Access control method, device, equipment and medium

An access control and volume access technology, applied in the direction of instruments, electrical digital data processing, input/output to record carriers, etc., can solve problems such as affecting the normal operation of business, data loss, disconnection of other volumes, etc.

Active Publication Date: 2020-09-01
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the access control authority of the volume connected to the storage device can only be judged when the client logs in. If you want to disconnect the access control authority of a certain client after the login is completed,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device, equipment and medium
  • Access control method, device, equipment and medium
  • Access control method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0044] At present, the volume connected to the storage device can only be judged when the client logs in. If you want to disconnect the access control permission of a client after the login is completed, you must log out / login again. It affects other volumes under the connected storage device, causing other volumes to be disconnected, affecting the normal operation of the business, and causing data loss and other problems. In view of this, this applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method, device, equipment, and a medium. The method comprises the steps of querying target information of a volume under storage equipment connected with an iSCSI client by using a preset iSCSI protocol capacity query algorithm; judging whether an unauthorized access volume unauthorized to access by the iSCSI client exists in volumes under storage equipment connected with the iSCSI client or not according to the target information; and if so, sending error information to a local kernel, so that the iSCSI client does not access the unauthorized access volume. In this way, under the condition that normal service operation is not affected, access control over volumes of the storage equipment end can be conducted, the problems of data loss and the likeare avoided, and access permission of different volumes of the same storage equipment end can be modified online.

Description

technical field [0001] The present application relates to the field of distributed storage, and in particular to an access control method, device, equipment, and medium. Background technique [0002] In distributed storage, the iSCSI architecture mainly divides the storage device and the host used into two parts, namely: iSCSI target, which is the storage device side, stores disks or RAID (Redundant Arrays of Independent Disks, disk array) devices, At present, it is also possible to emulate a Linux host as an iSCSI target, in order to provide disks used by other hosts. The iSCSI initiator, that is, the client that can use the target, is usually a server. In other words, the server that wants to connect to the iSCSI target must also install the related functions of the iSCSI initiator before it can use the disk provided by the iSCSI target. The client can establish a connection with the target through the above methods to access the underlying block storage library (librbd)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/06
CPCG06F3/0619G06F3/062G06F3/067
Inventor 曹立霞张端
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products