Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for control over file safety access based on cloud computing technology

A security access control and file access technology, applied in the field of information security, can solve problems such as inability to manage files and ensure that file information is not leaked, and achieve the effect of ensuring security, ensuring that it is not leaked, and ensuring security.

Active Publication Date: 2014-02-12
北京万智千鸿科技有限公司
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current file security management system is limited to the scope of the local area network, and the file operation management and monitoring of the host must be connected to the local area network, and it is impossible to manage the security of files sent to customers, and cannot guarantee that file information will not be leaked. Can not fully meet the needs of the current business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for control over file safety access based on cloud computing technology
  • Method for control over file safety access based on cloud computing technology
  • Method for control over file safety access based on cloud computing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] refer to figure 1 , a specific process of a file security access control method based on cloud computing technology is as follows:

[0034] Step 1: Visitor A who has access authority recommends visitor B who is not authorized, and informs visitor B of B's ​​recommendation information;

[0035] Step 2: Visitor B obtains the recommended information, sends an application for review to the cloud server, and requests access to the file;

[0036] Step 3: After the cloud receives the request information, it first verifies the referrer A's access qualification, if A does not have the access qualification, then end; otherwise, go to step 4;

[0037] Step 4: Authenticate the identity of visitor B, and require the pre-set license certifier to perform license certification on visitor B. If the license certification is not passed according to the document confidentiality policy, it will end; otherwise, go to step 5 ;

[0038] Step 5, write the information of visitor B into the fi...

Embodiment 2

[0040] The visitor recommendation information chain shown in this embodiment is as follows: figure 2 As shown, after visitor B obtains the recommendation information, he applies for access permission from the server, and the server reviews it. Each recommendation information will be broadcast to the entire network, and the verified information data will be added to the entire network using the distributed timestamp algorithm. In the recommendation information chain recognized by the Internet, the recommendation information has the signature of the recommender A, which can enable the server to verify the authenticity of the information if necessary; And the responsibility of its recommender A; when visitor B has a problem, the information can be used to know the recommender of B and the person recommended by B, so as to assess them, avoid the problem from being expanded, and ensure information security.

Embodiment 3

[0042] This embodiment provides a brief schematic diagram of users accessing cloud storage data, such as image 3 As shown, when a user applies for accessing a file stored in the cloud or recommends a new user, he must first receive the qualification review of the cloud authorization server, and only after passing the review of the authorization server can he perform operations such as file access.

[0043] The user's file access qualification involved in the present invention needs to be checked periodically on the cloud server to ensure the safety of important files. When the following two situations occur, the cloud server will check the user's access qualification:

[0044] (1) When the user applies to the cloud authorization server to access important files stored in the cloud, prevent illegal users from accessing important files;

[0045] (2) When the user recommends new access users to the cloud authorization server, ensure that the user has the authority to recommend n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for control over file safety access based on the cloud computing technology. The method comprises the following steps that an accessor A with the access authority recommends an accessor B without the access authority; the accessor B requests to obtain the file access authority; a cloud terminal receives and verifies the access authority of the recommender A; the identity of the accessor B is authenticated and permission authentication is conducted on the accessor B; the accessor B computes an access signature of the accessor B, and the access signature is verified by the cloud terminal; information of the accessor B is written into a file access chain table, and the accessor B obtains the file access authority. According to the method for control over file safety access based on the cloud computing technology, the purpose of access authority authentication in a distributed type environment is achieved through accessor identity authentication, accessor permission authentication and file access recording, and therefore it is ensured that data are not leaked.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a file security access control method based on cloud computing technology. Background technique [0002] With the rapid development of the network and the continuous expansion of the capacity of hardware storage devices, the security of confidential documents has become the most concerned issue of enterprises. Now many companies choose various document encryption products. In information systems, data security has become a focus of attention, and it is also a necessary means for enterprises and institutions to protect digital intellectual property rights. With the expansion of the scale of enterprises and institutions, more and more branch offices in various places go out to work. The file security management and monitoring of enterprises and institutions' computers is not limited to the internal LAN, but has been extended to the entire network. However,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李志华李朋飞
Owner 北京万智千鸿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products