Drive mapping method based on user identity authentication

A technology of user identity authentication and mapping method, which is applied in the field of drive letter mapping based on user identity authentication, and can solve the problem of not being able to guarantee the security of user data as a whole.

Active Publication Date: 2015-07-22
BEIJING VRV SOFTWARE CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this technology is that it is only a folder-to-drive letter m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Drive mapping method based on user identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.

[0017] Such as figure 1 Shown is the method flowchart of the technical solution of the present invention, as can be seen from the figure, the present invention specifically comprises the following steps:

[0018] Step 101: When the user needs to map the drive letter, the user enters the identity password, and the machine reads the user identity information;

[0019] Step 102: use the encryption mode encryption defined in EncMode to encrypt the user identity data with the random key Key in the file header to generate the encrypted string EncCode;

[0020] Step 103: Perform MD5 verification on the encrypted string EncCode to generate an identity verification value to generate user HashCode2;

[0021] Step 104: compare the user HashCode2 with the HashCode1 stored in the file header, if HashCode1=HashCode2, the identity authentication is pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a drive mapping method based on user identity authentication. When a user needs to map a drive, the user inputs an identity password, and an identity secret key is generated into an encrypted string EncCode through a random secret key Key; MD5 verification is carried out on the encrypted string EncCode to generate an identity verification value HashCode2; HashCode2 is compared with HashCode1, and if HashCode1= HashCode2, identity authentication passes; a symbolic link is generated through a drive, and mapped into drive equipment; when the user reads a file, specified file data in the equipment are decrypted through the encrypted string EncCode to be read and operated by the user; when the user needs to write the file in, the file is encrypted through the encrypted string EncCode and stored in a file body. The data safety of the user is high, and the method conforms to the use habit of the user better.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a disk letter mapping method based on user identity authentication. Background technique [0002] The existing disk mapping technology is to map a local folder or a directory of a certain computer in the LAN to a local drive letter, that is to say, map a local folder or a shared folder of other machines on the network to your own drive letter. A disk on the machine. The problem with this technology is that it is only a folder-to-drive letter mapping technology, which cannot guarantee the user's data security as a whole. Contents of the invention [0003] Aiming at the deficiencies of the prior art, the present invention proposes a drive letter mapping method based on user identity authentication. When the method has not passed user identity authentication, the file has been encrypted and cannot be directly read and written. High security; read and write files by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14H04L9/32
Inventor 高曦杨华汤凌峰
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products