Access control method and access control device of user data

An access control and user data technology, applied in the computer field, can solve problems such as occupying system storage space, affecting the rational use of system resources, and not proposing solutions, and achieves the effect of optimizing resource use and saving storage space

Active Publication Date: 2013-04-03
WUXI CITY CLOUD COMPUTING CENT
View PDF13 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the existing systems based on shared virtual machines lack effective management measures for user applications, which leads to confusion in the process of users loading and running applications, which not only occupies system sto

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and access control device of user data
  • Access control method and access control device of user data
  • Access control method and access control device of user data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art fall within the protection scope of the present invention.

[0043] According to one aspect of the present invention, a method for access control of user data is provided:

[0044] Such as image 3 As shown, it is characterized in that the access control method includes:

[0045] Step 301: Provide applications to users in an application sharing manner according to the permissions of the users accessing the shared virtual machine and the permissions corresponding to the application, where the shared virtual machine uniformly a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method and an access control device of user data. The method comprises the following steps of: providing applications for users by means of application share according to the permission of the user accessing to a shared virtual machine and the permission corresponding to the application, wherein the shared virtual machine uniformly accepts the access of the users; and running the applications provided for each user, and realizing the access of each user to respective data. Furthermore, if the shared virtual machine does not have the appointed application, the user can perform custom installation and running. According to the method and the device, the users can access the user data in the virtual machine, and can define the needed application program, so that the user has large freedom degree, and through authentication on the user, the safety of the user data can be guaranteed. Because the software sharing in the virtual machine can avoid multiple installation of the software, the system resources can be effectively used, and the management cost of the virtual machine is reduced.

Description

technical field [0001] The present invention relates to the computer field, and in particular, relates to a user data access control method and device. Background technique [0002] In the public cloud computing environment, users customize resources and services according to their own needs. Due to the different needs of each user, it is not easy to make each user feel as convenient as they are on a PC when customizing resources and services, but virtualization technology can meet such requirements. virtualization technology, such as figure 1 As shown, a virtual machine is established for each user, and the user can install software on the virtual machine according to his own needs and perform personalized settings. [0003] In a private cloud environment, users have similar requirements and even need the same working environment, for example, a team collaborates on a task in a virtual machine. Such as figure 2 As shown, in this case, multiple users can use the shared ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F9/455
Inventor 杨云鹏
Owner WUXI CITY CLOUD COMPUTING CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products