Unlock instant, AI-driven research and patent intelligence for your innovation.

A non-public file access method, system, electronic device and storage medium

A file access, non-public technology, applied in the field of communication, can solve the problem of low security of non-public files, achieve the effects of reducing risks, high cracking difficulty, and improving security

Active Publication Date: 2022-04-01
SHENZHEN ONETHING TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on the above filtering method, hackers can cut in from the white list of the filtering layer, add risky processes to the white list, and then access non-public files arbitrarily, resulting in low security of non-public files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A non-public file access method, system, electronic device and storage medium
  • A non-public file access method, system, electronic device and storage medium
  • A non-public file access method, system, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0040] The embodiment of the present application discloses a non-public file access method, which improves the security of the non-public file.

[0041] see figure 1 , a flow chart of a method for accessing non-public documents disclosed in the embodiment of the present application, such as figure 1 shown, including:

[0042] S101: Obtain digital signature information of the process when an access request of the process to the non-public file is detected;

[0043] Preferably, the method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a non-public file access method, system and device, and a computer-readable storage medium. The method includes: when detecting a process's access request to a non-public file, obtaining the digital signature information of the process; Whether the digital signature information of the process is included in the stored digital signature white list; if not, the access request of the process is intercepted. The non-public file access method provided by this application sets a trusted whitelist (such as a digital signature list) at the filtering layer by means of a digital signature. When a hacker invades a non-public file, he must crack the digital signature, which is more difficult to crack than the existing technology. , which greatly reduces the risk of hackers intruding into the whitelist and improves the security of non-public documents.

Description

technical field [0001] The present application relates to the technical field of communication, and more specifically, relates to a method and system for accessing non-public documents, an electronic device, and a computer-readable storage medium. Background technique [0002] With the development of communication technology, users also store more and more data on terminal devices, including a lot of personal privacy information, that is, non-public files, such as private contacts, private photos, private documents, etc., and even stored on the terminal Some commercially confidential information is stored in the device. Although storing data on terminal devices can bring great convenience to people's life and work, it also greatly increases the possibility of user information leakage. [0003] For the access of non-public files, in the prior art, the filter layer intercepts and sets the white list generally, that is, when the access request of the process to the non-public ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/31
CPCG06F21/31G06F21/6218
Inventor 杜琛
Owner SHENZHEN ONETHING TECH CO LTD