CN106897028B - Management method and system for shared storage - Google Patents

Management method and system for shared storage Download PDF

Info

Publication number
CN106897028B
CN106897028B CN201710100389.0A CN201710100389A CN106897028B CN 106897028 B CN106897028 B CN 106897028B CN 201710100389 A CN201710100389 A CN 201710100389A CN 106897028 B CN106897028 B CN 106897028B
Authority
CN
China
Prior art keywords
state
mounting
shared storage
shared
outputting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710100389.0A
Other languages
Chinese (zh)
Other versions
CN106897028A (en
Inventor
赵鹏城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710100389.0A priority Critical patent/CN106897028B/en
Publication of CN106897028A publication Critical patent/CN106897028A/en
Application granted granted Critical
Publication of CN106897028B publication Critical patent/CN106897028B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0659Command handling arrangements, e.g. command buffers, queues, command scheduling

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a management method of shared storage, which comprises the following steps: acquiring the running state of a sharing process corresponding to the shared storage; acquiring the mounting state of the shared storage; and outputting the safe state of the shared memory according to the running state and the mounting state, wherein the safe state of the shared memory is only output when the running state and the mounting state are both normal. Therefore, the shared process corresponding to the shared storage is tracked, the safe state of the storage state of the shared storage is output by judging the running state and the mounting state of the shared process, and the shared state of the shared storage is displayed to be safe only when the running state and the mounting state of the shared process are normal at the same time, so that the safety of the shared data of the shared storage can be obviously improved. The invention also discloses a management system of shared storage, which has the same technical effect as the method and is not repeated herein.

Description

Management method and system for shared storage
Technical Field
The present invention relates to the field of virtualized storage sharing technology, and in particular, to a shared storage management method and system.
Background
With the progress of internet technology and the development of big data, data contacted by people in life and office is exponentially increased, and personal storage media of users have difficulty meeting the needs of people, for example, movie fans collect thousands of blue-ray digital movies, and the movies are difficult to store in one or more hard disks, and are inconvenient to share, so that shared storage becomes a trend.
Data security is an extremely important aspect in the sharing of shared storage. In actual operation, the mount state of the shared storage does not correspond to the shared process of the shared storage, for example, the mount state shows that the mount is mounted while the shared process is running, and at this time, the data of the shared storage has a potential safety hazard. In the prior art, the potential safety hazard is dealt with by adding a distributed lock, for example, uniqueness of a leader node of a cluster is ensured through the distributed lock, in such a scenario, the distributed lock cannot be frequently acquired and released, once the lock is obtained, the lock is held for a long time, but a mount state of shared storage and a state of the distributed lock are separately displayed, and a situation that the mount state of the shared storage and the state of the distributed lock are inconsistent due to data synchronization inconsistency and the like exists, so that safety of the shared storage cannot be well guaranteed.
In summary, how to improve the security of sharing data in shared storage is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, the present invention provides a method and a system for managing shared storage, which can significantly improve the security of shared data in shared storage. The specific scheme is as follows:
a method of managing shared storage, comprising:
acquiring the running state of a sharing process corresponding to the shared storage;
acquiring the mounting state of the shared storage;
outputting the security state of the shared storage according to the running state and the mounting state,
and outputting a signal that the storage state of the shared storage is safe only when the running state and the mounting state are both normal.
Preferably, the outputting the security status of the shared storage according to the running status and the mount status includes:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with logic 1 is output, and if the operation state is abnormal operation, a control signal with logic 0 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 1 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 0 is output;
carrying out AND logic operation on the control signal and the mounting signal;
and outputting the safe state of the shared memory according to the logical operation result, wherein the safe state of the shared memory is a safe signal only when the operation result is 1.
Preferably, the outputting the security status of the shared storage according to the running status and the mount status includes:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with logic 0 is output, and if the operation state is abnormal operation, a control signal with logic 1 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 0 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 1 is output;
carrying out OR logic operation on the control signal and the mounting signal;
and outputting the safe state of the shared memory according to the logical operation result, wherein the safe state of the shared memory is a safe signal only when the operation result is 0.
Preferably, outputting the control signal is outputting a corresponding control signal through a distributed lock.
Preferably, the distributed locking SANLOCK is used.
The invention also discloses a management system of shared storage, which comprises:
the running state acquisition module is used for acquiring the running state of the corresponding shared process of the shared storage;
the mounting state acquisition module is used for acquiring the mounting state of the shared storage;
a safety state output module for outputting the safety state of the shared storage according to the running state and the mounting state,
and outputting a signal that the storage state of the shared storage is safe only when the running state and the mounting state are both normal.
The invention discloses a management method of shared storage, which comprises the following steps: acquiring the running state of a sharing process corresponding to the shared storage; acquiring the mounting state of the shared storage; and outputting the safe state of the shared memory according to the running state and the mounting state, wherein the safe state of the shared memory is only output when the running state and the mounting state are both normal. Therefore, the shared process corresponding to the shared storage is tracked, the safe state of the storage state of the shared storage is output by judging the running state and the mounting state of the shared process, and the shared state of the shared storage is displayed to be safe only when the running state and the mounting state of the shared process are normal at the same time, so that the safety of the shared data of the shared storage can be obviously improved.
The invention also discloses a management system of shared storage, which has the same technical effect as the method and is not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for managing shared storage according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a management method for shared storage specifically using AND logic according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for managing shared storage specifically using OR logic according to an embodiment of the present invention;
fig. 4 is a diagram illustrating a result of a management system for shared storage according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a management method of shared storage, which is shown in figure 1 and comprises steps S1 to S3, wherein:
step S1: and acquiring the running state of the corresponding shared process of the shared storage.
In the prior art, the security of the shared storage is provided by adding a distributed lock, but the distributed lock is not related to the sharing process of the shared storage, so that the two are not consistent.
The idea provided by the invention is to track the sharing process corresponding to the shared storage, acquire the running state of the sharing process in real time, and associate the running state of the sharing process with the state of the distributed lock, so that the sharing process and the distributed lock have correlation.
It should be noted that the running state of the shared process may be tracked by other programs to obtain the running state, and the present invention is mainly illustrated by taking a distributed lock as an embodiment, and is not limited to the distributed lock, and other state monitoring programs may also be used.
Step S2: and acquiring the mounting state of the shared storage.
In general, when the shared storage is in the mount state, the user can access the data therein, and therefore, the mount state should be consistent with the running state of the corresponding shared process of the shared storage, and therefore, obtaining the mount state is a prerequisite for the determination in step S3.
Step S3: and outputting the safe state of the shared memory according to the running state and the mounting state, wherein the safe state of the shared memory is only output when the running state and the mounting state are both normal.
In actual operation, the running state of the corresponding shared process of the shared storage is associated with the distributed lock, namely the running state of the corresponding shared process of the shared storage is reflected by the state of the distributed lock, a specific reaction relation comprises positive correlation and negative correlation, but the running state of the shared process is reflected finally, only when the conditions that the running state is normal and the mounting state is normal are met, the data in the shared storage is indicated to be in a safe state, and a signal for data safety in the shared storage is output to a user.
The specific signal of the shared stored security status may be composed of one or more of a prompt voice, a prompt window, a prompt character and a prompt mark, and the implementation manner includes one or more of a text, a picture, an animation and a voice, which is not limited herein.
When the shared storage is used in the distributed system, the shared storage state provided externally consists of the mounting state of the shared storage and the state of the distributed lock, only when the two are mounting states, the shared storage in the county and city is the mounting state, and as long as one of the two is not mounted, the non-mounting state is displayed externally, so that a user cannot operate the corresponding shared storage when using the shared storage, and the user is prompted to mount the shared storage in a district. When a user mounts and stores, the system checks the mounting state of the shared storage and the state of the distributed locks, if only the distributed locks are lost, only the distributed locks are connected, if both the distributed locks are not mounted, the shared storage is mounted firstly, and then the distributed locks are connected, so that the user is allowed to operate the data in the shared storage, and the safety of the data is further ensured.
In practical applications, the relationship between the operating state and the mount state can be determined through logic gate operations, so as to output the security state of the shared memory, and the present invention provides two specific embodiments:
example 1: referring to fig. 2, acquiring an operation state 11 of a shared process corresponding to a shared storage and acquiring a mount state 12 of the shared storage, and outputting a security state of the shared storage according to the operation state and the mount state includes:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with a logic of 1 is output, and if the operation state is abnormal operation, a control signal with a logic of 0 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 1 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 0 is output;
performing an and logic operation 13 on the control signal and the mount signal;
the shared memory security state 14 is output based on the logical operation result, wherein the shared memory security state is a security signal only if the operation result is 1.
In a practical implementation, the control signal may be output using distributed lock SAMLOCK.
Example 2: referring to fig. 3, acquiring an operation state 21 of a shared process corresponding to a shared storage and acquiring a mount state 22 of the shared storage, and outputting a security state of the shared storage according to the operation state and the mount state includes:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with a logic of 0 is output, and if the operation state is abnormal operation, a control signal with a logic of 1 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 0 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 1 is output;
performing an or logic operation 23 on the control signal and the mount signal;
the shared memory security state 24 is output based on the logical operation result, wherein the shared memory security state is a security signal only if the operation result is 0.
In a practical implementation, the control signal may be output using distributed lock SAMLOCK.
The present invention also discloses a management system for shared storage, which is shown in fig. 2 and includes an operation state acquisition module 11, a mount state acquisition module 12 and a security state output module 13, wherein:
and an operation state obtaining module 11, configured to obtain an operation state of a shared process corresponding to the shared storage.
In the prior art, the security of the shared storage is provided by adding a distributed lock, but the distributed lock is not related to the sharing process of the shared storage, so that the two are not consistent.
The idea provided by the invention is to track the sharing process corresponding to the shared storage, acquire the running state of the sharing process in real time, and associate the running state of the sharing process with the state of the distributed lock, so that the sharing process and the distributed lock have correlation.
It should be noted that the running state of the shared process may be tracked by other programs to obtain the running state, and the present invention is mainly illustrated by taking a distributed lock as an embodiment, and is not limited to the distributed lock, and other state monitoring programs may also be used.
And a mount state obtaining module 12, configured to obtain a mount state of the shared storage.
Generally, when the shared storage is in the mount state, a user can access data therein, and therefore, the mount state should be consistent with the running state of the corresponding shared process of the shared storage, and therefore, obtaining the mount state is a prerequisite basis for the judgment of the security state output module.
And a safety state output module 13, configured to output a safety state of the shared memory according to the operation state and the mount state, where the safety state of the shared memory is a safety signal only when the operation state and the mount state are both normal.
In actual operation, the running state of the corresponding shared process of the shared storage is associated with the distributed lock, namely the running state of the corresponding shared process of the shared storage is reflected by the state of the distributed lock, a specific reaction relation comprises positive correlation and negative correlation, but the running state of the shared process is reflected finally, only when the conditions that the running state is normal and the mounting state is normal are met, the data in the shared storage is indicated to be in a safe state, and a signal for data safety in the shared storage is output to a user.
The specific signal of the shared stored security status may be composed of one or more of a prompt voice, a prompt window, a prompt character and a prompt mark, and the implementation manner includes one or more of a text, a picture, an animation and a voice, which is not limited herein.
When the shared storage is used in the distributed system, the shared storage state provided externally consists of the mounting state of the shared storage and the state of the distributed lock, only when the two are mounting states, the shared storage in the county and city is the mounting state, and as long as one of the two is not mounted, the non-mounting state is displayed externally, so that a user cannot operate the corresponding shared storage when using the shared storage, and the user is prompted to mount the shared storage in a district. When a user mounts and stores, the system checks the mounting state of the shared storage and the state of the distributed locks, if only the distributed locks are lost, only the distributed locks are connected, if both the distributed locks are not mounted, the shared storage is mounted firstly, and then the distributed locks are connected, so that the user is allowed to operate the data in the shared storage, and the safety of the data is further ensured.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above detailed description is provided for the management method and system of shared storage provided by the present invention, and a specific example is applied in this document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (6)

1. A method for managing shared storage, comprising:
acquiring the running state of a sharing process corresponding to the shared storage;
acquiring the mounting state of the shared storage;
outputting the security state of the shared storage according to the running state and the mounting state,
and outputting a signal that the storage state of the shared storage is safe only when the running state and the mounting state are both normal.
2. The method of claim 1, wherein outputting the security status of the shared storage according to the running status and the mount status comprises:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with logic 1 is output, and if the operation state is abnormal operation, a control signal with logic 0 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 1 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 0 is output;
carrying out AND logic operation on the control signal and the mounting signal;
and outputting the safe state of the shared memory according to the logical operation result, wherein the safe state of the shared memory is a safe signal only when the operation result is 1.
3. The method of claim 1, wherein outputting the security status of the shared storage according to the running status and the mount status comprises:
outputting a corresponding control signal according to the operation state, wherein if the operation state is normal operation, a control signal with logic 0 is output, and if the operation state is abnormal operation, a control signal with logic 1 is output;
outputting a corresponding mounting signal according to the mounting state, wherein if the mounting state is normal mounting, a mounting signal with a logic of 0 is output, and if the mounting state is abnormal mounting, a mounting signal with a logic of 1 is output;
carrying out OR logic operation on the control signal and the mounting signal;
and outputting the safe state of the shared memory according to the logical operation result, wherein the safe state of the shared memory is a safe signal only when the operation result is 0.
4. The shared memory management method according to any one of claims 2 or 3, wherein outputting the control signal is outputting the corresponding control signal through a distributed lock.
5. The method of claim 4, wherein the distributed latch SANLOCK.
6. A system for managing shared storage, comprising:
the running state acquisition module is used for acquiring the running state of the corresponding shared process of the shared storage;
the mounting state acquisition module is used for acquiring the mounting state of the shared storage;
a safety state output module for outputting the safety state of the shared storage according to the running state and the mounting state,
and outputting a signal that the storage state of the shared storage is safe only when the running state and the mounting state are both normal.
CN201710100389.0A 2017-02-23 2017-02-23 Management method and system for shared storage Active CN106897028B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710100389.0A CN106897028B (en) 2017-02-23 2017-02-23 Management method and system for shared storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710100389.0A CN106897028B (en) 2017-02-23 2017-02-23 Management method and system for shared storage

Publications (2)

Publication Number Publication Date
CN106897028A CN106897028A (en) 2017-06-27
CN106897028B true CN106897028B (en) 2020-02-07

Family

ID=59185454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710100389.0A Active CN106897028B (en) 2017-02-23 2017-02-23 Management method and system for shared storage

Country Status (1)

Country Link
CN (1) CN106897028B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107608738B (en) * 2017-10-12 2021-03-02 苏州浪潮智能科技有限公司 Method and device for starting object storage equipment and computer readable storage medium
CN108900607B (en) * 2018-06-28 2021-06-29 郑州云海信息技术有限公司 SMB protocol request processing method and device and server

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164177A (en) * 2011-03-11 2011-08-24 浪潮(北京)电子信息产业有限公司 Method, device and system for sharing storage pool by cluster
CN102984268B (en) * 2012-12-11 2015-04-15 中国人民解放军国防科学技术大学 Access method and device for SCSI sharing storage resource for high-availability cluster
CN105635214A (en) * 2014-11-03 2016-06-01 中兴通讯股份有限公司 Data storage method, first mobile terminal, storage node and storage system
CN105262820A (en) * 2015-10-29 2016-01-20 浪潮电子信息产业股份有限公司 Cluster multi-computer mutual backup method based on Linux operating system
CN106201357A (en) * 2016-07-18 2016-12-07 浪潮(北京)电子信息产业有限公司 The construction method of a kind of storage pool and system
CN106293934B (en) * 2016-07-19 2019-02-01 浪潮(北京)电子信息产业有限公司 A kind of cluster system management optimization method and platform

Also Published As

Publication number Publication date
CN106897028A (en) 2017-06-27

Similar Documents

Publication Publication Date Title
JP6550252B2 (en) History of computing object context
US9904798B2 (en) Focused personal identifying information redaction
US9875372B2 (en) Redacting restricted content in files
CN109726579B (en) Resource access authority grouping method and equipment
US8341733B2 (en) Creating secured file views in a software partition
CN108282673B (en) Updating method of playing record, server and client
CN101772764A (en) Multi-threaded business programming library
CN106897028B (en) Management method and system for shared storage
Novotny et al. Oblivion on the web: an inquiry of user needs and technologies
US10069848B2 (en) Method and system for data security
US10133825B2 (en) Portal connected to a social backend
Davies Civil society
Groeneboom Likelihood ratio type two‐sample tests for current status data
Dannefer et al. Life course
JP2006146896A (en) Privacy markup on entity model
CN114036564A (en) Construction method of private data derivative graph
WO2017167052A1 (en) Method and device for concealing user information contained in application
US20220245275A1 (en) Contextual data loss prevention for a group-based communication system
JP2007072581A (en) Policy group generation device and control method
AU2016238887A1 (en) Contextual history of computing objects
CN115033187B (en) Big data based analysis management method
CN109409142B (en) Processing method and electronic equipment
US20230351037A1 (en) Access control system for access revocation in a database
US10007683B1 (en) Conditional creation of child nodes based on ancestor node metadata runtime values
AU2015200649B2 (en) Contextual history of computing objects

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant