Converged IP messaging (CPM) conversation history accessing method and message storage server
A technology for meeting historical records and storing servers, which is applied in the field of communication, and can solve problems such as high overhead and burden, and users' inability to manage resources, and achieve the effect of reducing overhead and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0157] Embodiment 1: User obtains access control list operation
[0158] If the user wants to obtain the access control list of a certain user folder, according to the regulations in [RFC4314], the MSC constructs the IMAP4 / GETACL command, specifies the name of the target folder, and requests the MSS for the access control list of the target folder, specifically see Figure 9 .
[0159] The user requests the MSS for the access control list of the "Working" user folder. After receiving the command, the MSS checks whether the requesting user has the "a" permission on the target folder, that is, whether it can obtain the permission of the access control list. If it has this permission, MSS returns the access control list in the response message to the GETACL command, as shown in the above figure, the access control list shows that the user "Fred" has the "rwipslxetad" permission on the target folder, and the user "Chris" Have "lrswi" permissions on the target folder.
...
Embodiment 2
[0161] Embodiment 2: User setting access control list operation
[0162] If the user wants to set the access control list of a certain user folder, such as granting certain permissions to another user, the MSC should construct the IMAP4 / SETACL command according to the procedure specified in [RFC 4314], and request the MSS to specify The target folder adds access control permissions to a user, for details, see Figure 10 .
[0163] The user requests MSS to add the access control authority "cda" to the target folder "Working" for another user "Chris". After MSS receives this command, it should first check whether the requesting user has "a" permission on the target folder. If the requesting user has "a" permission on the target folder, then MSS will follow the request in the SETACL command as the target folder. In the access control list of the folder "Working", add the "cda" permission of the "Chris" user; if the requester user does not have the "a" permission for the ...
Embodiment 3
[0164] Embodiment 3: User deletes the access control list operation
[0165] If a user wants to delete another user's access control list for a certain user folder, the MSC should follow the procedure specified in [RFC 4314] to construct an "IMAP4 / DELETEACL" command, requesting the MSS to specify the user's access to the target folder Control permission list deletion, for details, see Figure 11 .
[0166] The user requests MSS to delete the access control permission list of another user "Fred" to the target folder "Working". After MSS receives this command, it should first check whether the requesting user has "a" permission on the target folder; if the requesting user has "a" permission on the target folder, then MSS will follow the request in the DELETEACL command as the target In the access control list of the folder "Working", delete all access control permissions of the "Fred" user; if the requester user does not have the "a" permission on the target folder, MSS...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com