Editing using secure temporary session-based permission model in a file storage system
A temporary and editing technology, applied in transmission systems, computer security devices, electrical components, etc., can solve problems such as low efficiency and less than ideal user experience, and achieve the effect of improving efficiency, improving network resources and memory resources, and improving interaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Many users store and access sensitive documents among their stored data. Such sensitive documents can include passports, social security numbers, and other identifying information, as well as financial information such as bank statements and account numbers. Not only do users want to protect this sensitive information and keep it from falling into the wrong hands, but they often want it to be difficult to inadvertently modify or delete.
[0023] Existing alternatives require the use of additional password protection for sensitive documents, which may not integrate with the user's personal cloud. Access is typically granted to specific users, authenticated via simple username and password or other single-factor authentication schemes. Usernames and passwords are usually stored locally and remembered by the device. After the user sets up the computer for access, the entire personal cloud becomes accessible. There is no place in the personal cloud for more sensitive doc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


