrency of the same user.
Further, the data sources include, but are not limited to mysql, oracle, NOSQL, mongodb, cassandra, kafka.
The present invention also provides a system for unified authorized access to multiple data sources comprising a memory, a processor and a computer program stored on said memory and capable of being executed by said processor, which computer program when executed by the processor implements the method steps as described above at tez.
The invention also provides a computer-readable storage medium having stored thereon a computer program capable of being executed by a processor, the computer program when executed by the processor implementing the method steps as described above.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention supports the unified authorization access control of various data sources by acquiring the metadata information of various data sources and detecting whether a user has the query authority of a corresponding table and a field when receiving a query request.
2. The invention realizes the control of the number of the parallel queries of the users by configuring the number of the concurrent queries of the users and limiting the number of the concurrent queries of the same user.
3. The invention can also support desensitization of sensitive data, and by configuring the data desensitization rules of the metadata, after the query results are summarized, the data desensitization rules of the corresponding metadata are acted on the corresponding data of the corresponding result set, and the final query result set is returned, thereby completing the access authority control.
Drawings
FIG. 1 is a schematic diagram of the general method principle of an embodiment of the present invention.
Fig. 2 is a schematic diagram of a metadata collection process according to an embodiment of the present invention.
Fig. 3 is a flowchart of the right control according to the embodiment of the present invention.
FIG. 4 is a timing diagram of the privilege control according to the embodiment of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As shown in fig. 1, the present embodiment provides a unified authorization access method for multiple data sources, including the following steps:
collecting metadata information of various data sources;
when a user initiates an inquiry request, the authority of the user is verified, after the verification is passed, an inquiry statement is executed, a result set is summarized, desensitization is carried out on the result set according to a configured desensitization rule, and the desensitized inquiry result set is returned.
In this embodiment, the number of concurrent queries of a user is configured, and the number of concurrent queries of the same user is limited.
As shown in fig. 2, in this embodiment, the collecting metadata information of multiple data sources specifically includes: collecting metadata information of a registered data source at fixed time, judging whether a collecting plug-in of the current data source exists in the system or not, if so, collecting the metadata of the data source, if not, compiling the metadata collecting plug-in corresponding to the data source, loading the metadata collecting plug-in of the data source, and finishing the metadata information collection of the data source; and after the metadata is collected, the collected metadata information is displayed on a metadata authorization configuration page.
In this embodiment, when a user initiates a query request, the method for performing authority verification on the user, executing a query statement after the verification is passed, summarizing a result set, desensitizing the result set according to a configured desensitization rule, and returning the desensitized query result set specifically includes the following steps:
step S1: after initiating a query request, the user carries out identity personal identification on the user;
step S2: judging whether the current query number of the user exceeds a preset query concurrency number of the same user, if so, enabling the current request of the user to be in a waiting state, otherwise, entering a step S3;
step S3: analyzing the query sentence sent by the user by grammar to obtain a grammar tree, and judging whether the user has the access authority of a corresponding table, if so, entering a step S4, otherwise, rejecting the request of the user;
step S4: judging whether the user has the access authority of the corresponding table field, if so, entering a step S5, otherwise, rejecting the request of the user;
step S5: and executing the query statement and summarizing the result set, desensitizing the result set according to the desensitization rule configured currently, and returning the desensitized query result set to the user.
In this embodiment, step S2 specifically includes: and submitting query sentences sent by a user to a query queue matched with the user in real time, wherein the queue has the limit of preset sentence capacity, when the capacity in the queue reaches the upper limit, the submitted sentences enter a waiting stage, and when the queue is idle, the originally waiting sentences are re-executed so as to limit the number of query concurrency of the same user.
In this embodiment, the data sources include, but are not limited to, mysql, oracle, NOSQL, mongodb, cassandra, kafka.
The present embodiment also provides a system for unified authorized access to multiple data sources, comprising a memory, a processor and a computer program stored on said memory and capable of being executed by said processor, which computer program, when executed by the processor, implements the method steps as described above.
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program capable of being executed by a processor, the computer program when executed by the processor implementing the method steps as described above.
Preferably, as shown in fig. 3 and 4, in this embodiment, a user can select a corresponding user through a provided user page to set a query concurrency authority, a query statement sent by the user is submitted to a query queue matched with the user, the queue has a limit on statement capacity, when the capacity in the queue reaches an upper limit, the later submitted statement enters a waiting stage, and when the queue is idle, the originally waiting statement is re-executed, so that the query concurrency number of the same user is limited, and the concurrent query efficiency of different users is improved.
Meanwhile, the embodiment can set the metadata table access authority of the corresponding role of the user through the provided authorization configuration page, the query statement sent by the user is parsed to obtain the syntax tree, and the syntax tree is combined with the metadata table access authority of the authorization configuration to perform access control on the query table authority.
Meanwhile, the embodiment can set the access authority of the metadata table field of the corresponding role of the user by providing the authorization configuration page, the query statement sent by the user is parsed to obtain the syntax tree, and the syntax tree is combined with the access authority of the metadata table field of the authorization configuration to perform access control on the query table field authority.
Meanwhile, the embodiment can add table field desensitization rules through a set table detail page, and the data desensitization rules are configured according to corresponding table fields; when the query statement obtains the result set, a desensitization result set is generated according to the desensitization rule of the corresponding field, and the query result is returned, so that the sensitive data can be protected.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is directed to preferred embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow. However, any simple modification, equivalent change and modification of the above embodiments according to the technical essence of the present invention are within the protection scope of the technical solution of the present invention.

Claims (8)

1. A method for unified authorized access to multiple data sources, comprising the steps of:
collecting metadata information of various data sources;
when a user initiates an inquiry request, the authority of the user is verified, after the verification is passed, an inquiry statement is executed, a result set is summarized, desensitization is carried out on the result set according to a configured desensitization rule, and the desensitized inquiry result set is returned.
2. The method for unified authorized access to multiple data sources according to claim 1, further comprising the steps of: and configuring the concurrent query number of the users and limiting the query concurrent number of the same user.
3. The method according to claim 1, wherein the collecting metadata information of the multiple data sources specifically includes: collecting metadata information of a registered data source at fixed time, judging whether a collecting plug-in of the current data source exists in the system or not, if so, collecting the metadata of the data source, if not, compiling the metadata collecting plug-in corresponding to the data source, loading the metadata collecting plug-in of the data source, and finishing the metadata information collection of the data source; and after the metadata is collected, the collected metadata information is displayed on a metadata authorization configuration page.
4. The unified authorization access method for multiple data sources according to claim 2, wherein when a user initiates a query request, the user is subjected to authority verification, after the verification is passed, the query statement is executed and the result set is summarized, finally, desensitization is performed on the result set according to a configured desensitization rule, and returning the desensitized query result set specifically comprises the following steps:
step S1: after initiating a query request, the user carries out identity personal identification on the user;
step S2: judging whether the current query number of the user exceeds a preset query concurrency number of the same user, if so, enabling the current request of the user to be in a waiting state, otherwise, entering a step S3;
step S3: analyzing the query sentence sent by the user by grammar to obtain a grammar tree, and judging whether the user has the access authority of a corresponding table, if so, entering a step S4, otherwise, rejecting the request of the user;
step S4: judging whether the user has the access authority of the corresponding table field, if so, entering a step S5, otherwise, rejecting the request of the user;
step S5: and executing the query statement and summarizing the result set, desensitizing the result set according to the desensitization rule configured currently, and returning the desensitized query result set to the user.
5. The method according to claim 4, wherein the step S2 is specifically as follows: and submitting query sentences sent by a user to a query queue matched with the user in real time, wherein the queue has the limit of preset sentence capacity, when the capacity in the queue reaches the upper limit, the submitted sentences enter a waiting stage, and when the queue is idle, the originally waiting sentences are re-executed so as to limit the number of query concurrency of the same user.
6. The method of claim 1, wherein the data sources include, but are not limited to mysql, oracle, NOSQL, mongodb, cassandra, kafka.
7. A unified authorized access system for multiple data sources, comprising a memory, a processor and a computer program stored on said memory and executable by said processor, which computer program, when executed by the processor, implements the method steps according to any of claims 1-6.
8. A computer-readable storage medium, on which a computer program is stored which can be executed by a processor, which computer program, when being executed by the processor, carries out the method steps of any of claims 1 to 6.
CN201911144833.4A 2019-11-21 2019-11-21 Unified authorization access method and system for multiple data sources Pending CN110909386A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911144833.4A CN110909386A (en) 2019-11-21 2019-11-21 Unified authorization access method and system for multiple data sources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911144833.4A CN110909386A (en) 2019-11-21 2019-11-21 Unified authorization access method and system for multiple data sources

Publications (1)

Publication Number Publication Date
CN110909386A true CN110909386A (en) 2020-03-24

Family

ID=69816813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911144833.4A Pending CN110909386A (en) 2019-11-21 2019-11-21 Unified authorization access method and system for multiple data sources

Country Status (1)

Country Link
CN (1) CN110909386A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307129A (en) * 2020-12-31 2021-02-02 成都四方伟业软件股份有限公司 Control system constructed based on data sharing and control method thereof
CN113157902A (en) * 2020-12-24 2021-07-23 中国能源建设股份有限公司 Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means
CN113239387A (en) * 2021-06-18 2021-08-10 中国银行股份有限公司 Data acquisition method and system
CN113434901A (en) * 2021-06-30 2021-09-24 平安普惠企业管理有限公司 Intelligent data query method and device, electronic equipment and storage medium
CN114706857A (en) * 2022-04-22 2022-07-05 北京友友天宇系统技术有限公司 Unified authentication/authorization method, equipment and storage medium for cross-multi-source heterogeneous storage system
CN116662373A (en) * 2023-07-27 2023-08-29 天津神舟通用数据技术有限公司 Data access control method, device, equipment and medium
CN113239387B (en) * 2021-06-18 2024-05-24 中国银行股份有限公司 Data acquisition method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2372575A1 (en) * 2010-03-26 2011-10-05 British Telecommunications public limited company Information retrieval with security rules
CN106599713A (en) * 2016-11-11 2017-04-26 中国电子科技网络信息安全有限公司 Database masking system and method based on big data
CN107491510A (en) * 2017-08-03 2017-12-19 国网江苏省电力公司信息通信分公司 One kind mixing heterogeneous data source unified query system and distributed enquiring method
CN109815283A (en) * 2018-12-18 2019-05-28 中科曙光南京研究院有限公司 A kind of heterogeneous data source visual inquiry method
CN110032575A (en) * 2019-04-15 2019-07-19 网易(杭州)网络有限公司 Data query method, apparatus, equipment and storage medium
CN110197083A (en) * 2019-06-05 2019-09-03 深圳市优网科技有限公司 Sensitive data desensitization system and processing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2372575A1 (en) * 2010-03-26 2011-10-05 British Telecommunications public limited company Information retrieval with security rules
CN106599713A (en) * 2016-11-11 2017-04-26 中国电子科技网络信息安全有限公司 Database masking system and method based on big data
CN107491510A (en) * 2017-08-03 2017-12-19 国网江苏省电力公司信息通信分公司 One kind mixing heterogeneous data source unified query system and distributed enquiring method
CN109815283A (en) * 2018-12-18 2019-05-28 中科曙光南京研究院有限公司 A kind of heterogeneous data source visual inquiry method
CN110032575A (en) * 2019-04-15 2019-07-19 网易(杭州)网络有限公司 Data query method, apparatus, equipment and storage medium
CN110197083A (en) * 2019-06-05 2019-09-03 深圳市优网科技有限公司 Sensitive data desensitization system and processing method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113157902A (en) * 2020-12-24 2021-07-23 中国能源建设股份有限公司 Inquiry mode for completing information desensitization examination and approval by utilizing multiple information means
CN112307129A (en) * 2020-12-31 2021-02-02 成都四方伟业软件股份有限公司 Control system constructed based on data sharing and control method thereof
CN113239387A (en) * 2021-06-18 2021-08-10 中国银行股份有限公司 Data acquisition method and system
CN113239387B (en) * 2021-06-18 2024-05-24 中国银行股份有限公司 Data acquisition method and system
CN113434901A (en) * 2021-06-30 2021-09-24 平安普惠企业管理有限公司 Intelligent data query method and device, electronic equipment and storage medium
CN114706857A (en) * 2022-04-22 2022-07-05 北京友友天宇系统技术有限公司 Unified authentication/authorization method, equipment and storage medium for cross-multi-source heterogeneous storage system
CN116662373A (en) * 2023-07-27 2023-08-29 天津神舟通用数据技术有限公司 Data access control method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN110909386A (en) Unified authorization access method and system for multiple data sources
Sun et al. SigPID: significant permission identification for android malware detection
EP3275115B1 (en) Database server and client for query processing on encrypted data
US7661141B2 (en) Systems and methods that optimize row level database security
US20170053135A1 (en) Columnar Table Data Protection
US20080104070A1 (en) Pattern-based filtering of query input
WO2014140941A1 (en) Secure matching supporting fuzzy data
US10528556B1 (en) Database methodology for searching encrypted data records
US20120284529A1 (en) System and method for management of encrypted data
WO2005019974A3 (en) Secure protection method for access to protected resources in a processor
KR20140048879A (en) Secure data storage
CN109471697A (en) The method, apparatus and storage medium that system is called in a kind of monitoring virtual machine
CN101140573B (en) Method and system for realizing information searching
WO2017087694A1 (en) Dynamic attributes for searching
CN110895537A (en) Method and device for freely inquiring authority control
US10049113B2 (en) File scanning method and apparatus
US10331894B2 (en) Static program analysis in an object-relational mapping framework
WO2014063595A1 (en) Incorporating related searches by other users in a social network in a search request
CN111090616A (en) File management method, corresponding device, equipment and storage medium
Ansong et al. A comparative study of user data security and privacy in native and cross platform Android mobile banking applications
US9922080B2 (en) Query plan determination
CN101814080A (en) Method and device for realizing information search
CN115827589A (en) Authority verification method and device, electronic equipment and storage medium
CN113282628A (en) Big data platform access method and device, big data platform and electronic equipment
Stephens et al. ODM BLAST: Sequence Homology Search in the RDBMS.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200324

RJ01 Rejection of invention patent application after publication