A Method of Realizing File Access Control Through Timestamp and Encryption Algorithm
An encryption algorithm and file access technology, which is applied in computing, computer security devices, instruments, etc., can solve problems such as not being able to meet the requirements of users' mobile office and time-limited completion, and achieve strong compatibility and high difficulty in cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0026] The present invention will be further described below.
[0027] A method for realizing file access control through time stamp and encryption algorithm, comprising the following steps:
[0028] a) Build an Internet computing service platform, the computing service platform includes N independently running servers, and N is a positive integer greater than or equal to 1.
[0029] b) One of the N independently running servers in the initialization step a) starts the service interface in server A, makes server A connect to the database, and server A enters a waiting state, waiting for the user to send a request.
[0030] c) Upload the file F1 that needs time access control to server A, set the encryption algorithm content that file F1 adopts, set the time range that allows users to access file F1, set the access mode of file F1 and set the file access control code Pwd1;
[0031] d) Assign a unique 64bit length ID and a 64bit length random number SecKey to file F1 in server ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More