CN106095954A - Data base management method for enterprise supply chain - Google Patents
Data base management method for enterprise supply chain Download PDFInfo
- Publication number
- CN106095954A CN106095954A CN201610424231.4A CN201610424231A CN106095954A CN 106095954 A CN106095954 A CN 106095954A CN 201610424231 A CN201610424231 A CN 201610424231A CN 106095954 A CN106095954 A CN 106095954A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- enterprise
- information
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
- G06F16/275—Synchronous replication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The invention provides a kind of data base management method for enterprise supply chain, the method includes: before accessing the data of cloud storage platform, user is carried out authentication, so that user accesses data based on rights that have been granted.The present invention proposes a kind of data base management method for enterprise supply chain, and by the data syn-chronization security mechanism of cloud storage system, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand the running status of system.
Description
Technical field
The present invention relates to data storage, particularly to a kind of data base management method for enterprise supply chain.
Background technology
Cloud computing realizes, at framework, the technology that aspect can use service to calculate, and business function is decomposed into loose coupling, unification
Standard and the service of interface, meet enterprise's rapid build and response service change, reuse original IT resource, data sharing and supply
The demand of chain business cooperation.The ERP System utilizing cloud computing technology and SOA mode construction can realize enterprise and obtain
Take shared resource, reduce IT application in enterprises cost, improve its core competitiveness in the market competition.Quick along with the Internet
Development and IT application in enterprises degree improve constantly, enterprises quickly increases with the while of diversified in business, and data are also
Increasing continuously.Meanwhile, for the cloud storage of corporate client also in vigorous growth, select to be suitable in enterprise
The data storage scheme in portion, it is ensured that the safety and stability storage of data is the important leverage of enterprise development.But existing cloud storage
Technology is the availability of different storage system constructed by enterprise, and stability and reliability are also uneven, and cannot hold concurrently
Gu Anquan and low cost.In privately owned cloud, user can define the safe class of data;But need enterprise to put into suitable one-tenth
This just can set up and keep stable operation, and carrying cost is high.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of data base for enterprise supply chain
Management method, including:
Before accessing the data of cloud storage platform, user is carried out authentication, so that user is based on the power being awarded
Limit accesses data.
Preferably, the server end of described ERM cloud storage platform includes data simultaneous module, Web server, number
According to memory module, data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein said Web server is
User is provided by browser access file and supports;Data simultaneous module is responsible for the synchronization of file, including processing the new literary composition uploaded
Part, the file after down loading updating, the renewal of client is synchronized to server;Synchronization request is sent in request queue;Number
According to structured message to be processed in memory module storage system, including the information of user, share the shared information of file, data
The storage positional information of catalogue, access registrar information;Load balancing module is provided in the application scenarios of many synchronization service request,
In the case of user concurrent number can accept number of request more than the amendment in synchronous directory and upload operation, request is distributed to difference
Processor process;Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage
Carry out storing the scheduling of position;User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification;System-monitoring module is for the network port service data related in system service, data traffic, server system operation
State, application system daily record carries out real-time monitoring and index;
The verification process of terminal use is farther included by described identity and authority authentication center: client generate one with
Machine number, then signs to it, after carrying out Hash digest, signs summary with the PKI of authentication center, is sent to
Authentication center;When authentication center receive that client sends add confidential information after, be first decrypted, the most again by the public affairs of client
Signature is verified by key;If the random number cryptographic Hash decrypted is identical with the cryptographic Hash received, then client certificate
Pass through;After authentication center decrypts random number and encrypts by client public key, the information after encryption is sent to client;Client
After end is decrypted with the private key of oneself, the random number generated with oneself compares, if the equal authentication center that is considered as closes
Method;
Described identity and authority authentication center includes cipher key management unit, license management unit, license validation unit;
Cipher key management unit provides key escrow and encryption key to provide service for license management unit, disposes key on the server
Data base, as the Database Systems concentrated, provides for cipher key management unit, license management unit, license validation unit
Unified DBM, periodically carries out data backup;License management unit is responsible for distribution management licence;License validation
Unit is responsible for realizing licence application, examination & verification business;Described license validation unit is additionally based upon directory service, to service application system
The user of system provides Unified Identity to differentiate and unification user mandate;Catalogue in directory service include ID catalogue, certification directory and
Resource TOC, ID catalogue storage identity and management strategy information, storage has from whole user data of enterprise data source and each
Application system ID data;Certification directory provides the information needed for authenticating user identification, storage user authentication, is the son of ID catalogue
Collection;Resource TOC is used for storing comprehensive user group framework, authorizing the information such as role;In Resource TOC, information is according to type
Storing classifiedly, store enterprise customer, department, user organizes data.
The present invention compared to existing technology, has the advantage that
The present invention proposes a kind of data base management method for enterprise supply chain, same by the data of cloud storage system
Step security mechanism, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand system
The running status of system.
Accompanying drawing explanation
Fig. 1 is the flow chart of the data base management method for enterprise supply chain according to embodiments of the present invention.
Detailed description of the invention
Hereafter provide retouching in detail one or more embodiment of the present invention together with the accompanying drawing of the diagram principle of the invention
State.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.The scope of the present invention is only by right
Claim limits, and the present invention contains many replacements, amendment and equivalent.Illustrate in the following description many details with
Thorough understanding of the present invention is just provided.These details are provided for exemplary purposes, and without in these details
Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of data base management method for enterprise supply chain.Fig. 1 is according to this
The data base management method flow chart for enterprise supply chain of bright embodiment.
The present invention allows the position of enterprise's self-defining data storage according to ERM cloud storage platform, critical data is deposited
Data, in enterprise's cloud storage, are dispatched between public cloud storage and enterprise's cloud storage by storage according to the change of business demand.Enterprise
The user in portion synchronizes and shares file easily in the industry, and enterprise administrator can also intuitively understand the running status of system.
For cloud platform server end, including data simultaneous module, Web server, data memory module, data dispatch draws
Hold up, identity and authority authentication center and system-monitoring module;For subscription client, apply including pc client application and Web.
Pc client application creates virtual disk for user, the position that carry is selected user.This virtual disk is for synchronizing user's
File, the storage of high in the clouds that the file that all users are placed under this catalogue is synchronized on server, and and the storage of server in
Hold and keep synchronized update.Web application accesses the file on server by webpage.
The Web server of server end is to provide support for user by browser access file.Data simultaneous module is born
The synchronization of duty file, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to service
Device.Synchronization request being sent in request queue, in distributed environment, idle processing server takes from request queue
Return hospitality and seek Message Processing result and result is returned.Structured message to be processed in data memory module storage system, including
The information of user, shares the shared information of file, the storage positional information of data directory, access registrar information.Load balance mould
Block is provided in the application scenarios of many synchronization service request.Amendment and upload operation in user concurrent number is more than synchronous directory can
In the case of accepting number of request, request is distributed to different processors and processes.Use at the machine-processed concentration of request queue
The demand of reason transaction distribution.Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage
Carry out storing the scheduling of position.User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification.System-monitoring module is for the network port service data related in system service, data traffic, server system operation
State, application system daily record carries out real-time monitoring and index.
In data synchronization process, client runs synchronized process, and this synchronized process detects client by monitoring thread
Change under synchronous directory, once user stores ERM file, then trigger synchronized process and server carries out the same of file
Step.The change of file is submitted in local cache by synchronized process by user;Synchronized process downloads this data mesh from server
The high in the clouds of record is cached to this locality, if having other user or same user to use other client to have updated the interior of server
Holding, this high in the clouds caching contains the renewal of this part;This locality that the high in the clouds caching of download is merged into this locality is delayed by synchronized process
In depositing, so local branch also comprises the content updated on server;Local cache is uploaded and is merged into service by synchronized process
The high in the clouds caching of device, such server just has on the caching of high in the clouds the update content of this user.Index file is used to be buffered in
The timestamp that each file in workflow is submitted to for the last time, by timestamp relatively judge which update be recently
Once submit on carry out.Then use incompatible lock mechanism to guarantee that only one of which client is more newly requested can successfully be held
OK, then pointing out other client and update unsuccessfully, the client of unsuccessful renewal re-starts above-mentioned renewal operating process.At weight
During newly carrying out, the client of unsuccessful renewal by up-to-date update to merge all then oneself branch is updating to clothes
In business device.
For cloud platform server, it runs management by synchronization process and accepts the request that data syn-chronization is relevant, then please
Asking and be sent in request queue, the request of taking out from request queue of idle synchronization process process also processes request, updates affairs
State, and the last result of process being returned to ask user.The request that client sends contains the certification phase of user
Pass information, the resource storage position of request, the operation of request.First pass through the conjunction to the request of monitoring of the identity and authority authentication center
Method, if a new request and solicited message are legal, server is by the information record of user in a session;Checking please
After the legitimacy asked, more newly requested state, if illegal, the information of authentification failure is returned to requesting client.As
Really certification is passed through, and the most newly-built one processes affairs, adds the resource information of request in affairs, the storage position of resource, request
The title of ID, the relevant information of request data catalogue.Including title, higher level's object, the operation information of request.The initialization of affairs
After having worked, affairs are just joined in request request queue by task manager, wait that transaction processor processes.
Data memory module safeguards data directory information table, which stores the essential information of data directory, including being stored in
Which position of cloud storage, corresponding ID title and Container Name, if for shared data directory, the ID of higher level's data directory.
According to the hierarchy nesting relation of tissue data directory, only update this hierarchical relationship when data directory is carried out transfer operation.Number
Also safeguard shared information table according to memory module, have recorded owner and sharer's information of data directory.When user shares one
The when that data directory giving other user, create simultaneously token authorize its user shared to be accessed by this token and
File content in amendment share directory.
Data dispatch includes between public cloud and enterprise's cloud storage, and the data transfer of high in the clouds and user side.Initially
To put into after transaction format in scheduling queue when of changing affairs, scheduling queue is the queue of serialized data scheduling affairs.
The predefined order of affairs trigger initializes affairs, and affairs are carried out according to the granularity of container.Token is taken out from data base
Access authority information, then puts into the transaction information of JSON form in scheduling queue.Data dispatch is taken out from scheduling queue
Affairs, according to affairs details, from corresponding container, download data to be dispatched, and leave this ephemeral data in one
Under individual temp directory of the same name, in corresponding enterprise's cloud storage or in public cloud storage, create container of the same name, under then inciting somebody to action
The file data carried all uploads in this container, and the state of recording dispatching data in data base.If all data
All uploading and the most then increase a record newly and pass flag is set to true, if there being uploading of failure, terminating uploading affairs
And the pass flag of the data dispatch transaction journal of this container is set to false.It is empty and thing in scheduling data queue
In the case of business processor all free time, the transaction journal table of scanning volatile data base, by failed dispatching record taking-up and according to
The logic initialization affairs same with affairs trigger, are melted into transaction format JSON form and put into scheduling after initializing successfully
In data queue, re-execute the scheduling affairs of these failures, until the scheduling of data is successfully completed, by correspondence in data base
Record is updated to successfully.The record granularity of scheduling data message record is depending on container, if the data dispatch affairs of container
Failure, then re-execute all of data dispatch of this container.
Identity and authority authentication center arranges agency at entrance, is to use public cloud storage also according to the object judgement of request
It is that enterprise's cloud storage is authenticated.Storing for public cloud, the access for the data of a container comprises two parts, and one is
The container owner access to this container data, one is the non-container owner access to container.Container owner is to container
The access of data has only to provide the title of this ID and access keys.For the non-container owner access to container data, then
Using unique URI, it comprises storage resource information to be accessed, time started, expired time, control of authority information and label
Name.Prestoring the reading strategy of container, all of data under this container all inherit this reading strategy.Privately owned cloud is deposited
Storage, uses tenant, and user, the access rights of resource are authenticated by three levels of role.
For the safety of the client under cloud environment, identity and authority authentication center is carried by behavior and encryption mechanism
For multilamellar certification, behavior analysis and formation data ciphertext.First pass through authentication module and user is provided checking, then statistical module
Counting user behavior, confirms user's history safety.It is finally based on encryption encapsulation process, is converted to customer data encrypt number
According to, and it is sent to high in the clouds storage.
As follows to the verification process of terminal use: client generates a random number, then signs it, is carrying out
After Hash digest, with the PKI of authentication center, summary is signed, be sent to authentication center.When authentication center receives client
Send add confidential information after, be first decrypted, with the PKI of client, signature verified the most again.If decrypted
Random number cryptographic Hash identical with the cryptographic Hash received, then client certificate passes through.Authentication center decrypts random number and uses
After client public key encryption, the information after encryption is sent to client.After client is decrypted with the private key of oneself, with oneself
The random number that oneself generates compares, if equal, to be considered as authentication center legal.
Specifically, identity and authority authentication center includes cipher key management unit, license management unit, license validation list
Unit.Cipher key management unit provides key escrow and encryption key to provide service for license management unit, disposes on the server
Key database, as the Database Systems concentrated, for cipher key management unit, license management unit, license validation unit
Unified DBM is provided, periodically carries out data backup.License management unit is responsible for distribution management licence.Licence
Authentication unit is responsible for realizing licence application, examination & verification business.Described license validation unit is additionally based upon directory service, should to business
Unified Identity is provided to differentiate and unification user mandate with the user of system.Directory service includes ID catalogue, certification directory and resource
Catalogue, ID catalogue storage identity has the whole user data from enterprise data source and each application with management strategy information, storage
System ID data.Certification directory provides the information needed for authenticating user identification, storage user authentication, is the subset of ID catalogue.Money
Source directory is used for storing comprehensive user group framework, authorizing the information such as role.In Resource TOC, information is according to classification of type
Depositing, store enterprise customer, department, user organizes data.
Wherein, counting user behavior, confirm user's history safety, particularly as follows: (1) user sends resource accesses application,
First authentication center carries out authentication to it, if authentication failed, directly refuses its access request, and authentication is successfully used
Family transfers to statistical module to carry out user behavior certification;(2) user that statistical module query safe data base is stored currently believes
Appoint value, it is determined that its behavior safety grade, and authorize its corresponding grade of service and access rights according to safe class, if user
Its access request is then refused less than lowest service level;(3) in the access process of user, the behavior acquisition module of authentication center
Monitor the operation behavior of user in real time, obtain user behavior;(4) user behavior of acquisition is carried out standard volume by behavior processing module
Change processes;(5) by the behavior vector after standardization, it is saved in behavior database;(6) utilize behavior in behavior database to
Amount comprehensive assessment user behavior safety;(7) the credible tolerance of behavior of user's different time sections is stored in security database;
(8) the trustworthy user behavior tolerance during statistical module reads trust data storehouse, determines the safe class that user is current in real time, and is
It dynamically distributes the corresponding grade of service and operating right;(9) by the trust state Real-time Feedback of user to user, its quilt is pointed out
The access behavior authorized.
Described based on encryption encapsulation process, customer data is converted to encryption data, farther includes, by private key for user pair
Should be after community set, deciphering, the community set only having as user just can obtain when meeting access structure corresponding to this ciphertext
In plain text:
Data owner produces master key and PKI, and PKI is signed by user afterwards, is then sent out with signature by PKI
Giving server, oneself stores master key.When new user adds system, system is that the attribute of each user arranges an attribute
Collection, and generate private key for it.Then client formulates file access strategy when upper transmitting file, and system is according to current access
File is encrypted by strategy, obtains ciphertext data after encryption.When the attribute of user encryption meets access strategy, and system is just
According to decipherment algorithm, the file after encryption can be decrypted into clear data.
In sum, the present invention proposes a kind of data base management method for enterprise supply chain, by cloud storage system
The data syn-chronization security mechanism of system, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also
The running status understanding system directly perceived.
Obviously, it should be appreciated by those skilled in the art, each module of the above-mentioned present invention or each step can be with general
Calculating system realize, they can concentrate in single calculating system, or be distributed in multiple calculating system and formed
Network on, alternatively, they can realize with the executable program code of calculating system, it is thus possible to by they store
Performed by calculating system within the storage system.So, the present invention is not restricted to the combination of any specific hardware and software.
It should be appreciated that the above-mentioned detailed description of the invention of the present invention is used only for exemplary illustration or explains the present invention's
Principle, and be not construed as limiting the invention.Therefore, that is done in the case of without departing from the spirit and scope of the present invention is any
Amendment, equivalent, improvement etc., should be included within the scope of the present invention.Additionally, claims purport of the present invention
Whole within containing the equivalents falling into scope and border or this scope and border change and repair
Change example.
Claims (2)
1., for a data base management method for enterprise supply chain, it is applied to ERM cloud storage platform, it is characterised in that
Including:
Before accessing the data of cloud storage platform, user is carried out authentication, so that user comes based on rights that have been granted
Access data.
Method the most according to claim 1, it is characterised in that the server end of described ERM cloud storage platform includes
Data simultaneous module, Web server, data memory module, data dispatch engine, identity and authority authentication center and system monitoring
Module;Wherein said Web server provides support for user by browser access file;Data simultaneous module is responsible for file
Synchronize, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to server;To synchronize
Request is sent in request queue;Structured message to be processed in data memory module storage system, including the information of user,
Share the shared information of file, the storage positional information of data directory, access registrar information;Load balancing module is provided in the most same
The application scenarios of step service request, amendment and upload operation in user concurrent number is more than synchronous directory can accept number of request
In the case of, request is distributed to different processors and processes;Data dispatch engine is for civilian by data according to enterprise demand
Part carries out storing the scheduling of position in public cloud and enterprise's cloud storage;Identity and authority authentication center by user to public cloud and
The access of enterprise's cloud file carries out purview certification;System-monitoring module is for the network port service number related in system service
According to, data traffic, server system operation state, application system daily record carries out real-time monitoring and index;
The verification process of terminal use is farther included by described identity and authority authentication center: client generates one at random
Number, then signs to it, after carrying out Hash digest, signs summary with the PKI of authentication center, be sent to recognize
Card center;When authentication center receive that client sends add confidential information after, be first decrypted, the most again with the PKI of client
Signature is verified;If the random number cryptographic Hash decrypted is identical with the cryptographic Hash received, then client certificate leads to
Cross;After authentication center decrypts random number and encrypts by client public key, the information after encryption is sent to client;Client
After being decrypted with the private key of oneself, the random number generated with oneself compares, if equal, to be considered as authentication center legal;
Described identity and authority authentication center includes cipher key management unit, license management unit, license validation unit;Key
Administrative unit provides key escrow and encryption key to provide service for license management unit, disposes key data on the server
Storehouse, as the Database Systems concentrated, provides unified for cipher key management unit, license management unit, license validation unit
DBM, periodically carry out data backup;License management unit is responsible for distribution management licence;License validation unit
It is responsible for realizing licence application, examination & verification business;Described license validation unit is additionally based upon directory service, to business application system
User provides Unified Identity to differentiate and unification user mandate;Catalogue in directory service includes ID catalogue, certification directory and resource
Catalogue, ID catalogue storage identity has the whole user data from enterprise data source and each application with management strategy information, storage
System ID data;Certification directory provides the information needed for authenticating user identification, storage user authentication, is the subset of ID catalogue;Money
Source directory is used for storing comprehensive user group framework, authorizing the information such as role;In Resource TOC, information is according to classification of type
Depositing, store enterprise customer, department, user organizes data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610424231.4A CN106095954B (en) | 2016-06-14 | 2016-06-14 | Data base management method for enterprise supply chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610424231.4A CN106095954B (en) | 2016-06-14 | 2016-06-14 | Data base management method for enterprise supply chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106095954A true CN106095954A (en) | 2016-11-09 |
CN106095954B CN106095954B (en) | 2019-05-24 |
Family
ID=57846982
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610424231.4A Active CN106095954B (en) | 2016-06-14 | 2016-06-14 | Data base management method for enterprise supply chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106095954B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790148A (en) * | 2016-12-28 | 2017-05-31 | 上海优刻得信息科技有限公司 | Prevent access, output checking method and device, the auditing system of leakage of data |
CN106991302A (en) * | 2016-12-31 | 2017-07-28 | 融捷科技(武汉)有限公司 | Company's authority mandatory system based on supply chain financial service platform |
CN106993049A (en) * | 2017-04-25 | 2017-07-28 | 西安航空学院 | A kind of General Aviation enterprise operation total management system based on cloud computing |
CN107809483A (en) * | 2017-10-27 | 2018-03-16 | 大猫网络科技(北京)股份有限公司 | A kind of transaction voucher store method and device |
CN108259414A (en) * | 2016-12-28 | 2018-07-06 | 中国移动通信集团公司 | The management-control method and server of a kind of virtual resource |
CN108376154A (en) * | 2018-02-07 | 2018-08-07 | 平安普惠企业管理有限公司 | System base table synchronous method, device, computer equipment and storage medium |
CN108664634A (en) * | 2018-05-15 | 2018-10-16 | 中国平安人寿保险股份有限公司 | Data managing method, device, computer equipment and storage medium |
CN109120636A (en) * | 2018-09-07 | 2019-01-01 | 众安信息技术服务有限公司 | The method and server device that content access request is authorized |
CN109840424A (en) * | 2018-12-18 | 2019-06-04 | 合肥天源迪科信息技术有限公司 | A kind of data base encryption and the system that desensitizes |
CN110096547A (en) * | 2019-03-21 | 2019-08-06 | 深圳壹账通智能科技有限公司 | Supply synchronous method, device, computer equipment and the computer storage medium of data |
CN110311931A (en) * | 2019-08-02 | 2019-10-08 | 杭州安恒信息技术股份有限公司 | Assets automatic discovering method and device |
CN110348821A (en) * | 2019-07-19 | 2019-10-18 | 杭州物源科技有限公司 | A kind of the intelligence manufacture management system and method for combination Internet of Things |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
CN114726880A (en) * | 2022-04-12 | 2022-07-08 | 铜陵久装网络科技有限公司 | Information storage method based on cloud computing |
CN116545781A (en) * | 2023-07-06 | 2023-08-04 | 广东维信智联科技有限公司 | Cloud access data security management system |
CN116668466A (en) * | 2023-08-02 | 2023-08-29 | 北京滴普科技有限公司 | Internet-based carbon asset information cloud synchronization method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014133A (en) * | 2010-11-26 | 2011-04-13 | 清华大学 | Method for implementing safe storage system in cloud storage environment |
CN102281314A (en) * | 2011-01-30 | 2011-12-14 | 程旭 | Realization method and apparatus for high-efficient and safe data cloud storage system |
CN103326856A (en) * | 2013-05-20 | 2013-09-25 | 西北工业大学 | Cloud storage data responsibility confirmation structure and method based on two-way digital signature |
-
2016
- 2016-06-14 CN CN201610424231.4A patent/CN106095954B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014133A (en) * | 2010-11-26 | 2011-04-13 | 清华大学 | Method for implementing safe storage system in cloud storage environment |
CN102281314A (en) * | 2011-01-30 | 2011-12-14 | 程旭 | Realization method and apparatus for high-efficient and safe data cloud storage system |
CN103326856A (en) * | 2013-05-20 | 2013-09-25 | 西北工业大学 | Cloud storage data responsibility confirmation structure and method based on two-way digital signature |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259414B (en) * | 2016-12-28 | 2021-03-16 | 中国移动通信集团公司 | Virtual resource management and control method and server |
CN108259414A (en) * | 2016-12-28 | 2018-07-06 | 中国移动通信集团公司 | The management-control method and server of a kind of virtual resource |
CN106790148A (en) * | 2016-12-28 | 2017-05-31 | 上海优刻得信息科技有限公司 | Prevent access, output checking method and device, the auditing system of leakage of data |
CN106991302A (en) * | 2016-12-31 | 2017-07-28 | 融捷科技(武汉)有限公司 | Company's authority mandatory system based on supply chain financial service platform |
CN106993049A (en) * | 2017-04-25 | 2017-07-28 | 西安航空学院 | A kind of General Aviation enterprise operation total management system based on cloud computing |
CN107809483A (en) * | 2017-10-27 | 2018-03-16 | 大猫网络科技(北京)股份有限公司 | A kind of transaction voucher store method and device |
CN108376154A (en) * | 2018-02-07 | 2018-08-07 | 平安普惠企业管理有限公司 | System base table synchronous method, device, computer equipment and storage medium |
CN108664634A (en) * | 2018-05-15 | 2018-10-16 | 中国平安人寿保险股份有限公司 | Data managing method, device, computer equipment and storage medium |
CN109120636A (en) * | 2018-09-07 | 2019-01-01 | 众安信息技术服务有限公司 | The method and server device that content access request is authorized |
CN109840424A (en) * | 2018-12-18 | 2019-06-04 | 合肥天源迪科信息技术有限公司 | A kind of data base encryption and the system that desensitizes |
CN110096547A (en) * | 2019-03-21 | 2019-08-06 | 深圳壹账通智能科技有限公司 | Supply synchronous method, device, computer equipment and the computer storage medium of data |
CN110348821A (en) * | 2019-07-19 | 2019-10-18 | 杭州物源科技有限公司 | A kind of the intelligence manufacture management system and method for combination Internet of Things |
CN110311931A (en) * | 2019-08-02 | 2019-10-08 | 杭州安恒信息技术股份有限公司 | Assets automatic discovering method and device |
CN114500073A (en) * | 2022-02-11 | 2022-05-13 | 浪潮云信息技术股份公司 | User data cut-over method and system supporting privacy protection in cloud storage system |
CN114500073B (en) * | 2022-02-11 | 2024-04-12 | 浪潮云信息技术股份公司 | User data cutting method and system supporting privacy protection in cloud storage system |
CN114726880A (en) * | 2022-04-12 | 2022-07-08 | 铜陵久装网络科技有限公司 | Information storage method based on cloud computing |
CN114726880B (en) * | 2022-04-12 | 2024-04-26 | 于成龙 | Information storage method based on cloud computing |
CN116545781A (en) * | 2023-07-06 | 2023-08-04 | 广东维信智联科技有限公司 | Cloud access data security management system |
CN116545781B (en) * | 2023-07-06 | 2023-11-24 | 广东维信智联科技有限公司 | Cloud access data security management system |
CN116668466A (en) * | 2023-08-02 | 2023-08-29 | 北京滴普科技有限公司 | Internet-based carbon asset information cloud synchronization method |
CN116668466B (en) * | 2023-08-02 | 2023-10-13 | 北京滴普科技有限公司 | Internet-based carbon asset information cloud synchronization method |
Also Published As
Publication number | Publication date |
---|---|
CN106095954B (en) | 2019-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106095954B (en) | Data base management method for enterprise supply chain | |
CN106127064B (en) | Date storage method for enterprise supply chain | |
CN106127368A (en) | Date storage method for ERP System | |
CN111183426B (en) | System and method for blockchain-based notification | |
US11038891B2 (en) | Decentralized identity management system | |
US11803654B2 (en) | Integration of a block chain, managing group authority and access in an enterprise environment | |
US8554749B2 (en) | Data file access control | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
US11403417B2 (en) | Managing group authority and access to a secured file system in a decentralized environment | |
CN108805703A (en) | Right management system | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN108259422A (en) | A kind of multi-tenant access control method and device | |
US11841957B2 (en) | Implementation of a file system on a block chain | |
JP2022527375A (en) | Systems and methods for virtual distributed ledger networks | |
CN101291220B (en) | System, device and method for identity security authentication | |
JP2001202332A (en) | Authentication program managing system | |
CN114189375B (en) | Service system management method and device | |
US11954672B1 (en) | Systems and methods for cryptocurrency pool management | |
Guo et al. | A Data Security Exchange and Sharing System Construction Method and Perfomance Evaluation | |
EP1833216A1 (en) | Method and system for mediation of authentication within a communication network | |
KR20230081888A (en) | Shared data sharing method for distributed ledger system using off-chain | |
CN112214789A (en) | Ethical data processing method, block chain network and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190423 Address after: Room 435, 4th floor, 25 Lane 3399, Kangxin Road, Pudong New District, Shanghai, 201321 Applicant after: Shanghai Cotton Union Electronic Commerce Co., Ltd. Address before: 610041 3 3 Tianyi street, hi tech Zone, Chengdu, Sichuan Applicant before: Chengdu Jingjie Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |