Unlock instant, AI-driven research and patent intelligence for your innovation.

File access control method and system

A technology for access control tables and documents, applied in transmission systems, digital transmission systems, instruments, etc., can solve problems such as no connection to LDAP server, loss of productivity, and inability of users to access mobile client security resources

Inactive Publication Date: 2013-04-17
IBM CORP
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In such a case, the user will not be able to access secure resources on the mobile client because there will be no connection to the LDAP server
In the case of a business environment, this can lead to severe loss of productivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access control method and system
  • File access control method and system
  • File access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will now be described with reference to the accompanying drawings. should understand figure 1 It is provided merely as an illustration of one implementation and is not intended to imply any limitation as to the environments in which different embodiments may be implemented. Many modifications can be made to the environments shown.

[0012] figure 1 A distributed data processing system, generally designated 100, is shown in accordance with one embodiment of the present invention. System 100 includes server computer 104, server computer 106, and memory 122 (which contains ACL table 124). A plurality of client computers 118 and 120 are coupled to servers 104 and 106 via a network 102 (eg, the Internet). Network 102 represents a global collection of networks and gateways that communicate with each other using the Transmission Control Protocol / Internet Protocol suite. At the heart of the Internet is a backbone of high-speed data communication lines...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password.

Description

technical field [0001] The present invention relates generally to document access control, and more particularly to access control to documents available from a network. Background technique [0002] Electronic documents may contain sensitive information to which access should be restricted. It is well known to encrypt sensitive electronic documents to prevent unauthorized access. In addition to encryption, access to restricted information is often controlled through the use of access control lists (ACLs). Typically, an ACL specifies which users can access protected data and the level of user access to protected data. The list may include an entry for each user with access rights. The ACL can be kept as a table on the local system or it can be kept in the cloud. [0003] "Cloud computing" is well known today and refers to accessing computing resources and data via a network infrastructure, such as the Internet. Computing resources and data storage can be provided by lin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCG06F21/6218G06F2221/2141H04L63/083H04L63/101H04L63/108H04L9/0822H04L9/0863H04L9/3226H04L9/3236H04L63/0428H04L67/02G06F2221/2117G06F2221/2149G06F2221/2107H04L61/4523G06F21/6209H04L9/08H04L63/06
Inventor D.S.布朗J.F.凯利T.西格R.J.托雷斯
Owner IBM CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More