Method and system for realizing file sharing access control based on protocol proxy

A file sharing and access control technology, applied in transmission systems, electrical components, etc., can solve the problems of cumbersome authorization, no file access log, and helpless enterprise managers, and achieve the effect of eliminating cross-authority access.

Active Publication Date: 2010-09-22
北京时代亿信科技股份有限公司
View PDF3 Cites 71 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 1. The combination of identity authentication and Windows operating system account is too close and inflexible;
[0014] 2. Authority control relies too much on the ntfs protocol, and the authorization is cumbersome;
[0015] 3.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing file sharing access control based on protocol proxy
  • Method and system for realizing file sharing access control based on protocol proxy
  • Method and system for realizing file sharing access control based on protocol proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The protocol proxy-based implementation of the file sharing access control method proposed by the present invention is described as follows in conjunction with the accompanying drawings and embodiments.

[0057] Such as figure 1 As shown, a file sharing proxy server is added between the original user computer and the file sharing server, figure 1 Among them, three user computers are connected to the file sharing proxy server, and the file sharing proxy server is connected to the file sharing server, and the access control of the user computers to the files in the file sharing server is realized through the file sharing proxy server.

[0058] Before the user computer accesses the shared files, it is necessary to set the IP address of the proxied file sharing server and the login information of the user computer, including the login ID and password; then establish a file sharing proxy server by establishing a connection between the client and the server in the CIFS prot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing file sharing access control based on protocol proxy. The method comprises that a subscriber computer inputs logon information to log on a file sharing proxy server; the logon information input by the subscriber computer is verified in the file sharing proxy serve; a response is made to a shared file access request initiated by the subscriber computerwhich passes the verification to judge whether the subscriber computer has access authority to a requested shared file A or not; if so, the subscriber computer accesses the shared file A by proxy andthe response data packet of the file sharing server is used as a return result and is encapsulated; and otherwise, an access refusal is used as the return result and is encapsulated, the return result is returned to the subscriber computer and an access log is recorded. The invention additionally discloses a system for realizing file sharing access control based on protocol proxy. The invention has the advantages that the shared file access is separated from the dependence on an ntfs file system and the use demands of flexible identity authentication and access behavior auditing can be satisfied.

Description

technical field [0001] The invention relates to the technical field of file sharing access control, in particular to a method and system for realizing file sharing access control based on a protocol agent. Background technique [0002] In the daily computer office application in the enterprise, especially in the scenario where multi-person collaboration is required, in order to facilitate the use and improve work efficiency, it is often necessary to set up a special file server to meet the needs of the work, and all data are stored in a centralized in such a server. With the rapid development of enterprises, there are more and more important documents, research and development results, project materials, etc., which put forward higher requirements for the security of data on the server. The access control of these important documents becomes a security problem that needs to be solved for file sharing within the enterprise. [0003] To achieve secure access control to share...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 章勇
Owner 北京时代亿信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products