A data access method, device, equipment and storage medium
A data access and data technology, applied in the computer field, can solve problems such as a large number of repetitive codes, overall rigidity, and limited functions, and achieve the effect of flexible function realization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] figure 1 It is a flowchart of a data access method provided in Embodiment 1 of the present disclosure. This embodiment is applicable to the situation of accessing data based on data access rights, and especially applicable to the situation of accessing data based on an established data rights control model. The method can be executed by the data access device provided in the embodiment of the present disclosure, the device can be implemented by software and / or hardware, and the device can be integrated on various user terminal devices or servers.
[0034] see figure 1 , the method of the embodiment of the present disclosure specifically includes the following steps:
[0035] S110. When a triggering event for accessing data is detected, obtain the triggering user and the data to be accessed corresponding to the triggering event, and the constructed data authority control model, wherein the data authority control model is constructed based on a hierarchical relationship...
Embodiment 2
[0054] image 3 It is a flow chart of a data access method provided in Embodiment 2 of the present disclosure. This embodiment is optimized on the basis of the first embodiment above. In this embodiment, if the triggering user is determined to have access rights to the data to be accessed based on the data rights control model, it may specifically include: Have access to the data to be accessed.
[0055] Correspondingly, such as image 3 As shown, the method in this embodiment may specifically include the following steps:
[0056] S210. When a trigger event for accessing data is detected, obtain the trigger user and the data to be accessed corresponding to the trigger event, and the constructed data authority control model, wherein the data authority control model is constructed based on a hierarchical relationship, and the hierarchical relationship is used for Presents the subordinate-subordinate relationship of each user with data access requirements in the data access a...
Embodiment 3
[0068] Figure 4 It is a structural block diagram of a data access device provided in Embodiment 3 of the present disclosure, and the device is used to implement the data access method provided in any of the foregoing embodiments. The device and the data access methods in the above embodiments belong to the same inventive concept, and for details not described in detail in the embodiments of the data access device, reference may be made to the above embodiments of the data access method. see Figure 4 , the device may specifically include: a model acquisition module 310 and a data access module 320 .
[0069] Wherein, the model obtaining module 310 is used for obtaining the triggering user and the data to be accessed corresponding to the triggering event when the triggering event of accessing data is detected, and the constructed data authority control model;
[0070] The data access module 320 is configured to allow the trigger user to access the data to be accessed if it i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


