CN116663066A - Data access method, device and storage medium - Google Patents
Data access method, device and storage medium Download PDFInfo
- Publication number
- CN116663066A CN116663066A CN202310935652.3A CN202310935652A CN116663066A CN 116663066 A CN116663066 A CN 116663066A CN 202310935652 A CN202310935652 A CN 202310935652A CN 116663066 A CN116663066 A CN 116663066A
- Authority
- CN
- China
- Prior art keywords
- storage space
- user
- access
- authentication token
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本申请涉及计算机领域,具体涉及一种数据访问方法、设备及存储介质。The present application relates to the computer field, in particular to a data access method, device and storage medium.
背景技术Background technique
对项目进行研发的项目研发部门往往包括多个研发团队,不同的研发团队负责研发项目中不同的部分,每个研发团队中通常包括多名研发人员,这些研发人员在参与项目研发的过程中,会产生很多与项目相关的数据,研发人员之间通过线下相互借阅实现数据的共享,这种数据共享方式存在不安全的问题。The project research and development department that conducts research and development on the project often includes multiple research and development teams. Different research and development teams are responsible for different parts of the research and development project. Each research and development team usually includes multiple research and development personnel. During the process of participating in project development, these research and development personnel, A lot of data related to the project will be generated, and the R&D personnel will share the data through mutual borrowing offline. This data sharing method has the problem of insecurity.
上述的陈述仅用于提供与本申请有关的背景技术信息,而不必然地构成现有技术。The above statements are provided merely to provide background information related to the present application and do not necessarily constitute prior art.
发明内容Contents of the invention
鉴于上述问题,本申请实施例提供一种数据访问方法、设备及存储介质,能够缓解研发人员之间通过线下相互借阅实现数据的共享存在的不安全的问题。In view of the above-mentioned problems, the embodiments of the present application provide a data access method, device, and storage medium, which can alleviate the problem of insecurity existing in sharing data between R&D personnel through mutual borrowing offline.
第一方面,本申请提供了一种数据访问方法,包括:In a first aspect, the present application provides a data access method, including:
响应于用户对文档库管理系统中的第一存储空间的访问操作,在检测到所述用户具有对所述第一存储空间的访问权限的情况下,生成第一认证令牌,所述第一认证令牌用于指示所述用户具有对所述第一存储空间的访问权限;In response to the user's access operation to the first storage space in the document library management system, if it is detected that the user has access rights to the first storage space, a first authentication token is generated, and the first The authentication token is used to indicate that the user has access to the first storage space;
利用所述第一认证令牌访问所述第一存储空间。The first storage space is accessed by using the first authentication token.
本实施例提供的方案中,在文档库管理系统中以存储空间为单位进行数据访问,同时在对第一存储空间进行数据访问时,生成第一认证令牌,并利用第一认证令牌访问第一存储空间。以认证令牌的形式进行数据访问,可以缓解线下借阅存在的数据访问不安全的问题,同时通过在文档库管理系统中引入存储空间的概念,可以在缓解上述数据访问不安全问题的基础上,进一步实现不同存储空间下数据之间的隔离,从而当将该文档库管理系统应用于项目研发部分时,可以采用文档库管理系统中不同的存储空间分别存储不同团队的研发数据,并通过认证令牌的形式限制不同的研发人员对存储空间中的数据进行访问,这样做可以大大减少部门与团队之间内容的关联性,提高空间下数据内容的相似性以及提高数据访问的安全性。In the solution provided by this embodiment, data access is performed in units of storage space in the document library management system, and at the same time, when data access is performed on the first storage space, a first authentication token is generated, and the first authentication token is used to access first storage space. Data access in the form of authentication tokens can alleviate the problem of insecure data access in offline borrowing. At the same time, by introducing the concept of storage space in the document library management system, it can alleviate the above-mentioned insecure data access problems. , to further realize the isolation of data in different storage spaces, so that when the document library management system is applied to the project research and development part, different storage spaces in the document library management system can be used to store the R&D data of different teams respectively, and pass the certification The form of tokens restricts different R&D personnel from accessing the data in the storage space, which can greatly reduce the relevance of content between departments and teams, improve the similarity of data content in the space, and improve the security of data access.
在一些实施例中,利用所述第一认证令牌访问所述第一存储空间,包括:In some embodiments, using the first authentication token to access the first storage space includes:
响应于令牌有效时长内未检测到所述用户对所述第一存储空间的访问操作,将所述第一认证令牌标记为失效令牌。In response to no detection of the user's access operation to the first storage space within the validity period of the token, mark the first authentication token as an invalid token.
本实施例提供的方案中,以令牌有效时长内用户对第一存储空间的访问操作确定是否将第一认证令牌标记为失效令牌,这样可以减少用户长时间不对第一存储空间访问时第一认证令牌对存储空间的占用。In the solution provided by this embodiment, the user's access operation to the first storage space within the validity period of the token is used to determine whether to mark the first authentication token as an invalid token, which can reduce the time when the user does not access the first storage space for a long time. Occupancy of storage space by the first authentication token.
在一些实施例中,利用所述第一认证令牌访问所述第一存储空间,包括:In some embodiments, using the first authentication token to access the first storage space includes:
响应于监测时长内检测到所述用户对所述第一存储空间的操作,延长所述第一认证令牌的令牌有效时长,所述监测时长为所述令牌有效时长与所述第一认证令牌的已生成时长的时长差。In response to detecting the user's operation on the first storage space within the monitoring period, extending the token validity period of the first authentication token, the monitoring period is the difference between the token validity period and the first The duration difference between the generated duration of the authentication token.
本实施例提供的方案中,在第一认证令牌的已生成时长即将等于令牌有效时长的情况下,若仍能检测到用户对第一存储空间的访问操作,则延长该令牌有效时长,这样做可以减少用户正在访问第一存储空间时,第一认证令牌失效导致用户对第一存储空间的访问中断的情况发生,从而提升用户体验。In the solution provided by this embodiment, when the generated duration of the first authentication token is about to be equal to the valid duration of the token, if the user's access operation to the first storage space can still be detected, the valid duration of the token is extended In this way, when the user is accessing the first storage space, the failure of the first authentication token leads to interruption of the user's access to the first storage space, thereby improving user experience.
在一些实施例中,利用所述第一认证令牌访问所述第一存储空间,包括:In some embodiments, using the first authentication token to access the first storage space includes:
响应于检测到所述用户对所述第一存储空间中的目标数据的数据访问操作,获取与所述用户对应的当前有效令牌;In response to detecting the user's data access operation on the target data in the first storage space, acquiring a currently valid token corresponding to the user;
在所述当前有效令牌为所述第一认证令牌的情况下,基于所述数据访问操作处理所述目标数据。If the currently valid token is the first authentication token, the target data is processed based on the data access operation.
本实施例提供的方案中,对于用户对第一存储空间的每次访问,都采用第一认证令牌对用户进行鉴权认证,这样可以进一步提高数据访问的安全性。In the solution provided by this embodiment, for each access of the user to the first storage space, the first authentication token is used to authenticate the user, which can further improve the security of data access.
在一些实施例中,所述方法还包括:In some embodiments, the method also includes:
在生成所述第一认证令牌的情况下,响应于检测到所述用户访问所述文档库管理系统中的第二存储空间,且检测到所述用户具有对所述第二存储空间的访问权限,生成第二认证令牌,所述第二认证令牌用于指示所述用户具有对所述第二存储空间的访问权限;In case the first authentication token is generated, in response to detecting that the user accesses a second storage space in the document library management system, and detecting that the user has access to the second storage space authority, generating a second authentication token, where the second authentication token is used to indicate that the user has access authority to the second storage space;
采用所述第二认证令牌覆盖所述第一认证令牌。Overwriting the first authentication token with the second authentication token.
本实施例提供的方案中,当用户访问的存储空间发生切换时,即由访问第一存储空间切换为访问第二存储空间,为了提高数据访问的安全性,会采用基于第二存储空间生成的第二认证令牌覆盖第一认证令牌,这样可以实现在同一时间,用户在文档库管理系统中只能访问一个存储空间,既方便对用户进行鉴权,同时又能提高数据访问的安全性。In the solution provided by this embodiment, when the storage space accessed by the user is switched, that is, the access to the first storage space is switched to the second storage space, in order to improve the security of data access, the data generated based on the second storage space will be used The second authentication token covers the first authentication token, so that at the same time, the user can only access one storage space in the document library management system, which not only facilitates the authentication of the user, but also improves the security of data access .
在一些实施例中,在检测到所述用户具有对所述第一存储空间的访问权限的情况下,包括:In some embodiments, when it is detected that the user has access authority to the first storage space, the steps include:
在检测到所述用户对应的存储空间列表中包括所述第一存储空间的情况下;所述存储空间列表包括所述用户具有访问权限的所有存储空间。If it is detected that the storage space list corresponding to the user includes the first storage space; the storage space list includes all storage spaces to which the user has access rights.
本实施例提供的方案中,通过存储空间列表对用户对第一存储空间的访问权限进行验证,简单易实现。In the solution provided by this embodiment, the user's access right to the first storage space is verified through the storage space list, which is simple and easy to implement.
在一些实施例中,所述方法还包括:In some embodiments, the method also includes:
在生成所述第一认证令牌的情况下,将所述第一认证令牌存储至缓存中。When the first authentication token is generated, store the first authentication token in a cache.
本申请实施例提供的方案中,将第一认证令牌存储至缓存中,可以提高对第一认证令牌的读写速度,从而提高数据访问速度。In the solution provided by the embodiment of the present application, storing the first authentication token in the cache can increase the reading and writing speed of the first authentication token, thereby increasing the data access speed.
第二方面,本申请提供了一种数据访问装置,包括:In a second aspect, the present application provides a data access device, including:
生成模块,用于响应于用户对文档库管理系统中的第一存储空间的访问操作,在检测到所述用户具有对所述第一存储空间的访问权限的情况下,生成第一认证令牌,所述第一认证令牌用于指示所述用户具有对所述第一存储空间的访问权限;A generating module, configured to generate a first authentication token in response to the user's access operation to the first storage space in the document library management system, when it is detected that the user has access authority to the first storage space , the first authentication token is used to indicate that the user has access to the first storage space;
访问模块,用于利用所述第一认证令牌访问所述第一存储空间。An access module, configured to use the first authentication token to access the first storage space.
第三方面,本申请提供了一种电子设备,包括:处理器和存储器;In a third aspect, the present application provides an electronic device, including: a processor and a memory;
所述存储器,用于存储计算机程序;The memory is used to store computer programs;
所述处理器,用于执行所述存储器中所存储的程序,实现第一方面所述的数据访问方法。The processor is configured to execute the program stored in the memory to implement the data access method described in the first aspect.
第四方面,本申请提供了一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现第一方面所述的数据访问方法。In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program, and implementing the data access method in the first aspect when the computer program is executed by a processor.
上述说明仅是本申请技术方案的概述,为了能够更清楚了解本申请的技术手段,而可依照说明书的内容予以实施,并且为了让本申请的上述和其它目的、特征和优点能够更明显易懂,以下特举本申请的具体实施方式。The above description is only an overview of the technical solution of the present application. In order to better understand the technical means of the present application, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present application more obvious and understandable , the following specifically cites the specific implementation manner of the present application.
附图说明Description of drawings
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本申请的限制。而且在整个附图中,用相同的参考符号表示相同的部件。Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating the preferred embodiments and are not to be considered as limiting the application. Also throughout the drawings, the same reference numerals are used to designate the same parts.
图1为本申请一些实施例的数据访问方法的流程示意图;FIG. 1 is a schematic flowchart of a data access method in some embodiments of the present application;
图2为本申请一些实施例的文档库管理系统前端架构的结构示意图;FIG. 2 is a schematic structural diagram of the front-end architecture of the document library management system in some embodiments of the present application;
图3为本申请一些实施例的文档库管理系统的后端架构的结构示意图;FIG. 3 is a schematic structural diagram of the back-end architecture of the document library management system in some embodiments of the present application;
图4为本申请一些实施例的数据访问装置的结构示意图;FIG. 4 is a schematic structural diagram of a data access device in some embodiments of the present application;
图5为本申请一些实施例的电子设备的结构示意图;FIG. 5 is a schematic structural diagram of an electronic device according to some embodiments of the present application;
图6为本申请一些实施例的计算机可读存储介质的结构示意图。FIG. 6 is a schematic structural diagram of a computer-readable storage medium according to some embodiments of the present application.
具体实施方式Detailed ways
下面将结合附图对本申请技术方案的实施例进行详细的描述。以下实施例仅用于更加清楚地说明本申请的技术方案,因此只作为示例,而不能以此来限制本申请的保护范围。Embodiments of the technical solutions of the present application will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present application more clearly, and therefore are only examples, rather than limiting the protection scope of the present application.
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同;本文中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本申请;本申请的说明书和权利要求书及上述附图说明中的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the technical field of the application; the terms used herein are only for the purpose of describing specific embodiments, and are not intended to To limit this application; the terms "comprising" and "having" and any variations thereof in the specification and claims of this application and the description of the above drawings are intended to cover a non-exclusive inclusion.
在本申请实施例的描述中,技术术语“第一”“第二”等仅用于区别不同对象,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量、特定顺序或主次关系。在本申请实施例的描述中,“多个”的含义是两个以上,除非另有明确具体的限定。In the description of the embodiments of the present application, technical terms such as "first" and "second" are only used to distinguish different objects, and should not be understood as indicating or implying relative importance or implicitly indicating the number, specificity, or specificity of the indicated technical features. Sequence or primary-secondary relationship. In the description of the embodiments of the present application, "plurality" means two or more, unless otherwise specifically defined.
对项目进行研发的项目研发部门往往包括多个研发团队,不同的研发团队负责研发项目中不同的部分,每个研发团队中通常包括多名研发人员,这些研发人员在参与项目研发的过程中,会产生很多与项目相关的数据,研发人员之间通过线下相互借阅实现数据的共享,这种数据共享方式存在不安全的问题。The project research and development department that conducts research and development on the project often includes multiple research and development teams. Different research and development teams are responsible for different parts of the research and development project. Each research and development team usually includes multiple research and development personnel. During the process of participating in project development, these research and development personnel, A lot of data related to the project will be generated, and the R&D personnel will share the data through mutual borrowing offline. This data sharing method has the problem of insecurity.
为了缓解相关技术中的数据共享方式存在的不安全的问题,本申请实施例提供一种数据访问方法,该方法在文档库管理系统中以存储空间为单位进行数据访问,同时在对第一存储空间进行数据访问时,生成第一认证令牌,并利用第一认证令牌访问第一存储空间。以认证令牌的形式进行数据访问,可以缓解线下借阅存在的数据访问不安全的问题,同时通过在文档库管理系统中引入存储空间的概念,可以在缓解上述数据访问不安全问题的基础上,进一步实现不同存储空间下数据之间的隔离,从而当将该文档库管理系统应用于项目研发部分时,可以采用文档库管理系统中不同的存储空间分别存储不同团队的研发数据,并通过认证令牌的形式限制不同的研发人员对存储空间中的数据进行访问,这样做可以大大减少部门与团队之间内容的关联性,提高空间下数据内容的相似性以及提高数据访问的安全性。In order to alleviate the problem of insecurity in the data sharing method in the related art, the embodiment of the present application provides a data access method, which performs data access in units of storage space in the document library management system, and simultaneously When the space performs data access, a first authentication token is generated, and the first authentication token is used to access the first storage space. Data access in the form of authentication tokens can alleviate the problem of insecure data access in offline borrowing. At the same time, by introducing the concept of storage space in the document library management system, it can alleviate the above-mentioned insecure data access problems. , to further realize the isolation of data in different storage spaces, so that when the document library management system is applied to the project research and development part, different storage spaces in the document library management system can be used to store the R&D data of different teams respectively, and pass the certification The form of tokens restricts different R&D personnel from accessing the data in the storage space, which can greatly reduce the relevance of content between departments and teams, improve the similarity of data content in the space, and improve the security of data access.
本申请实施例中的数据访问方法可应用于电子设备中,该电子设备可以包括终端设备或者服务器。该终端设备可以是诸如手机、平板电脑、笔记本电脑、掌上电脑、PAD(Personal Digital Assistant,个人数字助理)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。服务器包括但不限于集群服务器、云服务器等。The data access method in the embodiment of the present application can be applied to an electronic device, and the electronic device may include a terminal device or a server. The terminal device may be a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, or a PAD (Personal Digital Assistant, personal digital assistant), and a fixed terminal such as a digital TV, a desktop computer, and the like. Servers include but are not limited to cluster servers, cloud servers, etc.
请参见图1,图1为本申请实施例示出的一种数据访问方法,该方法可以包括以下步骤:Please refer to Fig. 1, Fig. 1 is a kind of data access method shown in the embodiment of the present application, this method may include the following steps:
101、响应于用户对文档库管理系统中的第一存储空间的访问操作,在检测到用户具有对第一存储空间的访问权限的情况下,生成第一认证令牌,第一认证令牌用于指示用户具有对第一存储空间的访问权限;101. In response to the user's access operation to the first storage space in the document library management system, if it is detected that the user has access rights to the first storage space, generate a first authentication token, and the first authentication token is used to indicate that the user has access to the first storage space;
102、利用第一认证令牌访问第一存储空间。102. Use the first authentication token to access the first storage space.
本实施例中,文档库管理系统中不同的存储空间中可以存储同一项目在不同研发阶段的数据,比如一个研发项目由项目研发部门中不同研发团队负责,那么可以在文档库管理系统中不同的存储空间可以分别存储不同研发团队的研发数据,如文档库管理系统中的第一存储空间存储第一个研发团队的研发数据,第二存储空间存储第二个研发团队的研发数据。通过存储空间的概念可以实现对不同研发团队的研发数据进行空间隔离,从而减少部门与团队之间内容的关联性,提高空间下数据内容的相似性。In this embodiment, different storage spaces in the document library management system can store the data of the same project at different R&D stages. The storage space can store R&D data of different R&D teams respectively, for example, the first storage space in the document library management system stores the R&D data of the first R&D team, and the second storage space stores the R&D data of the second R&D team. Through the concept of storage space, the R&D data of different R&D teams can be spatially isolated, thereby reducing the correlation of content between departments and teams and improving the similarity of data content in space.
本实施例中,用户对第一存储空间的访问操作包括但不限于用户对第一存储空间的单击操作、双击操作、登录操作、触摸操作或滑动操作等。In this embodiment, the user's access operation to the first storage space includes, but is not limited to, the user's single-click operation, double-click operation, login operation, touch operation, or slide operation on the first storage space.
本实施例中,可以通过使第一认证令牌(token)携带用户的用户信息和第一存储空间的标识,实现使第一认证令牌指示用户具有对第一存储空间的访问权限。当然也可以使第一认证令牌与用户信息和第一存储空间进行绑定,从而使第一认证令牌指示用户具有对第一存储空间的访问权限。In this embodiment, by making the first authentication token (token) carry the user information of the user and the identifier of the first storage space, the first authentication token can indicate that the user has access to the first storage space. Of course, the first authentication token may also be bound with the user information and the first storage space, so that the first authentication token indicates that the user has access authority to the first storage space.
本实施例中,用户信息包括但不限于用户的身份证号、用户名+登录密码的组合、用户的工号等。In this embodiment, the user information includes, but is not limited to, the user's ID number, a combination of user name + login password, the user's job number, and the like.
本实施例中,包括但不限于由文档库管理系统的后台工作人员对用户对第一存储空间的访问权限进行鉴权认证。In this embodiment, including but not limited to, background staff of the document library management system authenticate the user's access right to the first storage space.
本实施例中,为了提高数据访问的安全性,在利用第一认证令牌访问第一存储空间的过程中,每次用户对第一存储空间的访问,均可以通过第一认证令牌对用户的访问权限进行鉴权。In this embodiment, in order to improve the security of data access, in the process of using the first authentication token to access the first storage space, each time the user accesses the first storage space, the user can be authenticated by the first authentication token. authenticated access rights.
本实施例中的文档库管理系统包括如图2所示的前端架构和如图3所示的后端架构两部分。每个存储空间的前端架构均包括如图2所示的功能模块导航(即首页)、博客模块、文件模块、专题模块、个人管理模块和全局搜索模块。应理解,虽然不同的存储空间包括的功能模块大体相同,但是同一功能模块在不同的存储空间中存储的数据不同。The document library management system in this embodiment includes two parts: a front-end architecture as shown in FIG. 2 and a back-end architecture as shown in FIG. 3 . The front-end architecture of each storage space includes functional module navigation (ie home page), blog module, file module, topic module, personal management module and global search module as shown in Figure 2. It should be understood that although different storage spaces include substantially the same functional modules, the same functional module stores different data in different storage spaces.
其中:in:
功能模块导航包括热门文章导航、标签词云导航、推荐文章导航和共享排行导航。Function module navigation includes popular article navigation, tag word cloud navigation, recommended article navigation and shared ranking navigation.
博客模块用于展示当前空间下已发布的文章,用户可以选择分类标签对展示的文章数据进行过滤。点击某篇文章可以进入文章详情,包括文章作者,标题,内容,文章关联的标签,浏览数,发布时间,以及文章的评论,点赞,收藏情况的展示。The blog module is used to display published articles in the current space, and users can select classification tags to filter the displayed article data. Click on an article to enter the details of the article, including the article author, title, content, tags associated with the article, number of views, release time, and display of article comments, likes, and favorites.
文件模块用于展示当前空间下已发布的文件。与文章不同的是,详情中包括文件的大小格式。文件提供下载以及在线预览的功能。The file module is used to display the published files in the current space. Unlike the article, the details include the size and format of the file. The file provides download and online preview functions.
专题模块用于展示当前空间下发往专题内的文章,文件。空间下管理员自定义专题类型供当前空间下用户发布。The topic module is used to display the articles and files sent to the topic in the current space. The administrators in the space can customize the topic type for users in the current space to post.
个人管理模块用于提供用户账号设置,内容管理,历史足迹,我的收藏功能。账号设置:用户可以修改昵称,头像等用户信息;内容管理:用户对自己发布的文章,文件进行修改编辑,删除等;历史足迹:查看用户在当前空间的浏览记录;我的收藏:查看用户在当前空间的搜藏情况;The personal management module is used to provide user account settings, content management, historical footprints, and my favorite functions. Account settings: users can modify user information such as nicknames and avatars; content management: users can modify, edit, and delete articles and files published by themselves; historical footprints: view users’ browsing records in the current space; my favorites: view users’ The collection status of the current space;
全局搜索模块采用ElasticSearch的自动补全搜索。搜索赋予补全提示功能,可以根据用户输入内容,查找数据库中符合的数据给予自动补全提示。提示过滤出尽可能用户想搜索的内容。自动补全采用拼音分词器,例如数据库中文章标题有pingguo,苹果两个词汇,当输入p的时候pingguo和苹果都会给出提示,供用户选择。The global search module uses ElasticSearch's auto-completion search. The search endows the completion prompt function, which can search for matching data in the database and give automatic completion prompts according to the user input content. Hints filter out as much content as possible for users to search for. Auto-completion uses a pinyin word breaker. For example, the title of an article in the database has two words, pingguo and apple. When p is entered, both pingguo and apple will give prompts for users to choose.
如图3所示,文档库管理系统的后端架构包括空间管理、用户管理、分类管理、内容管理和专题管理共五个模块。文档库管理系统的后端架构可以供管理员使用。As shown in Figure 3, the back-end architecture of the document library management system includes five modules: space management, user management, classification management, content management and topic management. The back-end architecture of the document library management system can be used by administrators.
其中,空间管理用于对用户所在空间或团队进行管理,对空间和/或团队进行增删改查。可以把某个用户移入,移出某个空间或团队。可以新增系统空间或者团队。对系统的空间和团队以及关联的人员进行一个整体的把控。Among them, the space management is used to manage the space or team where the user belongs to, and to add, delete, modify and check the space and/or team. A user can be moved in and out of a space or team. A system space or team can be added. Carry out overall control over the system space, team and associated personnel.
其中,用户管理用于同步公司用户到本系统用户。对用户进行角色权限等设置。Among them, user management is used to synchronize company users to system users. Set user roles and permissions.
其中,分类管理用于对系统的一级分类,二级分类进行管理。对系统分类进行增删改查。Among them, classification management is used to manage the first-level classification and second-level classification of the system. Add, delete, modify and check the system classification.
其中,内容管理用于对用户发布的文章,文件进行管理。根据空间查看空间下发布的所有文章或文件、改变文章或文件所在空间、删除文章或者文件。Among them, content management is used to manage articles and files published by users. View all articles or files published under the space according to the space, change the space where the article or file is located, and delete the article or file.
其中,专题管理用于对专题分类,以及分类下的文章或者文件进行管理。对专题的分类增删改查。对专题分类下发布的文章或者文件进行查询,改变文章或文件发布的空间,删除文章或文件。Among them, topic management is used to classify topics and manage articles or files under the categories. Add, delete, modify and check the classification of topics. Query articles or files published under thematic categories, change the space where articles or files are published, and delete articles or files.
本实施例中,为了支持上述文档库管理系统的前端架构和后端架构,还给出了如下的文档库管理系统的架构:In this embodiment, in order to support the front-end architecture and back-end architecture of the above-mentioned document library management system, the following architecture of the document library management system is also given:
系统设计5个微服务。用户服务,博客服务,检索服务,收藏点赞评论服务,文件预览服务。模块化开发,通过服务之间相互调用达到系统的运行,易于扩展与功能模块的开发与维护。文件预览服务采用开源的kkFileView对各种类型的文件进行一个快速在线的预览。The system designs 5 microservices. User service, blog service, search service, collection like comment service, file preview service. Modular development, the operation of the system is achieved by calling each other between services, and it is easy to expand and develop and maintain functional modules. The file preview service uses the open source kkFileView to perform a quick online preview of various types of files.
采用RBAC模型对用户的权限进行管理。具体说来,采用RBAC模型创建文档库角色,在用户登录文档库管理系统时,基于文档库角色对用户进行多重鉴权,从而达到针对不同的用户,具有不同的访问效果。The RBAC model is used to manage user permissions. Specifically, the RBAC model is used to create a document library role. When a user logs in to the document library management system, multiple authentications are performed on the user based on the document library role, so as to achieve different access effects for different users.
数据存储:mysql存储系统所有信息。redis存储用户token,以及用户信息。对用户发布的文章或者文件与发布人以及空间信息封装,封装好的数据对象存储在Elasticsearch中进行快速智能检索。Data storage: mysql stores all information of the system. Redis stores user tokens and user information. Encapsulate articles or files published by users with publishers and spatial information, and store the encapsulated data objects in Elasticsearch for fast and intelligent retrieval.
文章以及文件属性进行抽象,抽象出来的对象进行封装,最后持久化到数据库中,用于检索与分析。Articles and file attributes are abstracted, the abstracted objects are encapsulated, and finally persisted into the database for retrieval and analysis.
部门团队空间隔离,前台进行切换空间,会请求后端颁发一个当前空间下的token令牌,token令牌对应的空间访问权限信息存储在Redis中。之后在当前空间下访问的接口都要带上此token令牌进行访问权限的校验才能访问页面以及文章或者文件资源的详情。每切换空间会重新颁布token令牌,保证用户的token令牌只在当前空间下生效,且有权限访问当前空间下的资源,从而保证了空间的隔离。保证了个个部门团队之间的数据相似性。The space of the department and team is isolated, and the front end will request the backend to issue a token under the current space when the front desk switches spaces, and the space access permission information corresponding to the token token is stored in Redis. Afterwards, the interfaces accessed in the current space must carry this token token to verify the access rights to access the details of pages and articles or file resources. The token will be re-issued every time the space is switched to ensure that the user's token is only valid in the current space and has permission to access the resources in the current space, thus ensuring the isolation of the space. Guarantees the data similarity between each department team.
本实施例提供的方案中,在文档库管理系统中以存储空间为单位进行数据访问,同时在对第一存储空间进行数据访问时,生成第一认证令牌,并利用第一认证令牌访问第一存储空间。以认证令牌的形式进行数据访问,可以缓解线下借阅存在的数据访问不安全的问题,同时通过在文档库管理系统中引入存储空间的概念,可以在缓解上述数据访问不安全问题的基础上,进一步实现不同存储空间下数据之间的隔离,从而当将该文档库管理系统应用于项目研发部分时,可以采用文档库管理系统中不同的存储空间分别存储不同团队的研发数据,并通过认证令牌的形式限制不同的研发人员对存储空间中的数据进行访问,这样做可以大大减少部门与团队之间内容的关联性,提高空间下数据内容的相似性以及提高数据访问的安全性。In the solution provided by this embodiment, data access is performed in units of storage space in the document library management system, and at the same time, when data access is performed on the first storage space, a first authentication token is generated, and the first authentication token is used to access first storage space. Data access in the form of authentication tokens can alleviate the problem of insecure data access in offline borrowing. At the same time, by introducing the concept of storage space in the document library management system, it can alleviate the above-mentioned insecure data access problems. , to further realize the isolation of data in different storage spaces, so that when the document library management system is applied to the project research and development part, different storage spaces in the document library management system can be used to store the R&D data of different teams respectively, and pass the certification The form of tokens restricts different R&D personnel from accessing the data in the storage space, which can greatly reduce the relevance of content between departments and teams, improve the similarity of data content in the space, and improve the security of data access.
本申请一个或多个实施例中,利用第一认证令牌访问第一存储空间,包括:In one or more embodiments of the present application, using the first authentication token to access the first storage space includes:
响应于令牌有效时长内未检测到用户对第一存储空间的访问操作,将第一认证令牌标记为失效令牌。In response to no detection of the user's access operation to the first storage space within the validity period of the token, the first authentication token is marked as an invalid token.
本实施例中,可以通过更改第一认证令牌的标记状态,从而将第一认证令牌标记为失效令牌。比如,通过将第一认证令牌的标记状态由有效状态更新为失效状态。当然也可以通过删除第一认证令牌的方式实现将第一认证令牌标记为失效令牌。In this embodiment, the first authentication token can be marked as an invalid token by changing the marking state of the first authentication token. For example, by updating the marking state of the first authentication token from a valid state to an invalid state. Of course, it is also possible to mark the first authentication token as an invalid token by deleting the first authentication token.
应理解,被标记为失效令牌后的第一认证令牌不能再用于实现对第一存储空间的访问。It should be understood that the first authentication token marked as an invalid token can no longer be used to realize access to the first storage space.
应理解,在令牌有效时长内,第一认证令牌为有效令牌,因此在令牌有效时长内用户对第一存储空间的访问操作均可以通过第一认证令牌对用户的访问权限进行鉴权。应用中,令牌有效时长可以认为基于经验预先设置,比如设置令牌有效时长为30分钟。It should be understood that within the valid period of the token, the first authentication token is a valid token, so within the valid period of the token, the user's access to the first storage space can be performed through the first authentication token to the user's access authority. authentication. In the application, the validity period of the token can be considered to be preset based on experience, for example, the validity period of the token is set to 30 minutes.
本实施例提供的方案中,以令牌有效时长内用户对第一存储空间的访问操作确定是否将第一认证令牌标记为失效令牌,这样可以减少用户长时间不对第一存储空间访问时第一认证令牌对存储空间的占用。In the solution provided by this embodiment, the user's access operation to the first storage space within the validity period of the token is used to determine whether to mark the first authentication token as an invalid token, which can reduce the time when the user does not access the first storage space for a long time. Occupancy of storage space by the first authentication token.
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请一个或多个实施例中,利用第一认证令牌访问第一存储空间,包括:In one or more embodiments of the present application, using the first authentication token to access the first storage space includes:
响应于监测时长内检测到用户对第一存储空间的操作,延长第一认证令牌的令牌有效时长,监测时长为令牌有效时长与第一认证令牌的已生成时长的时长差。In response to detecting the user's operation on the first storage space within the monitoring period, extend the valid period of the first authentication token, and the monitoring period is the difference between the valid period of the token and the generated period of the first authentication token.
应用中,对令牌有效时长所延长的时长可以人为基于经验设置或根据实际需求进行设置,比如可以设置令牌有效时长延长的时长为30分钟。In the application, the extended period of the valid period of the token can be set artificially based on experience or according to actual needs. For example, the extended period of the valid period of the token can be set to 30 minutes.
应用中,检测时长可以人为基于经验设置或根据实际需求进行设置,比如可以设置监测时长为10分钟,即在令牌有效时长的最后10分钟内如果仍能检测到用户对第一存储空间的操作,则延长第一认证令牌的令牌有效时长。In the application, the detection duration can be set manually based on experience or according to actual needs. For example, the detection duration can be set to 10 minutes, that is, if the user's operation on the first storage space can still be detected within the last 10 minutes of the valid token , then extend the token validity period of the first authentication token.
本实施例提供的方案中,在第一认证令牌的已生成时长即将等于令牌有效时长的情况下,若仍能检测到用户对第一存储空间的访问操作,则延长该令牌有效时长,这样做可以减少用户正在访问第一存储空间时,第一认证令牌失效导致用户对第一存储空间的访问中断的情况发生,从而提升用户体验。In the solution provided by this embodiment, when the generated duration of the first authentication token is about to be equal to the valid duration of the token, if the user's access operation to the first storage space can still be detected, the valid duration of the token is extended In this way, when the user is accessing the first storage space, the failure of the first authentication token leads to interruption of the user's access to the first storage space, thereby improving user experience.
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请一个或多个实施例中,利用第一认证令牌访问第一存储空间,包括:In one or more embodiments of the present application, using the first authentication token to access the first storage space includes:
响应于检测到用户对第一存储空间中的目标数据的数据访问操作,获取与用户对应的当前有效令牌;In response to detecting the user's data access operation on the target data in the first storage space, acquiring a currently valid token corresponding to the user;
在当前有效令牌为第一认证令牌的情况下,基于数据访问操作处理目标数据。In the case that the current valid token is the first authentication token, the target data is processed based on the data access operation.
本实施例提供的方案中,对于用户对第一存储空间的每次访问,都采用第一认证令牌对用户进行鉴权认证,这样可以进一步提高数据访问的安全性。In the solution provided by this embodiment, for each access of the user to the first storage space, the first authentication token is used to authenticate the user, which can further improve the security of data access.
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请一个或多个实施例中,该方法还包括:In one or more embodiments of the present application, the method also includes:
在生成第一认证令牌的情况下,响应于检测到用户访问文档库管理系统中的第二存储空间,且检测到用户具有对第二存储空间的访问权限,生成第二认证令牌,第二认证令牌用于指示用户具有对第二存储空间的访问权限;In the case of generating the first authentication token, in response to detecting that the user accesses the second storage space in the document library management system, and detecting that the user has access rights to the second storage space, a second authentication token is generated, and the second authentication token is generated. The second authentication token is used to indicate that the user has access to the second storage space;
采用第二认证令牌覆盖第一认证令牌。Overwriting the first authentication token with the second authentication token.
本实施例提供的方案中,当用户访问的存储空间发生切换时,即由访问第一存储空间切换为访问第二存储空间,为了提高数据访问的安全性,会采用基于第二存储空间生成的第二认证令牌覆盖第一认证令牌,这样可以实现在同一时间,用户在文档库管理系统中只能访问一个存储空间,既方便对用户进行鉴权,同时又能提高数据访问的安全性。In the solution provided by this embodiment, when the storage space accessed by the user is switched, that is, the access to the first storage space is switched to the second storage space, in order to improve the security of data access, the data generated based on the second storage space will be used The second authentication token covers the first authentication token, so that at the same time, the user can only access one storage space in the document library management system, which not only facilitates the authentication of the user, but also improves the security of data access .
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请一个或多个实施例中,在检测到所述用户具有对所述第一存储空间的访问权限的情况下,包括:In one or more embodiments of the present application, when it is detected that the user has access to the first storage space, the steps include:
在检测到所述用户对应的存储空间列表中包括所述第一存储空间的情况下;所述存储空间列表包括所述用户具有访问权限的所有存储空间。If it is detected that the storage space list corresponding to the user includes the first storage space; the storage space list includes all storage spaces to which the user has access rights.
应理解,用户对第一空间的访问操作中携带有用户的用户信息,因此可以基于访问操作中的用户信息鉴权用户对第一存储空间的访问权限。通常电子设备中维护存储空间列表,该存储空间列表中包括用户具有访问权限的所有存储空间。因此通过查询确定存储空间列表中包括第一存储空间的情况下,可以确定用户具有对第一存储空间的访问权限。It should be understood that the user's user information is carried in the user's access operation to the first storage space, so the user's access right to the first storage space may be authenticated based on the user information in the access operation. Generally, a storage space list is maintained in an electronic device, and the storage space list includes all storage spaces to which a user has access rights. Therefore, when it is determined through query that the storage space list includes the first storage space, it can be determined that the user has access to the first storage space.
应用中,存储空间列表中的存储空间可以是用户在注册到该文档库管理系统中时生成的。在用户注册到文档库管理系统中时,可以由文档库管理系统的后台工作人员对用户所要注册的存储空间进行核实认证,并在认证通过后,在用户对应的存储空间列表中加入用户注册时请求的存储空间。In the application, the storage spaces in the storage space list may be generated when the user registers in the document library management system. When a user registers in the document library management system, the background staff of the document library management system can verify and authenticate the storage space to be registered by the user, and after the authentication is passed, add the user registration time to the corresponding storage space list of the user The requested storage space.
本实施例提供的方案中,通过存储空间列表对用户对第一存储空间的访问权限进行验证,简单易实现。In the solution provided by this embodiment, the user's access right to the first storage space is verified through the storage space list, which is simple and easy to implement.
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请一个或多个实施例中,该方法还包括:In one or more embodiments of the present application, the method also includes:
在生成第一认证令牌的情况下,将第一认证令牌存储至缓存中。When the first authentication token is generated, the first authentication token is stored in the cache.
本申请实施例提供的方案中,将第一认证令牌存储至缓存(Redis)中,可以提高对第一认证令牌的读写速度,从而提高数据访问速度。In the solution provided by the embodiment of the present application, storing the first authentication token in the cache (Redis) can increase the reading and writing speed of the first authentication token, thereby increasing the data access speed.
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以相互参考,为了简洁,本文不再赘述。The above descriptions of the various embodiments tend to emphasize the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, details are not repeated herein.
本申请实施例还提供一种数据访问装置,如图4所示,该装置可以包括:The embodiment of the present application also provides a data access device, as shown in Figure 4, the device may include:
生成模块41,用于响应于用户对文档库管理系统中的第一存储空间的访问操作,在检测到所述用户具有对所述第一存储空间的访问权限的情况下,生成第一认证令牌,所述第一认证令牌用于指示所述用户具有对所述第一存储空间的访问权限;A generating module 41, configured to generate a first authentication order in response to a user's access operation to the first storage space in the document library management system, when it is detected that the user has access authority to the first storage space A card, the first authentication token is used to indicate that the user has access to the first storage space;
访问模块42,用于利用所述第一认证令牌访问所述第一存储空间。An access module 42, configured to use the first authentication token to access the first storage space.
可选地,访问模块42用于:Optionally, access module 42 is used for:
响应于令牌有效时长内未检测到所述用户对所述第一存储空间的访问操作,将所述第一认证令牌标记为失效令牌。In response to no detection of the user's access operation to the first storage space within the validity period of the token, mark the first authentication token as an invalid token.
可选地,访问模块42用于:Optionally, access module 42 is used for:
响应于监测时长内检测到所述用户对所述第一存储空间的操作,延长所述第一认证令牌的令牌有效时长,所述监测时长为所述令牌有效时长与所述第一认证令牌的已生成时长的时长差。In response to detecting the user's operation on the first storage space within the monitoring period, extending the token validity period of the first authentication token, the monitoring period is the difference between the token validity period and the first The duration difference between the generated duration of the authentication token.
可选地,访问模块42用于:Optionally, access module 42 is used for:
响应于检测到所述用户对所述第一存储空间中的目标数据的数据访问操作,获取与所述用户对应的当前有效令牌;In response to detecting the user's data access operation on the target data in the first storage space, acquiring a currently valid token corresponding to the user;
在所述当前有效令牌为所述第一认证令牌的情况下,基于所述数据访问操作处理所述目标数据。If the currently valid token is the first authentication token, the target data is processed based on the data access operation.
可选地,该装置还用于:Optionally, the device is also used for:
在生成所述第一认证令牌的情况下,响应于检测到所述用户访问所述文档库管理系统中的第二存储空间,且检测到所述用户具有对所述第二存储空间的访问权限,生成第二认证令牌,所述第二认证令牌用于指示所述用户具有对所述第二存储空间的访问权限;In case the first authentication token is generated, in response to detecting that the user accesses a second storage space in the document library management system, and detecting that the user has access to the second storage space authority, generating a second authentication token, where the second authentication token is used to indicate that the user has access authority to the second storage space;
采用所述第二认证令牌覆盖所述第一认证令牌。Overwriting the first authentication token with the second authentication token.
可选地,生成模块41用于:Optionally, generating module 41 is used for:
在检测到所述用户对应的存储空间列表中包括所述第一存储空间的情况下;所述存储空间列表包括所述用户具有访问权限的所有存储空间。If it is detected that the storage space list corresponding to the user includes the first storage space; the storage space list includes all storage spaces to which the user has access rights.
可选地,该装置还用于:Optionally, the device is also used for:
在生成所述第一认证令牌的情况下,将所述第一认证令牌存储至缓存中。When the first authentication token is generated, store the first authentication token in a cache.
本申请实施方式还提供一种电子设备,以执行上述数据访问方法。请参考图5其示出了本申请的一些实施方式所提供的一种电子设备的示意图。如图5所示,电子设备5包括:处理器500,存储器501,总线502和通信接口503,所述处理器500、通信接口503和存储器501通过总线502连接;所述存储器501中存储有可在所述处理器500上运行的计算机程序,所述处理器500运行所述计算机程序时执行本申请前述任一实施方式所提供的数据访问方法。The embodiments of the present application also provide an electronic device to execute the above data access method. Please refer to FIG. 5 , which shows a schematic diagram of an electronic device provided by some embodiments of the present application. As shown in Figure 5, the electronic device 5 includes: a processor 500, a memory 501, a bus 502 and a communication interface 503, the processor 500, the communication interface 503 and the memory 501 are connected through the bus 502; A computer program running on the processor 500, when the processor 500 runs the computer program, executes the data access method provided in any one of the foregoing implementation manners of the present application.
其中,存储器501可能包含高速随机存取存储器(RAM:Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口503(可以是有线或者无线)实现该装置网元与至少一个其他网元之间的通信连接,可以使用互联网、广域网、本地网、城域网等。Wherein, the memory 501 may include a high-speed random access memory (RAM: Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the device network element and at least one other network element is realized through at least one communication interface 503 (which may be wired or wireless), and the Internet, wide area network, local network, metropolitan area network, etc. can be used.
总线502可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。其中,存储器501用于存储程序,所述处理器500在接收到执行指令后,执行所述程序,前述本申请实施例任一实施方式揭示的所述数据访问方法可以应用于处理器500中,或者由处理器500实现。The bus 502 may be an ISA bus, a PCI bus, or an EISA bus, etc. The bus can be divided into address bus, data bus, control bus and so on. Wherein, the memory 501 is used to store a program, and the processor 500 executes the program after receiving an execution instruction, and the data access method disclosed in any implementation manner of the foregoing embodiments of the present application can be applied to the processor 500, Or implemented by the processor 500.
处理器500可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器500中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器500可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器501,处理器500读取存储器501中的信息,结合其硬件完成上述方法的步骤。The processor 500 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be implemented by an integrated logic circuit of hardware in the processor 500 or an instruction in the form of software. The above-mentioned processor 500 can be a general-purpose processor, including a central processing unit (Central Processing Unit, referred to as CPU), a network processor (Network Processor, referred to as NP), etc.; it can also be a digital signal processor (DSP), an application-specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. Various methods, steps, and logic block diagrams disclosed in the embodiments of the present application may be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory 501, and the processor 500 reads the information in the memory 501, and completes the steps of the above method in combination with its hardware.
本申请实施例提供的电子设备与本申请实施例提供的数据访问方法出于相同的发明构思,具有与其采用、运行或实现的方法相同的有益效果。The electronic device provided in the embodiment of the present application and the data access method provided in the embodiment of the present application are based on the same inventive concept, and have the same beneficial effect as the method adopted, operated or implemented.
本申请实施方式还提供一种与前述实施方式所提供的数据访问方法对应的计算机可读存储介质,请参考图6,其示出的计算机可读存储介质为光盘30,其上存储有计算机程序(即程序产品),所述计算机程序在被处理器运行时,会执行前述任意实施方式所提供的数据访问方法。The embodiment of the present application also provides a computer-readable storage medium corresponding to the data access method provided in the foregoing embodiment, please refer to FIG. (that is, a program product), when the computer program is run by a processor, it will execute the data access method provided in any of the foregoing implementation manners.
需要说明的是,所述计算机可读存储介质的例子还可以包括,但不限于相变内存(PRAM)、静态随机存取存储器 (SRAM)、动态随机存取存储器 (DRAM)、其他类型的随机存取存储器 (RAM)、只读存储器 (ROM)、电可擦除可编程只读存储器 (EEPROM)、快闪记忆体或其他光学、磁性存储介质,在此不再一一赘述。It should be noted that examples of the computer-readable storage medium may also include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random Access memory (RAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other optical and magnetic storage media will not be repeated here.
本申请的上述实施例提供的计算机可读存储介质与本申请实施例提供的数据访问方法出于相同的发明构思,具有与其存储的应用程序所采用、运行或实现的方法相同的有益效果。The computer-readable storage medium provided by the above embodiments of the present application is based on the same inventive concept as the data access method provided by the embodiments of the present application, and has the same beneficial effect as the method adopted, run or implemented by the stored application program.
需要说明的是:It should be noted:
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本申请的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the application may be practiced without these specific details. In some instances, well-known structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本申请的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the present application. and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
以上所述,仅为本申请较佳的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a preferred embodiment of the present application, but the scope of protection of the present application is not limited thereto. Any person familiar with the technical field can easily conceive of changes or changes within the technical scope disclosed in this application Replacement should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310935652.3A CN116663066B (en) | 2023-07-28 | 2023-07-28 | Data access method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310935652.3A CN116663066B (en) | 2023-07-28 | 2023-07-28 | Data access method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116663066A true CN116663066A (en) | 2023-08-29 |
CN116663066B CN116663066B (en) | 2024-02-23 |
Family
ID=87717406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310935652.3A Active CN116663066B (en) | 2023-07-28 | 2023-07-28 | Data access method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116663066B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6973493B1 (en) * | 2000-05-09 | 2005-12-06 | Sun Microsystems, Inc. | Mechanism and apparatus for security of newly spawned repository spaces in a distributed computing environment |
CN101572660A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Comprehensive control method for preventing leakage of data |
CN102546782A (en) * | 2011-12-28 | 2012-07-04 | 北京奇虎科技有限公司 | A distributed system and its data operation method |
US20140282940A1 (en) * | 2013-03-15 | 2014-09-18 | salesforce.com,inc. | Method and Apparatus for Multi-Domain Authentication |
CN106326947A (en) * | 2016-08-18 | 2017-01-11 | 徐峰 | Identifier processing method and device |
CN107294920A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | It is a kind of reversely to trust login method and device |
US10057246B1 (en) * | 2015-08-31 | 2018-08-21 | EMC IP Holding Company LLC | Method and system for performing backup operations using access tokens via command line interface (CLI) |
CN114978605A (en) * | 2022-04-25 | 2022-08-30 | 联仁健康医疗大数据科技股份有限公司 | Page access method and device, electronic equipment and storage medium |
-
2023
- 2023-07-28 CN CN202310935652.3A patent/CN116663066B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6973493B1 (en) * | 2000-05-09 | 2005-12-06 | Sun Microsystems, Inc. | Mechanism and apparatus for security of newly spawned repository spaces in a distributed computing environment |
CN101572660A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Comprehensive control method for preventing leakage of data |
CN102546782A (en) * | 2011-12-28 | 2012-07-04 | 北京奇虎科技有限公司 | A distributed system and its data operation method |
US20140282940A1 (en) * | 2013-03-15 | 2014-09-18 | salesforce.com,inc. | Method and Apparatus for Multi-Domain Authentication |
US10057246B1 (en) * | 2015-08-31 | 2018-08-21 | EMC IP Holding Company LLC | Method and system for performing backup operations using access tokens via command line interface (CLI) |
CN107294920A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | It is a kind of reversely to trust login method and device |
CN106326947A (en) * | 2016-08-18 | 2017-01-11 | 徐峰 | Identifier processing method and device |
CN114978605A (en) * | 2022-04-25 | 2022-08-30 | 联仁健康医疗大数据科技股份有限公司 | Page access method and device, electronic equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
李海峰: "基于FPGA的混合服务策略控制系统设计", 《中国优秀硕士学位论文全文数据库•工程科技Ⅱ辑》, no. 02, pages 1 - 16 * |
Also Published As
Publication number | Publication date |
---|---|
CN116663066B (en) | 2024-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7627652B1 (en) | Online shared data environment | |
CN103608809B (en) | Recommending data is enriched with | |
US20190089810A1 (en) | Resource access method, apparatus, and system | |
US9519723B2 (en) | Aggregating electronic content items from different sources | |
WO2021184725A1 (en) | User interface test method and apparatus, storage medium, and computer device | |
JP6347588B2 (en) | A processor implementation method for securely accessing a specific data store, a computer program and a computer system for securing the data store (context-based security screening for accessing data) | |
JP2020504395A (en) | Data sharing in multi-tenant database system | |
TW202024984A (en) | Data reading and writing method and device, electronic equipment | |
JP2020501214A (en) | Kernel event trigger | |
CN102938039A (en) | Selective file access for applications | |
JP2013519945A (en) | Social network media sharing client libraries | |
CN114021089B (en) | Directory access control method, device, equipment and readable storage medium | |
JP2010530589A (en) | Integrated sharing of electronic documents | |
US20180365390A1 (en) | Controlling Use of Shared Content Items Based on Client Device | |
EP2774023A1 (en) | User interface for saving documents using external storage services | |
WO2013143402A1 (en) | Cookie information sharing method and system | |
US20150142776A1 (en) | Techniques for managing writable search results | |
CN108875046A (en) | A kind of storage system access method, device and electronic equipment | |
TW202030658A (en) | Data structure reading method and apparatus, data structure updating method and apparatus, and electronic device | |
US20180032747A1 (en) | System and Method for Database-Level Access Control Using Rule-Based Derived Accessor Groups | |
CN114996675A (en) | Data query method and device, computer equipment and storage medium | |
CN118689858A (en) | A reliable log record management and construction assembly method for the digital network and a log tracing method | |
CN110298751A (en) | Cross-platform transaction data processing method, device, terminal and storage medium | |
AU2020379690A1 (en) | Capability management method and computer device | |
CN106502977B (en) | A form processing method and form system based on B/S framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |