Method and equipment for controlling security level of storage system

A security level and storage system technology, which is applied in the field of storage system security level control, can solve the problems that users cannot directly modify configuration files and make mistakes, and achieve the effect of flexible control, avoiding possible errors, and flexible control

Inactive Publication Date: 2020-05-08
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the embodiment of the present invention is to propose a method for controlling the security level of the storage system, which can realize flexible control of the security level of the system, ensure the normal operation of services, and realize that the same set of storage systems can meet various security level requirements of users, and realize Simplify the processing of configuration content, avoid redundancy, solve the problem that users cannot directly modify configuration files in the scenario where the system does not allow direct modification of files, realize unified and flexible control of the security of various services in the storage system, and avoid possible errors in direct manual modification of configuration files The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for controlling security level of storage system
  • Method and equipment for controlling security level of storage system
  • Method and equipment for controlling security level of storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0033] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a method for controlling the security level of a storage system. figure 1 Shown is a schematic flow chart of the method.

[0034] Such as figure 1 As shown in , the method may include the following steps:

[0035] S1 divides the storage system into several security levels, such as 1, 2, 3, etc., and can also set keywords for identifying security levels for each security level;

[0036] S2 sets the corresponding cipher suite configuration for each security level. According to the security design requirements, each security level corresponds to a cipher suite configuration. When vari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and equipment for controlling security levels of a storage system. The method comprises the following steps: dividing the storage system into a plurality of security levels, setting a corresponding encryption suite matching with each security level, in response to a received request for accessing the storage system, obtaining a security level corresponding to the request, reading encryption suite configuration corresponding to the security level, and in response to receiving a verification password matching the encryption suite, permitting access of the storagesystem. Through the method, system security level flexible control can be realized, normal running of the service is guaranteed, the same set of storage system can meet various security level requirements of users, configuration content is simplified, lengthy processing is avoided, the problem that a user cannot directly modify a configuration file under the condition that the system does not allow direct modification of the configuration file is solved, unified and flexible control over various service safety of the storage system is achieved, and the problem that errors are likely to happenwhen the configuration file is directly and manually modified is avoided.

Description

technical field [0001] This field relates to the computer field, and more specifically relates to a method and device for controlling the security level of a storage system. Background technique [0002] The storage system provides various services, such as GUI, REST API, and CIM. Users or third-party clients access these services to operate and manage storage systems, etc. To ensure the security of the storage system, when users or third-party clients communicate with the storage system, the SSL protocol is used to securely encrypt the communication transmission process to prevent malicious attacks. The SSL protocol encrypts the transmission process through an encryption algorithm. These services on the storage system have their own cipher suite configuration items, which are used to define which encryption algorithms these storage services support, and provide an optional range for the selection of encryption algorithms in the subsequent exchange process between the clie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60
CPCG06F21/604H04L63/0428H04L63/083H04L63/105
Inventor 张贵勇
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products