CN106776706A - Method for managing user right and device based on caching - Google Patents

Method for managing user right and device based on caching Download PDF

Info

Publication number
CN106776706A
CN106776706A CN201611009620.7A CN201611009620A CN106776706A CN 106776706 A CN106776706 A CN 106776706A CN 201611009620 A CN201611009620 A CN 201611009620A CN 106776706 A CN106776706 A CN 106776706A
Authority
CN
China
Prior art keywords
user
access
data
caching
access right
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611009620.7A
Other languages
Chinese (zh)
Inventor
李晨
彭龙
李明泉
刘华
梁杰雯
李志真
郑东波
赵清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Space Star Technology Co Ltd
Original Assignee
Space Star Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Space Star Technology Co Ltd filed Critical Space Star Technology Co Ltd
Priority to CN201611009620.7A priority Critical patent/CN106776706A/en
Publication of CN106776706A publication Critical patent/CN106776706A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method of the user authority management based on caching.Using there is caching to look into power method, when user conducts interviews, inquiry user right cache database is recorded the present invention with the presence or absence of the access right data of the user;If it is not, generation access right data, and the user right cache database is arrived into access right data storage;If it has, then the access right data of the user is loaded into internal memory by the access right data record of the user in the user right cache database.Because login authentication user identity link requires to look up user right cache table, so logging in the used time substantially than without the more of caching method.The invention also discloses a kind of device of the user authority management based on caching.

Description

Method for managing user right and device based on caching
Technical field
The present invention relates to user authority management technical field, and in particular to a kind of method for managing user right based on caching And a kind of user authority management device based on caching.
Background technology
With being skyrocketed through for internet information and user, how effectively to reduce user and access time delay, improve network service The utilization rate of quality and the network bandwidth is a problem in the urgent need to address.Web proxy caching technology is to overcome these problems Most efficient method.Web caching servers system is just widely applied on Internet and LAN, and it is used Technology has done more deep discussion, it is indicated that utilize Web Cache technologies, can reduce network traffics, saves fund, improves bandwidth profit With rate;Content analysis filtering is carried out at Cache servers end simultaneously, filter quality and efficiency can be improved, effectively prevent harmful letter What is ceased is propagated further.
Access control based roles method brings flexibility and simplicity to user authorization management, but works as and it is had When body is applied to actual big-and-middle-sized application system, just find there is a problem in that:Due to application system user (asu), role and power Limit quantity is a lot, and user and role ask, also there is very complicated relation between role and role, between role and authority And various constraints.Whether judge user to have certain operating right is probably a recursive lookup process for complexity, Need to connect database, carry out it is a large amount of than relatively time-consuming data query operation, even and if user accesses identical resource every time, Also to repeat it is same look into power process, this looks into power speed by the system that has a strong impact on.
Therefore, the method and device for wanting a kind of solution system to look into the slow-footed user authority management of authority is needed badly.
The content of the invention
Technical problem
In view of this, the embodiment of the present invention provides method for managing user right and device based on caching, and authority is looked into solution Slow-footed technical problem.
According to an aspect of the present invention, a kind of method for managing user right based on caching is disclosed.The method includes Following steps:
When user conducts interviews, inquiry user right cache database is remembered with the presence or absence of the access right data of the user Record;
If it is not, generation access right data, and access right data storage is delayed to the user right Deposit data storehouse;
If it has, then the access right data record of the user in the user right cache database uses this The access right data at family is loaded into internal memory.
Wherein in one embodiment, it is described generation access right data the step of be according to RBAC look into power method generation visit Ask permissions data.
Wherein in one embodiment, the access right data record of the user includes that user profile, user access money Any information in source information, operating right information and resource access times information.
Wherein in one embodiment, when the access right data that user right cache database has the user is recorded When, add up resource access times information.
Wherein in one embodiment, the method also comprises the following steps:
It is according to predetermined resource access times, the access right data for exceeding the resource of the predetermined resource access times is straight Carry into internal memory.
According to another aspect of the present invention, a kind of user authority management device based on caching is additionally provided.The device Including:User right cache database, for storing user access resources data record, wherein, for different access resources Corresponding access data record is set;Inquiry judging module, when being conducted interviews for user, inquires about user right cache database With the presence or absence of the access right data record of the user;Access right data produces module, for user right cache database And in the absence of the user access right data record when, then generate access right data, and the access right data is deposited Store up the user right cache database;Insmod, for the user in the user right cache database Access right data record the access right data of the user is loaded into internal memory.
Wherein in one embodiment, access right data produces module and looks into power method generation access rights number according to RBAC According to.
Wherein in one embodiment, the access right data record of the user includes that user profile, user access money Any information in source information, operating right information and resource access times information.
Wherein in one embodiment, the device also includes:
Accumulation module, when the access right data for there is the user when user right cache database is recorded, adds up The resource access times information of user access resources data record.
Wherein in one embodiment, insmod and be additionally operable to according to predetermined resource access times, will be predetermined more than described The access right data of the resource of resource access times is directly loaded into internal memory.
Using above-mentioned technical proposal, the present invention can at least obtain following technique effects:
During using there is caching to look into power method, because login authentication user identity link requires to look up user right cache table, So logging in the used time substantially than without the more of caching method;
During login only the user most frequently with the caching permissions data of those resources be loaded into internal memory for looking into power Use, and the caching permissions data of some resources that other are not frequently used, using then just to extraction in database.From whole From the point of view of on body, taken when can both avoid User logs in using such strategy more, it is also possible to which that improves system looks into power speed.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, institute in being described to the embodiment of the present invention below The accompanying drawing for needing to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also implement according to the present invention The content and these accompanying drawings of example obtain other accompanying drawings.
Fig. 1 is the method for managing user right flow chart based on caching described in one embodiment of the invention;
Fig. 2 is the user authority management schematic device based on caching described in one embodiment of the invention.
Through accompanying drawing, it should be noted that similar label is used to describe same or analogous element, feature and structure.
Specific embodiment
The disclosure for providing description referring to the drawings to help comprehensive understanding to be limited by claim and its equivalent Various embodiments.Hereinafter description includes the various details for helping understand, but these details will be considered as only being example Property.Therefore, it will be appreciated by those of ordinary skill in the art that do not depart from the scope of the present disclosure and spirit in the case of, can be right Various embodiments described herein makes various changes and modifications.In addition, in order to clear and succinct, known function and construction are retouched Stating to be omitted.
Term and vocabulary used in following description and claims are not limited to document implication, but only by inventor For enabling the disclosure clearly and as one man to be understood.Therefore, to those skilled in the art it should be apparent that carrying The description of various embodiments of this disclosure is merely to exemplary purpose under being provided with, and it is unrestricted by appended claims and its The purpose of the disclosure that equivalent is limited.
It should be understood that unless context is clearly indicated in addition, otherwise singulative also includes plural.Thus, for example, Reference to " assembly surface " includes the reference to one or more such surfaces.
Whether traditional access control based roles are based on RBAC model, when judging user with certain operating right During P, user-role assignment relation (User Assignment, UA), role-security appointment relation that can be in RBAC model The hierarchical relationship (Role Hierarchy, RH) of (Permission Assignment, PA) and between role is specifically judged. For example, judging whether user U1 has authority P1, U1 directly possesses role R1 in user-role assignment relation, and R1 has authority P1.In RBAC, user possesses whole authorities that certain role just possesses the role.Therefore, as long as whether inquiry role R1 includes Have permission P1 and just can determine that whether user U1 has authority P1.And for example, judge whether user U2 possesses authority Pm, user role In appointment relation and role hierarchy, the direct role that U2 possesses is R2, and the direct lower floor role of R2 is R5, and R5's is direct Lower floor role is R8, and R8 just directly possesses authority Pm.When power operation is specifically looked into, it is necessary to successively down search for, according in RBAC Upper strata (father) role possess lower floor (son) role whole authorities principle, when searching R8 could according in R8 whether Possess authority Pm to judge whether user U2 has authority Pm indirectly.Merely just one simplified example, real application systems The power process of looking into may be also more much more complex than this.Be can see during looking into power from traditional RBAC, judge whether user has Certain authority will be by searching UA, RH and PA relation of RBAC of the storage in database and generating corresponding permissions data to be sentenced It is fixed.Due to not storing the direct relation that any user and authority are asked in database, each user accesses application system and is looked into The permissions data and judged result for temporary generating just are abandoned after when secondary use, when the user logs in next time again, even if It is to access also to regenerate permissions data with last time identical system resource and then be judged again.It is this to look into power mode The speed of service on system is influenceed than larger.
The method for managing user right and device based on caching of the application, using there is caching to look into power method, due to logging in Checking user identity link requires to look up user right cache table, so logging in the used time substantially than without caching method many one A bit;During login only the user most frequently with the caching permissions data of those resources be loaded into internal memory and used for looking into power, And the caching permissions data of some resources that other are not frequently used, using then just to extraction in database.On the whole From the point of view of, taken when can both avoid User logs in using such strategy more, it is also possible to which that improves system looks into power speed
Fig. 1 is the method for managing user right flow chart based on caching described in one embodiment of the invention.
With reference to Fig. 1, the method for managing user right 100 based on caching described in the present embodiment, the method 100 includes as follows Step:
Step S120:Inquiry user right cache database is recorded with the presence or absence of the access right data of the user.User When conducting interviews, the access right data that user right cache database is inquired about first with the presence or absence of the user is recorded.
It is exactly that when logging in application system every time, will search for and store in database to cause to look into the slow-footed main cause of power UA, RH and PA relation and again production permissions data carry out matching judgment again, even the resource accessed before user Also it is such.Solve this to cause to look into the slow-footed problem of power, must just take corresponding method, avoid user each as far as possible Permissions data will be regenerated during recording system and is judged.For this problem, the application looks into power side to traditional RBAC Method has carried out certain improvement, using directly caching certain customers often with the strategy of permissions data.
Step S140, if it is not, generation access right data, and access right data storage is weighed to the user Limit cache database.If user right cache database is recorded in the absence of the access right data of the user, generation is accessed Permissions data, and the user right cache database is arrived into access right data storage.User accesses or accesses first not to be had , it is necessary to first generate access right data when having the new application resource of record, and by the access right data of generation store to Family authority cache database.So, when user's access next time the latter accesses the resource again, user right cache database can be deposited Recorded accordingly.
Specifically, the step of above-mentioned generation access right data is to look into power method generation access right data according to RBAC. Wherein, the access right data record of user includes that user profile, user access resources information, operating right information and resource are visited Ask any information in number information.
When user accesses application system for the first time, because also the family does not access the permissions data note of resource in database Record, at this moment must generate this permissions data needed for accessing of the user using UA, RH and PA relation stored in database, And permissions data is loaded into speed local internal memory quickly, when user needs to look into temporary, directly to looking into local memory Look for.
Step S160:If it has, then the access right data of the user in user right cache database is recorded The access right data of the user is loaded into internal memory.If there are the access rights of the user in user right cache database Data record, then record directly in database, internal memory is loaded into by the access right data of the user.
Also, when the access right data that user right cache database has the user is recorded, add up resource and access secondary Number information.When user newly accesses or accesses new resource, it is 1 to be directed to the new resource count in database, later by this It is cumulative.The power result of looking into of this user is automatically saved in the authority cache table of database.When the user revisits in next time When asking, the authority cache table of database is first searched for, the permissions data that user's last time is cached is directly in manned internal memory.If with What family accessed is the resource that last visit is crossed, then directly read its permissions data to local memory and controlled accordingly;If It is resource that the user did not access, due to the permissions data for not having it to cache in local memory, is at this moment just compared Time-consuming connection and inquiry database manipulation, according to UA, RH and PA relation of storage, conventionally generate the power of the user Limit data, are loaded into internal memory, and are cached, in addition to power use is looked into for this, also for next user look into weigh it is ready.By The number of times for temporary connecting, inquiring about database and the time for generating permissions data are looked into every time in user is reduced as far as possible, so looking into Power speed has also accordingly obtained certain raising.
The above-mentioned method for managing user right based on caching, can also be according to predetermined resource access times, will be more than described The access right data of the resource of predetermined resource access times is directly loaded into internal memory.As user is got over using the number of times of application system Come more, the user cache permissions data in database also can be more and more.If every time that user is all of data cached All out again if manned internal memory, longer time can be also spent from data base querying.Have in view of user job certain Repeatability and the characteristics of locality, although they with access to resource may a lot, but be commonly used it is simply therein Sub-fraction.Therefore, according to these features of user, it is above-mentioned it is improved on the basis of take following improved method again:In data A field being set in storehouse to carry out record system resource and be accessed for number of times, being often accessed once, its nearest access times is just automatic Plus " 1 ", the bigger resource of access times, is exactly often to be accessed for resource recently.During login only the user most frequently with The caching permissions data of those resources is used in being loaded into internal memory for looking into power, and the caching of some resources that other are not frequently used Permissions data, using then just to extraction in database.On the whole, user can both be avoided using such strategy Taken during login more, it is also possible to which that improves system looks into power speed.
Fig. 2 is the user authority management schematic device based on caching described in one embodiment of the invention.
With reference to Fig. 2, present disclose provides a kind of user authority management device 200 based on caching, the device includes:User Authority cache database 210, inquiry judging module 230, access right data production module 250, insmod 270 and accumulative mould Block 290.
User right cache database 210 stores user access resources data record, wherein, for different access resources Corresponding access data record is set.When user conducts interviews, the inquiry user right cache database of inquiry judging module 230 With the presence or absence of the access right data record of the user.User right cache database and in the absence of the user access rights number During according to record, the access right data production generation access right data of module 250, and access right data storage is weighed to user Limit cache database 210.Insmod the access right data of 270 users in the user right cache database Record and the access right data of the user is loaded into internal memory.When user right cache database has the access rights number of the user During according to record, accumulation module 290 adds up the resource access times information of user access resources data record, when user visits for the first time When asking that the latter accesses new resource, 1 is labeled as to the data record, and add up since then.
Wherein, access right data production module 250 looks into power method generation access right data according to RBAC.
Wherein, the access right data record of user includes user profile, user access resources information, operating right information With any information in resource access times information.
Wherein, insmod and 270 be additionally operable to according to predetermined resource access times, will be more than the predetermined resource access times The access right data of resource be directly loaded into internal memory.
It should be noted that the various embodiments of the disclosure as described above are generally related to input data to a certain extent Treatment and output data generation.The treatment of this input data and output data generation can be in hardware or soft with combination of hardware Realized in part.For example, can in mobile device or similar or related circuit using specific electronic components for realize with The function of the various embodiments association of the disclosure as described above.Alternatively, according to the instruction for being stored operate one or more Multiple processors can realize the function of being associated with the various embodiments of the disclosure as described above.If it is, then these instructions Can be stored on one or more non-transitory processor readable mediums, this is in the scope of the present disclosure.Processor can The example for reading medium includes read-only storage (ROM), random access memory (RAM), CD-ROM, tape, floppy disk and optics number According to storage device.In addition, for realizing that functional computer program, instruction and the instruction segment of the disclosure can be by disclosure arts Programmer easily explain.
Although the various embodiments with reference to the disclosure have shown and described the disclosure, those skilled in the art will manage Solution, in the case where the spirit and scope of the present disclosure being defined by the appended claims and the equivalents thereof are not departed from, can enter to it Various changes in row form and details.

Claims (10)

1. it is a kind of based on the method for managing user right for caching, it is characterised in that to comprise the following steps:
When user conducts interviews, inquiry user right cache database is recorded with the presence or absence of the access right data of the user;
If it is not, generation access right data, and access right data storage is cached into number to the user right According to storehouse;
If it has, then the access right data of the user in the user right cache database is recorded the user's Access right data is loaded into internal memory.
2. it is as claimed in claim 1 based on the method for managing user right for caching, it is characterised in that the generation access rights The step of data is to look into power method generation access right data according to RBAC.
3. it is as claimed in claim 1 or 2 based on the method for managing user right for caching, it is characterised in that the visit of the user In asking permissions data record and including user profile, user access resources information, operating right information and resource access times information Any information.
4. it is as claimed in claim 3 based on the method for managing user right for caching, it is characterised in that when user right caches number According to stock when the access right data of the user is recorded, add up resource access times information.
5. it is as claimed in claim 3 based on the method for managing user right for caching, it is characterised in that also to comprise the following steps:
According to predetermined resource access times, the access right data for exceeding the resource of the predetermined resource access times is directly carried Enter internal memory.
6. a kind of based on the user authority management device for caching, it is characterised in that including:
User right cache database, for storing user access resources data record, wherein, set for different access resources Put corresponding access data record;
Inquiry judging module, when being conducted interviews for user, visit of the inquiry user right cache database with the presence or absence of the user Ask that permissions data is recorded;
Access right data produces module, remembers for user right cache database and in the absence of the access right data of the user During record, then access right data is generated, and the user right cache database is arrived into access right data storage;
Insmod, the access right data record for the user in the user right cache database uses this The access right data at family is loaded into internal memory.
7. it is as claimed in claim 6 based on the user authority management device for caching, it is characterised in that access right data is produced Module looks into power method generation access right data according to RBAC.
8. it is as claimed in claim 6 based on the user authority management device for caching, it is characterised in that the access right of the user Limit data record includes appointing in user profile, user access resources information, operating right information and resource access times information Meaning information.
9. it is as claimed in claim 8 based on the user authority management device for caching, it is characterised in that also to include:
Accumulation module, when the access right data for there is the user when user right cache database is recorded, adds up user Access the resource access times information of resource data record.
10. it is as claimed in claim 8 based on the user authority management device for caching, it is characterised in that to insmod and be additionally operable to According to predetermined resource access times, the access right data for exceeding the resource of the predetermined resource access times is directly loaded into interior Deposit.
CN201611009620.7A 2016-11-16 2016-11-16 Method for managing user right and device based on caching Pending CN106776706A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611009620.7A CN106776706A (en) 2016-11-16 2016-11-16 Method for managing user right and device based on caching

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611009620.7A CN106776706A (en) 2016-11-16 2016-11-16 Method for managing user right and device based on caching

Publications (1)

Publication Number Publication Date
CN106776706A true CN106776706A (en) 2017-05-31

Family

ID=58969469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611009620.7A Pending CN106776706A (en) 2016-11-16 2016-11-16 Method for managing user right and device based on caching

Country Status (1)

Country Link
CN (1) CN106776706A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107506416A (en) * 2017-08-15 2017-12-22 厦门天锐科技股份有限公司 A kind of authority caching based on border minimizes system and method
CN108920607A (en) * 2018-06-27 2018-11-30 中国建设银行股份有限公司 Field finds method, apparatus and electronic equipment
CN109409119A (en) * 2017-08-17 2019-03-01 北京京东尚科信息技术有限公司 Data manipulation method and device
CN109672667A (en) * 2018-11-25 2019-04-23 杭州仟金顶信息科技有限公司 The method that client dynamic updates user right
CN112347442A (en) * 2020-11-30 2021-02-09 四川长虹电器股份有限公司 User authority verification method and device
CN112685782A (en) * 2021-01-04 2021-04-20 浪潮云信息技术股份公司 Distributed login control method and system realized based on cache database
CN112835870A (en) * 2021-01-28 2021-05-25 山东浪潮通软信息科技有限公司 Content caching method and system based on user permission

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1605992A (en) * 2003-10-10 2005-04-13 鸿富锦精密工业(深圳)有限公司 User authority rapid access generation system in call control list and method thereof
CN1609826A (en) * 2003-10-18 2005-04-27 鸿富锦精密工业(深圳)有限公司 Method for traversing licensing rights in access control list
CN102750174A (en) * 2012-06-29 2012-10-24 Tcl集团股份有限公司 Method and device for loading file
CN103853727A (en) * 2012-11-29 2014-06-11 深圳中兴力维技术有限公司 Method and system for improving large data volume query performance
CN104751030A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 User access permission control method and device
CN105100050A (en) * 2015-05-28 2015-11-25 交通银行股份有限公司 User permission management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1605992A (en) * 2003-10-10 2005-04-13 鸿富锦精密工业(深圳)有限公司 User authority rapid access generation system in call control list and method thereof
CN1609826A (en) * 2003-10-18 2005-04-27 鸿富锦精密工业(深圳)有限公司 Method for traversing licensing rights in access control list
CN102750174A (en) * 2012-06-29 2012-10-24 Tcl集团股份有限公司 Method and device for loading file
CN103853727A (en) * 2012-11-29 2014-06-11 深圳中兴力维技术有限公司 Method and system for improving large data volume query performance
CN104751030A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 User access permission control method and device
CN105100050A (en) * 2015-05-28 2015-11-25 交通银行股份有限公司 User permission management method and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107506416A (en) * 2017-08-15 2017-12-22 厦门天锐科技股份有限公司 A kind of authority caching based on border minimizes system and method
CN107506416B (en) * 2017-08-15 2020-04-14 厦门天锐科技股份有限公司 Permission cache minimization method based on boundary
CN109409119A (en) * 2017-08-17 2019-03-01 北京京东尚科信息技术有限公司 Data manipulation method and device
CN108920607A (en) * 2018-06-27 2018-11-30 中国建设银行股份有限公司 Field finds method, apparatus and electronic equipment
CN109672667A (en) * 2018-11-25 2019-04-23 杭州仟金顶信息科技有限公司 The method that client dynamic updates user right
CN112347442A (en) * 2020-11-30 2021-02-09 四川长虹电器股份有限公司 User authority verification method and device
CN112685782A (en) * 2021-01-04 2021-04-20 浪潮云信息技术股份公司 Distributed login control method and system realized based on cache database
CN112835870A (en) * 2021-01-28 2021-05-25 山东浪潮通软信息科技有限公司 Content caching method and system based on user permission
CN112835870B (en) * 2021-01-28 2023-01-24 浪潮通用软件有限公司 Content caching method and system based on user permission

Similar Documents

Publication Publication Date Title
CN106776706A (en) Method for managing user right and device based on caching
CN101163336B (en) Method of implementing mobile phone terminal access authority authentication
US7685367B2 (en) Multi-cache cooperation for response output caching
US7827280B2 (en) System and method for domain name filtering through the domain name system
CN101390080B (en) Serving cached query results based on a query portion
CN107948203A (en) A kind of container login method, application server, system and storage medium
CN108959972A (en) The rule-based safety of cooperation
CN107766343B (en) Data storage method and device and storage server
CN106372266A (en) Cache and accessing method of cloud operation system based on aspects and configuration documents
CN105338016B (en) Data high-speed caching method and device and resource request response method and device
US11263270B1 (en) Heat balancing in a distributed time-series database
CN103729247A (en) Data acquisition request processing method and system and server
CN108989390A (en) User requests retransmission method and device, Reverse Proxy and computer readable storage medium
CN105871919A (en) Network application firewall system and realization method thereof
CN103152391A (en) Journal output method and device
CN106777085A (en) A kind of data processing method, device and data query system
CN111210194A (en) Business support system and method special for enterprise tax system
CN114553960A (en) Data caching method, device, equipment and storage medium
US11409771B1 (en) Splitting partitions across clusters in a time-series database
CN114567553A (en) Equipment network access method and device based on industrial Internet identification analysis system
CN106921648A (en) Date storage method, application server and remote storage server
CN104750806A (en) Large data query method and system
CN103164410B (en) The method of the storage of a kind of file and operation, storage device and system
CN112507205B (en) Data management method and device
CN101741889B (en) Method, system and service for centralized management of network services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531