CN101115009B - Storage resource access control method, storage control system and applied host machine - Google Patents

Storage resource access control method, storage control system and applied host machine Download PDF

Info

Publication number
CN101115009B
CN101115009B CN2007101212337A CN200710121233A CN101115009B CN 101115009 B CN101115009 B CN 101115009B CN 2007101212337 A CN2007101212337 A CN 2007101212337A CN 200710121233 A CN200710121233 A CN 200710121233A CN 101115009 B CN101115009 B CN 101115009B
Authority
CN
China
Prior art keywords
host machine
iscsi
applied host
control system
destination end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007101212337A
Other languages
Chinese (zh)
Other versions
CN101115009A (en
Inventor
上官应兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN2007101212337A priority Critical patent/CN101115009B/en
Publication of CN101115009A publication Critical patent/CN101115009A/en
Application granted granted Critical
Publication of CN101115009B publication Critical patent/CN101115009B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a storage resource assess control method, a storage control system and a mainframe. An iSCSI storage control system maintains a first connection status information of an initiator and an target. When the iSCSI storage control system receives log request message of the target sent from the mainframe, the system judges whether other mainframes are connected with the target provided with the same initiator name, according to the initiator name of the log request and the first connection status information of the maintenance. If yes, the system refuses the mainframe from visiting the storage resources that are corresponding to the target; if no, the system allows the mainframe to visit the storage resources that are corresponding to the target. The invention prevents data damage in unexpected conditions when two mainframes use the same initiator name and visit the same storage resources at the same time, and thus protecting the stored data.

Description

Controlling method of storage resource access, storage control system and applied host machine
Technical field
The present invention relates to technical field of data storage, be specifically related to a kind of controlling method of storage resource access, a kind of Internet Small Computer Systems Interface storage control system and a kind of Internet Small Computer Systems Interface applied host machine.
Background technology
Internet Small Computer Systems Interface (iSCSI, Internet Small Computer SystemInterface) be a kind of based on transmission control protocol/Internet protocol (TCP/IP, Transfer controlProtocol/Internet Protocol) SCSI host-host protocol, promptly originating end (initiator) and destination end (target) utilize the Internet to transmit scsi command and data.At present, the iSCSI agreement is mainly used in the transfer of data of applied host machine and storage control system, typical applied environment as shown in Figure 1, the integrated iSCSI originating end of applied host machine module, the integrated iscsi target end of storage control system module.Applied host machine in the iSCSI message, sends to storage control system to scsi command and/or data encapsulation by IP network, and storage control system is handled each iSCSI message, take out the data in the message and be written to storage medium as: in the disk.
Usually can create a plurality of storage resources of supplying with host access in the storage control system; storage resources is allocated to different destination end; then with each destination end and specific originating end binding; preserve the incidence relation between destination end and originating end in the storage control system, according to this incidence relation to the storage resources control that conducts interviews.Simultaneously, the storage control system of some complete functions also allows to be provided with the access rights of storage control system: read/write, read-only etc.A typical storage resources configured list is as shown in table 1:
ISCSI target title The corresponding stored resource Access rights The iSCSI initiator title of authorizing
iqn.target:target1 SANResource1 Read/write lqn.initiator:name1
SANResource2
iqn.target:target2 SANResource3 Read-only iqn.initiator:name2
iqn.target:target3 SANResource4 Read/write iqn.initiator:name3
…… …… …… ……
The typical storage resources configured list of table 1
The flow chart that Fig. 2 conducts interviews and controls storage resources for existing employing iscsi technology, as shown in Figure 2, its concrete steps are as follows:
Step 201: applied host machine as IP address and tcp port, starts the discovery procedure of iSCSI target according to the reference address of the storage control system that is configured in self, obtains the iSCSI target tabulation that licenses to self by this discovery procedure.
Step 202: the definite target that will login of applied host machine, for each the target execution in step 203~209 that will login.
Step 203: set up TCP/IP between applied host machine and the current target that will login and connect.
Step 204: applied host machine sends the logging request message to storage control system, and this message carries initiator title of self and the title of the current target that will login, and the command code in this message indicates current needs and carries out the safety certification mode and consult.
Step 205: applied host machine judges whether negotiation is successful, if, execution in step 207; Otherwise, execution in step 206.
Step 206: applied host machine finish and storage control system between session, and disconnection is connected process ends with TCP/IP between the storage control system.
Step 207: applied host machine sends the logging request message to storage control system, and this message carries initiator title of self and the title of the current target that will login, and the command code in this message indicates current needs and carries out the mode of operation negotiation.
Step 208: storage control system is received this logging request message, carries out mode of operation with applied host machine and consults, and consults to finish, and storage control system returns the login response message to applied host machine, and both sides set up session channel.
Step 209: applied host machine conducts interviews to the storage resources of the target title correspondence that the logging request message carries, visit finishes, applied host machine sends to storage control system and withdraws from request message, and storage control system returns to applied host machine and withdraws from response message, conversation end.
In actual applications, business migration may take place between the applied host machine, for example: the business migration of applied host machine A is to applied host machine B, at this moment, the initiator title of applied host machine B can be updated to the initiator title of applied host machine A, and closing applied host machine A, applied host machine B will use original initiator title and the storage control system that uses of applied host machine A to set up session like this, and storage resources is conducted interviews; And because iSCSI initiator provides automatic binding function, therefore, applied host machine A is when restarting, can move iSCSI initiator program automatically, thereby use original initiator title automatically and storage control system set up session, storage resources is conducted interviews, and storage resources is associated with the initiator title, so just cause two applied host machines to use same initiator title and storage control system to set up session simultaneously, therefore, two applied host machines will may destroy the storage data so simultaneously with the identical identical storage resources of authority visit.
Summary of the invention
The invention provides a kind of controlling method of storage resource access and a kind of iSCSI storage control system and a kind of iSCSI applied host machine, to realize to the storage Data Protection.
Technical scheme of the present invention is achieved in that
A kind of controlling method of storage resource access is applied among the iSCSI storage networking, and this method comprises:
The iSCSI storage control system is safeguarded first connection state information of originating end and destination end;
The iSCSI storage control system is received the logging request to destination end that the originating end of applied host machine is sent, first connection state information according to originating end title of carrying in this logging request and described maintenance, judge whether that existing other applied host machines connect with identical originating end title and described destination end, if the refusal applied host machine is visited the storage resources of described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence.
After described iSCSI storage control system allowed the applied host machine accessing storage resources, the iSCSI storage control system was updated to indication with the originating end of described applied host machine and first connection state information between the described destination end and connects; And if the iSCSI storage control system receives the request of withdrawing to described destination end that applied host machine is sent, first connection state information of the originating end of described applied host machine and described destination end is updated to indication does not connect.
Described iSCSI storage control system is received and further comprised after the logging request: originating end that carries according to this request and second connection state information of destination end judge whether the originating end of described applied host machine and described destination end connect, if directly allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise,, judge that described other applied host machines that whether have connect with identical originating end title and described destination end according to first connection state information that described iSCSI storage control system is safeguarded;
Second connection state information that described logging request is carried is safeguarded by the iSCSI applied host machine.
Described logging request is further carried current needs and is carried out the indication that the safety certification mode is consulted,
And described iSCSI storage control system allows the storage resources of applied host machine access destination end correspondence further to comprise afterwards: iSCSI storage control system and iSCSI applied host machine carry out the safety certification mode to be consulted;
Perhaps, described logging request is further carried current needs and is carried out the indication that mode of operation is consulted,
And described iSCSI storage control system allows the storage resources of applied host machine access destination end correspondence further to comprise afterwards: iSCSI storage control system and iSCSI applied host machine carry out mode of operation to be consulted.
Described second connection state information is carried in DataSegment field in the described logging request or the reserved field or in the new field.
The storage resources that described iSCSI storage control system allows applied host machine to visit described destination end correspondence further comprises afterwards: the current needs of indication that iSCSI storage control system reception applied host machine is sent carry out the logging request that the safety certification mode is consulted, and beginning is carried out the safety certification mode with applied host machine and consulted;
Perhaps, the storage resources that described iSCSI storage control system allows applied host machine to visit described destination end correspondence further comprises afterwards: the current needs of indication that iSCSI storage control system reception applied host machine is sent carry out the logging request that mode of operation is consulted, and beginning is carried out the mode of operation negotiation with applied host machine.
Originating end that described iSCSI storage control system is safeguarded and first connection state information of destination end are: safeguard the number that originating end and destination end have connected,
Originating end that described iSCSI applied host machine is safeguarded and second connection state information of each destination end are: originating end and the number that connected of each destination end of safeguarding self;
Described iSCSI storage control system allow applied host machine visit after the storage resources of described destination end correspondence or receive originating end withdraw from request after, the originating end of the described applied host machine of self maintained and the number that described destination end has connected are upgraded.
Described iSCSI storage control system further comprises when safeguarding first connection state information of originating end and destination end: the iSCSI storage control system is safeguarded the information that whether allows the different application main frame to connect of originating end and destination end,
Described iSCSI storage control system further comprises after receiving logging request: according to the information that whether allows the different application main frame to connect of described maintenance, whether originating end and the described destination end of judging described applied host machine allow the different application main frame to connect, if directly allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise whether according to first connection state information of described maintenance, judging describedly has other applied host machines to connect with identical originating end title and described destination end.
A kind of iSCSI storage control system, this iSCSI storage control system comprises:
The memory access control module, receive the logging request that applied host machine is sent to destination end, this logging request is carried the originating end title, whether existing other applied host machines connect with identical originating end title and described destination end to the inquiry of destination end connection status logging modle, if then refuse the storage resources that applied host machine is visited described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence;
Destination end connection status logging modle, first connection state information of record originating end and destination end;
Connect maintenance module, when the connection status of originating end that detects applied host machine and destination end changes, this originating end in the renewal destination end connection status logging modle and first connection state information of destination end.
Described memory access control module comprises:
First access control module, receive the logging request that applied host machine is sent to destination end, judge whether second connection state information that further carries in this request indicates the connection status of the originating end of this applied host machine and described destination end for connecting, if allow applied host machine to visit the storage resources of described destination end correspondence; Logging request not being given second access control module handles;
Second access control module, record according to destination end connection status logging modle judges whether that existing other applied host machines connect with identical originating end title and described destination end, if then refuse the storage resources that applied host machine is visited described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence.
Described memory access control module further comprises:
Switch control module, receive the logging request that applied host machine is sent to destination end, judge that according to the record of destination end connection status logging modle the originating end of this applied host machine and the different applied host machine that whether allows of described destination end connect, if then allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise, send this logging request to first access control module;
And described destination end connection status logging modle further writes down the information that whether allows different applied host machines to connect of originating end and destination end.
Described second connection state information is carried in DataSegment field in the described logging request or the reserved field or in the new field.
Described iSCSI storage control system also comprises: the security negotiation module, carry out with the iSCSI applied host machine that the safety certification mode is consulted and or the mode of operation negotiation module, carry out mode of operation with the iSCSI applied host machine and consult; Wherein, the mode of operation negotiation module is just carried out the mode of operation negotiation after the memory access control module allows the visit of iSCSI applied host machine.
A kind of iSCSI applied host machine, this iSCSI applied host machine comprises:
Originating end connection status logging modle, the originating end of record applied host machine and second connection state information between the different target end;
Connect maintenance module, when the connection status of originating end that detects applied host machine and destination end changes, second connection state information in the renewal originating end connection status logging modle between this originating end and destination end;
Memory access control negotiation module, the definite destination end that will login, obtain originating end of self and second connection state information between this destination end from originating end connection status logging modle, the logging request that this second connection state information is put into destination end sends to storage control system.
A kind of iSCSI storage networking, this storage networking comprise one of above-mentioned iSCSI storage control system and above-mentioned iSCSI applied host machine at least.
Compared with prior art, the present invention safeguards first connection state information of originating end and destination end by the iSCSI storage control system, when the iSCSI storage control system receive that applied host machine sends to the logging request message of destination end the time, originating end title of carrying according to this logging request and first connection state information of described maintenance, judge whether that existing other applied host machines connect with identical originating end title and described destination end, if the refusal applied host machine is visited the storage resources of described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence, to have avoided under the unexpected situation, the corrupted data that two applied host machines cause when using identical Initiator title to visit identical storage resources has simultaneously been protected the storage data.
Description of drawings
Fig. 1 is the typical application scenarios schematic diagram of iSCSI;
The flow chart that Fig. 2 conducts interviews and controls storage resources for existing employing iscsi technology;
The flow chart that the employing iscsi technology that Fig. 3 provides for the embodiment of the invention one conducts interviews and controls storage resources;
The flow chart that the employing iscsi technology that Fig. 4 provides for the embodiment of the invention two conducts interviews and controls storage resources;
The flow chart that the employing iscsi technology that Fig. 5 provides for the embodiment of the invention three conducts interviews and controls storage resources;
The flow chart that the employing iscsi technology that Fig. 6 provides for the embodiment of the invention four conducts interviews and controls storage resources;
The structural representation of the iSCSI storage control system that Fig. 7 provides for the embodiment of the invention;
The structural representation of the iSCSI applied host machine that Fig. 8 provides for the embodiment of the invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
The flow chart that the employing iscsi technology that Fig. 3 provides for the embodiment of the invention one conducts interviews and controls storage resources, as shown in Figure 3, its concrete steps are as follows:
Step 301: storage control system at a target connection status of self maintained table, comprises in this table in advance: clauses and subclauses such as the iSCSI initiator title of iSCSI target title, binding, the indication that whether connects.
Wherein, iSCSI target name is called the title of each the iSCSI target on this storage control system, the initiator name of binding is called the title of the iSCSI initiator that obtains iSCSI target mandate, and whether the indication that whether connects is used to indicate iSCSI target to connect with iSCSI initiator and is not connected interrupts.Whether when iSCSI target has connected with iSCSI initiator and is connected when not interrupting, connecting is designated as "Yes"; Whether when iSCSI target does not connect with iSCSI initiator, connecting is designated as "No".Here, iSCSI target does not connect with iSCSI initiator and comprises two kinds of situations: a kind of iSCSI of being target never connects with iSCSI initiator, and another kind is that iSCSI target once connected but was connected with iSCSI initiator and interrupts.
Table 2 has provided the target connection status table that present embodiment provides, and is as shown in table 2, when the most initial, do not have target and initiator to connect, and therefore, the indication that whether connects all is a "No".
ISCSI Target title The iSCSI Initiator title of binding Whether connect (SessionConnect)
iqn.target:target1 iqn.initiator:name 1 Not
iqn.target:target2 iqn.initiator:name2 Not
iqn.target:target3 iqn.initiator:name3 Not
…… …… ……
The target connection status table that table 2 embodiment of the invention one provides
Step 302: applied host machine as IP address and tcp port, starts the discovery procedure of iSCSI target according to the storage control system reference address that is configured in self, obtains the iSCSI target tabulation that licenses to self by this discovery procedure.
Step 303: applied host machine is according to the iSCSI target tabulation that licenses to self, and definite iSCSI target that will login is for each the target execution in step 304~313 that will login.
Step 304: set up TCP/IP between applied host machine and the current target that will login and connect.
Step 305: applied host machine sends the logging request message to storage control system, and this message carries initiator title and the current target title that will login, and the command code in this message indicates current needs and carries out the safety certification mode and consult.
Step 306: storage control system is received this logging request message, carries out the safety certification mode with applied host machine and consults, and applied host machine judges whether to consult successfully, if, execution in step 308; Otherwise, execution in step 307.
Step 307: applied host machine finish and storage control system between session, and disconnection is connected process ends with TCP/IP between the current target that will login.
Step 308: applied host machine sends the logging request message to storage control system, and this message carries initiator title and the current target title that will login, and the command code in this message indicates current needs and carries out mode of operation and consult.
Step 309: storage control system is received the logging request message, check the target connection status table of self maintained, judgement indicates whether to be "Yes" with initiator title and corresponding whether the connecting of target title that the logging request message carries, if, execution in step 310; Otherwise, execution in step 311.
Step 310: storage control system defines connection and this connection that other applied host machine used this Initiator title to set up the target of this target title correspondence and does not interrupt, the then session between the applied host machine of storage control system disconnection and this logging request of initiation, and disconnect this target and be connected process ends with TCP/IP between this applied host machine.
Step 311: storage control system and applied host machine carry out mode of operation to be consulted, negotiation finishes, return the login response message to applied host machine, accept the logging request of applied host machine, both sides' session channel is set up, simultaneously with in the target connection status table, the corresponding indication that whether connects of the target title of carrying with the initiator title and the logging request message of this applied host machine changes to "Yes" by "No".
Step 312: after applied host machine was received this login response message, the storage resources of the target title correspondence that the logging request message is carried conducted interviews, and visit finishes, and applied host machine sends to storage control system and withdraws from request message.
Step 313: after storage control system receives that this withdraws from request message, the indication that whether connects corresponding with this initiator title and target title in the target connection status table of self maintained is changed to "No" by "Yes", return to applied host machine and withdraw from response message.
When applied host machine was triggered login by the user, applied host machine began login process, and this login process is that step 302~311 couple user is transparent.In whole login process, applied host machine will be finished three functions altogether: the safety certification mode is consulted, memory access control is consulted, mode of operation is consulted, applied host machine indicates the required function of finishing of this logging request by the command code in each logging request of initiating, after the complete operation mode is consulted, can begin accessing storage resources.
From as can be seen embodiment illustrated in fig. 3; because storage control system has write down the information whether initiator and target connect; therefore; when an applied host machine has used certain an initiator title and a target to set up to be connected; other applied host machine re-uses this initiator title and requires to connect with this target; storage control system can be refused this requirement; having guaranteed that the same initiator title of synchronization can only be made by an applied host machine is used for connecting with target, thereby has protected the storage data.
It is to be noted, it is embodiment illustrated in fig. 3 that what provide is at the mode of operation negotiation phase, storage control system checks that target connection status table judges whether the situation that allows applied host machine and target to connect, in actual applications, storage control system also can be checked target connection status table at safety certification mode negotiation phase, judge whether to allow applied host machine and target to connect, at this moment, step 309,310 is carried out between step 305,306.
It is pointed out that in actual applications in order to protect store path and spread bandwidth, applied host machine can be connected to same target by two or more network interfaces simultaneously, in this case, use embodiment illustrated in fig. 3 can then being difficult to and tackle.Because: when applied host machine is connected to a target by a network interface earlier; if applied host machine requires to be connected to this target by another network interface again; then storage control system can think that other applied host machine has used this initiator title and this target to connect and refuses this requirement by mistake, does not so just reach trail protection and increases the original intention of bandwidth.In order to eliminate this applied defect, provided following improvement embodiment:
The flow chart that the employing iscsi technology that Fig. 4 provides for the embodiment of the invention two carries out the storage resources access control, as shown in Figure 4, its concrete steps are as follows:
Step 401: storage control system at a target connection status of self maintained table, comprises in this table in advance: the iSCSI initiator title of iSCSI target title, binding, the clauses and subclauses such as number that connect.
Wherein, the implication of the initiator title of iSCSI target title, binding is identical with step 301, and the number that connected refers to iSCSI initiator and iSCSI target has set up and the linking number that do not interrupt.
Table 3 has provided the target connection status table that present embodiment provides, and is as shown in table 3, when the most initial, do not have target and initiator to connect, and therefore, the number that connected all is " 0 ".
ISCSI Target title The iSCSI Initiator title of binding Number (SessionConnectNumber) has connected
iqn.target:target1 iqn.initiator:name1 0
iqn.target:target2 iqn.initiator:name2 0
ISCSI Target title The iSCSI Initiator title of binding Number (SessionConnectNumber) has connected
iqn.target:target3 iqn.initiator:name3 0
…… …… ……
The target connection status table that table 3 embodiment of the invention two provides
Step 402: applied host machine at an initiator connection status of self maintained table, comprises in this table in advance: clauses and subclauses such as the title of iSCSI target and the number that connected.
Wherein, iSCSI target title refers to the title of the iSCSI target that licenses to applied host machine, and the number that connected refers to this applied host machine and used set up with this iSCSItarget and the number that is connected that do not interrupt of the initiator title of self.
Step 403 is identical with step 302.
Step 404: the title of the iSCSI target that is comprised during the iSCSI target that applied host machine returns storage control system tabulates is added in the initiator connection status table of self, and the number that has connected of each iSCSItarget title correspondence all is set to " 0 ".
If licensing to the name of the iSCSI Target that comprises in the iSCSI Target tabulation of applied host machine is called: iqn.target:target1, iqn.target:target2 and iqn.target:target3, it is as shown in table 4 then to carry out after this step the initiator connection status table of applied host machine:
ISCSI target title Number (SessionConnectNumber) has connected
iqn.target:target1 0
iqn.target:target2 0
iqn.target:target3 0
The initiator connection status table that table 4 embodiment of the invention two provides
Step 405: applied host machine is according to the iSCSI target tabulation that licenses to self, and definite iSCSI target that will login is for each the target execution in step 406~420 that will login.
Step 406: set up TCP/IP between applied host machine and the current target that will login and connect.
Step 407: applied host machine sends the logging request message to storage control system, and this message carries initiator title and the current target title that will login, and the command code in this message indicates current needs and carries out the safety certification mode and consult.
Step 408: storage control system is received this logging request message, carries out the safety certification mode with applied host machine and consults, and applied host machine judges whether to consult successfully, if, execution in step 410; Otherwise, execution in step 409.
Step 409: applied host machine finish and storage control system between session, and disconnection is connected process ends with TCP/IP between the current target that will login.
Step 410: applied host machine is checked the initiator connection status table of self maintained, judges whether the connect number corresponding with the current target title that will login is " 0 ", if, execution in step 411; Otherwise, execution in step 412.
Step 411: applied host machine sends the logging request message to storage control system, this message carries initiator title and the current target title that will login, Q-character in this message as: " DuplicateConnect " parameter is changed to " 0 ", and the command code in this message indicates current needs and carries out the mode of operation negotiation, goes to step 413.
The DuplicateConnect parameter can be arranged in fields such as the DataSegment field of logging request message or Reserved field, also can increase a field newly and deposit the DuplicateConnect parameter in the logging request message.
Step 412: applied host machine sends the logging request message to storage control system, and " DuplicateConnect " parameter in this message is changed to " 1 ", and the command code in this message indicates current needs and carries out mode of operation and consult.
Step 413: storage control system is received the logging request message, judges whether the value of the DuplicateConnect parameter in this message is 0, if, execution in step 414; Otherwise, execution in step 416.
Step 414: storage control system is checked the target connection status table of self maintained, judges whether the initiator title and the corresponding number that connects of target title that carry with the logging request message are " 0 ", if, execution in step 416; Otherwise, execution in step 415.
Step 415: storage control system defines connection and this connection that other applied host machine used this Initiator title to set up the target of this target title correspondence and does not interrupt, the then session between the applied host machine of storage control system disconnection and this logging request of initiation, and disconnect this target and be connected process ends with TCP/IP between this applied host machine.
Step 416: storage control system and applied host machine carry out mode of operation to be consulted, negotiation finishes, return the login response message to applied host machine, accept the logging request of applied host machine, both sides' session channel is set up, and in the target connection status table with self, the connect number corresponding with this initiator title and target title adds 1.
The DuplicateConnect parameter value illustrates that for " 1 " applied host machine has used a network interface to set up with target and has been connected, this logging request is initiated for using another network interface, therefore, in the target connection status table, the corresponding number that connects of the target title of carrying with the initiator title and the logging request message of this applied host machine should add 1.
Step 417: after applied host machine was received this login response message, the number that connects corresponding with this target title in the initiator connection status table with self added 1, began to visit the storage resources of the title correspondence of the current target that will login.
Step 418: the storage resources visit finishes, and applied host machine sends to storage control system and withdraws from request message, and this message carries initiator title and target title.
Step 419: after storage control system receives that this withdraws from request message, return to applied host machine and to withdraw from response message, this message carries the target title; And the corresponding number that connects subtracts 1 in the target connection status table with self, with withdrawing from initiator title that request message carries and target title.
Step 420: applied host machine receives that this withdraws from response message, and the corresponding number that connects of the target title of carrying in the initiator connection status table with self, with this message subtracts 1.
From as can be seen embodiment illustrated in fig. 4, applied host machine is also safeguarded the connection status table of an initiator and target, and when initiating logging request, the indication notice storage control system whether initiator and target have been connected, like this, if the described indication of storage control system from logging request learnt: initiator and target connect, then can learn: this applied host machine can connect by two or more network interfaces and same target, and this applied host machine has been set up with target by one or more network interfaces and has been connected, and wish to connect by other interface and this target, therefore, storage control system is accepted this logging request, thereby has solved applied defect embodiment illustrated in fig. 3.
Need to prove, in embodiment illustrated in fig. 4, applied host machine is to be used for carrying out the logging request that mode of operation is consulted by the DuplicateConnect parameter is carried at, finish the access control of storage control system, in actual applications, also the DuplicateConnect parameter can be carried at and be used for carrying out the logging request that the safety certification mode is consulted, finish access control to storage control system, also can initiate one separately and be specifically designed to the logging request of carrying out storage control system access control negotiation, carry the DuplicateConnect parameter in this request.Below provide the specific embodiment of above-mentioned back dual mode respectively:
The flow chart that the employing iscsi technology that Fig. 5 provides for the embodiment of the invention three conducts interviews and controls storage resources, as shown in Figure 5, its concrete steps are as follows:
Step 501~504 are identical with step 401~404.
Step 505: applied host machine is according to the iSCSI target tabulation that licenses to self, and definite iSCSI target that will login is for each the target execution in step 506~520 that will login.
Step 506: applied host machine is set up TCP/IP with the current target that will login and is connected.
Step 507: applied host machine is checked the initiator connection status table of self maintained, judges whether the connect number corresponding with the current target title that will login is " 0 ", if, execution in step 508; Otherwise, execution in step 509.
Step 508: applied host machine sends the logging request message to storage control system, this message carries initiator title and target title, Q-character in this message as: " DuplicateConnect " parameter is changed to " 0 ", and the command code in this message indicates current needs carries out the safety certification mode and consults, and goes to step 510.
Step 509: applied host machine sends the logging request message to storage control system, and " DuplicateConnect " parameter in this message is changed to " 1 ", and the command code in this message indicates current needs and carries out the safety certification mode and consult.
Step 510: storage control system is received the logging request message, judges whether the value of the DuplicateConnect parameter in this message is 0, if, execution in step 511; Otherwise, execution in step 513.
Step 511: storage control system is checked the target connection status table of self maintained, judges whether the initiator title and the corresponding number that connects of target title that carry with the logging request message are " 0 ", if, execution in step 513; Otherwise, execution in step 512.
Step 512: storage control system defines connection and this connection that other applied host machine used this Initiator title to set up the target of this target title correspondence and does not interrupt, the then session between the applied host machine of storage control system disconnection and this logging request of initiation, and disconnect this target and be connected process ends with TCP/IP between this applied host machine.
Step 513: storage control system and applied host machine carry out the safety certification mode to be consulted, and applied host machine judges whether to consult successfully, if, execution in step 515; Otherwise, execution in step 514.
Step 514: applied host machine finish and storage control system between session, and disconnection is connected process ends with TCP/IP between the current target that will login.
Step 515: applied host machine sends the logging request message to storage control system, and this message carries initiator title and target title, and the command code in this message indicates current needs and carries out mode of operation and consult.
Step 516: storage control system is received the logging request message, carrying out mode of operation with applied host machine consults, negotiation finishes, return the login response message to applied host machine, accept the logging request of applied host machine, both sides' session channel is set up, and simultaneously with in the target connection status table, the connect number corresponding with initiator title and this target title of this applied host machine adds 1.
Step 517: after applied host machine was received this login response message, the number that connects corresponding with this target title in the initiator connection status table with self maintained added 1, begins to visit the storage resources of this target title correspondence.
Step 518~520 are identical with step 418~420.
The flow chart that the employing iscsi technology that Fig. 6 provides for the embodiment of the invention four conducts interviews and controls storage resources, as shown in Figure 6, its concrete steps are as follows:
Step 601~604 are identical with step 401~404.
Step 605: applied host machine is according to the iSCSI target tabulation that licenses to self, and definite iSCSI target that will login is for each the target execution in step 606~622 that will login.
Step 606: applied host machine is set up TCP/IP with the current target that will login and is connected.
Step 607: applied host machine is checked the initiator connection status table of self maintained, judges whether the connect number corresponding with the current target title that will login is " 0 ", if, execution in step 608; Otherwise, execution in step 609.
Step 608: applied host machine sends the logging request message to storage control system, this message carries initiator title and the current target title that will login, Q-character in this message as: " DuplicateConnect " parameter is changed to " 0 ", and the command code in this message indicates current needs and carries out storage resources access control negotiation, goes to step 610.
The DuplicateConnect parameter can be arranged in the DataSegment field of logging request message or Reserved field etc., also can increase a field newly and deposit the DuplicateConnect parameter in the logging request message.
Step 609: applied host machine sends the logging request message to storage control system, and " DuplicateConnect " parameter in this message is changed to " 1 ", and the command code in this message indicates current needs and carries out the storage resources access control and consult.
Step 610: storage control system is received the logging request message, judges whether the value of the DuplicateConnect parameter in this message is 0, if, execution in step 611; Otherwise, execution in step 613.
Step 611: storage control system is checked the target connection status table of self maintained, judges whether the initiator title and the corresponding number that connects of target title that carry with the logging request message are " 0 ", if, execution in step 613; Otherwise, execution in step 612.
Step 612: storage control system defines connection and this connection that other applied host machine used this Initiator title to set up the target of this target title correspondence and does not interrupt, the then session between the applied host machine of storage control system disconnection and this logging request of initiation, and disconnect this target and be connected process ends with TCP/IP between this applied host machine.
Step 613: storage control system returns the login response message that indication allows accessing storage resources to applied host machine.
Step 614: applied host machine sends the logging request message to storage control system, and this message carries initiator title of self and the title of the current target that will login, and the command code in this message indicates current needs and carries out the safety certification mode and consult.
Step 615: applied host machine judges whether negotiation is successful, if, execution in step 617; Otherwise, execution in step 616.
Step 616: applied host machine finish and storage control system between session, and disconnection is connected process ends with TCP/IP between the current target that will login.
Step 617: applied host machine sends the logging request message to storage control system, and this message carries initiator title of self and the title of the current target that will login, and the command code in this message indicates current needs and carries out the mode of operation negotiation.
Step 618: storage control system is received this logging request message, carrying out mode of operation with applied host machine consults, negotiation finishes, storage control system returns the login response message that carries the target title to applied host machine, both sides set up session channel, and with in the target connection status table, the corresponding number that connects of initiator title of carrying with the logging request message and target title adds 1.
Step 619: applied host machine is received this login response message, the number that connects that the target title of carrying with this message in the initiator connection status table of self maintained is corresponding adds 1, begins to visit the storage resources of the target title correspondence that this message carries.
Step 620~622 are identical with step 418~420.
It is embodiment illustrated in fig. 6 that what provide is the situation that storage resources access control negotiations process was carried out before the negotiations process of safety certification mode, in actual applications, storage resources access control negotiations process also can be carried out between negotiations process of safety certification mode and mode of operation negotiations process, that is: step 607~613 also can be carried out between step 616,617.
In addition, in actual applications, some special application may need two applied host machines to use same initiator title to visit same target, in order to satisfy these application, can a switch be set at the target end, as: DiffHostConnect, to indicate whether allowing different applied host machines to connect, state by this DiffHostConnect switch of administrator configurations, default configuration is a "No", after increasing this DiffHostConnect switch, target connection status table is revised as shown in table 5:
ISCSI target title The iSCSI initiator title of binding Whether allow different applied host machine connect (DiffHostConnect) Whether connect (SessionConnect)
iqn.target:target1 iqn.initiator:name1 Not Not
iqn.target:target2 iqn.initiator:name2 Not Not
iqn.target:target3 iqn.initiator:name3 Be Not
…… …… …… ……
The improved target connection status of table 5 table
After having increased this DiffHostConnect switch, when storage control system is received the logging request message that applied host machine is sent, and the value of judging the DuplicateConnect in this message whether be " 0 " before, to check earlier in the target connection status table of self, whether the value of the DiffHostConnect switch that the initiator title of carrying with this message and target title are corresponding is "Yes", if "Yes" is then directly returned the login response message that indication allows accessing storage resources to applied host machine; Otherwise, proceed to judge whether the value of the DuplicateConnect in this message is the action of " 0 ".
The structural representation of the iSCSI storage control system that Fig. 7 provides for the embodiment of the invention, as shown in Figure 7, it mainly comprises: memory access control module 71, connection maintenance module 72 and target connection status logging modle 73, and, the memory access control module can comprise again: switch control module 711, first access control module 712 and second access control module 713, wherein:
Switch control module 711: receive the logging request message that applied host machine is sent to destination end, initiator title of carrying to these messages of target connection status logging modle 73 inquiry and target title correspondence whether allow the indication that connects of different applied host machines, if this is designated as "Yes", return the login response message that indication allows accessing storage resources to applied host machine, otherwise, this logging request message is sent to first access control module 712.
First access control module 712: receive the logging request message that switch control module 711 is sent, judge whether this message indicates the initiator of applied host machine to connect with the target that will login, if, return the login response message that indication allows accessing storage resources to applied host machine, otherwise, this logging request message is sent to second access control module 713.
Second access control module 713: receive the logging request message that first access control module 712 is sent, the initiator title of carrying to these messages of target connection status logging modle 73 inquiry and the connection state information of target title correspondence, if this information indication connects, the then session between disconnection and the applied host machine; Otherwise, return the login response message that indication allows accessing storage resources to applied host machine.
Connect maintenance module 72:, connection state information corresponding with this initiator title and target title in the target connection status logging modle 73 is updated to indication connects when detecting when setting up being connected between initiator and the target; When detecting when disconnecting fully being connected between initiator and the target, connection state information corresponding with this initiator title and target title in the target connection status logging modle 73 is updated to indication does not connect.
Target connection status logging modle 73: safeguard the connection state information between initiator and target, as: safeguard initiator title, target title, whether allow different applied host machines connect indication, whether connect the indication between corresponding relation, perhaps, safeguard initiator title, target title, whether allow different applied host machines connect indication, connect corresponding relation between number.
The iSCSI storage system also can comprise: security negotiation module and mode of operation negotiation module, wherein:
Security negotiation module: be used for carrying out the safety certification mode and consult with the iSCSI applied host machine.
If the indication of the command code of the logging request sent of applied host machine need carry out that memory access control is consulted and the safety certification mode is consulted, then the safety certification mode consults to carry out after applied host machine returns the login response of indication permission accessing storage resources in memory access control module 71; Otherwise the safety certification mode consults to carry out need carry out logging request that the safety certification mode consults the time receiving that command code is only indicated.That is, the safety certification mode is consulted and can be carried out before memory access control is consulted, and also can carry out after memory access control is consulted.
Mode of operation negotiation module: be used for carrying out mode of operation and consult with the iSCSI applied host machine.
If the indication of the command code of the logging request sent of applied host machine need carry out that memory access control is consulted and mode of operation is consulted, then mode of operation consults to carry out after applied host machine returns the login response of indication permission accessing storage resources in memory access control module 71; Otherwise mode of operation consults to carry out when receiving that command code is only indicated the logging request that need carry out the mode of operation negotiation.But which kind of situation no matter, mode of operation consults all to consult in the safety certification mode, memory access control is carried out after consulting.
The structural representation of the iSCSI applied host machine that Fig. 8 provides for the embodiment of the invention, as shown in Figure 8, it mainly comprises: memory access control negotiation module 81, connect maintenance module 82 and initiator connection status logging modle 83, wherein:
Memory access control negotiation module 81: determine to login target, obtain the connection state information of this target title correspondence from initiator connection status logging modle 83, if this information indication connects, then sending the DuplicateConnect parameter value to storage control system is the logging request message of " 1 "; Otherwise sending the DuplicateConnect parameter value to storage control system is the logging request message of " 0 ".
Connect maintenance module 82: when detect with target between be connected when setting up, connection state information corresponding with this target title in the initiator connection status logging modle 83 is updated to indication connects; When detect with target between be connected when disconnecting fully, connection state information corresponding with this target title in the initiator connection status logging modle 83 is updated to indication does not connect.
Initiator connection status logging modle 83: the connection state information between the initiator that is used for the maintenance application main frame and different target, as: safeguard the target title, whether connect the indication between corresponding relation, perhaps, safeguard target title, connect corresponding relation between number.
The above only is process of the present invention and method embodiment, in order to restriction the present invention, all any modifications of being made within the spirit and principles in the present invention, is not equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (15)

1. controlling method of storage resource access is applied to it is characterized in that this method comprises among the Internet Small Computer Systems Interface iSCSI storage networking:
The iSCSI storage control system is safeguarded first connection state information of originating end and destination end;
The iSCSI storage control system is received the logging request to destination end that the originating end of applied host machine is sent, first connection state information according to originating end title of carrying in this logging request and described maintenance, judge whether that existing other applied host machines connect with identical originating end title and described destination end, if the refusal applied host machine is visited the storage resources of described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence,
Described first connection state information comprises: whether the iSCSI originating end title of iscsi target end title, binding, indication connects; Perhaps comprise: the iSCSI originating end title of iscsi target end title, binding, the number that connects.
2. the method for claim 1 is characterized in that, when described first connection state information comprises: and the iSCSI originating end title of iscsi target end title, binding, when indication of whether connecting,
After described iSCSI storage control system allowed the applied host machine accessing storage resources, the iSCSI storage control system was updated to indication with the originating end of described applied host machine and first connection state information between the described destination end and connects; And if the iSCSI storage control system receives the request of withdrawing to described destination end that applied host machine is sent, first connection state information of the originating end of described applied host machine and described destination end is updated to indication does not connect.
3. the method for claim 1 is characterized in that, when described first connection state information comprises: and the iSCSI originating end title of iscsi target end title, binding, when connecting number,
Described iSCSI storage control system is received and further comprised after the logging request: originating end that carries according to this request and second connection state information of destination end judge whether the originating end of described applied host machine and described destination end connect, if directly allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise,, judge that described other applied host machines that whether have connect with identical originating end title and described destination end according to first connection state information that described iSCSI storage control system is safeguarded;
Second connection state information that described logging request is carried safeguarded by the iSCSI applied host machine,
Described second connection state information comprises: iscsi target end title, the number that connects.
4. method as claimed in claim 3 is characterized in that, described logging request is further carried current needs and carried out the indication that the safety certification mode is consulted,
And described iSCSI storage control system allows the storage resources of applied host machine access destination end correspondence further to comprise afterwards: iSCSI storage control system and iSCSI applied host machine carry out the safety certification mode to be consulted;
Perhaps, described logging request is further carried current needs and is carried out the indication that mode of operation is consulted,
And described iSCSI storage control system allows the storage resources of applied host machine access destination end correspondence further to comprise afterwards: iSCSI storage control system and iSCSI applied host machine carry out mode of operation to be consulted.
5. method as claimed in claim 4 is characterized in that, described second connection state information is carried in DataSegment field in the described logging request or the reserved field or in the new field.
6. the method for claim 1, it is characterized in that, the storage resources that described iSCSI storage control system allows applied host machine to visit described destination end correspondence further comprises afterwards: the current needs of indication that iSCSI storage control system reception applied host machine is sent carry out the logging request that the safety certification mode is consulted, and beginning is carried out the safety certification mode with applied host machine and consulted;
Perhaps, the storage resources that described iSCSI storage control system allows applied host machine to visit described destination end correspondence further comprises afterwards: the current needs of indication that iSCSI storage control system reception applied host machine is sent carry out the logging request that mode of operation is consulted, and beginning is carried out the mode of operation negotiation with applied host machine.
7. method as claimed in claim 3 is characterized in that,
Described iSCSI storage control system allow applied host machine visit after the storage resources of described destination end correspondence or receive originating end withdraw from request after, the originating end of applied host machine described in first connection state information of self maintained and the number that described destination end has connected are upgraded.
8. as claim 1 or 3 described methods, it is characterized in that, described iSCSI storage control system further comprises when safeguarding first connection state information of originating end and destination end: the iSCSI storage control system is safeguarded the information that whether allows the different application main frame to connect of originating end and destination end
Described iSCSI storage control system further comprises after receiving logging request: according to the information that whether allows the different application main frame to connect of described maintenance, whether originating end and the described destination end of judging described applied host machine allow the different application main frame to connect, if directly allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise whether according to first connection state information of described maintenance, judging describedly has other applied host machines to connect with identical originating end title and described destination end.
9. an iSCSI storage control system is characterized in that, this iSCSI storage control system comprises:
The memory access control module, receive the logging request that applied host machine is sent to destination end, this logging request is carried the originating end title, whether existing other applied host machines connect with identical originating end title and described destination end to the inquiry of destination end connection status logging modle, if then refuse the storage resources that applied host machine is visited described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence;
Destination end connection status logging modle, first connection state information of record originating end and destination end;
Connect maintenance module, when the connection status of originating end that detects applied host machine and destination end changes, this originating end in the renewal destination end connection status logging modle and first connection state information of destination end,
Described first connection state information comprises: whether the iSCSI originating end title of iscsi target end title, binding, indication connects; Perhaps comprise: the iSCSI originating end title of iscsi target end title, binding, the number that connects.
10. iSCSI storage control system as claimed in claim 9 is characterized in that, described memory access control module comprises:
First access control module, receive the logging request that applied host machine is sent to destination end, judge whether second connection state information that further carries in this request indicates the connection status of the originating end of this applied host machine and described destination end for connecting, if allow applied host machine to visit the storage resources of described destination end correspondence; Logging request is not given second access control module and handles,
Described second connection state information comprises: iscsi target end title, the number that connects;
Second access control module, record according to destination end connection status logging modle judges whether that existing other applied host machines connect with identical originating end title and described destination end, if then refuse the storage resources that applied host machine is visited described destination end correspondence; Otherwise, allow applied host machine to visit the storage resources of described destination end correspondence.
11. iSCSI storage control system as claimed in claim 10 is characterized in that, described memory access control module further comprises:
Switch control module, receive the logging request that applied host machine is sent to destination end, judge that according to the record of destination end connection status logging modle the originating end of this applied host machine and the different applied host machine that whether allows of described destination end connect, if then allow applied host machine to visit the storage resources of described destination end correspondence; Otherwise, send this logging request to first access control module;
And described destination end connection status logging modle further writes down the information that whether allows different applied host machines to connect of originating end and destination end.
12. iSCSI storage control system as claimed in claim 11 is characterized in that, described second connection state information is carried in DataSegment field in the described logging request or the reserved field or in the new field.
13. iSCSI storage control system as claimed in claim 11, it is characterized in that, also comprise: the security negotiation module, carry out the safety certification mode with the iSCSI applied host machine and consult, with or the mode of operation negotiation module, carry out mode of operation with the iSCSI applied host machine and consult; Wherein, the mode of operation negotiation module is just carried out the mode of operation negotiation after the memory access control module allows the visit of iSCSI applied host machine.
14. an iSCSI applied host machine is characterized in that, this iSCSI applied host machine comprises:
Originating end connection status logging modle, the originating end of record applied host machine and second connection state information between the different target end;
Connect maintenance module, when the connection status of originating end that detects applied host machine and destination end changes, second connection state information in the renewal originating end connection status logging modle between this originating end and destination end;
Memory access control negotiation module, the definite destination end that will login, obtain originating end of self and second connection state information between this destination end from originating end connection status logging modle, the logging request that this second connection state information is put into destination end sends to storage control system
Described second connection state information comprises: iscsi target end title, the number that connects.
15. an iSCSI storage networking is characterized in that, this storage networking comprises one of iSCSI storage control system as claim 9-13 and the described iSCSI applied host machine of claim 14 at least.
CN2007101212337A 2007-08-31 2007-08-31 Storage resource access control method, storage control system and applied host machine Active CN101115009B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101212337A CN101115009B (en) 2007-08-31 2007-08-31 Storage resource access control method, storage control system and applied host machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101212337A CN101115009B (en) 2007-08-31 2007-08-31 Storage resource access control method, storage control system and applied host machine

Publications (2)

Publication Number Publication Date
CN101115009A CN101115009A (en) 2008-01-30
CN101115009B true CN101115009B (en) 2010-06-02

Family

ID=39023133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101212337A Active CN101115009B (en) 2007-08-31 2007-08-31 Storage resource access control method, storage control system and applied host machine

Country Status (1)

Country Link
CN (1) CN101115009B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483671B (en) * 2009-02-12 2011-10-26 杭州华三通信技术有限公司 Method, system and initial terminal apparatus for enhancing iSCSI session transmission rate
CN108366087B (en) * 2017-12-26 2021-03-05 深圳创新科技术有限公司 ISCSI service realization method and device based on distributed file system
CN109257377A (en) * 2018-11-02 2019-01-22 浪潮电子信息产业股份有限公司 Block device access control method, device and equipment
CN110149232B (en) * 2019-05-23 2020-05-29 苏州浪潮智能科技有限公司 Distributed storage block upgrading iscsi service method, system, device and storage medium
CN111610935B (en) * 2020-05-22 2022-06-17 浪潮电子信息产业股份有限公司 Access control method, device, equipment and medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866966A (en) * 2006-06-14 2006-11-22 杭州华为三康技术有限公司 Internet protocol storage area network insulating method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866966A (en) * 2006-06-14 2006-11-22 杭州华为三康技术有限公司 Internet protocol storage area network insulating method and device

Also Published As

Publication number Publication date
CN101115009A (en) 2008-01-30

Similar Documents

Publication Publication Date Title
US7454795B2 (en) Disk control unit
US7984133B2 (en) Computer and access control method in a computer
US20090276774A1 (en) Access control for virtual machines in an information system
US20120005724A1 (en) Method and system for protecting private enterprise resources in a cloud computing environment
CN101115009B (en) Storage resource access control method, storage control system and applied host machine
CN101540755B (en) Method, system and device for recovering data
WO2013008770A1 (en) Network quarantine system, network quarantine method and program therefor
US20070061482A1 (en) Information processing apparatus, communication control method, and communication control program
US20090138613A1 (en) Network Converter and Information Processing System
JP2003006048A (en) Storage system authenticating host computer
CN101593252B (en) Method and system for controlling access of computer to USB equipment
KR20210003934A (en) Data forwarding control method and system based on hardware control logic
CN101594360A (en) LAN system and the method for safeguarding LAN information safety
CN101561855B (en) Method and system for controlling computer to access USB device
CN101562558A (en) Method, system and device for terminal grade classification
CN106020997A (en) Method and system used for data transmission between virtual machines
US7428594B2 (en) File server system
CN101188558B (en) Access control method, unit and network device
CN101119383B (en) Method and apparatus of establishing iSCSI conversation for objective terminal and initiating terminal
KR102094315B1 (en) Network Separation System Based On Access Point Allocation Per Account
KR20130079004A (en) Mobile data loss prevention system and method for providing virtual security environment using file system virtualization on smart phone
CN108366087A (en) A kind of ISCSI service implementing methods and device based on distributed file system
KR101299051B1 (en) Environment setting device and method according to the user account
KR101056423B1 (en) Program Execution Management Method and Record Media Using Logged-In Account Control
CN101159713A (en) Method, system and device of limiting instant communication application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Patentee after: Xinhua three Technology Co., Ltd.

Address before: 310053 Hangzhou hi tech Industrial Development Zone, Zhejiang province science and Technology Industrial Park, No. 310 and No. six road, HUAWEI, Hangzhou production base

Patentee before: Huasan Communication Technology Co., Ltd.

CP03 Change of name, title or address