Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Samba sharing permission authentication method and system, terminal and storage medium

A technology of sharing permissions and permissions, applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as error-prone, low ACL authentication efficiency, complicated process, etc., and achieve simple structure, reliable design principle, and wide application foreground effect

Pending Publication Date: 2021-08-20
SHANDONG YINGXIN COMP TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the process of setting ACL is complicated and error-prone, and the ACL authentication efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Samba sharing permission authentication method and system, terminal and storage medium
  • Samba sharing permission authentication method and system, terminal and storage medium
  • Samba sharing permission authentication method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to better understand the technical solution of the present invention, the technical solutions in the embodiments of the present invention will be described in connection with the drawings in the embodiments of the present invention. Embodiments are merely embodiments of the invention, not all of the embodiments. Based on the embodiments in the present invention, those of ordinary skill in the art will belong to the scope of the invention in the present invention without making in the pre-creative labor premise.

[0036] The key terms that occur in the present invention will be explained below.

[0037] NASNetwork Attach Storage: Network Additional Storage System.

[0038] CIFS Common Internet File System: Universal Network File System.

[0039] Samba: Open source SMB protocol implementation.

[0040] figure 1 It is a schematic flow chart of a method of one embodiment of the present invention. in, figure 1 Executing the body can be a system for SAMBA sharing level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a samba sharing permission authentication method and system, a terminal and a storage medium, and the method comprises the steps: adding a sharing permission configuration item in a code directory of samba, the sharing permission configuration item comprising a write list, a readable-writable but non-deletable list and a read list; setting priorities of different types of sharing permissions, and calculating the sharing permissions by reading the sharing configuration; and reading the shared authority of the current user, and comparing the shared authority with the requested authority to complete authentication. The invention provides a method for efficiently realizing read-write but non-deletable permission control by adding a new shared permission type in samba.

Description

Technical field [0001] The present invention belongs to the technical field of network file system, and more particularly to a method, system, terminal, and storage medium of SAMBA sharing level identification. Background technique [0002] Typically, the judgment of whether or not the request is permission is divided into shared right limit authentication and ACL permission discipline. Among them, shared weight limit is to determine whether a user has some permissions within the current share; ACL permission disciating is to determine whether a user is a particular file (or directory) to have a certain one. Permissions of operations. After the client requests the request to the server, the server first performs shared rights authentication. After the authentication passes, the ACL permission disciating will be performed in the process of subsequent specific command words. Only when the user has both shared permissions and ACL permissions, it will be allowed to specify a specific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 侯胜伟
Owner SHANDONG YINGXIN COMP TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products