Movatterモバイル変換


[0]ホーム

URL:


US20110271336A1 - Computer and Access Control Method in a Computer - Google Patents

Computer and Access Control Method in a Computer
Download PDF

Info

Publication number
US20110271336A1
US20110271336A1US13/179,715US201113179715AUS2011271336A1US 20110271336 A1US20110271336 A1US 20110271336A1US 201113179715 AUS201113179715 AUS 201113179715AUS 2011271336 A1US2011271336 A1US 2011271336A1
Authority
US
United States
Prior art keywords
management
program
authority
user
management program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/179,715
Inventor
Koichi Murayama
Masahide Sato
Nobuo Ito
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi LtdfiledCriticalHitachi Ltd
Priority to US13/179,715priorityCriticalpatent/US20110271336A1/en
Publication of US20110271336A1publicationCriticalpatent/US20110271336A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A CPU11 executes a management program B (Pb), from a management program A (Pa) receives authentication information, a request, and a program ID, and determines whether the authentication information is correct. If the authentication information is correct, the CPU11 acquires the execution authority information of the authenticated user, compares the received program ID with the program ID including in the acquired execution authority information, and determines whether execution authority corresponding to the received program ID is defined. If the CPU11 determines that execution authority corresponding to the received program ID is defined, it established the defined execution authority as the execution authority for the management program B (Pb).

Description

Claims (8)

18. A computer for managing a first managed apparatus, the computer comprising a processor that executes programs stored in a memory;
the memory comprises an integrated management program, an apparatus management program for the first managed apparatus, and user management information;
the computer is coupled to the first managed apparatus and is configured to:
receive user authentication information of a first user, and a management request for the first managed apparatus for at least the apparatus management program;
wherein the user management information indicates a first authority and a second authority for the first user, the first authority is an authority that the first user manages the first managed apparatus by using the apparatus management program without the integrated management program, the second authority is an authority that the first user manages the first managed apparatus by using the apparatus management program through the integrated management program;
wherein if the user authentication information and the management request are for the apparatus management program:
the apparatus management program decides whether the first user has an authority to execute the management request based on the first authority of the user management information and the user authentication information, and
the apparatus management program sends the management request to the first managed apparatus if the first authority includes permission to execute the management request;
wherein if the user authentication information and the management request are for the integrated management program:
the integrated management program decides whether the first user has an authority to execute the management request based on the user authentication information and based on the user management information or another user management information for the integrated management program,
the integrated management program internally or externally sends a management request to the apparatus managed program with the user authentication information if the first user is permitted to execute the management request for the integrated management program,
the apparatus management program decides whether the first user has an authority to execute the management request based on the second authority of the user management information and the user authentication information, and
the apparatus management program sends the management request to the first managed apparatus if the second authority includes permission to execute the management request; and
wherein the first authority and the second authority are different.
22. A computer according toclaim 18, wherein the computer is further configured to:
receive user authentication information of a first user, and a management request for a second managed apparatus for at least the apparatus management program; and
wherein if the user authentication information and the management request are for the apparatus management program, then the apparatus management program sends the management request to the second managed apparatus if the first authority includes permission to execute the management request, and if the user authentication information and the management request are for the integrated management program, then the apparatus management program sends the management request to the second managed apparatus if the second authority includes permission to execute the management request.
23. A management computer coupled to a first managed apparatus over a computer network, the management computer comprising a processor that executes programs stored in a memory, the management computer is configured to:
receive a management request and user authentication information at the management computer from a client computer for utilization of the first managed apparatus through at least one of an apparatus management program at the management computer or an integrated management program stored at the management computer;
determine a first authority and a second authority for a first user at the client computer, based on user management information stored at the management computer, wherein the first authority is an authority through which the first user manages the first managed apparatus by using the apparatus management program without the integrated management program, and the second authority is an authority through which the first user manages the first managed apparatus by using the apparatus management program through the integrated management program;
wherein if the user authentication information and the management request are for utilization of the first managed apparatus through the apparatus management program, then:
the apparatus management program decides whether the first user has an authority to execute the management request based on the first authority of the user management information and the user authentication information, and
the apparatus management program sends the management request to the first managed apparatus if the first authority includes permission to execute the management request;
wherein if the user authentication information and the management request are for utilization of the first managed apparatus through the integrated management program, then the integrated management program:
decides whether the first user has an authority to execute the management request based on the user authentication information and based on the user management information or another user management information for the integrated management program,
internally or externally sends a management request to the apparatus managed program with the user authentication information if the first user permitted to execute the management request for the integrated management program,
decides whether the first user has an authority to execute the management request based on the second authority of the user management information and the user authentication information, and
sends the management request to the first managed apparatus if the second authority includes permission to execute the management request; and
wherein the first authority and the second authority are different.
24. A management computer according toclaim 23, further configured to:
receive a management request and user authentication information at the management computer from the client computer for utilization of a second managed apparatus through at least one of an apparatus management program at the management computer or an integrated management program stored at the management computer;
wherein if the user authentication information and the management request are for the apparatus management program, then the apparatus management program sends the management request to the second managed apparatus if the first authority includes permission to execute the management request, and if the user authentication information and the management request are for the integrated management program, then the apparatus management program sends the management request to the second managed apparatus if the second authority includes permission to execute the management request.
US13/179,7152004-10-292011-07-11Computer and Access Control Method in a ComputerAbandonedUS20110271336A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/179,715US20110271336A1 (en)2004-10-292011-07-11Computer and Access Control Method in a Computer

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
JP2004315583AJP4532237B2 (en)2004-10-292004-10-29 Computer and access control method in computer
JP2004-3155832004-10-29
US11/024,123US7461135B2 (en)2004-10-292004-12-27Computer and access control method in a computer
US12/273,612US7984133B2 (en)2004-10-292008-11-19Computer and access control method in a computer
US13/179,715US20110271336A1 (en)2004-10-292011-07-11Computer and Access Control Method in a Computer

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/273,612ContinuationUS7984133B2 (en)2004-10-292008-11-19Computer and access control method in a computer

Publications (1)

Publication NumberPublication Date
US20110271336A1true US20110271336A1 (en)2011-11-03

Family

ID=36317815

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US11/024,123Expired - Fee RelatedUS7461135B2 (en)2004-10-292004-12-27Computer and access control method in a computer
US12/273,612Expired - Fee RelatedUS7984133B2 (en)2004-10-292008-11-19Computer and access control method in a computer
US13/179,715AbandonedUS20110271336A1 (en)2004-10-292011-07-11Computer and Access Control Method in a Computer

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US11/024,123Expired - Fee RelatedUS7461135B2 (en)2004-10-292004-12-27Computer and access control method in a computer
US12/273,612Expired - Fee RelatedUS7984133B2 (en)2004-10-292008-11-19Computer and access control method in a computer

Country Status (2)

CountryLink
US (3)US7461135B2 (en)
JP (1)JP4532237B2 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060265759A1 (en)*2005-05-192006-11-23Microsoft CorporationSystems and methods for identifying principals to control access to computing resources
JP4720303B2 (en)*2005-06-082011-07-13株式会社日立製作所 Configuration management method for computer system including storage system
JP4615474B2 (en)*2006-04-072011-01-19株式会社エヌ・ティ・ティ・ドコモ Communication terminal, user data movement system, and user data movement method
JP4977536B2 (en)*2006-08-112012-07-18株式会社リコー Information processing apparatus, information acquisition method, and information acquisition program
US7712143B2 (en)*2006-09-272010-05-04Blue Ridge Networks, Inc.Trusted enclave for a computer system
JP2008097214A (en)*2006-10-102008-04-24Hitachi Ltd Access right management method, management computer, and management program
US7809955B2 (en)*2006-10-172010-10-05Blue Ridge Networks, Inc.Trustable communities for a computer system
JP4909756B2 (en)*2007-02-092012-04-04株式会社リコー Information processing apparatus, external application utilization method, and program
US20090271547A1 (en)*2008-04-282009-10-29Anuradha GoelTarget Discovery and Virtual Device Access Control based on Username
KR101041115B1 (en)2008-09-022011-06-13주식회사 신한은행 Method and system of using website by authority control and recording media for it
KR101056423B1 (en)*2008-09-022011-08-11주식회사 신한은행 Program Execution Management Method and Record Media Using Logged-In Account Control
JP4743297B2 (en)*2009-03-162011-08-10コニカミノルタビジネステクノロジーズ株式会社 Image forming apparatus, function expansion method, and user authentication system
JP5463112B2 (en)*2009-09-242014-04-09Necパーソナルコンピュータ株式会社 Information processing apparatus, file access control method, program, and computer-readable recording medium
JP2011090550A (en)*2009-10-232011-05-06Hitachi LtdComputer system and program recording medium
US8966194B2 (en)*2009-10-292015-02-24Cleversafe, Inc.Processing a write request in a dispersed storage network
US20110154015A1 (en)*2009-12-212011-06-23Tareq Mahmud RahmanMethod For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File
US20190095101A1 (en)2010-08-022019-03-28International Business Machines CorporationAuthenticating a credential in a dispersed storage network
KR101748318B1 (en)*2010-11-222017-06-27삼성전자 주식회사Method and apparatus for executing application of mobile terminal
JP6123350B2 (en)*2013-02-262017-05-10日本電気株式会社 Verification device, verification method, and program
JP6322967B2 (en)*2013-11-192018-05-16日本電気株式会社 Data protection apparatus, method, and program
JP6801267B2 (en)*2016-07-042020-12-16富士通株式会社 Evaluation program, evaluation method, evaluation device and information processing device
CN109558751A (en)*2018-11-302019-04-02深圳市盟天科技有限公司A kind of access method of application program, device, server and storage medium
CN110414230B (en)*2019-06-212022-04-08腾讯科技(深圳)有限公司Virus checking and killing method and device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020111948A1 (en)*1999-10-182002-08-15Nixon Mark J.Interconnected zones within a process control system
US20030112977A1 (en)*2001-12-182003-06-19Dipankar RayCommunicating data securely within a mobile communications network
US6820168B2 (en)*2001-01-252004-11-16Hitachi, Ltd.Storage system and virtual private volume control method
US20050061878A1 (en)*2003-09-232005-03-24Ronald BarenburgMethod for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US20050071630A1 (en)*2003-08-152005-03-31Imcentric, Inc.Processing apparatus for monitoring and renewing digital certificates
US20050257274A1 (en)*2004-04-262005-11-17Kenta ShigaStorage system, computer system, and method of authorizing an initiator in the storage system or the computer system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5414852A (en)1992-10-301995-05-09International Business Machines CorporationMethod for protecting data in a computer system
JP4651230B2 (en)*2001-07-132011-03-16株式会社日立製作所 Storage system and access control method to logical unit
JP2002222061A (en)*2001-01-252002-08-09Hitachi Ltd Method of setting storage area, storage device, and program storage medium
JP2003330622A (en)*2002-03-082003-11-21Hitachi Ltd Access management server, disk array system, and access management method therefor
US20030172069A1 (en)2002-03-082003-09-11Yasufumi UchiyamaAccess management server, disk array system, and access management method thereof
JP4240929B2 (en)2002-07-102009-03-18日本電気株式会社 Access control method in file management system
JP4093811B2 (en)2002-07-242008-06-04富士通株式会社 User access right control apparatus and method
JP4361752B2 (en)*2003-03-312009-11-11株式会社富士通ソーシアルサイエンスラボラトリ Access control method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020111948A1 (en)*1999-10-182002-08-15Nixon Mark J.Interconnected zones within a process control system
US6820168B2 (en)*2001-01-252004-11-16Hitachi, Ltd.Storage system and virtual private volume control method
US20030112977A1 (en)*2001-12-182003-06-19Dipankar RayCommunicating data securely within a mobile communications network
US20050071630A1 (en)*2003-08-152005-03-31Imcentric, Inc.Processing apparatus for monitoring and renewing digital certificates
US20050061878A1 (en)*2003-09-232005-03-24Ronald BarenburgMethod for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US20050257274A1 (en)*2004-04-262005-11-17Kenta ShigaStorage system, computer system, and method of authorizing an initiator in the storage system or the computer system

Also Published As

Publication numberPublication date
JP4532237B2 (en)2010-08-25
US7984133B2 (en)2011-07-19
JP2006127205A (en)2006-05-18
US7461135B2 (en)2008-12-02
US20090077250A1 (en)2009-03-19
US20060101399A1 (en)2006-05-11

Similar Documents

PublicationPublication DateTitle
US7984133B2 (en)Computer and access control method in a computer
US8966281B1 (en)Systems and methods for accessing storage or network based replicas of encryped volumes with no additional key management
US8261068B1 (en)Systems and methods for selective encryption of operating system metadata for host-based encryption of data at rest on a logical unit
US7793101B2 (en)Verifiable virtualized storage port assignments for virtual machines
US6493825B1 (en)Authentication of a host processor requesting service in a data processing network
US6295575B1 (en)Configuring vectors of logical storage units for data storage partitioning and sharing
US8185961B2 (en)Network system, method for controlling access to storage device, management server, storage device, log-in control method, network boot system, and method of accessing individual storage unit
US8166314B1 (en)Selective I/O to logical unit when encrypted, but key is not available or when encryption status is unknown
US6799255B1 (en)Storage mapping and partitioning among multiple host processors
US6421711B1 (en)Virtual ports for data transferring of a data storage system
US7620984B2 (en)Method of managing computer system
US7840730B2 (en)Cluster shared volumes
US7039662B2 (en)Method and apparatus of media management on disk-subsystem
CN103299312B (en) Data storage system and control method thereof
US7380094B2 (en)Storage system and storage management system
WO2008063417A2 (en)Resource level role based access control for storage management
US8713307B2 (en)Computer system and volume migration control method using the same
JP4863905B2 (en) Storage usage exclusion method
KR101056423B1 (en) Program Execution Management Method and Record Media Using Logged-In Account Control
CN101137993A (en)Network system, access control method for storage device, management server, storage device, login control method, network guidance system, and unit storage unit access method
JP7596414B2 (en) Multi-tenant management system and method

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp