File authorization method and system under enterprise network disk, network disk and storage medium

An enterprise network and document technology, applied in the field of electronic information, can solve the problems of increased difficulty in authorization of documents to be authorized, cumbersome operations, data leakage, etc., so as to improve the efficiency of screening and authorization, ensure subsequent normal use, and achieve the effect of authorization.

Active Publication Date: 2022-02-01
天津联想协同科技有限公司
View PDF23 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When the internal data of the enterprise is shared using the network disk service, in order to avoid the leakage of important data within the enterprise, it is necessary to authorize the team or individual according to the level, but the file authorization under the existing enterprise network disk is mostly based on the folder Files in a folder have the same authorization. When you need to grant different permissions to files in the same folder or to grant the same permissions to some files in different folders, you need to filter out the files to be authorized first. , and then put the selected files to be authorized into a folder, and then authorize the folder, the operation is cumbersome, and as the number of files stored in the network disk increases, the difficulty of authorizing the files to be authorized will increase significantly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File authorization method and system under enterprise network disk, network disk and storage medium
  • File authorization method and system under enterprise network disk, network disk and storage medium
  • File authorization method and system under enterprise network disk, network disk and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054]figure 1 The flow chart of the file authorization method under the enterprise network disk provided by Embodiment 1 of the present invention. This embodiment is applicable to the authorization work of the existing label files in the enterprise network disk, and specifically includes the following steps:

[0055] Step 110: Receive the label authorization operation, determine the corresponding label, and screen all files with the same label in the enterprise network disk according to the label.

[0056] Since a large number of files may be stored in the enterprise network disk at the same time, these files have different confidentiality levels or uses, so before authorizing the files, it is necessary to screen the files according to the level and needs of the team or individual to be authorized, and select the files that need to be authorized. The files are authorized to teams or individuals. However, as the file base and the number of authorized files increase, authorized...

Embodiment 2

[0066] figure 2 It is a flow chart of the file authorization method under the enterprise network disk provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, after filtering all files with the same tag in the enterprise network disk according to the tags, the following steps are added:

[0067] When performing label authorization operations based on multiple labels, at least two corresponding labels and connectors are determined, the combination relationship between at least two corresponding labels is determined according to the connectors, and the at least two corresponding labels and connections are determined according to the at least two corresponding labels. character, to filter all files or folders that match the combination relationship in the enterprise network disk.

[0068] Correspondingly, the file authorization method under the enterprise network disk provided by this embodiment s...

Embodiment 3

[0078] image 3 It is a flow chart of the file authorization method under the enterprise network disk provided by Embodiment 3 of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, according to the tag authorization operation, determine the team or individual for file authorization, and authorize all files with the same tag to the team or individual, According to the authority conflict processing rules, determine the authority of the authorized team or individual, and the specific optimization is: according to the label authorization operation, determine the authorized authority category, and authorize all files with the same label to the team or individual according to the authority category , according to the permission category consistency rule, determine the permission category of the authorized team or individual.

[0079] Correspondingly, the file authorization method under the enterprise network disk provided ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file authorization method and system under an enterprise network disk, the network disk and a storage medium, and the method comprises the steps: receiving a label authorization operation, determining a corresponding label, and screening all files with the same label in the enterprise network disk according to the label; according to the label authorization operation, determining a team or an individual authorized by the file, and authorizing all the files with the same label to the team or the individual; and determining the authority of the authorized team or individual according to the authority conflict processing rule. According to the file authorization method and system under the enterprise network disk, the network disk and the storage medium, the files can be screened and authorized according to the labels of the files, so that quick authorization of the files under the enterprise network disk is realized, and the authorization efficiency of the files is improved.

Description

technical field [0001] The invention belongs to the field of electronic information technology, and in particular relates to a method, a system, a network disk and a storage medium for authorizing files on an enterprise network disk. Background technique [0002] With the rapid development of Internet cloud computing technology, network disk service has become a core content of contemporary information services. Enterprises can realize remote storage, reading and sharing of files through the network disk, so it can greatly improve the convenience and access flexibility of data, and improve the efficiency of enterprise operations. [0003] When the internal data of the enterprise is shared using the network disk service, in order to avoid the leakage of important data within the enterprise, it is necessary to authorize the team or individual according to the level, but the file authorization under the existing enterprise network disk is mostly based on the folder Files in a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 王亚楠
Owner 天津联想协同科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products