Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File management system based on encryption and authentication mechanism

A file management system and technology for encrypting files, which is applied in the field of file management systems based on encryption and authentication mechanisms to achieve the effect of improving security

Pending Publication Date: 2021-09-03
赵飞
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the prior art, the present invention provides a file management system based on encryption and authentication mechanism to solve the technical problem of how to improve the security of file management on the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] A file management system based on an encryption and authentication mechanism, including: a file encryption authentication management application program installed and running on the operating system of a computer terminal PCTfeams, the file encryption authentication management application program includes a user registration module, a user verification module, a file An encryption module, the user registration module performs mutual data interaction with the user verifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of file security management, and discloses a file management system based on an encryption and authentication mechanism. The system comprises a file encryption and authentication management application program installed and operated on an operating system of a computer terminal, the file encryption authentication management application program comprises a user registration module, a user verification module and a file encryption module; before the file is stored, the file encryption module encrypts the file to obtain an encrypted file, and the encrypted file is stored on a hard disk of the computer terminal; before the encrypted file is accessed, the user verification module verifies the access authority of the file operation user, after the access authority of the file operation user is successfully verified, the encrypted file is decrypted on the file encryption module, and only the decryption operation of the encrypted file is successful, the file operation user is allowed to access the decrypted file. According to the invention, the technical problem of how to improve the file management security on the computer is solved.

Description

technical field [0001] The invention relates to the technical field of file safety management, in particular to a file management system based on an encryption and authentication mechanism. Background technique [0002] Information security for personal computers focuses on the management of information inside personal computers. Encrypting important files is a common information management strategy. Therefore, using an effective information encryption strategy is of great significance to the security of personal computers. There are generally two traditional file encryption methods: one is to use the encryption function of the application software itself to encrypt the file, such as Word, Excel, Access, WPS, and PDF files all have their own encryption function. This encryption method is easy to operate and is a commonly used file encryption method. But its disadvantage is that it can only encrypt and decrypt files in some formats. The other is to use the encryption func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/45
CPCG06F21/602G06F21/604G06F21/6218G06F21/45G06F2221/2107G06F2221/2141
Inventor 赵飞
Owner 赵飞
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More