CN104283875B - Cloud disk right management method - Google Patents

Cloud disk right management method Download PDF

Info

Publication number
CN104283875B
CN104283875B CN201410508852.1A CN201410508852A CN104283875B CN 104283875 B CN104283875 B CN 104283875B CN 201410508852 A CN201410508852 A CN 201410508852A CN 104283875 B CN104283875 B CN 104283875B
Authority
CN
China
Prior art keywords
user
authentication
file
share
base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410508852.1A
Other languages
Chinese (zh)
Other versions
CN104283875A (en
Inventor
须成忠
沈慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ZHONGKEWU SOFTWARE Co Ltd
Original Assignee
SHENZHEN ZHONGKEWU SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ZHONGKEWU SOFTWARE Co Ltd filed Critical SHENZHEN ZHONGKEWU SOFTWARE Co Ltd
Priority to CN201410508852.1A priority Critical patent/CN104283875B/en
Publication of CN104283875A publication Critical patent/CN104283875A/en
Application granted granted Critical
Publication of CN104283875B publication Critical patent/CN104283875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

A kind of cloud disk right management method, the cloud disk right management method is logined to publish and is authenticated to user's, file download, shared etc. are authenticated, whether investigation has permission progress, and this is operated, the management method is provided with five modules, and five modules are the authentication cache database of user authentication module, document authentication module, API authentication modules, data authentication operations module and bottom;Authentication cache database root according to the authentication operation of different task frequency, required identifying code, subscriber-coded id information during using MySQL storage user authentication modules, the keyword needed for API authentication modules, i.e., subscriber-coded ID and IP combination, to support fast searching operation are stored using Redis.

Description

Cloud disk right management method
【Technical field】
The present invention relates to internet on-line storage technical field, more particularly to file can be stored, be accessed, it is standby The cloud disk right management method of the operation such as part, shared.
【Background technology】
In Internet era, cloud disk has become a kind of on-line storage mode of main flow, and user can be directly by browsing Device carries out the storage of file, accesss, backup, the file management facilities such as shares.Especially, for family's cloud disk, used due to different The operating right of family and different files is different, therefore needs to weigh the interface interchange of user, file and bottom layer by layer Certification is limited, to ensure that the authority of user avoids the injection of leak.
In traditional WEB exploitations, in order to pack RPC (Remote Procedure Call) request application XML-RPC skills Art, but XML-RPC can only use limited data type species and some simple data structures.It is existing relatively common Another technology SOAP, is opened based on Simple Object Access Protocol (SOAP, Simple Object Access Protocol) The cloud disk Rights Management System of hair, is that a kind of structural data based on XML is exchanged, it can bind with multiple transport protocols, Including:HTTP (HTTP), Simple Mail Transfer protocol (SMTP), it is partial to facing movament, strictly regulates And standard, including things, the various aspects of safety, emphasize the separation of operating method and operation object.It should be developed based on SOAP Although cloud disk rights management system can meet the purview certification requirement for having stablized business, soap protocol belongs to complicated association View, it is difficult to give full play to the caching capabilities of HTTP in itself.
Enterprise SOA (Service Oriented Architecture, SOA) and cloud computing are current industrial quarters Two fields all paid special attention to academia, the two is provided to provide network service, realizes the shared of resource, only But the granularity of service is different with level.Current SOA standard technique and agreement mainly includes Simple Object Access Protocol SOAP, web service description language (the Web Services Description Language, WSDL), Web service business Processing performs language (Web Services Bus iness Proeess Execution Language, WS-BPEL) etc., It is that the Web service based on remote procedure call (Remote procedure Call, RPC) formula have ignored web and rely successful weight The property wanted -- it is simple.Existing web services are reconstructed REST thoughts, as a kind of emerging technology, start in the industry cycle and learn Art circle is by more and more extensive concern.
Web service realization based on SOAP etc. is the remote procedure call on HTTP.So doing makes HTTP turn into use In the agreement for transmitting huge XML loads, and really description information is in XML, and final service becomes too complex, it is difficult to adjust Examination.REST is the framework style of distributed hyper-media system, in distributed hypermedia, text, hyperlink, audio and other Multimedia resource is stored on network, interconnects .REST styles framework using hyperlink it is meant that the operation to data is believed (Get, Head, put, Delete, Post) is ceased all in HTTP method;The framework of resourceoriented is it is meant that client is to service The information which data of device are operated is all in URI.The two combines very powerful, by the first row of HTTP request just Can basic understanding client what to do, the remainder of HTTP request is that have can for the frameworks of detail resourceorienteds The feature of addressability, stateless row, connective and unified interface.
【The content of the invention】
The present invention proposes a kind of front end using Jersey frameworks establishment RESTful Web for case above Services, has devised and embodied the authentication framework to many-sided purview certification such as user, file, calling interface, for difference The additions and deletions that the bottom distributed document of family's cloud disk carries out safety are changed to look into wait and operated by service authority.
Cloud disk right management method involved in the present invention is logined to publish and is authenticated to user's, to file download, altogether Enjoy etc. and to be authenticated, whether investigation has permission progress this operation, the management method is provided with five modules, and five modules are User authentication module, document authentication module, API authentication modules, the authentication cache database of data authentication operations module and bottom; Authentication cache database root according to the authentication operation of different task frequency, using MySQL store user authentication module when it is required The information such as identifying code, subscriber-coded ID, store the keyword needed for API authentication modules using Redis, i.e., subscriber-coded ID and IP combinations etc., to support fast searching operation.
User authentication module authenticating step is:1st, into login interface;2nd, user name, password and identifying code are inputted;3、 Whether judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter and judge user cipher It is whether correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
Document authentication module authentication step is:Layout data collection;Divide resource;Design URI;
API authentication module authenticating steps are:Each foreground transmission interface call instruction, is required for examining the user to this API's calls authority, by judging that (userid is distributed to user to user's logon information in authentication cache database with when logging in Token) whether match as foundation;
The implementation process of data authentication operations module is as follows:
1st, realize by needing the value for the user email for obtaining coding id, user email Hash character string and setting Expired time, is user's distribution ID.
2nd, the ID that allocated user is obtained by the email of user value is realized.
3rd, realize that being combined as user by the coding ID and IP address of user distributes token number Token.
4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized.
5th, realize and matched by coding ID and the IP combination of user with the Token of user, determine whether that certification is used Family.
6th, the combination KEY and user Token of ID and IP in authentication cache database additions and deletions reconfiguration mouthful are realized.
The authentication method of wherein described API authentication modules mainly includes following two implementations:1st, first by calling IsValidateUser interfaces come whether certification user is legal, and according to ID, system distributes to the order of user when user logs in Board and IP address are matched with user's logon information of authentication cache database, if it is determined that then returning to True works for validated user For identifier, disabled user returns to False indications;2nd, request IP is obtained secondly by getIpAddr interfaces are called, i.e., The request request sent by client asks come calling interface, finally returns to the Ip addresses of request, should to return to server Answer.
Wherein layout data collection, the data set owner of document authentication module will include, filename, file ID, file father node ID, file path;Resource is divided, file permission management table is disposable resource, i.e., can only obtain the resource, it is impossible to change and delete Remove, to be deleted file, share only by that could be performed after rights management certification;URI is designed, if base address { base } is http://localhost:8001/, then the URI designs of document authentication module are as follows:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download
The entrance of all about file-sharing certification request, the list of identifications of additional difference in functionality are identified with share catalogues Such as share_files represents shared file, and cancel_share represents to cancel shared, and public represents open shared file Deng, will to the shared authentication operation Information encapsulation of file in URI, with the different operating of different ID of trace route path file-sharings please Ask.
Document authentication module needs to examine the authority to file operation of user, and shared password by setting file etc. Mode ensures to protect file, can be by the basic of file in addition because the download access concurrency of file is little Information is equally stored in MySQL database with the essential information of user.
The application system that LDA (Lab of Da-cent&Comp-Arc) family data center relies on for the present invention, wherein, Purview certification framework needs to realize from the access control object carry out rights management such as file, database table, by authority definition Onto the operation rank of module, by big function rather than by division of operations module.After user enters certain module, performing , it is necessary to obtain authority set of the user to the module during certain operation, judge whether the user possesses the authority of the operation.Now, examine Consider user's operation different on website and may result in frequently purview certification, it is therefore necessary to which authentication information is put in consideration May quick storage medium in, with avoid because excessive I/O operation and caused by delay.
Due to cloud disk, main business operation is exactly that additions and deletions change and looked into itself, and easily, and REST is emphasized towards money abstract resource Source, REST framework styles can be used with abstract for resource by only requiring the object of operation.REST(REpresentational State Transfer) architecture mode, because each user and file in family's cloud disk can abstract be resource, distribution one Individual URI and its correspondence.Meanwhile, in REST use unified interface process resource, with database CRUD operation (Create, Read, Update and Delete) as, REST resources can be handled with POST, GET, PUT and DELETE.And each REST requests It is isolated, required full detail is contained in request.REST supports different communication data formats, and the system is mainly used JSON forms carry out data transmission.Because bottom is distributed file system, cluster is all without the concern for context and session Keep, greatly improve the scalability of system.
Therefore the scalability of system is greatly improved by the way of RESTful Web.
The present invention, based on RESTful Web architecture modes, proposes that one kind is directed to mainly in combination with the business need of family's Dropbox The certificate scheme of the many-side purview certification such as user, file, calling interface, is realized for different business authority, to family's cloud The additions and deletions of the bottom distributed document progress safety of disk, which change, looks into.
【Brief description of the drawings】
Fig. 1 is the Organization Chart of cloud disk management method of the present invention;
Fig. 2 is user authentication module flow chart of the present invention.
【Embodiment】
Cloud disk right management method of the present invention is carried out below in conjunction with the drawings and specific embodiments of the present invention further Detailed description.
Accompanying drawing 1 is refer to, the Organization Chart of cloud disk management method is illustrated therein is, the present invention proposes one for case above Plant front end and RESTful Web Services are created using Jersey frameworks, have devised and embodied to user, file, calling interface Deng the authentication framework of many-sided purview certification, for different business authority, the bottom distributed document of family's cloud disk is pacified Full additions and deletions, which change, the operation such as looks into.
Cloud disk right management method involved in the present invention is logined to publish and is authenticated to user's, to file download, altogether Enjoy etc. and to be authenticated, whether investigation has permission progress this operation, the management method is provided with five modules, and five modules are User authentication module, document authentication module, API authentication modules, the authentication cache database of data authentication operations module and bottom; Authentication cache database root according to the authentication operation of different task frequency, using MySQL store user authentication module when it is required The information such as identifying code, subscriber-coded ID, store the keyword needed for API authentication modules using Redis, i.e., subscriber-coded ID and IP combinations etc., to support fast searching operation.
Wherein user authentication module is a pith in Rights Management System, and it is required to realize keeper couple The management of user, is to control Rights Management System the system tool that the main body of resource is effectively managed.According to need Ask, the analysis of operation flow and family data centring system, the table structure of user authentication management is as follows, by the wound for storing user Build the date, subscriber mailbox, ID, password, token, the essential information such as identifying code identifies different user and its status information.
The present invention is according to REST body framework styles and RESTful Web Services design procedure, with reference to the system Demand, subscriber management function required service will be implemented according to the following steps.
Layout data collection, the data set owner of user right authentication module will include, user name, password, mailbox, token etc. its His user profile.
Resource is divided, user authentication management table is disposable resource, i.e., can only obtain the resource, it is impossible to modification and deletion, It can only be operated by user basic information and logging in for user logs off operation to influence it;Or unique user resource can be by System manager is created, changed, deleted.
URI is designed, that is, acts on domain information, the function of organization domain information by the way of path variable expression layers structure, if Base address { base } is http://localhost:8001/, then the URI designs of user authentication module are referred to concrete case It is as follows:
(1) identifying code is obtained:{base}/auth/pre_login
(2) user logs in:{base}/auth/login
(3) check and log in:{base}/auth/checL_login
(4) log off:{base}/auth/log_out
(5) new password is set:{base}/auth/forget_password
The entrance of all about user authentication request is identified with auth catalogues, the list of identifications of additional difference in functionality is for example Pre_login for application identifying code, login be user log in, by the authentication operation Information encapsulation of user in URI, with The different operating request of ID of trace route path user's debarkation authentication.
Specific authenticating step refer to accompanying drawing 2, and authenticating step is:1st, into login interface;2nd, user name, password are inputted And identifying code;Whether the 3rd, judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter Judge whether user cipher is correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
User authentication module is mainly the essential information of verification user, by a large amount of repetitive requests of the input of identifying code and cruelly Situations such as power is accessed, is the user distribution token of successful log, in order to carry out authority judgement to user's finishing operations.
Document authentication module:The most crucial resource in family data center is exactly file, and each user or user's group can To be uploaded and shared resource in cloud disk.Looked into if changing to the additions and deletions of file without authentication operation, it is likely that cause the thing of file Manage layer loss and uniformity is damaged.Therefore document authentication module is also the not retrievable pith of the system one.
The step of realizing of document authentication module is:
Wherein layout data collection, the data set owner of document authentication module will include, filename, file ID, file father node ID, file path;Resource is divided, file permission management table is disposable resource, i.e., can only obtain the resource, it is impossible to change and delete Remove, to be deleted file, share only by that could be performed after rights management certification;URI is designed, if base address { base } is http://localhost:8001/, then the URI designs of document authentication module are as follows:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download
The entrance of all about file-sharing certification request, the list of identifications of additional difference in functionality are identified with share catalogues Such as share_files represents shared file, and cancel_share represents to cancel shared, and public represents open shared file Deng, will to the shared authentication operation Information encapsulation of file in URI, with the different operating of different ID of trace route path file-sharings please Ask.
Document authentication module needs to examine the authority to file operation of user, and shared password by setting file etc. Mode ensures to protect file, can be by the basic of file in addition because the download access concurrency of file is little Information is equally stored in MySQL database with the essential information of user.
API authentication module authenticating steps are:Each foreground transmission interface call instruction, is required for examining the user to this API's calls authority, by judging that (userid is distributed to user to user's logon information in authentication cache database with when logging in Token) whether match as foundation;
The authentication method of wherein described API authentication modules mainly includes following two implementations:1st, first by calling IsValidateUser interfaces come whether certification user is legal, and according to ID, system distributes to the order of user when user logs in Board and IP address are matched with user's logon information of authentication cache database, if it is determined that then returning to True works for validated user For identifier, disabled user returns to False indications;2nd, request IP is obtained secondly by getIpAddr interfaces are called, i.e., The request request sent by client asks come calling interface, finally returns to the Ip addresses of request, should to return to server Answer.
The implementation process of data authentication operations module is as follows:
1st, realize by needing the value for the user email for obtaining coding id, user email Hash character string and setting Expired time, is user's distribution ID.
2nd, the ID that allocated user is obtained by the email of user value is realized.
3rd, realize that being combined as user by the coding ID and IP address of user distributes token number Token.
4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized.
5th, realize and matched by coding ID and the IP combination of user with the Token of user, determine whether that certification is used Family.
6th, the combination KEY and user Token of ID and IP in authentication cache database additions and deletions reconfiguration mouthful are realized.
Be served by and the additions and deletions that database carries out data of background system change to look into and just had by data authentication operations module Body is realized, including to the former table established model of data, the read-write to MySQL database and is written and read operation to Redis databases.
The framework of the present invention uses RESTfuL Web modes, and stateless request can be answered by any available server, special Not Shi Yongyu bottom be distributed file system cloud computing environment.Whole cloud disk Governance framework is by user, file resource simultaneously Specific design has been carried out to the framework of authentication service, resource model, identifying procedure, expression layer according to Reslful technical requirements And realization, quick access is realized, system is using http protocol externally exposure service, and client need to be only by browser can be just Frequentation is asked.In addition, by virtualizing,
Server resource is carried out maximized processing and optimized by distributed frame, it is ensured that provide efficient IO and highly reliable Service, with good autgmentability and reliability.
It is described above, only it is present pre-ferred embodiments, any formal limitation not is made to the present invention, although The present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any those skilled in the art, Do not depart from the range of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalent The equivalent embodiment of change, as long as being, without departing from technical solution of the present invention content, to refer to implement to more than according to the technology of the present invention Any simple modification, equivalent variations and modification that example is made, are belonged in the range of technical solution of the present invention.

Claims (2)

1. a kind of cloud disk right management method, it is characterised in that the cloud disk right management method publishes progress to logining for user Certification, to file download, it is shared be authenticated, whether investigation has permission progress this operation, and the management method is provided with five Module, five modules are user authentication module, document authentication module, API authentication modules, data authentication operations module and bottom Authentication cache database;Authentication cache database root is stored using MySQL and used according to the frequency of the authentication operation of different task Identifying code, subscriber-coded id information needed for the authentication module of family, the keyword needed for API authentication modules are stored using Redis, i.e., Subscriber-coded ID and IP combination, to support fast searching operation;
Wherein user authentication module authenticating step is:1st, into login interface;2nd, user name, password and identifying code are inputted;3、 Whether judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter and judge user cipher It is whether correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
Wherein document authentication module authentication step is:Layout data collection;Divide resource;Design URI;
Wherein API authentication modules authenticating step is:Each foreground transmission interface call instruction, is required for examining the user to this Whether API's calls authority, matched as foundation by the user's logon information judged in authentication cache database, user logs in letter Breath includes userid and the token of user is distributed to when logging in;
The implementation process of wherein data authentication operations module is as follows:1st, realize by needing to obtain the user email's for encoding id Value, user email Hash character string and the expired time of setting are user's distribution ID;2nd, realization passes through the email's of user Value obtains the ID of allocated user;3rd, realize that being combined as user by the coding ID and IP address of user distributes token number Token;4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized;5th, realize by user's Coding ID and IP combinations are matched with the Token of user, determine whether certification user;6th, authentication cache database is realized In ID and IP combination KEY and user Token additions and deletions reconfiguration mouthful;
Layout data collection in this document authentication module:The data set owner of document authentication module will include, filename, file ID, File father node ID, file path;Division resource therein:File permission management table is disposable resource, i.e., can only obtain this Resource, it is impossible to modification and deletion, to be deleted file, shares only by that could be performed after rights management certification;Its In design URI:If base address { base } is http://localhost:8001/, then document authentication module URI design such as Under:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download.
2. cloud disk right management method according to claim 1, it is characterised in that the certification of wherein described API authentication modules Method mainly includes following two implementations:1st, first by calling whether isValidateUser interfaces close come certification user Method, according to ID, system is distributed to the user of the token and IP address and authentication cache database of user and stepped on when user logs in Land information is matched, if it is determined that then returning to True as identifier for validated user, disabled user returns to False signs Symbol;2nd, request IP, i.e., the request request sent by client is obtained secondly by getIpAddr interfaces are called to adjust With interface requests, the Ip addresses of request are finally returned to, to return to server response.
CN201410508852.1A 2014-09-28 2014-09-28 Cloud disk right management method Active CN104283875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410508852.1A CN104283875B (en) 2014-09-28 2014-09-28 Cloud disk right management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410508852.1A CN104283875B (en) 2014-09-28 2014-09-28 Cloud disk right management method

Publications (2)

Publication Number Publication Date
CN104283875A CN104283875A (en) 2015-01-14
CN104283875B true CN104283875B (en) 2017-09-12

Family

ID=52258358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410508852.1A Active CN104283875B (en) 2014-09-28 2014-09-28 Cloud disk right management method

Country Status (1)

Country Link
CN (1) CN104283875B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767731B (en) * 2015-03-12 2017-11-03 江苏中天科技软件技术有限公司 A kind of Restful move transactions system identity certification means of defence
CN105072135B (en) * 2015-09-02 2018-11-30 中国地质大学(武汉) A kind of the authorization method for authenticating and system of cloud file-sharing
CN105260656B (en) * 2015-09-06 2019-02-19 浪潮(北京)电子信息产业有限公司 A kind of api interface authority control method and system
NL2017032B1 (en) * 2016-06-23 2018-01-19 Mindyourpass Holding B V Password generation device and password verification device
CN109154829B (en) * 2016-09-27 2022-02-08 深圳市大疆创新科技有限公司 Component and user management of UAV systems
CN106778350A (en) * 2016-12-29 2017-05-31 郑州云海信息技术有限公司 A kind of right management method and system based on filename
CN106973048B (en) * 2017-03-21 2020-05-08 南京云创大数据科技股份有限公司 Method for safely and quickly storing intelligent hardware equipment data on public cloud service platform
CN107547658A (en) * 2017-09-27 2018-01-05 国云科技股份有限公司 A kind of centralized cloud storage platform distributes the method with being connected cloud disk automatically
CN107948259A (en) * 2017-11-14 2018-04-20 郑州云海信息技术有限公司 A kind of collocation method of Cloud Server resource and configuration system
CN108023893A (en) * 2017-12-18 2018-05-11 王松山 A kind of method of block chain data recognizing system
CN108173857A (en) * 2017-12-29 2018-06-15 佛山市幻云科技有限公司 Instrument management method, apparatus, server and system
CN108512824B (en) * 2018-01-20 2020-10-16 福建省数字福建云计算运营有限公司 Management method of home cloud files and mobile terminal
CN108259609B (en) * 2018-01-20 2020-10-16 福建省数字福建云计算运营有限公司 Family cloud data management method and cloud server
CN108984415A (en) * 2018-07-26 2018-12-11 郑州云海信息技术有限公司 A kind of product use-case persistence maintenance system and management method
CN108989332A (en) * 2018-08-14 2018-12-11 安徽云才信息技术有限公司 A kind of user authen method based on Redis
TWI696932B (en) * 2018-11-14 2020-06-21 中華電信股份有限公司 System for providing multi-authentication management in a multi-tenant environment and method thereof
CN113703691B (en) * 2021-10-29 2022-03-25 成都市奇点软件有限公司 Virtual cloud disk method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710630A (en) * 2012-05-29 2012-10-03 新华网股份有限公司 Cloud upload and download method and system of multi-threaded slice
CN103384198A (en) * 2013-06-03 2013-11-06 华中科技大学 User identity identification service method and system on basis of mailbox
CN103533006A (en) * 2012-07-06 2014-01-22 中兴通讯股份有限公司 United cloud disk client, server, system and united cloud disk service method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710630A (en) * 2012-05-29 2012-10-03 新华网股份有限公司 Cloud upload and download method and system of multi-threaded slice
CN103533006A (en) * 2012-07-06 2014-01-22 中兴通讯股份有限公司 United cloud disk client, server, system and united cloud disk service method
CN103384198A (en) * 2013-06-03 2013-11-06 华中科技大学 User identity identification service method and system on basis of mailbox

Also Published As

Publication number Publication date
CN104283875A (en) 2015-01-14

Similar Documents

Publication Publication Date Title
CN104283875B (en) Cloud disk right management method
KR102041941B1 (en) Multi-tenant identity and data security management cloud service
JP7304449B2 (en) Data management for multi-tenant identity cloud services
CN111801923B (en) Replication of resource types and schema metadata for multi-tenant identity cloud services
JP7018437B2 (en) Multi-tenant identity and data security management Tenant and service management for cloud services
US10567364B2 (en) Preserving LDAP hierarchy in a SCIM directory using special marker groups
JP2019164794A (en) Single sign-on and single log-out function for multi-tenant identity and data security management cloud service
CN110557975A (en) Tenant data comparison for multi-tenant identity cloud services
US9864755B2 (en) Systems for associating an online file folder with a uniform resource locator
JP2021528722A (en) Integration of Declarative Third Party Identity Providers for Multitenant Identity Cloud Services
JP2022521655A (en) Tenant Replication Bootstrap for Multitenant Identity Cloud Services
JP2019531534A (en) Tenant self-service troubleshooting for multi-tenant identity and data security management cloud services
Guo et al. Building the polargrid portal using web 2.0 and opensocial
CN115705435A (en) Data processing method, device, equipment and medium for cloud service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant