Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of realizing the uniqueness of user uid based on linux system

A user-unique technology, applied in the operating system field, can solve problems such as not considering the uniqueness of user identification, and achieve the effect of avoiding data leakage and protecting data security

Active Publication Date: 2020-07-10
KYLIN CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention is used in embedded systems, only considering that the user ID is unique to the application program, and does not consider the uniqueness of the user ID in the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of realizing the uniqueness of user uid based on linux system
  • A method of realizing the uniqueness of user uid based on linux system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The implementation of the present invention will be described in detail below with reference to the drawings and examples, so as to fully understand and implement the implementation process of how to use technical means to solve technical problems and achieve technical effects in the present invention.

[0038] A method for realizing the uniqueness of a user UID based on a Linux system includes creating a user flow and modifying the user flow.

[0039] Create a user flow such as figure 1 As shown, the steps include:

[0040] S101: Determine whether the user UID list database exists; if not, generate a used user UID list according to the system password file / etc / passwd, store it in the user UID list database, and enter the next step; if it exists, enter the next step;

[0041] S102: the system administrator starts to create a user, first judge whether the user UID is specified; if it is, go to the next step; if not, skip the next step and go to S104;

[0042] S103: De...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of realizing user UID uniqueness on the basis of a Linux system. The method includes, but is not limited to, adding, in a user creating process and / or a user modification process, a judgment step of pre-using a UID value. The judgment step of pre-using the UID value specifically includes: judging whether the pre-used UID value is specified, and if the same is specified, judging whether the specified value is already used; if the same is unused, using the value, and if the same is already used, exiting; and if the same is not specified, finding an unused UID value in a UID value range, which is allowed by the system, for use. Compared with the prior art, the method has the advantages that the uniqueness of UID in an entire life cycle of an operating system can be maintained, user data security can be protected, and data leakage problems caused by UID reuse can be avoided.

Description

technical field [0001] The invention belongs to the technical field of operating systems, and in particular relates to a method for realizing the uniqueness of a user UID based on a Linux system. Background technique [0002] In the Linux system, all users who need to enter the system need to create accounts. Each account has information such as user name, UID, GID, and user home directory, which are generally stored in the system password file / etc / passwd. If the system administrator does not explicitly specify these information when creating an account, the system will automatically assign UID, GID, and user home directory and other information, among which the user UID uniquely identifies a user. [0003] Each file in the Linux system has an owner, which means who created the file. At the same time, the file also has a group number, indicating the group to which the file belongs, generally the group to which the file owner belongs. The owner of a file is a user on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/62
CPCG06F21/45G06F21/6218G06F2221/2141
Inventor 王玉成姬一文杨诏钧宋川飞杨钊张铎魏立峰孔金珠
Owner KYLIN CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More