CN113625968B - File authority management method and device, computer equipment and storage medium - Google Patents

File authority management method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113625968B
CN113625968B CN202110925373.XA CN202110925373A CN113625968B CN 113625968 B CN113625968 B CN 113625968B CN 202110925373 A CN202110925373 A CN 202110925373A CN 113625968 B CN113625968 B CN 113625968B
Authority
CN
China
Prior art keywords
file
target
authority
rights
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110925373.XA
Other languages
Chinese (zh)
Other versions
CN113625968A (en
Inventor
刘京洋
孟磊
邹永斌
姚奕涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN202110925373.XA priority Critical patent/CN113625968B/en
Publication of CN113625968A publication Critical patent/CN113625968A/en
Application granted granted Critical
Publication of CN113625968B publication Critical patent/CN113625968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/77Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a method, a device, computer equipment and a storage medium for managing file authority. Then, when the simulator is operated, the authority files can be mapped into the memory space, and when the authority information of the target file is determined, the read-write operation steps for determining the authority information of the target file can be reduced, so that the time for inquiring the authority information of the target file is shortened, and the efficiency for determining the authority information of the target file is improved.

Description

File authority management method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and apparatus for managing file rights, a computer device, and a storage medium.
Background
With the continuous development of computer communication technology, a great deal of popularization and application of terminals such as smart phones, computers, tablet computers and notebook computers are developed towards diversification and individuation, and the terminals are increasingly becoming indispensable terminals in life and work of people. In order to meet the pursuit of people for mental and living, online games are generated, users can open different online games to play with other people at any time through computer equipment such as a computer or a mobile phone, and the users can also rapidly run online games through a simulator on the computer equipment.
A simulator is a program that simulates the functionality of a hardware processor and an instruction system via software, and by running the simulator in a computer device, a computer or other multimedia platform can be made to run software that needs to be executed on a given platform. When simulating Linux or other operating systems on a Windows operating system, the Linux system may be simulated as a Windows program executing on the Windows operating system. In the prior art, because the permission checking modes of the Windows operating system and the Linux system are different, when the permission information of the target file is determined in the simulator, the permission information of the target file needs to be determined by multiple read-write operations, so that the steps of determining the permission information of the target file are complex, and the efficiency of file access is low.
Disclosure of Invention
The embodiment of the application provides a file authority management method, a device, computer equipment and a storage medium, which can store all files corresponding to a simulator in one authority file, map the authority file into a memory space when the simulator is started, and reduce the read-write operation steps of determining the authority information of a target file, thereby shortening the time of inquiring the authority information of the target file and improving the efficiency of determining the authority information of the target file.
The embodiment of the application provides a method for managing file rights, which comprises the following steps:
acquiring a first process corresponding to a first application program in a simulator, and requesting a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, and the simulator is used for simulating a second operating system in a first operating system;
acquiring a target file identifier based on the target file path;
determining target authority information of the target file from a memory space according to the target file identifier, wherein the target authority information is used for indicating the application program with the access authority of the target file;
determining whether access to the target file by the first application program is allowed based on the target authority information;
and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
Optionally, the determining, according to the target file identifier, target authority information of the target file from a memory space includes:
and determining target authority information from a file authority list according to the target file identifier, wherein the file authority list is positioned in a memory space provided by a first operating system, and the file authority list consists of authority information of all files in the simulator.
Optionally, before acquiring the file access request of the first process corresponding to the first application program and the second process corresponding to the second application program in the simulator, the method further includes:
when the simulator is detected to be operated for the first time, creating a permission file in a disk of the computer equipment, wherein permission information of all files corresponding to the simulator is stored in the permission file;
mapping the authority file into a memory space provided by the first operating system;
generating a file authority list and a plurality of file identifications based on authority information corresponding to all files in the authority files, file paths corresponding to all files and a hash algorithm, wherein the file identifications are associated with the authority information corresponding to the file authority list.
Optionally, the generating the file permission list and the plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files and a hash algorithm includes:
acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
Generating a file identifier based on the file path of the file to be processed and the hash algorithm;
and storing the authority information corresponding to the file to be processed into a preset file list according to the file identifier so as to generate a file authority list.
Optionally, the storing, according to the file identifier, rights information corresponding to the file to be processed in a preset file list to generate a file rights list includes:
and determining a target storage position in the preset file list based on the file identifier, and storing the authority information corresponding to the file to be processed to the target storage position to generate a file authority list.
Optionally, after generating the file permission list and the plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files and a hash algorithm, the method further includes:
when detecting that a target process is in an operating state and the target process creates a new file, storing the authority information of the new file into the file authority list to obtain an updated file authority list, wherein the target process is a first process and/or a second process;
And updating the rights file based on the updated file rights list to obtain an updated rights file.
Optionally, after generating the file permission list and the plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files and a hash algorithm, the method further includes:
modifying the first authority information of a file to be modified in a target process to obtain second authority information of the file to be modified, wherein the target process is a first process and/or a second process;
updating the file authority list based on the second authority information of the file to be modified to obtain an updated file authority list;
and updating the rights file based on the updated file rights list to obtain an updated rights file.
Optionally, when the first running of the simulator is detected, creating a permission file in a disk of the computer device, including:
when the simulator is detected to be operated for the first time, creating a blank file with a preset size in a disk of computer equipment;
and storing the authority information of all files of the simulator in the blank file to obtain an authority file.
Optionally, the target file path is an access path of the target file in a disk of the computer device;
the obtaining the target file identifier based on the target file path includes:
calculating the target file path by adopting a hash algorithm to obtain a target file identifier;
and determining target authority information corresponding to the target file identifier based on a preset corresponding relation between the file identifier and the authority information in the memory space.
Correspondingly, the embodiment of the application also provides a device for managing the file authority, which comprises:
the first acquisition unit is used for acquiring a first process corresponding to a first application program in the simulator and a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, and the simulator is used for simulating a second operating system in a first operating system;
the second acquisition unit is used for acquiring the target file identification based on the target file path;
the first determining unit is used for determining target authority information of the target file from the memory space according to the target file identifier, wherein the target authority information is used for indicating the application program with the access authority of the target file;
A second determining unit configured to determine whether access to the target file by the first application program is allowed based on the target authority information;
and the first processing unit is used for configuring the access authority of the target file for the first process if the first process is allowed, so that the first process accesses the target file.
In some embodiments, the apparatus further comprises:
and the third determining unit is used for determining target authority information from a file authority list according to the target file identifier, wherein the file authority list is positioned in a memory space provided by the first operating system, and the file authority list consists of authority information of all files in the simulator.
In some embodiments, the apparatus further comprises:
the first creating unit is used for creating a permission file in a disk of the computer equipment when the simulator is detected to be operated for the first time, wherein the permission file stores permission information of all files corresponding to the simulator;
the mapping unit is used for mapping the authority file into a memory space provided by the first operating system;
the first generation unit is used for generating a file authority list and a plurality of file identifications based on authority information corresponding to all files in the authority files, file paths corresponding to all files and a hash algorithm, wherein the file identifications are associated with the corresponding authority information in the file authority list.
In some embodiments, the apparatus further comprises:
the third acquisition unit is used for acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
the second generation unit is used for generating a file identifier based on the file path of the file to be processed and the hash algorithm;
and the first storage unit is used for storing the authority information corresponding to the file to be processed into a preset file list according to the file identifier so as to generate a file authority list.
In some embodiments, the apparatus further comprises:
and a fourth determining unit, configured to determine a target storage location in the preset file list based on the file identifier, and store rights information corresponding to the file to be processed to the target storage location, so as to generate a file rights list.
In some embodiments, the apparatus further comprises:
the second storage unit is used for storing the authority information of the newly added file into the file authority list when the target process is detected to be in an operating state and the newly added file is created by the target process, so as to obtain an updated file authority list, wherein the target process is a first process and/or a second process;
And the second processing unit is used for updating the authority file based on the updated file authority list so as to obtain an updated authority file.
In some embodiments, the apparatus further comprises:
the modification unit is used for modifying the first authority information of the file to be modified in the target process to obtain the second authority information of the file to be modified, wherein the target process is a first process and/or a second process;
the third processing unit is used for updating the file authority list based on the second authority information of the file to be modified so as to obtain an updated file authority list;
and a fourth processing unit, configured to update the rights file based on the updated file rights list, so as to obtain an updated rights file.
In some embodiments, the apparatus further comprises:
the second creation unit is used for creating a blank file with a preset size in a magnetic disk of the computer equipment when the simulator is detected to be operated for the first time;
and the third storage unit is used for storing the authority information of all files of the simulator in the blank file so as to obtain an authority file.
In some embodiments, the apparatus further comprises:
The calculation unit is used for calculating the target file path by adopting a hash algorithm so as to obtain a target file identifier;
and a fifth determining unit, configured to determine target authority information corresponding to the target file identifier based on a preset correspondence between the file identifier and the authority information in the memory space.
Accordingly, the embodiments of the present application further provide a computer device, including a processor, a memory, and a computer program stored on the memory and capable of running on the processor, where the computer program when executed by the processor implements the steps of any one of the file rights management methods described above.
Furthermore, embodiments of the present application also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of any one of the methods for managing file rights as described above.
The embodiment of the application provides a file authority management method, a device, computer equipment and a storage medium. Then, when the simulator is operated, the authority files can be mapped into the memory space, and when the authority information of the target file is determined, the read-write operation steps for determining the authority information of the target file can be reduced, so that the time for inquiring the authority information of the target file is shortened, and the efficiency for determining the authority information of the target file is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a method for managing file rights according to an embodiment of the present application.
FIG. 2 is a flowchart illustrating another method for managing file rights according to an embodiment of the present application
Fig. 3 is a schematic structural diagram of a management device for file rights provided in an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The embodiment of the application provides a method, a device, a computer device and a storage medium for managing file rights, and in particular, the method for managing file rights in the embodiment of the application can be executed by the computer device, where the computer device can be a terminal or a server. The terminal can be a terminal device such as a smart phone, a tablet computer, a notebook computer, a touch screen, a game machine, a personal computer (PC, personal Computer), a personal digital assistant (Personal Digital Assistant, PDA) and the like.
The embodiment of the application provides a method, a device, an electronic device and a storage medium for managing file rights, and the method, the device, the electronic device and the storage medium are described in detail below. The following description of the embodiments is not intended to limit the preferred embodiments.
The embodiment of the application provides a method for managing file rights, which can be executed by computer equipment.
Referring to fig. 1, fig. 1 is a flow chart of a method for managing file rights according to an embodiment of the present application, and the specific flow may be as follows steps 101 to 105:
101, acquiring a first process corresponding to a first application program in a simulator, and requesting a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, and the simulator is used for simulating a second operating system in a first operating system.
The simulator is a software program compiled on a computer platform and capable of simulating and executing a specific hardware platform and a program thereof. The simulator has a corresponding simulation system, for example, if the simulator is an android simulator, the simulator corresponds to the android simulation system, so that the simulator can run on a computer and simulate an android mobile phone system, and can install, use and uninstall software of an android application, so that a user can experience an android game and an application on the computer. Here, the devices configuring the simulator may be a computer, a cellular phone, a tablet computer, a game device, and the like. For example, the simulator in the embodiment of the present application is a star cloud engine, which is also called Nebula, and refers to a server engine that can be used to install a mobile game application (such as mu mobile game assistant, etc.). The star cloud engine can be provided with a plurality of application programs, and when the application programs run on the star cloud engine, each application program corresponds to one simulator instance and corresponds to one data path as a file system of the application program. Specifically, in the embodiment of the present application, the simulator is used to simulate the second operating system (Linux system) in the first operating system (Windows system).
In order to reduce the reading step of the permission information of the acquisition target file, before the step of acquiring the file access request of the first process corresponding to the first application program and the second process corresponding to the second application program in the simulator, the method may include:
when the first running simulator is detected, creating a permission file in a disk of the computer equipment, wherein permission information of all files corresponding to the simulator is stored in the permission file;
mapping the authority file into a memory space provided by a first operating system;
generating a file authority list and a plurality of file identifications based on authority information corresponding to all files in the authority files, file paths corresponding to all files and a hash algorithm, wherein the file identifications are associated with the corresponding authority information in the file authority list.
The hash algorithm adopted in the embodiment of the application is a Cuckoo hash algorithm (Cuckoo), and in the embodiment of the application, authority information and configuration files of file states of all files of a simulator stored in a disk of computer equipment are recorded by adopting the Cuckoo hash algorithm.
Optionally, the step of creating a rights file in a disk of the computer device when the first run of the simulator is detected, the method may comprise:
When the initial running simulator is detected, creating a blank file with a preset size in a disk of the computer equipment;
and storing the authority information of all files of the simulator in the blank file to obtain the authority file.
In a specific embodiment, the step of generating the file permission list and the plurality of file identifications based on the permission information corresponding to all files in the permission files, the file paths corresponding to all files and the hash algorithm may include:
acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
generating a file identifier based on a file path of the file to be processed and a hash algorithm;
storing the authority information corresponding to the file to be processed into a preset file list according to the file identification so as to generate a file authority list.
Specifically, a target storage position is determined in a preset file list based on a file identifier, and authority information corresponding to a file to be processed is stored in the target storage position to generate a file authority list.
For example, a simplified formula of the cuckoo hash algorithm provided in the embodiment of the present application may be:
Index=Hash_func(Pathname)
Wherein Pathename represents the absolute path of a file in the simulator; hash_func represents cuckoo Hash calculation; index is a calculated Index value that can be identified as a file. For example, the rights files may be organized by a cuckoo hash algorithm into a 4096 row by 64 column table to form a file rights list. The index is used for representing a target row in a preset file list corresponding to a certain file, and after the target row is determined, the unused column is determined as a target column by enumerating 64 columns in the target row in the preset file list, so that the position for storing the authority information of the certain file is determined in the preset file list.
Since different files have different absolute paths, an absolute path refers to the actual path of a file on the disk of a computer device. The computer device may obtain different index after calculating the hash_func of the absolute paths of all files corresponding to the simulator. Then, judging the unused columns in the 64 columns of the corresponding rows in the preset file list, and storing the authority information in the preset file list in a one-to-one correspondence manner, so as to generate a file authority list.
In order to enable the file newly added by the synchronous update target process to be updated, the file authority list corresponding to the authority files shared by all the files is updated in real time, after generating the file authority list and a plurality of file identifications based on the authority information corresponding to all the files in the authority files, the file paths corresponding to all the files and the hash algorithm in the step:
when the target process is detected to be in an operating state and the target process creates a new file, storing the authority information of the new file into a file authority list to obtain an updated file authority list, wherein the target process is a first process and/or a second process;
and updating the rights file based on the updated file rights list to obtain an updated rights file.
In order to enable synchronous updating of the file permission list corresponding to the permission files shared by all files, after generating the file permission list and the plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files and a hash algorithm in the step, the method may include:
modifying the first authority information of a file to be modified in a target process to obtain second authority information of the file to be modified, wherein the target process is a first process and/or a second process;
Updating the file authority list based on the second authority information of the file to be modified to obtain an updated file authority list;
and updating the rights file based on the updated file rights list to obtain an updated rights file.
According to the embodiment of the application, the same authority file can be mapped into different processes by utilizing the file mapping function of the operating system, so that the problem of cross-process sharing is solved. Since only one rights file is used, there is no need to process multiple files, so the file caching function of the operating system can be run very efficiently. Moreover, each file used in the operating system becomes a cache in a memory space, so that the files can be shared across processes; therefore, in the multi-process model, all processes can use the same rights file for caching in the memory control.
102, acquiring the target file identification based on the target file path.
Specifically, the target file path is an access path of the target file in the disk of the computer device, and the target file path is an absolute path of the target file, that is, a real path of the target file on the disk of the computer device. After the target file path is obtained, the computer device may calculate the target file path using a cuckoo hash algorithm to obtain the target file identifier. And then, determining target authority information corresponding to the target file identification based on a preset corresponding relation between the file identification and the authority information in the memory space.
And 103, determining target authority information of the target file from the memory space according to the target file identification, wherein the target authority information is used for indicating the application program with the access authority of the target file.
In a specific embodiment, the step of determining the target authority information of the target file from the memory space according to the target file identifier may include:
and determining target authority information from a file authority list according to the target file identifier, wherein the file authority list is positioned in a memory space provided by the first operating system and is composed of authority information of all files in the simulator.
104, determining whether the first application program is allowed to access the target file based on the target authority information.
Specifically, after the computer equipment acquires the target authority information, comparing and judging the first application program so as to determine whether the first application program can be allowed to access the target file, if not, requesting access failure, and if not, the first application program cannot be allowed to access the target file; and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
And 105, if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
The embodiment of the application provides a file authority management method, which is characterized in that when a simulator is initially operated, an authority file is created in a disk of computer equipment, and all files corresponding to the simulator are stored in the authority file. Then, when the simulator is operated, the authority files can be mapped into the memory space, and when the authority information of the target file is determined, the read-write operation steps for determining the authority information of the target file can be reduced, so that the time for inquiring the authority information of the target file is shortened, and the efficiency for determining the authority information of the target file is improved.
In light of the foregoing, the following will further illustrate a method for managing file rights of the present application, by way of example. Referring to fig. 2, fig. 2 is a schematic flow chart of another method for managing file rights according to an embodiment of the present application, and the specific flow may be as follows steps 201 to 206:
and 201, acquiring authority information corresponding to all files in the star cloud engine to create an authority file.
When detecting that the star cloud engine is started for the first time in the computer equipment, the computer equipment creates a blank authority file with a preset size in a disk. The size standard of the file with the preset size is the file size calculated by a designer in predicting the maximum supported file number of the whole Windows system.
202, mapping the rights file to a memory space to generate a file rights list.
In a specific embodiment, based on rights information corresponding to all files in the rights file, file paths corresponding to the files, and a hash algorithm, a file rights list and a plurality of file identifications "are generated, and the method may include:
acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
generating a file identifier based on a file path of the file to be processed and a hash algorithm;
storing the authority information corresponding to the file to be processed into a preset file list according to the file identification so as to generate a file authority list.
Specifically, a target storage position is determined in a preset file list based on a file identifier, and authority information corresponding to a file to be processed is stored in the target storage position to generate a file authority list.
For example, a simplified formula of the cuckoo hash algorithm provided in the embodiment of the present application may be:
index=hash_func(pathname)
wherein Pathename represents the absolute path of a file in the simulator; hash_func represents cuckoo Hash calculation; index is a calculated Index value that can be identified as a file. For example, the rights files may be organized by a cuckoo hash algorithm into a 4096 row by 64 column table to form a file rights list. The index is used for representing a target row in a preset file list corresponding to a certain file, and after the target row is determined, the unused column is determined as a target column by enumerating 64 columns in the target row in the preset file list, so that the position for storing the authority information of the certain file is determined in the preset file list.
Since different files have different absolute paths, an absolute path refers to the actual path of a file on the disk of a computer device. The computer device may obtain different index after calculating the hash_func of the absolute paths of all files corresponding to the simulator. Then, judging the unused columns in the 64 columns of the corresponding rows in the preset file list, and storing the authority information in the preset file list in a one-to-one correspondence manner, so as to generate a file authority list.
In the embodiment of the application, the authority file is regarded as a memory block, the authority file is mapped into a memory control when the star cloud engine is operated, and the content (authority information) in the authority file is organized into a cuckoo hash table irrelevant to the address. The technology of adopting the cuckoo hash table can solve the conflict of the hash table through a cuckoo conflict avoidance algorithm. Because pointers are not involved in the whole hash table, and the socket of each hash table and the hash table are of fixed length, mapping of the authority files in the memory space can be realized by organizing the whole data structure into the memory space with fixed length and no address. And, all operations of the computer equipment to the cuckoo hash table are cross-process lockless operations, only atomic operations are used as a synchronization means, and all operations to the cuckoo hash table can be updated immediately by other processes or threads.
203, storing the authority information of the newly added file created by the first game application program into a file authority list when the star cloud engine runs the first game application program.
In order to realize the synchronous updating of the newly added file of the target process, the file authority list corresponding to the authority files shared by all the files is updated in real time, and when the newly added file is created under the running state of the first game application program, the computer equipment can store the authority information of the newly added file into the file authority list so as to obtain the updated file authority list; and then updating the rights file based on the updated file rights list to obtain an updated rights file.
Optionally, in order to synchronously update the file permission list corresponding to the permission files shared by all the files, when the first permission information of the file to be modified in the first game application program is detected to be modified, second permission information of the file to be modified is obtained; updating the file authority list based on the second authority information of the file to be modified to obtain an updated file authority list; and updating the rights file based on the updated file rights list to obtain an updated rights file.
204, when the file access request of the first process corresponding to the first game application program in the simulator and the file access request of the second process corresponding to the second game application program is obtained, obtaining the target file path of the target file to be accessed carried by the file access request.
For example, a first game application requests access to a file in a second game application, the file path being/data/data/com. When a file access request of a first process corresponding to a first game application program in the simulator and a file access request of a second process corresponding to a second game application program are obtained, the computer device can obtain a target file path (/ data/data/com.netease.my/file) of a target file to be accessed carried by the file access request.
And 205, acquiring the target file identification based on the target file path.
In a specific embodiment, the computer device may obtain a file path (/ data/data/com.netease.my/file) of the file, and after obtaining the file path, the file path may be calculated using a cuckoo hash algorithm to obtain the file identifier.
And 206, determining target authority information of the target file from the file authority list according to the target file identification so as to determine whether the first application program is allowed to access the target file or not based on the target authority information.
The computer device may determine the authority information corresponding to the file identifier from the file authority list based on a preset correspondence between the file identifier and the authority information in the memory space. After the computer equipment acquires the target authority information, comparing and judging the first application program so as to determine whether the first application program can be allowed to access the target file, if not, requesting access failure, wherein the first application program cannot be allowed to access the target file; and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
In order to facilitate better implementation of the method for managing file rights provided by the embodiment of the present application, the embodiment of the present application further provides a device for managing file rights corresponding to the method for managing file rights based on the method for managing file rights. The meaning of the nouns is the same as that in the file authority management method, and specific implementation details can be referred to the description in the method embodiment.
Referring to fig. 3, fig. 3 is a block diagram of a file authority management apparatus according to an embodiment of the present application, where the apparatus includes:
a first obtaining unit 301, configured to obtain a file access request of a first process corresponding to a first application program in a simulator, to a second process corresponding to a second application program, where the file access request carries a target file path of a target file to be accessed, and the simulator is configured to simulate a second operating system in a first operating system;
a second obtaining unit 302, configured to obtain a target file identifier based on the target file path;
a first determining unit 303, configured to determine, according to the target file identifier, target permission information of the target file from a memory space, where the target permission information is used to indicate the application program having access permission of the target file;
a second determining unit 304 configured to determine whether access to the target file by the first application program is allowed based on the target authority information;
the first processing unit 305 is configured to configure, if allowed, an access right of the target file for the first process, so that the first process accesses the target file.
In some embodiments, the apparatus further comprises:
and the third determining unit is used for determining target authority information from a file authority list according to the target file identifier, wherein the file authority list is positioned in a memory space provided by the first operating system, and the file authority list consists of authority information of all files in the simulator.
In some embodiments, the apparatus further comprises:
the first creating unit is used for creating a permission file in a disk of the computer equipment when the simulator is detected to be operated for the first time, wherein the permission file stores permission information of all files corresponding to the simulator;
the mapping unit is used for mapping the authority file into a memory space provided by the first operating system;
the first generation unit is used for generating a file authority list and a plurality of file identifications based on authority information corresponding to all files in the authority files, file paths corresponding to all files and a hash algorithm, wherein the file identifications are associated with the corresponding authority information in the file authority list.
In some embodiments, the apparatus further comprises:
the third acquisition unit is used for acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
The second generation unit is used for generating a file identifier based on the file path of the file to be processed and the hash algorithm;
and the first storage unit is used for storing the authority information corresponding to the file to be processed into a preset file list according to the file identifier so as to generate a file authority list.
In some embodiments, the apparatus further comprises:
and a fourth determining unit, configured to determine a target storage location in the preset file list based on the file identifier, and store rights information corresponding to the file to be processed to the target storage location, so as to generate a file rights list.
In some embodiments, the apparatus further comprises:
the second storage unit is used for storing the authority information of the newly added file into the file authority list when the target process is detected to be in an operating state and the newly added file is created by the target process, so as to obtain an updated file authority list, wherein the target process is a first process and/or a second process;
and the second processing unit is used for updating the authority file based on the updated file authority list so as to obtain an updated authority file.
In some embodiments, the apparatus further comprises:
The modification unit is used for modifying the first authority information of the file to be modified in the target process to obtain the second authority information of the file to be modified, wherein the target process is a first process and/or a second process;
the third processing unit is used for updating the file authority list based on the second authority information of the file to be modified so as to obtain an updated file authority list;
and a fourth processing unit, configured to update the rights file based on the updated file rights list, so as to obtain an updated rights file.
In some embodiments, the apparatus further comprises:
the second creation unit is used for creating a blank file with a preset size in a magnetic disk of the computer equipment when the simulator is detected to be operated for the first time;
and the third storage unit is used for storing the authority information of all files of the simulator in the blank file so as to obtain an authority file.
In some embodiments, the apparatus further comprises:
the calculation unit is used for calculating the target file path by adopting a hash algorithm so as to obtain a target file identifier;
and a fifth determining unit, configured to determine target authority information corresponding to the target file identifier based on a preset correspondence between the file identifier and the authority information in the memory space.
The embodiment of the present application provides a management device for file authority, where a first obtaining unit 301 obtains a file access request of a first process corresponding to a first application program in a simulator, and the file access request carries a target file path of a target file to be accessed, where the simulator is configured to simulate a second operating system in a first operating system; the second obtaining unit 302 obtains a target file identifier based on the target file path; the first determining unit 303 determines target authority information of the target file from the memory space according to the target file identifier, where the target authority information is used to indicate the application program having the access authority of the target file; the second determination unit 304 determines whether or not the access of the first application program to the target file is permitted based on the target authority information; if so, the first processing unit 305 configures access rights for the target file for the first process to enable the first process to access the target file. In the embodiment of the application, when the simulator is initially operated, one authority file is created in a disk of the computer equipment, and all files corresponding to the simulator are stored in the authority file. Then, when the simulator is operated, the authority files can be mapped into the memory space, and when the authority information of the target file is determined, the read-write operation steps for determining the authority information of the target file can be reduced, so that the time for inquiring the authority information of the target file is shortened, and the efficiency for determining the authority information of the target file is improved.
Correspondingly, the embodiment of the application also provides a computer device, which can be a terminal or a server, wherein the terminal can be a terminal device such as a smart phone, a tablet computer, a notebook computer, a touch screen, a game console, a personal computer (PC, personal Computer), a personal digital assistant (Personal Digital Assistant, PDA) and the like. Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present application, as shown in fig. 4. The computer apparatus 400 includes a processor 401 having one or more processing cores, a memory 402 having one or more computer readable storage media, and a computer program stored on the memory 402 and executable on the processor. The processor 401 is electrically connected to the memory 402. It will be appreciated by those skilled in the art that the computer device structure shown in the figures is not limiting of the computer device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
Processor 401 is a control center of computer device 400 and connects the various portions of the entire computer device 400 using various interfaces and lines to perform various functions of computer device 400 and process data by running or loading software programs and/or modules stored in memory 402 and invoking data stored in memory 402, thereby performing overall monitoring of computer device 400.
In the embodiment of the present application, the processor 401 in the computer device 400 loads the instructions corresponding to the processes of one or more application programs into the memory 402 according to the following steps, and the processor 401 executes the application programs stored in the memory 402, so as to implement various functions:
acquiring a first process corresponding to a first application program in a simulator, and requesting a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, and the simulator is used for simulating a second operating system in a first operating system;
acquiring a target file identifier based on the target file path;
determining target authority information of the target file from a memory space according to the target file identifier, wherein the target authority information is used for indicating the application program with the access authority of the target file;
determining whether access to the target file by the first application program is allowed based on the target authority information;
and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Optionally, as shown in fig. 4, the computer device 400 further includes: a touch display 403, a radio frequency circuit 404, an audio circuit 405, an input unit 406, and a power supply 407. The processor 401 is electrically connected to the touch display 403, the radio frequency circuit 404, the audio circuit 405, the input unit 406, and the power supply 407, respectively. Those skilled in the art will appreciate that the computer device structure shown in FIG. 4 is not limiting of the computer device and may include more or fewer components than shown, or may be combined with certain components, or a different arrangement of components.
The touch display 403 may be used to display a graphical user interface and receive operation instructions generated by a user acting on the graphical user interface. The touch display screen 403 may include a display panel and a touch panel. Wherein the display panel may be used to display information entered by a user or provided to a user as well as various graphical user interfaces of a computer device, which may be composed of graphics, text, icons, video, and any combination thereof. Alternatively, the display panel may be configured in the form of a liquid crystal display (LCD, liquid Crystal Display), an Organic Light-Emitting Diode (OLED), or the like. The touch panel may be used to collect touch operations on or near the user (such as operations on or near the touch panel by the user using any suitable object or accessory such as a finger, stylus, etc.), and generate corresponding operation instructions, and the operation instructions execute corresponding programs. Alternatively, the touch panel may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 401, and can receive and execute commands sent from the processor 401. The touch panel may overlay the display panel, and upon detection of a touch operation thereon or thereabout, the touch panel is passed to the processor 401 to determine the type of touch event, and the processor 401 then provides a corresponding visual output on the display panel in accordance with the type of touch event. In the embodiment of the present application, the touch panel and the display panel may be integrated into the touch display screen 403 to implement the input and output functions. In some embodiments, however, the touch panel and the touch panel may be implemented as two separate components to perform the input and output functions. I.e. the touch-sensitive display 403 may also implement an input function as part of the input unit 406.
In the present embodiment, a graphical user interface is generated on touch display 403 by processor 401 executing a gaming application. The touch display 403 is used for presenting a graphical user interface and receiving an operation instruction generated by a user acting on the graphical user interface.
The radio frequency circuitry 404 may be used to transceive radio frequency signals to establish wireless communications with a network device or other computer device via wireless communications.
The audio circuitry 405 may be used to provide an audio interface between a user and a computer device through speakers, microphones, and so on. The audio circuit 405 may transmit the received electrical signal after audio data conversion to a speaker, where the electrical signal is converted into a sound signal for output; on the other hand, the microphone converts the collected sound signals into electrical signals, which are received by the audio circuit 405 and converted into audio data, which are processed by the audio data output processor 401 and sent via the radio frequency circuit 404 to, for example, another computer device, or which are output to the memory 402 for further processing. The audio circuit 405 may also include an ear bud jack to provide communication of the peripheral ear bud with the computer device.
The input unit 406 may be used to receive input numbers, character information, or user characteristic information (e.g., fingerprint, iris, facial information, etc.), and to generate keyboard, mouse, joystick, optical, or trackball signal inputs related to user settings and function control.
The power supply 407 is used to power the various components of the computer device 400. Alternatively, the power supply 407 may be logically connected to the processor 401 through a power management system, so as to implement functions of managing charging, discharging, and power consumption management through the power management system. The power supply 407 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown in fig. 4, the computer device 400 may further include a camera, a sensor, a wireless fidelity module, a bluetooth module, etc., and will not be described herein.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
As can be seen from the foregoing, in the computer device provided in this embodiment, a file access request for a second process corresponding to a second application program is obtained by obtaining a first process corresponding to the first application program in a simulator, where the file access request carries a target file path of a target file to be accessed, and the simulator is configured to simulate a second operating system in a first operating system; acquiring a target file identifier based on the target file path; determining target authority information of the target file from a memory space according to the target file identifier, wherein the target authority information is used for indicating the application program with the access authority of the target file; determining whether access to the target file by the first application program is allowed based on the target authority information; and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file. In the embodiment of the application, when the simulator is initially operated, one authority file is created in a disk of the computer equipment, and all files corresponding to the simulator are stored in the authority file. Then, when the simulator is operated, the authority files can be mapped into the memory space, and when the authority information of the target file is determined, the read-write operation steps for determining the authority information of the target file can be reduced, so that the time for inquiring the authority information of the target file is shortened, and the efficiency for determining the authority information of the target file is improved.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a computer readable storage medium in which a plurality of computer programs are stored, the computer programs being capable of being loaded by a processor to perform steps in any of the file rights management methods provided by the embodiments of the present application. For example, the computer program may perform the steps of:
acquiring a first process corresponding to a first application program in a simulator, and requesting a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, and the simulator is used for simulating a second operating system in a first operating system;
acquiring a target file identifier based on the target file path;
determining target authority information of the target file from a memory space according to the target file identifier, wherein the target authority information is used for indicating the application program with the access authority of the target file;
Determining whether access to the target file by the first application program is allowed based on the target authority information;
and if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the storage medium may include: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
The steps in any of the file authority management methods provided in the embodiments of the present application may be executed by the computer program stored in the storage medium, so that the beneficial effects that any of the file authority management methods provided in the embodiments of the present application may be achieved are detailed in the previous embodiments and are not described herein.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
The foregoing describes in detail a method, an apparatus, a computer device and a storage medium for managing file rights provided in the embodiments of the present application, and specific examples are applied to illustrate principles and implementations of the present application, where the foregoing description of the embodiments is only used to help understand the technical solution and core ideas of the present application; those of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method for managing file rights, comprising:
acquiring a first process corresponding to a first application program in a simulator and a file access request of a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, the simulator is used for simulating a second operating system in a first operating system, the target file is a file in the second application program, and the target file path is an access path of the target file in a magnetic disk of computer equipment;
calculating the target file path by adopting a hash algorithm to obtain a target file identifier;
determining target authority information from a file authority list according to the target file identifier, wherein the file authority list is positioned in a memory space provided by a first operating system, the file authority list consists of authority information of all files in the simulator, and the target authority information is used for indicating an application program with access authority of the target file;
determining whether access to the target file by the first application program is allowed based on the target authority information;
And if the access permission is allowed, configuring the access permission of the target file for the first process so that the first process accesses the target file.
2. The method for managing file rights according to claim 1, further comprising, before acquiring a file access request from a first process corresponding to a first application program to a second process corresponding to a second application program in the emulator:
when the simulator is detected to be operated for the first time, creating a permission file in a disk of the computer equipment, wherein permission information of all files corresponding to the simulator is stored in the permission file;
mapping the authority file into a memory space provided by the first operating system;
generating a file authority list and a plurality of file identifications based on authority information corresponding to all files in the authority files, file paths corresponding to all files and a hash algorithm, wherein the file identifications are associated with the authority information corresponding to the file authority list.
3. The method for managing file rights according to claim 2, wherein generating a file rights list and a plurality of file identifications based on rights information corresponding to all files in the rights file, file paths corresponding to all files, and a hash algorithm, comprises:
Acquiring a file path corresponding to each file to be processed in the authority files and authority information corresponding to each file to be processed in the authority files;
generating a file identifier based on the file path of the file to be processed and the hash algorithm;
and storing the authority information corresponding to the file to be processed into a preset file list according to the file identifier so as to generate a file authority list.
4. The method for managing file rights according to claim 3, wherein storing rights information corresponding to the file to be processed in a preset file list according to the file identifier to generate a file rights list includes:
and determining a target storage position in the preset file list based on the file identifier, and storing the authority information corresponding to the file to be processed to the target storage position to generate a file authority list.
5. The method according to claim 2, further comprising, after generating a file permission list and a plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files, and a hash algorithm:
When detecting that a target process is in an operating state and the target process creates a new file, storing the authority information of the new file into the file authority list to obtain an updated file authority list, wherein the target process is a first process and/or a second process;
and updating the rights file based on the updated file rights list to obtain an updated rights file.
6. The method according to claim 2, further comprising, after generating a file permission list and a plurality of file identifications based on permission information corresponding to all files in the permission files, file paths corresponding to all files, and a hash algorithm:
modifying the first authority information of a file to be modified in a target process to obtain second authority information of the file to be modified, wherein the target process is a first process and/or a second process;
updating the file authority list based on the second authority information of the file to be modified to obtain an updated file authority list;
and updating the rights file based on the updated file rights list to obtain an updated rights file.
7. The method for managing file rights according to claim 2, wherein creating a rights file in a disk of the computer device when the initial running of the emulator is detected, comprises:
when the simulator is detected to be operated for the first time, creating a blank file with a preset size in a disk of computer equipment;
and storing the authority information of all files of the simulator in the blank file to obtain an authority file.
8. A management apparatus for file rights, the apparatus comprising:
the first acquisition unit is used for acquiring a file access request of a first process corresponding to a first application program in the simulator and a second process corresponding to a second application program, wherein the file access request carries a target file path of a target file to be accessed, the simulator is used for simulating a second operating system in a first operating system, the target file is a file in the second application program, and the target file path is an access path of the target file in a magnetic disk of the computer equipment;
the calculation unit is used for calculating the target file path by adopting a hash algorithm to obtain a target file identifier;
A third determining unit, configured to determine target rights information from a file rights list according to the target file identifier, where the file rights list is located in a memory space provided by the first operating system, the file rights list is composed of rights information of all files in the simulator, and the target rights information is used to indicate an application program having access rights of the target file;
a second determining unit configured to determine whether access to the target file by the first application program is allowed based on the target authority information;
and the first processing unit is used for configuring the access authority of the target file for the first process if the first process is allowed, so that the first process accesses the target file.
9. A computer device comprising a processor and a memory, the memory storing a plurality of instructions; the processor loads instructions from the memory to perform the steps in the method of managing file rights according to any of claims 1 to 7.
10. A computer readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps in the method of managing file rights according to any of claims 1 to 7.
CN202110925373.XA 2021-08-12 2021-08-12 File authority management method and device, computer equipment and storage medium Active CN113625968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110925373.XA CN113625968B (en) 2021-08-12 2021-08-12 File authority management method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110925373.XA CN113625968B (en) 2021-08-12 2021-08-12 File authority management method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113625968A CN113625968A (en) 2021-11-09
CN113625968B true CN113625968B (en) 2024-03-01

Family

ID=78384963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110925373.XA Active CN113625968B (en) 2021-08-12 2021-08-12 File authority management method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113625968B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100945476B1 (en) * 2009-09-10 2010-03-05 주식회사 파수닷컴 Apparatus and method for digital rights management using virtualization technique
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN104360892A (en) * 2014-10-21 2015-02-18 普华基础软件股份有限公司 System and method for creating virtual machine
KR101592782B1 (en) * 2014-11-05 2016-02-12 플러스기술주식회사 Apparatus and Method for monitoring the resources in full virtualization system
CN105580010A (en) * 2014-09-01 2016-05-11 华为技术有限公司 File access method and apparatus, and storage system
CN105830059A (en) * 2014-11-28 2016-08-03 华为技术有限公司 Fine pitch connector socket
CN106156031A (en) * 2015-03-24 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106201771A (en) * 2015-05-06 2016-12-07 阿里巴巴集团控股有限公司 Data-storage system and data read-write method
CN106778345A (en) * 2016-12-19 2017-05-31 网易(杭州)网络有限公司 The treating method and apparatus of the data based on operating right
CN108614976A (en) * 2018-04-28 2018-10-02 苏州科达科技股份有限公司 Authority configuring method, device and storage medium
CN109446160A (en) * 2018-11-06 2019-03-08 郑州云海信息技术有限公司 A kind of file reading, system, device and computer readable storage medium
CN109445902A (en) * 2018-09-06 2019-03-08 新华三云计算技术有限公司 A kind of data manipulation method and system
CN109766700A (en) * 2018-05-04 2019-05-17 360企业安全技术(珠海)有限公司 Access control method and device, the storage medium, electronic device of file
CN110290112A (en) * 2019-05-30 2019-09-27 平安科技(深圳)有限公司 Authority control method, device, computer equipment and storage medium
CN110413215A (en) * 2018-04-28 2019-11-05 伊姆西Ip控股有限责任公司 For obtaining the method, equipment and computer program product of access authority
CN112214752A (en) * 2020-10-20 2021-01-12 腾讯科技(深圳)有限公司 Dynamic control method, device and equipment of application permission and storage medium
CN112380170A (en) * 2020-11-25 2021-02-19 北京珞安科技有限责任公司 Correlation method and device for file updating operation and computer equipment
CN112597476A (en) * 2020-12-25 2021-04-02 努比亚技术有限公司 Application authority management method, device, terminal and storage medium
CN112765663A (en) * 2021-01-25 2021-05-07 北京北信源信息安全技术有限公司 File access control method, device, equipment, server and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101456489B1 (en) * 2007-07-23 2014-10-31 삼성전자주식회사 Method and apparatus for managing access privileges in a CLDC OSGi environment

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100945476B1 (en) * 2009-09-10 2010-03-05 주식회사 파수닷컴 Apparatus and method for digital rights management using virtualization technique
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN105580010A (en) * 2014-09-01 2016-05-11 华为技术有限公司 File access method and apparatus, and storage system
CN104360892A (en) * 2014-10-21 2015-02-18 普华基础软件股份有限公司 System and method for creating virtual machine
KR101592782B1 (en) * 2014-11-05 2016-02-12 플러스기술주식회사 Apparatus and Method for monitoring the resources in full virtualization system
CN105830059A (en) * 2014-11-28 2016-08-03 华为技术有限公司 Fine pitch connector socket
CN106156031A (en) * 2015-03-24 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106201771A (en) * 2015-05-06 2016-12-07 阿里巴巴集团控股有限公司 Data-storage system and data read-write method
CN106778345A (en) * 2016-12-19 2017-05-31 网易(杭州)网络有限公司 The treating method and apparatus of the data based on operating right
CN108614976A (en) * 2018-04-28 2018-10-02 苏州科达科技股份有限公司 Authority configuring method, device and storage medium
CN110413215A (en) * 2018-04-28 2019-11-05 伊姆西Ip控股有限责任公司 For obtaining the method, equipment and computer program product of access authority
CN109766700A (en) * 2018-05-04 2019-05-17 360企业安全技术(珠海)有限公司 Access control method and device, the storage medium, electronic device of file
CN109445902A (en) * 2018-09-06 2019-03-08 新华三云计算技术有限公司 A kind of data manipulation method and system
CN109446160A (en) * 2018-11-06 2019-03-08 郑州云海信息技术有限公司 A kind of file reading, system, device and computer readable storage medium
CN110290112A (en) * 2019-05-30 2019-09-27 平安科技(深圳)有限公司 Authority control method, device, computer equipment and storage medium
CN112214752A (en) * 2020-10-20 2021-01-12 腾讯科技(深圳)有限公司 Dynamic control method, device and equipment of application permission and storage medium
CN112380170A (en) * 2020-11-25 2021-02-19 北京珞安科技有限责任公司 Correlation method and device for file updating operation and computer equipment
CN112597476A (en) * 2020-12-25 2021-04-02 努比亚技术有限公司 Application authority management method, device, terminal and storage medium
CN112765663A (en) * 2021-01-25 2021-05-07 北京北信源信息安全技术有限公司 File access control method, device, equipment, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于MNT随机化容器文件系统安全性加强技术;魏小锋;郭玉东;林键;;计算机工程与应用(第06期);全文 *

Also Published As

Publication number Publication date
CN113625968A (en) 2021-11-09

Similar Documents

Publication Publication Date Title
CN107038112B (en) Application interface debugging method and device
CN108345543B (en) Data processing method, device, equipment and storage medium
TWI533241B (en) A method, servers and devices achieve artificial intelligence
CN109324749B (en) Drawing method, drawing device, storage medium and electronic equipment
CN108595218B (en) Method and device for loading dynamic library of system
CN106502703B (en) Function calling method and device
CN112870724B (en) Resource management method and device, storage medium and electronic equipment
CN112882764B (en) Component loading method and device, computer equipment and storage medium
EP2869604A1 (en) Method, apparatus and device for processing a mobile terminal resource
CN108984374B (en) Method and system for testing database performance
CN106919458B (en) Method and device for Hook target kernel function
CN113625968B (en) File authority management method and device, computer equipment and storage medium
CN115944923A (en) Instance object editing method and device, electronic equipment and storage medium
CN113332718B (en) Interactive element query method and device, electronic equipment and storage medium
CN115469937A (en) Plug-in operation method and device, electronic equipment and storage medium
EP4030371A1 (en) Method and device for acquiring virtual resource and storage medium
CN112426722A (en) Node map hot updating method and device, storage medium and computer equipment
CN112783860B (en) Method, device, storage medium and computer equipment for constructing mirror image database
CN106970814B (en) Processing method, device and system for software upgrading
CN114146418A (en) Game resource processing method and device, computer equipment and storage medium
US20230092869A1 (en) Automated frame pacing based on gameplay state
CN111376248A (en) Robot, robot decision method and terminal equipment
CN113961585A (en) Data processing method and device, electronic equipment and storage medium
CN117462952A (en) Collision volume generation method, device, electronic apparatus, and readable storage medium
CN117539607A (en) Memory overflow processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant