×

Hierarchical policy-based shared resource access control

  • US 9,516,028 B1
  • Filed: 08/06/2014
  • Issued: 12/06/2016
  • Est. Priority Date: 08/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of accessing shared computing resources in a hierarchical system, the method comprising:

  • receiving a request from a first user to access a particular file that is contained within a shared file folder in a computing file folder hierarchy of a virtual file system stored in a memory or storage of a computing device, wherein the shared file folder is associated with an access control policy;

    responsive to receiving the request from the first user to access the particular file, determining that an effective access control list is not associated with the particular file and generating an effective access control list for the particular file by operations carried out by one or more processors, the operations comprising;

    collecting available access control policies for the shared file folder that contains the particular file and for one or more of a plurality of higher file folders that are higher in the computing file folder hierarchy than the shared file folder containing the particular file, andanalyzing permissions specified in the collected access control policies to generate the effective access control list for the particular file, wherein the analyzing comprises combining the permissions specified in the collected access control policies for the shared file folder and the one or more of the plurality of higher file folders that are higher in the computing file folder hierarchy than the shared file folder;

    based on the generated effective access control list for the particular file, determining that the first user is authorized to access the particular file;

    associating the generated effective access control list with the particular file in an effective access control list data store;

    subsequent to generating the effective access control list for the particular file, receiving a subsequent request from a second user to access the particular file; and

    responsive to receiving the subsequent request from the second user to access the particular file, determining that the generated effective access control list is associated with the particular file in the effective access control list data store and determining, based on the generated effective access control list, that the second user is authorized to access the particular file.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×