CN108614976A - Authority configuring method, device and storage medium - Google Patents

Authority configuring method, device and storage medium Download PDF

Info

Publication number
CN108614976A
CN108614976A CN201810401117.9A CN201810401117A CN108614976A CN 108614976 A CN108614976 A CN 108614976A CN 201810401117 A CN201810401117 A CN 201810401117A CN 108614976 A CN108614976 A CN 108614976A
Authority
CN
China
Prior art keywords
authority
destination
destination path
permissions list
path
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810401117.9A
Other languages
Chinese (zh)
Inventor
黄科
马莎莎
王磊
周沿江
赵芳洁
韩建
蔡燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Keda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Keda Technology Co Ltd filed Critical Suzhou Keda Technology Co Ltd
Priority to CN201810401117.9A priority Critical patent/CN108614976A/en
Publication of CN108614976A publication Critical patent/CN108614976A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of authority configuring method, device and storage mediums, belong to field of computer technology, and this method includes:The authority application request that user terminal is sent is received, authority application request includes at least user identifier, operating right and destination path;According to stored competence profile, the destination path permissions list to match with destination path is determined;When being not determined by destination path permissions list, hierarchical decomposition is carried out to destination path, obtains the parent directory path of destination path;According to competence profile, the permissions list to match with parent directory path is determined as destination path permissions list;User identifier and operating right are added in destination path permissions list;It can solve the problems, such as that manually adding permission leads to the less efficient of authority configuration;The efficiency of authority configuration can be improved.

Description

Authority configuring method, device and storage medium
Technical field
This application involves a kind of authority configuring method, device and storage mediums, belong to field of computer technology.
Background technology
Version control system (or Version Management Software) (Subversion, SVN) is a kind of multiple developers of support The Version Management Software of the same project of joint development increased income.
During using SVN, if user needs to open the temporary authority in some warehouse, configuration management team is artificial Modification authority configuration file is added operation, so that the temporary authority of the user is added in competence profile.
However, when the catalogue level of code is more in the warehouse quantity in server is larger and/or warehouse, manually perform It is relatively low to add operating efficiency, leads to the less efficient of authority configuration.
Invention content
This application provides a kind of authority configuring method, device and storage medium, can solve to manually perform addition operation It is less efficient, lead to the less efficient problem of authority configuration.The application provides the following technical solutions:
In a first aspect, providing a kind of authority configuring method, this method includes:
The authority application request that user terminal is sent is received, the authority application request is including at least user identifier, operation Permission and destination path;
According to stored competence profile, the destination path permissions list to match with the destination path is determined;
When being not determined by the destination path permissions list, hierarchical decomposition is carried out to the destination path, is obtained described The parent directory path of destination path;
According to the competence profile, the permissions list to match with the parent directory path is determined as the target Path permissions list;
The user identifier and the operating right are added in the destination path permissions list.
Optionally, the destination path includes the server identification of destination server;
After the authority application request for receiving user terminal transmission, further include:
The locking mark of the destination server is obtained according to the server identification;
When the untreated authority application to the destination server of the locking mark instruction is asked, the target is taken Business device locks.
Optionally, after the locking mark that the destination server is obtained according to the server identification, further include:
When locking mark instruction is handling the request of the authority application to the destination server, to the user Terminal returns to busy notice, and the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
It is optionally, described that the user identifier and the operating right are added in the destination path permissions list, Including:
Determine whether the destination path permissions list includes the user identifier;
When the destination path permissions list includes the user identifier, deletes and remember in the destination path permissions list The corresponding original right of the user identifier of record;
The user identifier and the operating right are added in the destination path permissions list.
Optionally, described according to stored competence profile, determine the target road to match with the destination path After diameter permissions list, further include:
Determine in the first permissions list of the subdirectory of the destination path whether include the user identifier;
When first permissions list includes the user identifier, recorded in deletion first permissions list described The corresponding original right of user identifier;
The user identifier and the operating right are added in first permissions list.
Optionally, described according to stored competence profile, determine the target road to match with the destination path After diameter permissions list, further include:
Determine in the second permissions list of the upper directory of the destination path whether include the user identifier;
When second permissions list does not include the user identifier, the use is added in second permissions list Family identifies and the read-only authority of the user identifier.
Optionally, described that the user identifier and the operating right are added to it in the destination path permissions list Afterwards, further include:
It is generated according to the updated destination path permissions list and increases authority and updated authority configuration text newly Part;
The newly-increased authority and the updated competence profile are sent to the destination server, it is described Newly-increased authority and the updated competence profile are used for for the rights management warehouse pair in the destination server The newly-increased authority and the updated competence profile merge, and obtain final competence profile, described Rights management warehouse is used to be managed collectively the competence profile in at least one other warehouse run in the destination server.
Second aspect provides a kind of authority configuring method, the method includes:
Receive the newly-increased authority and updated competence profile that management server is sent, the newly-increased permission text Part and the updated competence profile are behaviour of the management server according to the authority application request instruction received Make what permission, destination path and user identifier generated;
Triggering rights management warehouse merges the newly-increased authority and updated competence profile, obtains Final competence profile, the rights management warehouse be used for be managed collectively run in the destination server it is at least one its The competence profile in its warehouse;
The access rights of user terminal are determined according to the final competence profile.
The third aspect, provides a kind of authority configuration device, and described device includes:
Request receiving module, the authority application request for receiving user terminal transmission, the authority application request is at least Including user identifier, operating right and destination path;
First matching module is used for according to stored competence profile, what the determining and destination path matched Destination path permissions list;
Path decomposing module, for when being not determined by the destination path permissions list, being carried out to the destination path Hierarchical decomposition obtains the parent directory path of the destination path;
Second matching module is used for according to the competence profile, the permission that will be matched with the parent directory path List is determined as the destination path permissions list;
Permission add module is arranged for the user identifier and the operating right to be added to the destination path permission In table.
Optionally, the destination path includes the server identification of destination server;Described device further includes:
Identifier acquisition module, after being asked in the authority application for receiving user terminal transmission, according to the server Mark obtains the locking mark of the destination server;
Module is locked, for indicating that the untreated authority application to the destination server is asked in the mark that locks When, the destination server is locked.
Optionally, described device further includes:
Notice returns to module, after the locking for obtaining the destination server according to the server identification identifies, When locking mark instruction is handling the request of the authority application to the destination server, returned to the user terminal Busy notice, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
Optionally, the permission add module, including:
Determination unit, for determining whether the destination path permissions list includes the user identifier;
Deleting unit, for when the destination path permissions list includes the user identifier, deleting the target road The corresponding original right of the user identifier recorded in diameter permissions list;
Adding device, for the user identifier and the operating right to be added to the destination path permissions list In.
Optionally, described device further includes:
First determining module is used for according to stored competence profile, what the determining and destination path matched After destination path permissions list, determine in the first permissions list of the subdirectory of the destination path whether include the user Mark;
Removing module, for when first permissions list includes the user identifier, deleting the first permission row The corresponding original right of the user identifier recorded in table;
First add module, for the user identifier and the operating right to be added to first permissions list In.
Optionally, described device further includes:
Second determining module is used for according to stored competence profile, what the determining and destination path matched After destination path permissions list, determine in the second permissions list of the upper directory of the destination path whether include the use Family identifies;
Second add module, for when second permissions list does not include the user identifier, being weighed described second The read-only authority of the user identifier and the user identifier is added in limit list.
Optionally, described device further includes:
File generating module is arranged for the user identifier and the operating right to be added to the destination path permission After in table, is generated according to the updated destination path permissions list and increase authority and updated authority configuration text newly Part;
File sending module, for the newly-increased authority and the updated competence profile to be sent to institute Destination server is stated, the newly-increased authority and the updated competence profile are used for in the destination server Rights management warehouse the newly-increased authority and the updated competence profile are merged, finally weighed Configuration file is limited, the rights management warehouse is for being managed collectively at least one other warehouse run in the destination server Competence profile.
Fourth aspect, provides a kind of authority configuration device, and described device includes:
File reception module, the newly-increased authority for receiving management server transmission and updated authority configuration text Part, the newly-increased authority and the updated competence profile are the management servers according to the permission received What operating right, destination path and the user identifier of application request instruction generated;
Permission merging module, for triggering rights management warehouse to the newly-increased authority and updated authority configuration File merges, and obtains final competence profile, the rights management warehouse is for being managed collectively the destination server The competence profile at least one other warehouse of middle operation;
Permission determining module, the access rights for determining user terminal according to the final competence profile.
5th aspect, provides a kind of authority configuration device, described device includes processor and memory;In the memory It has program stored therein, described program is loaded by the processor and executed to realize the authority configuring method described in first aspect;Or Person realizes the authority configuring method described in second aspect.
6th aspect, provides a kind of computer readable storage medium, has program stored therein in the storage medium, described program It is loaded by the processor and is executed to realize the authority configuring method described in first aspect;Alternatively, realizing described in second aspect Authority configuring method.
The advantageous effect of the application is:The authority application request sent by receiving user terminal;According to the permission Shen It please ask to add the permission of some user automatically;Can solve manually to add permission causes the less efficient of authority configuration to be asked Topic;Due to being not necessarily to configuration management team human configuration permission, but management server automatic identification authority application is asked, according to this Authority application asks to add the permission of some user automatically, it is thus possible to improve the efficiency of authority configuration.
In addition, if competence profile stores the corresponding permission of catalogue of each level, with the rule of catalogue in warehouse Mould expands, and the permission stored needed for competence profile increases therewith, and the memory space that competence profile occupies also can be larger; And in the present embodiment, in such a way that subdirectory inherits the permissions list of parent directory so that competence profile without depositing in advance Store up the corresponding permission of catalogue of each level, it can also be ensured that user can apply for the permission of the subdirectory of arbitrary level-one.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application, And can be implemented in accordance with the contents of the specification, below with the preferred embodiment of the application and coordinate attached drawing be described in detail as after.
Description of the drawings
Fig. 1 is the structural schematic diagram for the authority configuration system that the application one embodiment provides;
Fig. 2 is the flow chart for the authority configuring method that the application one embodiment provides;
Fig. 3 is the flow chart for the authority configuring method that the application one embodiment provides;
Fig. 4 is the flow chart of the authority configuring method of the application another embodiment offer;
Fig. 5 is the flow chart of the authority configuring method of the application another embodiment offer;
Fig. 6 is the block diagram for the authority configuration device that the application one embodiment provides;
Fig. 7 is the block diagram for the authority configuration device that the application one embodiment provides;
Fig. 8 is the block diagram for the authority configuration device that the application one embodiment provides.
Specific implementation mode
With reference to the accompanying drawings and examples, the specific implementation mode of the application is described in further detail.Implement below Example is not limited to scope of the present application for illustrating the application.
First, to this application involves several nouns explain.
Version control system (or Version Management Software) (Subversion, SVN) is the version of an open source code Control system is used for multiple same projects of developer's joint development.Support (SuSE) Linux OS and Windows operations system System etc..
During the use of SVN, if developer needs to create a project, establishment one is needed to manage the project Warehouse.
Warehouse (or the libraries SVN) is for storing program code and/or document.Gather around that there are one independent for each warehouse Competence profile, be stored with subscriber group information in the competence profile, and to a certain in a manner of user or user group The permission of hierarchical directory is allocated.Wherein, permission include to the access limit (write) of the content in a certain hierarchical directory, Read-only authority (read) and limitation access at least one of (none).
User group:Refer to dividing the user with identical permission into one group to obtain.For same user group, as long as to this User group assigns certain permission, then the user in the group is with regard to permission having the same.Subscriber group information, which includes at least, to be corresponded to User group user group mark.User group mark can be the mark of some department, alternatively, being that at least one user is constituted Mark, the present embodiment are not construed as limiting user group mark.
Optionally, the application is not construed as limiting the title of user group, and in other embodiments, user group is referred to as weighing Limit group etc..
Path:It is used to indicate the access process for accessing a certain hierarchical directory.Such as:Path is repos/test/trunk: Then illustrate that the process for accessing trunk catalogues is:Root repos is first accessed, the subdirectory under root repos is visited again Test finally accesses the subdirectory trunk under subdirectory test.
Fig. 1 is the structural schematic diagram for the authority configuration system that the application one embodiment provides, as shown in Figure 1, the system It includes at least:User terminal 110, management server 120 and destination server 130.
User terminal 110, which can be mobile phone, computer, wearable device, portable computer etc., has communication function Electronic equipment, the present embodiment is not construed as limiting the type of user terminal 110.
User terminal 110 is sent to management server for generating authority application request, and by authority application request 120。
Wherein, authority application request includes at least user identifier, operating right and destination path.Authority application request is used The access rights for the content that the user identifier indicates destination path are added in request, which indicates with the operating right Permission it is identical.
User terminal 110 is established with management server 120 by cable network or wireless network and is communicated to connect.Schematically Ground, user terminal 110 are based on hypertext transfer protocol (HyperTextTransferProtocol, HTTP) and management server 120 establish communication connection.
Optionally, management server 120 can be independent server host;Alternatively, can also be multiple server masters Mechanism at server cluster.Schematically, management server 120 can be webpage (web) server.
Management server 120 is used to receive the authority application request of the transmission of user terminal 110;Matched according to stored permission File is set, determines the destination path permissions list to match with destination path;It is right when being not determined by destination path permissions list Destination path carries out hierarchical decomposition, obtains the parent directory path of destination path;It, will be with parent directory path according to competence profile The permissions list to match is determined as destination path permissions list;User identifier and operating right are added to destination path permission In list.
Optionally, management server 120, which is additionally operable to be generated according to updated destination path permissions list, increases permission text newly Part and updated competence profile;Newly-increased authority and updated competence profile are sent to destination server 130。
Wherein, it increases authority newly and updated competence profile is used for for the permission pipe in destination server 130 Reason warehouse 131 merges newly-increased authority and updated competence profile, obtains final competence profile.
Optionally, management server 120 carries out communication link with destination server 130 by cable network or wireless network It connects.
Destination server 130 can be independent server host;Alternatively, can also be what multiple server hosts were constituted Server cluster.Schematically, operation has SVN in destination server 130,
Destination server 130 is used to receive the newly-increased authority of the transmission of management server 120 and updated permission is matched Set file;Triggering rights management warehouse 131 merges newly-increased authority and updated competence profile, obtains most Whole competence profile;The access rights of user terminal are determined according to final competence profile.
Wherein, newly-increased authority and updated competence profile are management servers 120 according to the power received What operating right, destination path and the user identifier of limit application request instruction generated.
Optionally, being created in each destination server 130 has at least one other warehouse and a rights management warehouse 131, other warehouses are used for Storage Item destination code and/or document, and rights management warehouse 131 is for being managed collectively destination server The competence profile at least one other warehouse of middle operation.
It should be added that the present embodiment is only one with the quantity of user terminal 110, destination server 130 is Example illustrates, in actual implementation, user terminal 110 and destination server 130 or multiple, the present embodiment to this not It is construed as limiting.
Fig. 2 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method For in authority configuration system shown in FIG. 1, and for the executive agent of each step is management server 120 in the system It illustrates.This method includes at least following steps:
Step 201, the authority application request that user terminal is sent is received.
Wherein, authority application request includes at least user identifier, operating right and destination path.
Such as:The authority application that management server receives is asked:{ tjf, http://192.123.1.1/repos/ Test/trunk writes }.Wherein, " tjf " is user identifier, and " writing " is operating right, " http://192.123.1.1/repos/ Test/trunk " is destination path.
Step 202, according to stored competence profile, determine that the destination path permission to match with destination path arranges Table.
Optionally, when management server is not determined by destination path permissions list, step 203 is executed;In management service When device determines destination path permissions list, step 205 is executed.
Optionally, the competence profile stored in management server can be downloaded from destination server and be obtained; It is imported alternatively, the competence profile is configuration management team, the present embodiment is not construed as limiting this.
Competence profile is stored in the form of structured storage in the database of management server.
Schematically, the competence profile stored in management server is as shown in following table one:
Table one:
Management server can identify the path structure of destination path, then, according to the path structure in competence profile It is middle to search corresponding permission and subscriber group information, obtain the destination path permissions list of the destination path.
Step 203, when being not determined by destination path permissions list, hierarchical decomposition is carried out to destination path, obtains target The parent directory path in path.
Optionally, if competence profile stores the corresponding permission of catalogue of each level, with catalogue in warehouse Popularization, the permission stored needed for competence profile increase therewith, and the memory space that competence profile occupies also can be compared with Greatly.In the present embodiment, in such a way that subdirectory inherits parent directory permissions list so that competence profile is each without storage The corresponding permission of catalogue of level, simplifies the structure of competence profile.
Optionally, management server is divided and is stored according to pre-defined rule to destination path, by last layer of catalogue The path of last layer catalogue be determined as the parent directory path of destination path.Such as:By destination path according to vertical suitable Sequence is in turn divided into:Access protocol, access address, warehouse address, root, first layer subdirectory, second layer specific item Record ... n-th layer subdirectories etc..
Such as:Destination path is:A/b/c/d then can not determine a/b/c/d pairs in the competence profile shown in table one The permissions list answered, at this point, management server determines that the parent directory path of destination path is a/b/c/.
Step 204, according to competence profile, the permissions list to match with parent directory path is determined as destination path Permissions list.
Such as:The corresponding permissions lists of parent directory path a/b/c/ are searched in Table 1, obtain target permissions list { none, Human Resource Department }.
Step 205, user identifier and operating right are added in destination path permissions list.
Such as:The corresponding permissions lists of parent directory path a/b/c/ are searched in Table 1, obtain target permissions list User identifier " tjf " and operating right " write " are then added the target permissions list, obtained down by { none, Human Resource Department } Table two:
Table two:
none Human Resource Department
write tjf
Optionally, management server is when user identifier and operating right to be added in destination path permissions list, first Determine destination path permissions list whether including the user identifier in authority application request;Including in destination path permissions list should When user identifier, the corresponding original right of user identifier that is recorded in the permissions list of delete target path;By user identifier and behaviour It is added in destination path permissions list as permission;When destination path permissions list does not include the user identifier, will directly use Family identifies and operating right is added in destination path permissions list.
Optionally, whether it includes using that management server can also determine in the first permissions list of the subdirectory of destination path Family identifies;When the first permissions list includes user identifier, the corresponding original of user identifier recorded in the first permissions list is deleted Beginning permission;User identifier and operating right are added in the first permissions list;Do not include user identifier in the first permissions list When, user identifier and operating right are added in the first permissions list.This step can execute before step 205;Alternatively, It can also execute after step 205;Alternatively, can also be performed simultaneously with step 205, this implementation is not construed as limiting this.
Such as:Destination path is a/b/, and the subdirectory of the destination path is a/b/c/, then management server not only needs User identifier " tjf " and operating right " write " are added in the corresponding target permissions lists of a/b/ { read, sales department }, obtains Permissions list shown in table three, it is also necessary in corresponding first permissions lists of subdirectory a/b/c/ { none, Human Resource Department } User identifier " tjf " and operating right " write " is added, obtains permissions list shown in table two.
Table three:
read Sales department
write tjf
Optionally, management server can also determine in the second permissions list of the upper directory of destination path whether include User identifier;When the second permissions list does not include user identifier, user identifier and user's mark are added in the second permissions list The read-only authority of knowledge.This step can execute before step 205;Alternatively, can also execute after step 205;Alternatively, also It can be performed simultaneously with step 205, this implementation is not construed as limiting this.
The upper directory of destination path refers to the mesh on the upper layer that including root, each grade is located at the destination path Record.
Such as:Destination path is a/b/c/, and the upper directory of the destination path is a/, a/b/, then management server needs User identifier " tjf " is added in corresponding second permissions lists of a/ and read-only authority obtains following table four;In a/b/ corresponding User identifier " tjf " is added in two permissions lists and read-only authority obtains following table five.
Table four:
write Product manager portion
read tjf
Table five:
read Sales department
read tjf
In conclusion authority configuring method provided in this embodiment, is asked by receiving the authority application that user terminal is sent It asks;Add the permission of some user automatically according to authority application request;Can solve manually to add permission leads to authority configuration Less efficient problem;Due to being not necessarily to configuration management team human configuration permission, but management server automatic identification permission Application request adds the permission of some user according to authority application request, it is thus possible to improve the effect of authority configuration automatically Rate.
In addition, if competence profile stores the corresponding permission of catalogue of each level, with the rule of catalogue in warehouse Mould expands, and the permission stored needed for competence profile increases therewith, and the memory space that competence profile occupies also can be larger; And in the present embodiment, in such a way that subdirectory inherits the permissions list of parent directory so that competence profile without depositing in advance Store up the corresponding permission of catalogue of each level, it can also be ensured that user can apply for the permission of the subdirectory of arbitrary level-one.
In addition, adding read-only authority by corresponding second permissions list of upper directory in destination path so that user The content for the upper directory that arbitrary level-one has permission can be downloaded.
Optionally, after step 205, management server can also be generated according to updated destination path permissions list Newly-increased authority and updated competence profile;Newly-increased authority and updated competence profile are sent to Destination server.
Fig. 3 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method For in authority configuration system shown in FIG. 1, and for the executive agent of each step is destination server 130 in the system It illustrates.After step 205, this method includes at least following steps:
Step 301, the newly-increased authority and updated competence profile that management server is sent are received.
Newly-increased authority and updated competence profile are that management server is asked according to the authority application received The operating right, destination path and user identifier of instruction is asked to generate.
Newly-increased authority and updated competence profile are used for for the rights management warehouse pair in destination server Newly-increased authority and updated competence profile merge, and obtain final competence profile.
Rights management warehouse is used to be managed collectively the authority configuration in at least one other warehouse run in destination server File.
Schematically, it is tmp.auth files to increase authority newly, and updated competence profile is conf files.
Step 302, triggering rights management warehouse merges newly-increased authority and updated competence profile, Obtain final competence profile.
There are one rights management warehouses for setting in each destination server, and rights management warehouse is for being managed collectively target clothes The competence profile in at least one other warehouse run in business device.Such as:Rights management warehouse is SVN_Manager.
Destination server is additionally provided with hook (hook) function, and newly-increased authority and update are received in destination server When rear competence profile, can automatic trigger hook function pairs increase authority newly and updated competence profile carries out Parsing, then, the two is merged, obtains final competence profile.
Optionally, rights management warehouse merges newly-increased authority and the rule of updated competence profile is:If Permission catalogue in newly-increased authority is not present, then the permission catalogue and the power are added in competence profile in the updated Limit the corresponding permission of catalogue;If the permission catalogue in newly-increased authority is existing, adds and correspond in the permission catalogue tail portion Permission.
Step 303, the access rights of user terminal are determined according to final competence profile.
In conclusion when same destination server manages multiple warehouses, the present embodiment passes through in the destination server Rights management warehouse is set to be managed collectively the competence profile in each warehouse, reduces the authority configuration for managing multiple warehouses The difficulty of file.
Optionally, it is based on above-mentioned each embodiment, if management server has at least one when processing authority application is asked A other user terminals need to apply for the permission of destination server, then management server can lock destination server, to carry Show that at least one other user terminal management server is changing the permission of destination server, this way it is possible to avoid multiple User terminal changes the permission of destination server simultaneously, and permission is caused to change the problem of conflicting.
Fig. 4 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method For in authority configuration system shown in FIG. 1, and for the executive agent of each step is management server 120 in the system It illustrates.After step 201, this method includes at least following steps:
Step 401, the locking that destination server is obtained according to the server identification in destination path identifies.
Optionally, server identification can be the server address of destination server.
Optionally, mark is locked to be stored in the rights management warehouse of destination server.Management server gets permission After application request, the server address of the destination path instruction in being asked according to authority application downloads to rights management warehouse It is local;Determine whether management server is handling the permission of the destination server according to the locking mark in rights management warehouse Application request.
Optionally, it locks mark and is used to indicate the untreated authority application request to destination server;Alternatively, being used to indicate Handling the authority application request to destination server.
Optionally, when the untreated authority application to destination server of locking mark instruction is asked, step 402 is executed; When locking the authority application request for identifying and indicating handling to destination server, step 403 is executed.
Step 402, when the untreated authority application to destination server of locking mark instruction is asked, to destination server It locks, executes step 202.
When the untreated authority application to destination server of locking mark instruction is asked, illustrate that current management server does not have There is the authority application request that processing other user terminals are sent therefore can continue with the permission of active user's terminal transmission Application request.
Wherein, it refers to that the locking mark of destination server is being revised as instruction just that management server, which locks destination server, The authority application of destination server is asked in processing.
Correspondingly, target clothes are sent in step 205 or by newly-increased authority and updated competence profile It is engaged in after device, management server also needs to lock to identify to be revised as indicating that the untreated authority application to destination server is asked It asks.
Step 403, when locking the authority application request for identifying and indicating handling to destination server, to user terminal Busy notice is returned to, flow terminates.
Wherein, busy notice is used to indicate the authority application request handled to destination server.
In conclusion locking mark by being arranged for destination server in the present embodiment so that there are multiple user terminals Simultaneously need apply destination server permission when, management server can serially to each user terminal send authority application Request is handled;Permission can be caused to change the problem of conflicting to avoid the identical permission of multiple user terminal applications.
Optionally, it is based on above-mentioned each embodiment, after step 201, management server can also judge user terminal Whether operating right in authority application request can be applied for;If can apply for the operating right in authority application request, According to stored competence profile, whether the user identifier in the application request that defines the competence has possessed the operating right; When user identifier does not possess the operating right, step 202 is executed.
Optionally, it is based on above-mentioned each embodiment, what authority application request may be applied is temporary authority, that is, the permission With timeliness, and in specified duration effectively, the duration permission is specified to be recovered more than this.At this point, after step 302, Destination server can detect catalogue of the deadline more than current time that come into force in newly-increased authority, and obtain catalogue correspondence Permissions list, updated newly-increased authority is generated according to the permissions list, which is sent out It send to rights management warehouse.
Optionally, destination server by preassembled detection script come detect come into force in newly-increased authority cut-off when Between be more than current time catalogue.The detection script can detect in real time, alternatively, can also be detected every certain time length, this reality Example is applied to be not construed as limiting this.
Wherein, come into force deadline can be authority application request in carry.
In order to be more clearly understood that authority configuring method provided by the present application, a reality is lifted to the authority configuring method below Example illustrates.
Fig. 5 is the flow chart for the authority configuring method that the application one embodiment provides, and the present embodiment is answered in this method For illustrating in authority configuration system shown in FIG. 1.
Step 501, management server receives the authority application request that user terminal is sent, and authority application request is at least wrapped Include user identifier, operating right and destination path.
The associated description of this step refers to step 201, and therefore not to repeat here for the present embodiment.
Step 502, management server determines that the server identification in destination path obtains the locking mark of destination server.
Optionally, when locking the authority application request for identifying and indicating handling to destination server, step is executed 503;When the untreated authority application to destination server of locking mark instruction is asked, step 504 is executed.
Step 503, management server returns to busy notice to user terminal, and flow terminates.
Busy notice is used to indicate the authority application request handled to destination server.
Step 504, management server locks destination server.
This step refers to step 402, this implementation is not construed as limiting this.
Step 505, management server determines the target to match with destination path according to stored competence profile Path permissions list.
Optionally, when determining destination path permissions list, step 508 is executed;It is being not determined by destination path permission When list, step 506 is executed.
Step 506, management server carries out level point when being not determined by destination path permissions list to destination path Solution, obtains the parent directory path of destination path.
Step 507, management server determines the permissions list to match with parent directory path according to competence profile For destination path permissions list.
Step 508, user identifier and operating right are added in destination path permissions list by management server.
Step 509, management server generates according to updated destination path permissions list and increases authority and update newly Competence profile afterwards.
Step 510, newly-increased authority and updated competence profile are sent to destination service by management server Device.
Step 511, destination server receives the newly-increased authority and updated authority configuration that management server is sent File.
Step 512, destination server triggering rights management warehouse is to newly-increased authority and updated authority configuration text Part merges.
Step 513, destination server increases deadline of coming into force in authority newly more than current by detecting script detection The catalogue of time, and obtain the corresponding permissions list of the catalogue;Updated newly-increased authority is generated according to the permissions list, The updated newly-increased authority is sent to rights management warehouse.
Fig. 6 is the block diagram for the authority configuration device that the application one embodiment provides, and the present embodiment is with this device application It is illustrated for management server 120 in authority configuration system shown in FIG. 1.The device includes at least following mould Block:Request receiving module 610, the first matching module 620, path decomposing module 630, the second matching module 640, permission add mould Block 650.
Request receiving module 610, for receive user terminal transmission authority application request, the authority application ask to Include user identifier, operating right and destination path less;
First matching module 620, for according to stored competence profile, determination to match with the destination path Destination path permissions list;
Path decomposing module 630, for when being not determined by the destination path permissions list, to the destination path into Row hierarchical decomposition obtains the parent directory path of the destination path;
Second matching module 640 is used for according to the competence profile, the power that will be matched with the parent directory path Limit list is determined as the destination path permissions list;
Permission add module 650 is weighed for the user identifier and the operating right to be added to the destination path It limits in list.
Optionally, the destination path includes the server identification of destination server;Described device further includes:
Identifier acquisition module, after being asked in the authority application for receiving user terminal transmission, according to the server Mark obtains the locking mark of the destination server;
Module is locked, for indicating that the untreated authority application to the destination server is asked in the mark that locks When, the destination server is locked.
Optionally, described device further includes:
Notice returns to module, after the locking for obtaining the destination server according to the server identification identifies, When locking mark instruction is handling the request of the authority application to the destination server, returned to the user terminal Busy notice, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
Optionally, the permission add module 650, including:
Determination unit, for determining whether the destination path permissions list includes the user identifier;
Deleting unit, for when the destination path permissions list includes the user identifier, deleting the target road The corresponding original right of the user identifier recorded in diameter permissions list;
Adding device, for the user identifier and the operating right to be added to the destination path permissions list In.
Optionally, described device further includes:
First determining module is used for according to stored competence profile, what the determining and destination path matched After destination path permissions list, determine in the first permissions list of the subdirectory of the destination path whether include the user Mark;
Removing module, for when first permissions list includes the user identifier, deleting the first permission row The corresponding original right of the user identifier recorded in table;
First add module, for the user identifier and the operating right to be added to first permissions list In.
Optionally, described device further includes:
Second determining module is used for according to stored competence profile, what the determining and destination path matched After destination path permissions list, determine in the second permissions list of the upper directory of the destination path whether include the use Family identifies;
Second add module, for when second permissions list does not include the user identifier, being weighed described second The read-only authority of the user identifier and the user identifier is added in limit list.
Optionally, described device further includes:
File generating module is arranged for the user identifier and the operating right to be added to the destination path permission After in table, is generated according to the updated destination path permissions list and increase authority and updated authority configuration text newly Part;
File sending module, for the newly-increased authority and the updated competence profile to be sent to institute Destination server is stated, the newly-increased authority and the updated competence profile are used for in the destination server Rights management warehouse the newly-increased authority and the updated competence profile are merged, finally weighed Configuration file is limited, the rights management warehouse is for being managed collectively at least one other warehouse run in the destination server Competence profile.
Correlative detail refers to above method embodiment.
Fig. 7 is the block diagram for the authority configuration device that the application one embodiment provides, and the present embodiment is with this device application It is illustrated for destination server 130 in authority configuration system shown in FIG. 1.The device includes at least following mould Block:File reception module 710, permission merging module 720 and permission determining module 730.
File reception module 710, newly-increased authority and updated permission for receiving management server transmission are matched Set file, the newly-increased authority and the updated competence profile are the management servers according to receiving What operating right, destination path and the user identifier of authority application request instruction generated;
Permission merging module 720, for triggering rights management warehouse to the newly-increased authority and updated permission Configuration file merges, and obtains final competence profile, the rights management warehouse is for being managed collectively the target clothes The competence profile in at least one other warehouse run in business device;
Permission determining module 730, the access rights for determining user terminal according to the final competence profile.
Correlative detail refers to above method embodiment.
It should be noted that:The authority configuration device provided in above-described embodiment is when carrying out authority configuration, only with above-mentioned The division progress of each function module, can be as needed and by above-mentioned function distribution by different for example, in practical application Function module is completed, i.e., the internal structure of authority configuration device is divided into different function modules, described above to complete All or part of function.In addition, the authority configuration device that above-described embodiment provides belongs to same with authority configuring method embodiment One design, specific implementation process refer to embodiment of the method, and which is not described herein again.
Fig. 8 is the block diagram for the authority configuration device that the application one embodiment provides, which can be comprising shown in Fig. 1 Authority configuration system in test controller 110 device, such as:Smart mobile phone, tablet computer, laptop or desk-top Computer.Authority configuration device is also possible to be referred to as user equipment, portable terminal, laptop terminal, terminal console, control terminal Deng the present embodiment is not construed as limiting this.The device includes at least processor 810 and memory 820.
Processor 801 may include one or more processing cores, such as:4 core processors, 8 core processors etc..Place DSP (Digital SignalProcessing, Digital Signal Processing), FPGA (Field- may be used in reason device 801 Programmable GateArray, field programmable gate array), PLA (Programmable LogicArray, it is programmable to patrol Volume array) at least one of example, in hardware realize.Processor 801 can also include primary processor and coprocessor, main place Reason device is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state. In some embodiments, processor 801 can be integrated with GPU (Graphics Processing Unit, image processor), GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 801 can also wrap AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processors are for handling related machine learning Calculating operation.
Memory 802 may include one or more computer readable storage mediums, which can To be non-transient.Memory 802 may also include high-speed random access memory and nonvolatile memory, such as one Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 802 can Storage medium is read for storing at least one instruction, at least one instruction is for performed to realize this Shen by processor 801 Please in embodiment of the method provide authority configuring method.
In some embodiments, authority configuration device is also optional includes:Peripheral device interface and at least one periphery are set It is standby.It can be connected by bus or signal wire between processor 801, memory 802 and peripheral device interface.Each peripheral equipment It can be connected with peripheral device interface by bus, signal wire or circuit board.Schematically, peripheral equipment includes but not limited to: Radio circuit, touch display screen, voicefrequency circuit and power supply etc..
Certainly, authority configuration device can also include fewer or more components, and the present embodiment is not construed as limiting this.
Optionally, the application is also provided with a kind of computer readable storage medium, in the computer readable storage medium It has program stored therein, described program is loaded by processor and executed to realize the authority configuring method of above method embodiment.
Optionally, the application is also provided with a kind of computer product, which includes computer-readable storage medium Matter has program stored therein in the computer readable storage medium, and described program is loaded by processor and executed to realize above-mentioned side The authority configuring method of method embodiment.
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (12)

1. a kind of authority configuring method, which is characterized in that the method includes:
The authority application request that user terminal is sent is received, the authority application request is including at least user identifier, operating right And destination path;
According to stored competence profile, the destination path permissions list to match with the destination path is determined;
When being not determined by the destination path permissions list, hierarchical decomposition is carried out to the destination path, obtains the target The parent directory path in path;
According to the competence profile, the permissions list to match with the parent directory path is determined as the destination path Permissions list;
The user identifier and the operating right are added in the destination path permissions list.
2. authority configuring method as described in claim 1, which is characterized in that the destination path includes the clothes of destination server Business device mark;
After the authority application request for receiving user terminal transmission, further include:
The locking mark of the destination server is obtained according to the server identification;
When the untreated authority application to the destination server of the locking mark instruction is asked, to the destination server It locks.
3. authority configuring method as claimed in claim 2, which is characterized in that described according to described in server identification acquisition After the locking mark of destination server, further include:
When locking mark instruction is handling the request of the authority application to the destination server, to the user terminal Busy notice is returned to, the busy notice, which is used to indicate, is handling the request of the authority application to the destination server.
4. authority configuring method as described in any one of claims 1 to 3, which is characterized in that it is described by the user identifier and The operating right is added in the destination path permissions list, including:
Determine whether the destination path permissions list includes the user identifier;
When the destination path permissions list includes the user identifier, deletes and recorded in the destination path permissions list The corresponding original right of the user identifier;
The user identifier and the operating right are added in the destination path permissions list.
5. authority configuring method as described in any one of claims 1 to 3, which is characterized in that described according to stored permission After the destination path permissions list that configuration file, determination and the destination path match, further include:
Determine in the first permissions list of the subdirectory of the destination path whether include the user identifier;
When first permissions list includes the user identifier, the user recorded in first permissions list is deleted Identify corresponding original right;
The user identifier and the operating right are added in first permissions list.
6. authority configuring method as described in any one of claims 1 to 3, which is characterized in that described according to stored permission After the destination path permissions list that configuration file, determination and the destination path match, further include:
Determine in the second permissions list of the upper directory of the destination path whether include the user identifier;
When second permissions list does not include the user identifier, user's mark is added in second permissions list Know the read-only authority with the user identifier.
7. authority configuring method as described in claim 1, which is characterized in that described by the user identifier and the operating rights After limit is added in the destination path permissions list, further include:
It is generated according to the updated destination path permissions list and increases authority and updated competence profile newly;
The newly-increased authority and the updated competence profile are sent to the destination server;
Wherein, the newly-increased authority and the updated competence profile are used for for the power in the destination server Limit management warehouse merges the newly-increased authority and the updated competence profile, obtains final permission and matches File is set, the rights management warehouse is used to be managed collectively the power in at least one other warehouse run in the destination server Limit configuration file.
8. a kind of authority configuring method, which is characterized in that the method includes:
Receive management server send newly-increased authority and updated competence profile, the newly-increased authority and The updated competence profile is operating rights of the management server according to the authority application request instruction received What limit, destination path and user identifier generated;
Triggering rights management warehouse merges the newly-increased authority and updated competence profile, obtains final Competence profile, the rights management warehouse is for being managed collectively at least one other storehouse run in the destination server The competence profile in library;
The access rights of user terminal are determined according to the final competence profile.
9. a kind of authority configuration device, which is characterized in that described device includes:
Request receiving module, the authority application request for receiving user terminal transmission, the authority application request include at least User identifier, operating right and destination path;
First matching module, for according to stored competence profile, determining the target to match with the destination path Path permissions list;
Path decomposing module, for when being not determined by the destination path permissions list, level to be carried out to the destination path It decomposes, obtains the parent directory path of the destination path;
Second matching module is used for according to the competence profile, the permissions list that will be matched with the parent directory path It is determined as the destination path permissions list;
Permission add module, for the user identifier and the operating right to be added to the destination path permissions list In.
10. a kind of authority configuration device, which is characterized in that described device includes:
File reception module, the newly-increased authority for receiving management server transmission and updated competence profile, The newly-increased authority and the updated competence profile are the management servers according to the permission Shen received The operating right, destination path and user identifier of instruction please be ask to generate;
Permission merging module, for triggering rights management warehouse to the newly-increased authority and updated competence profile It merges, obtains final competence profile, the rights management warehouse is transported for being managed collectively in the destination server The competence profile in capable at least one other warehouse;
Permission determining module, the access rights for determining user terminal according to the final competence profile.
11. a kind of authority configuration device, which is characterized in that described device includes processor and memory;It is deposited in the memory Program is contained, described program is loaded by the processor and executed to realize that permission as described in any one of claim 1 to 7 is matched Set method;Alternatively, realizing authority configuring method as claimed in claim 8.
12. a kind of computer readable storage medium, which is characterized in that it has program stored therein in the storage medium, described program quilt For realizing authority configuring method as described in any one of claim 1 to 7 when processor executes;Alternatively, realizing as right is wanted Seek the authority configuring method described in 8.
CN201810401117.9A 2018-04-28 2018-04-28 Authority configuring method, device and storage medium Pending CN108614976A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810401117.9A CN108614976A (en) 2018-04-28 2018-04-28 Authority configuring method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810401117.9A CN108614976A (en) 2018-04-28 2018-04-28 Authority configuring method, device and storage medium

Publications (1)

Publication Number Publication Date
CN108614976A true CN108614976A (en) 2018-10-02

Family

ID=63661248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810401117.9A Pending CN108614976A (en) 2018-04-28 2018-04-28 Authority configuring method, device and storage medium

Country Status (1)

Country Link
CN (1) CN108614976A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829330A (en) * 2018-12-28 2019-05-31 恒生电子股份有限公司 A kind of svn authority setting method, device, system, electronic equipment
CN110413262A (en) * 2019-07-23 2019-11-05 北京启迪区块链科技发展有限公司 A kind of management method of business function, apparatus and system
CN111125743A (en) * 2018-10-31 2020-05-08 上海哔哩哔哩科技有限公司 Authority management method, system, computer device and computer readable storage medium
CN111259376A (en) * 2020-01-17 2020-06-09 中国平安人寿保险股份有限公司 Authority configuration method, device, server and storage medium
CN111552671A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Permission setting method, device and equipment of file directory and storage medium
CN112181480A (en) * 2020-09-29 2021-01-05 北京达佳互联信息技术有限公司 Authority management method and device of version management system
CN112181481A (en) * 2020-09-29 2021-01-05 北京达佳互联信息技术有限公司 Authority updating method and device of version management system
CN112507298A (en) * 2020-11-30 2021-03-16 北京达佳互联信息技术有限公司 User authentication method, device, server and storage medium
CN113190829A (en) * 2021-05-18 2021-07-30 京东数科海益信息科技有限公司 Authority data identification method, device, equipment and medium
CN113625968A (en) * 2021-08-12 2021-11-09 网易(杭州)网络有限公司 File authority management method and device, computer equipment and storage medium
CN115146317A (en) * 2022-07-29 2022-10-04 北京字跳网络技术有限公司 Authority control method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150394A (en) * 2013-03-25 2013-06-12 中国人民解放军国防科学技术大学 Distributed file system metadata management method facing to high-performance calculation
CN103368765A (en) * 2012-04-10 2013-10-23 阿里巴巴集团控股有限公司 Management system permission adding method and device
CN106301940A (en) * 2016-08-25 2017-01-04 厦门易灵网络科技有限公司 A kind of authority configuring method
CN106528300A (en) * 2016-10-20 2017-03-22 厦门美图移动科技有限公司 Console game synchronizing method, device and terminal
CN107403105A (en) * 2017-06-30 2017-11-28 华为技术有限公司 The authority setting method and device of a kind of file system
CN107451486A (en) * 2017-06-30 2017-12-08 华为技术有限公司 The authority setting method and device of a kind of file system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368765A (en) * 2012-04-10 2013-10-23 阿里巴巴集团控股有限公司 Management system permission adding method and device
CN103150394A (en) * 2013-03-25 2013-06-12 中国人民解放军国防科学技术大学 Distributed file system metadata management method facing to high-performance calculation
CN106301940A (en) * 2016-08-25 2017-01-04 厦门易灵网络科技有限公司 A kind of authority configuring method
CN106528300A (en) * 2016-10-20 2017-03-22 厦门美图移动科技有限公司 Console game synchronizing method, device and terminal
CN107403105A (en) * 2017-06-30 2017-11-28 华为技术有限公司 The authority setting method and device of a kind of file system
CN107451486A (en) * 2017-06-30 2017-12-08 华为技术有限公司 The authority setting method and device of a kind of file system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125743B (en) * 2018-10-31 2022-02-08 上海哔哩哔哩科技有限公司 Authority management method, system, computer device and computer readable storage medium
CN111125743A (en) * 2018-10-31 2020-05-08 上海哔哩哔哩科技有限公司 Authority management method, system, computer device and computer readable storage medium
CN109829330A (en) * 2018-12-28 2019-05-31 恒生电子股份有限公司 A kind of svn authority setting method, device, system, electronic equipment
CN110413262A (en) * 2019-07-23 2019-11-05 北京启迪区块链科技发展有限公司 A kind of management method of business function, apparatus and system
CN111552671A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Permission setting method, device and equipment of file directory and storage medium
CN111552671B (en) * 2019-12-31 2024-01-05 远景智能国际私人投资有限公司 File directory authority setting method, device, equipment and storage medium
CN111259376A (en) * 2020-01-17 2020-06-09 中国平安人寿保险股份有限公司 Authority configuration method, device, server and storage medium
CN112181481A (en) * 2020-09-29 2021-01-05 北京达佳互联信息技术有限公司 Authority updating method and device of version management system
CN112181480A (en) * 2020-09-29 2021-01-05 北京达佳互联信息技术有限公司 Authority management method and device of version management system
CN112507298A (en) * 2020-11-30 2021-03-16 北京达佳互联信息技术有限公司 User authentication method, device, server and storage medium
CN113190829A (en) * 2021-05-18 2021-07-30 京东数科海益信息科技有限公司 Authority data identification method, device, equipment and medium
CN113190829B (en) * 2021-05-18 2024-04-09 京东科技信息技术有限公司 Authority data identification method, device, equipment and medium
CN113625968A (en) * 2021-08-12 2021-11-09 网易(杭州)网络有限公司 File authority management method and device, computer equipment and storage medium
CN113625968B (en) * 2021-08-12 2024-03-01 网易(杭州)网络有限公司 File authority management method and device, computer equipment and storage medium
CN115146317A (en) * 2022-07-29 2022-10-04 北京字跳网络技术有限公司 Authority control method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108614976A (en) Authority configuring method, device and storage medium
US11740891B2 (en) Providing access to a hybrid application offline
US10585691B2 (en) Distribution system, computer, and arrangement method for virtual machine
CN105677250B (en) The update method and updating device of object data in object storage system
US9805209B2 (en) Systems and methodologies for managing document access permissions
CN106462430A (en) Method and device for obtaining application upgrade packages
US11768883B2 (en) System and method for in-place record content management
CN114064563A (en) Data migration method and server based on object storage
CN112580315A (en) Webpage table display method and device, terminal equipment and medium
CN108154024A (en) A kind of data retrieval method, device and electronic equipment
CN113127430B (en) Mirror image information processing method, mirror image information processing device, computer readable medium and electronic equipment
CN111552956A (en) Role authority control method and device for background management
CN116108233A (en) Data processing method, device, equipment and storage medium
CN106776055A (en) A kind of distributed lock method and system
CN112084003B (en) Method, device, medium and electronic equipment for isolating data
US11451627B2 (en) System and method for content management with intelligent data store access across distributed stores
CN114328521A (en) Index library updating method and device
CN115237545A (en) Method and device for accessing data
CN117950690A (en) Container group upgrading method, device, equipment, storage medium and program product
CN116489016A (en) Server management method, device, apparatus, storage medium, and program product
CN113961206A (en) Patch package installation method and device, electronic equipment and storage medium
CN114647630A (en) File synchronization method, information generation method, file synchronization device, information generation device, computer equipment and storage medium
US8645316B2 (en) Storing records in databases in a randomized manner to effectively utilize database servers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181002

RJ01 Rejection of invention patent application after publication