Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for implementing file lock

An implementation method and file lock technology, which is applied in the electronic field, can solve the problems that file data is easily rewritten and data cannot be protected, and achieve the effect of ensuring integrity

Active Publication Date: 2018-06-19
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a file lock implementation method and device. The method and device provided by the present invention solve the problem that when multiple protocols coexist in a network-attached storage, data cannot be protected due to protocol barriers, and file data is easily rewritten.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for implementing file lock
  • Method and device for implementing file lock
  • Method and device for implementing file lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] The embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0037] Such as figure 2 As shown, the embodiment of the present invention provides a method for implementing a file lock. When the first protocol accesses the file system, the method includes:

[0038] Step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a file lock implementation method and device. When a first protocol accesses a file system, the method comprises: mapping an open object of the first protocol into a first file lock, wherein the open object is protocol data generated by an open request; and according to a pre-set mutual exclusion rule, performing a conflict judgement on the first file lock and a second file lock corresponding to a second protocol which accessed a file system last time, and according to a conflict judgement result, returning an open request creation failure or allowing the first protocol to access the file system. The method and device provided in the present invention solve the problem that, when multiple protocols coexist in a network attached storage, a protocol barrier causes that data cannot be protected and file data is easy to be rewritten.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and device for realizing a file lock. Background technique [0002] Currently, Network Attached Storage (NAS) supports Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), Hypertext Transfer Protocol (Hyper Text Transfer Protocol, HTTP) and other protocols, when the clients of multiple protocols work on the same server at the same time, due to the barriers between the protocols, only the protocol consistency within the protocol can be realized, and the cross-protocol protocol cannot be realized. Protocol consistency. Based on the above reasons, a certain protocol may access a file or directory that has been denied access by other protocol settings. For example, a file created with the SMB protocol can still be opened or deleted by the NFS protocol when exclusive access is set. The two protocols The process of operating the file syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 梁建业向光友刘军
Owner HUAWEI TECH CO LTD