Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Shared proxy and its object storage and access methods

An object storage and object technology, applied in data processing applications, instruments, computing, etc., can solve problems that cannot meet social networks

Active Publication Date: 2019-02-22
CHINA TELECOM CORP LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Social networks require access control of shared content based on the relationship between friends, but the existing sharing mechanism of object storage mode cannot meet the needs of social networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared proxy and its object storage and access methods
  • Shared proxy and its object storage and access methods
  • Shared proxy and its object storage and access methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. The following description of at least one exemplary embodiment is actually only illustrative, and in no way serves as any limitation to the present invention and its application or use. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0027] Unless specifically stated otherwise, the relative arrangement of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention.

[0028] At the same time, it should ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a shared agent and a method for storing and visiting an object of the shared agent, and relates to the field of object storage. In embodiments of the invention, the shared agent is newly added at an object storage system side, and the shared agent adds social attributes in an access control list according to the shared attributes of the object, which are arranged by an object owner, so that object storage and sharing based on a social model can be implemented. The shared agent can still be matched with a social attribute type defined in the access control list according to the relationship among users, so that corresponding access control units are allocated to different users, and thus the user visits the object from the object storage system according to an access key of the access control unit and the corresponding authority, and the access control of the shared object based on the social model is implemented.

Description

Technical field [0001] The invention relates to the field of object storage, in particular to a shared agent and its object storage and access method. Background technique [0002] There are two ways to share file objects in the object storage architecture. One is an external link, which generates an external link for the shared file, and other users can read the content of the file object through the external link; the other is In access control mode, the object owner sets an access control list for the object, and specifies the read-only or download permissions of the object in the list, and authorized users can access the object according to the corresponding permissions. [0003] The foregoing object storage modes all implement access control using objects as identifiers, and access control settings have no relationship with each other, and can be applied to the traditional object storage field. With the development of the mobile Internet, social networks have emerged, and mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06Q50/00H04L29/06
Inventor 周文君
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products