Linux access authority control method based on index node
A technology of access rights and index nodes, applied in the computer field, can solve cumbersome problems and achieve the effect of convenient deployment and implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] The present invention will be further described below in conjunction with the drawings and specific embodiments:
[0023] Such as Figure 1~2 As shown, the Linux access authority control method based on index nodes of the present invention includes the following steps:
[0024] S1. Modify the kernel source code and add system calls. After the system call interface is initialized, a correspondence table of index nodes and process numbers is established in the kernel space; the loading process of the correspondence table is realized by system calls or loading read-only devices .
[0025] S2. Modify the kernel source code, and add access permission control judgments to the file system system calls according to the correspondence table described in step S1; wherein the file system system calls can be modified according to actual usage scenarios, including but not limited to open, and can also be read, write, etc.
[0026] The above-mentioned access authority control judgment proc...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap