Multi-permission distribution method based on SAN storage system

A technology of storage system and authority distribution, which is applied in the direction of transmission system, digital data protection, internal/peripheral computer component protection, etc. It can solve the problems of super administrator misoperation and false identification, so as to ensure safety, controllability and avoid safety Hidden danger, practical effect

Active Publication Date: 2014-04-30
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of frequent use, there have been a large number of super administrator misoperations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-permission distribution method based on SAN storage system
  • Multi-permission distribution method based on SAN storage system
  • Multi-permission distribution method based on SAN storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] A method for assigning multiple permissions based on a SAN storage system of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] as attached figure 1 As shown, a method for assigning multiple permissions based on a SAN storage system, the specific assignment process is:

[0038] Assign multiple roles, that is, set up four roles of account maintainer, auditor, administrator, and user in system management tasks and assign corresponding permissions and management scopes. The four roles are mutually restricted, and the storage system is implemented according to specific security principles. Separation of permissions. The security principle refers to the principle of least privilege. The above-mentioned separation of permissions includes two parts: management permissions and data access permissions to the storage system. Full control of the system.

[0039] The authority of the account maintainer includes two part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-permission distribution method based on an SAN storage system. The multi-permission distribution method specifically comprises the steps that multiple roles are distributed, namely the four roles of an account number maintainer, an auditor, an administrator and a user are set in a system management task and are endowed with corresponding permission and management ranges, the four roles restrict one another, permission of the storage system is separated according to the specific safety rule, the safety rule is the minimum privilege rule, the separated permission comprises the storage system management permission and the data visit permission, and when an attacker obtains instructions of one or two management roles, the storage system will not be completely controlled. Compared with the prior art, the multi-permission distribution method based on the SAN storage system has the advantages that specified users can have access to and control specified resources by distributing the user role resources, safety and controllability of operation on and access to the storage system are ensured, practicability is high and popularization is easy.

Description

technical field [0001] The invention relates to the technical field of computer data storage, in particular to a method for assigning multiple permissions based on a SAN storage system. Background technique [0002] After entering the era of information consumption, the amount of digital information has shown an explosive growth trend, and higher requirements have been placed on storage systems. With the popularization of information technology, social activities are increasingly dependent on information systems. With the rapid development of information technology, emerging industries such as cloud computing and big data are gradually taking shape, and the key role played by storage systems in the information field has attracted more and more attention from all walks of life and fields such as military, finance, and government affairs. Since storage is the foundation of the entire information technology, the storage industry is closely related to many industries and industr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08G06F21/62G06F21/78
Inventor 袁鹏飞吴庆民何中辰
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products