Data access method, system and data warehouse
A data access and data collection technology, applied in the direction of digital data authentication, digital data protection, electronic digital data processing, etc., can solve the problems of not having file 2 access rights, different rights, difficulties, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Figure 1a A flowchart showing a data access method according to Embodiment 1 of the present invention. Such as Figure 1aAs shown, the data access methods include:
[0059] Step 100: Receive an access request event submitted by a first user, where the access request event carries multiple data sets to be accessed specified by the first user, and the multiple data sets are created by multiple users.
[0060] Specifically, a data warehouse such as Hive can access a file system based on a parallel computing (English: MapReduce, abbreviation: MR) system. A user data set may be stored in the data warehouse, and the data set may be implemented in the form of a user data table, and the user data set may belong to different users. In actual business scenarios, users may need to cross access each other's data sets. For example, a first user may need to associate a second user's user data table with its own user data table. The second user may be a user other than the first u...
Embodiment 2
[0073] figure 2 A flowchart showing a data access method according to Embodiment 2 of the present invention. figure 2 Winning mark and Figure 1a The same steps have the same functions, and detailed descriptions of these steps are omitted for brevity.
[0074] Such as figure 2 As shown, this embodiment and Figure 1a The main difference in the data access methods shown is that step 140 may include:
[0075] Step 200, obtaining the identity authentication authority of each user ID;
[0076] Step 210, establishing a corresponding relationship between the identity authentication authority of each user ID and the file storage path information corresponding to each data set;
[0077] Therefore, in step 150 of the above embodiment, the parallel access task issued by the data warehouse to the parallel computing system may also include the corresponding relationship.
[0078] For example, if Figure 1b As shown, after Hive receives the access request event, it can search for...
Embodiment 3
[0085] image 3 A flowchart showing a data access method according to Embodiment 3 of the present invention. image 3 Winning mark and Figure 1a and figure 2 The same steps in have the same functions, and for the sake of brevity, detailed descriptions of these steps are omitted.
[0086] Such as image 3 As shown, this embodiment and Figure 1a and figure 2 The main difference of the data access methods shown is that, if the identity authentication authority includes a super token, step 140 may also include:
[0087] Step 300, obtain a super token, and the super token allows access to data collections of all users.
[0088] Specifically, a super token that can access the data sets of all users in the file system can be preset, and the super token can be stored in the authority configuration information module of the user access table of the data warehouse. After the data warehouse receives the access request event, the super token can be obtained from the authority c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


