Method for control over file safety access based on cloud computing technology
A security access control and file access technology, applied in the field of information security, can solve problems such as inability to manage files and ensure that file information is not leaked, and achieve the effect of ensuring security, ensuring that it is not leaked, and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] refer to figure 1 , a specific process of a file security access control method based on cloud computing technology is as follows:
[0034] Step 1: Visitor A who has access authority recommends visitor B who is not authorized, and informs visitor B of B's recommendation information;
[0035] Step 2: Visitor B obtains the recommended information, sends an application for review to the cloud server, and requests access to the file;
[0036] Step 3: After the cloud receives the request information, it first verifies the referrer A's access qualification, if A does not have the access qualification, then end; otherwise, go to step 4;
[0037] Step 4: Authenticate the identity of visitor B, and require the pre-set license certifier to perform license certification on visitor B. If the license certification is not passed according to the document confidentiality policy, it will end; otherwise, go to step 5 ;
[0038] Step 5, write the information of visitor B into the fi...
Embodiment 2
[0040] The visitor recommendation information chain shown in this embodiment is as follows: figure 2 As shown, after visitor B obtains the recommendation information, he applies for access permission from the server, and the server reviews it. Each recommendation information will be broadcast to the entire network, and the verified information data will be added to the entire network using the distributed timestamp algorithm. In the recommendation information chain recognized by the Internet, the recommendation information has the signature of the recommender A, which can enable the server to verify the authenticity of the information if necessary; And the responsibility of its recommender A; when visitor B has a problem, the information can be used to know the recommender of B and the person recommended by B, so as to assess them, avoid the problem from being expanded, and ensure information security.
Embodiment 3
[0042] This embodiment provides a brief schematic diagram of users accessing cloud storage data, such as image 3 As shown, when a user applies for accessing a file stored in the cloud or recommends a new user, he must first receive the qualification review of the cloud authorization server, and only after passing the review of the authorization server can he perform operations such as file access.
[0043] The user's file access qualification involved in the present invention needs to be checked periodically on the cloud server to ensure the safety of important files. When the following two situations occur, the cloud server will check the user's access qualification:
[0044] (1) When the user applies to the cloud authorization server to access important files stored in the cloud, prevent illegal users from accessing important files;
[0045] (2) When the user recommends new access users to the cloud authorization server, ensure that the user has the authority to recommend n...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com