Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method of Realizing File Access Control Through Timestamp and Encryption Algorithm

An encryption algorithm and file access technology, which is applied in computing, computer security devices, instruments, etc., can solve problems such as not being able to meet the requirements of users' mobile office and time-limited completion, and achieve strong compatibility and high difficulty in cracking

Active Publication Date: 2021-10-08
山东新潮信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The login control method through the virtual host in the local area network can effectively control the user's login location and indirectly achieve the goal of accessing a certain file during working hours, but it cannot meet the needs of users for mobile office
[0005] 2. Using the control method of password encryption algorithm can get rid of the limitation of fixed office, but it cannot solve the requirement of time-limited completion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below.

[0027] A method for realizing file access control through time stamp and encryption algorithm, comprising the following steps:

[0028] a) Build an Internet computing service platform, the computing service platform includes N independently running servers, and N is a positive integer greater than or equal to 1.

[0029] b) One of the N independently running servers in the initialization step a) starts the service interface in server A, makes server A connect to the database, and server A enters a waiting state, waiting for the user to send a request.

[0030] c) Upload the file F1 that needs time access control to server A, set the encryption algorithm content that file F1 adopts, set the time range that allows users to access file F1, set the access mode of file F1 and set the file access control code Pwd1;

[0031] d) Assign a unique 64bit length ID and a 64bit length random number SecKey to file F1 in server ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for realizing file access control through time stamp and encryption algorithm, and a method for realizing file access control through the combination of time stamp and encryption algorithm, which can be run on multiple independent servers, and can adapt to the complexity of the Internet environment and cloud computing environment software and hardware equipment and a variety of development languages, does not rely on specific equipment or software, while the prior art relies on specific software tools or third-party security certification to achieve, compared with the prior art, the method of the present invention has a stronger compatibility. According to the actual needs of users, the access time of files can be flexibly set, and it can be flexibly allocated. It has the advantages of compactness and high efficiency, and can implement the method described in this invention under various environments of C / S and B / S. Traditional file access control systems cannot achieve such flexibility. And the time stamp is taken from an independent NTP server on the Internet, which has nothing to do with the time of the server or the user's computer. It can effectively protect sensitive data information and is difficult to crack.

Description

technical field [0001] The invention relates to the field of data security and protection of information technology, in particular to a method for realizing file access control through a time stamp and an encryption algorithm. Background technique [0002] At present, the methods for controlling user access to files in the Internet environment usually adopt access control methods such as controlling the login location, controlling the login account, permission verification or password verification and review. However, with the continuous development of technology and changes in people's working methods, the access requirements for sensitive files have also become diverse, such as requiring users to only query the contents of sensitive data files within a specified period of time, or only within a certain period of time Commit changes to data files within. [0003] Traditional file access control methods, in today's Internet environment, gradually expose the following proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107G06F2221/2113
Inventor 张杰王鹏张衍亮
Owner 山东新潮信息技术有限公司