Access control in a hybrid environment
First Claim
Patent Images
1. A computer program product including a non-transitory computer readable medium storing instructions for causing a computer to implement a heterogeneous operating system data access method, the method comprising:
- receiving, in a first computing system having a first operating system, a request from a second computing system to access a data set, wherein the second computing system has a second operating system dissimilar to the first operating system;
preparing, by the first computing system, the data set for access by the second computing system;
determining, by the first computing system, characteristics of the data set;
passing the characteristics of the data set from the first computing system to the second computing system;
setting, by the first computing system, permissions for the second computing system to access the data set;
confirming, in the second computing system, that the second computing system has been granted access to the data set;
coordinating, in the second computing system, access to the data set;
granting the second computing system, by the first computing system, access to the data set, the access including a type of access and an extent of the type of access to which the second computing system can access the data set; and
notifying, from the second computing system to the first computing system, that the second computing system accessed the data set.
1 Assignment
0 Petitions
Accused Products
Abstract
A heterogeneous computing system includes a first server module having a first operating system, a second server module communicatively coupled to the first server module, the second server module having a second operating system dissimilar to the first operating system, a data set accessible by the first server module and the second server module; and a process residing on the first server module, the process configured to grant access to the second server module, from the first server module, to the data set.
40 Citations
14 Claims
-
1. A computer program product including a non-transitory computer readable medium storing instructions for causing a computer to implement a heterogeneous operating system data access method, the method comprising:
-
receiving, in a first computing system having a first operating system, a request from a second computing system to access a data set, wherein the second computing system has a second operating system dissimilar to the first operating system; preparing, by the first computing system, the data set for access by the second computing system; determining, by the first computing system, characteristics of the data set; passing the characteristics of the data set from the first computing system to the second computing system; setting, by the first computing system, permissions for the second computing system to access the data set; confirming, in the second computing system, that the second computing system has been granted access to the data set; coordinating, in the second computing system, access to the data set; granting the second computing system, by the first computing system, access to the data set, the access including a type of access and an extent of the type of access to which the second computing system can access the data set; and notifying, from the second computing system to the first computing system, that the second computing system accessed the data set. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A heterogeneous computing system, comprising:
-
a first server module having a first operating system; a second server module communicatively coupled to the first server module, the second server module having a second operating system dissimilar to the first operating system; a data set accessible by the first server module and the second server module, wherein the data set is disposed on the first server module; a first process residing on the first server module, the first process configured to grant permissions and access to the second server module, from the first server module, to the data set, the access including a type of access and an extent of the type of access to which the second server module can access the data set, and a second process residing on the second server module, the second process configured to confirm that access to the data set has been granted to the second server module and to coordinate access to the data set; wherein the first process is configured to receive a request from a second computing system to access a data set, prepare, the data set for access by the second computing system, determine characteristics of the data set, pass the characteristics of the data set from the first computing system to the second computing system, set permissions for the second computing system to access the data set, grant the second computing system access to the data set, and wherein the second process is configured to notify the first computing system that the second computing system accessed the data set. - View Dependent Claims (7, 8, 9)
-
-
10. A heterogeneous operating system data access method, comprising:
-
receiving, in a first computing system having a first operating system, a request from a second computing system to access a data set, wherein the second computing system has a second operating system dissimilar to the first operating system; preparing, by the first computing system, the data set for access by the second computing system; determining, by the first computing system, characteristics of the data set; passing the characteristics of the data set from the first computing system to the second computing system; setting, by the first computing system, permissions for the second computing system to access the data set; confirming, in the second computing system, that the second computing system has been granted access to the data set; coordinating, in the second computing system, access to the data set; granting the second computing system, by the first computing system, access to the data set, the access including a type of access and an extent of the type of access to which the second computing system can access the data set; and notifying, from the second computing system to the first computing system, that the second computing system accessed the data set. - View Dependent Claims (11, 12, 13, 14)
-
Specification