Access control method and system for object cloud storage
An access control and object technology, applied in the field of information security, can solve problems such as multiple sources, increased scale, role assignment and management difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.
[0072] In this implementation case, the Figure 4 The structure of the database system is shown and described in detail Figure 4 In the table structure of the database system, PK in the figure indicates that the item is the primary key of the data table, and FK indicates that the item is the foreign key of the data table.
[0073] Set two user tables in the database system, which are divided into administrator table and common user table, and the object data file is a separate table. The data structure and data content of the data table are shown in Tables 1 and 2 below.
[0074] Table 1: Data structure of the data table TAdmin
[0075] field name
Types of
illustrate
ID
Integer
User ID
name
Char ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com