CN115421656A - Data access management method, device, terminal and medium in storage server - Google Patents

Data access management method, device, terminal and medium in storage server Download PDF

Info

Publication number
CN115421656A
CN115421656A CN202211046845.5A CN202211046845A CN115421656A CN 115421656 A CN115421656 A CN 115421656A CN 202211046845 A CN202211046845 A CN 202211046845A CN 115421656 A CN115421656 A CN 115421656A
Authority
CN
China
Prior art keywords
data
storage
stored
verification
storage server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211046845.5A
Other languages
Chinese (zh)
Inventor
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202211046845.5A priority Critical patent/CN115421656A/en
Publication of CN115421656A publication Critical patent/CN115421656A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/065Replication mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0653Monitoring storage devices or systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the field of data access management, and particularly discloses a method, a device, a terminal and a medium for data access management in a storage server, wherein before the storage data is transmitted, the storage data is verified, and after the verification is passed, data transmission is performed; receiving storage data and classifying the storage data; storing the classified storage data in a storage unit of a storage server and backing up the storage data; retrieving and calling target storage data to be read according to the retrieval conditions; when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed; when the stored data is deleted, the stored data needing to be deleted is verified, and the stored data is allowed to be deleted after the verification is passed. The invention solves the problems that the existing storage server does not verify, separate and back up the data, the data security is not ensured, and the real-time monitoring on the data processing cannot be carried out.

Description

Data access management method, device, terminal and medium in storage server
Technical Field
The invention relates to the field of data access management, in particular to a method, a device, a terminal and a medium for managing data access in a storage server.
Background
In the operation process of the existing storage server, the full load/overload condition of hardware resources, the safety problem and the backup problem of data exist, so that the data directly enters the storage server without being verified before entering the storage server; and in the data storage process, the data is not scanned, classified and backed up, so that data disorder is easily caused, the data cannot be effectively separated, the internal jam of the storage server is easily caused, and when the storage server has problems, the data is lost and cannot be retrieved.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method, an apparatus, a terminal and a medium for managing data access in a storage server, which verify, classify and mark stored data, so as to achieve traceable and real-time monitoring, and solve the problems that the existing storage server does not verify, separate and backup the stored data, the security of the stored data cannot be guaranteed, and the processing of the stored data cannot be monitored in real time.
In a first aspect, a technical solution of the present invention provides a method for managing data access in a storage server, including the following steps:
s1, verifying the stored data before transmitting the stored data, and transmitting the data after the verification is passed;
s2, receiving the storage data and classifying the storage data;
s3, storing the classified storage data into a storage unit of a storage server and backing up the storage data;
s4, retrieving and calling target storage data needing to be read according to the retrieval conditions;
s5, when downloading the stored data, verifying the stored data to be downloaded, and allowing the stored data to be downloaded after the verification is passed;
and S6, when the stored data is deleted, verifying the stored data needing to be deleted, and allowing deletion after verification is passed.
Further, in step S1, the stored data is verified by any one of digital password verification, fingerprint recognition verification, and face recognition verification.
Further, the classification types of the stored data in step S2 include an audio type, a picture type and a text type;
meanwhile, after the stored data are classified, each stored data is marked with an identification mark, and the identification mark comprises any one of a digital sequence code, a bar code and a two-dimensional code.
Furthermore, a scanning unit is configured in the storage unit;
correspondingly, after the storage data are stored in the storage unit in the step S3, the scanning unit scans and backs up the storage data in the storage unit, and uploads the backed-up data to the cloud.
Further, step S4 specifically includes:
inputting keywords through a search box to search and calling target storage data to be read;
or, retrieving and calling target storage data to be read through the identification mark of the storage data;
and the storage unit is retrieved independently, or the storage unit and the cloud are retrieved simultaneously.
Further, in step S5, when downloading the storage data, the number of times of downloading the storage data and the downloading time are recorded.
Further, step S6 specifically includes:
verifying the stored data needing to be deleted, and allowing deletion after verification is passed;
archiving the deletion time, and uploading the time to the cloud;
and deleting the target storage data in the storage unit independently or deleting the target storage data in the storage unit and the cloud terminal simultaneously.
In a second aspect, an embodiment of the present invention provides an apparatus for managing data access in a storage server, including:
an information verification module: before the storage data is transmitted, the storage data is verified, and data transmission is carried out after the verification is passed;
a data classification module: receiving storage data and classifying the storage data;
a data storage module: storing the classified storage data in a storage unit of a storage server;
a data retrieval module: retrieving and calling target storage data to be read according to the retrieval conditions;
a data downloading module: when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed;
a data deleting module: when the stored data is deleted, the stored data needing to be deleted is verified, and the stored data is allowed to be deleted after the verification is passed.
In a third aspect, a technical solution of the present invention provides a terminal, including:
the memory is used for storing the data access management program in the storage server;
a processor, configured to implement the steps of the method for managing data access in a storage server according to any one of the above descriptions when executing the data access management program in the storage server.
In a fourth aspect, an aspect of the present invention provides a computer-readable storage medium, where a storage server internal data access management program is stored, and when executed by a processor, the storage server internal data access management program implements the steps of the storage server internal data access management method according to any one of the above-mentioned steps.
Compared with the prior art, the data access management method, the data access management device, the data access management terminal and the data access management medium in the storage server have the following beneficial effects that: the method has the advantages that stored data are verified and classified, safety of the storage server is improved, the data are conveniently stored, blocking caused by different data types is reduced, safety of the storage server can be effectively enhanced through data backup, preferably, target data are recorded and uploaded in the processes of calling, retrieving and downloading the data, tracking and real-time monitoring are achieved, and the problems that data cannot be verified, separated and backed up, data safety cannot be guaranteed and real-time monitoring cannot be conducted on data processing of an existing storage server are solved.
Drawings
For a clearer explanation of the embodiments or technical solutions of the prior art of the present application, the drawings needed for the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for managing data access in a storage server according to an embodiment of the present invention.
Fig. 2 is a schematic block diagram of a data access management apparatus in a storage server according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flowchart of a method for managing data access in a storage server according to an embodiment of the present invention, where as shown in fig. 1, the method includes the following steps.
S1, verifying the stored data before transmitting the stored data, and transmitting the data after the verification is passed.
Before actually transmitting the storage data to the storage server, the verification function of the storage server is triggered, the storage data needing to be transmitted to the storage server is verified, and data transmission is carried out after the verification is passed, so that the safety of the storage data is ensured.
It will be appreciated that if the verification fails, transmission to the storage server is denied, and an exception alert may be issued notifying the worker to proceed.
And S2, receiving the storage data and classifying the storage data.
After the storage data are received, the storage data are classified before being stored, storage is carried out subsequently by taking the type as a unit, effective isolation of the storage data is carried out, and data disorder is avoided, so that the internal jam of the storage server is caused.
And S3, storing the classified storage data in a storage unit of a storage server and backing up the storage data.
The storage data are classified well, stored in the storage unit according to the type, and backed up, so that the safety of the storage data is effectively enhanced.
And S4, retrieving and calling target storage data needing to be read according to the retrieval conditions.
When the stored data needs to be called, the stored data can be searched and called according to the searching conditions, and the calling efficiency is improved.
And S5, when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed.
And S6, when the stored data is deleted, verifying the stored data needing to be deleted, and allowing the stored data to be deleted after the verification is passed.
When the stored data is downloaded and deleted, the target stored data (the stored data needing to be downloaded or deleted) is verified at first, and the running data which passes the verification is downloaded or deleted, so that the data security is improved. It will be appreciated that if the verification fails, an exception alarm is raised.
The data access management method in the storage server provided by the embodiment of the invention verifies and classifies the stored data, improves the safety of the storage server, is convenient for storing the data, reduces the blocking caused by different data types, can effectively enhance the safety of the storage server through data backup, and solves the problems that the existing storage server does not verify, separate and backup the data, cannot ensure the data safety, and cannot monitor the data processing in real time.
In addition to the above-described embodiments, as a preferred embodiment, the stored data is verified in step S1 by any one of digital password verification, fingerprint identification verification, and face identification verification.
Before the storage data is transmitted, the storage data is verified by using any one of digital password verification, fingerprint identification verification and face identification verification, and the safety of the storage data is guaranteed.
It will be appreciated that the user may also select other authentication methods as desired.
In addition to the above, as a preferred embodiment, the classification categories of the stored data in step S2 include an audio category, a picture category, and a text category.
After receiving the storage data, the storage data are classified according to the storage data types and can be divided into audio types, picture types and character types. Of course, it is understood that the user may select other classification methods as desired.
After the stored data are classified, each stored data is subjected to an identification mark, and the identification mark comprises any one of a digital serial code, a bar code and a two-dimensional code. The stored data is marked, so that the stored data can be conveniently searched subsequently, and the retrieval efficiency is improved. Of course, it is understood that other means of identifying indicia may be selected by the user as desired.
On the basis of the above embodiment, as a preferred implementation manner, the storage unit is further configured with a scanning unit, and after the storage data is stored in the storage unit, the scanning unit scans and backs up the storage data in the storage unit, and uploads the backed-up data to the cloud.
And the storage data is backed up to the cloud end, so that the storage pressure of the storage unit is reduced.
In addition to the above embodiment, as a preferred implementation, the step S4 specifically includes: and inputting keywords through the retrieval box to retrieve and call target storage data to be read, or retrieving and calling the target storage data to be read through identification marks of the storage data.
When a user needs to call the stored data, the retrieval key words can be input in the retrieval frame, and the system finds the target stored data according to the key words, so that calling is performed. Certainly, after the stored data are classified, the stored data are also subjected to identification marking, so that a user can search through the identification marking as required, and the identification marking comprises a digital sequence code, a bar code, a two-dimensional code and the like.
The user can retrieve and call the storage data in the storage unit independently, and can retrieve and call from the cloud simultaneously.
In addition to the above embodiment, as a preferred embodiment, when downloading the storage data in step S5, the download times and download time of the storage data are recorded.
The behavior of the stored data is recorded, real-time monitoring and trace following of the stored data are realized, and management of the stored data is facilitated.
In addition to the above embodiment, as a preferred implementation, the step S6 specifically includes: and verifying the stored data needing to be deleted, allowing deletion after verification is passed, archiving the deletion time, and uploading the deletion time to the cloud.
Similar to the downloading of the stored data, when the stored data is deleted, the security needs to be verified firstly, the allowed deletion is verified, the deletion time is filed and uploaded to the cloud, the real-time monitoring and the tracing of the stored data are realized, and the management of the stored data is convenient.
To further understand the present invention, a specific embodiment is provided below based on the above preferred embodiment, and the specific embodiment mainly includes the following steps.
1) And (3) information verification: before the stored data is transmitted, verification is needed, and after the stored data passes the verification, the stored data starts to be transmitted; the verification mode is divided into one of digital password verification, fingerprint identification verification and face identification verification.
2) Data classification: after data are received, pre-searching the data, and classifying the types of the stored data into audio, picture and character types; and labeling the classified data, wherein the label can be a digital serial code, a bar code or a two-dimensional code.
3) And (3) data storage: storing the data into a storage unit in a memory, wherein the storage unit is also electrically connected with a scanning unit for data backup; the data stored are scanned through the scanning unit and are backed up, the data are uploaded to the cloud, the storage unit is in signal connection with the mobile local area network, the backup data are uploaded to the cloud through the mobile local area network, and storage pressure of the storage unit is reduced.
4) Data retrieval: the keywords are searched through the search box, and the target storage data can be called through the digital serial code, the bar code and the two-dimensional code; and in the calling process, the cloud can be searched.
5) Data downloading: when the data needs to be downloaded, secondary password verification is needed, and after the verification is correct, downloading and calling can be performed; and in the downloading process, the downloading times and time are recorded.
6) And (3) deleting data: deleting the selected data, carrying out three times of password verification, archiving the time of deleting the data, and uploading the time to the cloud; and when deleting, the client is entitled to apply for deleting the data information backed up in the cloud.
When in actual use, the storage server needs to access a large amount of data, a large amount of heat is easily generated, and the performance of the storage server is affected, so that the storage server is subjected to auxiliary heat dissipation: a water-cooling radiator is arranged in the storage, and is used for quickly radiating heat of the storage server and matching with a temperature sensor; and a cooling fin can be added into the storage server to be matched with water cooling equipment for use.
The foregoing describes in detail an embodiment of a method for managing data access in a storage server, and based on the method for managing data access in a storage server described in the foregoing embodiment, an embodiment of the present invention further provides an apparatus for managing data access in a storage server corresponding to the method.
Fig. 2 is a schematic block diagram of a structure of a data access management device in a storage server according to an embodiment of the present invention, in order to implement access management of data in the storage server, a control component is configured in a storage server body, and the control component includes the following functional modules: the device comprises an information verification module, a data classification module, a data storage module, a data retrieval module, a data downloading module and a data deleting module.
An information verification module: before the storage data transmission, the storage data is verified, and data transmission is performed after the verification is passed.
A data classification module: and receiving the storage data and classifying the storage data.
A data storage module: and storing the classified storage data into a storage unit of a storage server.
A data retrieval module: and retrieving and calling target storage data to be read according to the retrieval conditions.
A data downloading module: when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed.
A data deleting module: when the stored data is deleted, the stored data needing to be deleted is verified, and the stored data is allowed to be deleted after the verification is passed.
The data storage module stores the storage data into the storage unit, and the storage unit is provided with the scanning unit.
The data access management device in the storage server of this embodiment is used to implement the foregoing data access management method in the storage server, and therefore, the specific implementation of this device can be seen in the foregoing part of the embodiment of the data access management method in the storage server, and therefore, the specific implementation thereof may refer to the description of the corresponding part of the embodiment, and will not be further described herein.
In addition, since the data access management device in the storage server of this embodiment is used to implement the foregoing data access management method in the storage server, the role thereof corresponds to the role of the foregoing method, and details are not described here.
Fig. 3 is a schematic structural diagram of a terminal device 300 according to an embodiment of the present invention, including: a processor 310, a memory 320, and a communication unit 330. The processor 310 is configured to implement the data access management program stored in the storage 320, and implement the following steps:
s1, verifying the stored data before transmitting the stored data, and transmitting the data after the verification is passed;
s2, receiving the storage data and classifying the storage data;
s3, storing the classified storage data into a storage unit of a storage server and backing up the storage data;
s4, retrieving and calling target storage data needing to be read according to the retrieval conditions;
s5, when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed;
and S6, when the stored data is deleted, verifying the stored data needing to be deleted, and allowing deletion after verification is passed.
The invention verifies and classifies the stored data, improves the safety of the storage server, is convenient to store the data, reduces the stagnation caused by different data types, can effectively enhance the safety of the storage server through data backup, preferably records and uploads the target data in the processes of calling, retrieving and downloading the data, realizes trace-based and real-time monitoring, and solves the problems that the existing storage server does not verify, separate and backup the data, cannot ensure the data safety and cannot monitor the data processing in real time.
The terminal device 300 includes a processor 310, a memory 320, and a communication unit 330. The components communicate via one or more buses, and those skilled in the art will appreciate that the architecture of the servers shown in the figures is not intended to be limiting, and may be a bus architecture, a star architecture, a combination of more or less components than those shown, or a different arrangement of components.
The memory 320 may be used for storing instructions executed by the processor 310, and the memory 320 may be implemented by any type of volatile or non-volatile storage terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk. The executable instructions in memory 320, when executed by processor 310, enable terminal 300 to perform some or all of the steps in the method embodiments described below.
The processor 310 is a control center of the storage terminal, connects various parts of the entire electronic terminal using various interfaces and lines, and performs various functions of the electronic terminal and/or processes data by operating or executing software programs and/or modules stored in the memory 320 and calling data stored in the memory. The processor may be formed by an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs with the same or different functions. For example, the processor 310 may include only a Central Processing Unit (CPU). In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
A communication unit 330, configured to establish a communication channel so that the storage terminal can communicate with other terminals. And receiving user data sent by other terminals or sending the user data to other terminals.
The present invention also provides a computer storage medium, wherein the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
The computer storage medium stores a data access management program in a storage server, which when executed by a processor implements the steps of:
s1, verifying the stored data before transmitting the stored data, and transmitting the data after the verification is passed;
s2, receiving the storage data and classifying the storage data;
s3, storing the classified storage data in a storage unit of a storage server and backing up the storage data;
s4, retrieving and calling target storage data needing to be read according to the retrieval conditions;
s5, when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed;
and S6, when the stored data is deleted, verifying the stored data needing to be deleted, and allowing the stored data to be deleted after the verification is passed.
The invention verifies and classifies the stored data, improves the safety of the storage server, is convenient to store the data, reduces the stagnation caused by different data types, can effectively enhance the safety of the storage server through data backup, preferably records and uploads the target data in the processes of calling, retrieving and downloading the data, realizes trace-based and real-time monitoring, and solves the problems that the existing storage server does not verify, separate and backup the data, cannot ensure the data safety and cannot monitor the data processing in real time.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, and the storage medium can store program codes, and includes instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, and the like) to perform all or part of the steps of the method in the embodiments of the present invention.
In the several embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The above disclosure is only for the preferred embodiments of the present invention, but the present invention is not limited thereto, and any non-inventive changes that can be made by those skilled in the art and several modifications and amendments made without departing from the principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A method for managing data access in a storage server is characterized by comprising the following steps:
s1, verifying the stored data before transmitting the stored data, and transmitting the data after the verification is passed;
s2, receiving the storage data and classifying the storage data;
s3, storing the classified storage data in a storage unit of a storage server and backing up the storage data;
s4, retrieving and calling target storage data needing to be read according to the retrieval conditions;
s5, when downloading the stored data, verifying the stored data to be downloaded, and allowing the stored data to be downloaded after the verification is passed;
and S6, when the stored data is deleted, verifying the stored data needing to be deleted, and allowing deletion after verification is passed.
2. The method for managing data access in a storage server according to claim 1, wherein in step S1, the stored data is authenticated by any one of digital password authentication, fingerprint authentication, and face authentication.
3. The method for managing data access in a storage server of claim 2, wherein the classification of the storage data in step S2 includes audio class, picture class and text class;
meanwhile, after the stored data are classified, each stored data is subjected to identification marking, and the identification marking comprises any one of a digital sequence code, a bar code and a two-dimensional code.
4. The method according to claim 3, wherein the storage unit is configured with a scanning unit;
correspondingly, after the storage data are stored in the storage unit in the step S3, the scanning unit scans and backs up the storage data in the storage unit, and uploads the backed-up data to the cloud.
5. The method for managing data access in a storage server according to claim 4, wherein step S4 specifically comprises:
inputting keywords through a search box to search and calling target storage data to be read;
or, retrieving and calling target storage data to be read through the identification mark of the storage data;
and the storage unit is retrieved independently, or the storage unit and the cloud are retrieved simultaneously.
6. The method for managing data access in a storage server according to claim 5, wherein in step S5, when downloading the storage data, the number of times of downloading the storage data and the downloading time are recorded.
7. The method for managing data access in a storage server according to claim 6, wherein step S6 specifically comprises:
verifying the stored data needing to be deleted, and allowing deletion after verification is passed;
archiving the deletion time, and uploading the deletion time to the cloud;
and deleting the target storage data in the storage unit independently or deleting the target storage data in the storage unit and the cloud terminal simultaneously.
8. An apparatus for managing data access in a storage server, comprising:
an information verification module: before the storage data transmission, verifying the storage data, and after the verification is passed, performing data transmission;
a data classification module: receiving storage data and classifying the storage data;
a data storage module: storing the classified storage data in a storage unit of a storage server;
a data retrieval module: retrieving and calling target storage data to be read according to the retrieval conditions;
a data downloading module: when downloading the stored data, verifying the stored data to be downloaded, and allowing the downloading after the verification is passed;
a data deleting module: when the stored data is deleted, the stored data needing to be deleted is verified, and the stored data is allowed to be deleted after the verification is passed.
9. A terminal, comprising:
the memory is used for storing the data access management program in the storage server;
a processor for implementing the steps of the method for managing data access in a storage server according to any one of claims 1 to 7 when executing the data access management program in the storage server.
10. A computer-readable storage medium, characterized in that the readable storage medium has stored thereon a storage server internal data access management program, which when executed by a processor implements the steps of the storage server internal data access management method according to any one of claims 1 to 7.
CN202211046845.5A 2022-08-30 2022-08-30 Data access management method, device, terminal and medium in storage server Pending CN115421656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211046845.5A CN115421656A (en) 2022-08-30 2022-08-30 Data access management method, device, terminal and medium in storage server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211046845.5A CN115421656A (en) 2022-08-30 2022-08-30 Data access management method, device, terminal and medium in storage server

Publications (1)

Publication Number Publication Date
CN115421656A true CN115421656A (en) 2022-12-02

Family

ID=84200083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211046845.5A Pending CN115421656A (en) 2022-08-30 2022-08-30 Data access management method, device, terminal and medium in storage server

Country Status (1)

Country Link
CN (1) CN115421656A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115695051A (en) * 2022-12-21 2023-02-03 广东广宇科技发展有限公司 Data center transmission management system based on remote network platform architecture

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115695051A (en) * 2022-12-21 2023-02-03 广东广宇科技发展有限公司 Data center transmission management system based on remote network platform architecture

Similar Documents

Publication Publication Date Title
CN113489713B (en) Network attack detection method, device, equipment and storage medium
CN109740137B (en) Name card generation method, device, computer equipment and storage medium
CN111131221B (en) Interface checking device, method and storage medium
CN115952552B (en) Remote data destruction method, system and equipment
CN115421656A (en) Data access management method, device, terminal and medium in storage server
CN115658604A (en) Information acquisition management system and method
KR101897987B1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN113535823B (en) Abnormal access behavior detection method and device and electronic equipment
CN116670702A (en) Information management method and information management program
CN109885731B (en) Data information mapping matching method and system for power monitoring platform
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN114925337B (en) Data labeling method and device and electronic equipment
CN114040223B (en) Image processing method and system
CN114186278A (en) Database abnormal operation identification method and device and electronic equipment
CN111508095A (en) Mobile phone remote card punching method and device
CN112015494A (en) Third-party API tool calling method, system and device
CN114036334B (en) Face retrieval method, equipment and computer readable storage medium based on block chain
CN113032600B (en) Label list processing method, device, computer equipment and storage medium
CN112580029B (en) Network system and method and device for checking and killing viruses of all-isolated network terminal
CN116910788B (en) Searchable encryption management method and device for service data and storage medium
CN111292083B (en) Payment management method, device, computer equipment and storage medium
CN115001833B (en) Login method and device
CN113438598B (en) Terminal positioning method and device, computer equipment and storage medium
CN112667730B (en) External data verification method, system, equipment and storage medium
JP7268742B2 (en) Policy evaluation device, control method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination