Permissions of objects in hosted storage
First Claim
1. A method performed by one or more processors, the method comprising:
- sending, by a client system to a hosted storage system, a first data object such that the hosted storage system stores the first data object, the first data object comprising an access control list specifying access permissions for data objects stored in the hosted storage system, wherein the hosted storage system provides hosted storage to a plurality of clients that are coupled to the hosted storage system;
sending, by the client system to the hosted storage system, a request to store a second data object such, the request including an indicator that the first data object stored in the hosted storage system should be used as an access control list for the second data object, wherein the hosted storage system is configured to, in response to receiving the request to store the second data object, store the second data object and assign the first data object as an access control list for the second data object stored in the hosted storage system.
2 Assignments
0 Petitions
Accused Products
Abstract
A data object is stored in a hosted storage system and includes an access control list specifying access permissions for data object stored in the hosted storage system. The hosted storage system provides hosted storage to a plurality of clients that are coupled to the hosted storage system. A request to store a second data object is received. The request includes an indicator that the first data object stored in the hosted storage system should be used as an access control list for the second data object. The second data object is stored in the hosted storage system. The first data object is assigned as an access control list for the second data object stored in the hosted storage system.
18 Citations
14 Claims
-
1. A method performed by one or more processors, the method comprising:
-
sending, by a client system to a hosted storage system, a first data object such that the hosted storage system stores the first data object, the first data object comprising an access control list specifying access permissions for data objects stored in the hosted storage system, wherein the hosted storage system provides hosted storage to a plurality of clients that are coupled to the hosted storage system; sending, by the client system to the hosted storage system, a request to store a second data object such, the request including an indicator that the first data object stored in the hosted storage system should be used as an access control list for the second data object, wherein the hosted storage system is configured to, in response to receiving the request to store the second data object, store the second data object and assign the first data object as an access control list for the second data object stored in the hosted storage system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer storage medium storing a computer program, the program comprising instructions that, when executed by one or more processing devices, cause the one or more processing devices to perform operations comprising:
-
sending, by a client system to a hosted storage system, a first data object such that the hosted storage system stores the first data object, the first data object comprising an access control list specifying access permissions for data objects stored in the hosted storage system, wherein the hosted storage system provides hosted storage to a plurality of clients that are coupled to the hosted storage system; sending, by the client system to the hosted storage system, a request to store a second data object such, the request including an indicator that the first data object stored in the hosted storage system should be used as an access control list for the second data object, wherein the hosted storage system is configured to, in response to receiving the request to store the second data object, store the second data object and assign the first data object as an access control list for the second data object stored in the hosted storage system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification