File access control method and apparatus for operation system

An operating system and file access technology, applied in computer security devices, instruments, computing, etc., can solve the problems of inability to meet diverse file access control requirements, poor file access control flexibility, etc., to facilitate management, improve flexibility, Satisfy the effect of safety

Active Publication Date: 2016-03-16
SHANGHAI DNION INFORMATION & TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the access control of the files of the operating system can be controlled separately through the subject access control mechanism and the role-based access control mechanism, which cannot meet the diverse file access control requirements. Therefore, there is a problem of poor flexibility of file access control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access control method and apparatus for operation system
  • File access control method and apparatus for operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In the prior art, the operating system can respectively access executable binary files in the operating system through its own subject access control method and role-based access control method. Because discretionary access control methods and role-based access control methods operate independently. It is used to perform corresponding operations on the same executable binary file through corresponding user permissions or group permissions. However, the file access control method in the prior art cannot meet the diversified access requirements of users, and there is a problem of poor flexibility.

[0029] For example, there is a server in the financial department for sharing files, and the maintenance of this server is in the charge of ordinary operation and maintenance engineers, so the operation and maintenance engineers have obtained the special authority "root", and according to the company's access control policy requirements, the storage on the server I do not wan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file access control method and apparatus for an operation system. The method comprises: obtaining an access request of a user logging in the operation system to an executable binary file; obtaining subjective identity information and group permission information corresponding to the executable binary file; matching subjective identity information and group permission information of a user with the subjective identity information and the group permission information corresponding to the executable binary file; and according to a matching result, allowing the user to perform corresponding operation on the executable binary file. According to the scheme, the flexibility of file access control of the operation system can be improved.

Description

technical field [0001] The invention relates to the technical field of operating systems, in particular to a file access control method and device for an operating system. Background technique [0002] UNIX-like systems (UNIX-like) refer to various traditional UNIX systems, such as FreeBSD, OpenBSD, Sun's Solaris, and various systems similar to traditional UNIX, such as Minix, Linux, QNX, OSX, etc., are to a considerable extent Inheriting the characteristics of the original UNIX system, there are many similarities, and to a certain extent comply with the Portable Operating System Interface (PortableOperatingSystemInterface, POSIX) specification. At present, some Unix simulation environments can be run on the Windows platform, such as the free software Cygwin developed by cygnussolutions. [0003] Access control is a defense measure against unauthorized use of resources, and its basic goal is to ensure users' reasonable and effective access to system resources. There are ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 张景逸
Owner SHANGHAI DNION INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products