CN1848022A - Authority control method based on access control list - Google Patents

Authority control method based on access control list Download PDF

Info

Publication number
CN1848022A
CN1848022A CN 200510064532 CN200510064532A CN1848022A CN 1848022 A CN1848022 A CN 1848022A CN 200510064532 CN200510064532 CN 200510064532 CN 200510064532 A CN200510064532 A CN 200510064532A CN 1848022 A CN1848022 A CN 1848022A
Authority
CN
China
Prior art keywords
authority
node
access control
user
acl
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510064532
Other languages
Chinese (zh)
Inventor
王会军
刘小刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200510064532 priority Critical patent/CN1848022A/en
Publication of CN1848022A publication Critical patent/CN1848022A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention is authority control method based on access control list. The method includes: for the computer to accept the behavior command the user inputs; for the computer to judge whether to have authority limit in the resource node the user's behavior command points at in the memory access list, and to execute relevant operation command if no or to inhibit the operation and end if yes; to judge the authority definition in next higher level of the current node, and to inhibit the operation of the user on the node of the next higher level if there is authority inheritance in the node of the next higher level or to further judge the authority definition in even higher level of node if no; and for the computer to judge whether to reach the root node of the access control list, and to end if yes or to proceed the upward judgment if not. The method is universal and has relatively small needed memory space.

Description

A kind of authority control method based on Access Control List (ACL)
Technical field
The invention belongs to the Computer Applied Technology field, specifically a kind of authority control method based on Access Control List (ACL) indicates the operation behavior authority to computer resource with less storage space control user with inheritance.
Technical background
In the prior art, computer resource operating right define method commonly used is by Access Control List (ACL) (ACL, Access Control List) and access control unit (ACE, Access Control Entry) carry out authority and describe, an ACL is made up of several A CE.Each bar ACE has write down the operating right of certain user for certain resource.By some the ACL that form of ACE that comprise a cover zone bit all authorities in the system can be described fully like this.
The form of Microsoft (Windows) operating system promptly is based on the ACL authority definition, this permission system comprises that to computer file system file, file etc. carry out complicated control of authority, and the file authority comprises fully to be controlled, revise, reads and execution, files listed clip directory, read and write.In these authorities each all is made up of the logical groups that a series of special authority constituted, and may have certain file as certain user and read and revise authority, promptly constitutes a logical groups.As shown in Figure 1, be the interface synoptic diagram that in the prior art certain file system folder is provided with authority.
Another more complicated authority setting is that Windows provides an extra interface to realize, it is that whole authorities comprises whether can inheriting children nodes that authority wherein can be set, be a sign of the inheritance of describing authority, if be denoted as is promptly can inherit, its children nodes has all authorities that this node is authorized so, can be that whole authorities waits and realizes whether from paternal inherited rights, it also is a sign describing the authority inheritance, if be denoted as not, promptly do not inherit, present node is not inherited the authority of its parent nodes so.
But the degree of flexibility of authority definition of the prior art is relatively poor, its succession and forbid inheriting, object all is all authority behaviors, so can't define certain concrete authority action on certain node by increasing a description, be used to forbid inheriting lower level node and this node is inherited in other action, like this, if system need define the permission system of a complexity, just need many authorities of storage to describe, storage space expends and must increase several times.
Summary of the invention
For overcoming the deficiencies in the prior art, the object of the present invention is to provide a kind of authority control method based on Access Control List (ACL), describe storage space with less authority and express authority definition, user's operation behavior is carried out control of authority.
For achieving the above object, the technical scheme that the present invention takes is: a kind of authority control method based on Access Control List (ACL) may further comprise the steps:
Step 1, computer memory receive the operation behavior instruction of user's input;
Step 2, computing machine judge that user behavior instruction a certain resource node pointed has or not control of authority in the memory access control tabulation, have then and forbid that according to the authority definition of current resource node and the priority of user behavior instruction user's behavior command also finishes, and does not have and then carries out the operational order of user to current resource node;
The authority definition of the even higher level of node of step 3, judgement present node, if even higher level of node is forbidden current resource node and is inherited its authority, then forbid operation behavior and the end of user, otherwise continue upwards to judge the authority definition of even higher level of node on the present node even higher level of node;
Step 4, computing machine judge whether to arrive the root node of Access Control List (ACL), be then to finish the authority restriction, otherwise repeating step 3.
Also be included in the step of structure resource user authority index in the computer memory Access Control List (ACL) before the described step 1.
Described resource user authority index is a many-one relationship.
The behavior command of the user's input in the described step 1 comprises one or more in reading, revise, increase, deleting.
Access Control List (ACL) in the described step 2 is a tree form data structure.
Described authority control method based on Access Control List (ACL) adopts the relation between the inheritance sign description node, with the authority of decision node.
Described inheritance indicates content, comprises one of the following or combination:
Forbid node from it the one-level node inherit any authority;
Forbid that the next stage node of node inherits any authority from it;
The authority constraint is only effective to node next stage node, and is invalid to this node;
The authority constraint is only effective to the next stage node of catalogue type;
The authority constraint is only effective to the next stage node of non-catalogue type;
Do not inherit any authority from this node even higher level of node;
Do not allow to be inherited by its later release.
The present invention has tangible advantage and good effect.By authority describing mode of the present invention, can will the big complexity arbitrarily that arrives be described based on each node authority of tree-like system resource, satisfy the needs of complicated control of authority; Simultaneously, the present invention carries out the user behavior of control of authority to needs description can reach complexity arbitrarily, but storage space taken increase seldom, the invention provides a general authority control method, reached task of using less storage space to finish control of authority, the storage space expense is just smaller when a tree structures node is carried out control of authority, each tree-like node is carried out complicated control of authority just become more feasible.
Description of drawings
Fig. 1 is provided with the interface synoptic diagram of authority for file system in the prior art;
Fig. 2 is a main flow chart of the present invention;
Fig. 3 is an authority calculated direction synoptic diagram of the present invention.
Embodiment
Below in conjunction with Figure of description the specific embodiment of the present invention is described.
See also Fig. 2 main flow chart of the present invention.At first, the present invention sets up Access Control List (ACL) in computer memory, and constructs resource user authority index in Access Control List (ACL).
The in store all-access control module (ACE) relevant in the access control list (ACL) that the present invention is described authority definition with resource for computer system, access control unit carries out index according to user's operation behavior, and each user has a no more than record in access control unit.The present invention carries out control of authority according to the mode of resource user one-to-many.
The organization definition of access control unit comprises that authority inheritance that the authority inheritance of certain authority that the user has system resource in the Access Control List (ACL), authority priority, main body indicates position, resource indicates position definition and a behavior that allows, the behavior definition of forbidding and for the different rights of every attribute of system resource, for the definition of the different rights of the various dissimilar child nodes of system resource.
After the definition of Access Control List (ACL) and user right was finished, Access Control List (ACL) became tree form data structure.Then, computer memory receives the operation behavior instruction of user's input, and calls the resource node that Access Control List (ACL) is pointed in the storer.User behavior comprises the behavior of permission and the behavior of forbidding, these behaviors are read, revise, increase, deleted, also can be more.
Afterwards, computing machine judges that user behavior a certain resource node pointed has or not control of authority in the memory access control tabulation, do not have and then to carry out the user to the operational order of current resource node and finish, the behavior of forbidding the user according to the priority of the authority definition of current resource node and user behavior is arranged then.
Then, judge the authority definition of the even higher level of node of present node.The present invention introduces inheritance and indicates the relation of describing between current resource node and its even higher level of node, inheritance indicate comprise forbid system resource node from it the one-level node inherit any authority and the next stage node of forbidding system resource that is used in combination with its sign usually from inheriting any authority sign on one's body, can be made as 1,2 as indicating, if the authority of describing constraint is only effective to the next stage node of system resource, to own invalid, indicate the position and can be made as (1<<2).If inheritance indicates only effective to the next stage node of catalogue type, then indicate the position and be made as (1<<3), only effective to the next stage node of non-catalogue type, then be made as (1<<4), do not inherit any authority there and be made as (1<<5) from the even higher level of node of oneself.The authority of host's resource does not allow to be inherited by its later release, then is set to (1<<6) etc.In fact the present invention's sign that can increase any complexity authority of making up any complexity indicates.
Increase any complicated behavior and indicate to satisfy any complicated authority behavior definition in the behavior that allows and forbid, the behavior of definition indicates as follows: be read as 1, be revised as 1<<1, increase by 1<<7, delete 1<<8.
The present invention is owing to introduced the inheritance sign, the number that authority is described significantly reduces, the authority definition mode of catching up with the Windows system that states compares, the authority of a complexity of definition is described, the number that authority is described can reduce n * x doubly, wherein n is the number that children nodes need be forbidden the authority behavior of inheriting, x is the number of children nodes, required storage space also significantly reduces, the size of storage space depends on the number that authority is described, have n*x reducing doubly equally, but the calculating of authority simultaneously becomes relative complex many reduced too because calculative authority is described number, computing velocity does not have decline, under the authority definition complicated situation, can obtain the lifting of computing velocity on the contrary.Perhaps, the user does not exist authority to describe to some tree-like resource nodes, but there is the connection of an access control list ACL in this user for the even higher level of node of this resource node, and showing that it is can be heritable that this authority is described, authority was just calculated and should be searched authority along the root node direction of tree this time.At this moment, tree node and user have constituted a two dimensional surface.
See also Fig. 3 authority of the present invention and calculate synoptic diagram.If the even higher level of node of present node is forbidden current resource node and inherited its any authority, then forbid the operation behavior of user, otherwise continue upwards to judge the authority definition of even higher level of node on it even higher level of node.Computing machine judges whether to arrive the root node of Access Control List (ACL), is then to finish the authority restriction, otherwise repeats above-mentioned determining step, repeats to judge the authority definition of the even higher level of node of the node that arrives.When considering a user right, except considering himself authority, also should consider the influence that its even higher level of node resource is brought its authority.This can schematically illustrate with a coordinate system, and true origin is exactly to wish to calculate the resource node of authority among Fig. 3, is also arranging its upper layer node on the ordinate, until till the root node.Calculate the concrete authority of present node if desired, not only need to calculate the authority definition of present node correspondence, and need be along the direction of authority calculating, calculate the authority definition of its all upper layer node, according to the inheritance tag definitions of each authority, final just definite user is in the authority of present node.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within the claim scope of the present invention.

Claims (7)

1, a kind of authority control method based on Access Control List (ACL) is characterized in that, this method may further comprise the steps:
Step 1, computer memory receive the operation behavior instruction of user's input;
Step 2, computing machine judge that user behavior instruction a certain resource node pointed has or not control of authority in the memory access control tabulation, have then and forbid that according to the authority definition of current resource node and the priority of user behavior instruction user's behavior command also finishes, and does not have and then carries out the operational order of user to current resource node;
The authority definition of the even higher level of node of step 3, judgement present node, if even higher level of node is forbidden current resource node and is inherited its authority, then forbid operation behavior and the end of user, otherwise continue upwards to judge the authority definition of even higher level of node on the present node even higher level of node;
Step 4, computing machine judge whether to arrive the root node of Access Control List (ACL), be then to finish the authority restriction, otherwise repeating step 3.
2, the authority control method based on Access Control List (ACL) according to claim 1 is characterized in that: the step that also is included in structure resource user authority index in the computer memory Access Control List (ACL) before the described step 1.
3, the authority control method based on Access Control List (ACL) according to claim 2 is characterized in that: described resource user authority index is a many-one relationship.
4, the authority control method based on Access Control List (ACL) according to claim 1 is characterized in that: the behavior command of the user's input in the described step 1 comprises one or more in reading, revise, increase, deleting.
5, the authority control method based on Access Control List (ACL) according to claim 1 is characterized in that: the Access Control List (ACL) in the described step 2 is a tree form data structure.
6, the authority control method based on Access Control List (ACL) according to claim 1 is characterized in that: adopt the relation between the inheritance sign description node, with the authority of decision node.
7, the authority control method based on Access Control List (ACL) as claimed in claim 6 is characterized in that:
Described inheritance indicates content, comprises one of the following or combination:
Forbid node from it the one-level node inherit any authority;
Forbid that the next stage node of node inherits any authority from it;
The authority constraint is only effective to node next stage node, and is invalid to this node;
The authority constraint is only effective to the next stage node of catalogue type;
The authority constraint is only effective to the next stage node of non-catalogue type;
Do not inherit any authority from this node even higher level of node;
Do not allow to be inherited by its later release.
CN 200510064532 2005-04-13 2005-04-13 Authority control method based on access control list Pending CN1848022A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510064532 CN1848022A (en) 2005-04-13 2005-04-13 Authority control method based on access control list

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510064532 CN1848022A (en) 2005-04-13 2005-04-13 Authority control method based on access control list

Publications (1)

Publication Number Publication Date
CN1848022A true CN1848022A (en) 2006-10-18

Family

ID=37077611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510064532 Pending CN1848022A (en) 2005-04-13 2005-04-13 Authority control method based on access control list

Country Status (1)

Country Link
CN (1) CN1848022A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402652A (en) * 2010-09-16 2012-04-04 金蝶软件(中国)有限公司 Method, system and terminal for controlling authority
CN102467643A (en) * 2010-11-18 2012-05-23 金蝶软件(中国)有限公司 Method, device and terminal for controlling operation permission
CN102959923A (en) * 2010-06-28 2013-03-06 诺基亚公司 Method and apparatus providing for direct controlled access to dynamic user profile
WO2014005268A1 (en) * 2012-07-02 2014-01-09 华为技术有限公司 Resource access method and device
CN103620616A (en) * 2013-03-28 2014-03-05 华为技术有限公司 Access control right management method and device
CN103914489A (en) * 2013-01-07 2014-07-09 杭州新世纪电子科技有限公司 Control method and control device for enterprise search permission supporting multi-system access
CN104717206A (en) * 2015-02-04 2015-06-17 中国科学院信息工程研究所 Internet of things resource access authority control method and system
CN105468689A (en) * 2015-11-17 2016-04-06 广东电网有限责任公司电力科学研究院 Power grid object level authority configuration and inheritance method
CN105763522A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Authorization processing method and device
CN104145468B (en) * 2014-01-13 2017-02-22 华为技术有限公司 File access authority control method and device thereof
CN109726579A (en) * 2017-10-27 2019-05-07 阿里巴巴集团控股有限公司 Resource access authority group technology and equipment
CN109788054A (en) * 2019-01-07 2019-05-21 平安科技(深圳)有限公司 A kind of configuration method, server and the medium of Distributed Application coordination service node
CN110889127A (en) * 2019-11-27 2020-03-17 广州锦行网络科技有限公司 Infinite subset and multi-dimensional authorization privileged account access control method and device
CN115934671A (en) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 Processing method, device and equipment of access control list and storage medium

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102959923A (en) * 2010-06-28 2013-03-06 诺基亚公司 Method and apparatus providing for direct controlled access to dynamic user profile
CN102402652A (en) * 2010-09-16 2012-04-04 金蝶软件(中国)有限公司 Method, system and terminal for controlling authority
CN102402652B (en) * 2010-09-16 2014-12-10 金蝶软件(中国)有限公司 Method, system and terminal for controlling authority
CN102467643B (en) * 2010-11-18 2014-12-10 金蝶软件(中国)有限公司 Method, device and terminal for controlling operation permission
CN102467643A (en) * 2010-11-18 2012-05-23 金蝶软件(中国)有限公司 Method, device and terminal for controlling operation permission
CN104169930B (en) * 2012-07-02 2017-02-22 华为技术有限公司 resource access method and device
CN104169930A (en) * 2012-07-02 2014-11-26 华为技术有限公司 Resource access method and device
WO2014005268A1 (en) * 2012-07-02 2014-01-09 华为技术有限公司 Resource access method and device
CN103914489A (en) * 2013-01-07 2014-07-09 杭州新世纪电子科技有限公司 Control method and control device for enterprise search permission supporting multi-system access
CN103914489B (en) * 2013-01-07 2017-12-01 杭州新世纪电子科技有限公司 Support the enterprise search authority control method and device of multisystem access
WO2014153759A1 (en) * 2013-03-28 2014-10-02 华为技术有限公司 Method and device for managing access control permission
CN103620616B (en) * 2013-03-28 2016-03-09 华为技术有限公司 A kind of access control right management method and device
CN103620616A (en) * 2013-03-28 2014-03-05 华为技术有限公司 Access control right management method and device
CN104145468B (en) * 2014-01-13 2017-02-22 华为技术有限公司 File access authority control method and device thereof
CN105763522B (en) * 2014-12-18 2020-02-14 中兴通讯股份有限公司 Authorization processing method and device
CN105763522A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Authorization processing method and device
CN104717206A (en) * 2015-02-04 2015-06-17 中国科学院信息工程研究所 Internet of things resource access authority control method and system
CN104717206B (en) * 2015-02-04 2018-01-05 中国科学院信息工程研究所 A kind of Internet of Things resource access right control method and system
CN105468689A (en) * 2015-11-17 2016-04-06 广东电网有限责任公司电力科学研究院 Power grid object level authority configuration and inheritance method
CN109726579A (en) * 2017-10-27 2019-05-07 阿里巴巴集团控股有限公司 Resource access authority group technology and equipment
CN109788054A (en) * 2019-01-07 2019-05-21 平安科技(深圳)有限公司 A kind of configuration method, server and the medium of Distributed Application coordination service node
CN109788054B (en) * 2019-01-07 2022-04-15 平安科技(深圳)有限公司 Configuration method, server and medium for distributed application coordination service node
CN110889127A (en) * 2019-11-27 2020-03-17 广州锦行网络科技有限公司 Infinite subset and multi-dimensional authorization privileged account access control method and device
CN115934671A (en) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 Processing method, device and equipment of access control list and storage medium
CN115934671B (en) * 2023-03-15 2023-06-06 浪潮电子信息产业股份有限公司 Access control list processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN1848022A (en) Authority control method based on access control list
US10686840B1 (en) System and architecture for electronic permissions and security policies for resources in a data system
US11163749B2 (en) Managing multiple locks for data set members in a data set index
US8868531B2 (en) Concurrent access methods for tree data structures
Dinsdale-Young et al. Concurrent abstract predicates
KR101153152B1 (en) System and methods providing enhanced security model
US10990628B2 (en) Systems and methods for performing a range query on a skiplist data structure
CN1904901A (en) System and method for actualizing content-based file system security
US20110023007A1 (en) Associating Workflows With Code Sections In A Document Control System
US7895664B2 (en) Determination of access checks in a mixed role based access control and discretionary access control environment
Liu et al. Model checking linearizability via refinement
CN106055401B (en) Magnanimity calculates the parallel automatic start-stop and calculating task dynamic allocation method of coarse granule
US8914428B2 (en) System and method for maintaining a file system at a computing device
CN101853358A (en) Method for implementing file object authority management
IL186068A (en) Region-based security
CN102495730A (en) Dynamic and extendable web interface method
CN103064957A (en) Method and client for achieving ACL (Access Control List)
US20080222182A1 (en) Method for Fast Deletion of Physically Clustered Data
US20140189889A1 (en) Managing authorization of actions associated with data objects
US20150100730A1 (en) Freeing Memory Safely with Low Performance Overhead in a Concurrent Environment
CN1540544A (en) Method for tracking and controlling users' online states and information
US20110138337A1 (en) Level based data supply for reusable interface components
CN1581100A (en) Data aging method for network processor
US20140189715A1 (en) Conversion of lightweight object to a heavyweight object
US20110246542A1 (en) System for lightweight objects

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication