CN114676093B - File management method and device, electronic equipment and storage medium - Google Patents

File management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114676093B
CN114676093B CN202210571603.1A CN202210571603A CN114676093B CN 114676093 B CN114676093 B CN 114676093B CN 202210571603 A CN202210571603 A CN 202210571603A CN 114676093 B CN114676093 B CN 114676093B
Authority
CN
China
Prior art keywords
file
user
target
target file
folder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210571603.1A
Other languages
Chinese (zh)
Other versions
CN114676093A (en
Inventor
熊毅
马宝贺
曹超超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Lenovo Collaboration Technology Inc
Original Assignee
Tianjin Lenovo Collaboration Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Lenovo Collaboration Technology Inc filed Critical Tianjin Lenovo Collaboration Technology Inc
Priority to CN202210571603.1A priority Critical patent/CN114676093B/en
Publication of CN114676093A publication Critical patent/CN114676093A/en
Application granted granted Critical
Publication of CN114676093B publication Critical patent/CN114676093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/188Virtual file systems
    • G06F16/192Implementing virtual folder structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides a file management method, an apparatus, an electronic device, and a storage medium, where the method is applied to an enterprise network disk, where the enterprise network disk includes enterprise folders, and the method includes: creating a virtual folder in response to a creation request of a first user; responding to a first authorization request of the first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder; the files in the virtual folder have multiple permission types; responding to a second authorization request of a second user for obtaining the target authority of a second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file; and responding to an authorization instruction of the first user, and giving the target authority of the second target file to the second user.

Description

File management method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a file management method and apparatus, an electronic device, and a storage medium.
Background
In the existing enterprise network disk, files can be stored only in enterprise folders (such as department folders, team folders, etc.) and personal folders. Based on the architecture design of file storage in the enterprise network disk, a user can only view or operate files in a personal folder or files disclosed in an enterprise folder. When a member of a certain department wants to inquire or download a non-public file in an enterprise folder or a file of other departments, a user is required to submit an authorization request of the file to a user with the highest authority of the file. The highest-authority users of the files at least comprise creators and managers of the files generally, and the users can obtain the authority for operating the files only after all the highest-authority users of the files pass the authorization, so that the authorization steps are complicated and the time for waiting for authorization is long. For the highest-authority user of the file, after receiving different authorization requests from users in different departments and performing authorization, generally after considering the position of the department or team where the user is located, whether the authorization request of the user can pass is judged, and the workload of the highest-authority user of the file is increased.
Disclosure of Invention
The present disclosure provides a file management method, an apparatus, an electronic device, and a storage medium, to at least solve the above technical problems in the prior art.
According to a first aspect of the present disclosure, a file management method is provided, where the method is applied to an enterprise network disk, where the enterprise network disk includes enterprise folders therein, and the method includes: creating a virtual folder in response to a creation request of a first user; responding to a first authorization request of the first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder; the files in the virtual folder have multiple permission types; responding to a second authorization request of a second user for obtaining the target authority of a second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file; and responding to an authorization instruction of the first user, and giving the target authority of the second target file to the second user.
In one embodiment, the obtaining a first target file from the enterprise folder in response to a first authorization request from the first user, and storing the first target file in the virtual folder includes: receiving a first authorization request of the first user, wherein the first authorization request is used for requesting to store a first target file in the enterprise folder into a virtual folder and acquiring a target authority of the first target file; responding to the first authorization request, and sending a fourth authorization request to a highest-authority user of the first target file to request the highest-authority user to authorize the target authority of the first target file; and responding to an authorization instruction of the user with the highest authority, acquiring a hard connection file of the first target file, storing the hard connection file into the virtual folder, and endowing the target authority of the first target file to the first user.
In an embodiment, the obtaining the hard-wired file of the first target file and storing the hard-wired file of the first target file in the virtual folder includes: acquiring file data, index nodes and storage paths of the first target file; creating a hard connection file of the first target file according to the file data and the index node; and saving the hard connection file into the virtual folder according to the storage path.
In an embodiment, the permission types of the files in the enterprise folder and the permission types of the files in the virtual folder include: sharing rights, downloading rights, deleting rights, uploading rights and/or data synchronization rights.
In an embodiment, after the data synchronization right is given to the second user, the method further includes: responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification; determining modified data of the second target file according to the snapshot information; and synchronizing the modified data to the file corresponding to the second target file in the enterprise folder.
In an implementation manner, after any user obtains the data synchronization permission of the specific file in the enterprise folder, the method further includes: responding to a data synchronization instruction of any user to the specific file, and acquiring snapshot information of the specific file after data modification; determining modification data of the specific file according to the snapshot information; synchronizing the modification data to all hard-wired files corresponding to the particular file.
In an embodiment, after the data synchronization right is given to the second user, the method further includes: responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification; determining modified data of the second target file according to the snapshot information; and synchronizing the modified data to the file corresponding to the second target file in the enterprise folder and all the hard connection files corresponding to the file.
According to a second aspect of the present disclosure, there is provided a file management apparatus, wherein the apparatus is applied to an enterprise network disk, the enterprise network disk includes enterprise folders therein, and the apparatus includes: the creating module is used for responding to a creating request of a first user and creating a virtual folder; the storage module is used for responding to a first authorization request of the first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder; the files in the virtual folder have multiple permission types; the interaction module is used for responding to a second authorization request of a second user for acquiring the target authority of a second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file; and the authorization module is used for responding to the authorization instruction of the first user and endowing the target authority of the second target file to the second user.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform any of the file management methods of the present disclosure.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform any of the above-described file management methods of the present disclosure.
The file management method disclosed by the invention has the advantages that one or more virtual folders are arranged in the enterprise network disk, the request of a manager of the virtual folders is responded, the first target file is obtained from the enterprise folder and is stored in the virtual folder, and thus, the corresponding authority of the first target file is also transferred to the manager of the virtual folder, so that the manager of the virtual folder can continuously transfer the target authority of the second target file in the virtual folder to other enterprise network disk users. Therefore, based on the enterprise network disk containing the virtual folder, the file authority can be released layer by layer, the condition that each user accessing the file needs to request authorization from the user with the highest authority of the file is avoided, and the file access efficiency in the enterprise network disk is improved.
It should be understood that the statements in this section are not intended to identify key or critical features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
FIG. 1 is a schematic diagram illustrating an implementation flow of a file management method according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart illustrating an implementation of a method for obtaining a first target file according to an embodiment of the present disclosure;
FIG. 3 is a flowchart illustrating an implementation of a method for obtaining a hard-wired file of a first target file according to an embodiment of the present disclosure;
FIG. 4 is a flow chart illustrating an implementation of a data synchronization method according to an embodiment of the present disclosure;
FIG. 5 is a flow chart illustrating an implementation of a data synchronization method according to another embodiment of the disclosure;
FIG. 6 is a flow chart illustrating an implementation of a data synchronization method according to another embodiment of the present disclosure;
FIG. 7 shows a schematic diagram of a file management apparatus of an embodiment of the present disclosure;
FIG. 8 is a schematic view showing a file management apparatus of another embodiment of the present disclosure;
fig. 9 is a schematic diagram illustrating a component structure of an electronic device implementing a file management method according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, features and advantages of the present disclosure more obvious and understandable, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
The enterprise network disk is an enterprise data network storage and management solution based on a cloud computing concept, and provides services such as data summarization distribution, storage backup and management for enterprises by using mass computing and storage capacity of an internet background data center.
Compared with a personal network disk, the enterprise network disk has obvious enhancement in safety and storage space, and meanwhile, functions related to cooperative work are added to enterprise-level users in a targeted mode. Therefore, for enterprises, general personal-level network disk products cannot meet the requirements, and the enterprises need to select professional enterprise-level network disk products.
In one example, the present disclosure provides a file management method, which is applied to an enterprise network disk, where the enterprise network disk includes enterprise folders, and as shown in fig. 1, the method includes:
step 101: in response to a creation request of a first user, a virtual folder is created.
In an enterprise, enterprise staff members are divided according to different functions and projects and can be divided into department members and team members. Therefore, in the file system of the enterprise network disk, the enterprise folders can comprise department folders and team folders according to different management requirements. In addition, non-public files that do not belong to department folders and team folders are included in the enterprise folders.
A virtual folder is essentially a data structure that organizes and manages enterprise network disk files. The first user, as a manager of the virtual folder, may be a person in charge of a team, a person in charge of a department, and so on.
Step 102: and responding to a first authorization request of a first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder.
When the enterprise network disk user accesses and wants to acquire a certain file and the right of the file in the enterprise folder, a first authorization request can be sent through a user interface provided by the enterprise network disk, and correspondingly, the enterprise network disk receives the first authorization request and stores a first target file in the enterprise folder into the virtual folder. In this example, the enterprise network disk user is the first user, and the first target file requested by the first authorization request is any file in the enterprise folder.
The number of the first target files is not limited in the present disclosure, and may be one or more; the file format of the first target file is not limited, and may be a Word document, a PPT presentation, an Excel table, a picture, an audio or video file, and the like.
Wherein the files in the virtual folders have multiple permission types.
The files in the virtual folder have corresponding rights, such as read rights, write rights, download rights, sharing rights, and the like. In the present disclosure, these permissions may be granted to respective enterprise network disk users.
Step 103: and responding to a second authorization request of the second user for acquiring the target authority of the second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file.
When the enterprise network disk user accesses and wants to acquire a certain file right in the virtual folder, the request can be sent through a user interface provided by the enterprise network disk, and correspondingly, the enterprise network disk can receive the request. In this example, the enterprise network disk user is a second user, and the request is referred to as a second authorization request, where the second authorization request is used to request to obtain the target authority of the second target file in the virtual folder.
To distinguish from the first target file in the enterprise folder, the present disclosure refers to the accessed file in the virtual folder as the second target file. The target authority of the second target file requested by the second authorization request may be various, and is not limited herein, but is limited to the authority type of the file in the virtual folder.
Similarly, the number of the second target files requested by the second authorization request is not limited, and may be one or more; the file format of the second target file is not limited, and may be a Word document, a PPT presentation, an Excel table, a picture, an audio or video file, and the like.
Step 104: and responding to the authorization instruction of the first user, and giving the target authority of the second target file to the second user.
The file management method disclosed by the invention has the advantages that one or more virtual folders are arranged in the enterprise network disk, the request of a manager of the virtual folders is responded, the first target file is obtained from the enterprise folder and is stored in the virtual folder, so that the corresponding authority of the first target file is also transferred to the manager (namely a first user) of the virtual folder, and the manager of the virtual folder can continuously transfer the target authority of the second target file in the virtual folder to other users of the enterprise network disk. Therefore, based on the enterprise network disk containing the virtual folder, the file authority can be released layer by layer, the condition that each user accessing the file needs to request authorization from the user with the highest authority of the file is avoided, and the file access efficiency in the enterprise network disk is improved.
In an example, the implementation process of obtaining the first target file from the enterprise folder and storing the first target file in the virtual folder in response to the first authorization request of the first user in step 102, as shown in fig. 2, includes:
step 201: and receiving a first authorization request of a first user, wherein the first authorization request is used for requesting to store a first target file in the enterprise folder into the virtual folder and acquiring the target authority of the first target file.
Step 202: and responding to the first authorization request, and sending a fourth authorization request to a highest-authority user of the first target file to request the highest-authority user to authorize the target authority of the first target file.
The target authority of the first target file requested by the first authorization request may be various, and is not limited herein, but is limited to the authority type of the file in the enterprise folder. The files in the enterprise folder have permission types, such as read permission, write permission, download permission, sharing permission and the like.
Step 203: and responding to an authorization instruction of the user with the highest authority, acquiring a hard connection file of the first target file, storing the hard connection file into the virtual folder, and giving the target authority of the first target file to the first user.
Hard Link (Hard Link) is a file storage method, which can create multiple Hard Link files for one target file and store the files in different folders, so that the Hard Link file of a first target file can be stored in different virtual folders.
Therefore, it can be understood that the hard-wired file stored in the virtual folder is the first target file in the enterprise folder, i.e., the second target file refers specifically to the hard-wired file in the virtual folder.
In addition, the enterprise network disk disclosed by the disclosure further comprises a personal folder besides the enterprise folder, wherein the personal folder is used for storing the personal files of the current network disk user, and the files in the personal folder can be stored in the virtual folder for management. Because the highest-authority users of the personal folder and the virtual folder are the first users, when the files in the personal folder are stored in the virtual folder, authorization does not need to be requested, and the highest management authority of the first users on the files is continuously reserved.
In an example, the step 203, as shown in fig. 3, includes an implementation procedure of obtaining a hard-wired file of the first target file and storing the hard-wired file in the virtual folder, where the implementation procedure includes:
step 301: and acquiring the file data, the index node and the storage path of the first target file.
The file data in the first object file is stored in file data blocks. A file data Block (Block) is the minimum unit for storing and reading a file, and usually at least one file data Block is occupied by one file data.
An index node (Inode) is a data structure of a file, and is used to record basic information of the file, such as a timestamp of a file change, a location of a file data block, file usage authority, a user name, a connection count, and the like.
Each file is assigned an index node, and each index node corresponds to an index node number. The file basic information recorded in the index node can be retrieved and acquired through the index node number, the storage position of the file data block is recorded in the file basic information, and then the file data of the target file is read through searching.
The index node number can be understood as a pointer which always points to the file data block corresponding to the index node. While when a file is being modified, it is essentially the data stored in the file data blocks that is being modified. Therefore, files with the same index node number have the same file data and can realize data synchronization.
Step 302: a hard-wired file of the first target file is created from the file data and the inode.
And creating a hard connection file by using the index node of the first target file and the file data, wherein the index node number of the hard connection file is consistent with the index node number of the first target file, and the connection count in the index node is increased by 1. Since the hard-wired file has the same inode number as the first destination file, the file data of the first destination file and the hard-wired file may remain synchronized.
Every time a hard-wired file is created, the inode number and file data of other hard-wired files are not affected, but the connection count of all files is increased by 1. For example, after the first object file creates the first hard-wired file, the connection count of the first object file and the hard-wired file is increased by 1, and the total connection count is 2.
Therefore, every time a hard-connected file is deleted, the file data of the inode number and other hard-connected files are not affected, but the connection count of all files is decremented by 1. And the file data blocks are not deleted completely until the last file is deleted, namely the connection count is 0, and the file is also deleted completely. Therefore, in the file management process, a plurality of hard-connected files are usually created for important files and stored in different directories to prevent the important files from being deleted by mistake.
Step 303: and saving the hard connection file into the virtual folder according to the storage path.
In one example, the permission types for files in the enterprise folder and the permission types for files in the virtual folder include: sharing rights, downloading rights, deleting rights, uploading rights and/or data synchronization rights.
After the sharing authority is given to the user requesting authorization, the sharing instruction of the user to the target file is responded, and the sharing external link mapped to the target file is generated according to the obtained target file.
And after the user requesting authorization is endowed with the downloading authority, responding to a downloading instruction of the user to the target file, acquiring a downloading directory address, and downloading the target file to a corresponding local folder according to the downloading directory address.
And after the user requesting authorization is endowed with the deletion authority, the target file is deleted in the folder for storing the target file in response to the deletion instruction of the user on the target file.
And after the uploading authority is given to the user requesting the authorization, responding to an uploading instruction of the user to the target file, acquiring an uploading directory address, and uploading the target file to a corresponding folder according to the uploading directory address.
And after the data synchronization authority is given to the user requesting the authorization, the data synchronization authority responds to a data synchronization instruction of the user to the target file, acquires the modified data of the target file and/or the corresponding hard connection file, and can synchronize the modified data to the specified file.
In one example, after the data synchronization right is given to the second user, as shown in fig. 4, the method further includes:
step 401: and responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification.
In this example, snapshot information refers to data information that is complete for the file at a certain time. Taking the snapshot information obtained after the data of the hard-connected file is modified as an example, after an instruction that the hard-connected file is modified and stored is received, the program operation and the system operation of the hard-connected file are locked while responding to the instruction, and the file data of the hard-connected file at the current moment is completely recorded as the snapshot information. And after the snapshot information is acquired, releasing the program operation and the system operation of the hard connection file.
Step 402: and determining the modified data of the second target file according to the snapshot information.
And comparing the snapshot information of the hard connection file with the file data of the file corresponding to the second target file in the enterprise folder, and determining the modified data of the hard connection file.
Step 403: and synchronizing the modified data to a file in the enterprise folder corresponding to the second target file.
In this example, the second user may be an enterprise network disk user accessing the virtual folder, including an administrator of the virtual folder.
In one application scenario, an enterprise needs to make statistics of suggestions of employee training courses in a certain department, and an administrator creates a file a in an enterprise folder for recording the suggestions of the employee training courses. Responding to an administrator authorization instruction from the file A, the enterprise network disk stores a hard connection file B of the file A in a virtual folder of a department responsible person, synchronizes modification data of the hard connection file B to a data synchronization authority of the file A and gives the data synchronization authority to the department responsible person, and responding to an authorization instruction from the department responsible person and gives the data synchronization authority to staff in the department. Department staff (i.e., a second user) can directly fill in the recommendation information in the hard-connected file B, and the enterprise network disk synchronizes the information filled in the hard-connected file B into the file A as modification data. Therefore, training course suggestions are quickly collected, collection one by one is not needed, then unified arrangement is completed, and the working efficiency of file collaborative management is improved.
In an example, after any user obtains the data synchronization authority of a specific file in the enterprise folder, as shown in fig. 5, the method further includes:
step 501: and responding to a data synchronization instruction of any user to the specific file, and acquiring snapshot information of the specific file after data modification.
Step 502: based on the snapshot information, modified data for the particular file is determined.
Step 503: the modification data is synchronized to all of the hard-wired files corresponding to the particular file.
Wherein the meaning of the specific file in the enterprise folder and the first target file is different. A first user wants to acquire a certain file from an enterprise folder, store the certain file into a virtual folder, and acquire the target authority of the certain file at the same time, wherein the file in the enterprise folder is called a first target file in the process; and after any user modifies data of a certain file in the enterprise folder, the data is synchronized to all the hard-connected files of the file, and the file in the enterprise folder is called a specific file in the process. Although both are files in an enterprise folder, the purposes and processes of operation of the two are different, and thus the latter is named as a specific file for distinction.
In one application scenario, when an employee accesses a file a in an enterprise folder, the employee finds that the file a has a problem and needs to be modified, and wants to synchronize modified data of the file a into hard-connected files of all the files a. The employee requests authorization of the user with the highest authority of the file A, and after authorization, the authority for synchronizing the modified data of the file A to the hard connection file is obtained. And the enterprise network disk acquires the modification data of the employee to the file A and synchronizes the modification data to all the hard connection files of the file A. Therefore, the updated content in the file A can be obtained by checking the hard connection file of the file A in the virtual folder, and the file access efficiency in the enterprise network disk is improved.
In one example, after the data synchronization right is given to the second user, as shown in fig. 6, the method further includes:
step 601: and responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification.
Step 602: and determining the modified data of the second target file according to the snapshot information.
Step 603: and synchronizing the modified data to a file corresponding to the second target file in the enterprise folder and all hard-connected files corresponding to the file.
Likewise, in this example, the second user may be an enterprise network disk user accessing the virtual folder, including the administrator of the virtual folder.
In one application scenario, file a in an enterprise folder requires multiple employees of a team to complete together. In response to an administrator authorization instruction from the file A, the enterprise network disk stores the hard-connected file of the file A into a virtual folder of a plurality of employees, and gives the data synchronization authority of the hard-connected file of the file A in the enterprise folder to the employees. After any employee (i.e., a second user) participating in the file modification modifies and saves the data of the hard-connected file of the file a in the virtual folder, the enterprise network disk acquires snapshot information of the employee after modifying the data of the hard-connected file and determines modified data, and synchronizes the modified data to the file a and all other hard-connected files of the file a. The modification data of the hard connection file by each employee is synchronized, so that the common modification and information synchronization of the files by a plurality of employees are realized, and the working efficiency of the enterprise file collaborative management in the enterprise network disk is improved.
In one example, in order to implement the file management method, the present disclosure also provides a file management apparatus, where the apparatus is applied to an enterprise network disk, and the enterprise network disk includes an enterprise folder, as shown in fig. 7, the apparatus includes:
a creating module 701, configured to create a virtual folder in response to a creation request of a first user;
a storage module 702, configured to, in response to a first authorization request of a first user, obtain a first target file from an enterprise folder, and store the first target file in a virtual folder;
the files in the virtual folder have multiple authority types;
the interaction module 703 is configured to send a third authorization request to the first user in response to a second authorization request for the second user to obtain a target permission of a second target file in the virtual folder, so as to request the first user to authorize the target permission of the second target file;
and the authorization module 704 is configured to, in response to the authorization instruction of the first user, assign the target authority of the second target file to the second user.
In an example, the interaction module 703 receives a first authorization request of a first user, where the first authorization request is used to request that a first target file in an enterprise folder is stored in a virtual folder, and obtain a target permission of the first target file; the interaction module 703 responds to the first authorization request, and sends a fourth authorization request to the highest-authority user of the first target file, so as to request the highest-authority user to authorize the target authority of the first target file;
the storage module 702 responds to an authorization instruction of a user with the highest authority to acquire a hard connection file of a first target file and store the hard connection file into a virtual folder;
authorization module 704 assigns the target permission of the first target file to the first user.
The storage module 702 obtains a hard connection file of the first target file and stores the hard connection file into the virtual folder, and the authorization module 704 gives the target authority of the first target file to the first user, and the hard connection file and the authorization module can be executed simultaneously, or the storage module 702 is executed first and then the authorization module 704 is executed, or the authorization module 704 is executed first and then the storage module 702 is executed.
In one example, when obtaining the hard-wired file of the first target file to be stored in the virtual folder, the storage module 702 is further configured to obtain the file data, the index node, and the storage path of the first target file; establishing a hard connection file of a first target file according to the file data and the index node; and saving the hard connection file into the virtual folder according to the storage path.
In one example, the permission types for files in the enterprise folder and the permission types for files in the virtual folder include: sharing rights, downloading rights, deleting rights, uploading rights and/or data synchronization rights.
As shown in fig. 8, the apparatus further includes a data acquisition module 705, a data determination module 706, and a data synchronization module 707.
In one example, the authorization module 704 is further configured to assign data synchronization rights to a second user, respectively:
the data obtaining module 705 is configured to obtain snapshot information after data modification of a second target file in the virtual folder in response to a data synchronization instruction of a second user for the second target file;
a data determining module 706, configured to determine modification data of the second target file according to the snapshot information;
and a data synchronization module 707, configured to synchronize the modified data to a file in the enterprise folder corresponding to the second target file.
In one example, authorization module 704 is further configured to assign data synchronization rights for a particular file in an enterprise folder to any user, and accordingly:
the data obtaining module 705 is further configured to respond to a data synchronization instruction of any user for a specific file, and obtain snapshot information of the specific file after data modification;
the data determining module 706 is further configured to determine modification data of the specific file according to the snapshot information;
the data synchronization module 707 is also used to synchronize the modified data to all of the hard-wired files corresponding to a particular file.
In one example, the authorization module 704 is further configured to assign data synchronization rights to a second user, respectively:
the data obtaining module 705 is further configured to obtain snapshot information after data modification of a second target file in the virtual folder in response to a data synchronization instruction of the second user for the second target file;
the data determining module 706 is further configured to determine modification data of the second target file according to the snapshot information;
the data synchronization module 707 is further configured to synchronize the modified data to a file in the enterprise folder corresponding to the second target file and all hard-connected files corresponding to the file.
The file management device disclosed by the disclosure is characterized in that one or more virtual folders are arranged in an enterprise network disk, and a first target file is obtained from the enterprise folder and stored in the virtual folder in response to a request of a manager of the virtual folders, so that the corresponding authority of the first target file is also transferred to the manager (namely a first user) of the virtual folders, and the manager of the virtual folders can continuously transfer the target authority of a second target file in the virtual folders to other users of the enterprise network disk. Therefore, based on the enterprise network disk containing the virtual folder, the file authority can be released layer by layer, the condition that each user accessing the file needs to request authorization from the user with the highest authority of the file is avoided, and the file access efficiency in the enterprise network disk is improved.
According to an embodiment of the present disclosure, the present disclosure also provides an electronic device and a readable storage medium.
FIG. 9 illustrates a schematic block diagram of an example electronic device 900 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not intended to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 9, the apparatus 900 includes a computing unit 901 which can perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM) 902 or a computer program loaded from a storage unit 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data required for the operation of the device 900 can also be stored. The calculation unit 901, ROM 902, and RAM 903 are connected to each other via a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
A number of components in the device 900 are connected to the I/O interface 905, including: an input unit 906 such as a keyboard, a mouse, and the like; an output unit 907 such as various types of displays, speakers, and the like; a storage unit 908 such as a magnetic disk, optical disk, or the like; and a communication unit 909 such as a network card, a modem, a wireless communication transceiver, and the like. The communication unit 909 allows the device 900 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 901 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 901 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 901 performs the respective methods and processes described above, such as a file management method. For example, in some embodiments, the file management method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 908. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 900 via ROM 902 and/or communications unit 909. When the computer program is loaded into RAM 903 and executed by computing unit 901, one or more steps of the file management methods described above may be performed. Alternatively, in other embodiments, the computing unit 901 may be configured to perform the file management method in any other suitable way (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present disclosure, "a plurality" means two or more unless specifically limited otherwise.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (9)

1. A file management method is applied to an enterprise network disk, wherein the enterprise network disk comprises enterprise folders, and the method comprises the following steps:
in response to a creation request of a first user, creating a virtual folder;
responding to a first authorization request of the first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder;
the files in the virtual folder have multiple permission types;
responding to a second authorization request of a second user for obtaining the target authority of a second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file;
responding to an authorization instruction of the first user, and giving the target authority of the second target file to the second user;
the obtaining a first target file from the enterprise folder in response to the first authorization request of the first user, and storing the first target file in the virtual folder includes:
receiving a first authorization request of the first user, wherein the first authorization request is used for requesting to store a first target file in the enterprise folder into a virtual folder and acquiring a target authority of the first target file;
responding to the first authorization request, and sending a fourth authorization request to a highest-authority user of the first target file to request the highest-authority user to authorize the target authority of the first target file;
and responding to the authorization instruction of the user with the highest authority, acquiring the hard connection file of the first target file, storing the hard connection file into the virtual folder, and giving the target authority of the first target file to the first user.
2. The method of claim 1, wherein obtaining the hard-wired file of the first target file for storage in the virtual folder comprises:
acquiring file data, index nodes and storage paths of the first target file;
creating a hard connection file of the first target file according to the file data and the index node;
and saving the hard connection file into the virtual folder according to the storage path.
3. The method of claim 1, wherein the permission types for the files in the enterprise folder and the permission types for the files in the virtual folder comprise: sharing rights, downloading rights, deleting rights, uploading rights and/or data synchronization rights.
4. The method of claim 3, wherein after assigning the data synchronization right to the second user, the method further comprises:
responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification;
determining modified data of the second target file according to the snapshot information;
and synchronizing the modified data to the file corresponding to the second target file in the enterprise folder.
5. The method of claim 3, wherein after any user obtains the data synchronization permission for a particular file in the enterprise folder, the method further comprises:
responding to a data synchronization instruction of any user to the specific file, and acquiring snapshot information of the specific file after data modification;
determining modification data of the specific file according to the snapshot information;
synchronizing the modification data to all hard-wired files corresponding to the particular file.
6. The method of claim 3, wherein after assigning the data synchronization right to the second user, the method further comprises:
responding to a data synchronization instruction of a second user to a second target file in the virtual folder, and acquiring snapshot information of the second target file after data modification;
determining modified data of the second target file according to the snapshot information;
and synchronizing the modified data to the file corresponding to the second target file in the enterprise folder and all the hard connection files corresponding to the file.
7. A file management apparatus, wherein the apparatus is applied to an enterprise network disk, and an enterprise folder is included in the enterprise network disk, the apparatus comprising:
the creating module is used for responding to a creating request of a first user and creating a virtual folder;
the storage module is used for responding to a first authorization request of the first user, acquiring a first target file from the enterprise folder, and storing the first target file into the virtual folder;
the files in the virtual folder have multiple permission types;
the interaction module is used for responding to a second authorization request of a second user for acquiring the target authority of a second target file in the virtual folder, and sending a third authorization request to the first user to request the first user to authorize the target authority of the second target file;
the authorization module is used for responding to an authorization instruction of the first user and endowing the target authority of the second target file to the second user;
the interaction module is further used for receiving a first authorization request of the first user, wherein the first authorization request is used for requesting to store a first target file in the enterprise folder into the virtual folder and acquiring a target authority of the first target file; the interaction module also responds to the first authorization request, and sends a fourth authorization request to the highest-authority user of the first target file so as to request the highest-authority user to authorize the target authority of the first target file;
the storage module also responds to an authorization instruction of a user with the highest authority to acquire a hard connection file of the first target file and store the hard connection file into the virtual folder; the authorization module is further configured to assign a target permission of the first target file to the first user.
8. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
9. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method according to any one of claims 1-6.
CN202210571603.1A 2022-05-25 2022-05-25 File management method and device, electronic equipment and storage medium Active CN114676093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210571603.1A CN114676093B (en) 2022-05-25 2022-05-25 File management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210571603.1A CN114676093B (en) 2022-05-25 2022-05-25 File management method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114676093A CN114676093A (en) 2022-06-28
CN114676093B true CN114676093B (en) 2022-09-02

Family

ID=82079490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210571603.1A Active CN114676093B (en) 2022-05-25 2022-05-25 File management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114676093B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444139A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 File management method, device, equipment and storage medium
CN114003963A (en) * 2021-12-30 2022-02-01 天津联想协同科技有限公司 Method, system, network disk and storage medium for file authorization under enterprise network disk
CN114385091A (en) * 2022-03-24 2022-04-22 天津联想协同科技有限公司 Method and device for realizing network disk drive character, network disk and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030131314A1 (en) * 2002-01-04 2003-07-10 Lin Pin Feng Method of open selected files by converting paths of the files into addresses
US7937328B2 (en) * 2006-06-01 2011-05-03 International Business Machines Corporation Digital rights management
US11341256B2 (en) * 2019-01-24 2022-05-24 Hewlett Packard Enterprise Development Lp File expiration based on user metadata
CN111475469B (en) * 2020-03-19 2021-12-14 中山大学 Virtual file system-based small file storage optimization system in KUBERNETES user mode application
CN113923178B (en) * 2021-09-30 2024-02-27 在秀网络科技(深圳)有限公司 Method and system for storing and extracting instant messaging and group data files
CN114417413A (en) * 2022-01-20 2022-04-29 上海简苏网络科技有限公司 File processing method, device, equipment and medium of block chain file system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444139A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 File management method, device, equipment and storage medium
CN114003963A (en) * 2021-12-30 2022-02-01 天津联想协同科技有限公司 Method, system, network disk and storage medium for file authorization under enterprise network disk
CN114385091A (en) * 2022-03-24 2022-04-22 天津联想协同科技有限公司 Method and device for realizing network disk drive character, network disk and storage medium

Also Published As

Publication number Publication date
CN114676093A (en) 2022-06-28

Similar Documents

Publication Publication Date Title
US11985192B2 (en) Synchronized content library
US10291704B2 (en) Networked solutions integration using a cloud business object broker
US7783737B2 (en) System and method for managing supply of digital content
US10235047B2 (en) Memory management method, apparatus, and system
EP3314469B1 (en) Cloud-native documents integrated with legacy tools
WO2019047976A1 (en) Network file management method, terminal and computer readable storage medium
US20170153909A1 (en) Methods and Devices for Acquiring Data Using Virtual Machine and Host Machine
CN110633046A (en) Storage method and device of distributed system, storage equipment and storage medium
CN113806300A (en) Data storage method, system, device, equipment and storage medium
CN113761552A (en) Access control method, device, system, server and storage medium
US11157456B2 (en) Replication of data in a distributed file system using an arbiter
CN108459910A (en) A kind of method and apparatus for deleting resource
US11429311B1 (en) Method and system for managing requests in a distributed system
US9460179B1 (en) Systems and methods for providing adaptive visualization of synchronization of multiple files
CN114676093B (en) File management method and device, electronic equipment and storage medium
KR20120073799A (en) Data synchronizing and servicing apparatus and method based on cloud storage
JP2021513137A (en) Data migration in a tiered storage management system
CN115617802A (en) Method and device for quickly generating full snapshot, electronic equipment and storage medium
CN110196683A (en) A kind of method, apparatus, terminal device and the medium of operation control
US11121981B1 (en) Optimistically granting permission to host computing resources
CN113051244A (en) Data access method and device, and data acquisition method and device
CN111782634A (en) Data distributed storage method and device, electronic equipment and storage medium
KR101754713B1 (en) Asymmetric distributed file system, apparatus and method for distribution of computation
CN116010364B (en) Method and device for updating network disk file state, network disk and storage medium
US9961132B2 (en) Placing a user account in escrow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant