Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of access control list setting method and system

A technology of access control list and access list, which is applied in the direction of transmission system, computer security device, instrument, etc., can solve the problem of taking a long time, and achieve the effect of increasing the setting speed and reducing the time

Active Publication Date: 2020-05-26
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] From the above introduction to the access control list method, it can be seen that this method can establish an access permission table for each file to record the permissions that different users can access the file. When setting the access control list for a directory, it is necessary to use a recursive method to set the access control list for the subdirectories and files in the large directory one by one. This setting method will take a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of access control list setting method and system
  • A kind of access control list setting method and system
  • A kind of access control list setting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The embodiment of the present invention discloses an access control list setting method, see figure 1 As shown, the method includes:

[0050] Step 11: Find the time stamps and ACL version numbers of all nodes under the current parent directory, where the nodes under the parent directory include corresponding subdirectories and files.

[0051] In the embodiment of the present application, the above-mentioned parent directory may be a large directory con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an access control list setting method. The method comprises the following steps: finding timestamps of all nodes under a current parent directory and an access control list version number, wherein the nodes under the parent directory include corresponding sub-directories and files; screening a node marked with a newest timestamp and a newest access control list version number through comparison to obtain a screened node; and setting an access control list of the screened node on the current parent directory, and then correspondingly updating the timestamp and the access control list version number on the parent directory. Through adoption of the access control list setting method provided by the application, time for setting the parent directory access control list can be shortened effectively, and the setting speed is increased. Moreover, the application also correspondingly discloses an access control list setting system.

Description

technical field [0001] The invention relates to file storage technology, in particular to an access control list setting method and system. Background technique [0002] In recent years, the permission control method of access control list (ACL) has been widely used in network security prevention and protection, such as using access control list to control the access permission of storage files on the server, so as to protect the security of network resources in the server. [0003] When using the access control list method to set file permissions, not only set the file owner permissions, group permissions, and other permissions, but also grant different access permissions to different users, such as the same file through the access control list method You can grant read permission to user A and write permission to user B. [0004] From the above introduction to the access control list method, it can be known that this method can establish an access permission table for eac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62G06F21/45
CPCG06F21/45G06F21/6218G06F2221/2141H04L63/101
Inventor 臧琦
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products