Data access method, access verification device and data storage system
A data storage system and data access technology, applied in the field of access verification equipment, data storage systems, and data access methods, can solve the problems of low data access efficiency, achieve the effect of improving data access efficiency and avoiding low data access efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0055] In order to realize data sharing, data is usually shared in a data storage system, and security is ensured by setting data access permissions. At present, the commonly used authority management scheme adopts a hierarchical authorization mechanism. The data sharing service between different entities needs to rely on the upper layer of the hierarchical authorization system to authenticate each other, and then send it to the level of the data requesting entity to complete the authorization. However, because entities of different levels (user's client) correspond to different data permissions, different data has different visibility to different entities, resulting in a massive mapping relationship between data and users (clients), and layer by layer after request The issuance of authorization results in low data sharing efficiency, and it is difficult to flexibly support multi-level sharing authority management.
[0056] In order to solve the above problems, the access verifi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap