Method and system of controlling data access permission
A data access and access control strategy technology, applied in the field of virtualization, can solve problems such as inability to copy each other, achieve the effects of enriching the scope of use, improving interactivity, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0037] In the method and system for controlling data access authority of the present invention, the terminal may be a VDI terminal, based on the terminal, the user may be used to access the virtual data center, usually, the specific hardware device corresponding to the terminal may not have high performance Instead, all data is stored in the corresponding virtual data center, thereby improving data security; the terminal can also be understood as a thin client in VDI products. The virtual data center can be understood as a complete data storage system composed of each virtual desktop computer and each virtualized data server after desktop virtualization. The desktop ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com