Shared file authority control method

A technology for file sharing and authority control, applied to electrical components, instruments, electrical digital data processing, etc., to achieve the effect of ensuring security

Inactive Publication Date: 2012-07-25
WUXI CINSEC INFORMATION TECH
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many loopholes in these control technologies. Using reasonable sharing permission control can not only rationally allocate limited disk space, but also ensure safe access to shared files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared file authority control method
  • Shared file authority control method
  • Shared file authority control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.

[0020] like figure 1 , 2 , 3, a method for controlling shared file permissions provided by the present invention, which includes the following steps:

[0021] a. After file sharing, administrators can set permissions according to specific needs;

[0022] b. Only users who meet the authority can access the shared files, and those outside the authority cannot access, so as to realize the safe access to the shared files;

[0023] c. The administrator divides the key and label range according to the specific work needs of each user in advance, and uses this technology when the client user accesses the shared file, and the encrypted fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a shared file authority control method which is characterized by comprising the following steps: after a file is shared, an administrator sets authority according to the specific need; only the user conforming to the authority can access the shared file so as to realize the secure access to the shared file; the administrator firstly divides the key and label range according to the concrete working need of each user, and the user encrypted files in the same range share the same key; an illegal user without the authority can not access the shared file; if a user with other authority is to access the shared file, the administrator needs to grant the authority for accessing the file; and when in access, a key authentication technology is adopted to judge whether a client has the authority for accessing the shared encrypted file in the range, wherein the encrypted files in different ranges are not interoperable. Through the invention, based on file encryption, effective control on the authority of the shared file is realized, and the users in the authority range can access the shared encrypted file while the users outside the range can not access the shared encrypted file, thereby ensuring the security of the enterprise information.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and in particular relates to a method for controlling the authority of shared files. Background technique [0002] With the popularization of the Internet, on the basis that the external threats to file security have been solved, the control of internal encrypted file permissions has become another new focus of attention in the field of information security. Encrypting and protecting internal files fundamentally solves external security threats to files, and the authority control of internal encrypted file sharing is also an important issue that enterprises and institutions must solve. In the information age, for enterprises and institutions, tangible fixed assets can be valued, but intangible digital assets are the foundation of an enterprise's survival. The rapid development of the Internet is a double-edged sword. On the one hand, the convenience of network communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/22G06F21/62
Inventor 张扬张飞
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products