File access control method and device, storage medium and electronic device
A control method and file technology, applied in the computer field, can solve problems such as no solution found, hidden space can only passively protect files, affecting users' normal use, etc., to reduce losses, solve low security, and improve security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, a server or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of a file access control server according to the embodiment of the present invention. Such as figure 1 As shown, the server 10 may include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned server can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, server 10 may...
Embodiment 2
[0061] This embodiment also provides a device for controlling access to files, which may be a terminal or a server, and the device is used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0062] Figure 4 is a structural block diagram of a control device for accessing files according to an embodiment of the present invention, which can be applied in a client or a server, such as Figure 4 As shown, the device includes: a detection module 40, an identification module 42, and an interception module 44, wherein,
[0063] The detection module 40 is used to detect the o...
Embodiment 3
[0078] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0079] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0080] S1, detecting the operation behavior of accessing the target file;
[0081] S2. Locally identify an operation subject of the operation behavior on the server, where the operation subject is a process that triggers the operation behavior;
[0082] S3. When the operation subject does not have access authority to the target file, intercept the operation behavior.
[0083] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com