Distributed filesystem access
A technology of distributed files and file systems, applied in transmission systems, electrical components, instruments, etc., can solve problems such as system complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0057] Example 1: Extended access permission 300 for file system object confidential.txt
[0058] The extended access rights 300 of Example 1 indicate that the owner on the trusted client has full rights (111), users in the upper group on the trusted client have read and execute rights (101), and other users have no rights (000). Further, extended access rights 300 indicate that the file was created on a trusted client (T bit 308 enabled) and the owner can access the file from an untrusted client 118 (L bit 310 enabled). The user requesting access to the file system object confidential.txt can be the object's owner, a member of the owner's group, or any other user. When a user attempts to access the object from a trusted client 116, the access will be based on the user type. For example, when the user is the owner 402, access will be based on the owner mode bit 302 and the owner 402 will be allowed full access to the file. When the user is in group 404, the group mode bit 30...
example 2
[0063] Example 2: Extended access permission 300 for file system object salary.txt
[0064] figure 2 The extended access rights 300 shown in will indicate that the owner 402 created the file on the untrusted client 118 (because the T bit 308 is disabled (0)). In this case, all users will be considered to be on trusted clients 116, even if they are on untrusted clients 118, and access will be based on the top 9 access rights. However, if the owner 402 overwrites / replaces the file from the trusted client 116 , the T bit 308 is automatically set to 1 (enabled), and the file is considered created on the trusted client 116 .
[0065] exemplary method
[0066] Figure 5 show reference Figures 1 to 4 Exemplary method 500 for providing access in DFS 100 . Method 500 includes the step of authorizing access to the requested file system object in DFS 100 . Further, the method 500 includes the steps of retrieving the user ID and client ID, determining whether the client is a trust...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 