Access control right management method and device

A technology of access control authority and management method, which is applied in the field of access control authority management method and device, and can solve the problems of large number of authority files, affecting system operation speed, unfavorable authority file management, etc.

Active Publication Date: 2014-03-05
HUAWEI TECH CO LTD
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are at least the following technical problems in the prior art: the quantity of created authority files is relatively large, which is unfavorable for the management of authority files; The increase of permission files will further increase the difficulty of managing permission files, and even affect the running speed of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control right management method and device
  • Access control right management method and device
  • Access control right management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0141] An embodiment of the present invention provides a method for access control authority management. To implement the method, an index table and an authority table are stored in the memory of the computer system. This memory can be the same memory as the memory storing files, or can be Not the same memory.

[0142] The index table is composed of multiple index entries, and each index entry records an entry identifier and at least one permission entry index number. Each permission entry index number maps to a permission entry in the permission table. Since the mapping relationship is one-to-one correspondence, the corresponding permission entry can be read through a permission entry index number.

[0143] Wherein, for each newly generated file in the computer, the above entry identifier is generated by default in the metadata of the file, and the entry identifier points to an index entry corresponding to the file. For example, there is an entry identifier a in the metadat...

Embodiment 2

[0173] An embodiment of the present invention provides a method for managing access control rights, such as Figure 1b As shown, the method includes the following steps:

[0174] 101b. The computer receives the user identifier, the target file identifier, and the user's control instruction on the target file.

[0175] 102b. Obtain the target file with the target file identifier, obtain the entry identifier in the metadata of the target file, and then obtain the index entry pointed to by the entry identifier in the metadata from the index table of the memory.

[0176] 103b. Obtain the index number of the target permission entry from the obtained index entry.

[0177] 104b. According to the index number of the target permission entry, obtain the permission entry recording the access control permission of the target file from the permission table.

[0178] 105b. Select a target permission entry that records the user ID from the obtained permission entries.

[0179] 106b. Deter...

Embodiment 3

[0240] An embodiment of the present invention provides a device for managing access control rights, such as Figure 5 shown, including:

[0241] The receiving unit 51 is configured to receive a user identifier, a target file identifier, and a user's control instruction on the target file.

[0242] An index entry obtaining unit 52, configured to obtain the target file with the target file identifier, obtain the entry identifier in the metadata of the target file, and then obtain the metadata from the index table in the memory. The index entry pointed to by the entry identifier in the data.

[0243] A permission entry index number obtaining unit 53, configured to obtain a target permission entry index number from the index entry obtained by the index entry obtaining unit 52; the permission entry pointed to by the target permission entry index number is recorded with The access control permission of the target file.

[0244] A permission entry obtaining unit 54, configured to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an access control right management method and a device, relating to the computer filed, providing convenience to management for large quantity of access control right information and improving operation efficiency of the system. The access control right management method comprises: acquiring index table entries in the index table when the control order for the target file from the user is obtained; acquiring the ?table entry index number in the obtained index table; acquiring the access table entry recording the target files from the right table according to the ?table entry index number, and selectively recording the target right table entries of the user identifications from the obtained right table entries; and determining whether the control order meet the access control right in the target right table entries, if yes processing the control order. The invention is mainly applied in the computer access control management.

Description

technical field [0001] The invention relates to the field of computers, in particular to an access control authority management method and device. Background technique [0002] In file-based storage technologies such as Network Storage Technologies (NAS, Network Storage Technologies), stored data refers to data stored in NAS, and a permission management method for stored data is to record stored data in metadata of stored data access rights. [0003] Metadata is data used to record attributes of stored data, such as the storage space occupied by the data, the name of the data, and so on. The specific implementation method of using this method to record storage data access rights is to create a separate permission file, record the management permissions set by the administrator for the stored data in the separately created permission file, and then record the address of the permission file in the metadata , the permission file can be accessed through this address. In this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30H04L29/08
CPCG06F16/1827G06F21/604G06F21/6218G06F16/14G06F16/11H04L67/1097
Inventor 罗庆超
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products