Controlling access to XAM metadata
First Claim
Patent Images
1. A method for use in controlling access to eXtensible Access Method (XAM) metadata stored in an object addressable data storage system, the method comprising:
- storing, in the object addressable data storage system, an object derived from a set of content, the object having an object identifier;
adding, via the object addressable storage system, storage system specific filtered transiently attached metadata to the object, the storage system specific filtered transiently attached metadata being accessible when the object is retrieved using the object identifier, wherein the metadata includes first fields having respective flags indicating that the fields are automatically generated internally or externally to the object addressable storage system and second fields indicating which application can access respective pieces of metadata; and
based on sub-object access control, allowing a retrieving application to have access to only a subset of the object'"'"'s storage system specific filtered transiently attached metadata and preventing access to at least one other subset of the object'"'"'s storage system specific filtered transiently attached metadata, wherein sub-object access control is based on flags indicating which applications can access associated pieces of metadata.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is used in controlling access to XAM metadata. An object derived from a set of content is stored in an object addressable data storage system. The object has an object identifier. Storage system specific metadata is added to the object. The storage system specific metadata is accessible when the object is retrieved using the object identifier. Based on sub-object access control, a retrieving application is allowed to have access to only a subset of the object.
-
Citations
20 Claims
-
1. A method for use in controlling access to eXtensible Access Method (XAM) metadata stored in an object addressable data storage system, the method comprising:
-
storing, in the object addressable data storage system, an object derived from a set of content, the object having an object identifier; adding, via the object addressable storage system, storage system specific filtered transiently attached metadata to the object, the storage system specific filtered transiently attached metadata being accessible when the object is retrieved using the object identifier, wherein the metadata includes first fields having respective flags indicating that the fields are automatically generated internally or externally to the object addressable storage system and second fields indicating which application can access respective pieces of metadata; and based on sub-object access control, allowing a retrieving application to have access to only a subset of the object'"'"'s storage system specific filtered transiently attached metadata and preventing access to at least one other subset of the object'"'"'s storage system specific filtered transiently attached metadata, wherein sub-object access control is based on flags indicating which applications can access associated pieces of metadata. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for use in controlling access to eXtensible Access Method (XAM) metadata stored in an object addressable data storage system, the system comprising:
-
first hardware logic configured to store, in the object addressable data storage system, an object derived from a set of content, the object having an object identifier; second hardware logic configured to add, via the storage system, object addressable storage system specific filtered transiently attached metadata to the object, the storage system specific filtered transiently attached metadata being accessible when the object is retrieved using the object identifier, wherein the metadata includes first fields having respective flags indicating that the fields are automatically generated internally or externally to the object addressable storage system and second fields indicating which application can access respective pieces of metadata; and third hardware logic configured to allow, based on sub-object access control, a retrieving application to have access to only a subset of the object'"'"'s storage system specific filtered transiently attached metadata and to prevent access to at least one other subset of the object'"'"'s storage system specific filtered transiently attached metadata, wherein sub-object access control is based on flags indicating which applications can access associated pieces of metadata. - View Dependent Claims (18, 19, 20)
-
Specification