CN111190738B - User mirroring method, device and system under multi-tenant system - Google Patents
User mirroring method, device and system under multi-tenant system Download PDFInfo
- Publication number
- CN111190738B CN111190738B CN201911414893.3A CN201911414893A CN111190738B CN 111190738 B CN111190738 B CN 111190738B CN 201911414893 A CN201911414893 A CN 201911414893A CN 111190738 B CN111190738 B CN 111190738B
- Authority
- CN
- China
- Prior art keywords
- service
- mirror image
- initiator
- service requirement
- provider
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/50—Indexing scheme relating to G06F9/50
- G06F2209/5013—Request control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The embodiment of the invention provides a user mirroring method, device and system under a multi-tenant system, wherein the method comprises the following steps: when a service initiator detects a service requirement, inquiring an administrator corresponding to the service initiator whether the service initiator has mirror image connection authority; receiving a feedback result of a service initiator administrator, and sending a service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority; receiving a mirror image connection request fed back by a technical provider, and detecting whether the mirror image connection request corresponds to a service requirement or not; when the mirror image connection request corresponds to the service requirement, the mirror image connection is established with the technical provider for the technical provider to solve the service requirement. By adopting the method, the isolation of the service data tenant can be overcome, and the problem of clients can be solved in time.
Description
Technical Field
The present invention relates to the field of data security, and in particular, to a method, an apparatus, and a system for user mirroring in a multi-tenant system.
Background
As cloud services become more popular, more and more companies or organizations begin to use cloud services, more and more tenants in the cloud services, a group of users, which share a particular set of business rules and a particular set of rights in the system. The tenant is typically a company, organization, or other group.
Currently, in a software system, multiple tenants are carried. Each tenant has an isolated business rule and authority hierarchy.
However, under the multi-tenant system, when a user in a certain tenant needs a software service provider to provide technical support, the software service provider cannot obtain problem data and query relevant configuration of the problem tenant due to isolation of service data tenants, so that troubles are brought to timely and fast solving of problems of clients.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a user mirroring method, device and system under a multi-tenant system.
The embodiment of the invention provides a user mirroring method under a multi-tenant system, which comprises the following steps:
when a service initiator detects a service requirement, inquiring an administrator corresponding to the service initiator whether the service initiator has mirror image connection authority;
receiving a feedback result of a service initiator administrator, and sending the service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority;
receiving a mirror image connection request fed back by the technology provider, and detecting whether the mirror image connection request corresponds to the service requirement;
and when the mirror connection request corresponds to the service requirement, establishing mirror connection with the technical provider for the technical provider to solve the service requirement.
In one embodiment, the method further comprises:
acquiring an identity token fed back by the technical provider, and detecting whether the identity token is accurate or not;
and when the identity token is accurate, detecting whether the mirror image connection request corresponds to the service requirement.
In one embodiment, the method further comprises:
and when the service initiator detects the authorized closing information sent by the administrator corresponding to the service initiator, disconnecting the mirror connection.
The embodiment of the invention provides a user mirror image device under a multi-tenant system, which comprises:
the inquiry module is used for inquiring whether the service initiator has mirror image connection authority or not to an administrator corresponding to the service initiator when the service initiator detects the service requirement;
the first receiving module is used for receiving a feedback result of a service initiator administrator, and sending the service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority;
the second receiving module is used for receiving a mirror image connection request fed back by the technical provider and detecting whether the mirror image connection request corresponds to the service requirement or not;
and the connection establishment module is used for establishing mirror connection with the technical provider when the mirror connection request corresponds to the service requirement, so that the technical provider can solve the service requirement.
The embodiment of the invention provides a user mirroring method under a multi-tenant system, which comprises the following steps:
when the technical provider receives the service requirement, the technical provider applies for authorization to the corresponding administrator;
after the fact that the administrator corresponding to the technical provider is authorized successfully is detected, whether the service requirement is valid or not is detected;
when the service requirement is effective, sending a mirror image connection request to a service initiator corresponding to the service requirement, and switching to a node where the service initiator is located according to node information in the service requirement;
when the service initiator is detected to respond to the mirror image connection request, mirror image connection is established with the service initiator, and the service requirement is solved for the service initiator through the mirror image connection.
In one embodiment, the method further comprises:
and generating an identity token corresponding to the service initiator according to the service requirement, and transmitting the identity token to the service initiator when the mirror image connection request is transmitted.
In one embodiment, the method further comprises:
and when the technical provider detects the authorized closing information sent by the administrator corresponding to the technical provider, disconnecting the mirror connection.
The embodiment of the invention provides a user mirror image device under a multi-tenant system, which comprises:
the receiving module is used for applying authorization to the corresponding administrator when the technical provider receives the service requirement;
the detection module is used for detecting whether the service requirement is valid or not after the corresponding administrator authorization of the technical provider is successful;
the sending module is used for sending a mirror image connection request to a service initiator corresponding to the service requirement when the service requirement is effective, and switching to a node where the service initiator is located according to node information in the service requirement;
and the connection establishment module is used for establishing mirror connection with the service initiator when detecting that the service initiator responds to the mirror connection request, and solving the service requirement for the service initiator through the mirror connection.
The embodiment of the invention provides a user mirror image system under a multi-tenant system, which comprises the user mirror image devices under the multi-tenant system of the two service originators.
The user mirror image method, the device and the system under the multi-tenant system provided by the embodiment of the invention are used for inquiring whether the service initiator has mirror image connection authority to the corresponding administrator of the service initiator when the service initiator detects the service requirement; receiving a feedback result of a service initiator administrator, and sending a service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority; receiving a mirror image connection request fed back by a technical provider, and detecting whether the mirror image connection request corresponds to a service requirement or not; when the mirror image connection request corresponds to the service requirement, the mirror image connection is established with the technical provider for the technical provider to solve the service requirement. The isolation of service data tenants is overcome, and the problem of clients is solved in time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a user mirroring method under a multi-tenant architecture in an embodiment of the present invention;
FIG. 2 is a flow chart of a user mirroring method under a multi-tenant architecture according to another embodiment of the present invention;
FIG. 3 is a block diagram of a user mirror device under a multi-tenant architecture in an embodiment of the present invention;
FIG. 4 is a block diagram of a user mirror device under a multi-tenant architecture in accordance with another embodiment of the present invention;
fig. 5 is a block diagram of a user mirror system under a multi-tenant architecture in an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 is a flow chart of a user mirroring method in a multi-tenant system according to a first embodiment of the present invention, and as shown in fig. 1, an embodiment of the present invention provides a user mirroring method in a multi-tenant system, including:
step S101, when the service initiator detects the service requirement, inquiring whether the service initiator has mirror image connection authority or not to an administrator corresponding to the service initiator.
Specifically, the service requirement is a technical difficulty for a service initiator, a software service provider is required to provide technical support, the service initiator can inquire about whether an administrator of the company or the organization has the authority of mirror connection of other software service providers except the company after the technical difficulty is met, wherein the mirror connection value technical provider, namely the service provider can simulate the behavior of a target user to solve the requirement of the service initiator under the condition that the service provider can log in without using the account number password of the target user.
Step S102, receiving a feedback result of a service initiator administrator, and sending the service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority.
Specifically, the service initiator receives a feedback result of the mirror image connection authority of the corresponding administrator, and when the feedback result is that the service initiator has the mirror image connection authority, the service initiator sends a service requirement to the technical provider, in addition, when the administrator receives a query request sent by the service initiator, the service initiator is authorized according to the query request of the service initiator, and after the service initiator has the mirror image connection authority, the service requirement can be sent outwards, the technical provider is not required to be specified, and a plurality of technical providers can provide technical support according to the service requirement.
Step S103, receiving a mirror image connection request fed back by the technical provider, and detecting whether the mirror image connection request corresponds to the service requirement.
Specifically, the technology provider and the service initiator are nodes in the cloud service, the service initiator receives a mirror image connection request fed back by the technology provider and detects whether the mirror image connection request is a scene connection request fed back according to service requirements, specifically, whether the mirror image connection request contains authorization information for the service requirements or not can be determined according to the mirror image connection request sent by the service initiator, such as a fixed key and the like, the service initiator carries the key when sending the mirror image connection request, and if the mirror image connection request fed back by the technology provider carries the same key, the mirror image connection request corresponds to the service requirements.
In addition, after receiving the mirror image connection request fed back by the technical provider, the identity token fed back by the technical provider is also received, wherein the identity token is a token generated by the technical provider according to the service requirement and is used for verifying the identity, and after the identity token passes the verification, whether the mirror image connection request corresponds to the service requirement is detected.
And step S104, when the mirror connection request corresponds to the service requirement, mirror connection is established with the technical provider for the technical provider to solve the service requirement.
Specifically, when the mirror image connection request fed back by the technology provider corresponds to the service requirement, the mirror image connection is established with the technology provider, so that the technology provider can solve the service requirement according to the mirror image connection.
In addition, when the service initiator and the technical provider are in mirror image connection, when the service initiator receives the authorized closing information of the manager, namely, the manager recovers the mirror image connection right of the service initiator due to safety problems and the like, the mirror image connection is disconnected.
The user mirror image method under the multi-tenant system provided by the embodiment of the invention is that when a service initiator detects a service requirement, an administrator corresponding to the service initiator is inquired whether the service initiator has mirror image connection authority; receiving a feedback result of a service initiator administrator, and sending a service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority; receiving a mirror image connection request fed back by a technical provider, and detecting whether the mirror image connection request corresponds to a service requirement or not; when the mirror image connection request corresponds to the service requirement, the mirror image connection is established with the technical provider for the technical provider to solve the service requirement. The isolation of service data tenants is overcome, and the problem of clients is solved in time.
Fig. 2 is a flow chart of a user mirroring method in a multi-tenant system according to a second embodiment of the present invention, and as shown in fig. 2, another embodiment of the present invention provides a user mirroring method in a multi-tenant system, including:
in step S201, when the technology provider receives the service requirement, the technology provider applies for authorization to the corresponding administrator.
Specifically, the technical provider may apply for authorization of mirror image connection to an administrator of the software service provider company after receiving the service requirement sent by the service initiator, or may actively authorize the technical provider, that is, the technical provider only needs to accept the authorization and then provide the service after receiving the service requirement sent by the service initiator.
Step S202, after detecting that the administrator authorization corresponding to the technical provider is successful, detecting whether the service requirement is valid.
Specifically, after the technical provider detects that the corresponding administrator is authorized successfully, whether the service requirement is valid or not, that is, whether the service requirement is a fake message, a dangerous message or the like is detected, and information such as a key or a security certificate of the service requirement can be detected.
Step S203, when the service requirement is valid, a mirror image connection request is sent to a service initiator corresponding to the service requirement, and the node where the service initiator is located is switched to according to the node information in the service requirement.
Specifically, when the service requirement is effective information, the technology provider sends a mirror image connection request to the service initiator, and the technology provider is also switched to the same node according to node information of the service initiator in the service requirement, and in addition, when the mirror image connection request is sent, the mirror image connection request carries a secret key of the service initiator received according to the service requirement.
In addition, after receiving the mirror image connection request sent by the service initiator, the technical provider generates an identity token according to the mirror image connection request, and the token generated by the identity token according to the service requirement in the mirror image connection request is a token for the service initiator to verify the identity of the technical provider.
And step S204, when the service initiator is detected to respond to the mirror image connection request, mirror image connection is established with the service initiator, and the service requirement is solved for the service initiator through the mirror image connection.
Specifically, when detecting that the service initiator responds to the mirror image connection request, mirror image connection is established with the service initiator, and the service requirement is solved for the service initiator through mirror image connection.
In addition, when the service initiator and the technical provider are in mirror image connection, when the technical provider receives the authorized closing information of the administrator, namely, the administrator recovers the mirror image connection right of the technical provider due to safety problems and the like, the mirror image connection is disconnected.
The embodiment of the invention provides a user mirroring method under a multi-tenant system, wherein when a technical provider receives a service demand, the technical provider applies for authorization to a corresponding manager; after the corresponding administrator of the technical provider is successfully authorized, detecting whether the service requirement is valid or not; when the service requirement is effective, sending a mirror image connection request to a service initiator corresponding to the service requirement, and switching to a node where the service initiator is located according to node information in the service requirement; when detecting that the service initiator responds to the mirror image connection request, establishing mirror image connection with the service initiator, and solving the service requirement for the service initiator through mirror image connection. The isolation of service data tenants is overcome, and the problem of clients is solved in time.
Fig. 3 is a user mirror device under a multi-tenant system provided by an embodiment of the present invention, including: a query module 301, a first receiving module 302, a second receiving module 303, and a connection establishment module 304, wherein:
and the query module 301 is configured to query, when the service initiator detects a service requirement, an administrator corresponding to the service initiator whether the service initiator has the mirror image connection authority.
The first receiving module 302 is configured to receive a feedback result of the service initiator administrator, and send a service requirement to the technology provider when the feedback result is that the service initiator has the mirror image connection authority.
The second receiving module 303 is configured to receive the mirror connection request fed back by the technology provider, and detect whether the mirror connection request corresponds to a service requirement.
The connection establishment module 304 is configured to establish a mirror connection with the technology provider when the mirror connection request corresponds to the service requirement, so that the technology provider can solve the service requirement.
In one embodiment, the apparatus may further include:
and the acquisition module is used for acquiring the identity token fed back by the technical provider and detecting whether the identity token is accurate or not.
And the detection module is used for detecting whether the mirror image connection request corresponds to the service requirement or not when the identity token is accurate.
In one embodiment, the apparatus may further include:
and the disconnection module is used for disconnecting the mirror image connection when the service initiator detects the authorized closing information sent by the administrator corresponding to the service initiator.
For specific limitation of the user mirroring device under the multi-tenant system, reference may be made to the limitation of the user mirroring method under the multi-tenant system in the above first embodiment, and the description thereof is omitted here. The modules in the user mirroring device under the multi-tenant architecture may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Fig. 4 is a user mirror device under a multi-tenant system provided by an embodiment of the present invention, including: a receiving module 401, a detecting module 402, a sending module 403, and a connection establishing module 404, wherein:
the receiving module 401 is configured to apply for authorization to a corresponding administrator when the technology provider receives a service requirement.
And the detection module 402 is configured to detect whether the service requirement is valid after the administrator corresponding to the technology provider is authorized successfully.
And the sending module 403 is configured to send a mirror image connection request to a service initiator corresponding to the service requirement when the service requirement is valid, and switch to a node where the service initiator is located according to node information in the service requirement.
The connection establishment module 404 is configured to establish a mirror connection with the service initiator when detecting that the service initiator responds to the mirror connection request, and solve a service requirement for the service initiator through the mirror connection.
In one embodiment, the apparatus may further include:
the generating module is used for generating an identity token corresponding to the service initiator according to the service requirement, and sending the identity token to the service initiator when the mirror image connection request is sent.
In one embodiment, the apparatus may further include:
and the disconnection module is used for disconnecting the mirror image connection when the technical provider detects the authorized closing information sent by the administrator corresponding to the technical provider.
For specific limitation of the user mirroring device under the multi-tenant system, reference may be made to the limitation of the user mirroring method under the multi-tenant system in the second embodiment, which is not described herein. The modules in the user mirroring device under the multi-tenant architecture may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Fig. 5 is a user mirror system under a multi-tenant system according to an embodiment of the present invention, including two user mirror devices under a multi-tenant system in the foregoing embodiment.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (9)
1. A method for mirroring users in a multi-tenant architecture, the method comprising:
when a service initiator detects a service requirement, inquiring an administrator corresponding to the service initiator whether the service initiator has mirror image connection authority;
receiving a feedback result of a service initiator administrator, and sending the service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority;
receiving a mirror image connection request fed back by the technology provider, and detecting whether the mirror image connection request corresponds to the service requirement;
and when the mirror connection request corresponds to the service requirement, establishing mirror connection with the technical provider for the technical provider to solve the service requirement.
2. The method for mirroring users in a multi-tenant architecture according to claim 1, wherein after receiving the mirrored connection request fed back by the technology provider, the method further comprises:
acquiring an identity token fed back by the technical provider, and detecting whether the identity token is accurate or not;
and when the identity token is accurate, detecting whether the mirror image connection request corresponds to the service requirement.
3. The method for mirroring users in a multi-tenant architecture according to claim 1, further comprising, after the mirroring connection is established with the technology provider:
and when the service initiator detects the authorized closing information sent by the administrator corresponding to the service initiator, disconnecting the mirror connection.
4. A user mirroring device in a multi-tenant architecture, the device comprising:
the inquiry module is used for inquiring whether the service initiator has mirror image connection authority or not to an administrator corresponding to the service initiator when the service initiator detects the service requirement;
the first receiving module is used for receiving a feedback result of a service initiator administrator, and sending the service requirement to a technical provider when the feedback result is that the service initiator has mirror image connection authority;
the second receiving module is used for receiving a mirror image connection request fed back by the technical provider and detecting whether the mirror image connection request corresponds to the service requirement or not;
and the connection establishment module is used for establishing mirror connection with the technical provider when the mirror connection request corresponds to the service requirement, so that the technical provider can solve the service requirement.
5. A method for mirroring users in a multi-tenant architecture, the method comprising:
when the technical provider receives the service requirement, the technical provider applies for authorization to the corresponding administrator;
after the fact that the administrator corresponding to the technical provider is authorized successfully is detected, whether the service requirement is valid or not is detected;
when the service requirement is effective, sending a mirror image connection request to a service initiator corresponding to the service requirement, and switching to a node where the service initiator is located according to node information in the service requirement;
when the service initiator is detected to respond to the mirror image connection request, mirror image connection is established with the service initiator, and the service requirement is solved for the service initiator through the mirror image connection.
6. The method of user mirroring in a multi-tenant architecture of claim 5, further comprising:
and generating an identity token corresponding to the service initiator according to the service requirement, and transmitting the identity token to the service initiator when the mirror image connection request is transmitted.
7. The method for mirroring users in a multi-tenant architecture according to claim 5, wherein after the mirror connection is established with the service initiator, further comprising:
and when the technical provider detects the authorized closing information sent by the administrator corresponding to the technical provider, disconnecting the mirror connection.
8. A user mirroring device in a multi-tenant architecture, the device comprising:
the receiving module is used for applying authorization to the corresponding administrator when the technical provider receives the service requirement;
the detection module is used for detecting whether the service requirement is valid or not after the corresponding administrator authorization of the technical provider is successful;
the sending module is used for sending a mirror image connection request to a service initiator corresponding to the service requirement when the service requirement is effective, and switching to a node where the service initiator is located according to node information in the service requirement;
and the connection establishment module is used for establishing mirror connection with the service initiator when detecting that the service initiator responds to the mirror connection request, and solving the service requirement for the service initiator through the mirror connection.
9. A user mirroring system in a multi-tenant system, comprising the user mirroring device in a multi-tenant system according to claim 4 and the user mirroring device in a multi-tenant system according to claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414893.3A CN111190738B (en) | 2019-12-31 | 2019-12-31 | User mirroring method, device and system under multi-tenant system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414893.3A CN111190738B (en) | 2019-12-31 | 2019-12-31 | User mirroring method, device and system under multi-tenant system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111190738A CN111190738A (en) | 2020-05-22 |
CN111190738B true CN111190738B (en) | 2023-09-08 |
Family
ID=70709668
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911414893.3A Active CN111190738B (en) | 2019-12-31 | 2019-12-31 | User mirroring method, device and system under multi-tenant system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111190738B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102799522A (en) * | 2012-06-28 | 2012-11-28 | 浪潮(北京)电子信息产业有限公司 | Managing method and system for software version tracing test |
CN103227789A (en) * | 2013-04-19 | 2013-07-31 | 武汉大学 | Lightweight fine-grained access control method in cloud environment |
CN106067119A (en) * | 2016-06-03 | 2016-11-02 | 成都镜杰科技有限责任公司 | Client relation management method based on privately owned cloud |
CN106897947A (en) * | 2017-01-04 | 2017-06-27 | 上海易谷网络科技有限公司 | A kind of multi-tenant service quick deployment method based on cloud platform |
CN106933648A (en) * | 2015-12-31 | 2017-07-07 | 中国电信股份有限公司 | For the method and system of multi-tenant container resource management |
CN108011862A (en) * | 2016-10-31 | 2018-05-08 | 中兴通讯股份有限公司 | The mandate of mirror image warehouse, access, management method and server and client side |
CN108628658A (en) * | 2017-03-17 | 2018-10-09 | 华为技术有限公司 | A kind of licence managing method and device of container |
CN108881111A (en) * | 2017-05-10 | 2018-11-23 | 中兴通讯股份有限公司 | A kind of method and device for realizing multi-tenant system |
CN109324900A (en) * | 2012-09-12 | 2019-02-12 | 萨勒斯福斯通讯有限公司 | For the message queue in on-demand service environment based on the resource-sharing bidded |
CN109684873A (en) * | 2018-12-29 | 2019-04-26 | 金蝶软件(中国)有限公司 | Data access control method, device, computer equipment and storage medium |
CN109803018A (en) * | 2019-01-24 | 2019-05-24 | 云南电网有限责任公司信息中心 | A kind of DCOS cloud management platform combined based on Mesos and YARN |
CN110414252A (en) * | 2019-08-02 | 2019-11-05 | 湖南御家科技有限公司 | A kind of method for processing business, system and electronic equipment and storage medium |
CN110519361A (en) * | 2019-08-22 | 2019-11-29 | 北京宝兰德软件股份有限公司 | Container cloud platform multi-tenant construction method and device based on kubernetes |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9467477B2 (en) * | 2013-11-06 | 2016-10-11 | Intuit Inc. | Method and system for automatically managing secrets in multiple data security jurisdiction zones |
US11113675B2 (en) * | 2018-06-15 | 2021-09-07 | Paypal, Inc. | Unified transaction services for multi-tenant architectures |
-
2019
- 2019-12-31 CN CN201911414893.3A patent/CN111190738B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102799522A (en) * | 2012-06-28 | 2012-11-28 | 浪潮(北京)电子信息产业有限公司 | Managing method and system for software version tracing test |
CN109324900A (en) * | 2012-09-12 | 2019-02-12 | 萨勒斯福斯通讯有限公司 | For the message queue in on-demand service environment based on the resource-sharing bidded |
CN103227789A (en) * | 2013-04-19 | 2013-07-31 | 武汉大学 | Lightweight fine-grained access control method in cloud environment |
CN106933648A (en) * | 2015-12-31 | 2017-07-07 | 中国电信股份有限公司 | For the method and system of multi-tenant container resource management |
CN106067119A (en) * | 2016-06-03 | 2016-11-02 | 成都镜杰科技有限责任公司 | Client relation management method based on privately owned cloud |
CN108011862A (en) * | 2016-10-31 | 2018-05-08 | 中兴通讯股份有限公司 | The mandate of mirror image warehouse, access, management method and server and client side |
CN106897947A (en) * | 2017-01-04 | 2017-06-27 | 上海易谷网络科技有限公司 | A kind of multi-tenant service quick deployment method based on cloud platform |
CN108628658A (en) * | 2017-03-17 | 2018-10-09 | 华为技术有限公司 | A kind of licence managing method and device of container |
CN108881111A (en) * | 2017-05-10 | 2018-11-23 | 中兴通讯股份有限公司 | A kind of method and device for realizing multi-tenant system |
CN109684873A (en) * | 2018-12-29 | 2019-04-26 | 金蝶软件(中国)有限公司 | Data access control method, device, computer equipment and storage medium |
CN109803018A (en) * | 2019-01-24 | 2019-05-24 | 云南电网有限责任公司信息中心 | A kind of DCOS cloud management platform combined based on Mesos and YARN |
CN110414252A (en) * | 2019-08-02 | 2019-11-05 | 湖南御家科技有限公司 | A kind of method for processing business, system and electronic equipment and storage medium |
CN110519361A (en) * | 2019-08-22 | 2019-11-29 | 北京宝兰德软件股份有限公司 | Container cloud platform multi-tenant construction method and device based on kubernetes |
Also Published As
Publication number | Publication date |
---|---|
CN111190738A (en) | 2020-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9729531B2 (en) | Accessing a computer resource using an access control model and policy | |
CN110941844B (en) | Authentication method, system, electronic equipment and readable storage medium | |
US8630415B2 (en) | Method and apparatus for authentication service application processes during service reallocation in high availability clusters | |
US9178871B2 (en) | Authentication and authorization method and system | |
TWI632798B (en) | Server, mobile terminal, and network real-name authentication system and method | |
CN103685192A (en) | Method and device for limiting calling launched by third-party application | |
CN104247485A (en) | Network application function authorisation in a generic bootstrapping architecture | |
CN106713236A (en) | End-to-end identity authentication and encryption method based on CPK identifier authentication | |
CN111259356B (en) | Authorization method, auxiliary authorization component, management server and computer readable medium | |
CN103747076A (en) | Cloud platform access method and device | |
CN114444134A (en) | Data use authorization method, system and device | |
CN114338242A (en) | Cross-domain single sign-on access method and system based on block chain technology | |
CN113645257B (en) | Identity authentication method and device, electronic equipment and storage medium | |
CN111190738B (en) | User mirroring method, device and system under multi-tenant system | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
CN114120498B (en) | Method and related device for migrating data | |
CN113992387B (en) | Resource management method, device, system, electronic equipment and readable storage medium | |
KR101687944B1 (en) | Method and system for identifying compromised nodes | |
CN106576245B (en) | User equipment proximity request authentication | |
GB2520938A (en) | Mobile device location | |
US9882891B2 (en) | Identity verification | |
CN115134117B (en) | Method and device for verifying identity of Internet registered user, server and storage medium | |
CN114021094B (en) | Remote server login method, electronic device and storage medium | |
CN117714171A (en) | Intra-domain communication method, device, equipment and medium for video networking | |
CN117318969A (en) | Service communication method, device and system for realizing disaster recovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |