File management system based on encryption and authentication mechanism
A file management system and technology for encrypting files, which is applied in the field of file management systems based on encryption and authentication mechanisms to achieve the effect of improving security
Pending Publication Date: 2021-09-03
赵飞
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention relates to the technical field of file security management, and discloses a file management system based on an encryption and authentication mechanism. The system comprises a file encryption and authentication management application program installed and operated on an operating system of a computer terminal, the file encryption authentication management application program comprises a user registration module, a user verification module and a file encryption module; before the file is stored, the file encryption module encrypts the file to obtain an encrypted file, and the encrypted file is stored on a hard disk of the computer terminal; before the encrypted file is accessed, the user verification module verifies the access authority of the file operation user, after the access authority of the file operation user is successfully verified, the encrypted file is decrypted on the file encryption module, and only the decryption operation of the encrypted file is successful, the file operation user is allowed to access the decrypted file. According to the invention, the technical problem of how to improve the file management security on the computer is solved.
Application Domain
Digital data protectionDigital data authentication
Technology Topic
Document securityEncryption +7
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Malicious website prompt method and router
Owner:TENCENT TECH (SHENZHEN) CO LTD +1
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Credible virtual machine platform
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal
Owner:深圳市小石安防科技有限公司
Multiple-factor detection system for aging condition of fuse and assessment method for aging condition
Owner:LINGAO NUCLEAR POWER +2
Classification and recommendation of technical efficacy words
- improve security
Method, device and system used for digesting security policy conflicts
Owner:CHINA TELECOM CORP LTD
Automatic charging system for electric automobile
Owner:WUHAN INSTITUTE OF TECHNOLOGY
Block chain system, and data storage method and apparatus
Owner:ADVANCED NEW TECH CO LTD
Pesticide micro-capsule granules and preparation method thereof
Owner:联合国南通农药剂型开发中心 +1