File access authority control method and device thereof
A permission control and file access technology, applied in the field of communication, can solve problems such as time waste and low efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] An embodiment of the present invention provides a file access authority control method, such as figure 2 As shown, the method includes:
[0059] S101. The server reads the ACE in the initial ACL.
[0060] Whenever a user initiates an operation request on a file, the server of the file system needs to perform ACL authentication on the file. The server reads the ACL from the extended attributes of the server metadata. Then traverse all ACEs in the ACL to find out the ACE associated with the current access user.
[0061] Wherein, the ACL stores the access rights of folders and files in the file system, and includes many access control items ACE, and each access control item records a user or group and its corresponding access rights. The ACE at least includes a user identifier (for example, a user identifier or a group identifier), and member variables corresponding to the user identifier (for example, type of access, Permission, and flag).
[0062] Specifically, the ...
Embodiment 2
[0090] An embodiment of the present invention provides a file access authority control method, such as Figure 4 As shown, the method includes:
[0091] S201. The server reads the ACE in the initial ACL.
[0092] When the server of the file system performs ACL authentication on the file, the server reads the ACL from the extended attribute, and then traverses all ACEs to find out the ACE associated with the current access user.
[0093] Specifically, when the server of the file system performs ACL authentication on the file, it first reads the access control item ACE in the initial access control list ACL.
[0094] Wherein, the ACE includes at least user IDs and member variables corresponding to each user ID. The user identifier includes a user identifier or a group identifier. The member variables corresponding to each user ID at least include Type, Permission and Flag indicating whether the user can access the file.
[0095] Specifically, the member variable identifier F...
Embodiment 3
[0131] The embodiment of the present invention provides a server 1, such as Figure 5 shown, including:
[0132] The obtaining unit 10 is configured to read the access control item ACE in the initial access control list ACL, where the ACE includes at least a user identifier and a member variable corresponding to the user identifier;
[0133] A judging unit 11, configured to judge whether the ACE acquired by the acquiring unit 10 contains only an IO-inherited flag;
[0134] The pre-storage unit 12 is used to save the ACE determined by the judging unit 11 that does not include the IO flag bit into the cache ACL;
[0135] The processing unit 13 is configured to combine the ACEs in the cached ACL stored in the pre-storage unit 12 that contain the same user ID and do not contain the IO flag bit to obtain an improved ACL, and the improved ACL is used to perform ACL authentication on the file.
[0136] Further, the user identifier includes a user identifier or a group identifier; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
