An access control method, device, equipment, and medium

A technology for access control and volume access, applied in the direction of instruments, input/output to record carriers, computing, etc., can solve problems such as disconnection of other volumes, data loss, and normal operation of business, and achieve the effect of avoiding data loss

Active Publication Date: 2022-06-17
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the access control authority of the volume connected to the storage device can only be judged when the client logs in. If you want to disconnect the access control authority of a certain client after the login is completed, you must log out / login again. In this way, It affects other volumes under the connected storage device, causing other volumes to be disconnected, affecting the normal operation of the business, and causing data loss and other problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method, device, equipment, and medium
  • An access control method, device, equipment, and medium
  • An access control method, device, equipment, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0043] At present, the access control authority of the volume connected to the storage device can only be judged when the client logs in. If you want to disconnect the access control authority of a client after the login is completed, you must log out / login again. Affects other volumes on the connected storage device, causing other volumes to be disconnected, affecting the normal operation of services and causing data loss. In view of this, the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an access control method, device, device, and medium. The method includes: using a preset iSCSI protocol capacity query algorithm to query the target information of the volume under the storage device connected to the iSCSI client; The target information judges whether there is an unauthorized access volume that the iSCSI client has no right to access in the volume under the storage device connected by the iSCSI client; if yes, then an error message is sent to the local kernel, so that the iSCSI client The volume without access is not accessed. In this way, the access control of volumes on the storage device side can be performed without affecting normal business operations, avoiding data loss and other problems, and realizing online modification of the access rights of different volumes on the same storage device side.

Description

technical field [0001] The present application relates to the field of distributed storage, and in particular, to an access control method, apparatus, device, and medium. Background technique [0002] In distributed storage, the iSCSI architecture mainly divides the storage device and the host used into two parts, namely: iSCSI target, which is the storage device side, storage disk or RAID (Redundant Arrays of Independent Disks, disk array) device, It is also possible to emulate a Linux host as an iSCSI target, in order to provide disks used by other hosts. The iSCSI initiator, that is, the client that can use the target, is usually the server. That is to say, the server that wants to connect to the iSCSI target must also install the relevant functions of the iSCSI initiator before it can use the disk provided by the iSCSI target. The client can establish a connection with the target through the above methods to access the underlying block storage library (librbd) to reali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06
CPCG06F3/0619G06F3/062G06F3/067
Inventor 曹立霞张端
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products