CN114168994A - Data processing method and system - Google Patents
Data processing method and system Download PDFInfo
- Publication number
- CN114168994A CN114168994A CN202111288169.8A CN202111288169A CN114168994A CN 114168994 A CN114168994 A CN 114168994A CN 202111288169 A CN202111288169 A CN 202111288169A CN 114168994 A CN114168994 A CN 114168994A
- Authority
- CN
- China
- Prior art keywords
- file
- authority
- server
- request
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 151
- 238000000034 method Methods 0.000 claims abstract description 18
- 230000004913 activation Effects 0.000 claims description 27
- 230000003213 activating effect Effects 0.000 claims description 12
- 238000012508 change request Methods 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 6
- 230000008859 change Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 11
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The disclosure provides a data processing method and a data processing system, relates to the technical field of electronic information, and can solve the problem that a cloud server is low in security when sharing files to terminal equipment. The specific technical scheme is as follows: when a user needs to process data in the shared file system, the user logs in a server through terminal equipment, sends a data processing request to the server, the server performs authentication processing according to identification information of the user, and activates processing permission of the terminal equipment after confirming that the user has permission to process the data. The present disclosure provides for processing of shared data.
Description
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a data processing method and system.
Background
With the rapid development of science and technology, data sharing is also rapidly developed, at present, most file sharing systems implement sharing by using a file sharing technology of an operating system, or by using protocols such as FTP, NFS and the like, but these technologies have security problems, for example, information such as access users, access times, access time periods and the like of files cannot be controlled, and the security of data operation is reduced by using the sharing technology.
Disclosure of Invention
The embodiment of the disclosure provides a data processing method and system, which can solve the problem of low security when data of a cloud server is shared. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, a data processing method is provided, in which a terminal device configures a client in a file sharing system, and the file sharing system is configured to process data in a shared folder according to a user right; the method comprises the following steps:
acquiring a data processing request, wherein the data processing request is used for requesting processing data in the shared file system, the processing data at least comprises at least one of a processing folder and a processing file, and the data processing request comprises identification information of the target user;
sending the data processing request to a server;
and after the authority authentication of the server is passed, acquiring an activation instruction sent by the server, wherein the activation instruction is used for indicating the processing authority of the activation terminal device in the shared file system.
According to a second aspect of embodiments of the present disclosure, there is provided a data processing system comprising:
the terminal equipment is configured with a client in a file sharing system, the server is configured with a server in the file sharing system, and the file sharing system is used for processing data in a shared folder according to user authority;
the terminal device is used for acquiring a data processing request, the data processing request is used for requesting processing data in the shared file system, the processing data at least comprises at least one of a processing folder and a processing file, and the data processing request comprises identification information of a target user when logging in a server;
sending the data processing request to a server;
after the authority authentication of the server is passed, acquiring an activation instruction sent by the server, wherein the activation instruction is used for indicating the processing authority of the activation terminal equipment in the shared file system;
the server is used for acquiring the data processing request;
acquiring authority information of a target user according to the data processing request, and authenticating the authority information;
and after the authentication is successful, generating an activation instruction according to the data processing request and sending the activation instruction.
In one embodiment, a server in the system includes an authentication module, the server to:
acquiring login information of terminal equipment, wherein the login information comprises identification information of a user when the terminal equipment logs in the server;
setting authority information of the target user through an authentication module and a preset rule, wherein the authority information is used for indicating data in the file sharing system to be processed, and the authority information at least comprises at least one of processing time, processing times, processing paths and operation instructions;
and generating a target mapping according to the identification information and the authority information of the terminal equipment, and storing the target mapping in a database.
In one embodiment, a server in the system includes a file module, the server to:
after the processing authority of the terminal equipment is activated, receiving a data processing instruction sent by the terminal equipment, wherein the data processing instruction is used for processing data in the shared folder;
the data is processed within the file module in response to the data processing instruction.
In one embodiment, a server in the system includes a database, the server configured to:
acquiring a folder creation request sent by terminal equipment, wherein the folder creation request is used for indicating that a target folder is created in a shared file system, and the file creation request at least comprises identification information, configuration information, a storage path and authority information of the folder;
searching the authority information corresponding to the storage path in a database according to the folder creating request;
and when the authority information of the storage path is matched with the authority information of the target user, activating a first authority, wherein the first authority is used for indicating that a target folder is created in the storage path.
In one embodiment, a server in the system includes a file module, the server to:
acquiring a file creating request sent by terminal equipment, wherein the file creating request is used for indicating that a target file is created in a shared file system, and the file creating request at least comprises identification information, configuration information, a storage path and authority information of the file;
according to the file creating request, finding the authority information corresponding to the storage path in a database;
and when the authority information of the storage path is matched with the authority information of the target user, activating a second authority according to the file creation request, wherein the second authority is used for indicating the creation of the target file in the storage path.
In one embodiment, the server in the system is configured to:
acquiring a file reading request sent by terminal equipment, wherein the file reading request is used for indicating that a target file is read in a shared file system, and the file reading request at least comprises the reading time and the reading times of the file and an operation instruction;
according to the file creating request, finding authority information corresponding to the target file in a database, wherein the authority information comprises reading time, reading times and an operation instruction;
and when the authority information of the storage path is matched with the authority information of the target user, activating a third authority according to the file reading request, wherein the third authority is used for indicating that the target file is processed in the shared folder according to the authority information.
In one embodiment, the server in the system is configured to:
acquiring a file change request sent by terminal equipment, wherein the file change request is used for indicating that a preset file is processed in a shared file processing system according to a target file, and the file reading request at least comprises identification information of the preset file;
according to the file creating request, finding authority information corresponding to the preset file in a database, wherein the authority information comprises whether the change processing is allowed or not;
and when the authority information of the target file is matched with the authority information of the target user, activating a fourth authority according to the data processing request, wherein the fourth authority is used for indicating that the preset file in the shared file system is changed according to the target file.
In one embodiment, the terminal device in the system is further configured to:
after logging in the server successfully, acquiring a data list matched with the authority of the terminal equipment, wherein the data list is a list generated according to data read by the terminal equipment in the file sharing system;
according to the data list, acquiring a data processing instruction, wherein the data processing instruction indicates that data in the data list are processed according to the data processing instruction;
and generating the data request information according to the data processing instruction.
In one embodiment, the terminal device in the system is further configured to:
when the activation instruction is acquired through the authority authentication of the server, the data processing instruction is executed;
and when the authority authentication of the server is not passed, acquiring prompt information sent by the server and displaying the prompt information, wherein the prompt information is used for indicating that the operation authority of the terminal equipment is not matched with the request.
In the data processing system provided by the embodiment of the disclosure, a sharing system server is deployed on a server, and a user installs a sharing system client on a terminal; when a user requests to process a file in a sharing system, a server side firstly inquires the authority according to user information and file information, if the user has corresponding authority, the server side establishes connection with a client side and transmits the file to the client side through a transmission protocol, and the user can process the file; if the user does not have the right, the user request will be denied.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of a data processing method provided by an embodiment of the present disclosure;
FIG. 2 is a block diagram of a data processing system provided by an embodiment of the present disclosure;
fig. 2a is a block diagram of a server in a data processing system according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Example one
An embodiment of the present disclosure provides a data processing method, as shown in fig. 1, the data processing method includes the following steps:
101. and acquiring a data processing request.
The data processing request is used for requesting processing data in the shared file system, the processing data at least comprises at least one of a processing folder and a processing file, and the data processing request comprises identification information of the target user;
the method for acquiring the data processing request by the device provided by the present disclosure may include:
after logging in the server successfully, acquiring a data list matched with the authority of the terminal equipment, wherein the data list is a list generated according to data read by the terminal equipment in the file sharing system;
according to the data list, acquiring a data processing instruction, wherein the data processing instruction indicates that data in the data list are processed according to the data processing instruction;
and generating the data request information according to the data processing instruction.
Specifically, for example, the terminal device sends the user information to the server, searches whether the user login information is correct in the database, and if not, refuses to log in; and if the file and folder information is correct, sending the file and folder information which can be accessed by the user to the client, and displaying the file and folder information in a graphical form after the client receives the file and folder information.
102. And sending the data processing request to a server.
The server can determine the authority information of the target user according to the identification information of the login target user.
The server will process the request for data and determine the rights needed to process the data.
And performing authority authentication according to the authority of the target user and the authority required for processing the data, and determining whether the terminal equipment has the authority to process the data.
103. And after the authority of the server is authenticated, acquiring an activation instruction sent by the server.
The activation instruction is used for indicating the processing authority of the activation terminal device in the shared file system.
In the method provided by the disclosure, when the activation instruction is acquired through the authority authentication of the server, the data processing instruction is executed;
and when the authority authentication of the server is not passed, acquiring prompt information sent by the server and displaying the prompt information, wherein the prompt information is used for indicating that the operation authority of the terminal equipment is not matched with the request.
In the method provided by the disclosure, when the terminal device sends a processing request to the server, the server authenticates whether the user logged in by the terminal device has the authority to execute the operation after receiving the request, if the user has the authority, the corresponding operation is performed according to the message, otherwise, the request is rejected.
Several examples are listed here for illustration:
example one: when the data processing request is a request of a new folder, the server performs the following authentication processing:
a user sends new folder request information to a server of a server through a client of a terminal device, wherein the information comprises a new path, a folder name, authority and the like;
after receiving the information, the server searches whether the current user has the authority of establishing the file under the path, if so, the file folder is established according to the information, and if not, the file folder is refused to be established.
Example two: when the data processing request is a request of a new file, the server performs the following authentication processing:
a user sends new file request information to a server of a server through a client of a terminal device, wherein the information comprises a new path, a file identifier, processing authority and the like; the specific processing authority comprises the authority when the file is newly built and is subsequently processed, if so, whether the file is authorized to be copied or not;
after receiving the information, the server side searches whether the current user has the authority of establishing the file under the path;
if yes, the file is built according to the information, and if not, the file is refused to be built.
Example three: when the data processing request is a request for viewing a file, the server performs the following authentication processing:
when a user selects to open a file, a message for opening the file is sent to a server of a server through a client of terminal equipment, and the message comprises checking time, checking times or processing operation (such as copying or cutting and pasting) during checking;
the server checks whether the current user has the authority to check the file, including checking times and checking time period whether the permission detection is passed;
and establishing a transmission connection, transmitting the file to the client, and opening the file by using the application corresponding to the local operating system. Otherwise the request is denied.
Example four: when the data processing request is a request for modifying the file, the server performs the following authentication processing:
and modifying the file: after editing the file locally, the user drags the file into the corresponding folder, and then sends the file modification information to the server of the server through the client of the terminal equipment;
the server authenticates whether the current user has the authority to modify the file;
if yes, establishing connection transmission connection, transmitting the file to the server, and storing the file to a designated position (replacing the original file) by the server to finish editing. Otherwise the request is denied.
According to the data processing method provided by the embodiment of the disclosure, when a user needs to process data in a shared file system, the user logs in a server through a terminal device and sends a data processing request to the server, the server performs authentication processing according to identification information of the user, after the user is confirmed to have the authority of processing the data, the processing authority of the terminal device is activated, and through the authentication processing of the server, the security of a cloud server in sharing the file to the terminal device can be improved.
Example two
Based on the data processing method described in the embodiment corresponding to fig. 1, the following is an embodiment of the apparatus of the present disclosure, which can be used to execute an embodiment of the method of the present disclosure.
An embodiment of the present disclosure provides a data processing system, as shown in fig. 2, the data processing system 20 includes: the system comprises a terminal device 201 and a server 202, wherein the terminal device 201 configures a client in a file sharing system, the server 202 configures a server in the file sharing system, and the file sharing system is used for processing data in a shared folder according to user authority;
the terminal device 201 is configured to obtain a data processing request, where the data processing request is used to request processing data in the shared file system, the processing data at least includes at least one of a processing folder and a processing file, and the data processing request includes identification information of the target user;
after logging in the server 202 successfully, the data processing request is sent to the server 202;
after the authority authentication of the server 202 is passed, acquiring an activation instruction sent by the server 202, where the activation instruction is used to instruct to activate the processing authority of the terminal device 201 in the shared file system;
the server 202, configured to obtain the data processing request;
acquiring authority information of a target user according to the data processing request, and authenticating the authority information;
and after the authentication is successful, generating an activation instruction according to the data processing request and sending the activation instruction.
As shown in fig. 2a, the server 202 in the system includes an authentication module 2021, a transmission module 2022, a database 2023, and a file module 2024;
the authentication module 2021 is configured to set a user right of the terminal device;
the transmission module 2022 is configured to transmit the request of the terminal device to the database;
the database 2023 is used for storing the user's authority and the authority of sharing folders, for example, the system writes the user, user group, authority, file, etc. information into the database.
The file module 2024 is used to store data within the shared folder.
Specifically, the administrator can manage all files of the entire system by logging in to the server.
The administrator has the highest authority, can create folders and files, can create users and user groups, and can set the authority of the users and the user groups.
Wherein, the authority includes: reading, writing, new creation (permission of creating a file), deletion, renaming, viewing times, viewing time period, reading, writing and creating (permission of creating a folder)), deletion and renaming of the file.
In one embodiment, the server 202 in the system 20 includes an authentication module, the server 202 configured to:
acquiring login information of the terminal device 201, wherein the login information comprises identification information of a user when the terminal device 201 logs in the server 202;
setting authority information of the target user through an authentication module and a preset rule, wherein the authority information is used for indicating data in the file sharing system to be processed, and the authority information at least comprises at least one of processing time, processing times, processing paths and operation instructions;
and generating a target mapping according to the identification information and the authority information of the terminal device 201, and storing the target mapping in a database.
In one embodiment, the system 20 includes a server 202 comprising a file module, the server 202 configured to:
after the processing authority of the terminal device 201 is activated, receiving a data processing instruction sent by the terminal device 201, wherein the data processing instruction is used for processing data in the shared folder;
the data is processed within the file module in response to the data processing instruction.
In one embodiment, the system 20 includes a database in the server 202, and the server 202 is configured to:
acquiring a folder creation request sent by the terminal device 201, where the folder creation request is used to instruct to create a target folder in a shared file system, and the file creation request at least includes identification information, configuration information, a storage path, and permission information of the folder;
searching the authority information corresponding to the storage path in a database according to the folder creating request;
and when the authority information of the storage path is matched with the authority information of the target user, activating a first authority, wherein the first authority is used for indicating that a target folder is created in the storage path.
In one embodiment, the server 202 in the system 20 includes a file module, the server 202 configured to:
acquiring a file creation request sent by a terminal device 201, wherein the file creation request is used for indicating that a target file is created in a shared file system, and the file creation request at least comprises identification information, configuration information, a storage path and authority information of the file;
according to the file creating request, finding the authority information corresponding to the storage path in a database;
and when the authority information of the storage path is matched with the authority information of the target user, activating a second authority according to the file creation request, wherein the second authority is used for indicating the creation of the target file in the storage path.
In one embodiment, the server 202 in the system 20 includes a file module, the server 202 configured to:
acquiring a file reading request sent by the terminal device 201, wherein the file reading request is used for indicating that a target file is read in a shared file system, and the file reading request at least comprises the reading time and the reading times of the file and an operation instruction;
according to the file creating request, finding authority information corresponding to the target file in a database, wherein the authority information comprises reading time, reading times and an operation instruction;
and when the authority information of the storage path is matched with the authority information of the target user, activating a third authority according to the file reading request, wherein the third authority is used for indicating that the target file is processed in the shared folder according to the authority information.
In one embodiment, the server 202 in the system 20 is further configured to:
acquiring a file change request sent by the terminal device 201, wherein the file change request is used for indicating that a preset file is processed in a shared file system according to a target file, and the file read request at least comprises identification information of the preset file;
according to the file creating request, finding authority information corresponding to the preset file in a database, wherein the authority information comprises whether the change processing is allowed or not;
and when the authority information of the target file is matched with the authority information of the target user, activating a fourth authority according to the data processing request, wherein the fourth authority is used for indicating that the preset file in the shared file system is changed according to the target file.
In one embodiment, the terminal device 201 in the system 20 is further configured to:
after logging in the server 202 successfully, acquiring a data list matched with the authority of the terminal device 201, wherein the data list is a list generated according to data which is read by the terminal device 201 in the file sharing system and has the authority;
according to the data list, acquiring a data processing instruction, wherein the data processing instruction indicates that data in the data list are processed according to the data processing instruction;
and generating the data request information according to the data processing instruction.
In one embodiment, the terminal device 201 in the system 20 is further configured to:
when the activation instruction is acquired through the authority authentication of the server 202, the data processing instruction is executed;
when the authority authentication of the server 202 is not passed, the prompt information sent by the server 202 is acquired and displayed, and the prompt information is used for indicating that the operation authority of the terminal device 201 does not match the request.
In the data processing system provided by the embodiment of the disclosure, a sharing system server is deployed on a server, and a user installs a sharing system client on a terminal; when a user requests to process a file in a sharing system, a server side firstly inquires the authority according to user information and file information, if the user has corresponding authority, the server side establishes connection with a client side and transmits the file to the client side through a transmission protocol, and the user can process the file; if the user does not have the right, the user request will be denied.
Based on the data processing method described in the embodiment corresponding to fig. 1, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the data processing method described in the embodiment corresponding to fig. 1, which is not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (10)
1. A data processing system, comprising: the terminal equipment is used for configuring a client in a file sharing system, and the server is used for configuring a server in the file sharing system, wherein the file sharing system is used for processing data in a shared folder according to user authority;
the terminal device is used for acquiring a data processing request, the data processing request is used for requesting processing data in the shared file system, the processing data at least comprises at least one of a processing folder and a processing file, and the data processing request comprises identification information of a target user when logging in a server;
sending the data processing request to a server;
after the authority authentication of the server is passed, acquiring an activation instruction sent by the server, wherein the activation instruction is used for indicating the processing authority of the activation terminal equipment in the shared file system;
the server is used for acquiring the data processing request;
acquiring authority information of a target user according to the data processing request, and authenticating the authority information;
and after the authentication is successful, generating an activation instruction according to the data processing request and sending the activation instruction.
2. The system of claim 1, wherein the server comprises an authentication module, the server configured to:
obtaining login information of terminal equipment, wherein the login information comprises identification information of a user when the terminal equipment logs in the server;
setting authority information of the target user through an authentication module and a preset rule, wherein the authority information is used for indicating data in a file sharing system to be processed, and the authority information at least comprises at least one of processing time, processing times, processing paths and operation instructions;
and generating a target mapping according to the identification information and the authority information of the terminal equipment, and storing the target mapping in a database.
3. The system of claim 1, wherein the server comprises a file module, the server configured to:
after the processing authority of the terminal equipment is activated, receiving a data processing instruction sent by the terminal equipment, wherein the data processing instruction is used for processing data in the shared folder;
and responding to the data processing instruction, and processing the data in the file module.
4. The system of claim 1, wherein the server comprises a database, the server configured to:
acquiring a folder creation request sent by terminal equipment, wherein the folder creation request is used for indicating the creation of a target folder in a shared file system, and the file creation request at least comprises identification information, configuration information, a storage path and authority information of the folder;
according to the folder creating request, finding authority information corresponding to the storage path in a database;
and when the authority information of the storage path is matched with the authority information of the target user, activating a first authority, wherein the first authority is used for indicating that a target folder is created in the storage path.
5. The system of claim 1, wherein the server comprises a database, the server configured to:
acquiring a file creating request sent by terminal equipment, wherein the file creating request is used for indicating that a target file is created in a shared file system, and the file creating request at least comprises identification information, configuration information, a storage path and authority information of the file;
according to the file creating request, finding the authority information corresponding to the storage path in a database;
and when the authority information of the storage path is matched with the authority information of the target user, activating a second authority according to the file creation request, wherein the second authority is used for indicating the creation of the target file in the storage path.
6. The system of claim 1, wherein the server comprises a database, the server configured to:
acquiring a file reading request sent by terminal equipment, wherein the file reading request is used for indicating that a target file is read in a shared file system, and the file reading request at least comprises the reading time and the reading times of the file and an operation instruction;
according to the file creating request, finding authority information corresponding to the target file in a database, wherein the authority information comprises reading time, reading times and an operation instruction;
and when the authority information of the storage path is matched with the authority information of the target user, activating a third authority according to the file reading request, wherein the third authority is used for indicating that the target file is processed in the shared folder according to the authority information.
7. The system of claim 1, wherein the server comprises a database, the server configured to:
acquiring a file change request sent by terminal equipment, wherein the file change request is used for indicating that a preset file is processed in a shared file system according to a target file, and the file reading request at least comprises identification information of the preset file;
according to the file creating request, finding authority information corresponding to the preset file in a database, wherein the authority information comprises whether the change processing is allowed or not;
and when the authority information of the target file is matched with the authority information of the target user, activating a fourth authority according to the data processing request, wherein the fourth authority is used for indicating that a preset file in the shared file system is changed according to the target file.
8. The system of claim 2, wherein the terminal device is further configured to:
after logging in the server successfully, acquiring a data list matched with the authority of the terminal equipment, wherein the data list is a list generated according to data read by the terminal equipment in the file sharing system;
according to the data list, acquiring a data processing instruction, wherein the data processing instruction indicates that data in the data list are processed according to the data processing instruction;
and generating the data request information according to the data processing instruction.
9. The system of claim 8, wherein the terminal device is further configured to:
when the activation instruction is acquired through the authority authentication of the server, executing the data processing instruction;
and when the authority authentication of the server is not passed, acquiring prompt information sent by the server and displaying the prompt information, wherein the prompt information is used for indicating that the operation authority of the terminal equipment is not matched with the request.
10. A data processing method is characterized in that the method is applied to terminal equipment, the terminal equipment configures a client in a file sharing system, and the file sharing system is used for processing data in a shared folder according to user authority;
acquiring a data processing request, wherein the data processing request is used for requesting processing data in a shared file system, the processing data at least comprises at least one of a processing folder and a processing file, and the data processing request comprises identification information of the target user;
sending the data processing request to a server;
and after the authority authentication of the server is passed, acquiring an activation instruction sent by the server, wherein the activation instruction is used for indicating the processing authority of the activation terminal equipment in the shared file system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111288169.8A CN114168994A (en) | 2021-11-02 | 2021-11-02 | Data processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111288169.8A CN114168994A (en) | 2021-11-02 | 2021-11-02 | Data processing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114168994A true CN114168994A (en) | 2022-03-11 |
Family
ID=80477741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111288169.8A Pending CN114168994A (en) | 2021-11-02 | 2021-11-02 | Data processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114168994A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827129A (en) * | 2022-04-27 | 2022-07-29 | 济南浪潮数据技术有限公司 | File distribution method, device and medium |
-
2021
- 2021-11-02 CN CN202111288169.8A patent/CN114168994A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827129A (en) * | 2022-04-27 | 2022-07-29 | 济南浪潮数据技术有限公司 | File distribution method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11036773B2 (en) | System and method for detecting and integrating with native applications enabled for web-based storage | |
CN109471865B (en) | Offline data management method, system, server and storage medium | |
JP4598386B2 (en) | Method, computer system, and network system for sharing network resources | |
DE60218124T2 (en) | Apparatus and method for restricting access to and storage of content | |
JP4838610B2 (en) | Document management apparatus, document management method, and program | |
US8621036B1 (en) | Secure file access using a file access server | |
CN107103245B (en) | File authority management method and device | |
JP6675163B2 (en) | Authority transfer system, control method of authorization server, authorization server and program | |
US8650405B1 (en) | Authentication using dynamic, client information based PIN | |
US8347086B2 (en) | System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium | |
CN110069909B (en) | Method and device for login of third-party system without secret | |
CN112714139A (en) | File sharing system, method, electronic device and storage medium | |
CN109788005A (en) | Equipment control authority sharing method, device, system and computer storage medium | |
CN107566329A (en) | A kind of access control method and device | |
CN111241523B (en) | Authentication processing method, device, equipment and storage medium | |
CN114168994A (en) | Data processing method and system | |
CN114417303A (en) | Login authentication management method, device, processor and machine-readable storage medium | |
US20030226039A1 (en) | Image forming apparatus and control method for same | |
CN107766743B (en) | Method and device for setting file access authority, terminal equipment and storage medium | |
CN110807210B (en) | Information processing method, platform, system and computer storage medium | |
CN107707550B (en) | Method, device and system for accessing virtual machine | |
JP7200776B2 (en) | Information processing system and program | |
KR101824956B1 (en) | Location-based User Authentication Method and System using the Beacon | |
KR20080092516A (en) | Client and server system and method for setting up and certifying rights of storage medium in client and server system | |
CN117459320B (en) | Data access control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |