Access control method, access control device and terminal device

An access control and access-allowing technology, applied in the information field, can solve the problems of difficult to ensure data security and difficult access to data areas, and achieve the effect of avoiding illegal access, ensuring data security, and improving data security.

Inactive Publication Date: 2010-06-16
LENOVO (BEIJING) CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] An embodiment of the present invention provides an access control method, an access control device and an access device to solve the technical problems existing in the prior art that it is difficult to better control access to the data area and ensure data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, access control device and terminal device
  • Access control method, access control device and terminal device
  • Access control method, access control device and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The reason why it is difficult for the prior art to effectively control the access of the access process to the data area is that the prior art only verifies the validity of the identity of the user using the access process before the access process accesses the data area, and does not verify the validity of the access process. It does legality verification itself, which leads to security risks that illegal processes can also access the data area once the data area is mounted.

[0070] In the specific implementation of the present invention, consider starting from the essence of the access operation, do legal identity verification to the access process that performs the access operation, and be verified as a legal access process to allow access to the data area, otherwise it is not allowed to access, so as to realize data access. Zone access control. Wherein, the accessing process may include all processes expecting to access the data area to be protected. For example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The implementation of the invention provides an access control method, an access control device and an accessing device. The method includes: whether the access process accessing data area is assigned to the designated access process of the data area allowed to be accessed is verified; the data area is used for storing data; and after the access process is verified not to be assigned to the designated access process, the access process is rejected to access the data area. The technical scheme provided by the implementation of the invention can effectively control the access of access process on data area, reject illegal access process to access the data area and effectively ensure the data of the data area to be safe.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to an access control method, an access control device and terminal equipment. Background technique [0002] Usually, in order to ensure the security of the data stored in the data area, the data will be encrypted. Before the legal user accesses the data area based on operating systems such as Windows and Linux, after logging in the data area by entering the correct user password, the operating system mounts (Mount) the data area, and the data area is loaded onto an existing directory. [0003] Wherein, the data area is, for example, a partition in the storage medium. After the data area is mounted, the encrypted data in the data area is open to all processes. That is, all processes, such as access processes used by legitimate users, and other illegal processes maliciously sneaking into the local area, etc., can access the data area and obtain the real content of the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 刘同
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products