Unlock instant, AI-driven research and patent intelligence for your innovation.

File security processing method

A security processing and file technology, applied in the direction of digital data protection, encryption device with shift register/memory, etc., can solve the problems of enterprise loss, file leakage, etc., and achieve the effect of solving security problems and avoiding resource leakage

Inactive Publication Date: 2019-05-14
恒峰信息技术有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology mainly solves file upload and file access, but does not deal with security aspects, it is easy to cause file leakage, which may cause major losses to the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security processing method
  • File security processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with drawings and embodiments.

[0027] see Figure 1-2 1. A file security processing method, comprising:

[0028] S1, submitting the file and the file request corresponding to the file to the server through the java form;

[0029] S2. The server converts the file request into a file request item FileItem; it should be noted that the implementation of this solution uses java language. Each request item is encapsulated into a FileItem object through the DiskFileItemFactory class that creates a FileItem object factory in Java and the ServletFileUpload class that is responsible for processing uploaded file data.

[0030] S3, the server changes the file into a binary format according to the file request item FileItem, stores the file in the binary format into the disk through the output stream OutputStream, and generates a secret key corresponding to the file in the binary format;

[0031] Specifically,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file security processing method. The method comprises the following steps: submitting a file and a file request corresponding to the file to a server through a java form; theserver side converts the file request into a file request item FileIntem; the server side changes the file into a binary format according to the file request item FileIntem, stores the file in the binary format into a disk through an output stream OutputStream, and generates a secret key corresponding to the file in the binary format; and returning the secret key and the storage address when thesecret key is stored in the disk to the client. When the file is uploaded and stored, the server generates the secret key corresponding to the file in the binary format, so that the file can be safelystored. When the file is accessed, the file acquisition interface matches the secret key in the secret key file with the secret key sent by the client; and if the matching is passed, accessing the file corresponding to the secret key, so that the file can be safely obtained, and the resource leakage is effectively avoided.

Description

technical field [0001] The invention relates to the technical field of computer information data processing, in particular to a file security processing method. Background technique [0002] A computer file (or file, computer file, file) is a piece of data stream stored in some kind of long-term storage device or temporary storage device, and is under the management of the computer file system. The so-called "long-term storage devices" generally refer to disks, CDs, tapes, etc. And "short-term storage device" generally refers to computer memory. Document security can include three aspects, namely physical security, logical security and security management. Physical security refers to the physical protection of system equipment and related facilities to prevent them from being damaged or lost. Security management includes various security management policies and mechanisms. Logical security refers to the security of information resources in the system. One of the main fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/06
Inventor 王栋梁王淼谭石仙苏普
Owner 恒峰信息技术有限公司