File access control method and device, storage medium and electronic device

A control method and file technology, applied in the computer field, can solve problems such as no solution found, hidden space can only passively protect files, affecting users' normal use, etc., to reduce losses, solve low security, and improve security.

Inactive Publication Date: 2019-05-17
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, the operation authority of the file is controlled by setting the authority of the logged-in user, or setting a hidden space to protect the file, such as a general user account can access user files, an administrator account can access system files, etc. There are no restrictions on the access control of the process, so it is impossible to protect the malicious operation of the file by using the trusted process, and the hidden space can only passively protect the file, which affects the normal use of users
[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access control method and device, storage medium and electronic device
  • File access control method and device, storage medium and electronic device
  • File access control method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, a server or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of a file access control server according to the embodiment of the present invention. Such as figure 1 As shown, the server 10 may include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned server can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, server 10 may...

Embodiment 2

[0061] This embodiment also provides a device for controlling access to files, which may be a terminal or a server, and the device is used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0062] Figure 4 is a structural block diagram of a control device for accessing files according to an embodiment of the present invention, which can be applied in a client or a server, such as Figure 4 As shown, the device includes: a detection module 40, an identification module 42, and an interception module 44, wherein,

[0063] The detection module 40 is used to detect the o...

Embodiment 3

[0078] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0079] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0080] S1, detecting the operation behavior of accessing the target file;

[0081] S2. Locally identify an operation subject of the operation behavior on the server, where the operation subject is a process that triggers the operation behavior;

[0082] S3. When the operation subject does not have access authority to the target file, intercept the operation behavior.

[0083] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file access control method and device, a storage medium and an electronic device, and the method comprises the steps of detecting an operation behavior of accessing a target file; locally identifying an operation main body of the operation behavior in a server, the operation main body being a process for triggering the operation behavior; and when the operation subject does not have the access permission to the target file, intercepting the operation behavior. Through the present invention, the technical problem of low file security in related technologies is solved, and the file security is improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for controlling access to files, a storage medium, and an electronic device. Background technique [0002] Files are a common form of information data stored in devices. Due to their wide use and transmission, files can usually be accessed or even edited by any operating subject. [0003] In related technologies, the operation authority of the file is controlled by setting the authority of the login user, or setting a hidden space to protect the file, such as a general user account can access user files, an administrator account can access system files, etc. There are no restrictions on the access control of the process, so it cannot prevent malicious operations on files by using trusted processes, and the hidden space can only passively protect files, which affects the normal use of users. [0004] Aiming at the above-mentioned problems existing in related technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 陈俊儒刘明吴亚峰谢文聪
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products