CN106127064A - Date storage method for enterprise supply chain - Google Patents
Date storage method for enterprise supply chain Download PDFInfo
- Publication number
- CN106127064A CN106127064A CN201610423426.7A CN201610423426A CN106127064A CN 106127064 A CN106127064 A CN 106127064A CN 201610423426 A CN201610423426 A CN 201610423426A CN 106127064 A CN106127064 A CN 106127064A
- Authority
- CN
- China
- Prior art keywords
- data
- enterprise
- affairs
- scheduling
- cloud storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention provides a kind of date storage method for enterprise supply chain, the method includes: own service data are stored in cloud storage by enterprise, change according to business demand, data are dispatched between public cloud storage and enterprise's cloud storage, asks to carry out identity and purview certification to the service data visitation of client.The present invention proposes a kind of date storage method for enterprise supply chain, and by the data syn-chronization security mechanism of cloud storage system, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand the running status of system.
Description
Technical field
The present invention relates to data storage, particularly to a kind of date storage method for enterprise supply chain.
Background technology
Cloud computing realizes, at framework, the technology that aspect can use service to calculate, and business function is decomposed into loose coupling, unification
Standard and the service of interface, meet enterprise's rapid build and response service change, reuse original IT resource, data sharing and supply
The demand of chain business cooperation.The ERP System utilizing cloud computing technology and SOA mode construction can realize enterprise and obtain
Take shared resource, reduce IT application in enterprises cost, improve its core competitiveness in the market competition.Quick along with the Internet
Development and IT application in enterprises degree improve constantly, enterprises quickly increases with the while of diversified in business, and data are also
Increasing continuously.Meanwhile, for the cloud storage of corporate client also in vigorous growth, select to be suitable in enterprise
The data storage scheme in portion, it is ensured that the safety and stability storage of data is the important leverage of enterprise development.But existing cloud storage
Technology is the availability of different storage system constructed by enterprise, and stability and reliability are also uneven, and cannot hold concurrently
Gu Anquan and low cost.In privately owned cloud, user can define the safe class of data;But need enterprise to put into suitable one-tenth
This just can set up and keep stable operation, and carrying cost is high.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of data for enterprise supply chain and deposits
Method for storing, including:
Own service data are stored in cloud storage by enterprise, according to the change of business demand, data are deposited in public cloud
Dispatch between storage and enterprise's cloud storage, ask to carry out identity and purview certification to the service data visitation of client.
Preferably, the server end of described ERM cloud storage platform includes data simultaneous module, Web server, number
According to memory module, data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein said Web server is
User is provided by browser access file and supports;Data simultaneous module is responsible for the synchronization of file, including processing the new literary composition uploaded
Part, the file after down loading updating, the renewal of client is synchronized to server;Synchronization request is sent in request queue;Number
According to structured message to be processed in memory module storage system, including the information of user, share the shared information of file, data
The storage positional information of catalogue, access registrar information;Load balancing module is provided in the application scenarios of many synchronization service request,
In the case of user concurrent number can accept number of request more than the amendment in synchronous directory and upload operation, request is distributed to difference
Processor process;Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage
Carry out storing the scheduling of position;User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification;System-monitoring module is for the network port service data related in system service, data traffic, server system operation
State, application system daily record carries out real-time monitoring and index;
The described scheduling carrying out data file according to enterprise demand storing position in public cloud and enterprise's cloud storage, bag
Include between public cloud and enterprise's cloud storage, and the data transfer of high in the clouds and user side;By affairs initializing affairs when
Putting into after formatting in scheduling queue, scheduling queue is the queue of serialized data scheduling affairs;Affairs trigger predefines suitable
Sequence initializes affairs, and affairs are carried out according to the granularity of container;From data base, take out the access authority information of token, then will
The transaction information of JSON form is put in scheduling queue;The affairs of data dispatch are taken out from scheduling queue, detailed according to affairs
Information, downloads data to be dispatched from corresponding container, and is left in by ephemeral data under a temp directory of the same name,
Create container of the same name in corresponding enterprise's cloud storage or in public cloud storage, then the file data of download is all uploaded to
In this container, and the state of recording dispatching data in data base;If all data all upload successfully; increase a note newly
Pass flag is also set to true by record, if there being uploading of failure, terminates uploading affairs and by the data dispatch of this container
The pass flag of transaction journal is set to false;It is empty and in the case of transaction processor all free time in scheduling data queue,
The transaction journal table of scanning volatile data base, takes out failed dispatching record and at the beginning of according to the logic same with affairs trigger
Beginningization affairs, are melted into transaction format JSON form and put in scheduling data queue, re-execute these after initializing successfully
Failed scheduling affairs, until the scheduling of data is successfully completed, are updated to record corresponding in data base successfully, if container
Data dispatch affairs failure, then re-execute all of data dispatch of this container.
The present invention compared to existing technology, has the advantage that
The present invention proposes a kind of date storage method for enterprise supply chain, by the data syn-chronization of cloud storage system
Security mechanism, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also intuitively understand system
Running status.
Accompanying drawing explanation
Fig. 1 is the flow chart of the date storage method for enterprise supply chain according to embodiments of the present invention.
Detailed description of the invention
Hereafter provide retouching in detail one or more embodiment of the present invention together with the accompanying drawing of the diagram principle of the invention
State.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.The scope of the present invention is only by right
Claim limits, and the present invention contains many replacements, amendment and equivalent.Illustrate in the following description many details with
Thorough understanding of the present invention is just provided.These details are provided for exemplary purposes, and without in these details
Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of date storage method for enterprise supply chain.Fig. 1 is according to the present invention
The date storage method flow chart for enterprise supply chain of embodiment.
The present invention allows the position of enterprise's self-defining data storage according to ERM cloud storage platform, critical data is deposited
Data, in enterprise's cloud storage, are dispatched between public cloud storage and enterprise's cloud storage by storage according to the change of business demand.Enterprise
The user in portion synchronizes and shares file easily in the industry, and enterprise administrator can also intuitively understand the running status of system.
For cloud platform server end, including data simultaneous module, Web server, data memory module, data dispatch draws
Hold up, identity and authority authentication center and system-monitoring module;For subscription client, apply including pc client application and Web.
Pc client application creates virtual disk for user, the position that carry is selected user.This virtual disk is for synchronizing user's
File, the storage of high in the clouds that the file that all users are placed under this catalogue is synchronized on server, and and the storage of server in
Hold and keep synchronized update.Web application accesses the file on server by webpage.
The Web server of server end is to provide support for user by browser access file.Data simultaneous module is born
The synchronization of duty file, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to service
Device.Synchronization request being sent in request queue, in distributed environment, idle processing server takes from request queue
Return hospitality and seek Message Processing result and result is returned.Structured message to be processed in data memory module storage system, including
The information of user, shares the shared information of file, the storage positional information of data directory, access registrar information.Load balance mould
Block is provided in the application scenarios of many synchronization service request.Amendment and upload operation in user concurrent number is more than synchronous directory can
In the case of accepting number of request, request is distributed to different processors and processes.Use at the machine-processed concentration of request queue
The demand of reason transaction distribution.Data dispatch engine for according to enterprise demand by data file in public cloud and enterprise's cloud storage
Carry out storing the scheduling of position.User is carried out authority to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification.System-monitoring module is for the network port service data related in system service, data traffic, server system operation
State, application system daily record carries out real-time monitoring and index.
In data synchronization process, client runs synchronized process, and this synchronized process detects client by monitoring thread
Change under synchronous directory, once user stores ERM file, then trigger synchronized process and server carries out the same of file
Step.The change of file is submitted in local cache by synchronized process by user;Synchronized process downloads this data mesh from server
The high in the clouds of record is cached to this locality, if having other user or same user to use other client to have updated the interior of server
Holding, this high in the clouds caching contains the renewal of this part;This locality that the high in the clouds caching of download is merged into this locality is delayed by synchronized process
In depositing, so local branch also comprises the content updated on server;Local cache is uploaded and is merged into service by synchronized process
The high in the clouds caching of device, such server just has on the caching of high in the clouds the update content of this user.Index file is used to be buffered in
The timestamp that each file in workflow is submitted to for the last time, by timestamp relatively judge which update be recently
Once submit on carry out.Then use incompatible lock mechanism to guarantee that only one of which client is more newly requested can successfully be held
OK, then pointing out other client and update unsuccessfully, the client of unsuccessful renewal re-starts above-mentioned renewal operating process.At weight
During newly carrying out, the client of unsuccessful renewal by up-to-date update to merge all then oneself branch is updating to clothes
In business device.
For cloud platform server, it runs management by synchronization process and accepts the request that data syn-chronization is relevant, then please
Asking and be sent in request queue, the request of taking out from request queue of idle synchronization process process also processes request, updates affairs
State, and the last result of process being returned to ask user.The request that client sends contains the certification phase of user
Pass information, the resource storage position of request, the operation of request.First pass through the conjunction to the request of monitoring of the identity and authority authentication center
Method, if a new request and solicited message are legal, server is by the information record of user in a session;Checking please
After the legitimacy asked, more newly requested state, if illegal, the information of authentification failure is returned to requesting client.As
Really certification is passed through, and the most newly-built one processes affairs, adds the resource information of request in affairs, the storage position of resource, request
The title of ID, the relevant information of request data catalogue.Including title, higher level's object, the operation information of request.The initialization of affairs
After having worked, affairs are just joined in request request queue by task manager, wait that transaction processor processes.
Data memory module safeguards data directory information table, which stores the essential information of data directory, including being stored in
Which position of cloud storage, corresponding ID title and Container Name, if for shared data directory, the ID of higher level's data directory.
According to the hierarchy nesting relation of tissue data directory, only update this hierarchical relationship when data directory is carried out transfer operation.Number
Also safeguard shared information table according to memory module, have recorded owner and sharer's information of data directory.When user shares one
The when that data directory giving other user, create simultaneously token authorize its user shared to be accessed by this token and
File content in amendment share directory.
Data dispatch includes between public cloud and enterprise's cloud storage, and the data transfer of high in the clouds and user side.Initially
To put into after transaction format in scheduling queue when of changing affairs, scheduling queue is the queue of serialized data scheduling affairs.
The predefined order of affairs trigger initializes affairs, and affairs are carried out according to the granularity of container.Token is taken out from data base
Access authority information, then puts into the transaction information of JSON form in scheduling queue.Data dispatch is taken out from scheduling queue
Affairs, according to affairs details, from corresponding container, download data to be dispatched, and leave this ephemeral data in one
Under individual temp directory of the same name, in corresponding enterprise's cloud storage or in public cloud storage, create container of the same name, under then inciting somebody to action
The file data carried all uploads in this container, and the state of recording dispatching data in data base.If all data
All uploading and the most then increase a record newly and pass flag is set to true, if there being uploading of failure, terminating uploading affairs
And the pass flag of the data dispatch transaction journal of this container is set to false.It is empty and thing in scheduling data queue
In the case of business processor all free time, the transaction journal table of scanning volatile data base, by failed dispatching record taking-up and according to
The logic initialization affairs same with affairs trigger, are melted into transaction format JSON form and put into scheduling after initializing successfully
In data queue, re-execute the scheduling affairs of these failures, until the scheduling of data is successfully completed, by correspondence in data base
Record is updated to successfully.The record granularity of scheduling data message record is depending on container, if the data dispatch affairs of container
Failure, then re-execute all of data dispatch of this container.
Identity and authority authentication center arranges agency at entrance, is to use public cloud storage also according to the object judgement of request
It is that enterprise's cloud storage is authenticated.Storing for public cloud, the access for the data of a container comprises two parts, and one is
The container owner access to this container data, one is the non-container owner access to container.Container owner is to container
The access of data has only to provide the title of this ID and access keys.For the non-container owner access to container data, then
Using unique URI, it comprises storage resource information to be accessed, time started, expired time, control of authority information and label
Name.Prestoring the reading strategy of container, all of data under this container all inherit this reading strategy.Privately owned cloud is deposited
Storage, uses tenant, and user, the access rights of resource are authenticated by three levels of role.
For the safety of the client under cloud environment, identity and authority authentication center is carried by behavior and encryption mechanism
For multilamellar certification, behavior analysis and formation data ciphertext.First pass through authentication module and user is provided checking, then statistical module
Counting user behavior, confirms user's history safety.It is finally based on encryption encapsulation process, is converted to customer data encrypt number
According to, and it is sent to high in the clouds storage.
As follows to the verification process of terminal use: client generates a random number, then signs it, is carrying out
After Hash digest, with the PKI of authentication center, summary is signed, be sent to authentication center.When authentication center receives client
Send add confidential information after, be first decrypted, with the PKI of client, signature verified the most again.If decrypted
Random number cryptographic Hash identical with the cryptographic Hash received, then client certificate passes through.Authentication center decrypts random number and uses
After client public key encryption, the information after encryption is sent to client.After client is decrypted with the private key of oneself, with oneself
The random number that oneself generates compares, if equal, to be considered as authentication center legal.
Specifically, identity and authority authentication center includes cipher key management unit, license management unit, license validation list
Unit.Cipher key management unit provides key escrow and encryption key to provide service for license management unit, disposes on the server
Key database, as the Database Systems concentrated, for cipher key management unit, license management unit, license validation unit
Unified DBM is provided, periodically carries out data backup.License management unit is responsible for distribution management licence.Licence
Authentication unit is responsible for realizing licence application, examination & verification business.Described license validation unit is additionally based upon directory service, should to business
Unified Identity is provided to differentiate and unification user mandate with the user of system.Directory service includes ID catalogue, certification directory and resource
Catalogue, ID catalogue storage identity has the whole user data from enterprise data source and each application with management strategy information, storage
System ID data.Certification directory provides the information needed for authenticating user identification, storage user authentication, is the subset of ID catalogue.Money
Source directory is used for storing comprehensive user group framework, authorizing the information such as role.In Resource TOC, information is according to classification of type
Depositing, store enterprise customer, department, user organizes data.
Wherein, counting user behavior, confirm user's history safety, particularly as follows: (1) user sends resource accesses application,
First authentication center carries out authentication to it, if authentication failed, directly refuses its access request, and authentication is successfully used
Family transfers to statistical module to carry out user behavior certification;(2) user that statistical module query safe data base is stored currently believes
Appoint value, it is determined that its behavior safety grade, and authorize its corresponding grade of service and access rights according to safe class, if user
Its access request is then refused less than lowest service level;(3) in the access process of user, the behavior acquisition module of authentication center
Monitor the operation behavior of user in real time, obtain user behavior;(4) user behavior of acquisition is carried out standard volume by behavior processing module
Change processes;(5) by the behavior vector after standardization, it is saved in behavior database;(6) utilize behavior in behavior database to
Amount comprehensive assessment user behavior safety;(7) the credible tolerance of behavior of user's different time sections is stored in security database;
(8) the trustworthy user behavior tolerance during statistical module reads trust data storehouse, determines the safe class that user is current in real time, and is
It dynamically distributes the corresponding grade of service and operating right;(9) by the trust state Real-time Feedback of user to user, its quilt is pointed out
The access behavior authorized.
Described based on encryption encapsulation process, customer data is converted to encryption data, farther includes, by private key for user pair
Should be after community set, deciphering, the community set only having as user just can obtain when meeting access structure corresponding to this ciphertext
In plain text:
Data owner produces master key and PKI, and PKI is signed by user afterwards, is then sent out with signature by PKI
Giving server, oneself stores master key.When new user adds system, system is that the attribute of each user arranges an attribute
Collection, and generate private key for it.Then client formulates file access strategy when upper transmitting file, and system is according to current access
File is encrypted by strategy, obtains ciphertext data after encryption.When the attribute of user encryption meets access strategy, and system is just
According to decipherment algorithm, the file after encryption can be decrypted into clear data.
In sum, the present invention proposes a kind of date storage method for enterprise supply chain, passes through cloud storage system
Data syn-chronization security mechanism, enterprise customer can facilitate and synchronize and share file safely, and enterprise administrator can also be straight
See the running status of understanding system.
Obviously, it should be appreciated by those skilled in the art, each module of the above-mentioned present invention or each step can be with general
Calculating system realize, they can concentrate in single calculating system, or be distributed in multiple calculating system and formed
Network on, alternatively, they can realize with the executable program code of calculating system, it is thus possible to by they store
Performed by calculating system within the storage system.So, the present invention is not restricted to the combination of any specific hardware and software.
It should be appreciated that the above-mentioned detailed description of the invention of the present invention is used only for exemplary illustration or explains the present invention's
Principle, and be not construed as limiting the invention.Therefore, that is done in the case of without departing from the spirit and scope of the present invention is any
Amendment, equivalent, improvement etc., should be included within the scope of the present invention.Additionally, claims purport of the present invention
Whole within containing the equivalents falling into scope and border or this scope and border change and repair
Change example.
Claims (2)
1. for a date storage method for enterprise supply chain, it is applied to ERM cloud storage platform, it is characterised in that bag
Include:
Own service data are stored in cloud storage by enterprise, according to the change of business demand, by data in public cloud storage and
Dispatch between enterprise's cloud storage, ask to carry out identity and purview certification to the service data visitation of client.
Method the most according to claim 1, it is characterised in that the server end of described ERM cloud storage platform includes
Data simultaneous module, Web server, data memory module, data dispatch engine, identity and authority authentication center and system monitoring
Module;Wherein said Web server provides support for user by browser access file;Data simultaneous module is responsible for file
Synchronize, including processing the new file uploaded, the file after down loading updating, the renewal of client is synchronized to server;To synchronize
Request is sent in request queue;Structured message to be processed in data memory module storage system, including the information of user,
Share the shared information of file, the storage positional information of data directory, access registrar information;Load balancing module is provided in the most same
The application scenarios of step service request, amendment and upload operation in user concurrent number is more than synchronous directory can accept number of request
In the case of, request is distributed to different processors and processes;Data dispatch engine is for civilian by data according to enterprise demand
Part carries out storing the scheduling of position in public cloud and enterprise's cloud storage;Identity and authority authentication center by user to public cloud and
The access of enterprise's cloud file carries out purview certification;System-monitoring module is for the network port service number related in system service
According to, data traffic, server system operation state, application system daily record carries out real-time monitoring and index;
The described scheduling carrying out data file according to enterprise demand storing position in public cloud and enterprise's cloud storage, including public affairs
Altogether between cloud and enterprise's cloud storage, and the data transfer of high in the clouds and user side;By transaction format initializing affairs when
Putting into after change in scheduling queue, scheduling queue is the queue of serialized data scheduling affairs;At the beginning of the predefined order of affairs trigger
Beginningization affairs, affairs are carried out according to the granularity of container;The access authority information of token is taken out, then by JSON from data base
The transaction information of form is put in scheduling queue;The affairs of data dispatch are taken out from scheduling queue, according to affairs details,
From corresponding container, download data to be dispatched, and ephemeral data is left under a temp directory of the same name, in correspondence
Enterprise's cloud storage in or public cloud storage in create container of the same name, then the file data of download is all uploaded to this appearance
In device, and the state of recording dispatching data in data base;If all data all upload successfully; increase newly one record also
Pass flag being set to true, if there being uploading of failure, terminating uploading affairs and by the data dispatch affairs of this container
The pass flag of record is set to false;It is empty and in the case of transaction processor all free time in scheduling data queue, scanning
The transaction journal table of volatile data base, takes out failed dispatching record and according to the logic initialization same with affairs trigger
Affairs, are melted into transaction format JSON form and put in scheduling data queue, re-execute these failures after initializing successfully
Scheduling affairs, until the scheduling of data is successfully completed, record corresponding in data base is updated to successfully, if the number of container
According to scheduling affairs failure, then re-execute all of data dispatch of this container.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423426.7A CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423426.7A CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106127064A true CN106127064A (en) | 2016-11-16 |
CN106127064B CN106127064B (en) | 2019-02-15 |
Family
ID=57270727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610423426.7A Active CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127064B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107657025A (en) * | 2017-09-27 | 2018-02-02 | 合肥博力生产力促进中心有限公司 | One kind is used for business administration mathematical logic optimization system |
CN108427682A (en) * | 2017-02-14 | 2018-08-21 | 北京国双科技有限公司 | A kind of data file synchronous method and device |
CN111026795A (en) * | 2019-11-27 | 2020-04-17 | 成都耍流量网络科技有限公司 | Multi-platform data fusion system based on big data |
CN111475258A (en) * | 2020-03-27 | 2020-07-31 | 南京英诺森软件科技有限公司 | Enterprise technical architecture scheme based on container cloud |
CN111930800A (en) * | 2020-07-31 | 2020-11-13 | 马少才 | Enterprise big data analysis and processing system based on cloud computing |
CN112699093A (en) * | 2021-01-25 | 2021-04-23 | 浪潮通用软件有限公司 | File storage method and equipment supporting hybrid multi-cloud |
CN113515323A (en) * | 2021-07-09 | 2021-10-19 | 中原银行股份有限公司 | Method and device for optimizing loading speed of Web application in portable terminal client |
CN113537558A (en) * | 2021-06-03 | 2021-10-22 | 广州快批信息科技有限公司 | Method and device for automatically processing upstream synchronization of material demands and terminal equipment |
CN114205124A (en) * | 2021-11-22 | 2022-03-18 | 广西电网有限责任公司 | Enterprise-level file interactive application management system |
CN114726880A (en) * | 2022-04-12 | 2022-07-08 | 铜陵久装网络科技有限公司 | Information storage method based on cloud computing |
US11507678B2 (en) * | 2018-05-29 | 2022-11-22 | Infortrend Technology, Inc. | Method for managing the access authority to cloud storage and the system therefor |
CN116170448A (en) * | 2023-04-20 | 2023-05-26 | 河北先见软件科技股份有限公司 | Cross-organization data sharing method and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
US20120185922A1 (en) * | 2011-01-16 | 2012-07-19 | Kiran Kamity | Multimedia Management for Enterprises |
CN104301301A (en) * | 2014-09-04 | 2015-01-21 | 南京邮电大学 | Inter-cloud-storage-system data migration encryption method |
CN104902005A (en) * | 2015-04-13 | 2015-09-09 | 中国联合网络通信集团有限公司 | Method and system for resource scheduling in hybrid cloud, and private cloud |
CN105119974A (en) * | 2015-07-21 | 2015-12-02 | 信阳启航信息科技有限公司 | Internet-of-things system using hybrid cloud architecture and realization method |
CN105471960A (en) * | 2015-08-03 | 2016-04-06 | 北京汉柏科技有限公司 | Information interaction system and method between private clouds and public cloud |
-
2016
- 2016-06-14 CN CN201610423426.7A patent/CN106127064B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
US20120185922A1 (en) * | 2011-01-16 | 2012-07-19 | Kiran Kamity | Multimedia Management for Enterprises |
CN104301301A (en) * | 2014-09-04 | 2015-01-21 | 南京邮电大学 | Inter-cloud-storage-system data migration encryption method |
CN104902005A (en) * | 2015-04-13 | 2015-09-09 | 中国联合网络通信集团有限公司 | Method and system for resource scheduling in hybrid cloud, and private cloud |
CN105119974A (en) * | 2015-07-21 | 2015-12-02 | 信阳启航信息科技有限公司 | Internet-of-things system using hybrid cloud architecture and realization method |
CN105471960A (en) * | 2015-08-03 | 2016-04-06 | 北京汉柏科技有限公司 | Information interaction system and method between private clouds and public cloud |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427682A (en) * | 2017-02-14 | 2018-08-21 | 北京国双科技有限公司 | A kind of data file synchronous method and device |
CN107657025A (en) * | 2017-09-27 | 2018-02-02 | 合肥博力生产力促进中心有限公司 | One kind is used for business administration mathematical logic optimization system |
US11507678B2 (en) * | 2018-05-29 | 2022-11-22 | Infortrend Technology, Inc. | Method for managing the access authority to cloud storage and the system therefor |
CN111026795A (en) * | 2019-11-27 | 2020-04-17 | 成都耍流量网络科技有限公司 | Multi-platform data fusion system based on big data |
CN111026795B (en) * | 2019-11-27 | 2023-07-18 | 成都耍流量网络科技有限公司 | Multi-platform data fusion system based on big data |
CN111475258A (en) * | 2020-03-27 | 2020-07-31 | 南京英诺森软件科技有限公司 | Enterprise technical architecture scheme based on container cloud |
CN111930800B (en) * | 2020-07-31 | 2021-09-24 | 东方财富证券股份有限公司 | Enterprise big data analysis and processing system based on cloud computing |
CN111930800A (en) * | 2020-07-31 | 2020-11-13 | 马少才 | Enterprise big data analysis and processing system based on cloud computing |
CN112699093A (en) * | 2021-01-25 | 2021-04-23 | 浪潮通用软件有限公司 | File storage method and equipment supporting hybrid multi-cloud |
CN113537558A (en) * | 2021-06-03 | 2021-10-22 | 广州快批信息科技有限公司 | Method and device for automatically processing upstream synchronization of material demands and terminal equipment |
CN113515323A (en) * | 2021-07-09 | 2021-10-19 | 中原银行股份有限公司 | Method and device for optimizing loading speed of Web application in portable terminal client |
CN114205124A (en) * | 2021-11-22 | 2022-03-18 | 广西电网有限责任公司 | Enterprise-level file interactive application management system |
CN114726880A (en) * | 2022-04-12 | 2022-07-08 | 铜陵久装网络科技有限公司 | Information storage method based on cloud computing |
CN114726880B (en) * | 2022-04-12 | 2024-04-26 | 于成龙 | Information storage method based on cloud computing |
CN116170448A (en) * | 2023-04-20 | 2023-05-26 | 河北先见软件科技股份有限公司 | Cross-organization data sharing method and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106127064B (en) | 2019-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106095954B (en) | Data base management method for enterprise supply chain | |
CN106127064B (en) | Date storage method for enterprise supply chain | |
CN106127368A (en) | Date storage method for ERP System | |
CN111183426B (en) | System and method for blockchain-based notification | |
US11038891B2 (en) | Decentralized identity management system | |
CN116112274B (en) | Blockchain, management group rights and integration of access in an enterprise environment | |
US11403417B2 (en) | Managing group authority and access to a secured file system in a decentralized environment | |
US20080097998A1 (en) | Data file access control | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
US11841957B2 (en) | Implementation of a file system on a block chain | |
CN108259422A (en) | A kind of multi-tenant access control method and device | |
US20150006613A1 (en) | System and method for providing hybrid on demand services to a work unit | |
Daraghmi et al. | A blockchain-based editorial management system | |
CN101291220A (en) | System, device and method for identity security authentication | |
Toapanta et al. | Proposal of a model to apply hyperledger in digital identity solutions in a public organization of Ecuador | |
CN114189375B (en) | Service system management method and device | |
Guo et al. | A Data Security Exchange and Sharing System Construction Method and Perfomance Evaluation | |
JP2022527375A (en) | Systems and methods for virtual distributed ledger networks | |
KR20230081888A (en) | Shared data sharing method for distributed ledger system using off-chain | |
EP1833216A1 (en) | Method and system for mediation of authentication within a communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181225 Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Applicant after: Shenzhen Zhen AI Jie Yun Information Technology Co., Ltd. Address before: 610041 3 3 Tianyi street, hi tech Zone, Chengdu, Sichuan Applicant before: Chengdu Jingjie Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |