Data access method and device, electronic equipment and storage medium

A data access and data technology, applied in the Internet field, can solve problems such as high labor costs and high error rates, and achieve the effects of solving high labor costs, avoiding access conflicts, and solving high error rates

Active Publication Date: 2021-06-25
CCB FINTECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to lack of experience or operational errors, the manual authorization method has problems of high error rate and high labor cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and device, electronic equipment and storage medium
  • Data access method and device, electronic equipment and storage medium
  • Data access method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a flow chart of a data access method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where multiple users efficiently access the same data. The method can be executed by a data access device, which can be implemented by software and / or It is realized by means of hardware, and generally can be integrated in electronic equipment. Correspondingly, such as figure 1 As shown, the method includes the following operations:

[0038] Usually, only one user is allowed to log in at the data requesting end, or at most two users are allowed to log in to the same data requesting end after user login settings are configured. However, in the actual business execution process, multiple users are often required to log in to the same data requesting end. At present, the multi-user login setting of the data requesting end is mainly set manually. When it is necessary to set the multi-user login setting of multiple data reque...

Embodiment 2

[0055] figure 2 It is a flowchart of a data access method provided by Embodiment 2 of the present invention. This embodiment is embodied on the basis of the above-mentioned embodiments. In this embodiment, it is limited that the first initialization configuration instruction may include program installation instructions and data Responder association configuration instructions, give specific optional implementation schemes for configuring multi-user login initialization program according to program installation instructions and data response end association configuration instructions, correspondingly, as figure 2 As shown, the method includes the following operations:

[0056] S210. Install the multi-user login authorization program in response to the program installation instruction.

[0057] Wherein, the program installation instruction may be used to install part of programs in the multi-user login initialization program. The multi-user login authorization program may b...

Embodiment 3

[0101] Figure 4It is a flow chart of a data access method provided by Embodiment 3 of the present invention. This embodiment is applicable to the situation where multiple users efficiently access the same data. The method can be executed by a data access device, which can be implemented by software and / or It is realized by means of hardware, and generally can be integrated in electronic equipment. Correspondingly, such as Figure 4 As shown, the method includes the following operations:

[0102] S310. Configure a multi-user login authorization program in response to the second initialization configuration instruction.

[0103] Wherein, the second initialization configuration instruction may be used to perform initial configuration of multi-user authorization on the data responder. The user login authorization program may be an application program corresponding to the initial configuration of multi-user authorization at the data response end, and is used to perform initial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data access method and device, electronic equipment and a storage medium. The data access method relates to the technical field of Internet, and further relates to cloud computing and virtualization technologies, and comprises the following steps: in response to a first initialization configuration instruction, configuring a multi-user login initialization program to obtain initialization configuration data; making a data request end mirror image file according to the initialization configuration data, so that a mirror image data request end performs multi-user login initialization configuration according to the data request end mirror image file; sending the data request to a data response end, and obtaining response data fed back by the data response end. According to the technical scheme, the access conflict of multiple users to the same data can be avoided, and the efficiency of multiple users to access the same data is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of the Internet, in particular to cloud computing and virtualization technologies, and in particular to a data access method, device, electronic equipment, and storage medium. Background technique [0002] With the development of Internet technology, users can access data based on terminal equipment, but when multiple users access the same data at the same time, conflicts often exist. How to avoid access conflicts caused by multiple users accessing the same data is a problem that needs to be solved . [0003] In the prior art, in order to resolve access conflicts caused by multiple users accessing the same data, it is mainly through manual authorization of user rights to access unified data. However, due to lack of experience or operational errors, the manual authorization method has the problems of high error rate and high labor cost. Contents of the invention [0004] Embodime...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604Y02D10/00
Inventor 刘凯鸿
Owner CCB FINTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products