Claims
- 1. A method of determining authorization for actions, comprising:
defining a plurality of groups; defining a plurality of action types and corresponding levels of authorization for each of the groups; for at least a subset of the action types, defining a plurality of devices on which corresponding actions may be performed, wherein at least some of the devices correspond to portions of a data storage device; and for the at least one of the groups, determining authorization for a requested action, wherein if the action corresponds to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group and by examining the plurality of devices corresponding to the requested action and wherein if the action does not correspond to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group.
- 2. A method, according to claim 1, wherein the action types include system calls to the data storage device.
- 3. A method, according to claim 1, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 4. A method, according to claim 1, wherein the at least one of the devices includes communication ports of the data storage device.
- 5. A method, according to claim 4, wherein the action types indicate whether system calls are allowed on the communication ports.
- 6. A method, according to claim 1, further comprising:
in response to a requested action being authorized, returning a tag that may be used in connection with subsequent requests that the action be performed.
- 7. A method of determining authorization for actions, comprising:
determining if a requestor is in a list of requestors; determining if the requested action is in a list of action types associated with the requestor; and if the action uses at least one device, determining if the at least one device is in a list of devices associated with the requestor and the requested action, wherein the list of devices includes at least some devices associated with a data storage device.
- 8. A method, according to claim 7, further comprising:
if the requestor is not in the list of requestors, using a default requestor from the list of requestors.
- 9. A method, according to claim 7, further comprising:
if the requestor is not in the list of requestors, denying authorization.
- 10. A method, according to claim 7, further comprising:
if the requested action does not use at least one device, authorizing the action if the requested action is in a list of action types associated with the requestor.
- 11. A method, according to claim 7, wherein at least some of the action types do not correspond to actions performed on the data storage device.
- 12. A method, according to claim 7, wherein the action types include system calls to the data storage device.
- 13. A method, according to claim 7, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 14. A method, according to claim 7, wherein the at least one of the devices includes communication ports of the data storage device.
- 15. A method, according to claim 14, wherein the action types indicate whether system calls are allowed on the communication ports.
- 16. A method, according to claim 7, further comprising:
in response to a requested action being authorized, returning a tag that may be used in connection with subsequent requests that the action be performed.
- 17. An apparatus that determines authorization for actions, comprising:
means for defining a plurality of groups; means for defining a plurality of action types and corresponding levels of authorization for each of the groups; means for defining a plurality of devices on which corresponding actions may be performed for at least a subset of the action types, wherein at least some of the devices correspond to portions of a data storage device; and means for determining authorization for a requested action for the at least one of the groups, wherein if the action corresponds to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group and by examining the plurality of devices corresponding to the requested action and wherein if the action does not correspond to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group.
- 18. An apparatus, according to claim 17, wherein the action types include system calls to the data storage device.
- 19. An apparatus, according to claim 17, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 20. An apparatus, according to claim 17, wherein the at least one of the devices includes communication ports of the data storage device.
- 21. An apparatus, according to claim 20, wherein the action types indicate whether system calls are allowed on the communication ports.
- 22. An apparatus, according to claim 17, further comprising:
means for returning a tag that may be used in connection with subsequent requests that the action be performed in response to a requested action being authorized.
- 23. An apparatus that determines authorization for actions, comprising:
means for determining if a requestor is in a list of requestors; means for determining if the requested action is in a list of action types associated with the requestor; and means for determining if the at least one device is in a list of devices associated with the requestor and the requested action if the action uses at least one device, wherein the list of devices includes at least some devices associated with a data storage device.
- 24. An apparatus, according to claim 23, further comprising:
means for using a default requestor from the list of requestors if the requestor is not in the list of requestors.
- 25. An apparatus, according to claim 23, further comprising:
means for denying authorization if the requestor is not in the list of requestors.
- 26. An apparatus, according to claim 23, further comprising:
means for authorizing the action if the requested action is in a list of action types associated with the requestor if the requested action does not use at least one device.
- 27. An apparatus, according to claim 23, wherein at least some of the action types do not correspond to actions performed on the data storage device.
- 28. An apparatus, according to claim 23, wherein the action types include system calls to the data storage device.
- 29. An apparatus, according to claim 23, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 30. An apparatus, according to claim 23, wherein the at least one of the devices includes communication ports of the data storage device.
- 31. An apparatus, according to claim 30, wherein the action types indicate whether system calls are allowed on the communication ports.
- 32. An apparatus, according to claim 23, further comprising:
means for returning a tag that may be used in connection with subsequent requests that the action be performed in response to a requested action being authorized.
- 33. Computer software that determines authorization for actions, comprising:
executable code that accesses a plurality of groups; executable code that accesses a plurality of action types and corresponding levels of authorization for each of the groups; executable code that accesses a plurality of devices on which corresponding actions may be performed for at least a subset of the action types, wherein at least some of the devices correspond to portions of a data storage device; and executable code that determines authorization for a requested action for the at least one of the groups, wherein if the action corresponds to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group and by examining the plurality of devices corresponding to the requested action and wherein if the action does not correspond to one of the devices, authorization is determined by examining the levels of authorization for action types corresponding to the at least one group.
- 34. Computer software, according to claim 33, wherein the action types include system calls to the data storage device.
- 35. Computer software, according to claim 33, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 36. Computer software, according to claim 33, wherein the at least one of the devices includes communication ports of the data storage device.
- 37. Computer software, according to claim 36, wherein the action types indicate whether system calls are allowed on the communication ports.
- 38. Computer software, according to claim 33, further comprising:
computer software that returns a tag that may be used in connection with subsequent requests that the action be performed in response to a requested action being authorized.
- 39. Computer software that determines authorization for actions, comprising:
executable code that determines if a requestor is in a list of requestors; executable code that determines if the requested action is in a list of action types associated with the requestor; and executable code that determines if the at least one device is in a list of devices associated with the requestor and the requested action if the action uses at least one device, wherein the list of devices includes at least some devices associated with a data storage device.
- 40. Computer software, according to claim 39, further comprising:
executable code that uses a default requestor from the list of requestors if the requestor is not in the list of requestors.
- 41. Computer software, according to claim 39, further comprising:
executable code that denies authorization if the requestor is not in the list of requestors.
- 42. Computer software, according to claim 39, further comprising:
executable code that authorizes the action if the requested action is in a list of action types associated with the requestor if the requested action does not use at least one device.
- 43. Computer software, according to claim 39, wherein at least some of the action types do not correspond to actions performed on the data storage device.
- 44. Computer software, according to claim 39, wherein the action types include system calls to the data storage device.
- 45. Computer software, according to claim 39, wherein the at least one of the devices includes at least one disk storage area of the data storage device.
- 46. Computer software, according to claim 39, wherein the at least one of the devices includes communication ports of the data storage device.
- 47. Computer software, according to claim 46, wherein the action types indicate whether system calls are allowed on the communication ports.
- 48. Computer software, according to claim 39, further comprising:
executable code that returns a tag that may be used in connection with subsequent requests that the action be performed in response to a requested action being authorized.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application is a CIP of U.S. patent application Ser. No. 09/604,592 filed on Jun. 27, 2000 (pending), which is a CIP of U.S. patent application Ser. No. 09/533,009 filed on Mar. 22, 2000 (pending) and claims priority to U.S. provisional patent application Ser. No. 60/180,632 filed on Feb. 7, 2000 (pending), which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60180632 |
Feb 2000 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
| Parent |
09604592 |
Jun 2000 |
US |
| Child |
09774532 |
Jan 2001 |
US |
| Parent |
09533009 |
Mar 2000 |
US |
| Child |
09604592 |
Jun 2000 |
US |