CN106127064B - Date storage method for enterprise supply chain - Google Patents

Date storage method for enterprise supply chain Download PDF

Info

Publication number
CN106127064B
CN106127064B CN201610423426.7A CN201610423426A CN106127064B CN 106127064 B CN106127064 B CN 106127064B CN 201610423426 A CN201610423426 A CN 201610423426A CN 106127064 B CN106127064 B CN 106127064B
Authority
CN
China
Prior art keywords
data
enterprise
affairs
file
scheduling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610423426.7A
Other languages
Chinese (zh)
Other versions
CN106127064A (en
Inventor
郭建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhen AI Jie Yun Information Technology Co., Ltd.
Original Assignee
Shenzhen Zhen Ai Jie Yun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhen Ai Jie Yun Information Technology Co Ltd filed Critical Shenzhen Zhen Ai Jie Yun Information Technology Co Ltd
Priority to CN201610423426.7A priority Critical patent/CN106127064B/en
Publication of CN106127064A publication Critical patent/CN106127064A/en
Application granted granted Critical
Publication of CN106127064B publication Critical patent/CN106127064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The present invention provides a kind of date storage methods for enterprise supply chain, this method comprises: enterprise stores own service data in cloud storage, according to the variation of business demand, data are dispatched between public cloud storage and enterprise's cloud storage, identity and purview certification are carried out to the service data visitation request of client.The invention proposes a kind of date storage methods for enterprise supply chain, and by the data synchronous safety mechanism of cloud storage system, enterprise customer be can be convenient and safely synchronous and shared file, enterprise administrator can also intuitively understand the operating status of system.

Description

Date storage method for enterprise supply chain
Technical field
The present invention relates to data storage, in particular to a kind of date storage method for enterprise supply chain.
Background technique
The technology that service calculates can be used in cloud computing in terms of framework realization, and business function is decomposed into loose coupling, uniformly The service of standard and interface meets enterprise's rapid build and the variation of response business, reuses original IT resource, data sharing and supply The demand of chain business cooperation.Enterprise may be implemented using the ERP System of cloud computing technology and SOA mode construction to obtain Shared resource is taken, IT application in enterprises cost is reduced, improves its core competitiveness in market competition.It is quick with internet Development and IT application in enterprises degree be continuously improved, enterprises business rapid growth and it is diversified simultaneously, data Continuously increasing.At the same time, it selects to be suitble in enterprise also in vigorous growth for the cloud storage of corporate client The data storage scheme in portion guarantees that the safety and stability storage of data is the important leverage of enterprise development.However existing cloud storage Technology is the availability of storage system constructed by different enterprises, and stability and reliability are also irregular, and can not be simultaneous Gu Anquan and low cost.Such as in private clound, user can define the security level of data;But need enterprise investment it is comparable at This can just set up and keep stable operation, and carrying cost is high.
Summary of the invention
To solve the problems of above-mentioned prior art, the invention proposes a kind of data for enterprise supply chain to deposit Method for storing, comprising:
Enterprise stores own service data in cloud storage, and according to the variation of business demand, data are deposited in public cloud It is dispatched between storage and enterprise's cloud storage, identity and purview certification is carried out to the service data visitation request of client.
Preferably, the server end of the corporate resources cloud storage platform includes data simultaneous module, Web server, number According to memory module, data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein the Web server is User accesses file by browser and provides support;Data simultaneous module is responsible for the synchronization of file, the new text uploaded including processing Part downloads updated file, and the update of client is synchronized to server;It sends synchronization request in request queue;Number According to structured message to be processed in memory module storage system, the information including user, the shared information of shared file, data The storage location information of catalogue, access registrar information;Load balancing module is provided in the application scenarios of more synchronization service requests, In the case that user concurrent number is greater than modification and the acceptable number of request of upload operation in synchronous directory, request is distributed to difference Processor handled;Data dispatch engine is used for data file according to enterprise demand in public cloud and enterprise's cloud storage Carry out the scheduling of storage location;User is carried out permission to the access of public cloud and enterprise's cloud file by identity and authority authentication center Certification;System-monitoring module is for network port service data involved in system service, data traffic, server system operation State, application system log are monitored and are indexed in real time;
The scheduling that data file is carried out to storage location according to enterprise demand in public cloud and enterprise's cloud storage, packet The data for including between public cloud and enterprise's cloud storage and cloud and user terminal shift;By affairs when initializing affairs It is put into scheduling queue after formatting, scheduling queue is the queue of serialized data scheduling affairs;Affairs trigger predefines suitable Sequence initializes affairs, and affairs are carried out according to the granularity of container;The access authority information of token is taken out from database, then will The transaction information of JSON format is put into scheduling queue;The affairs of data dispatch are taken out from scheduling queue, it is detailed according to affairs Information downloads the data to be dispatched from corresponding container, and ephemeral data is stored under a temp directory of the same name, Container of the same name is created in corresponding enterprise's cloud storage or in public cloud storage, then all uploads to the file data of downloading In the container, and the state of recording dispatching data in the database;Increase a note newly if all uploads of all data success It records and simultaneously sets true for pass flag, if there is uploads of failure then terminates upload affairs and by the data dispatch of the container The pass flag of transaction journal is set as false;In the case where dispatching data queue is that empty and transaction processor is all idle, The transaction journal table for scanning volatile data base takes out the dispatching record of failure and according at the beginning of logic same with affairs trigger Transaction format chemical conversion JSON format is put into scheduling data queue after initializing successfully, re-executes these by beginningization affairs Record corresponding in database is updated to success, if container until the scheduling of data successfully completes by the scheduling affairs of failure Data dispatch affairs failure, then re-execute all data dispatch of the container.
The present invention compared with prior art, has the advantage that
The invention proposes a kind of date storage methods for enterprise supply chain, synchronous by the data of cloud storage system Security mechanism, enterprise customer can be convenient and safely synchronous and shared file, enterprise administrator can also intuitively understand system Operating status.
Detailed description of the invention
Fig. 1 is the flow chart of the date storage method according to an embodiment of the present invention for enterprise supply chain.
Specific embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the attached drawing of the diagram principle of the invention It states.The present invention is described in conjunction with such embodiment, but the present invention is not limited to any embodiments.The scope of the present invention is only by right Claim limits, and the present invention covers many substitutions, modification and equivalent.Illustrate in the following description many details with Just it provides a thorough understanding of the present invention.These details are provided for exemplary purposes, and without in these details Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of date storage method for enterprise supply chain.Fig. 1 is according to the present invention The date storage method flow chart for enterprise supply chain of embodiment.
The position that the present invention allows enterprise's self-defining data to store according to corporate resources cloud storage platform, critical data is deposited Storage dispatches data according to the variation of business demand in enterprise's cloud storage between public cloud storage and enterprise's cloud storage.Enterprise Easily synchronous and shared file, enterprise administrator can also intuitively understand the operating status of system to the user in portion in the industry.
For cloud platform server end, including data simultaneous module, Web server, data memory module, data dispatch draws It holds up, identity and authority authentication center and system-monitoring module;For user client, including pc client is applied and Web application. Pc client, which is applied, creates virtual disk for user, and carry is in the position that user selectes.The virtual disk is for synchronizing user's File, the file that all users are placed under the catalogue be synchronized to the cloud on server storage, and in the storage of server Hold and keeps synchronized update.Web applies the file accessed on server by webpage.
The Web server of server end is to access file by browser for user to provide support.Data simultaneous module is negative The synchronization for blaming file downloads updated file, the update of client is synchronized to service including the new file that processing uploads Device.It sends synchronization request in request queue, in distributed environment, idle processing server takes from request queue It returns hospitality and seeks Message Processing result and return to result.Structured message to be processed in data memory module storage system, including The information of user, the shared information of shared file, the storage location information of data directory, access registrar information.Load balance mould Block is provided in the application scenarios of more synchronization service requests.User concurrent number be greater than synchronous directory in modification and upload operation can In the case where receiving number of request, request is distributed to different processors and is handled.At the mechanism concentration of request queue Manage the demand of transaction distribution.Data dispatch engine is used for data file according to enterprise demand in public cloud and enterprise's cloud storage Carry out the scheduling of storage location.User is carried out permission to the access of public cloud and enterprise's cloud file by identity and authority authentication center Certification.System-monitoring module is for network port service data involved in system service, data traffic, server system operation State, application system log are monitored and are indexed in real time.
In data synchronization process, client runs synchronized process, which detects client by monitoring thread Variation under synchronous directory then triggers synchronized process and server carries out the same of file once user stores corporate resources file Step.User is submitted in local cache the change of file by synchronized process;Synchronized process downloads this data mesh from server The cloud of record is cached to local, if there is other users or same user are had updated in server using other clients Hold, this cloud caching contains the update of this part;The cloud caching of downloading is merged into local local and delayed by synchronized process In depositing, branch local so also includes the content updated on server;Local cache is uploaded and is merged into service by synchronized process The cloud of device caches, and just has the more new content of the user on such server on the caching of cloud.It is buffered in using index file The timestamp that each file last time in workflow is submitted, judging which is updated by the comparison of timestamp is nearest It is primary submit on carry out.Then ensure that only one client updates request and can successfully be held using incompatible lock mechanism Row then prompts to update to fail to other clients, and the client updated not successfully re-starts above-mentioned update operating process.In weight During newly carrying out, then the client updated not successfully, which merges newest update in all branches of oneself, arrives clothes in update It is engaged in device.
For cloud platform server, management by synchronization process is run to receive the request of data synchronization pass, then will be asked It asks and is sent in request queue, idle synchronization process process is taken out from request queue requests and handle request, updates affairs State, and finally by the result of processing return to request user.The certification phase of user is contained in the request that client is sent Close information, the resource storage location of request, the operation of request.The conjunction of request is monitored by identity and authority authentication center first Method, if it is a new request and solicited message it is legal, server by the information of user record in a session;Verifying is asked After the legitimacy asked, the state of request is updated, if illegal, the information of authentification failure is returned into requesting client.Such as Fruit certification passes through, then creates a processing affairs, and the resource information of request, the storage location of resource, request are added in affairs The title of ID, the relevant information of request data catalogue.Including title, higher level's object, the operation information of request.The initialization of affairs After work is completed, affairs are just added in request request queue by task manager, wait transaction processor processing.
Data memory module safeguards data directory information table, and which stores the essential informations of data directory, including are stored in Which position of cloud storage, corresponding ID title and Container Name, if be shared data catalogue, the ID of higher level's data directory. According to the hierarchy nesting relationship of tissue data directory, the hierarchical relationship is only updated when carrying out transfer operation to data directory.Number Shared information table is also safeguarded according to memory module, has recorded owner and the sharer's information of data directory.When user sharing one When data directory gives other users, at the same create a token accessed come the user for authorizing its shared by this token and Modify the file content in share directory.
Data dispatch includes the data transfer of between public cloud and enterprise's cloud storage and cloud and user terminal.Initial It will be put into scheduling queue after transaction format when changing affairs, scheduling queue is the queue of serialized data scheduling affairs. The predefined sequence of affairs trigger initializes affairs, and affairs are carried out according to the granularity of container.Token is taken out from database Then the transaction information of JSON format is put into scheduling queue by access authority information.Data dispatch is taken out from scheduling queue Affairs the data to be dispatched are downloaded from corresponding container, and the ephemeral data is stored in one according to affairs details Under a temp directory of the same name, create container of the same name in corresponding enterprise's cloud storage or in public cloud storage, then will under The file data of load all uploads in the container, and the state of recording dispatching data in the database.If all data It all uploads and successfully then increases a record newly and set true for pass flag, if there is the upload of failure then terminates upload affairs And false is set by the pass flag of the data dispatch transaction journal of the container.It is empty and thing in scheduling data queue Be engaged in processor it is all idle in the case where, scan the transaction journal table of volatile data base, by the dispatching record of failure take out and according to Transaction format chemical conversion JSON format is put into scheduling after initializing successfully by logic initialization affairs same with affairs trigger In data queue, the scheduling affairs of these failures are re-executed, it, will be corresponding in database until the scheduling of data successfully completes Record is updated to success.The record granularity of scheduling data information record is to depend on container, if the data dispatch affairs of container Failure, then re-execute all data dispatch of the container.
Identity and authority authentication center entrance be arranged act on behalf of, the object judgement according to request be using public cloud storage also It is that enterprise's cloud storage is authenticated.For public cloud storage, the access for the data of a container includes two parts, and one is Access of the container owner to the container data, one is access of the non-container owner to container.Container owner is to container The access of data only needs to provide the title and access keys of the ID.Access for non-container owner to container data, then Using unique URI, it includes the storage resource information to be accessed, time started, expired time, permission control information and label Name.The reading strategy of container is stored in advance, all data under the container all inherit the reading strategy.Private clound is deposited Storage, using tenant, user, three levels of role authenticate the access authority of resource.
For the safety of the client under cloud environment, identity and authority authentication center is mentioned by behavior and encryption mechanism For multilayer certification, behavioural analysis and form data ciphertext.User's checking is provided by authentication module first, then statistical module Counting user behavior confirms user's history safety.Finally based on encryption encapsulation process, customer data is converted into encryption number According to, and it is sent to cloud storage.
As follows to the verification process of terminal user: client generates a random number, then signs, is carrying out to it After Hash digest, is signed with the public key of authentication center to abstract, be sent to authentication center.When authentication center receives client It after the encryption information sent, is decrypted, signature is verified with the public key of client again first then.If decrypted Random number cryptographic Hash it is identical with the cryptographic Hash received, then client certificate passes through.Authentication center decrypts random number and is used in combination After client public key encryption, encrypted information is sent to client.After client is decrypted with the private key of oneself, with oneself The random number that oneself generates is compared, if equal, to be considered as authentication center legal.
Specifically, identity and authority authentication center includes cipher key management unit, license management unit, license validation list Member.Cipher key management unit provides key escrow for license management unit and encryption key provides service, disposes on the server Key database is cipher key management unit, license management unit, license validation unit as the Database Systems of concentration Unified database module is provided, data backup is periodically carried out.License management unit is responsible for distribution management licensing.Licensing Authentication unit is responsible for realizing licensing application, audit business.The license validation unit is also based on directory service, answers business Unified Identity is provided with the user of system to identify and unification user authorization.Directory service includes ID catalogue, certification directory and resource Catalogue, ID catalogue store identity and management strategy information, are stored with whole user data from enterprise data source and each application System ID data.Certification directory provides user identity authentication, and information needed for storing user authentication, is the subset of ID catalogue.Money Source directory is for storing comprehensive user group's framework, authorizing the information such as role.Information is according to classification of type in Resource TOC Storage stores enterprise customer, department, user group data.
Wherein, counting user behavior confirms user's history safety, specifically: (1) user issue resource access application, Authentication center carries out authentication to it first, directly refuses its access request if authentication failed, and authentication is successfully used Statistical module is transferred to carry out user behavior certification in family;(2) user that statistical module query safe database is stored currently believes Appoint value, its behavior safety grade is determined, and authorize its corresponding grade of service and access authority according to security level, if user Then refuse its access request lower than lowest service level;(3) in the access process of user, the behavior of authentication center obtains module It monitors the operation behavior of user in real time, obtains user behavior;(4) user behavior that behavior processing module will acquire carries out standard volume Change processing;(5) it by the behavior vector after standardization, is stored in behavior database;(6) using the behavior in behavior database to Measure the safety of comprehensive assessment user behavior;(7) the credible measurement of user's behavior in different time periods is stored in security database; (8) statistical module reads the user's behavior confidence level amount in trust data library, determines the current security level of user in real time, and be It dynamically distributes the corresponding grade of service and operating right;(9) the trust state Real-time Feedback of user is prompted into its quilt to user The access behavior of authorization.
It is described to be based on encryption encapsulation process, customer data is converted into encryption data, further comprises, by private key for user pair It only should just can get when the attribute set that user possesses meets the corresponding access structure of this ciphertext after attribute set, decryption In plain text:
Data owner generates master key and public key, and user signs to public key later, then sends out public key and signature Server is given, oneself storage master key.When system is added in new user, system is that an attribute is arranged in the attribute of each user Collection, and private key is generated for it.Then client formulates file access strategy in upper transmitting file, and system is according to current access Strategy encrypts file, and ciphertext data are obtained after encryption.When the attribute of user encryption meets access strategy, system is just Clear data can be decrypted into the file after encryption according to decipherment algorithm.
In conclusion passing through cloud storage system the invention proposes a kind of date storage method for enterprise supply chain Data synchronous safety mechanism, enterprise customer can be convenient and safely synchronous and shared file, enterprise administrator can also be straight See the operating status of understanding system.
Obviously, it should be appreciated by those skilled in the art, each module of the above invention or each steps can be with general Computing system realize that they can be concentrated in single computing system, or be distributed in multiple computing systems and formed Network on, optionally, they can be realized with the program code that computing system can be performed, it is thus possible to they are stored It is executed within the storage system by computing system.In this way, the present invention is not limited to any specific hardware and softwares to combine.
It should be understood that above-mentioned specific embodiment of the invention is used only for exemplary illustration or explains of the invention Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (1)

1. a kind of date storage method for enterprise supply chain is applied to corporate resources cloud storage platform, which is characterized in that packet It includes:
Enterprise stores own service data in cloud storage, according to the variation of business demand, by data in public cloud storage and It is dispatched between enterprise's cloud storage, identity and purview certification is carried out to the service data visitation request of client;
The server end of the corporate resources cloud storage platform includes data simultaneous module, Web server, data memory module, Data dispatch engine, identity and authority authentication center and system-monitoring module;Wherein the Web server is that user passes through browsing Device accesses file and provides support;Data simultaneous module is responsible for the synchronization of file, including the new file that processing uploads, after downloading updates File, the update of client is synchronized to server;It sends synchronization request in request queue;Data memory module storage Structured message to be processed in system, the information including user, the shared information of shared file, the storage location of data directory Information, access registrar information;Load balancing module is provided in the application scenarios of more synchronization service requests, is greater than in user concurrent number In the case that modification and upload operation in synchronous directory are subjected to number of request, request is distributed at different processors Reason;Data dispatch engine is used to that data file to be carried out storage location in public cloud and enterprise's cloud storage according to enterprise demand Scheduling;User is carried out purview certification to the access of public cloud and enterprise's cloud file by identity and authority authentication center;System monitoring Module is for network port service data involved in system service, data traffic, server system operation state, application system Log is monitored and is indexed in real time;
The scheduling that data file is carried out to storage location according to enterprise demand in public cloud and enterprise's cloud storage, including public affairs The data of between cloud and enterprise's cloud storage and cloud and user terminal shift altogether;By transaction format when initializing affairs It is put into scheduling queue after change, scheduling queue is the queue of serialized data scheduling affairs;At the beginning of the predefined sequence of affairs trigger Beginningization affairs, affairs are carried out according to the granularity of container;The access authority information that token is taken out from database, then by JSON The transaction information of format is put into scheduling queue;The affairs that data dispatch is taken out from scheduling queue, according to affairs details, The data to be dispatched are downloaded from corresponding container, and ephemeral data is stored under a temp directory of the same name, in correspondence Enterprise's cloud storage in or public cloud storage in create container of the same name, the file data of downloading is all then uploaded into the appearance In device, and the state of recording dispatching data in the database;Increase a record newly if all uploads of all data success simultaneously True is set by pass flag, if there is uploads of failure then terminates upload affairs and by the data dispatch affairs of the container The pass flag of record is set as false;In the case where dispatching data queue is that empty and transaction processor is all idle, scanning The transaction journal table of volatile data base takes out the dispatching record of failure and according to logic initialization same with affairs trigger Transaction format chemical conversion JSON format is put into scheduling data queue after initializing successfully, re-executes these failures by affairs Scheduling affairs record corresponding in database is updated to success, if the number of container until the scheduling of data successfully completes According to scheduling affairs failure, then all data dispatch of the container are re-executed.
CN201610423426.7A 2016-06-14 2016-06-14 Date storage method for enterprise supply chain Active CN106127064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610423426.7A CN106127064B (en) 2016-06-14 2016-06-14 Date storage method for enterprise supply chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610423426.7A CN106127064B (en) 2016-06-14 2016-06-14 Date storage method for enterprise supply chain

Publications (2)

Publication Number Publication Date
CN106127064A CN106127064A (en) 2016-11-16
CN106127064B true CN106127064B (en) 2019-02-15

Family

ID=57270727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610423426.7A Active CN106127064B (en) 2016-06-14 2016-06-14 Date storage method for enterprise supply chain

Country Status (1)

Country Link
CN (1) CN106127064B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108427682A (en) * 2017-02-14 2018-08-21 北京国双科技有限公司 A kind of data file synchronous method and device
CN107657025A (en) * 2017-09-27 2018-02-02 合肥博力生产力促进中心有限公司 One kind is used for business administration mathematical logic optimization system
TWI698754B (en) * 2018-05-29 2020-07-11 普安科技股份有限公司 Method for managing the access authority to cloud storage and the system therefor
CN111026795B (en) * 2019-11-27 2023-07-18 成都耍流量网络科技有限公司 Multi-platform data fusion system based on big data
CN111475258A (en) * 2020-03-27 2020-07-31 南京英诺森软件科技有限公司 Enterprise technical architecture scheme based on container cloud
CN111930800B (en) * 2020-07-31 2021-09-24 东方财富证券股份有限公司 Enterprise big data analysis and processing system based on cloud computing
CN112699093A (en) * 2021-01-25 2021-04-23 浪潮通用软件有限公司 File storage method and equipment supporting hybrid multi-cloud
CN113537558A (en) * 2021-06-03 2021-10-22 广州快批信息科技有限公司 Method and device for automatically processing upstream synchronization of material demands and terminal equipment
CN113515323B (en) * 2021-07-09 2023-02-17 中原银行股份有限公司 Method and device for optimizing loading speed of Web application in portable terminal client
CN114205124A (en) * 2021-11-22 2022-03-18 广西电网有限责任公司 Enterprise-level file interactive application management system
CN116170448B (en) * 2023-04-20 2023-07-18 河北先见软件科技股份有限公司 Cross-organization data sharing method and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902498A (en) * 2010-07-02 2010-12-01 广州鼎甲计算机科技有限公司 Network technology based storage cloud backup method
CN104301301A (en) * 2014-09-04 2015-01-21 南京邮电大学 Inter-cloud-storage-system data migration encryption method
CN104902005A (en) * 2015-04-13 2015-09-09 中国联合网络通信集团有限公司 Method and system for resource scheduling in hybrid cloud, and private cloud
CN105119974A (en) * 2015-07-21 2015-12-02 信阳启航信息科技有限公司 Internet-of-things system using hybrid cloud architecture and realization method
CN105471960A (en) * 2015-08-03 2016-04-06 北京汉柏科技有限公司 Information interaction system and method between private clouds and public cloud

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120185922A1 (en) * 2011-01-16 2012-07-19 Kiran Kamity Multimedia Management for Enterprises

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902498A (en) * 2010-07-02 2010-12-01 广州鼎甲计算机科技有限公司 Network technology based storage cloud backup method
CN104301301A (en) * 2014-09-04 2015-01-21 南京邮电大学 Inter-cloud-storage-system data migration encryption method
CN104902005A (en) * 2015-04-13 2015-09-09 中国联合网络通信集团有限公司 Method and system for resource scheduling in hybrid cloud, and private cloud
CN105119974A (en) * 2015-07-21 2015-12-02 信阳启航信息科技有限公司 Internet-of-things system using hybrid cloud architecture and realization method
CN105471960A (en) * 2015-08-03 2016-04-06 北京汉柏科技有限公司 Information interaction system and method between private clouds and public cloud

Also Published As

Publication number Publication date
CN106127064A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106095954B (en) Data base management method for enterprise supply chain
CN106127064B (en) Date storage method for enterprise supply chain
CN106127368B (en) Data storage method for enterprise resource management system
CN111183426B (en) System and method for blockchain-based notification
Daraghmi et al. MedChain: A design of blockchain-based system for medical records access and permissions management
US20210073806A1 (en) Data processing system utilising distributed ledger technology
CN110543464B (en) Big data platform applied to intelligent park and operation method
US8554749B2 (en) Data file access control
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN111914269A (en) Data security sharing method and system under block chain and cloud storage environment
TWI473029B (en) Extensible and programmable multi-tenant service architecture
JP2022000757A5 (en)
CN109144961A (en) Authority sharing method and device
KR20200093007A (en) Model training system and method, and storage medium
CN106161462A (en) A kind of network security certification method
CN102947797A (en) Online service access controls using scale out directory features
CN105516110A (en) Mobile equipment secure data transmission method
CN105450750A (en) Secure interaction method for intelligent terminal
KR20220160021A (en) Low Trust Privilege Access Management
CN107302524A (en) A kind of ciphertext data-sharing systems under cloud computing environment
CN101291220B (en) System, device and method for identity security authentication
Daraghmi et al. A blockchain-based editorial management system
Rahul et al. A novel authentication framework for Hadoop
Kuzminykh et al. Comparative analysis of cryptographic key management systems
Ruan et al. LedgerView: access-control views on hyperledger fabric

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181225

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen Zhen AI Jie Yun Information Technology Co., Ltd.

Address before: 610041 3 3 Tianyi street, hi tech Zone, Chengdu, Sichuan

Applicant before: Chengdu Jingjie Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant