[go: up one dir, main page]

CN110413582A - A kind of trans-regional data synchronous system based on business rule - Google Patents

A kind of trans-regional data synchronous system based on business rule Download PDF

Info

Publication number
CN110413582A
CN110413582A CN201910607191.0A CN201910607191A CN110413582A CN 110413582 A CN110413582 A CN 110413582A CN 201910607191 A CN201910607191 A CN 201910607191A CN 110413582 A CN110413582 A CN 110413582A
Authority
CN
China
Prior art keywords
file
module
user
client
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910607191.0A
Other languages
Chinese (zh)
Inventor
寇亚孟
罗永秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hongyi Software Technology Co Ltd
Original Assignee
Shanghai Hongyi Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hongyi Software Technology Co Ltd filed Critical Shanghai Hongyi Software Technology Co Ltd
Priority to CN201910607191.0A priority Critical patent/CN110413582A/en
Publication of CN110413582A publication Critical patent/CN110413582A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/178Techniques for file synchronisation in file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a kind of trans-regional data synchronous system based on business rule, including client, server module, memory module.Client provides a friendly Visual Intelligent Interface Model, user is set to carry out register, permission control operation and document manipulation, server module authenticates user identity, and permission is controlled by the Rule Builder of regulation engine and rule parsing device, then the file in memory module is written and read, synchronous crypto-operation file to object to be updated.

Description

A kind of trans-regional data synchronous system based on business rule
Technical field
The present invention relates to Internet technical fields, are a kind of trans-regional data synchronous system based on business rule.
Background technique
With the arrival of Internet era, internet information data just increase at a terrific speed.Need of the enterprise to storage Asking can be as the development of business be continuously increased, and all kinds of business datums, which are continuously increased, in enterprise largely occupies these storages, is owned These business datums are not must real-time requirement in business event.And most is that unstructured data is not suitable for using data The technologies such as library are stored, while needing to carry out centainly to share demand.Current existing data synchronous system is Internet user The cloud storage service for being capable of providing in terms of ease for use, reliabilty and availability and ensureing more by force is provided, but enterprise's application is not It can receive its security risk, and its data sharing and synchronization rules are unable to flexible customization.Therefore there is an urgent need to one kind can customize Regulation engine identify whether it is to need the file that exchanges, wherein rule may include accessing by user by regulation engine Ip, the department of user, the position of user, the title of file, the file etc. where file size, file.
Summary of the invention
In view of this, the present invention provide it is a kind of solution or part solve the above problems it is a kind of based on the transregional of business rule Numeric field data synchronization system.
To achieve the effect that above-mentioned technical proposal, the technical solution of the present invention is as follows: a kind of based on the trans-regional of business rule Data synchronous system, which is characterized in that including client (A), server module (B), memory module (C);Client (A) includes User log-in block (1), permission control module (2), document management module (3);Server module (B) includes authentication module (4), rule engine module (5), file synchronization services module (6);
Client (A) is communicated with server module (B) by network connection, and client (A) provides friend for user Good Visual Intelligent Interface Model, user can input log-on message by client (A) and be sent to server module (B) and carry out Authentication, after certification passes through, user can access the file of memory module (C), part of composing a piece of writing of going forward side by side by client (A) Upload, downloading, sharing, simultaneously operating, and can to each file be arranged access authority rule;
User log-in block (1) is the entrance of client (A), and user can be inputted by user log-in block (1) and be logged in Information can also be integrated with single-node login system;Life is encrypted in the user login information that client (A) will acquire It at digital finger-print, is then forwarded to server module (B), server module (B) carries out a series of encrypting and decrypting operation, complete After user identity authentication, user credential is returned to client (A), user carries out the upper of file by document management module (3) It passes, downloading, sharing operation;
Permission control module (2) passes through the log-on message of user log-in block (1), judges that active user goes back for ordinary user It is administrator, and to the open different function of different type user;Administrator can be defined by control module (2) Different groups, each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to group membership; Administrator may be the permission that memory module (C) different blocks and file operation is arranged in current cluster members, including can The block of access, the upload to block file, downloading, sharing, simultaneously operating, operable file size, folder name, file Type;Ordinary user is limited by the permission of group belonging to it first, when ordinary user carries out file by permission control module (2) When uploading with sharing operation, the access authority of file can be set, user type and user including accessible file are to file Operation;
Document management module (3) provides friendly file management interactive interface for user, and user passes through file management mould Block (3) can check that the listed files for currently having operating right, the listed files of listed files and remote storage modules (C) are same Step, and limited by the rules of competence that permission control module (2) defines;User can be by document management module (3) to having permission Access the operation that file carries out rules of competence permission;And in rules of competence allowed band, be arranged file it is automatic upload, under It carries, simultaneously operating;
Server module (B) receives ID authentication request, permission control request and the file operation that client (A) is sent Request, and authentication response, permission control response and file operation response are returned into client (A), as client (A) Request by after the certification of server module (B), memory module (C) will open response file access permission;
What authentication module (4) reception user log-in block (1) generated after user login information is encrypted Digital finger-print is verified digital finger-print according to key k, then identity after authentication module (4) receives digital finger-print Digital finger-print and authentication response information are back to client (A) and complete authentication by authentication module (4);
Rule engine module (5) includes rule object generator and rule objects resolver;Rule engine module (5), connects It retakes the power and limits the rules of competence that control module (2) defines, the rules of competence are sent to rule by permission control module (2) with the format of JSON The rule script generator of then engine modules (5), rule engine module (5) handles JSON data, generates one completely Rule objects, rule objects include user right rule objects, effective rule objects and operation rules object;Rule parsing It is recursive successively to carry out traversal generation one to user right rule objects, effective rule objects and operation rules object for device Complete regular expression, regular expression are successively compared each single item rule, finally return to whether one meet rule Logical value;When logical value is judged as it is true when, to client (A) authorize its request permission operation;It is on the contrary then refuse client (A) requested permission operation;
File synchronization services module (6) receives the permission control of rule engine module (5), when client (A) issues file After operation requests, rule engine module (5) carries out permission judgement to the operation of user, open file behaviour after being judged by permission Make permission;The file information in file operation service module (6) timing scan memory module (C) generates a file information table, When client (A) demand file, which operates, to be serviced, upload, downloading, update operation including file, all by file synchronization services mould Block (6) is handled;File synchronization services are divided into source object and object to be updated by file synchronization module (6), work as regulation engine Module (5) judge source object have permission treat upgating object carry out data simultaneously operating when, update the file information of scanning first Table, record operation, then establish the communication link of source object Yu object to be updated, to source object file carry out encrypt be sent to Upgating object;
Memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system Source;Memory module (C) is communicated with server module (B), when client (A) initiates file storage to server module (B) When request, server module (B) carries out safety and purview certification to client (A), when client (A) passes through server module (B) after safety and purview certification, server module (B) will generate the metamessage of upper transmitting file, and request to memory module (C) Storage resource, memory module (C) execute file storage operations, including filename, file size, file mark number, file come Source, file uplink time, file last time modification time, file download number.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of trans-regional data synchronous system based on business rule.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain The present invention is not intended to limit the present invention, and the product for being able to achieve said function belongs to equivalent replacement and improvement, is all contained in this hair Within bright protection scope.The specific method is as follows:
Embodiment 1: it will illustrate such as to a kind of application scenarios of trans-regional data synchronous system based on business rule below Under:
A kind of trans-regional data synchronous system based on business rule, method comprise the steps of:
Including client (A), server module (B), memory module (C);The client (A) includes user log-in block (1), permission control module (2), document management module (3);The server module (B) includes authentication module (4), rule Then engine modules (5), file synchronization services module (6);
Client (A) is communicated with the server module (B) by network connection, and the client (A) is user Friendly Visual Intelligent Interface Model is provided, user can input log-on message by the client (A) and be sent to described Server module (B) carries out authentication, and after certification passes through, user can access the storage by the client (A) The file of module (C), upload, downloading, sharing, the simultaneously operating of part of composing a piece of writing of going forward side by side, and access right can be arranged to each file Limit gauge is then;
User log-in block (1) is the entrance of the client (A), and user can pass through the user log-in block (1) Log-on message is inputted, can also be integrated with single-node login system;The user login information that the client (A) will acquire into Row encryption generates digital finger-print, is then forwarded to the server module (B), and the server module (B) carries out a system The encrypting and decrypting of column operates, and after completing user identity authentication, Xiang Suoshu client (A) returns to user credential, and user passes through described Upload, the downloading, sharing operation of document management module (3) progress file;
Permission control module (2) judges that active user uses to be common by the log-on message of the user log-in block (1) Family or administrator, and to the open different function of different type user;Administrator can pass through the control mould Block (2) defines different groups, and each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to In the group;Administrator may be that memory module (C) different blocks and file operation is arranged in current cluster members Permission, including addressable block, the upload to block file, downloading, sharing, simultaneously operating, operable file size, text Part presss from both sides name, file type;Ordinary user is limited by the permission of group belonging to it first, controls mould when ordinary user passes through the permission When block (2) carries out upload and sharing operation to file, the access authority of this document can be set, the use including may have access to this document The operation of family type and user to this document;
Document management module (3) provides friendly file management interactive interface for user, and user passes through the file pipe Reason module (3) can check the listed files for currently having operating right, the text of this document list and the long-range memory module (C) Part list synchronization, and limited by the rules of competence that the permission control module (2) defines;User can pass through the file management Module (3) carries out the operation of rules of competence permission to file is had permission to access;And in rules of competence allowed band, file is set It is automatic upload, downloading, simultaneously operating;
Server module (B) receives ID authentication request, permission control request and the file that the client (A) sends Operation requests, and authentication response, permission control response and file operation response are returned into the client (A), work as institute After stating certification of the request of client (A) by the server module (B), the memory module (C) will open the text of response Part access authority;
Authentication module (4) receives raw after user login information is encrypted in the user log-in block (1) At digital finger-print digital finger-print is verified according to key k after the authentication module (4) receives digital finger-print, Then digital finger-print and authentication response information are back to the client (A) completion identity and recognized by the authentication module (4) Card;
Rule engine module (5) includes rule object generator and rule objects resolver;The rule engine module (5), the rules of competence that the permission control module (2) defines are received, the rules of competence are controlled with the format of JSON by the permission Module (2) is sent to the rule engine module (5), and the rule script generator of the rule engine module (5) is to JSON number According to being handled, generate a complete rule objects, the object include user right rule objects, effective rule objects and Operation rules object;Rule parsing device to user right rule objects, effective rule objects and operation rules object, successively into Row traversal generates a recursive complete regular expression, which is successively compared each single item rule, most The logical value for whether meeting rule is returned afterwards;When logical value is judged as it is true when, Xiang Suoshu client (A) authorize its request Permission operation;It is on the contrary then refuse client (A) requested permission operation;
File synchronization services module (6) receives the permission control of the rule engine module (5), as the client (A) After issuing file operation requests, the rule engine module (5) carries out permission judgement to the operation of the user, when passing through permission Open file operation permission after judgement;File in memory module (C) described in file operation service module (6) timing scan Information generates a file information table, when the client (A) demand file, which operates, to be serviced, upload including file, under It carries, update operation, all handled by the file synchronization services module (6);The file synchronization module (6) is by file synchronization Service is divided into source object and object to be updated, when the rule engine module (5) judges that the source object has permission to be updated right When as carrying out data simultaneously operating, the file information table of scanning is updated first, records the operation, then establish source object and to more The communication link of new object carries out encryption to source object file and is sent to object to be updated;
Memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system Source;The memory module (C) is communicated with the server module (B), when the client (A) Xiang Suoshu server mould When block (B) initiates file storage request, the server module (B) carries out safety and purview certification to the client (A), when After safety and purview certification that the client (A) passes through the server module (B), the server module (B) will be generated The metamessage of upper transmitting file, and storage resource is requested to the memory module (C), the memory module (C) executes file storage Operation, including filename, file size, file mark number, document source, file uplink time, file last time modification time, File download number.
Beneficial achievement: the present invention provides a kind of trans-regional data synchronous system based on business rule is matched by rule Method is set, can be flexibly according to business demand, in the environment of network limitation, swap file, improves file as desired Safety simultaneously, provides the convenience that file uses, and decreases system because of the cost that business reorganization is rebuild.
The foregoing is merely the preferred embodiments of the invention, the claims that are not intended to limit the invention. Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention The equivalent change that disclosure is completed, should be included in the covering scope of the claims.

Claims (1)

1. a kind of trans-regional data synchronous system based on business rule, which is characterized in that including client (A), server mould Block (B), memory module (C);The client (A) includes user log-in block (1), permission control module (2), file management mould Block (3);The server module (B) includes authentication module (4), rule engine module (5), file synchronization services module (6);
The client (A) is communicated with the server module (B) by network connection, and the client (A) is user Friendly Visual Intelligent Interface Model is provided, user can input log-on message by the client (A) and be sent to described Server module (B) carries out authentication, and after certification passes through, user can access the storage by the client (A) The file of module (C), upload, downloading, sharing, the simultaneously operating of part of composing a piece of writing of going forward side by side, and access right can be arranged to each file Limit gauge is then;
The user log-in block (1) is the entrance of the client (A), and user can pass through the user log-in block (1) Log-on message is inputted, can also be integrated with single-node login system;The user login information that the client (A) will acquire into Row encryption generates digital finger-print, is then forwarded to the server module (B), and the server module (B) carries out a system The encrypting and decrypting of column operates, and after completing user identity authentication, Xiang Suoshu client (A) returns to user credential, and user passes through described Upload, the downloading, sharing operation of document management module (3) progress file;
The permission control module (2) judges that active user uses to be common by the log-on message of the user log-in block (1) Family or administrator, and to the open different function of different type user;Administrator can pass through the control mould Block (2) defines different groups, and each group can define different group membership's screening rules, and the user for meeting current group rule then belongs to In group membership;Administrator may be that memory module (C) different blocks and file operation is arranged in current cluster members Permission, including addressable block, the upload to block file, downloading, sharing, simultaneously operating, operable file size, Folder name, file type;Ordinary user is limited by the permission of group belonging to it first, when ordinary user is controlled by the permission When module (2) carries out upload and sharing operation to file, the access authority of file can be set, the user including accessible file The operation of type and user to file;
The document management module (3) provides friendly file management interactive interface for user, and user passes through the file pipe Reason module (3) can check the listed files for currently having operating right, the file of listed files and the long-range memory module (C) List synchronization, and limited by the rules of competence that the permission control module (2) defines;User can pass through the file management mould Block (3) carries out the operation of rules of competence permission to file is had permission to access;And in rules of competence allowed band, file is set It is automatic to upload, download, simultaneously operating;
The server module (B) receives ID authentication request, permission control request and the file that the client (A) sends Operation requests, and authentication response, permission control response and file operation response are returned into the client (A), work as institute After stating certification of the request of client (A) by the server module (B), the memory module (C) will open the text of response Part access authority;
The authentication module (4) receives raw after user login information is encrypted in the user log-in block (1) At digital finger-print digital finger-print is verified according to key k after the authentication module (4) receives digital finger-print, Then digital finger-print and authentication response information are back to the client (A) completion identity and recognized by the authentication module (4) Card;
The rule engine module (5) includes rule object generator and rule objects resolver;The rule engine module (5), the rules of competence that the permission control module (2) defines are received, the rules of competence are controlled with the format of JSON by the permission Module (2) is sent to the rule engine module (5), and the rule script generator of the rule engine module (5) is to JSON number According to being handled, a complete rule objects are generated, rule objects include user right rule objects, effective rule objects With operation rules object;Rule parsing device is to user right rule objects, effective rule objects and operation rules object, successively It carries out traversal and generates a recursive complete regular expression, regular expression is successively compared each single item rule, most The logical value for whether meeting rule is returned afterwards;When logical value is judged as it is true when, Xiang Suoshu client (A) authorize its request Permission operation;It is on the contrary then refuse client (A) requested permission operation;
The file synchronization services module (6) receives the permission control of the rule engine module (5), as the client (A) After issuing file operation requests, the rule engine module (5) carries out permission judgement to the operation of user, judges when by permission File operation permission is opened afterwards;File letter in memory module (C) described in file operation service module (6) timing scan Breath, generates a file information table, when the client (A) demand file, which operates, to be serviced, upload, downloading including file, Operation is updated, is all handled by the file synchronization services module (6);The file synchronization module (6) takes file synchronization Business be divided into source object and object to be updated, when the rule engine module (5) judge source object have permission treat upgating object into When row data simultaneously operating, the file information table of scanning is updated first, then source object and object to be updated are established in record operation Communication link, to source object file carry out encryption be sent to object to be updated;
The memory module (C) provides mass memory money that is reliable, easily extending in a manner of the distributed storage of cloud, for system Source;The memory module (C) is communicated with the server module (B), when the client (A) Xiang Suoshu server module (B) when initiating file storage request, the server module (B) carries out safety and purview certification to the client (A), works as institute After stating the safety and purview certification that client (A) passes through the server module (B), the server module (B) will be in generation The metamessage of transmitting file, and storage resource is requested to the memory module (C), the memory module (C) executes file storage behaviour Make, including filename, file size, file mark number, document source, file uplink time, file last time modification time, text Part download time.
CN201910607191.0A 2019-07-07 2019-07-07 A kind of trans-regional data synchronous system based on business rule Pending CN110413582A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910607191.0A CN110413582A (en) 2019-07-07 2019-07-07 A kind of trans-regional data synchronous system based on business rule

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910607191.0A CN110413582A (en) 2019-07-07 2019-07-07 A kind of trans-regional data synchronous system based on business rule

Publications (1)

Publication Number Publication Date
CN110413582A true CN110413582A (en) 2019-11-05

Family

ID=68360573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910607191.0A Pending CN110413582A (en) 2019-07-07 2019-07-07 A kind of trans-regional data synchronous system based on business rule

Country Status (1)

Country Link
CN (1) CN110413582A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314342A (en) * 2020-02-15 2020-06-19 西安奥卡云数据科技有限公司 Internet of things rule engine operation method
CN111913979A (en) * 2020-09-29 2020-11-10 大汉软件股份有限公司 Multi-terminal data updating conflict solution method based on block authority lock
CN112346758A (en) * 2020-10-09 2021-02-09 北京国电通网络技术有限公司 A digital infrastructure business update platform, update method and electronic device
CN112579013A (en) * 2020-12-24 2021-03-30 安徽航天信息科技有限公司 File filling-in printing method and device and storage medium
CN112632046A (en) * 2020-12-01 2021-04-09 天翼物联科技有限公司 Cloud rule engine implementation method, system, device and medium
CN112669076A (en) * 2020-12-30 2021-04-16 平安证券股份有限公司 Data distribution method based on rule engine, server and storage medium
US20220083679A1 (en) * 2020-09-14 2022-03-17 Box, Inc. Broker-assisted workflows
CN116015955A (en) * 2023-01-04 2023-04-25 三峡高科信息技术有限责任公司 Configurable method for verifying validity security of uploading file in application system
CN116610634A (en) * 2023-07-19 2023-08-18 南京中孚信息技术有限公司 File synchronization system and method for network disk terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101073059A (en) * 2004-09-30 2007-11-14 茨特里克斯系统公司 Methods and systems for accessing, by application programs, resources provided by an operating system
CN101833714A (en) * 2010-06-12 2010-09-15 山东中创软件工程股份有限公司 Method, device and system for controlling power of examination and approval
CN104537315A (en) * 2014-12-27 2015-04-22 宁波江东恒冠信息技术有限公司 File usage authority management method, device and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101073059A (en) * 2004-09-30 2007-11-14 茨特里克斯系统公司 Methods and systems for accessing, by application programs, resources provided by an operating system
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101833714A (en) * 2010-06-12 2010-09-15 山东中创软件工程股份有限公司 Method, device and system for controlling power of examination and approval
CN104537315A (en) * 2014-12-27 2015-04-22 宁波江东恒冠信息技术有限公司 File usage authority management method, device and system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314342A (en) * 2020-02-15 2020-06-19 西安奥卡云数据科技有限公司 Internet of things rule engine operation method
US20220083679A1 (en) * 2020-09-14 2022-03-17 Box, Inc. Broker-assisted workflows
CN111913979A (en) * 2020-09-29 2020-11-10 大汉软件股份有限公司 Multi-terminal data updating conflict solution method based on block authority lock
CN112346758B (en) * 2020-10-09 2024-03-12 北京国电通网络技术有限公司 Digital infrastructure service updating platform, updating method and electronic equipment
CN112346758A (en) * 2020-10-09 2021-02-09 北京国电通网络技术有限公司 A digital infrastructure business update platform, update method and electronic device
CN112632046A (en) * 2020-12-01 2021-04-09 天翼物联科技有限公司 Cloud rule engine implementation method, system, device and medium
CN112632046B (en) * 2020-12-01 2024-10-18 天翼物联科技有限公司 Cloud rule engine implementation method, system, device and medium
CN112579013A (en) * 2020-12-24 2021-03-30 安徽航天信息科技有限公司 File filling-in printing method and device and storage medium
CN112669076A (en) * 2020-12-30 2021-04-16 平安证券股份有限公司 Data distribution method based on rule engine, server and storage medium
CN116015955B (en) * 2023-01-04 2023-12-01 三峡高科信息技术有限责任公司 Configurable method for verifying validity security of uploading file in application system
CN116015955A (en) * 2023-01-04 2023-04-25 三峡高科信息技术有限责任公司 Configurable method for verifying validity security of uploading file in application system
CN116610634A (en) * 2023-07-19 2023-08-18 南京中孚信息技术有限公司 File synchronization system and method for network disk terminal
CN116610634B (en) * 2023-07-19 2023-09-26 南京中孚信息技术有限公司 File synchronization system and method for network disk terminal

Similar Documents

Publication Publication Date Title
CN110413582A (en) A kind of trans-regional data synchronous system based on business rule
US11836616B2 (en) Auditable privacy protection deep learning platform construction method based on block chain incentive mechanism
CN109729168B (en) Data sharing exchange system and method based on block chain
KR102189301B1 (en) System and method for providing blockchain based cloud service with robost security
CN108876599B (en) Poverty relief loan management system
CN106874461B (en) A kind of workflow engine supports multi-data source configuration security access system and method
CN111476548A (en) A blockchain-based job title review method and system
US8856881B2 (en) Method and system for access control by using an advanced command interface server
CN103489233A (en) Electronic door control system with dynamic password
CN107193669A (en) The system and design method of maintenance interface based on mixed cloud or large-scale cluster
CN104718526A (en) Secure mobile framework
CN111510461B (en) System and method for managing WEB application centralized release authority
US20090254968A1 (en) Method, system, and computer program product for virtual world access control management
CN112053274B (en) Construction guide method and device for government block chain network
US6697811B2 (en) Method and system for information management and distribution
CN113821564A (en) Heterogeneous parallel block chain and on-chain data and under-chain contract cooperation method thereof
Dai et al. Digital twin envisioned secure air-ground integrated networks: A blockchain-based approach
CN108462696A (en) A kind of block chain intelligent identity identification system of decentralization
CN109446259A (en) Data processing method and device, processor and storage medium
CN115664760A (en) Data transmission system based on cross-chain architecture and identity privacy protection
CN109743297A (en) Management service system and its working method are done in a kind of cruising
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
KR102258064B1 (en) System and method for providing hybrid blockchain based aircraft control service
CN109754149A (en) Power communication trusted background management system, terminal and power communication trusted system
CN109254872A (en) A kind of security access system for education big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191105