CN113792288A - Data processing method, device, storage medium and processor - Google Patents

Data processing method, device, storage medium and processor Download PDF

Info

Publication number
CN113792288A
CN113792288A CN202110909154.2A CN202110909154A CN113792288A CN 113792288 A CN113792288 A CN 113792288A CN 202110909154 A CN202110909154 A CN 202110909154A CN 113792288 A CN113792288 A CN 113792288A
Authority
CN
China
Prior art keywords
target
application
target object
background server
end client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110909154.2A
Other languages
Chinese (zh)
Inventor
季向远
师阳
于霜霜
张增华
赵迎芳
赵秀娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange Cloud Internet Design Co ltd
Beijing Uni Orange Technology Co ltd
Original Assignee
Orange Cloud Internet Design Co ltd
Beijing Uni Orange Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange Cloud Internet Design Co ltd, Beijing Uni Orange Technology Co ltd filed Critical Orange Cloud Internet Design Co ltd
Priority to CN202110909154.2A priority Critical patent/CN113792288A/en
Publication of CN113792288A publication Critical patent/CN113792288A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Abstract

The invention discloses a data processing method, a data processing device, a storage medium and a processor. The method is applied to a background server and comprises the following steps: determining a target application from at least one application; determining a target object from at least one object; and authorizing the target application to the target object for operation based on the identification information of the target object. The invention solves the technical problem that the application can not be isolated among all objects.

Description

Data processing method, device, storage medium and processor
Technical Field
The present invention relates to the field of computers, and in particular, to a data processing method, apparatus, storage medium, and processor.
Background
Currently, the use of applications for various objects, such as applications for enterprises, is typically implemented on interfaces of locally installed systems. Although the cloud development system can be implemented by systematically applying necessary applications required for industrial product development and design to cloud services, the application is not isolated among objects.
In view of the above technical problem that the application cannot be isolated among the objects, no effective solution has been proposed at present.
Disclosure of Invention
Embodiments of the present invention provide a data processing method, an apparatus, a storage medium, and a processor, so as to at least solve a technical problem that an application cannot be isolated between objects.
According to an aspect of an embodiment of the present invention, there is provided a data processing method. The method is applied to a background server and comprises the following steps: determining a target application from at least one application; determining a target object from at least one object; and authorizing the target application to the target object for operation based on the identification information of the target object.
Optionally, after authorizing the target application to the target object for operation, the method further includes: acquiring target data, wherein the target data is generated by operating a target application by a front-end client, the front-end client corresponds to a target object, and the target application runs in a virtual desktop environment; the target data is saved to a target storage location associated with the target object.
Optionally, the method further comprises: a target storage location is determined based on the identification information.
Optionally, before saving the target data to the target storage location, the method further comprises: acquiring a path selection instruction sent by a front-end client, wherein the path selection instruction is used for selecting a target storage position; in response to the path selection instruction, a target storage location is determined.
Optionally, after authorizing the target application to the target object for operation, the method further includes: acquiring an operation instruction sent by a front-end client; responding to the operation instruction, and operating the target application to obtain an operation result; and sending the operation information to the front-end client, wherein the operation information is used for enabling the front-end client to present an operation result.
Optionally, after authorizing the target application to the target object for operation, the method further includes: and sending the application information of the target application to the front-end client, wherein the application information is displayed by the front-end client and is used for indicating that the target application is successfully authorized to the target object.
According to another aspect of the embodiment of the invention, a data processing method is also provided. The method can be applied to a front-end client, and comprises the following steps: sending a target request to a background server, wherein the target request is used for requesting the background server to authorize a target application for a target object, and the target object corresponds to a front-end client; and displaying application information of the target application, wherein the application information is used for indicating that the background server successfully authorizes the target application to the target object.
Optionally, after displaying the application information of the target application, the method further includes: and sending a storage operation instruction to the background server, wherein the storage operation instruction is used for enabling the background server to store the target data to a target storage position associated with the target object, the target data is data generated by the operation of the front-end client on the target application, and the target application runs in the virtual desktop environment.
Optionally, before sending the saving operation instruction to the background server, the method further includes: and sending a path selection instruction to the background server, wherein the path selection instruction is used for enabling the background server to select the target storage position.
Optionally, after displaying the application information of the target application, the method further includes: sending an operation instruction to a background server, wherein the operation instruction is used for enabling the background server to operate the target application to obtain an operation result; and acquiring the operation information, and presenting an operation result on the front-end client based on the operation information.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium. The computer readable storage medium includes a stored program, wherein when the program runs, the apparatus in which the storage medium is located is controlled to execute the data processing method of the embodiment of the present invention.
According to another aspect of the embodiments of the present invention, there is also provided a processor. The processor is configured to execute a program, wherein the program executes the data processing method according to the embodiment of the present invention when the program is executed by the processor.
In the embodiment of the invention, the background server can determine the target application from at least one application; determining a target object from at least one object; and authorizing the target application to the target object for operation based on the identification information of the target object. That is to say, the application authorizes the target application to the target object through the background server, so that the target object has the authority to operate the target application, and other objects do not have the authority to operate the target application authorized to the target object, thereby achieving the purpose of isolating the application among the objects, solving the technical problem that the application cannot be isolated among the objects, and achieving the technical effect of isolating the application among the objects.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a method of data processing according to an embodiment of the invention;
FIG. 2 is a flow diagram of another data processing method according to an embodiment of the invention;
FIG. 3 is a schematic illustration of an interface used by an enterprise to an application, in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of a data processing apparatus according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of another data processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
In accordance with an embodiment of the present invention, there is provided an embodiment of a data processing method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different than that herein.
The method of the embodiment of the invention is described from the background server side. The background server may be a cloud server of an online research and development platform, where the online research and development platform may be a product online research and development platform in a cloud research and development system, for example, an industrial product online research and development platform, which may provide a research and development environment for an engineer.
Fig. 1 is a flow chart of a data processing method according to an embodiment of the present invention. As shown in fig. 1, the method may include the steps of:
step S102, determining a target application from at least one application.
In the technical solution provided in step S102 of the present invention, the background server may be a server corresponding to the online research and development platform, and may manage at least one application, for example, the background server manages at least one application through application management, and may select a target application from the at least one application in the application management, so as to achieve the purpose of determining the target application, where the target application may be an application to be authorized to operate on a target object. The online research and development platform can be an industrial online research and development platform.
In this embodiment, the at least one application may be application software, for example, software for providing an industrial product to an engineer, and may be necessary software required for developing and designing the industrial product, such as Computer Aided Design (CAD) software, Computer Aided Engineering (CAE) software, Electronic Design Automation (EDA) software, and other office-class software, which is not limited herein.
Step S104, determining a target object from at least one object.
In the technical solution provided by step S104 of the present invention, after the background server determines the target application from the at least one application, the target object may be determined from the at least one object. Optionally, information of at least one object may be recorded in the server of this embodiment, the object may be any enterprise, and a target object may be selected from the at least one object, so as to achieve the purpose of determining the target object, where the target object is an object to be allowed to operate the target application, for example, a relevant worker of the target object is allowed to operate the target application.
And step S106, authorizing the target application to the target object for operation based on the identification information of the target object.
In the technical solution provided by step S106 of the present invention, after the target object is determined from at least one object, the target application may be authorized to the target object to perform an operation based on the identification information of the target object.
In this embodiment, the target object has identification information for uniquely identifying the identity of the target object, which may be generated by the online development platform for the target object. The embodiment authorizes the target application to the target object for operation based on the identification information of the target object, which may be associating the target application with the target object based on the identification information of the target object to obtain association information, where the association information is used to represent that the target application is authorized to the target object.
Optionally, the target application is authorized to the target object, the target object may pay for the operation of the target application, so that the target application is authorized to the target object, or the online development platform directly authorizes the target application specifically to the target object.
The target application is only authorized to the target object and can be only used by the front-end client corresponding to the target object, and other objects have no right to use the target application authorized to the target object, so that the target application is isolated from the applications authorized to other objects, the independence between the applications associated with each object can be at least ensured, the purpose of isolating the applications of each object is further realized, and the timing and charging for the application used by the object in the follow-up process can be facilitated.
Optionally, in this embodiment, the background server may establish target permission information, where the target permission information is used to indicate that the target object is allowed to be associated with the target application, that is, the front-end client corresponding to the target object has permission to use the target application, and the clients of other objects have no permission to use the target application. Optionally, when the target object pays for the use of the target application, or the online development platform specifies the target object to use the target application, the target permission information may be established between the identification information of the target object and the target application, and the server may associate and store the target object and the target application based on the target permission information.
Through the steps S102 to S106, the background server may determine the target application from at least one application; determining a target object from at least one object; and authorizing the target application to the target object for operation based on the identification information of the target object. That is to say, in the embodiment, the background server authorizes the target application to the target object, so that the target object has the authority to operate the target application, and the other objects do not have the authority to operate the target application authorized to the target object, thereby achieving the purpose of isolating the application among the objects, solving the technical problem that the application cannot be isolated among the objects, and achieving the technical effect of isolating the application among the objects.
The above-described method of this embodiment is further described below.
As an optional implementation manner, after authorizing the target application to the target object for operation at step S106, the method further includes: acquiring target data, wherein the target data is generated by operating a target application by a front-end client, the front-end client corresponds to a target object, and the target application runs in a virtual desktop environment; the target data is saved to a target storage location associated with the target object.
In this embodiment, after authorizing the target application to the target object for operation, the target object may have the right to operate the target application. It should be noted that, in this embodiment, the relevant staff of the target object may have permission to operate the target application through the front-end client, so as to generate target data in the background server, where the target data may be referred to as business data and research and development data, and may be managed in the background server, that is, a scheme for providing product data management is provided, and may be used to support research and development teams to perform collaborative research and development. The front-end client may be a client device of the online research and development platform, for example, a client or a Personal Computer (PC), and corresponds to the target object, that is, an equipment end that is authorized to be operated by a worker related to the target object.
In this embodiment, the backend server may cloud the target application such that the target application runs in a Virtual Desktop Infrastructure (VDI) environment. The virtual desktop can be generated by running an operating system through a server of a data center of the online platform, and a user can be connected with the virtual desktop through a client computing protocol of a front-end client, so that the user can access the virtual desktop just like accessing a traditional locally installed desktop. The embodiment can store the target data to a target storage position associated with the target object in the background server, the target data stored in the target storage position is prohibited from being accessed by other objects, optionally, data generated by other objects through operating authorized applications can be stored in another storage position in the background server, and the target object cannot access the data stored in the another storage position, so that the technical problem that the target data generated by the target object through operating the authorized target applications is isolated from data generated by other objects through operating the authorized applications is solved, the data generated by the applications associated with the objects is isolated, and under the condition that workers corresponding to different objects are different, therefore, the safety of the data generated by the application associated with each object can be at least ensured, and the user requirements are further met.
Optionally, the target data of this embodiment includes at least one of: part data; three-dimensional model data; two-dimensional engineering drawing data; and lightening the file data. The three-dimensional model data, the two-dimensional engineering drawing data and the lightweight file data can be data generated by the first target application running in a VDI environment, the data can be managed in a server, the part data can be further generated in the server by the two-dimensional engineering drawing data, and the lightweight file data is file data generated by reserving main information in an original engineering drawing and removing unnecessary information.
For example, when an engineer develops a design, the target application such as CAD is used. The industrial product online research and development platform of the embodiment can generate target data such as a three-dimensional model, a two-dimensional engineering drawing and a lightweight file in a VDI environment for target applications associated with different target objects through clouding. In addition, the target data generated by each target object through the respective associated target application in the embodiment needs to be managed in the project of the industrial product online research and development platform, that is, a scheme for product data management is provided to support research and development teams to perform collaborative research and development, and the target data may mainly include data of parts, three-dimensional models, two-dimensional engineering drawings and lightweight files.
As an optional implementation, the method further comprises: a target storage location is determined based on the identification information.
In this embodiment, the identification information is used for uniquely identifying the target object, and the target storage location may be determined based on the identification information, so that the target storage location is also associated with the target object, and the target storage location generated by the target object operating the target application is stored in the target storage location, thereby achieving the purpose of data isolation of the target data generated by the target object operating the authorized target application from the data generated by other objects operating the authorized application.
In this embodiment, since the online research and development platform has its own specificity, the method can not only isolate the target data, but also isolate the target application that generates the target data, thereby implementing a scheme for isolating the target data from the target application.
As an optional implementation, before saving the target data to the target storage location, the method further includes: acquiring a path selection instruction sent by a front-end client, wherein the path selection instruction is used for selecting a target storage position; in response to the path selection instruction, a target storage location is determined.
In this embodiment, in order to implement that the backend server stores the target data in the target storage location to isolate the target data from data generated by other objects operating the authorized application, the backend server may obtain a path selection instruction sent by the front-end client, where the path selection instruction may cause the backend server to select the target storage location for the target object. After the background server receives the path selection instruction, the target storage position can be determined in response to the path selection instruction.
As an optional implementation manner, after authorizing the target application to the target object for operation at step S106, the method further includes: acquiring an operation instruction sent by a front-end client; responding to the operation instruction, and operating the target application to obtain an operation result; and sending the operation information to the front-end client, wherein the operation information is used for enabling the front-end client to present an operation result.
In this embodiment, after authorizing the target application to the target object for operation, the background server may send application information of the target application to the front-end client, and the front-end client may present the application information of the target application, where the application information may include description information of the target application, such as an icon, a text, and the like, which is not specifically limited herein, and may also include other information related to the target application, which is not specifically limited herein. Optionally, the front-end client presents icon information of the target application, which can be used to indicate that the target application has been successfully authorized to the target object, so as to facilitate the target object to generate an operation instruction for the target application through the front-end client. The background server can obtain the operation instruction sent by the front-end client, respond to the operation instruction, operate the target application to obtain an operation result, which is equivalent to the operation of the front-end client on the target application indirectly, and can send the operation information to the front-end client. The operation information is not the operation result, but information for presenting the operation result to the front-end client.
The data processing method of the embodiment of the present invention is described below from the front-end client side.
Fig. 2 is a flow chart of a data processing method according to an embodiment of the present invention. As shown in fig. 2, the method may include the steps of:
step S202, a target request is sent to a background server, wherein the target request is used for requesting the background server to authorize a target application for a target object, and the target object corresponds to the front-end client.
In the technical solution provided by step S202 of the present invention, the front-end client may be a client device of an online research and development platform. In order to meet research and development requirements, a target object needs to have a target application which is specially used, and a target request can be sent to a background server through a front-end client, wherein the target request is used for requesting the background server to authorize the target application for the target object, and the target object corresponds to the front-end client, namely, the front-end client is an equipment end which is authorized to operate by a worker related to the target object.
And step S204, displaying application information of the target application, wherein the application information is used for indicating that the background server successfully authorizes the target application to the target object.
In the technical solution provided by step S204 of the present invention, after sending the target request to the backend server, the front-end client may display application information of the target application, for example, icon information of the target application is presented, which may be used to indicate that the target application is successfully authorized to the target object, so as to facilitate the target object to generate an operation instruction for the target application running in the VDI environment through the front-end client, and further implement isolation of the target data and the target application.
The above-described method of this embodiment is further described below.
As an optional implementation manner, after displaying the application information of the target application in step S204, the method further includes: and sending a storage operation instruction to the background server, wherein the storage operation instruction is used for enabling the background server to store the target data to a target storage position associated with the target object, the target data is data generated by the operation of the front-end client on the target application, and the target application runs in the virtual desktop environment.
In this embodiment, after the front-end client displays the application information of the target application, a relevant worker of the target object has permission to operate the target application running in the VDI environment through the front-end client, so as to generate target data in the background server, the front-end client may send a save operation instruction to the background server, and the background server responds to the save operation instruction, so as to save the target data to a target storage location associated with the target object, thereby achieving the purpose of performing data isolation on the target data generated by operating the authorized target application by the target object and data generated by operating the authorized application by other objects.
As an optional implementation manner, before sending the saving operation instruction to the background server, the method further includes: and sending a path selection instruction to the background server, wherein the path selection instruction is used for enabling the background server to select the target storage position.
In this embodiment, in order to implement that the backend server stores the target data to the target storage location to isolate the target data from data generated by other objects operating the authorized application, the front-end client may send a path selection instruction to the backend server, where the path selection instruction may cause the backend server to select the target storage location for the target object. After the background server receives the path selection instruction, the target storage position can be determined in response to the path selection instruction.
As an optional implementation manner, after displaying the application information of the target application in step S204, the method further includes: sending an operation instruction to a background server, wherein the operation instruction is used for enabling the background server to operate the target application to obtain an operation result; and acquiring the operation information, and presenting an operation result on the front-end client based on the operation information.
In this embodiment, after the front-end client displays the application information of the target application, a worker related to the target object may operate on the front-end client to generate an operation instruction, and send the operation instruction to the background server, so that the background server operates the target application running in the VDI environment according to the operation instruction, and thus obtains an operation result. The front-end client acquires the operation information sent by the background server, and an operation result can be presented on the front-end client based on the operation information.
Optionally, the embodiment may switch the target object on the front-end client to present the application information of the application to which the switched object has the right to adapt.
For example, a user may enter different target objects through a target object on a front-end client, and the user may operate a "switch object" on an interface of the front-end client, switch the interface to an interface of the target object to which the user wants to switch, display that the target object has permission to use to at least one target application below the interface, view target data generated by running the at least one target application in a VDI environment, and display a creator of the target data, creation time, and the like, which is not limited herein. The at least one target application and the target data generated by each target application are inaccessible by other target objects.
The embodiment isolates the target data (parts, three-dimensional models, two-dimensional engineering drawings and lightweight files) of different target objects by the method, and isolates the target application of the provided target data based on the target objects, thereby being beneficial to timing and charging the target objects subsequently.
The data processing method of the embodiment can be applied to an online research and development platform, and has own particularity based on the online research and development platform, the embodiment combines the identification information of an enterprise, can isolate the data generated by the application associated with each target object, and can also isolate the application associated with each target object, so that the independence between the applications associated with each object is at least ensured, the data generated by the application associated with each object is isolated, the safety between the data generated by the application associated with each object is at least ensured, the technical problems that the application cannot be isolated between the objects and the data generated by the application cannot be isolated are solved, and the technical effect of isolating the application and the data generated by the application between the objects is achieved.
Example 2
The technical solution of this embodiment is further illustrated below, specifically, an industrial product online development platform is illustrated.
According to the embodiment, for each user, the online industrial product research and development platform can generate unique identification information in combination with an enterprise, so that the isolation of business data and application based on the enterprise can be ensured.
In this embodiment, the industrial product online research and development platform may provide an industrial product research and development environment for engineers, and in order to ensure the safety and the application independence of business data of each enterprise, data isolation and application isolation need to be performed on an enterprise basis.
TABLE 1 Business data and application isolation Table for enterprises
Figure BDA0003202824460000101
Table 1 is a business data and application isolation table of an enterprise according to an embodiment of the present invention, and when an engineer performs development and design, the application such as CAD may be used, and here, a specific type of CAD tool is not limited. The industrial product online research and development platform of the embodiment can generate data such as a three-dimensional model, a two-dimensional engineering drawing, a lightweight file and the like in the VDI environment through clouding and the application operation associated with the enterprise A, the enterprise B and the enterprise C. In addition, the data generated by each enterprise through respective application needs to be managed in the project of the industrial product online research and development platform, that is, a scheme for product data management is provided to support research and development teams to perform collaborative research and development, and the data mainly includes data of parts, three-dimensional models, two-dimensional engineering drawings and lightweight files.
FIG. 3 is a schematic diagram of an interface used by an enterprise to an application, according to an embodiment of the invention. As shown in fig. 3, a user may enter different enterprises through switching the enterprises, and the user may operate "switching the enterprises" on the interface, switch the interface to the interface of the enterprise to which the user wants to switch, and may display, below the interface, that the enterprise has a right to use at least one application, for example, application 1, application 2, application 3, and the like, without specific limitation, and may also view data generated by running the at least one application in a VDI environment, for example, display data a, data b, data c, and the like at a middle position of the interface, and may also display a creator of the data, a creation time, and the like, without specific limitation. The application 1, the application 2, the application 3, the data a, the data b, the data c and the like cannot be accessed by other enterprises using the client.
It should be noted that the interface and the content in the interface shown in fig. 3 are only an example of the embodiment of the present invention, and do not limit the interface used by the enterprise to the application according to the embodiment of the present invention.
According to the embodiment, the business data (parts, three-dimensional models, two-dimensional engineering drawings and lightweight files) of different enterprises are isolated through the method, and the provided application is also isolated on the basis of the enterprises, so that timing and charging of the enterprises are facilitated.
The embodiment has the particularity of the product online research and development platform, and needs to isolate the application generating the business data besides the business data, for example, to isolate the CAD software, the CAE software and the EDA software generating the business data, so as to ensure at least the safety and the application independence of the business data of each enterprise.
Example 3
The embodiment of the invention provides a data processing device applied to a background server. It should be noted that the data processing apparatus of this embodiment can be used to execute the data processing method shown in embodiment 1 of the present invention.
Fig. 4 is a schematic diagram of a data processing apparatus according to an embodiment of the present invention. As shown in fig. 4, the data processing apparatus 40 may include: a first determining unit 41, a second determining unit 42 and an authorizing unit 43.
A first determining unit 41, configured to determine a target application from at least one application.
A second determining unit 42 for determining the target object from the at least one object.
And an authorization unit 43, configured to authorize the target application to the target object for operation based on the identification information of the target object.
Optionally, the apparatus further comprises: the system comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining target data after authorizing a target application to a target object to operate, the target data is data generated by operating the target application by a front-end client, the front-end client corresponds to the target object, and the target application runs in a virtual desktop environment; a saving unit for saving the target data to a target storage location associated with the target object.
Optionally, the apparatus further comprises: a third determination unit for determining the target storage location based on the identification information.
Optionally, the apparatus further comprises: the second acquisition unit is used for acquiring a path selection instruction sent by the front-end client before the target data is stored to the target storage position, wherein the path selection instruction is used for selecting the target storage position; and the fourth determining unit is used for responding to the path selection instruction and determining the target storage position.
Optionally, the third obtaining unit is configured to obtain an operation instruction sent by the front-end client after authorizing the target application to the target object for operation; the operation unit is used for responding to the operation instruction and operating the target application to obtain an operation result; and the first sending unit is used for sending the operation information to the front-end client, wherein the operation information is used for enabling the front-end client to present an operation result.
Optionally, the apparatus further comprises: and the second sending unit is used for sending the application information of the target application to the front-end client after the target application is authorized to the target object for operation, wherein the application information is displayed by the front-end client and is used for indicating that the target application is successfully authorized to the target object.
The embodiment of the invention provides a data processing device applied to a front-end client. It should be noted that the data processing apparatus of this embodiment can be used to execute the data processing method shown in embodiment 2 of the present invention.
FIG. 5 is a schematic diagram of another data processing apparatus according to an embodiment of the present invention. As shown in fig. 5, the data processing apparatus 50 may include: a transmitting unit 51 and a display unit 52.
The sending unit 51 is configured to send a target request to a backend server, where the target request is used to request the backend server to authorize a target application for a target object, and the target object corresponds to a front-end client.
And a display unit 52, configured to display application information of the target application, where the application information is used to indicate that the background server has successfully authorized the target application to the target object.
Optionally, the apparatus further comprises: and a third sending unit, configured to send a save operation instruction to the background server after displaying application information of the target application, where the save operation instruction is used to enable the background server to save target data to a target storage location associated with the target object, the target data is data generated by operating the target application by the front-end client, and the target application runs in the virtual desktop environment.
Optionally, the apparatus further comprises: and the fourth sending unit is used for sending a path selection instruction to the background server before sending the storage operation instruction to the background server, wherein the path selection instruction is used for enabling the background server to select the target storage position.
Optionally, the apparatus further comprises: the fifth sending unit is used for sending an operation instruction to the background server after displaying the application information of the target application, wherein the operation instruction is used for enabling the background server to operate the target application to obtain an operation result; and the fourth acquisition unit is used for acquiring the operation information and presenting an operation result on the front-end client based on the operation information.
The data processing device of the embodiment can be applied to an online research and development platform, and has own particularity based on the online research and development platform, the embodiment combines the identification information of an enterprise, can isolate the data generated by the application associated with each target object, and can also isolate the application associated with each target object, so that the independence between the applications associated with each object is at least ensured, the data generated by the application associated with each object is isolated, the safety between the data generated by the application associated with each object is at least ensured, the technical problem that the application cannot be isolated between the objects is solved, and the technical effect of isolating the application and the data generated by the application between the objects is achieved.
Example 4
According to an embodiment of the present invention, a computer-readable storage medium is further provided, where the computer-readable storage medium includes a stored program, and when the program runs, the apparatus where the storage medium is located is controlled to execute the data processing method according to the embodiment of the present invention.
Example 5
According to the embodiment of the invention, the processor is used for running the program, wherein the data processing method of the embodiment of the invention is executed when the program runs.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (14)

1. A data processing method is applied to a background server and comprises the following steps:
determining a target application from at least one application;
determining a target object from at least one object;
and authorizing the target application to the target object for operation based on the identification information of the target object.
2. The method of claim 1, wherein after authorizing the target application to the target object for operation, the method further comprises:
acquiring target data, wherein the target data is generated by operating the target application by a front-end client, the front-end client corresponds to the target object, and the target application runs in a virtual desktop environment;
saving the target data to a target storage location associated with the target object.
3. The method of claim 2, further comprising:
determining the target storage location based on the identification information.
4. The method of claim 2, wherein prior to saving the target data to a target storage location, the method further comprises:
acquiring a path selection instruction sent by the front-end client, wherein the path selection instruction is used for selecting the target storage position;
and determining the target storage position in response to the path selection instruction.
5. The method of claim 2, wherein after authorizing the target application to the target object for operation, the method further comprises:
acquiring an operation instruction sent by the front-end client;
responding to the operation instruction, and operating the target application to obtain an operation result;
and sending operation information to the front-end client, wherein the operation information is used for enabling the front-end client to present the operation result.
6. The method of claim 2, wherein after authorizing the target application to the target object for operation, the method further comprises:
and sending the application information of the target application to the front-end client, wherein the application information is displayed by the front-end client and is used for indicating that the target application is successfully authorized to the target object.
7. A data processing method is applied to a front-end client, and comprises the following steps:
sending a target request to a background server, wherein the target request is used for requesting the background server to authorize a target application for a target object, and the target object corresponds to the front-end client;
displaying application information of the target application, wherein the application information is used for indicating that the background server successfully authorizes the target application to the target object.
8. The method of claim 7, wherein after displaying the application information of the target application, the method further comprises:
sending a saving operation instruction to the background server, wherein the saving operation instruction is used for enabling the background server to save target data to a target storage position associated with the target object, the target data is data generated by the front-end client operating the target application, and the target application runs in a virtual desktop environment.
9. The method of claim 8, wherein prior to sending the save operation instruction to the background server, the method further comprises:
and sending a path selection instruction to the background server, wherein the path selection instruction is used for enabling the background server to select the target storage position.
10. The method of claim 8, wherein after displaying the application information of the target application, the method further comprises:
sending an operation instruction to the background server, wherein the operation instruction is used for enabling the background server to operate the target application to obtain an operation result;
and acquiring operation information, and presenting the operation result on the front-end client based on the operation information.
11. A data processing device, applied to a background server, includes:
a first determining unit, configured to determine a target application from at least one application;
a second determination unit configured to determine a target object from the at least one object;
and the authorization unit is used for authorizing the target application to the target object to operate based on the identification information of the target object.
12. A data processing device, applied to a front-end client, includes:
a sending unit, configured to send a target request to a background server, where the target request is used to request the background server to authorize a target application for a target object, and the target object corresponds to the front-end client;
the display unit is used for displaying application information of the target application, wherein the application information is used for indicating that the background server successfully authorizes the target application to the target object.
13. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the storage medium is located to perform the method of any of claims 1-10.
14. A processor, characterized in that the processor is configured to run a program, wherein the program when run by the processor performs the method of any of claims 1 to 10.
CN202110909154.2A 2021-08-09 2021-08-09 Data processing method, device, storage medium and processor Pending CN113792288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110909154.2A CN113792288A (en) 2021-08-09 2021-08-09 Data processing method, device, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110909154.2A CN113792288A (en) 2021-08-09 2021-08-09 Data processing method, device, storage medium and processor

Publications (1)

Publication Number Publication Date
CN113792288A true CN113792288A (en) 2021-12-14

Family

ID=79181560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110909154.2A Pending CN113792288A (en) 2021-08-09 2021-08-09 Data processing method, device, storage medium and processor

Country Status (1)

Country Link
CN (1) CN113792288A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040100502A1 (en) * 2002-11-21 2004-05-27 Bing Ren Automating interactions with software user interfaces
CN106612280A (en) * 2016-12-26 2017-05-03 北京鼎普科技股份有限公司 Virtualization management method and system of terminal equipment
CN106686149A (en) * 2017-03-23 2017-05-17 江苏磐数信息科技有限公司 Terminal-to-terminal enterprise-level dynamic virtual desktop delivery method
CN111428208A (en) * 2020-06-09 2020-07-17 北京信安世纪科技股份有限公司 Application software authorization method, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040100502A1 (en) * 2002-11-21 2004-05-27 Bing Ren Automating interactions with software user interfaces
CN106612280A (en) * 2016-12-26 2017-05-03 北京鼎普科技股份有限公司 Virtualization management method and system of terminal equipment
CN106686149A (en) * 2017-03-23 2017-05-17 江苏磐数信息科技有限公司 Terminal-to-terminal enterprise-level dynamic virtual desktop delivery method
CN111428208A (en) * 2020-06-09 2020-07-17 北京信安世纪科技股份有限公司 Application software authorization method, device and storage medium

Similar Documents

Publication Publication Date Title
US10152577B2 (en) Cross tenant data access
KR101737823B1 (en) Annotations of resources
US20170131691A1 (en) Group control and management among electronic devices
WO2011121275A2 (en) Data input
CN109597640B (en) Account management method, device, equipment and medium for application program
CN104011698A (en) Access to supplemental data based on identifier derived from corresponding primary application data
US10346618B1 (en) Data encryption for virtual workspaces
US11308223B2 (en) Blockchain-based file handling
CN111651770B (en) Cloud computing-based security simulation computing system and storage medium
CN111367945A (en) Report query method, device, equipment and computer readable storage medium
CN106716405A (en) System, method and computer program product for injecting directly into a web browser commands and/or contents created on local desktop applications of a computer device, and vice-versa
CN106909309B (en) Data information processing method and data storage system
Yang et al. A heterogeneous cloud storage platform with uniform data distribution by software-defined storage technologies
JP5606476B2 (en) Client management system, client management method and program
CN104685488A (en) System and method for creating virtual disk images for use with remote computer
CN112764943B (en) Information processing method, system, electronic device, and computer-readable storage medium
CN103186738A (en) Software license management and control method and system for software resources, creating device and starting device
CN113792288A (en) Data processing method, device, storage medium and processor
US11853727B2 (en) Group control and management among electronic devices
CN114095200B (en) Resource access authority management method and device, electronic equipment and medium
CN115964726A (en) Robot process automation data processing method, device, equipment and storage medium
CN109002663B (en) Simulation method and simulation platform
US9485221B2 (en) Selective content cloud storage with device synchronization
CN108345491A (en) A kind of cross-platform virtual machine forced access control method in cloud computing environment
EP3454207B1 (en) Dynamic preview generation in a product lifecycle management environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211214