Unlock instant, AI-driven research and patent intelligence for your innovation.

A data access method, device, equipment and storage medium

A data access and data technology, applied in the computer field, can solve problems such as a large number of repetitive codes, overall rigidity, and limited functions, and achieve the effect of flexible function realization

Active Publication Date: 2021-10-29
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned technical solution is simple and intuitive. However, such a data permission control method depends on the code implementation and the label is solidified. There are a lot of repeated codes and complex customized codes, which are relatively rigid and limited in function as a whole; Changes often require more code modification to support new requirements, and the later maintenance costs are higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data access method, device, equipment and storage medium
  • A data access method, device, equipment and storage medium
  • A data access method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is a flowchart of a data access method provided in Embodiment 1 of the present disclosure. This embodiment is applicable to the situation of accessing data based on data access rights, and especially applicable to the situation of accessing data based on an established data rights control model. The method can be executed by the data access device provided in the embodiment of the present disclosure, the device can be implemented by software and / or hardware, and the device can be integrated on various user terminal devices or servers.

[0034] see figure 1 , the method of the embodiment of the present disclosure specifically includes the following steps:

[0035] S110. When a triggering event for accessing data is detected, obtain the triggering user and the data to be accessed corresponding to the triggering event, and the constructed data authority control model, wherein the data authority control model is constructed based on a hierarchical relationship...

Embodiment 2

[0054] image 3 It is a flow chart of a data access method provided in Embodiment 2 of the present disclosure. This embodiment is optimized on the basis of the first embodiment above. In this embodiment, if the triggering user is determined to have access rights to the data to be accessed based on the data rights control model, it may specifically include: Have access to the data to be accessed.

[0055] Correspondingly, such as image 3 As shown, the method in this embodiment may specifically include the following steps:

[0056] S210. When a trigger event for accessing data is detected, obtain the trigger user and the data to be accessed corresponding to the trigger event, and the constructed data authority control model, wherein the data authority control model is constructed based on a hierarchical relationship, and the hierarchical relationship is used for Presents the subordinate-subordinate relationship of each user with data access requirements in the data access a...

Embodiment 3

[0068] Figure 4 It is a structural block diagram of a data access device provided in Embodiment 3 of the present disclosure, and the device is used to implement the data access method provided in any of the foregoing embodiments. The device and the data access methods in the above embodiments belong to the same inventive concept, and for details not described in detail in the embodiments of the data access device, reference may be made to the above embodiments of the data access method. see Figure 4 , the device may specifically include: a model acquisition module 310 and a data access module 320 .

[0069] Wherein, the model obtaining module 310 is used for obtaining the triggering user and the data to be accessed corresponding to the triggering event when the triggering event of accessing data is detected, and the constructed data authority control model;

[0070] The data access module 320 is configured to allow the trigger user to access the data to be accessed if it i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present disclosure disclose a data access method, apparatus, device, and storage medium. The method includes: when a triggering event for accessing data is detected, acquiring a triggering user and data to be accessed corresponding to the triggering event, and a constructed data permission control model; if based on the data permission control model, determining that the triggering user treats the access data With access rights, it allows triggering users to access the data to be accessed; wherein, the data rights control model is constructed based on the hierarchical relationship, and the hierarchical relationship is used to present the superior-subordinate relationship in the data access rights of each user who has data access requirements. The technical solutions of the embodiments of the present disclosure can determine whether the triggering user has access authority to the data to be accessed based on the constructed data authority control model, thereby realizing data access, and the data authority control implemented based on the model solves the problem of code rigidity. The problem is that it is more flexible in function implementation.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular, to a data access method, device, device, and storage medium. Background technique [0002] Enterprise-level information systems contain a variety of data, some of which are public and visible to all users, such as announcements, notifications, and other public data; some data are private, requiring high confidentiality, and only accessible to Visible to users, such as private data such as sales reports and financial reports, these are common requirements in business-oriented (to Business, toB) business systems. [0003] For the control method of data authority, or the protection method of data privacy, there may be differences among enterprise-level information systems. The general processing method is to record which roles can access this data in a certain field of the data, that is, Record the labels corresponding to the roles that have access ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 郑海波
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD