File access control method, file encryption method and computing device

A technology of computing equipment and control methods, applied in computing, computer security devices, instruments, etc., can solve the problems of inability to isolate user data with different identities, data security cannot be guaranteed, etc., to improve viewing and operation efficiency, Realize data isolation and good user experience

Active Publication Date: 2021-10-15
UNIONTECH SOFTWARE TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme can realize the access rights of users with different identities, but because each directory is not encrypted separately, as long as the user who enters the root directory can view and operate all files through technical means
It can be seen that even if permission restrictions are set in this scheme, data isolation between users with different identities cannot be achieved, resulting in unguaranteed data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access control method, file encryption method and computing device
  • File access control method, file encryption method and computing device
  • File access control method, file encryption method and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] According to the technical solution of the present invention, each file directory is encrypted according to the file encryption method, and corresponding access credentials are distributed to users according to user identities. Furthermore, by executing the file access control method, the user can decrypt one or more file directories based on corresponding access credentials, so as to access one or more file directories match...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file access control method, which is executed in a computing device, comprising the steps of: receiving a file access request sent by a user based on an access credential; obtaining one or more sets of value pairs based on the access credential, each set of value The pair includes multiple value pairs, and each set of value pairs corresponds to a file directory; respectively, according to each set of value pairs, the corresponding file directory is decrypted to obtain one or more decrypted file directories corresponding to the user's access credentials ; and merging and mounting the one or more decrypted file directories to a predetermined directory, so that the user can access the one or more decrypted file directories under the predetermined directory. The invention also discloses a corresponding file encryption method and computing equipment. According to the solution of the present invention, it is possible to control the access rights of users with different identities to the file directory, and the user experience is better.

Description

technical field [0001] The invention relates to the technical fields of computers and the Internet, in particular to a file access control method, a file encryption method and computing equipment. Background technique [0002] At present, in daily work, there are situations where users with different identities access files with different confidentiality levels. With the existing encryption technology, as long as the user holds the decryption key of the file, he can open and modify all the contents inside. This modification is not subject to User identity restrictions can easily lead to abuse of data. [0003] In the prior art, in order to realize different folders accessed by different users on one machine, it is necessary to create different encrypted folders for users, so that each user can only access his own encrypted folder. In this file encryption scheme, since encrypted folders are scattered in different paths, unified management of files cannot be realized. Moreove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/604G06F21/6218G06F2221/2107G06F2221/2141
Inventor 卢桢
Owner UNIONTECH SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products