CN106127064B - Date storage method for enterprise supply chain - Google Patents
Date storage method for enterprise supply chain Download PDFInfo
- Publication number
- CN106127064B CN106127064B CN201610423426.7A CN201610423426A CN106127064B CN 106127064 B CN106127064 B CN 106127064B CN 201610423426 A CN201610423426 A CN 201610423426A CN 106127064 B CN106127064 B CN 106127064B
- Authority
- CN
- China
- Prior art keywords
- data
- enterprise
- affairs
- file
- scheduling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention provides a kind of date storage methods for enterprise supply chain, this method comprises: enterprise stores own service data in cloud storage, according to the variation of business demand, data are dispatched between public cloud storage and enterprise's cloud storage, identity and purview certification are carried out to the service data visitation request of client.The invention proposes a kind of date storage methods for enterprise supply chain, and by the data synchronous safety mechanism of cloud storage system, enterprise customer be can be convenient and safely synchronous and shared file, enterprise administrator can also intuitively understand the operating status of system.
Description
Technical field
The present invention relates to data storage, in particular to a kind of date storage method for enterprise supply chain.
Background technique
The technology that service calculates can be used in cloud computing in terms of framework realization, and business function is decomposed into loose coupling, uniformly
The service of standard and interface meets enterprise's rapid build and the variation of response business, reuses original IT resource, data sharing and supply
The demand of chain business cooperation.Enterprise may be implemented using the ERP System of cloud computing technology and SOA mode construction to obtain
Shared resource is taken, IT application in enterprises cost is reduced, improves its core competitiveness in market competition.It is quick with internet
Development and IT application in enterprises degree be continuously improved, enterprises business rapid growth and it is diversified simultaneously, data
Continuously increasing.At the same time, it selects to be suitble in enterprise also in vigorous growth for the cloud storage of corporate client
The data storage scheme in portion guarantees that the safety and stability storage of data is the important leverage of enterprise development.However existing cloud storage
Technology is the availability of storage system constructed by different enterprises, and stability and reliability are also irregular, and can not be simultaneous
Gu Anquan and low cost.Such as in private clound, user can define the security level of data;But need enterprise investment it is comparable at
This can just set up and keep stable operation, and carrying cost is high.
Summary of the invention
To solve the problems of above-mentioned prior art, the invention proposes a kind of data for enterprise supply chain to deposit
Method for storing, comprising:
Enterprise stores own service data in cloud storage, and according to the variation of business demand, data are deposited in public cloud
It is dispatched between storage and enterprise's cloud storage, identity and purview certification is carried out to the service data visitation request of client.
Preferably, the server end of the corporate resources cloud storage platform includes data simultaneous module, Web server, number
According to memory module, data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein the Web server is
User accesses file by browser and provides support;Data simultaneous module is responsible for the synchronization of file, the new text uploaded including processing
Part downloads updated file, and the update of client is synchronized to server;It sends synchronization request in request queue;Number
According to structured message to be processed in memory module storage system, the information including user, the shared information of shared file, data
The storage location information of catalogue, access registrar information;Load balancing module is provided in the application scenarios of more synchronization service requests,
In the case that user concurrent number is greater than modification and the acceptable number of request of upload operation in synchronous directory, request is distributed to difference
Processor handled;Data dispatch engine is used for data file according to enterprise demand in public cloud and enterprise's cloud storage
Carry out the scheduling of storage location;User is carried out permission to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification;System-monitoring module is for network port service data involved in system service, data traffic, server system operation
State, application system log are monitored and are indexed in real time;
The scheduling that data file is carried out to storage location according to enterprise demand in public cloud and enterprise's cloud storage, packet
The data for including between public cloud and enterprise's cloud storage and cloud and user terminal shift;By affairs when initializing affairs
It is put into scheduling queue after formatting, scheduling queue is the queue of serialized data scheduling affairs;Affairs trigger predefines suitable
Sequence initializes affairs, and affairs are carried out according to the granularity of container;The access authority information of token is taken out from database, then will
The transaction information of JSON format is put into scheduling queue;The affairs of data dispatch are taken out from scheduling queue, it is detailed according to affairs
Information downloads the data to be dispatched from corresponding container, and ephemeral data is stored under a temp directory of the same name,
Container of the same name is created in corresponding enterprise's cloud storage or in public cloud storage, then all uploads to the file data of downloading
In the container, and the state of recording dispatching data in the database;Increase a note newly if all uploads of all data success
It records and simultaneously sets true for pass flag, if there is uploads of failure then terminates upload affairs and by the data dispatch of the container
The pass flag of transaction journal is set as false;In the case where dispatching data queue is that empty and transaction processor is all idle,
The transaction journal table for scanning volatile data base takes out the dispatching record of failure and according at the beginning of logic same with affairs trigger
Transaction format chemical conversion JSON format is put into scheduling data queue after initializing successfully, re-executes these by beginningization affairs
Record corresponding in database is updated to success, if container until the scheduling of data successfully completes by the scheduling affairs of failure
Data dispatch affairs failure, then re-execute all data dispatch of the container.
The present invention compared with prior art, has the advantage that
The invention proposes a kind of date storage methods for enterprise supply chain, synchronous by the data of cloud storage system
Security mechanism, enterprise customer can be convenient and safely synchronous and shared file, enterprise administrator can also intuitively understand system
Operating status.
Detailed description of the invention
Fig. 1 is the flow chart of the date storage method according to an embodiment of the present invention for enterprise supply chain.
Specific embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the attached drawing of the diagram principle of the invention
It states.The present invention is described in conjunction with such embodiment, but the present invention is not limited to any embodiments.The scope of the present invention is only by right
Claim limits, and the present invention covers many substitutions, modification and equivalent.Illustrate in the following description many details with
Just it provides a thorough understanding of the present invention.These details are provided for exemplary purposes, and without in these details
Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of date storage method for enterprise supply chain.Fig. 1 is according to the present invention
The date storage method flow chart for enterprise supply chain of embodiment.
The position that the present invention allows enterprise's self-defining data to store according to corporate resources cloud storage platform, critical data is deposited
Storage dispatches data according to the variation of business demand in enterprise's cloud storage between public cloud storage and enterprise's cloud storage.Enterprise
Easily synchronous and shared file, enterprise administrator can also intuitively understand the operating status of system to the user in portion in the industry.
For cloud platform server end, including data simultaneous module, Web server, data memory module, data dispatch draws
It holds up, identity and authority authentication center and system-monitoring module;For user client, including pc client is applied and Web application.
Pc client, which is applied, creates virtual disk for user, and carry is in the position that user selectes.The virtual disk is for synchronizing user's
File, the file that all users are placed under the catalogue be synchronized to the cloud on server storage, and in the storage of server
Hold and keeps synchronized update.Web applies the file accessed on server by webpage.
The Web server of server end is to access file by browser for user to provide support.Data simultaneous module is negative
The synchronization for blaming file downloads updated file, the update of client is synchronized to service including the new file that processing uploads
Device.It sends synchronization request in request queue, in distributed environment, idle processing server takes from request queue
It returns hospitality and seeks Message Processing result and return to result.Structured message to be processed in data memory module storage system, including
The information of user, the shared information of shared file, the storage location information of data directory, access registrar information.Load balance mould
Block is provided in the application scenarios of more synchronization service requests.User concurrent number be greater than synchronous directory in modification and upload operation can
In the case where receiving number of request, request is distributed to different processors and is handled.At the mechanism concentration of request queue
Manage the demand of transaction distribution.Data dispatch engine is used for data file according to enterprise demand in public cloud and enterprise's cloud storage
Carry out the scheduling of storage location.User is carried out permission to the access of public cloud and enterprise's cloud file by identity and authority authentication center
Certification.System-monitoring module is for network port service data involved in system service, data traffic, server system operation
State, application system log are monitored and are indexed in real time.
In data synchronization process, client runs synchronized process, which detects client by monitoring thread
Variation under synchronous directory then triggers synchronized process and server carries out the same of file once user stores corporate resources file
Step.User is submitted in local cache the change of file by synchronized process;Synchronized process downloads this data mesh from server
The cloud of record is cached to local, if there is other users or same user are had updated in server using other clients
Hold, this cloud caching contains the update of this part;The cloud caching of downloading is merged into local local and delayed by synchronized process
In depositing, branch local so also includes the content updated on server;Local cache is uploaded and is merged into service by synchronized process
The cloud of device caches, and just has the more new content of the user on such server on the caching of cloud.It is buffered in using index file
The timestamp that each file last time in workflow is submitted, judging which is updated by the comparison of timestamp is nearest
It is primary submit on carry out.Then ensure that only one client updates request and can successfully be held using incompatible lock mechanism
Row then prompts to update to fail to other clients, and the client updated not successfully re-starts above-mentioned update operating process.In weight
During newly carrying out, then the client updated not successfully, which merges newest update in all branches of oneself, arrives clothes in update
It is engaged in device.
For cloud platform server, management by synchronization process is run to receive the request of data synchronization pass, then will be asked
It asks and is sent in request queue, idle synchronization process process is taken out from request queue requests and handle request, updates affairs
State, and finally by the result of processing return to request user.The certification phase of user is contained in the request that client is sent
Close information, the resource storage location of request, the operation of request.The conjunction of request is monitored by identity and authority authentication center first
Method, if it is a new request and solicited message it is legal, server by the information of user record in a session;Verifying is asked
After the legitimacy asked, the state of request is updated, if illegal, the information of authentification failure is returned into requesting client.Such as
Fruit certification passes through, then creates a processing affairs, and the resource information of request, the storage location of resource, request are added in affairs
The title of ID, the relevant information of request data catalogue.Including title, higher level's object, the operation information of request.The initialization of affairs
After work is completed, affairs are just added in request request queue by task manager, wait transaction processor processing.
Data memory module safeguards data directory information table, and which stores the essential informations of data directory, including are stored in
Which position of cloud storage, corresponding ID title and Container Name, if be shared data catalogue, the ID of higher level's data directory.
According to the hierarchy nesting relationship of tissue data directory, the hierarchical relationship is only updated when carrying out transfer operation to data directory.Number
Shared information table is also safeguarded according to memory module, has recorded owner and the sharer's information of data directory.When user sharing one
When data directory gives other users, at the same create a token accessed come the user for authorizing its shared by this token and
Modify the file content in share directory.
Data dispatch includes the data transfer of between public cloud and enterprise's cloud storage and cloud and user terminal.Initial
It will be put into scheduling queue after transaction format when changing affairs, scheduling queue is the queue of serialized data scheduling affairs.
The predefined sequence of affairs trigger initializes affairs, and affairs are carried out according to the granularity of container.Token is taken out from database
Then the transaction information of JSON format is put into scheduling queue by access authority information.Data dispatch is taken out from scheduling queue
Affairs the data to be dispatched are downloaded from corresponding container, and the ephemeral data is stored in one according to affairs details
Under a temp directory of the same name, create container of the same name in corresponding enterprise's cloud storage or in public cloud storage, then will under
The file data of load all uploads in the container, and the state of recording dispatching data in the database.If all data
It all uploads and successfully then increases a record newly and set true for pass flag, if there is the upload of failure then terminates upload affairs
And false is set by the pass flag of the data dispatch transaction journal of the container.It is empty and thing in scheduling data queue
Be engaged in processor it is all idle in the case where, scan the transaction journal table of volatile data base, by the dispatching record of failure take out and according to
Transaction format chemical conversion JSON format is put into scheduling after initializing successfully by logic initialization affairs same with affairs trigger
In data queue, the scheduling affairs of these failures are re-executed, it, will be corresponding in database until the scheduling of data successfully completes
Record is updated to success.The record granularity of scheduling data information record is to depend on container, if the data dispatch affairs of container
Failure, then re-execute all data dispatch of the container.
Identity and authority authentication center entrance be arranged act on behalf of, the object judgement according to request be using public cloud storage also
It is that enterprise's cloud storage is authenticated.For public cloud storage, the access for the data of a container includes two parts, and one is
Access of the container owner to the container data, one is access of the non-container owner to container.Container owner is to container
The access of data only needs to provide the title and access keys of the ID.Access for non-container owner to container data, then
Using unique URI, it includes the storage resource information to be accessed, time started, expired time, permission control information and label
Name.The reading strategy of container is stored in advance, all data under the container all inherit the reading strategy.Private clound is deposited
Storage, using tenant, user, three levels of role authenticate the access authority of resource.
For the safety of the client under cloud environment, identity and authority authentication center is mentioned by behavior and encryption mechanism
For multilayer certification, behavioural analysis and form data ciphertext.User's checking is provided by authentication module first, then statistical module
Counting user behavior confirms user's history safety.Finally based on encryption encapsulation process, customer data is converted into encryption number
According to, and it is sent to cloud storage.
As follows to the verification process of terminal user: client generates a random number, then signs, is carrying out to it
After Hash digest, is signed with the public key of authentication center to abstract, be sent to authentication center.When authentication center receives client
It after the encryption information sent, is decrypted, signature is verified with the public key of client again first then.If decrypted
Random number cryptographic Hash it is identical with the cryptographic Hash received, then client certificate passes through.Authentication center decrypts random number and is used in combination
After client public key encryption, encrypted information is sent to client.After client is decrypted with the private key of oneself, with oneself
The random number that oneself generates is compared, if equal, to be considered as authentication center legal.
Specifically, identity and authority authentication center includes cipher key management unit, license management unit, license validation list
Member.Cipher key management unit provides key escrow for license management unit and encryption key provides service, disposes on the server
Key database is cipher key management unit, license management unit, license validation unit as the Database Systems of concentration
Unified database module is provided, data backup is periodically carried out.License management unit is responsible for distribution management licensing.Licensing
Authentication unit is responsible for realizing licensing application, audit business.The license validation unit is also based on directory service, answers business
Unified Identity is provided with the user of system to identify and unification user authorization.Directory service includes ID catalogue, certification directory and resource
Catalogue, ID catalogue store identity and management strategy information, are stored with whole user data from enterprise data source and each application
System ID data.Certification directory provides user identity authentication, and information needed for storing user authentication, is the subset of ID catalogue.Money
Source directory is for storing comprehensive user group's framework, authorizing the information such as role.Information is according to classification of type in Resource TOC
Storage stores enterprise customer, department, user group data.
Wherein, counting user behavior confirms user's history safety, specifically: (1) user issue resource access application,
Authentication center carries out authentication to it first, directly refuses its access request if authentication failed, and authentication is successfully used
Statistical module is transferred to carry out user behavior certification in family;(2) user that statistical module query safe database is stored currently believes
Appoint value, its behavior safety grade is determined, and authorize its corresponding grade of service and access authority according to security level, if user
Then refuse its access request lower than lowest service level;(3) in the access process of user, the behavior of authentication center obtains module
It monitors the operation behavior of user in real time, obtains user behavior;(4) user behavior that behavior processing module will acquire carries out standard volume
Change processing;(5) it by the behavior vector after standardization, is stored in behavior database;(6) using the behavior in behavior database to
Measure the safety of comprehensive assessment user behavior;(7) the credible measurement of user's behavior in different time periods is stored in security database;
(8) statistical module reads the user's behavior confidence level amount in trust data library, determines the current security level of user in real time, and be
It dynamically distributes the corresponding grade of service and operating right;(9) the trust state Real-time Feedback of user is prompted into its quilt to user
The access behavior of authorization.
It is described to be based on encryption encapsulation process, customer data is converted into encryption data, further comprises, by private key for user pair
It only should just can get when the attribute set that user possesses meets the corresponding access structure of this ciphertext after attribute set, decryption
In plain text:
Data owner generates master key and public key, and user signs to public key later, then sends out public key and signature
Server is given, oneself storage master key.When system is added in new user, system is that an attribute is arranged in the attribute of each user
Collection, and private key is generated for it.Then client formulates file access strategy in upper transmitting file, and system is according to current access
Strategy encrypts file, and ciphertext data are obtained after encryption.When the attribute of user encryption meets access strategy, system is just
Clear data can be decrypted into the file after encryption according to decipherment algorithm.
In conclusion passing through cloud storage system the invention proposes a kind of date storage method for enterprise supply chain
Data synchronous safety mechanism, enterprise customer can be convenient and safely synchronous and shared file, enterprise administrator can also be straight
See the operating status of understanding system.
Obviously, it should be appreciated by those skilled in the art, each module of the above invention or each steps can be with general
Computing system realize that they can be concentrated in single computing system, or be distributed in multiple computing systems and formed
Network on, optionally, they can be realized with the program code that computing system can be performed, it is thus possible to they are stored
It is executed within the storage system by computing system.In this way, the present invention is not limited to any specific hardware and softwares to combine.
It should be understood that above-mentioned specific embodiment of the invention is used only for exemplary illustration or explains of the invention
Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any
Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention
Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing
Change example.
Claims (1)
1. a kind of date storage method for enterprise supply chain is applied to corporate resources cloud storage platform, which is characterized in that packet
It includes:
Enterprise stores own service data in cloud storage, according to the variation of business demand, by data in public cloud storage and
It is dispatched between enterprise's cloud storage, identity and purview certification is carried out to the service data visitation request of client;
The server end of the corporate resources cloud storage platform includes data simultaneous module, Web server, data memory module,
Data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein the Web server is that user passes through browsing
Device accesses file and provides support;Data simultaneous module is responsible for the synchronization of file, including the new file that processing uploads, after downloading updates
File, the update of client is synchronized to server;It sends synchronization request in request queue;Data memory module storage
Structured message to be processed in system, the information including user, the shared information of shared file, the storage location of data directory
Information, access registrar information;Load balancing module is provided in the application scenarios of more synchronization service requests, is greater than in user concurrent number
In the case that modification and upload operation in synchronous directory are subjected to number of request, request is distributed at different processors
Reason;Data dispatch engine is used to that data file to be carried out storage location in public cloud and enterprise's cloud storage according to enterprise demand
Scheduling;User is carried out purview certification to the access of public cloud and enterprise's cloud file by identity and authority authentication center;System monitoring
Module is for network port service data involved in system service, data traffic, server system operation state, application system
Log is monitored and is indexed in real time;
The scheduling that data file is carried out to storage location according to enterprise demand in public cloud and enterprise's cloud storage, including public affairs
The data of between cloud and enterprise's cloud storage and cloud and user terminal shift altogether;By transaction format when initializing affairs
It is put into scheduling queue after change, scheduling queue is the queue of serialized data scheduling affairs;At the beginning of the predefined sequence of affairs trigger
Beginningization affairs, affairs are carried out according to the granularity of container;The access authority information that token is taken out from database, then by JSON
The transaction information of format is put into scheduling queue;The affairs that data dispatch is taken out from scheduling queue, according to affairs details,
The data to be dispatched are downloaded from corresponding container, and ephemeral data is stored under a temp directory of the same name, in correspondence
Enterprise's cloud storage in or public cloud storage in create container of the same name, the file data of downloading is all then uploaded into the appearance
In device, and the state of recording dispatching data in the database;Increase a record newly if all uploads of all data success simultaneously
True is set by pass flag, if there is uploads of failure then terminates upload affairs and by the data dispatch affairs of the container
The pass flag of record is set as false;In the case where dispatching data queue is that empty and transaction processor is all idle, scanning
The transaction journal table of volatile data base takes out the dispatching record of failure and according to logic initialization same with affairs trigger
Transaction format chemical conversion JSON format is put into scheduling data queue after initializing successfully, re-executes these failures by affairs
Scheduling affairs record corresponding in database is updated to success, if the number of container until the scheduling of data successfully completes
According to scheduling affairs failure, then all data dispatch of the container are re-executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423426.7A CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610423426.7A CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106127064A CN106127064A (en) | 2016-11-16 |
CN106127064B true CN106127064B (en) | 2019-02-15 |
Family
ID=57270727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610423426.7A Active CN106127064B (en) | 2016-06-14 | 2016-06-14 | Date storage method for enterprise supply chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127064B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427682A (en) * | 2017-02-14 | 2018-08-21 | 北京国双科技有限公司 | A kind of data file synchronous method and device |
CN107657025A (en) * | 2017-09-27 | 2018-02-02 | 合肥博力生产力促进中心有限公司 | One kind is used for business administration mathematical logic optimization system |
TWI698754B (en) * | 2018-05-29 | 2020-07-11 | 普安科技股份有限公司 | Method for managing the access authority to cloud storage and the system therefor |
CN111026795B (en) * | 2019-11-27 | 2023-07-18 | 成都耍流量网络科技有限公司 | Multi-platform data fusion system based on big data |
CN111475258A (en) * | 2020-03-27 | 2020-07-31 | 南京英诺森软件科技有限公司 | Enterprise technical architecture scheme based on container cloud |
CN111930800B (en) * | 2020-07-31 | 2021-09-24 | 东方财富证券股份有限公司 | Enterprise big data analysis and processing system based on cloud computing |
CN112699093A (en) * | 2021-01-25 | 2021-04-23 | 浪潮通用软件有限公司 | File storage method and equipment supporting hybrid multi-cloud |
CN113537558A (en) * | 2021-06-03 | 2021-10-22 | 广州快批信息科技有限公司 | Method and device for automatically processing upstream synchronization of material demands and terminal equipment |
CN113515323B (en) * | 2021-07-09 | 2023-02-17 | 中原银行股份有限公司 | Method and device for optimizing loading speed of Web application in portable terminal client |
CN114205124A (en) * | 2021-11-22 | 2022-03-18 | 广西电网有限责任公司 | Enterprise-level file interactive application management system |
CN116170448B (en) * | 2023-04-20 | 2023-07-18 | 河北先见软件科技股份有限公司 | Cross-organization data sharing method and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
CN104301301A (en) * | 2014-09-04 | 2015-01-21 | 南京邮电大学 | Inter-cloud-storage-system data migration encryption method |
CN104902005A (en) * | 2015-04-13 | 2015-09-09 | 中国联合网络通信集团有限公司 | Method and system for resource scheduling in hybrid cloud, and private cloud |
CN105119974A (en) * | 2015-07-21 | 2015-12-02 | 信阳启航信息科技有限公司 | Internet-of-things system using hybrid cloud architecture and realization method |
CN105471960A (en) * | 2015-08-03 | 2016-04-06 | 北京汉柏科技有限公司 | Information interaction system and method between private clouds and public cloud |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120185922A1 (en) * | 2011-01-16 | 2012-07-19 | Kiran Kamity | Multimedia Management for Enterprises |
-
2016
- 2016-06-14 CN CN201610423426.7A patent/CN106127064B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
CN104301301A (en) * | 2014-09-04 | 2015-01-21 | 南京邮电大学 | Inter-cloud-storage-system data migration encryption method |
CN104902005A (en) * | 2015-04-13 | 2015-09-09 | 中国联合网络通信集团有限公司 | Method and system for resource scheduling in hybrid cloud, and private cloud |
CN105119974A (en) * | 2015-07-21 | 2015-12-02 | 信阳启航信息科技有限公司 | Internet-of-things system using hybrid cloud architecture and realization method |
CN105471960A (en) * | 2015-08-03 | 2016-04-06 | 北京汉柏科技有限公司 | Information interaction system and method between private clouds and public cloud |
Also Published As
Publication number | Publication date |
---|---|
CN106127064A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106095954B (en) | Data base management method for enterprise supply chain | |
CN106127064B (en) | Date storage method for enterprise supply chain | |
CN106127368B (en) | Data storage method for enterprise resource management system | |
CN111183426B (en) | System and method for blockchain-based notification | |
Daraghmi et al. | MedChain: A design of blockchain-based system for medical records access and permissions management | |
US20210073806A1 (en) | Data processing system utilising distributed ledger technology | |
CN110543464B (en) | Big data platform applied to intelligent park and operation method | |
US8554749B2 (en) | Data file access control | |
CN109729168A (en) | A kind of data share exchange system and method based on block chain | |
CN111914269A (en) | Data security sharing method and system under block chain and cloud storage environment | |
TWI473029B (en) | Extensible and programmable multi-tenant service architecture | |
JP2022000757A5 (en) | ||
CN109144961A (en) | Authority sharing method and device | |
KR20200093007A (en) | Model training system and method, and storage medium | |
CN106161462A (en) | A kind of network security certification method | |
CN102947797A (en) | Online service access controls using scale out directory features | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
KR20220160021A (en) | Low Trust Privilege Access Management | |
CN107302524A (en) | A kind of ciphertext data-sharing systems under cloud computing environment | |
CN101291220B (en) | System, device and method for identity security authentication | |
Daraghmi et al. | A blockchain-based editorial management system | |
Rahul et al. | A novel authentication framework for Hadoop | |
Kuzminykh et al. | Comparative analysis of cryptographic key management systems | |
Ruan et al. | LedgerView: access-control views on hyperledger fabric |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181225 Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Applicant after: Shenzhen Zhen AI Jie Yun Information Technology Co., Ltd. Address before: 610041 3 3 Tianyi street, hi tech Zone, Chengdu, Sichuan Applicant before: Chengdu Jingjie Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |