Unlock instant, AI-driven research and patent intelligence for your innovation.

Editing using secure temporary session-based permission model in a file storage system

A temporary and editing technology, applied in transmission systems, computer security devices, electrical components, etc., can solve problems such as low efficiency and less than ideal user experience, and achieve the effect of improving efficiency, improving network resources and memory resources, and improving interaction

Pending Publication Date: 2021-11-09
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such limitations can lead to some inefficiencies and a less-than-ideal user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Editing using secure temporary session-based permission model in a file storage system
  • Editing using secure temporary session-based permission model in a file storage system
  • Editing using secure temporary session-based permission model in a file storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Many users store and access sensitive documents among their stored data. Such sensitive documents can include passports, social security numbers, and other identifying information, as well as financial information such as bank statements and account numbers. Not only do users want to protect this sensitive information and keep it from falling into the wrong hands, but they often want it to be difficult to inadvertently modify or delete.

[0023] Existing alternatives require the use of additional password protection for sensitive documents, which may not integrate with the user's personal cloud. Access is typically granted to specific users, authenticated via simple username and password or other single-factor authentication schemes. Usernames and passwords are usually stored locally and remembered by the device. After the user sets up the computer for access, the entire personal cloud becomes accessible. There is no place in the personal cloud for more sensitive doc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. a first request receiving, at the cloud-based storage service, for an application to access data that is associated with the heightened authentication protocol. The first request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. The permission is time-limited. It is determined that the application is editing the data that is associated with the heightened authentication protocol. Permission for the application to access the data while the application is editing the data is temporarily extended.

Description

Background technique [0001] Distributed storage systems (eg, cloud storage systems) typically use server computers and storage devices connected to the Internet and / or other types of networks to store computer data and software applications. A device can connect to a server via a web browser or a dedicated distributed storage application, for example, to retrieve data, upload data, and / or run software applications. This arrangement can be beneficial for computing devices with limited storage, such as mobile computing devices, which may benefit from the server's large storage capacity and higher performance. Such an arrangement may also be beneficial in generally providing a centralized location for storing a user's data that may be accessed by multiple devices regardless of their location. [0002] Distributed storage has become a readily available Internet service (for example, OneDrive, Dropbox, Google Docs, and Amazon Cloud Drive storage services). Distributed storage ena...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/176G06F21/78G06F21/31H04L29/08H04L29/06
CPCG06F21/31G06F21/62G06F21/6218G06F2221/2141H04L63/08H04L63/101H04L63/105H04L63/108H04L67/1097H04L67/306G06F16/1774H04L67/06H04L67/1095H04L67/02H04L67/10H04L67/535G06F16/183H04L63/083H04L2463/082G06F16/134H04L63/0853H04L63/20
Inventor D·斯佩克托尔J·拉托雷J·A·巴雷托K·A·陈P·D·亨德森G·K·卡克玆卡
Owner MICROSOFT TECH LICENSING LLC