CN110413582A - A kind of trans-regional data synchronous system based on business rule - Google Patents
A kind of trans-regional data synchronous system based on business rule Download PDFInfo
- Publication number
- CN110413582A CN110413582A CN201910607191.0A CN201910607191A CN110413582A CN 110413582 A CN110413582 A CN 110413582A CN 201910607191 A CN201910607191 A CN 201910607191A CN 110413582 A CN110413582 A CN 110413582A
- Authority
- CN
- China
- Prior art keywords
- file
- module
- user
- client
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/178—Techniques for file synchronisation in file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to a kind of trans-regional data synchronous system based on business rule, including client, server module, memory module.Client provides a friendly Visual Intelligent Interface Model, user is set to carry out register, permission control operation and document manipulation, server module authenticates user identity, and permission is controlled by the Rule Builder of regulation engine and rule parsing device, then the file in memory module is written and read, synchronous crypto-operation file to object to be updated.
Description
Technical field
The present invention relates to Internet technical fields, are a kind of trans-regional data synchronous system based on business rule.
Background technique
With the arrival of Internet era, internet information data just increase at a terrific speed.Need of the enterprise to storage
Asking can be as the development of business be continuously increased, and all kinds of business datums, which are continuously increased, in enterprise largely occupies these storages, is owned
These business datums are not must real-time requirement in business event.And most is that unstructured data is not suitable for using data
The technologies such as library are stored, while needing to carry out centainly to share demand.Current existing data synchronous system is Internet user
The cloud storage service for being capable of providing in terms of ease for use, reliabilty and availability and ensureing more by force is provided, but enterprise's application is not
It can receive its security risk, and its data sharing and synchronization rules are unable to flexible customization.Therefore there is an urgent need to one kind can customize
Regulation engine identify whether it is to need the file that exchanges, wherein rule may include accessing by user by regulation engine
Ip, the department of user, the position of user, the title of file, the file etc. where file size, file.
Summary of the invention
In view of this, the present invention provide it is a kind of solution or part solve the above problems it is a kind of based on the transregional of business rule
Numeric field data synchronization system.
To achieve the effect that above-mentioned technical proposal, the technical solution of the present invention is as follows: a kind of based on the trans-regional of business rule
Data synchronous system, which is characterized in that including client (A), server module (B), memory module (C);Client (A) includes
User log-in block (1), permission control module (2), document management module (3);Server module (B) includes authentication module
(4), rule engine module (5), file synchronization services module (6);
Client (A) is communicated with server module (B) by network connection, and client (A) provides friend for user
Good Visual Intelligent Interface Model, user can input log-on message by client (A) and be sent to server module (B) and carry out
Authentication, after certification passes through, user can access the file of memory module (C), part of composing a piece of writing of going forward side by side by client (A)
Upload, downloading, sharing, simultaneously operating, and can to each file be arranged access authority rule;
User log-in block (1) is the entrance of client (A), and user can be inputted by user log-in block (1) and be logged in
Information can also be integrated with single-node login system;Life is encrypted in the user login information that client (A) will acquire
It at digital finger-print, is then forwarded to server module (B), server module (B) carries out a series of encrypting and decrypting operation, complete
After user identity authentication, user credential is returned to client (A), user carries out the upper of file by document management module (3)
It passes, downloading, sharing operation;
Permission control module (2) passes through the log-on message of user log-in block (1), judges that active user goes back for ordinary user
It is administrator, and to the open different function of different type user;Administrator can be defined by control module (2)
Different groups, each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to group membership;
Administrator may be the permission that memory module (C) different blocks and file operation is arranged in current cluster members, including can
The block of access, the upload to block file, downloading, sharing, simultaneously operating, operable file size, folder name, file
Type;Ordinary user is limited by the permission of group belonging to it first, when ordinary user carries out file by permission control module (2)
When uploading with sharing operation, the access authority of file can be set, user type and user including accessible file are to file
Operation;
Document management module (3) provides friendly file management interactive interface for user, and user passes through file management mould
Block (3) can check that the listed files for currently having operating right, the listed files of listed files and remote storage modules (C) are same
Step, and limited by the rules of competence that permission control module (2) defines;User can be by document management module (3) to having permission
Access the operation that file carries out rules of competence permission;And in rules of competence allowed band, be arranged file it is automatic upload, under
It carries, simultaneously operating;
Server module (B) receives ID authentication request, permission control request and the file operation that client (A) is sent
Request, and authentication response, permission control response and file operation response are returned into client (A), as client (A)
Request by after the certification of server module (B), memory module (C) will open response file access permission;
What authentication module (4) reception user log-in block (1) generated after user login information is encrypted
Digital finger-print is verified digital finger-print according to key k, then identity after authentication module (4) receives digital finger-print
Digital finger-print and authentication response information are back to client (A) and complete authentication by authentication module (4);
Rule engine module (5) includes rule object generator and rule objects resolver;Rule engine module (5), connects
It retakes the power and limits the rules of competence that control module (2) defines, the rules of competence are sent to rule by permission control module (2) with the format of JSON
The rule script generator of then engine modules (5), rule engine module (5) handles JSON data, generates one completely
Rule objects, rule objects include user right rule objects, effective rule objects and operation rules object;Rule parsing
It is recursive successively to carry out traversal generation one to user right rule objects, effective rule objects and operation rules object for device
Complete regular expression, regular expression are successively compared each single item rule, finally return to whether one meet rule
Logical value;When logical value is judged as it is true when, to client (A) authorize its request permission operation;It is on the contrary then refuse client
(A) requested permission operation;
File synchronization services module (6) receives the permission control of rule engine module (5), when client (A) issues file
After operation requests, rule engine module (5) carries out permission judgement to the operation of user, open file behaviour after being judged by permission
Make permission;The file information in file operation service module (6) timing scan memory module (C) generates a file information table,
When client (A) demand file, which operates, to be serviced, upload, downloading, update operation including file, all by file synchronization services mould
Block (6) is handled;File synchronization services are divided into source object and object to be updated by file synchronization module (6), work as regulation engine
Module (5) judge source object have permission treat upgating object carry out data simultaneously operating when, update the file information of scanning first
Table, record operation, then establish the communication link of source object Yu object to be updated, to source object file carry out encrypt be sent to
Upgating object;
Memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system
Source;Memory module (C) is communicated with server module (B), when client (A) initiates file storage to server module (B)
When request, server module (B) carries out safety and purview certification to client (A), when client (A) passes through server module
(B) after safety and purview certification, server module (B) will generate the metamessage of upper transmitting file, and request to memory module (C)
Storage resource, memory module (C) execute file storage operations, including filename, file size, file mark number, file come
Source, file uplink time, file last time modification time, file download number.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of trans-regional data synchronous system based on business rule.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain
The present invention is not intended to limit the present invention, and the product for being able to achieve said function belongs to equivalent replacement and improvement, is all contained in this hair
Within bright protection scope.The specific method is as follows:
Embodiment 1: it will illustrate such as to a kind of application scenarios of trans-regional data synchronous system based on business rule below
Under:
A kind of trans-regional data synchronous system based on business rule, method comprise the steps of:
Including client (A), server module (B), memory module (C);The client (A) includes user log-in block
(1), permission control module (2), document management module (3);The server module (B) includes authentication module (4), rule
Then engine modules (5), file synchronization services module (6);
Client (A) is communicated with the server module (B) by network connection, and the client (A) is user
Friendly Visual Intelligent Interface Model is provided, user can input log-on message by the client (A) and be sent to described
Server module (B) carries out authentication, and after certification passes through, user can access the storage by the client (A)
The file of module (C), upload, downloading, sharing, the simultaneously operating of part of composing a piece of writing of going forward side by side, and access right can be arranged to each file
Limit gauge is then;
User log-in block (1) is the entrance of the client (A), and user can pass through the user log-in block (1)
Log-on message is inputted, can also be integrated with single-node login system;The user login information that the client (A) will acquire into
Row encryption generates digital finger-print, is then forwarded to the server module (B), and the server module (B) carries out a system
The encrypting and decrypting of column operates, and after completing user identity authentication, Xiang Suoshu client (A) returns to user credential, and user passes through described
Upload, the downloading, sharing operation of document management module (3) progress file;
Permission control module (2) judges that active user uses to be common by the log-on message of the user log-in block (1)
Family or administrator, and to the open different function of different type user;Administrator can pass through the control mould
Block (2) defines different groups, and each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to
In the group;Administrator may be that memory module (C) different blocks and file operation is arranged in current cluster members
Permission, including addressable block, the upload to block file, downloading, sharing, simultaneously operating, operable file size, text
Part presss from both sides name, file type;Ordinary user is limited by the permission of group belonging to it first, controls mould when ordinary user passes through the permission
When block (2) carries out upload and sharing operation to file, the access authority of this document can be set, the use including may have access to this document
The operation of family type and user to this document;
Document management module (3) provides friendly file management interactive interface for user, and user passes through the file pipe
Reason module (3) can check the listed files for currently having operating right, the text of this document list and the long-range memory module (C)
Part list synchronization, and limited by the rules of competence that the permission control module (2) defines;User can pass through the file management
Module (3) carries out the operation of rules of competence permission to file is had permission to access;And in rules of competence allowed band, file is set
It is automatic upload, downloading, simultaneously operating;
Server module (B) receives ID authentication request, permission control request and the file that the client (A) sends
Operation requests, and authentication response, permission control response and file operation response are returned into the client (A), work as institute
After stating certification of the request of client (A) by the server module (B), the memory module (C) will open the text of response
Part access authority;
Authentication module (4) receives raw after user login information is encrypted in the user log-in block (1)
At digital finger-print digital finger-print is verified according to key k after the authentication module (4) receives digital finger-print,
Then digital finger-print and authentication response information are back to the client (A) completion identity and recognized by the authentication module (4)
Card;
Rule engine module (5) includes rule object generator and rule objects resolver;The rule engine module
(5), the rules of competence that the permission control module (2) defines are received, the rules of competence are controlled with the format of JSON by the permission
Module (2) is sent to the rule engine module (5), and the rule script generator of the rule engine module (5) is to JSON number
According to being handled, generate a complete rule objects, the object include user right rule objects, effective rule objects and
Operation rules object;Rule parsing device to user right rule objects, effective rule objects and operation rules object, successively into
Row traversal generates a recursive complete regular expression, which is successively compared each single item rule, most
The logical value for whether meeting rule is returned afterwards;When logical value is judged as it is true when, Xiang Suoshu client (A) authorize its request
Permission operation;It is on the contrary then refuse client (A) requested permission operation;
File synchronization services module (6) receives the permission control of the rule engine module (5), as the client (A)
After issuing file operation requests, the rule engine module (5) carries out permission judgement to the operation of the user, when passing through permission
Open file operation permission after judgement;File in memory module (C) described in file operation service module (6) timing scan
Information generates a file information table, when the client (A) demand file, which operates, to be serviced, upload including file, under
It carries, update operation, all handled by the file synchronization services module (6);The file synchronization module (6) is by file synchronization
Service is divided into source object and object to be updated, when the rule engine module (5) judges that the source object has permission to be updated right
When as carrying out data simultaneously operating, the file information table of scanning is updated first, records the operation, then establish source object and to more
The communication link of new object carries out encryption to source object file and is sent to object to be updated;
Memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system
Source;The memory module (C) is communicated with the server module (B), when the client (A) Xiang Suoshu server mould
When block (B) initiates file storage request, the server module (B) carries out safety and purview certification to the client (A), when
After safety and purview certification that the client (A) passes through the server module (B), the server module (B) will be generated
The metamessage of upper transmitting file, and storage resource is requested to the memory module (C), the memory module (C) executes file storage
Operation, including filename, file size, file mark number, document source, file uplink time, file last time modification time,
File download number.
Beneficial achievement: the present invention provides a kind of trans-regional data synchronous system based on business rule is matched by rule
Method is set, can be flexibly according to business demand, in the environment of network limitation, swap file, improves file as desired
Safety simultaneously, provides the convenience that file uses, and decreases system because of the cost that business reorganization is rebuild.
The foregoing is merely the preferred embodiments of the invention, the claims that are not intended to limit the invention.
Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention
The equivalent change that disclosure is completed, should be included in the covering scope of the claims.
Claims (1)
1. a kind of trans-regional data synchronous system based on business rule, which is characterized in that including client (A), server mould
Block (B), memory module (C);The client (A) includes user log-in block (1), permission control module (2), file management mould
Block (3);The server module (B) includes authentication module (4), rule engine module (5), file synchronization services module
(6);
The client (A) is communicated with the server module (B) by network connection, and the client (A) is user
Friendly Visual Intelligent Interface Model is provided, user can input log-on message by the client (A) and be sent to described
Server module (B) carries out authentication, and after certification passes through, user can access the storage by the client (A)
The file of module (C), upload, downloading, sharing, the simultaneously operating of part of composing a piece of writing of going forward side by side, and access right can be arranged to each file
Limit gauge is then;
The user log-in block (1) is the entrance of the client (A), and user can pass through the user log-in block (1)
Log-on message is inputted, can also be integrated with single-node login system;The user login information that the client (A) will acquire into
Row encryption generates digital finger-print, is then forwarded to the server module (B), and the server module (B) carries out a system
The encrypting and decrypting of column operates, and after completing user identity authentication, Xiang Suoshu client (A) returns to user credential, and user passes through described
Upload, the downloading, sharing operation of document management module (3) progress file;
The permission control module (2) judges that active user uses to be common by the log-on message of the user log-in block (1)
Family or administrator, and to the open different function of different type user;Administrator can pass through the control mould
Block (2) defines different groups, and each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to
In group membership;Administrator may be that memory module (C) different blocks and file operation is arranged in current cluster members
Permission, including addressable block, the upload to block file, downloading, sharing, simultaneously operating, operable file size,
Folder name, file type;Ordinary user is limited by the permission of group belonging to it first, when ordinary user is controlled by the permission
When module (2) carries out upload and sharing operation to file, the access authority of file can be set, the user including accessible file
The operation of type and user to file;
The document management module (3) provides friendly file management interactive interface for user, and user passes through the file pipe
Reason module (3) can check the listed files for currently having operating right, the file of listed files and the long-range memory module (C)
List synchronization, and limited by the rules of competence that the permission control module (2) defines;User can pass through the file management mould
Block (3) carries out the operation of rules of competence permission to file is had permission to access;And in rules of competence allowed band, file is set
It is automatic to upload, download, simultaneously operating;
The server module (B) receives ID authentication request, permission control request and the file that the client (A) sends
Operation requests, and authentication response, permission control response and file operation response are returned into the client (A), work as institute
After stating certification of the request of client (A) by the server module (B), the memory module (C) will open the text of response
Part access authority;
The authentication module (4) receives raw after user login information is encrypted in the user log-in block (1)
At digital finger-print digital finger-print is verified according to key k after the authentication module (4) receives digital finger-print,
Then digital finger-print and authentication response information are back to the client (A) completion identity and recognized by the authentication module (4)
Card;
The rule engine module (5) includes rule object generator and rule objects resolver;The rule engine module
(5), the rules of competence that the permission control module (2) defines are received, the rules of competence are controlled with the format of JSON by the permission
Module (2) is sent to the rule engine module (5), and the rule script generator of the rule engine module (5) is to JSON number
According to being handled, a complete rule objects are generated, rule objects include user right rule objects, effective rule objects
With operation rules object;Rule parsing device is to user right rule objects, effective rule objects and operation rules object, successively
It carries out traversal and generates a recursive complete regular expression, regular expression is successively compared each single item rule, most
The logical value for whether meeting rule is returned afterwards;When logical value is judged as it is true when, Xiang Suoshu client (A) authorize its request
Permission operation;It is on the contrary then refuse client (A) requested permission operation;
The file synchronization services module (6) receives the permission control of the rule engine module (5), as the client (A)
After issuing file operation requests, the rule engine module (5) carries out permission judgement to the operation of user, judges when by permission
File operation permission is opened afterwards;File letter in memory module (C) described in file operation service module (6) timing scan
Breath, generates a file information table, when the client (A) demand file, which operates, to be serviced, upload, downloading including file,
Operation is updated, is all handled by the file synchronization services module (6);The file synchronization module (6) takes file synchronization
Business be divided into source object and object to be updated, when the rule engine module (5) judge source object have permission treat upgating object into
When row data simultaneously operating, the file information table of scanning is updated first, then source object and object to be updated are established in record operation
Communication link, to source object file carry out encryption be sent to object to be updated;
The memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system
Source;The memory module (C) is communicated with the server module (B), when the client (A) Xiang Suoshu server module
(B) when initiating file storage request, the server module (B) carries out safety and purview certification to the client (A), works as institute
After stating the safety and purview certification that client (A) passes through the server module (B), the server module (B) will be in generation
The metamessage of transmitting file, and storage resource is requested to the memory module (C), the memory module (C) executes file storage behaviour
Make, including filename, file size, file mark number, document source, file uplink time, file last time modification time, text
Part download time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910607191.0A CN110413582A (en) | 2019-07-07 | 2019-07-07 | A kind of trans-regional data synchronous system based on business rule |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910607191.0A CN110413582A (en) | 2019-07-07 | 2019-07-07 | A kind of trans-regional data synchronous system based on business rule |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110413582A true CN110413582A (en) | 2019-11-05 |
Family
ID=68360573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910607191.0A Pending CN110413582A (en) | 2019-07-07 | 2019-07-07 | A kind of trans-regional data synchronous system based on business rule |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110413582A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314342A (en) * | 2020-02-15 | 2020-06-19 | 西安奥卡云数据科技有限公司 | Internet of things rule engine operation method |
CN111913979A (en) * | 2020-09-29 | 2020-11-10 | 大汉软件股份有限公司 | Multi-terminal data updating conflict solution method based on block authority lock |
CN112346758A (en) * | 2020-10-09 | 2021-02-09 | 北京国电通网络技术有限公司 | A digital infrastructure business update platform, update method and electronic device |
CN112579013A (en) * | 2020-12-24 | 2021-03-30 | 安徽航天信息科技有限公司 | File filling-in printing method and device and storage medium |
CN112632046A (en) * | 2020-12-01 | 2021-04-09 | 天翼物联科技有限公司 | Cloud rule engine implementation method, system, device and medium |
CN112669076A (en) * | 2020-12-30 | 2021-04-16 | 平安证券股份有限公司 | Data distribution method based on rule engine, server and storage medium |
US20220083679A1 (en) * | 2020-09-14 | 2022-03-17 | Box, Inc. | Broker-assisted workflows |
CN116015955A (en) * | 2023-01-04 | 2023-04-25 | 三峡高科信息技术有限责任公司 | Configurable method for verifying validity security of uploading file in application system |
CN116610634A (en) * | 2023-07-19 | 2023-08-18 | 南京中孚信息技术有限公司 | File synchronization system and method for network disk terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1967560A (en) * | 2006-11-09 | 2007-05-23 | 华为技术有限公司 | Controlling method of business operations competence and generating method of relational database |
CN101073059A (en) * | 2004-09-30 | 2007-11-14 | 茨特里克斯系统公司 | Methods and systems for accessing, by application programs, resources provided by an operating system |
CN101833714A (en) * | 2010-06-12 | 2010-09-15 | 山东中创软件工程股份有限公司 | Method, device and system for controlling power of examination and approval |
CN104537315A (en) * | 2014-12-27 | 2015-04-22 | 宁波江东恒冠信息技术有限公司 | File usage authority management method, device and system |
-
2019
- 2019-07-07 CN CN201910607191.0A patent/CN110413582A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101073059A (en) * | 2004-09-30 | 2007-11-14 | 茨特里克斯系统公司 | Methods and systems for accessing, by application programs, resources provided by an operating system |
CN1967560A (en) * | 2006-11-09 | 2007-05-23 | 华为技术有限公司 | Controlling method of business operations competence and generating method of relational database |
CN101833714A (en) * | 2010-06-12 | 2010-09-15 | 山东中创软件工程股份有限公司 | Method, device and system for controlling power of examination and approval |
CN104537315A (en) * | 2014-12-27 | 2015-04-22 | 宁波江东恒冠信息技术有限公司 | File usage authority management method, device and system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314342A (en) * | 2020-02-15 | 2020-06-19 | 西安奥卡云数据科技有限公司 | Internet of things rule engine operation method |
US20220083679A1 (en) * | 2020-09-14 | 2022-03-17 | Box, Inc. | Broker-assisted workflows |
CN111913979A (en) * | 2020-09-29 | 2020-11-10 | 大汉软件股份有限公司 | Multi-terminal data updating conflict solution method based on block authority lock |
CN112346758B (en) * | 2020-10-09 | 2024-03-12 | 北京国电通网络技术有限公司 | Digital infrastructure service updating platform, updating method and electronic equipment |
CN112346758A (en) * | 2020-10-09 | 2021-02-09 | 北京国电通网络技术有限公司 | A digital infrastructure business update platform, update method and electronic device |
CN112632046A (en) * | 2020-12-01 | 2021-04-09 | 天翼物联科技有限公司 | Cloud rule engine implementation method, system, device and medium |
CN112632046B (en) * | 2020-12-01 | 2024-10-18 | 天翼物联科技有限公司 | Cloud rule engine implementation method, system, device and medium |
CN112579013A (en) * | 2020-12-24 | 2021-03-30 | 安徽航天信息科技有限公司 | File filling-in printing method and device and storage medium |
CN112669076A (en) * | 2020-12-30 | 2021-04-16 | 平安证券股份有限公司 | Data distribution method based on rule engine, server and storage medium |
CN116015955B (en) * | 2023-01-04 | 2023-12-01 | 三峡高科信息技术有限责任公司 | Configurable method for verifying validity security of uploading file in application system |
CN116015955A (en) * | 2023-01-04 | 2023-04-25 | 三峡高科信息技术有限责任公司 | Configurable method for verifying validity security of uploading file in application system |
CN116610634A (en) * | 2023-07-19 | 2023-08-18 | 南京中孚信息技术有限公司 | File synchronization system and method for network disk terminal |
CN116610634B (en) * | 2023-07-19 | 2023-09-26 | 南京中孚信息技术有限公司 | File synchronization system and method for network disk terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110413582A (en) | A kind of trans-regional data synchronous system based on business rule | |
US11836616B2 (en) | Auditable privacy protection deep learning platform construction method based on block chain incentive mechanism | |
CN109729168B (en) | Data sharing exchange system and method based on block chain | |
KR102189301B1 (en) | System and method for providing blockchain based cloud service with robost security | |
CN108876599B (en) | Poverty relief loan management system | |
CN106874461B (en) | A kind of workflow engine supports multi-data source configuration security access system and method | |
CN111476548A (en) | A blockchain-based job title review method and system | |
US8856881B2 (en) | Method and system for access control by using an advanced command interface server | |
CN103489233A (en) | Electronic door control system with dynamic password | |
CN107193669A (en) | The system and design method of maintenance interface based on mixed cloud or large-scale cluster | |
CN104718526A (en) | Secure mobile framework | |
CN111510461B (en) | System and method for managing WEB application centralized release authority | |
US20090254968A1 (en) | Method, system, and computer program product for virtual world access control management | |
CN112053274B (en) | Construction guide method and device for government block chain network | |
US6697811B2 (en) | Method and system for information management and distribution | |
CN113821564A (en) | Heterogeneous parallel block chain and on-chain data and under-chain contract cooperation method thereof | |
Dai et al. | Digital twin envisioned secure air-ground integrated networks: A blockchain-based approach | |
CN108462696A (en) | A kind of block chain intelligent identity identification system of decentralization | |
CN109446259A (en) | Data processing method and device, processor and storage medium | |
CN115664760A (en) | Data transmission system based on cross-chain architecture and identity privacy protection | |
CN109743297A (en) | Management service system and its working method are done in a kind of cruising | |
CN110189440A (en) | A kind of smart lock monitoring equipment and its method based on block chain | |
KR102258064B1 (en) | System and method for providing hybrid blockchain based aircraft control service | |
CN109754149A (en) | Power communication trusted background management system, terminal and power communication trusted system | |
CN109254872A (en) | A kind of security access system for education big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191105 |