CN110765093A - Method and device for configuring user permission under HDFS file system - Google Patents

Method and device for configuring user permission under HDFS file system Download PDF

Info

Publication number
CN110765093A
CN110765093A CN201911012194.6A CN201911012194A CN110765093A CN 110765093 A CN110765093 A CN 110765093A CN 201911012194 A CN201911012194 A CN 201911012194A CN 110765093 A CN110765093 A CN 110765093A
Authority
CN
China
Prior art keywords
target
permission
user
configuring
acl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911012194.6A
Other languages
Chinese (zh)
Inventor
徐辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN201911012194.6A priority Critical patent/CN110765093A/en
Publication of CN110765093A publication Critical patent/CN110765093A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method and a device for configuring user permission under an HDFS file system. The method comprises the following steps: responding to the selection operation, and selecting a target object to be configured with the permission in the HDFS file system; responding to an ACL permission command, and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable. In this embodiment, by configuring the user permissions of the target objects (e.g., a test-level user, a training-level user, an algorithm-level user, and a super user), the target objects can use the same HDFS file system, so as to meet the diversified requirements of each target object on the data access permissions, avoid the file exception risk of data storage exception, data loss, or processing error among the target objects, and facilitate improving data security and management efficiency.

Description

Method and device for configuring user permission under HDFS file system
Technical Field
The invention relates to the technical field of big data environment management, in particular to a method and a device for configuring user permission under an HDFS file system.
Background
With the increase and development of the data volume of the information technology, some data are very sensitive in many industries, for example, for production data and financial data, special statement needs to be made on the authority of the data, data use authority is controlled, and even background authority and data authority need to be controlled.
Currently, many companies typically employ a distributed file system of HDFS (Hadoop distributed file system, HDFS). In an actual application, the users usually have super permissions (or do not configure permissions for the users), so that files of the users in the HDFS file system are disclosed relative to other users. However, since the work content of each of the training level user, the testing level user, the algorithm user, and the super user is different, there may occur a risk of file exception that data storage is abnormal, lost, or processing is wrong.
Disclosure of Invention
The invention provides a method and a device for configuring user permission under an HDFS file system, which are used for solving the problem of file abnormal risk caused by the fact that a specific user does not configure permission in the related art.
According to a first aspect of the embodiments of the present invention, a method for configuring user permissions under an HDFS file system is provided, including:
responding to the selection operation, and selecting a target object to be configured with the permission in the HDFS file system;
responding to an ACL permission command, and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
Optionally, before the step of responding to the selecting operation, the method further includes:
in response to a configuration operation, a specified parameter in a configuration file in the HDFS file system is configured to initiate an access control list ACL.
Optionally, the configuring the rights of the target object as the target rights corresponding to the ACL rights command includes:
if the ACL permission command indicates that at least 2 target users configure permission, grouping the at least 2 target users;
and configuring the user group authority of each group as a target authority corresponding to the ACL authority command.
Optionally, the configuring the user right of the target object as the target right corresponding to the ACL right command includes:
judging whether the target object is a root directory or not;
if so, configuring the user right of the root directory as the target right and not configuring the user right of the subdirectory or the file under the root directory;
if not, configuring the user authority of the target object as the target authority corresponding to the ACL authority command.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus for configuring user permissions under an HDFS file system, including:
the target object selection module is used for responding to the selection operation and selecting a target object to be configured with the authority in the HDFS file system;
the target permission configuration module is used for responding to an ACL permission command and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
Optionally, the apparatus further comprises:
and the specified parameter configuration module is used for responding to configuration operation and configuring specified parameters in configuration files in the HDFS file system so as to start an Access Control List (ACL).
Optionally, the target authority configuration module includes:
the user grouping unit is used for grouping at least 2 target users when the ACL permission command indicates that at least 2 target users are provided with the permission;
and the authority configuration unit is used for configuring the user group authority of each group as the target authority corresponding to the ACL authority command.
Optionally, the target authority configuration module includes:
a root directory judging unit, configured to judge whether the target object is a root directory;
the permission configuration unit is used for configuring the user permission of the root directory as the target permission and not configuring the user permission of the subdirectory or the file under the root directory when the target object is the root directory; and when the target object is not the root directory, configuring the user right of the target object as the target right corresponding to the ACL right command.
According to a third aspect of embodiments of the present invention, there is provided an HDFS file system, comprising a processor and a memory for storing executable instructions; the processor is connected to the memory via a communication bus for reading executable instructions from the memory to implement the steps of the method of any one of the first aspect.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon computer-executable instructions which, when executed by a processor, implement the steps of the method of any one of the first aspect.
In the embodiment, a target object with permission to be configured is selected in the HDFS file system by responding to the selection operation; then, responding to an ACL permission command, and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable. In this embodiment, by configuring the user permissions of the target objects (e.g., a test-level user, a training-level user, an algorithm-level user, and a super user), the target objects can use the same HDFS file system, so as to meet the diversified requirements of each target object on the data access permissions, avoid the file exception risk of data storage exception, data loss, or processing error among the target objects, and facilitate improving data security and management efficiency.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flowchart illustrating a method for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating a method for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
FIG. 3 is a flow chart illustrating cleansing of source data according to an embodiment of the present invention.
Fig. 4 is a block diagram illustrating an apparatus for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
Fig. 5 is a block diagram of another apparatus for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
Fig. 6 is a block diagram of another apparatus for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
Fig. 7 is a block diagram of another apparatus for configuring user permissions under an HDFS file system according to an embodiment of the present invention.
Fig. 8 is a block diagram illustrating an HDFS file system according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
With the increase and development of the data volume of the information technology, some data are very sensitive in many industries, for example, for production data and financial data, special statement needs to be made on the authority of the data, data use authority is controlled, and even background authority and data authority need to be controlled.
Currently, many companies typically employ a distributed file system of HDFS (Hadoop distributed file system, HDFS). In an actual application, the users usually have super permissions (or do not configure permissions for the users), so that files of the users in the HDFS file system are disclosed relative to other users. However, since the work content of each of the training level user, the testing level user, the algorithm user, and the super user is different, there may occur a risk of file exception that data storage is abnormal, lost, or processing is wrong.
In order to solve the above problem, an embodiment of the present invention provides a method for configuring user permissions under an HDFS file system, which may be applied to an electronic device that employs the HDFS file system, where the electronic device may be a mobile terminal or a server, and fig. 1 is a flowchart of a method for configuring user permissions under the HDFS file system according to an embodiment of the present invention. Referring to fig. 1, a method for configuring user permissions under an HDFS file system includes steps 101 and 102, where:
in step 101, in response to the selection operation, a target object to be configured with rights is selected in the HDFS file system.
When the user right needs to be configured, the target object or the management personnel can operate the electronic equipment to modify the user right of the target object relative to the target user in the background.
In this embodiment, the electronic device may detect a trigger operation of a manager, and when it is detected that the trigger operation is a selection operation, may select, in response to the selection operation, a target object to which a right is to be configured from the HDFS file system.
In practical applications, the target object may include at least one of the following: files and directories.
In step 102, responding to an ACL permission command, configuring the user permission of the target object as a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
In practice, the HDFS file system disables the access control list ACL by default. In order to use the ACL permission command, the ACL needs to be enabled in advance in this embodiment, so that the electronic device can configure the specified parameters in the configuration file in the HDFS file system in response to the configuration operation, so as to start the access control list ACL. See table 1 for the configuration.
TABLE 1
Figure BDA0002244534350000061
In this embodiment, when the electronic device detects the ACL permission command, the electronic device may configure the user permission of the target object as the target permission corresponding to the ACL permission command in response to the ACL permission command. Wherein the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
For example, the target rights may be expressed in the following manner:
user: : rwx specifies user-readable-writable.
User: : r-x specifies user-readable non-writable.
User: : -other users are not readable and writable.
Group: xx: - - -: the specified group xx is not writable and readable.
Group: xx: r- (a-): group xx is specified to have readable rights.
Group: xx: rw-: group xx is specified to have the right to read and write.
mask::r—
Because the authority of each directory or file is different for different users or user groups, the present embodiment mainly includes: r-read permission, w-write permission, x-execute permission.
It should be noted that each ACL permission command in this embodiment may include a type, an optional name, and a permission string component, which are separated by a colon (: that is). For example, User in the above example: : rwx indicates that the target User (User) has read-write rights.
Group: xx: r- (a-): the specified group xx has the readable authority, which indicates that the user group to which the file belongs has the read and execution authority, and the mask:: r indicates that other users except the group xx have the read authority. Wherein, the above configuration is equivalent to the file setting 654 (6 indicates the read-write permission of the target user, 5 indicates the read and execution permission of the user group, and 4 indicates the read permission of other users).
In addition, it should be noted that the mask entry in each ACL entry is a special entry for filtering the permissions granted to all named users, named user groups, and unnamed groups, i.e., filtering any ACL entry except the file owner and other users (other). In other words, the mask item plays the role of a filter, which will effectively constrain the permissions of all the extension items, rather than just changing the permissions of the group and possibly missing the permissions of other extension items. And each ACL item needs to be provided with a mask item, if the mask item is not used in the ACL, one mask item is obtained by calculating the authority sum (& operation) of all the mask filtering items, and the mask item is automatically added into the ACL authority command.
In one embodiment, when the target object is a directory, the directory may be a root directory. Referring to fig. 2, before configuring the user right of the target object, the electronic device may determine whether the target object is a root directory (corresponding to step 201 in fig. 2). If so, configuring the user right of the root directory as the target right and not configuring the user right of the subdirectory or the file under the root directory; if not, the user authority of the target object is configured to be the target authority corresponding to the ACL authority command.
In an embodiment, when an ACL permission command is performed in the HDFS file system, the cumulative user authorization cannot be performed, that is, when the ACL permission command indicates that at least 2 users are configured, the at least 2 users need to be first grouped (or grouped with the same permission), and then the group is configured with permission, so that each target user in the group has the same user permission. In specific implementation, default type permission can be added for configuration when the ACL permission command is received, and when the namenode obtains the ACL permission command, the user permission can be grouped and configured for the grouping. Therefore, the number of times of empowering the HDFS file system can be reduced in the embodiment, so that the time overhead in the permission configuration process is reduced, and the working efficiency is integrally improved.
In an embodiment, after configuring the permission for the target user to take effect, an hdfs dfs-getfacl command can be adopted, so that the user permission information of each target user can be checked, and whether the configuration is successful or not can be conveniently confirmed.
In this embodiment, in response to a selection operation, a target object to be configured with a right is selected in the HDFS file system; then, responding to an ACL permission command, and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable. In this embodiment, by configuring the user permissions of the target objects (e.g., a test-level user, a training-level user, an algorithm-level user, and a super user), the target objects can use the same HDFS file system, so as to meet the diversified requirements of each target object on the data access permissions, avoid the file exception risk of data storage exception, data loss, or processing error among the target objects, and facilitate improving data security and management efficiency.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus for configuring user permissions under an HDFS file system, referring to fig. 4, including:
a target object selection module 401, configured to select, in response to a selection operation, a target object to be configured with a permission in the HDFS file system;
a target permission configuration module 402, configured to respond to an ACL permission command, configure the user permission of the target object as a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
On the basis of an apparatus for configuring user permissions under an HDFS file system shown in fig. 4, referring to fig. 5, the apparatus further includes:
a designated parameter configuration module 501, configured to configure a designated parameter in a configuration file in the HDFS file system in response to a configuration operation, so as to start an access control list ACL.
On the basis of the apparatus for configuring user rights under the HDFS file system shown in fig. 4, referring to fig. 6, the target rights configuration module 402 includes:
a user grouping unit 601, configured to group at least 2 target users when the ACL right command indicates that at least 2 target users configure rights;
and an authority configuring unit 602, configured to configure the user group authority of each group as a target authority corresponding to the ACL authority command.
On the basis of an apparatus for configuring user rights under the HDFS file system shown in fig. 4, referring to fig. 7, a target rights configuration module 402 includes:
a root directory determining unit 701, configured to determine whether the target object is a root directory;
a permission configuring unit 702, configured to configure, when the target object is a root directory, a user permission of the root directory as the target permission and not configure a user permission of a subdirectory or a file under the root directory; and when the target object is not the root directory, configuring the user right of the target object as the target right corresponding to the ACL right command.
It is to be understood that the device embodiments provided in the embodiments of the present invention correspond to the method embodiments described above, and specific contents may refer to the contents of the method embodiments, which are not described herein again.
An embodiment of the present invention further provides an HDFS file system, see fig. 8, including a processor 801 and a memory 802 for storing executable instructions; the processor 801 is connected to the memory 802 via a communication bus 803 for reading executable instructions from the memory to implement the steps of the method of any of fig. 1-3.
Embodiments of the present invention also provide a computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, implement the steps of the method described in any of fig. 1-3.
In the present invention, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The term "plurality" means two or more unless expressly limited otherwise. In the present invention, two components connected by a dotted line are in an electrical connection or contact relationship, and the dotted line is only used for the sake of clarity of the drawings, so that the solution of the present invention can be understood more easily.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A method for configuring user permission under an HDFS file system is characterized by comprising the following steps:
responding to the selection operation, and selecting a target object to be configured with the permission in the HDFS file system;
responding to an ACL permission command, and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
2. The method of claim 1, wherein in response to the step of selecting, the method further comprises:
in response to a configuration operation, a specified parameter in a configuration file in the HDFS file system is configured to initiate an access control list ACL.
3. The method of claim 1, wherein the configuring the rights of the target object as the target rights corresponding to the ACL rights command comprises:
if the ACL permission command indicates that at least 2 target users configure permission, grouping the at least 2 target users;
and configuring the user group authority of each group as a target authority corresponding to the ACL authority command.
4. The method according to claim 1, wherein the configuring the user right of the target object as the target right corresponding to the ACL right command includes:
judging whether the target object is a root directory or not;
if so, configuring the user right of the root directory as the target right and not configuring the user right of the subdirectory or the file under the root directory;
if not, configuring the user authority of the target object as the target authority corresponding to the ACL authority command.
5. An apparatus for configuring user permissions under an HDFS file system, comprising:
the target object selection module is used for responding to the selection operation and selecting a target object to be configured with the authority in the HDFS file system;
the target permission configuration module is used for responding to an ACL permission command and configuring the user permission of the target object into a target permission corresponding to the ACL permission command; the target authority comprises one of: readable writable, readable non-writable, and non-readable non-writable.
6. The apparatus of claim 5, further comprising:
and the specified parameter configuration module is used for responding to configuration operation and configuring specified parameters in configuration files in the HDFS file system so as to start an Access Control List (ACL).
7. The apparatus of claim 5, wherein the target privilege configuration module comprises:
the user grouping unit is used for grouping at least 2 target users when the ACL permission command indicates that at least 2 target users are provided with the permission;
and the authority configuration unit is used for configuring the user group authority of each group as the target authority corresponding to the ACL authority command.
8. The apparatus of claim 5, wherein the target privilege configuration module comprises:
a root directory judging unit, configured to judge whether the target object is a root directory;
the permission configuration unit is used for configuring the user permission of the root directory as the target permission and not configuring the user permission of the subdirectory or the file under the root directory when the target object is the root directory; and when the target object is not the root directory, configuring the user right of the target object as the target right corresponding to the ACL right command.
9. An HDFS file system comprising a processor and a memory for storing executable instructions; the processor is connected with the memory through a communication bus and is used for reading executable instructions from the memory so as to realize the steps of the method of any one of claims 1 to 4.
10. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a processor, perform the steps of the method of any one of claims 1 to 4.
CN201911012194.6A 2019-10-23 2019-10-23 Method and device for configuring user permission under HDFS file system Pending CN110765093A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911012194.6A CN110765093A (en) 2019-10-23 2019-10-23 Method and device for configuring user permission under HDFS file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911012194.6A CN110765093A (en) 2019-10-23 2019-10-23 Method and device for configuring user permission under HDFS file system

Publications (1)

Publication Number Publication Date
CN110765093A true CN110765093A (en) 2020-02-07

Family

ID=69333171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911012194.6A Pending CN110765093A (en) 2019-10-23 2019-10-23 Method and device for configuring user permission under HDFS file system

Country Status (1)

Country Link
CN (1) CN110765093A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9111114B1 (en) * 2012-02-10 2015-08-18 Pivotal Software, Inc. Method of transforming database system privileges to object privileges
CN107301352A (en) * 2017-06-22 2017-10-27 郑州云海信息技术有限公司 A kind of method and device of priority assignation
CN107688753A (en) * 2017-09-01 2018-02-13 郑州云海信息技术有限公司 A kind of method and apparatus of ACL controls of authority
CN108804936A (en) * 2018-06-06 2018-11-13 郑州云海信息技术有限公司 A kind of right management method and system based on distributed memory system ACL
CN109062967A (en) * 2018-06-28 2018-12-21 郑州云海信息技术有限公司 A kind of method of distributed storage ACL quick response permission inquiry
CN109740381A (en) * 2019-01-08 2019-05-10 郑州云海信息技术有限公司 A kind of authority control method across file system, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9111114B1 (en) * 2012-02-10 2015-08-18 Pivotal Software, Inc. Method of transforming database system privileges to object privileges
CN107301352A (en) * 2017-06-22 2017-10-27 郑州云海信息技术有限公司 A kind of method and device of priority assignation
CN107688753A (en) * 2017-09-01 2018-02-13 郑州云海信息技术有限公司 A kind of method and apparatus of ACL controls of authority
CN108804936A (en) * 2018-06-06 2018-11-13 郑州云海信息技术有限公司 A kind of right management method and system based on distributed memory system ACL
CN109062967A (en) * 2018-06-28 2018-12-21 郑州云海信息技术有限公司 A kind of method of distributed storage ACL quick response permission inquiry
CN109740381A (en) * 2019-01-08 2019-05-10 郑州云海信息技术有限公司 A kind of authority control method across file system, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
WO2020233219A1 (en) Abnormal problem locating method and device, apparatus and computer readable storage medium
EP3101584A1 (en) Data access control method, device and terminal
US20160232374A1 (en) Permission control method and apparatus
CN105630418A (en) Data storage method and device
CN108763951A (en) A kind of guard method of data and device
CN103581187A (en) Method and system for controlling access rights
US9516031B2 (en) Assignment of security contexts to define access permissions for file system objects
CN113612802B (en) Access control method, device, equipment and readable storage medium
CN104268462A (en) Sub-zone protecting method and device of Android system
CN107566375B (en) Access control method and device
CN111177703B (en) Method and device for determining data integrity of operating system
CN109145536A (en) A kind of webpage integrity assurance and device
CN117272351A (en) User authority management method and system for operating system
WO2018175643A1 (en) System and method for providing restricted access to production files in a code development environment
CN110442636B (en) Data reading and writing method and device and data reading and writing equipment
CN110765093A (en) Method and device for configuring user permission under HDFS file system
CN104268231B (en) A kind of file access method, device and Intelligent File System
CN112559118A (en) Application data migration method and device, electronic equipment and storage medium
US11748511B2 (en) Protecting data based on context of data movement operation
CN109508550A (en) Privacy of user guard method and system based on SEAndroid
CN106778235B (en) Linux file operation control method and device
CN114564706A (en) User authority management method and device, electronic equipment and storage medium
CN114021104A (en) USB device control method and device and electronic device
WO2010095561A1 (en) Information processing system and method of operation thereof
CN110968888B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207