CN106095954A - Data base management method for enterprise supply chain - Google Patents

Data base management method for enterprise supply chain Download PDF

Info

Publication number
CN106095954A
CN106095954A CN201610424231.4A CN201610424231A CN106095954A CN 106095954 A CN106095954 A CN 106095954A CN 201610424231 A CN201610424231 A CN 201610424231A CN 106095954 A CN106095954 A CN 106095954A
Authority
CN
China
Prior art keywords
data
user
enterprise
information
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610424231.4A
Other languages
Chinese (zh)
Other versions
CN106095954B (en
Inventor
郭建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Cotton Union Electronic Commerce Co., Ltd.
Original Assignee
Chengdu Jingjie Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jingjie Technology Co Ltd filed Critical Chengdu Jingjie Technology Co Ltd
Priority to CN201610424231.4A priority Critical patent/CN106095954B/en
Publication of CN106095954A publication Critical patent/CN106095954A/en
Application granted granted Critical
Publication of CN106095954B publication Critical patent/CN106095954B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • G06F16/275Synchronous replication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention provides a kind of data base management method for enterprise supply chain, the method includes: before accessing the data of cloud storage platform, user is carried out authentication, so that user accesses data based on rights that have been granted.The present invention proposes a kind of data base management method for enterprise supply chain, and by the data syn-chronization security mechanism of cloud storage system, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand the running status of system.

Description

Data base management method for enterprise supply chain
Technical field
The present invention relates to data storage, particularly to a kind of data base management method for enterprise supply chain.
Background technology
Cloud computing realizes, at framework, the technology that aspect can use service to calculate, and business function is decomposed into loose coupling, unification Standard and the service of interface, meet enterprise's rapid build and response service change, reuse original IT resource, data sharing and supply The demand of chain business cooperation.The ERP System utilizing cloud computing technology and SOA mode construction can realize enterprise and obtain Take shared resource, reduce IT application in enterprises cost, improve its core competitiveness in the market competition.Quick along with the Internet Development and IT application in enterprises degree improve constantly, enterprises quickly increases with the while of diversified in business, and data are also Increasing continuously.Meanwhile, for the cloud storage of corporate client also in vigorous growth, select to be suitable in enterprise The data storage scheme in portion, it is ensured that the safety and stability storage of data is the important leverage of enterprise development.But existing cloud storage Technology is the availability of different storage system constructed by enterprise, and stability and reliability are also uneven, and cannot hold concurrently Gu Anquan and low cost.In privately owned cloud, user can define the safe class of data;But need enterprise to put into suitable one-tenth This just can set up and keep stable operation, and carrying cost is high.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of data base for enterprise supply chain Management method, including:
Before accessing the data of cloud storage platform, user is carried out authentication, so that user is based on the power being awarded Limit accesses data.
Preferably, the server end of described ERM cloud storage platform includes data simultaneous module, Web server, number According to memory module, data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein said Web server is User is provided by browser access file and supports;Data simultaneous module is responsible for the synchronization of file, including processing the new literary composition uploaded Part, the file after down loading updating, the renewal of client is synchronized to server;Synchronization request is sent in request queue;Number According to structured message to be processed in memory module storage system, including the information of user, share the shared information of file, data The storage positional information of catalogue, access registrar information;Load balancing module is provided in the application scenarios of many synchronization service request, In the case of user concurrent number can accept number of request more than the amendment in synchronous directory and upload operation, request is distributed to difference Processor process;Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage Carry out storing the scheduling of position;User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center Certification;System-monitoring module is for the network port service data related in system service, data traffic, server system operation State, application system daily record carries out real-time monitoring and index;
The verification process of terminal use is farther included by described identity and authority authentication center: client generate one with Machine number, then signs to it, after carrying out Hash digest, signs summary with the PKI of authentication center, is sent to Authentication center;When authentication center receive that client sends add confidential information after, be first decrypted, the most again by the public affairs of client Signature is verified by key;If the random number cryptographic Hash decrypted is identical with the cryptographic Hash received, then client certificate Pass through;After authentication center decrypts random number and encrypts by client public key, the information after encryption is sent to client;Client After end is decrypted with the private key of oneself, the random number generated with oneself compares, if the equal authentication center that is considered as closes Method;
Described identity and authority authentication center includes cipher key management unit, license management unit, license validation unit; Cipher key management unit provides key escrow and encryption key to provide service for license management unit, disposes key on the server Data base, as the Database Systems concentrated, provides for cipher key management unit, license management unit, license validation unit Unified DBM, periodically carries out data backup;License management unit is responsible for distribution management licence;License validation Unit is responsible for realizing licence application, examination & verification business;Described license validation unit is additionally based upon directory service, to service application system The user of system provides Unified Identity to differentiate and unification user mandate;Catalogue in directory service include ID catalogue, certification directory and Resource TOC, ID catalogue storage identity and management strategy information, storage has from whole user data of enterprise data source and each Application system ID data;Certification directory provides the information needed for authenticating user identification, storage user authentication, is the son of ID catalogue Collection;Resource TOC is used for storing comprehensive user group framework, authorizing the information such as role;In Resource TOC, information is according to type Storing classifiedly, store enterprise customer, department, user organizes data.
The present invention compared to existing technology, has the advantage that
The present invention proposes a kind of data base management method for enterprise supply chain, same by the data of cloud storage system Step security mechanism, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand system The running status of system.
Accompanying drawing explanation
Fig. 1 is the flow chart of the data base management method for enterprise supply chain according to embodiments of the present invention.
Detailed description of the invention
Hereafter provide retouching in detail one or more embodiment of the present invention together with the accompanying drawing of the diagram principle of the invention State.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.The scope of the present invention is only by right Claim limits, and the present invention contains many replacements, amendment and equivalent.Illustrate in the following description many details with Thorough understanding of the present invention is just provided.These details are provided for exemplary purposes, and without in these details Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of data base management method for enterprise supply chain.Fig. 1 is according to this The data base management method flow chart for enterprise supply chain of bright embodiment.
The present invention allows the position of enterprise's self-defining data storage according to ERM cloud storage platform, critical data is deposited Data, in enterprise's cloud storage, are dispatched between public cloud storage and enterprise's cloud storage by storage according to the change of business demand.Enterprise The user in portion synchronizes and shares file easily in the industry, and enterprise administrator can also intuitively understand the running status of system.
For cloud platform server end, including data simultaneous module, Web server, data memory module, data dispatch draws Hold up, identity and authority authentication center and system-monitoring module;For subscription client, apply including pc client application and Web. Pc client application creates virtual disk for user, the position that carry is selected user.This virtual disk is for synchronizing user's File, the storage of high in the clouds that the file that all users are placed under this catalogue is synchronized on server, and and the storage of server in Hold and keep synchronized update.Web application accesses the file on server by webpage.
The Web server of server end is to provide support for user by browser access file.Data simultaneous module is born The synchronization of duty file, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to service Device.Synchronization request being sent in request queue, in distributed environment, idle processing server takes from request queue Return hospitality and seek Message Processing result and result is returned.Structured message to be processed in data memory module storage system, including The information of user, shares the shared information of file, the storage positional information of data directory, access registrar information.Load balance mould Block is provided in the application scenarios of many synchronization service request.Amendment and upload operation in user concurrent number is more than synchronous directory can In the case of accepting number of request, request is distributed to different processors and processes.Use at the machine-processed concentration of request queue The demand of reason transaction distribution.Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage Carry out storing the scheduling of position.User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center Certification.System-monitoring module is for the network port service data related in system service, data traffic, server system operation State, application system daily record carries out real-time monitoring and index.
In data synchronization process, client runs synchronized process, and this synchronized process detects client by monitoring thread Change under synchronous directory, once user stores ERM file, then trigger synchronized process and server carries out the same of file Step.The change of file is submitted in local cache by synchronized process by user;Synchronized process downloads this data mesh from server The high in the clouds of record is cached to this locality, if having other user or same user to use other client to have updated the interior of server Holding, this high in the clouds caching contains the renewal of this part;This locality that the high in the clouds caching of download is merged into this locality is delayed by synchronized process In depositing, so local branch also comprises the content updated on server;Local cache is uploaded and is merged into service by synchronized process The high in the clouds caching of device, such server just has on the caching of high in the clouds the update content of this user.Index file is used to be buffered in The timestamp that each file in workflow is submitted to for the last time, by timestamp relatively judge which update be recently Once submit on carry out.Then use incompatible lock mechanism to guarantee that only one of which client is more newly requested can successfully be held OK, then pointing out other client and update unsuccessfully, the client of unsuccessful renewal re-starts above-mentioned renewal operating process.At weight During newly carrying out, the client of unsuccessful renewal by up-to-date update to merge all then oneself branch is updating to clothes In business device.
For cloud platform server, it runs management by synchronization process and accepts the request that data syn-chronization is relevant, then please Asking and be sent in request queue, the request of taking out from request queue of idle synchronization process process also processes request, updates affairs State, and the last result of process being returned to ask user.The request that client sends contains the certification phase of user Pass information, the resource storage position of request, the operation of request.First pass through the conjunction to the request of monitoring of the identity and authority authentication center Method, if a new request and solicited message are legal, server is by the information record of user in a session;Checking please After the legitimacy asked, more newly requested state, if illegal, the information of authentification failure is returned to requesting client.As Really certification is passed through, and the most newly-built one processes affairs, adds the resource information of request in affairs, the storage position of resource, request The title of ID, the relevant information of request data catalogue.Including title, higher level's object, the operation information of request.The initialization of affairs After having worked, affairs are just joined in request request queue by task manager, wait that transaction processor processes.
Data memory module safeguards data directory information table, which stores the essential information of data directory, including being stored in Which position of cloud storage, corresponding ID title and Container Name, if for shared data directory, the ID of higher level's data directory. According to the hierarchy nesting relation of tissue data directory, only update this hierarchical relationship when data directory is carried out transfer operation.Number Also safeguard shared information table according to memory module, have recorded owner and sharer's information of data directory.When user shares one The when that data directory giving other user, create simultaneously token authorize its user shared to be accessed by this token and File content in amendment share directory.
Data dispatch includes between public cloud and enterprise's cloud storage, and the data transfer of high in the clouds and user side.Initially To put into after transaction format in scheduling queue when of changing affairs, scheduling queue is the queue of serialized data scheduling affairs. The predefined order of affairs trigger initializes affairs, and affairs are carried out according to the granularity of container.Token is taken out from data base Access authority information, then puts into the transaction information of JSON form in scheduling queue.Data dispatch is taken out from scheduling queue Affairs, according to affairs details, from corresponding container, download data to be dispatched, and leave this ephemeral data in one Under individual temp directory of the same name, in corresponding enterprise's cloud storage or in public cloud storage, create container of the same name, under then inciting somebody to action The file data carried all uploads in this container, and the state of recording dispatching data in data base.If all data All uploading and the most then increase a record newly and pass flag is set to true, if there being uploading of failure, terminating uploading affairs And the pass flag of the data dispatch transaction journal of this container is set to false.It is empty and thing in scheduling data queue In the case of business processor all free time, the transaction journal table of scanning volatile data base, by failed dispatching record taking-up and according to The logic initialization affairs same with affairs trigger, are melted into transaction format JSON form and put into scheduling after initializing successfully In data queue, re-execute the scheduling affairs of these failures, until the scheduling of data is successfully completed, by correspondence in data base Record is updated to successfully.The record granularity of scheduling data message record is depending on container, if the data dispatch affairs of container Failure, then re-execute all of data dispatch of this container.
Identity and authority authentication center arranges agency at entrance, is to use public cloud storage also according to the object judgement of request It is that enterprise's cloud storage is authenticated.Storing for public cloud, the access for the data of a container comprises two parts, and one is The container owner access to this container data, one is the non-container owner access to container.Container owner is to container The access of data has only to provide the title of this ID and access keys.For the non-container owner access to container data, then Using unique URI, it comprises storage resource information to be accessed, time started, expired time, control of authority information and label Name.Prestoring the reading strategy of container, all of data under this container all inherit this reading strategy.Privately owned cloud is deposited Storage, uses tenant, and user, the access rights of resource are authenticated by three levels of role.
For the safety of the client under cloud environment, identity and authority authentication center is carried by behavior and encryption mechanism For multilamellar certification, behavior analysis and formation data ciphertext.First pass through authentication module and user is provided checking, then statistical module Counting user behavior, confirms user's history safety.It is finally based on encryption encapsulation process, is converted to customer data encrypt number According to, and it is sent to high in the clouds storage.
As follows to the verification process of terminal use: client generates a random number, then signs it, is carrying out After Hash digest, with the PKI of authentication center, summary is signed, be sent to authentication center.When authentication center receives client Send add confidential information after, be first decrypted, with the PKI of client, signature verified the most again.If decrypted Random number cryptographic Hash identical with the cryptographic Hash received, then client certificate passes through.Authentication center decrypts random number and uses After client public key encryption, the information after encryption is sent to client.After client is decrypted with the private key of oneself, with oneself The random number that oneself generates compares, if equal, to be considered as authentication center legal.
Specifically, identity and authority authentication center includes cipher key management unit, license management unit, license validation list Unit.Cipher key management unit provides key escrow and encryption key to provide service for license management unit, disposes on the server Key database, as the Database Systems concentrated, for cipher key management unit, license management unit, license validation unit Unified DBM is provided, periodically carries out data backup.License management unit is responsible for distribution management licence.Licence Authentication unit is responsible for realizing licence application, examination & verification business.Described license validation unit is additionally based upon directory service, should to business Unified Identity is provided to differentiate and unification user mandate with the user of system.Directory service includes ID catalogue, certification directory and resource Catalogue, ID catalogue storage identity has the whole user data from enterprise data source and each application with management strategy information, storage System ID data.Certification directory provides the information needed for authenticating user identification, storage user authentication, is the subset of ID catalogue.Money Source directory is used for storing comprehensive user group framework, authorizing the information such as role.In Resource TOC, information is according to classification of type Depositing, store enterprise customer, department, user organizes data.
Wherein, counting user behavior, confirm user's history safety, particularly as follows: (1) user sends resource accesses application, First authentication center carries out authentication to it, if authentication failed, directly refuses its access request, and authentication is successfully used Family transfers to statistical module to carry out user behavior certification;(2) user that statistical module query safe data base is stored currently believes Appoint value, it is determined that its behavior safety grade, and authorize its corresponding grade of service and access rights according to safe class, if user Its access request is then refused less than lowest service level;(3) in the access process of user, the behavior acquisition module of authentication center Monitor the operation behavior of user in real time, obtain user behavior;(4) user behavior of acquisition is carried out standard volume by behavior processing module Change processes;(5) by the behavior vector after standardization, it is saved in behavior database;(6) utilize behavior in behavior database to Amount comprehensive assessment user behavior safety;(7) the credible tolerance of behavior of user's different time sections is stored in security database; (8) the trustworthy user behavior tolerance during statistical module reads trust data storehouse, determines the safe class that user is current in real time, and is It dynamically distributes the corresponding grade of service and operating right;(9) by the trust state Real-time Feedback of user to user, its quilt is pointed out The access behavior authorized.
Described based on encryption encapsulation process, customer data is converted to encryption data, farther includes, by private key for user pair Should be after community set, deciphering, the community set only having as user just can obtain when meeting access structure corresponding to this ciphertext In plain text:
Data owner produces master key and PKI, and PKI is signed by user afterwards, is then sent out with signature by PKI Giving server, oneself stores master key.When new user adds system, system is that the attribute of each user arranges an attribute Collection, and generate private key for it.Then client formulates file access strategy when upper transmitting file, and system is according to current access File is encrypted by strategy, obtains ciphertext data after encryption.When the attribute of user encryption meets access strategy, and system is just According to decipherment algorithm, the file after encryption can be decrypted into clear data.
In sum, the present invention proposes a kind of data base management method for enterprise supply chain, by cloud storage system The data syn-chronization security mechanism of system, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also The running status understanding system directly perceived.
Obviously, it should be appreciated by those skilled in the art, each module of the above-mentioned present invention or each step can be with general Calculating system realize, they can concentrate in single calculating system, or be distributed in multiple calculating system and formed Network on, alternatively, they can realize with the executable program code of calculating system, it is thus possible to by they store Performed by calculating system within the storage system.So, the present invention is not restricted to the combination of any specific hardware and software.
It should be appreciated that the above-mentioned detailed description of the invention of the present invention is used only for exemplary illustration or explains the present invention's Principle, and be not construed as limiting the invention.Therefore, that is done in the case of without departing from the spirit and scope of the present invention is any Amendment, equivalent, improvement etc., should be included within the scope of the present invention.Additionally, claims purport of the present invention Whole within containing the equivalents falling into scope and border or this scope and border change and repair Change example.

Claims (2)

1., for a data base management method for enterprise supply chain, it is applied to ERM cloud storage platform, it is characterised in that Including:
Before accessing the data of cloud storage platform, user is carried out authentication, so that user comes based on rights that have been granted Access data.
Method the most according to claim 1, it is characterised in that the server end of described ERM cloud storage platform includes Data simultaneous module, Web server, data memory module, data dispatch engine, identity and authority authentication center and system monitoring Module;Wherein said Web server provides support for user by browser access file;Data simultaneous module is responsible for file Synchronize, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to server;To synchronize Request is sent in request queue;Structured message to be processed in data memory module storage system, including the information of user, Share the shared information of file, the storage positional information of data directory, access registrar information;Load balancing module is provided in the most same The application scenarios of step service request, amendment and upload operation in user concurrent number is more than synchronous directory can accept number of request In the case of, request is distributed to different processors and processes;Data dispatch engine is for civilian by data according to enterprise demand Part carries out storing the scheduling of position in public cloud and enterprise's cloud storage;Identity and authority authentication center by user to public cloud and The access of enterprise's cloud file carries out purview certification;System-monitoring module is for the network port service number related in system service According to, data traffic, server system operation state, application system daily record carries out real-time monitoring and index;
The verification process of terminal use is farther included by described identity and authority authentication center: client generates one at random Number, then signs to it, after carrying out Hash digest, signs summary with the PKI of authentication center, be sent to recognize Card center;When authentication center receive that client sends add confidential information after, be first decrypted, the most again with the PKI of client Signature is verified;If the random number cryptographic Hash decrypted is identical with the cryptographic Hash received, then client certificate leads to Cross;After authentication center decrypts random number and encrypts by client public key, the information after encryption is sent to client;Client After being decrypted with the private key of oneself, the random number generated with oneself compares, if equal, to be considered as authentication center legal;
Described identity and authority authentication center includes cipher key management unit, license management unit, license validation unit;Key Administrative unit provides key escrow and encryption key to provide service for license management unit, disposes key data on the server Storehouse, as the Database Systems concentrated, provides unified for cipher key management unit, license management unit, license validation unit DBM, periodically carry out data backup;License management unit is responsible for distribution management licence;License validation unit It is responsible for realizing licence application, examination & verification business;Described license validation unit is additionally based upon directory service, to business application system User provides Unified Identity to differentiate and unification user mandate;Catalogue in directory service includes ID catalogue, certification directory and resource Catalogue, ID catalogue storage identity has the whole user data from enterprise data source and each application with management strategy information, storage System ID data;Certification directory provides the information needed for authenticating user identification, storage user authentication, is the subset of ID catalogue;Money Source directory is used for storing comprehensive user group framework, authorizing the information such as role;In Resource TOC, information is according to classification of type Depositing, store enterprise customer, department, user organizes data.
CN201610424231.4A 2016-06-14 2016-06-14 Data base management method for enterprise supply chain Active CN106095954B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610424231.4A CN106095954B (en) 2016-06-14 2016-06-14 Data base management method for enterprise supply chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610424231.4A CN106095954B (en) 2016-06-14 2016-06-14 Data base management method for enterprise supply chain

Publications (2)

Publication Number Publication Date
CN106095954A true CN106095954A (en) 2016-11-09
CN106095954B CN106095954B (en) 2019-05-24

Family

ID=57846982

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610424231.4A Active CN106095954B (en) 2016-06-14 2016-06-14 Data base management method for enterprise supply chain

Country Status (1)

Country Link
CN (1) CN106095954B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790148A (en) * 2016-12-28 2017-05-31 上海优刻得信息科技有限公司 Prevent access, output checking method and device, the auditing system of leakage of data
CN106991302A (en) * 2016-12-31 2017-07-28 融捷科技(武汉)有限公司 Company's authority mandatory system based on supply chain financial service platform
CN106993049A (en) * 2017-04-25 2017-07-28 西安航空学院 A kind of General Aviation enterprise operation total management system based on cloud computing
CN107809483A (en) * 2017-10-27 2018-03-16 大猫网络科技(北京)股份有限公司 A kind of transaction voucher store method and device
CN108259414A (en) * 2016-12-28 2018-07-06 中国移动通信集团公司 The management-control method and server of a kind of virtual resource
CN108376154A (en) * 2018-02-07 2018-08-07 平安普惠企业管理有限公司 System base table synchronous method, device, computer equipment and storage medium
CN108664634A (en) * 2018-05-15 2018-10-16 中国平安人寿保险股份有限公司 Data managing method, device, computer equipment and storage medium
CN109120636A (en) * 2018-09-07 2019-01-01 众安信息技术服务有限公司 The method and server device that content access request is authorized
CN109840424A (en) * 2018-12-18 2019-06-04 合肥天源迪科信息技术有限公司 A kind of data base encryption and the system that desensitizes
CN110096547A (en) * 2019-03-21 2019-08-06 深圳壹账通智能科技有限公司 Supply synchronous method, device, computer equipment and the computer storage medium of data
CN110311931A (en) * 2019-08-02 2019-10-08 杭州安恒信息技术股份有限公司 Assets automatic discovering method and device
CN110348821A (en) * 2019-07-19 2019-10-18 杭州物源科技有限公司 A kind of the intelligence manufacture management system and method for combination Internet of Things
CN114500073A (en) * 2022-02-11 2022-05-13 浪潮云信息技术股份公司 User data cut-over method and system supporting privacy protection in cloud storage system
CN114726880A (en) * 2022-04-12 2022-07-08 铜陵久装网络科技有限公司 Information storage method based on cloud computing
CN116545781A (en) * 2023-07-06 2023-08-04 广东维信智联科技有限公司 Cloud access data security management system
CN116668466A (en) * 2023-08-02 2023-08-29 北京滴普科技有限公司 Internet-based carbon asset information cloud synchronization method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system
CN103326856A (en) * 2013-05-20 2013-09-25 西北工业大学 Cloud storage data responsibility confirmation structure and method based on two-way digital signature

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system
CN103326856A (en) * 2013-05-20 2013-09-25 西北工业大学 Cloud storage data responsibility confirmation structure and method based on two-way digital signature

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259414B (en) * 2016-12-28 2021-03-16 中国移动通信集团公司 Virtual resource management and control method and server
CN108259414A (en) * 2016-12-28 2018-07-06 中国移动通信集团公司 The management-control method and server of a kind of virtual resource
CN106790148A (en) * 2016-12-28 2017-05-31 上海优刻得信息科技有限公司 Prevent access, output checking method and device, the auditing system of leakage of data
CN106991302A (en) * 2016-12-31 2017-07-28 融捷科技(武汉)有限公司 Company's authority mandatory system based on supply chain financial service platform
CN106993049A (en) * 2017-04-25 2017-07-28 西安航空学院 A kind of General Aviation enterprise operation total management system based on cloud computing
CN107809483A (en) * 2017-10-27 2018-03-16 大猫网络科技(北京)股份有限公司 A kind of transaction voucher store method and device
CN108376154A (en) * 2018-02-07 2018-08-07 平安普惠企业管理有限公司 System base table synchronous method, device, computer equipment and storage medium
CN108664634A (en) * 2018-05-15 2018-10-16 中国平安人寿保险股份有限公司 Data managing method, device, computer equipment and storage medium
CN109120636A (en) * 2018-09-07 2019-01-01 众安信息技术服务有限公司 The method and server device that content access request is authorized
CN109840424A (en) * 2018-12-18 2019-06-04 合肥天源迪科信息技术有限公司 A kind of data base encryption and the system that desensitizes
CN110096547A (en) * 2019-03-21 2019-08-06 深圳壹账通智能科技有限公司 Supply synchronous method, device, computer equipment and the computer storage medium of data
CN110348821A (en) * 2019-07-19 2019-10-18 杭州物源科技有限公司 A kind of the intelligence manufacture management system and method for combination Internet of Things
CN110311931A (en) * 2019-08-02 2019-10-08 杭州安恒信息技术股份有限公司 Assets automatic discovering method and device
CN114500073A (en) * 2022-02-11 2022-05-13 浪潮云信息技术股份公司 User data cut-over method and system supporting privacy protection in cloud storage system
CN114500073B (en) * 2022-02-11 2024-04-12 浪潮云信息技术股份公司 User data cutting method and system supporting privacy protection in cloud storage system
CN114726880A (en) * 2022-04-12 2022-07-08 铜陵久装网络科技有限公司 Information storage method based on cloud computing
CN114726880B (en) * 2022-04-12 2024-04-26 于成龙 Information storage method based on cloud computing
CN116545781A (en) * 2023-07-06 2023-08-04 广东维信智联科技有限公司 Cloud access data security management system
CN116545781B (en) * 2023-07-06 2023-11-24 广东维信智联科技有限公司 Cloud access data security management system
CN116668466A (en) * 2023-08-02 2023-08-29 北京滴普科技有限公司 Internet-based carbon asset information cloud synchronization method
CN116668466B (en) * 2023-08-02 2023-10-13 北京滴普科技有限公司 Internet-based carbon asset information cloud synchronization method

Also Published As

Publication number Publication date
CN106095954B (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN106095954B (en) Data base management method for enterprise supply chain
CN106127064B (en) Date storage method for enterprise supply chain
CN106127368A (en) Date storage method for ERP System
CN111183426B (en) System and method for blockchain-based notification
US11038891B2 (en) Decentralized identity management system
US11803654B2 (en) Integration of a block chain, managing group authority and access in an enterprise environment
US8554749B2 (en) Data file access control
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US11403417B2 (en) Managing group authority and access to a secured file system in a decentralized environment
CN108805703A (en) Right management system
CN105516110A (en) Mobile equipment secure data transmission method
CN108259422A (en) A kind of multi-tenant access control method and device
US11841957B2 (en) Implementation of a file system on a block chain
JP2022527375A (en) Systems and methods for virtual distributed ledger networks
CN101291220B (en) System, device and method for identity security authentication
JP2001202332A (en) Authentication program managing system
CN114189375B (en) Service system management method and device
US11954672B1 (en) Systems and methods for cryptocurrency pool management
Guo et al. A Data Security Exchange and Sharing System Construction Method and Perfomance Evaluation
EP1833216A1 (en) Method and system for mediation of authentication within a communication network
KR20230081888A (en) Shared data sharing method for distributed ledger system using off-chain
CN112214789A (en) Ethical data processing method, block chain network and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190423

Address after: Room 435, 4th floor, 25 Lane 3399, Kangxin Road, Pudong New District, Shanghai, 201321

Applicant after: Shanghai Cotton Union Electronic Commerce Co., Ltd.

Address before: 610041 3 3 Tianyi street, hi tech Zone, Chengdu, Sichuan

Applicant before: Chengdu Jingjie Technology Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant