ACL (access control list) authority control method and device

A permission control and permission technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve the problem of not being able to store file system files, directory permission requirements, etc.

Inactive Publication Date: 2018-02-13
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the Linux file system, the permission control method of writing and deleting is often unable to meet the permission requirements for files and directories in the storage file system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ACL (access control list) authority control method and device
  • ACL (access control list) authority control method and device
  • ACL (access control list) authority control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] In the traditional method, the ACL permission setting is relatively single, which often cannot meet the diverse needs of enterprise-level users for data access permissions. For this reason, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses an ACL (access control list) authority control method and device. A user can set ACL authorities of a file and a directory by a Linux client, the set ACL authorities serve as extended attributes of the file and the directory and are stored in a metadata server, and the ACL authorities can include a read authority, a write authority, an execution authority,a deletion authority and a visual authority. A Windows client acquires the corresponding ACL authorities from the metadata server by calling a file system API (application program interface), and theACL authorities are verified and inherited. Based on the read authority, the write authority and the execution authority, the deletion authority and the visual authority are added. Compared with traditional ACL authority control, more advanced user access authority types are provided, diversified demands of enterprise users for data access authorities can be met, and users can control file readingand writing and authority granting capacity.

Description

technical field [0001] The invention relates to the technical field of distributed storage, in particular to an ACL permission control method and device. Background technique [0002] The main function of the access control list (Access Control List, ACL) can protect resource nodes on the one hand, prevent illegal users from accessing resource nodes, and limit the access rights of specific users on the other hand. In addition to the three types of permissions, more detailed local permission settings are provided, and operations such as reading, writing, deleting, and executing can be performed for a single user, a single directory or file, without the need to set permissions for the entire user group or other. [0003] In the traditional way, ACL permissions include read permissions, write permissions, and execute permissions. These three types, among which the operation permissions to delete and rename files or directories are included in write permissions, that is, to writ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F21/6218G06F2221/2141
Inventor 黄威振张端
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products