CN104283875B - Cloud disk right management method - Google Patents
Cloud disk right management method Download PDFInfo
- Publication number
- CN104283875B CN104283875B CN201410508852.1A CN201410508852A CN104283875B CN 104283875 B CN104283875 B CN 104283875B CN 201410508852 A CN201410508852 A CN 201410508852A CN 104283875 B CN104283875 B CN 104283875B
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- file
- share
- base
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Abstract
A kind of cloud disk right management method, the cloud disk right management method is logined to publish and is authenticated to user's, file download, shared etc. are authenticated, whether investigation has permission progress, and this is operated, the management method is provided with five modules, and five modules are the authentication cache database of user authentication module, document authentication module, API authentication modules, data authentication operations module and bottom;Authentication cache database root according to the authentication operation of different task frequency, required identifying code, subscriber-coded id information during using MySQL storage user authentication modules, the keyword needed for API authentication modules, i.e., subscriber-coded ID and IP combination, to support fast searching operation are stored using Redis.
Description
【Technical field】
The present invention relates to internet on-line storage technical field, more particularly to file can be stored, be accessed, it is standby
The cloud disk right management method of the operation such as part, shared.
【Background technology】
In Internet era, cloud disk has become a kind of on-line storage mode of main flow, and user can be directly by browsing
Device carries out the storage of file, accesss, backup, the file management facilities such as shares.Especially, for family's cloud disk, used due to different
The operating right of family and different files is different, therefore needs to weigh the interface interchange of user, file and bottom layer by layer
Certification is limited, to ensure that the authority of user avoids the injection of leak.
In traditional WEB exploitations, in order to pack RPC (Remote Procedure Call) request application XML-RPC skills
Art, but XML-RPC can only use limited data type species and some simple data structures.It is existing relatively common
Another technology SOAP, is opened based on Simple Object Access Protocol (SOAP, Simple Object Access Protocol)
The cloud disk Rights Management System of hair, is that a kind of structural data based on XML is exchanged, it can bind with multiple transport protocols,
Including:HTTP (HTTP), Simple Mail Transfer protocol (SMTP), it is partial to facing movament, strictly regulates
And standard, including things, the various aspects of safety, emphasize the separation of operating method and operation object.It should be developed based on SOAP
Although cloud disk rights management system can meet the purview certification requirement for having stablized business, soap protocol belongs to complicated association
View, it is difficult to give full play to the caching capabilities of HTTP in itself.
Enterprise SOA (Service Oriented Architecture, SOA) and cloud computing are current industrial quarters
Two fields all paid special attention to academia, the two is provided to provide network service, realizes the shared of resource, only
But the granularity of service is different with level.Current SOA standard technique and agreement mainly includes Simple Object Access Protocol
SOAP, web service description language (the Web Services Description Language, WSDL), Web service business
Processing performs language (Web Services Bus iness Proeess Execution Language, WS-BPEL) etc.,
It is that the Web service based on remote procedure call (Remote procedure Call, RPC) formula have ignored web and rely successful weight
The property wanted -- it is simple.Existing web services are reconstructed REST thoughts, as a kind of emerging technology, start in the industry cycle and learn
Art circle is by more and more extensive concern.
Web service realization based on SOAP etc. is the remote procedure call on HTTP.So doing makes HTTP turn into use
In the agreement for transmitting huge XML loads, and really description information is in XML, and final service becomes too complex, it is difficult to adjust
Examination.REST is the framework style of distributed hyper-media system, in distributed hypermedia, text, hyperlink, audio and other
Multimedia resource is stored on network, interconnects .REST styles framework using hyperlink it is meant that the operation to data is believed
(Get, Head, put, Delete, Post) is ceased all in HTTP method;The framework of resourceoriented is it is meant that client is to service
The information which data of device are operated is all in URI.The two combines very powerful, by the first row of HTTP request just
Can basic understanding client what to do, the remainder of HTTP request is that have can for the frameworks of detail resourceorienteds
The feature of addressability, stateless row, connective and unified interface.
【The content of the invention】
The present invention proposes a kind of front end using Jersey frameworks establishment RESTful Web for case above
Services, has devised and embodied the authentication framework to many-sided purview certification such as user, file, calling interface, for difference
The additions and deletions that the bottom distributed document of family's cloud disk carries out safety are changed to look into wait and operated by service authority.
Cloud disk right management method involved in the present invention is logined to publish and is authenticated to user's, to file download, altogether
Enjoy etc. and to be authenticated, whether investigation has permission progress this operation, the management method is provided with five modules, and five modules are
User authentication module, document authentication module, API authentication modules, the authentication cache database of data authentication operations module and bottom;
Authentication cache database root according to the authentication operation of different task frequency, using MySQL store user authentication module when it is required
The information such as identifying code, subscriber-coded ID, store the keyword needed for API authentication modules using Redis, i.e., subscriber-coded ID and
IP combinations etc., to support fast searching operation.
User authentication module authenticating step is:1st, into login interface;2nd, user name, password and identifying code are inputted;3、
Whether judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter and judge user cipher
It is whether correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
Document authentication module authentication step is:Layout data collection;Divide resource;Design URI;
API authentication module authenticating steps are:Each foreground transmission interface call instruction, is required for examining the user to this
API's calls authority, by judging that (userid is distributed to user to user's logon information in authentication cache database with when logging in
Token) whether match as foundation;
The implementation process of data authentication operations module is as follows:
1st, realize by needing the value for the user email for obtaining coding id, user email Hash character string and setting
Expired time, is user's distribution ID.
2nd, the ID that allocated user is obtained by the email of user value is realized.
3rd, realize that being combined as user by the coding ID and IP address of user distributes token number Token.
4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized.
5th, realize and matched by coding ID and the IP combination of user with the Token of user, determine whether that certification is used
Family.
6th, the combination KEY and user Token of ID and IP in authentication cache database additions and deletions reconfiguration mouthful are realized.
The authentication method of wherein described API authentication modules mainly includes following two implementations:1st, first by calling
IsValidateUser interfaces come whether certification user is legal, and according to ID, system distributes to the order of user when user logs in
Board and IP address are matched with user's logon information of authentication cache database, if it is determined that then returning to True works for validated user
For identifier, disabled user returns to False indications;2nd, request IP is obtained secondly by getIpAddr interfaces are called, i.e.,
The request request sent by client asks come calling interface, finally returns to the Ip addresses of request, should to return to server
Answer.
Wherein layout data collection, the data set owner of document authentication module will include, filename, file ID, file father node
ID, file path;Resource is divided, file permission management table is disposable resource, i.e., can only obtain the resource, it is impossible to change and delete
Remove, to be deleted file, share only by that could be performed after rights management certification;URI is designed, if base address
{ base } is http://localhost:8001/, then the URI designs of document authentication module are as follows:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download
The entrance of all about file-sharing certification request, the list of identifications of additional difference in functionality are identified with share catalogues
Such as share_files represents shared file, and cancel_share represents to cancel shared, and public represents open shared file
Deng, will to the shared authentication operation Information encapsulation of file in URI, with the different operating of different ID of trace route path file-sharings please
Ask.
Document authentication module needs to examine the authority to file operation of user, and shared password by setting file etc.
Mode ensures to protect file, can be by the basic of file in addition because the download access concurrency of file is little
Information is equally stored in MySQL database with the essential information of user.
The application system that LDA (Lab of Da-cent&Comp-Arc) family data center relies on for the present invention, wherein,
Purview certification framework needs to realize from the access control object carry out rights management such as file, database table, by authority definition
Onto the operation rank of module, by big function rather than by division of operations module.After user enters certain module, performing
, it is necessary to obtain authority set of the user to the module during certain operation, judge whether the user possesses the authority of the operation.Now, examine
Consider user's operation different on website and may result in frequently purview certification, it is therefore necessary to which authentication information is put in consideration
May quick storage medium in, with avoid because excessive I/O operation and caused by delay.
Due to cloud disk, main business operation is exactly that additions and deletions change and looked into itself, and easily, and REST is emphasized towards money abstract resource
Source, REST framework styles can be used with abstract for resource by only requiring the object of operation.REST(REpresentational
State Transfer) architecture mode, because each user and file in family's cloud disk can abstract be resource, distribution one
Individual URI and its correspondence.Meanwhile, in REST use unified interface process resource, with database CRUD operation (Create, Read,
Update and Delete) as, REST resources can be handled with POST, GET, PUT and DELETE.And each REST requests
It is isolated, required full detail is contained in request.REST supports different communication data formats, and the system is mainly used
JSON forms carry out data transmission.Because bottom is distributed file system, cluster is all without the concern for context and session
Keep, greatly improve the scalability of system.
Therefore the scalability of system is greatly improved by the way of RESTful Web.
The present invention, based on RESTful Web architecture modes, proposes that one kind is directed to mainly in combination with the business need of family's Dropbox
The certificate scheme of the many-side purview certification such as user, file, calling interface, is realized for different business authority, to family's cloud
The additions and deletions of the bottom distributed document progress safety of disk, which change, looks into.
【Brief description of the drawings】
Fig. 1 is the Organization Chart of cloud disk management method of the present invention;
Fig. 2 is user authentication module flow chart of the present invention.
【Embodiment】
Cloud disk right management method of the present invention is carried out below in conjunction with the drawings and specific embodiments of the present invention further
Detailed description.
Accompanying drawing 1 is refer to, the Organization Chart of cloud disk management method is illustrated therein is, the present invention proposes one for case above
Plant front end and RESTful Web Services are created using Jersey frameworks, have devised and embodied to user, file, calling interface
Deng the authentication framework of many-sided purview certification, for different business authority, the bottom distributed document of family's cloud disk is pacified
Full additions and deletions, which change, the operation such as looks into.
Cloud disk right management method involved in the present invention is logined to publish and is authenticated to user's, to file download, altogether
Enjoy etc. and to be authenticated, whether investigation has permission progress this operation, the management method is provided with five modules, and five modules are
User authentication module, document authentication module, API authentication modules, the authentication cache database of data authentication operations module and bottom;
Authentication cache database root according to the authentication operation of different task frequency, using MySQL store user authentication module when it is required
The information such as identifying code, subscriber-coded ID, store the keyword needed for API authentication modules using Redis, i.e., subscriber-coded ID and
IP combinations etc., to support fast searching operation.
Wherein user authentication module is a pith in Rights Management System, and it is required to realize keeper couple
The management of user, is to control Rights Management System the system tool that the main body of resource is effectively managed.According to need
Ask, the analysis of operation flow and family data centring system, the table structure of user authentication management is as follows, by the wound for storing user
Build the date, subscriber mailbox, ID, password, token, the essential information such as identifying code identifies different user and its status information.
The present invention is according to REST body framework styles and RESTful Web Services design procedure, with reference to the system
Demand, subscriber management function required service will be implemented according to the following steps.
Layout data collection, the data set owner of user right authentication module will include, user name, password, mailbox, token etc. its
His user profile.
Resource is divided, user authentication management table is disposable resource, i.e., can only obtain the resource, it is impossible to modification and deletion,
It can only be operated by user basic information and logging in for user logs off operation to influence it;Or unique user resource can be by
System manager is created, changed, deleted.
URI is designed, that is, acts on domain information, the function of organization domain information by the way of path variable expression layers structure, if
Base address { base } is http://localhost:8001/, then the URI designs of user authentication module are referred to concrete case
It is as follows:
(1) identifying code is obtained:{base}/auth/pre_login
(2) user logs in:{base}/auth/login
(3) check and log in:{base}/auth/checL_login
(4) log off:{base}/auth/log_out
(5) new password is set:{base}/auth/forget_password
The entrance of all about user authentication request is identified with auth catalogues, the list of identifications of additional difference in functionality is for example
Pre_login for application identifying code, login be user log in, by the authentication operation Information encapsulation of user in URI, with
The different operating request of ID of trace route path user's debarkation authentication.
Specific authenticating step refer to accompanying drawing 2, and authenticating step is:1st, into login interface;2nd, user name, password are inputted
And identifying code;Whether the 3rd, judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter
Judge whether user cipher is correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
User authentication module is mainly the essential information of verification user, by a large amount of repetitive requests of the input of identifying code and cruelly
Situations such as power is accessed, is the user distribution token of successful log, in order to carry out authority judgement to user's finishing operations.
Document authentication module:The most crucial resource in family data center is exactly file, and each user or user's group can
To be uploaded and shared resource in cloud disk.Looked into if changing to the additions and deletions of file without authentication operation, it is likely that cause the thing of file
Manage layer loss and uniformity is damaged.Therefore document authentication module is also the not retrievable pith of the system one.
The step of realizing of document authentication module is:
Wherein layout data collection, the data set owner of document authentication module will include, filename, file ID, file father node
ID, file path;Resource is divided, file permission management table is disposable resource, i.e., can only obtain the resource, it is impossible to change and delete
Remove, to be deleted file, share only by that could be performed after rights management certification;URI is designed, if base address
{ base } is http://localhost:8001/, then the URI designs of document authentication module are as follows:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download
The entrance of all about file-sharing certification request, the list of identifications of additional difference in functionality are identified with share catalogues
Such as share_files represents shared file, and cancel_share represents to cancel shared, and public represents open shared file
Deng, will to the shared authentication operation Information encapsulation of file in URI, with the different operating of different ID of trace route path file-sharings please
Ask.
Document authentication module needs to examine the authority to file operation of user, and shared password by setting file etc.
Mode ensures to protect file, can be by the basic of file in addition because the download access concurrency of file is little
Information is equally stored in MySQL database with the essential information of user.
API authentication module authenticating steps are:Each foreground transmission interface call instruction, is required for examining the user to this
API's calls authority, by judging that (userid is distributed to user to user's logon information in authentication cache database with when logging in
Token) whether match as foundation;
The authentication method of wherein described API authentication modules mainly includes following two implementations:1st, first by calling
IsValidateUser interfaces come whether certification user is legal, and according to ID, system distributes to the order of user when user logs in
Board and IP address are matched with user's logon information of authentication cache database, if it is determined that then returning to True works for validated user
For identifier, disabled user returns to False indications;2nd, request IP is obtained secondly by getIpAddr interfaces are called, i.e.,
The request request sent by client asks come calling interface, finally returns to the Ip addresses of request, should to return to server
Answer.
The implementation process of data authentication operations module is as follows:
1st, realize by needing the value for the user email for obtaining coding id, user email Hash character string and setting
Expired time, is user's distribution ID.
2nd, the ID that allocated user is obtained by the email of user value is realized.
3rd, realize that being combined as user by the coding ID and IP address of user distributes token number Token.
4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized.
5th, realize and matched by coding ID and the IP combination of user with the Token of user, determine whether that certification is used
Family.
6th, the combination KEY and user Token of ID and IP in authentication cache database additions and deletions reconfiguration mouthful are realized.
Be served by and the additions and deletions that database carries out data of background system change to look into and just had by data authentication operations module
Body is realized, including to the former table established model of data, the read-write to MySQL database and is written and read operation to Redis databases.
The framework of the present invention uses RESTfuL Web modes, and stateless request can be answered by any available server, special
Not Shi Yongyu bottom be distributed file system cloud computing environment.Whole cloud disk Governance framework is by user, file resource simultaneously
Specific design has been carried out to the framework of authentication service, resource model, identifying procedure, expression layer according to Reslful technical requirements
And realization, quick access is realized, system is using http protocol externally exposure service, and client need to be only by browser can be just
Frequentation is asked.In addition, by virtualizing,
Server resource is carried out maximized processing and optimized by distributed frame, it is ensured that provide efficient IO and highly reliable
Service, with good autgmentability and reliability.
It is described above, only it is present pre-ferred embodiments, any formal limitation not is made to the present invention, although
The present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any those skilled in the art,
Do not depart from the range of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalent
The equivalent embodiment of change, as long as being, without departing from technical solution of the present invention content, to refer to implement to more than according to the technology of the present invention
Any simple modification, equivalent variations and modification that example is made, are belonged in the range of technical solution of the present invention.
Claims (2)
1. a kind of cloud disk right management method, it is characterised in that the cloud disk right management method publishes progress to logining for user
Certification, to file download, it is shared be authenticated, whether investigation has permission progress this operation, and the management method is provided with five
Module, five modules are user authentication module, document authentication module, API authentication modules, data authentication operations module and bottom
Authentication cache database;Authentication cache database root is stored using MySQL and used according to the frequency of the authentication operation of different task
Identifying code, subscriber-coded id information needed for the authentication module of family, the keyword needed for API authentication modules are stored using Redis, i.e.,
Subscriber-coded ID and IP combination, to support fast searching operation;
Wherein user authentication module authenticating step is:1st, into login interface;2nd, user name, password and identifying code are inputted;3、
Whether judge input is empty;4th, it is no, then enter and judge whether input validation code is correct;5th, it is correct, then enter and judge user cipher
It is whether correct;6th, it is correct, then Displaying legal user corresponding authority;7th, into system;
Wherein document authentication module authentication step is:Layout data collection;Divide resource;Design URI;
Wherein API authentication modules authenticating step is:Each foreground transmission interface call instruction, is required for examining the user to this
Whether API's calls authority, matched as foundation by the user's logon information judged in authentication cache database, user logs in letter
Breath includes userid and the token of user is distributed to when logging in;
The implementation process of wherein data authentication operations module is as follows:1st, realize by needing to obtain the user email's for encoding id
Value, user email Hash character string and the expired time of setting are user's distribution ID;2nd, realization passes through the email's of user
Value obtains the ID of allocated user;3rd, realize that being combined as user by the coding ID and IP address of user distributes token number
Token;4th, the token number that allocated user is obtained by the coding ID and IP address of user is realized;5th, realize by user's
Coding ID and IP combinations are matched with the Token of user, determine whether certification user;6th, authentication cache database is realized
In ID and IP combination KEY and user Token additions and deletions reconfiguration mouthful;
Layout data collection in this document authentication module:The data set owner of document authentication module will include, filename, file ID,
File father node ID, file path;Division resource therein:File permission management table is disposable resource, i.e., can only obtain this
Resource, it is impossible to modification and deletion, to be deleted file, shares only by that could be performed after rights management certification;Its
In design URI:If base address { base } is http://localhost:8001/, then document authentication module URI design such as
Under:
(1) shared file:{base}/share/share_files
(2) file-sharing is cancelled:{base}/share/cancel_share
(3) shared file is downloaded:{base}/share/update_idcode
(4) open shared file:{base}/share/public
(5) file is downloaded:{base}/share/downloadFile
(6) file type is checked:{base}/share/checkType
(7) batch downloads file:{base}/share/package_download.
2. cloud disk right management method according to claim 1, it is characterised in that the certification of wherein described API authentication modules
Method mainly includes following two implementations:1st, first by calling whether isValidateUser interfaces close come certification user
Method, according to ID, system is distributed to the user of the token and IP address and authentication cache database of user and stepped on when user logs in
Land information is matched, if it is determined that then returning to True as identifier for validated user, disabled user returns to False signs
Symbol;2nd, request IP, i.e., the request request sent by client is obtained secondly by getIpAddr interfaces are called to adjust
With interface requests, the Ip addresses of request are finally returned to, to return to server response.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410508852.1A CN104283875B (en) | 2014-09-28 | 2014-09-28 | Cloud disk right management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410508852.1A CN104283875B (en) | 2014-09-28 | 2014-09-28 | Cloud disk right management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104283875A CN104283875A (en) | 2015-01-14 |
CN104283875B true CN104283875B (en) | 2017-09-12 |
Family
ID=52258358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410508852.1A Active CN104283875B (en) | 2014-09-28 | 2014-09-28 | Cloud disk right management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104283875B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767731B (en) * | 2015-03-12 | 2017-11-03 | 江苏中天科技软件技术有限公司 | A kind of Restful move transactions system identity certification means of defence |
CN105072135B (en) * | 2015-09-02 | 2018-11-30 | 中国地质大学(武汉) | A kind of the authorization method for authenticating and system of cloud file-sharing |
CN105260656B (en) * | 2015-09-06 | 2019-02-19 | 浪潮(北京)电子信息产业有限公司 | A kind of api interface authority control method and system |
NL2017032B1 (en) * | 2016-06-23 | 2018-01-19 | Mindyourpass Holding B V | Password generation device and password verification device |
CN109154829B (en) * | 2016-09-27 | 2022-02-08 | 深圳市大疆创新科技有限公司 | Component and user management of UAV systems |
CN106778350A (en) * | 2016-12-29 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of right management method and system based on filename |
CN106973048B (en) * | 2017-03-21 | 2020-05-08 | 南京云创大数据科技股份有限公司 | Method for safely and quickly storing intelligent hardware equipment data on public cloud service platform |
CN107547658A (en) * | 2017-09-27 | 2018-01-05 | 国云科技股份有限公司 | A kind of centralized cloud storage platform distributes the method with being connected cloud disk automatically |
CN107948259A (en) * | 2017-11-14 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of collocation method of Cloud Server resource and configuration system |
CN108023893A (en) * | 2017-12-18 | 2018-05-11 | 王松山 | A kind of method of block chain data recognizing system |
CN108173857A (en) * | 2017-12-29 | 2018-06-15 | 佛山市幻云科技有限公司 | Instrument management method, apparatus, server and system |
CN108512824B (en) * | 2018-01-20 | 2020-10-16 | 福建省数字福建云计算运营有限公司 | Management method of home cloud files and mobile terminal |
CN108259609B (en) * | 2018-01-20 | 2020-10-16 | 福建省数字福建云计算运营有限公司 | Family cloud data management method and cloud server |
CN108984415A (en) * | 2018-07-26 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of product use-case persistence maintenance system and management method |
CN108989332A (en) * | 2018-08-14 | 2018-12-11 | 安徽云才信息技术有限公司 | A kind of user authen method based on Redis |
TWI696932B (en) * | 2018-11-14 | 2020-06-21 | 中華電信股份有限公司 | System for providing multi-authentication management in a multi-tenant environment and method thereof |
CN113703691B (en) * | 2021-10-29 | 2022-03-25 | 成都市奇点软件有限公司 | Virtual cloud disk method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710630A (en) * | 2012-05-29 | 2012-10-03 | 新华网股份有限公司 | Cloud upload and download method and system of multi-threaded slice |
CN103384198A (en) * | 2013-06-03 | 2013-11-06 | 华中科技大学 | User identity identification service method and system on basis of mailbox |
CN103533006A (en) * | 2012-07-06 | 2014-01-22 | 中兴通讯股份有限公司 | United cloud disk client, server, system and united cloud disk service method |
-
2014
- 2014-09-28 CN CN201410508852.1A patent/CN104283875B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710630A (en) * | 2012-05-29 | 2012-10-03 | 新华网股份有限公司 | Cloud upload and download method and system of multi-threaded slice |
CN103533006A (en) * | 2012-07-06 | 2014-01-22 | 中兴通讯股份有限公司 | United cloud disk client, server, system and united cloud disk service method |
CN103384198A (en) * | 2013-06-03 | 2013-11-06 | 华中科技大学 | User identity identification service method and system on basis of mailbox |
Also Published As
Publication number | Publication date |
---|---|
CN104283875A (en) | 2015-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104283875B (en) | Cloud disk right management method | |
KR102041941B1 (en) | Multi-tenant identity and data security management cloud service | |
JP7304449B2 (en) | Data management for multi-tenant identity cloud services | |
CN111801923B (en) | Replication of resource types and schema metadata for multi-tenant identity cloud services | |
JP7018437B2 (en) | Multi-tenant identity and data security management Tenant and service management for cloud services | |
US10567364B2 (en) | Preserving LDAP hierarchy in a SCIM directory using special marker groups | |
JP2019164794A (en) | Single sign-on and single log-out function for multi-tenant identity and data security management cloud service | |
CN110557975A (en) | Tenant data comparison for multi-tenant identity cloud services | |
US9864755B2 (en) | Systems for associating an online file folder with a uniform resource locator | |
JP2021528722A (en) | Integration of Declarative Third Party Identity Providers for Multitenant Identity Cloud Services | |
JP2022521655A (en) | Tenant Replication Bootstrap for Multitenant Identity Cloud Services | |
JP2019531534A (en) | Tenant self-service troubleshooting for multi-tenant identity and data security management cloud services | |
Guo et al. | Building the polargrid portal using web 2.0 and opensocial | |
CN115705435A (en) | Data processing method, device, equipment and medium for cloud service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |