CN103559456A - Data protecting method and terminal based on time - Google Patents

Data protecting method and terminal based on time Download PDF

Info

Publication number
CN103559456A
CN103559456A CN201310507250.XA CN201310507250A CN103559456A CN 103559456 A CN103559456 A CN 103559456A CN 201310507250 A CN201310507250 A CN 201310507250A CN 103559456 A CN103559456 A CN 103559456A
Authority
CN
China
Prior art keywords
time
data
current time
temporal information
period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310507250.XA
Other languages
Chinese (zh)
Inventor
陆渝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG MINGCHUANG SOFTWARE SCIENCE & TECHNOLOGY Co Ltd
Original Assignee
GUANGDONG MINGCHUANG SOFTWARE SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG MINGCHUANG SOFTWARE SCIENCE & TECHNOLOGY Co Ltd filed Critical GUANGDONG MINGCHUANG SOFTWARE SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201310507250.XA priority Critical patent/CN103559456A/en
Publication of CN103559456A publication Critical patent/CN103559456A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Abstract

The invention discloses a data protecting method based on time. The method includes the following steps that when data is accessed, current time is obtained; the current time is compared with data locking time information; according to the comparison result, data access is allowed or refused. Compared with the prior art, when the data is accessed, the current time is required to be obtained, then the current time is compared with the data locking time information, whether the current time meets the data locking time information is judged, and according to the comparison and judging result, data access is allowed or refused. Therefore, data can be limited to be accessed by other people in a certain period of time without telling passwords to the other people, data protection sensitive to time is achieved, and user experience is improved. The invention further discloses a data protecting terminal based on the time.

Description

Time-based data guard method and terminal thereof
Technical field
The present invention relates to protecting data encryption technical field, relate more specifically to a kind of time-based data guard method and terminal thereof.
Background technology
Current, when file or data are carried out to locking protection, generally by being set, realizes by password, when user uses the file locking or data to other people, need to inform the other side's password.Yet; during by password lock file or data; when obtaining password, the other side also just obtained whole control authorities of this document or data; its at any time (permanent) file or data are operated; so that reduced greatly the protection to the file of time-sensitive or data; the specific aim of authorizing is poor, and user experiences bad.
Summary of the invention
The object of this invention is to provide a kind of time-based data guard method, by temporal information, data are locked, thereby strengthen the protection to the data of time-sensitive, improve user and experience.
Another object of the present invention is to provide a kind of time-based data protection terminal, by temporal information, data are locked, thereby strengthens the protection to the data of time-sensitive, improves user and experiences.
For achieving the above object, the invention provides a kind of time-based data guard method, comprise the following steps:
During visit data, obtain current time;
Compare the temporal information that locks of described current time and described data;
According to data described in comparison result permission access or denied access.
Compared with prior art; the present invention is based on the data guard method of time; when visit data; first need to obtain current time, then whether contrast judgement current time meets the temporal information that locks of data, and allows access or denied access data according to contrast judgement result; thereby can within certain period, allow other people to access by restricting data; and need not inform the other side's password, and realized the protection to the data of time-sensitive, improved user's experience.
Preferably, described " obtaining current time " also comprises before:
The temporal information that locks described in arranging also locks to described data.
Preferably, the temporal information that locks described in comprise period, time zone and to time server.
Preferably, described " obtaining current time " is specially:
Access described to time server to obtain current time.
Preferably, described " comparing the temporal information that locks of described current time and described data " specifically comprises:
Calculate the corresponding time of described current time in described time zone;
Whether compare the described corresponding time was in the described period to judge the described corresponding time with the described period.
Accordingly, the present invention also provides a kind of time-based data protection terminal, comprising:
Acquisition module, for when the visit data, obtains current time;
Comparing module, for comparing the temporal information that locks of described current time and described data;
Control module, for allowing data described in access or denied access according to comparison result.
Preferably, described time-based data protection terminal also comprises:
Module is set, for locking temporal information described data are locked described in arranging.
Preferably, the temporal information that locks described in comprise period, time zone and to time server.
Preferably, described acquisition module is specially:
Access described to time server to obtain current time.
Preferably, described comparing module specifically comprises:
Computing unit, for calculating the corresponding time of described current time in described time zone;
Whether judging unit, be in the described period to judge the described corresponding time with the described period for comparing the described corresponding time.
By following description also by reference to the accompanying drawings, it is more clear that the present invention will become, and these accompanying drawings are used for explaining embodiments of the invention.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of data guard method one embodiment of the time that the present invention is based on.
Fig. 2 is the structured flowchart of data protection terminal one embodiment of the time that the present invention is based on.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, in accompanying drawing, similarly element numbers represents similar element.
Please refer to Fig. 1, described the idiographic flow of data guard method one embodiment of the time that the present invention is based on.As shown in Figure 1, comprise the following steps:
Step S101, arranges the temporal information that locks;
The temporal information that locks in the present embodiment comprise time zone, period and to time server, wherein to time server can adopt more authoritative network to time server, as national time service central server etc., period can be set in time zone before certain time point, after certain time point or between two time points, as the temporal information that locks is set, be: (period), national time service central server after Dong Jiuqu (time zone), on October 23rd, 2013 10:00 (to time server);
Step S102, by locking, temporal information is inserted in the data that need to lock so that data are locked;
Step S103, during visit data, obtains current time;
Particularly, by access to time server obtain current time, the time in time Wei Dong 8th district that wherein obtain by national time service central server, if current time is 09:13 on October 23rd, 2013, the time in this time Wei Dong 8th district;
Step S104, whether comparison current time is allowing, in the period of access, if so, to perform step S105 with the temporal information that locks judge current time, otherwise, perform step S106;
Concrete comparison process comprises:
(1) current time is scaled to the time corresponding with the time zone setting in advance; As: current time Wei Dong 8th district that obtain, on October 23rd, 2013 09:13, the time that obtains Dong Jiu district after converting is 10:13 on October 23rd, 2013;
(2) time that comparison obtains after converting and the period setting in advance are to judge that current time is whether in the period in setting in advance, judge that on October 23rd, 2013 10:13 is whether within " on October 23rd, 2013 10:00 after " this period, if, perform step S105, otherwise, execution step S106.
Step S105, allows visit data.
Step S106, does not allow visit data.
By above description, can be found out, the present invention can allow other people at a certain period visit data after data being locked by the temporal information that locks, thus the time of having limited other people visit datas, the inconvenience while having avoided current employing cryptoguard data.
It should be noted that, the present invention is specially adapted to the data to time-sensitive, with limited subscriber visit data within the time of some approval, as certain brand will be issued a new product in X X month X day, this product is in confidential state before, the promotional videos of this product can be issued in advance, but must arrive news conference holds and just allows user to watch afterwards, or video website can be carried out video rental service, the video that user is downloaded, can authorize it within a period of time, to watch, within this time, not lock, limiting access.Wherein, when the data that comprise the temporal information that locks are placed on website, can download these data or limited subscriber is checked the data after download by the temporal information limited subscriber that locks, i.e. access in the present embodiment comprises downloads and checks.
Please refer to Fig. 2, described the structured flowchart of data protection terminal one embodiment of the time that the present invention is based on.As shown in Figure 2, time-based data protection terminal 100 comprises:
Module 11 is set, for the temporal information data are locked of locking is set, particularly, the temporal information that locks comprise period, time zone and to time server;
Acquisition module 12, for when the visit data, obtains current time, particularly, by access to time server obtain current time;
Comparing module 13, for comparing the temporal information that locks of current time and data, particularly, comparing module 13 comprises computing unit 131 and judging unit 132, computing unit 131 is for calculating the corresponding time of current time in the time zone setting in advance, and whether judging unit 132 is in the period for comparing the corresponding time obtaining and the period setting in advance to judge the corresponding time; And
Control module 14, for allowing access or denied access data according to comparison result.
While the present invention is based on data protection terminal 100 work of time; first by lock temporal information data are locked of module 11 setting is set; afterwards when visit data; by acquisition module 12, obtain current time; then by the temporal information that locks of comparing module 13 comparison current times and data, control module 14 allows access or denied access data according to the comparison result of comparing module 13.Thereby can within certain period, allow other people to access by restricting data, and need not inform the other side's password, realize the protection to the data of time-sensitive, improve user's experience.
Invention has been described for above combination most preferred embodiment, but the present invention is not limited to the embodiment of above announcement, and should contain the various modifications of carrying out according to essence of the present invention, equivalent combinations.

Claims (10)

1. a time-based data guard method, is characterized in that, comprises the following steps:
During visit data, obtain current time;
Compare the temporal information that locks of described current time and described data;
According to data described in comparison result permission access or denied access.
2. time-based data guard method as claimed in claim 1, is characterized in that, described " obtaining current time " also comprises before:
The temporal information that locks described in arranging also locks to described data.
3. time-based data guard method as claimed in claim 2, is characterized in that, described in lock temporal information comprise period, time zone and to time server.
4. time-based data guard method as claimed in claim 3, is characterized in that, described " obtaining current time " is specially:
Access described to time server to obtain current time.
5. time-based data guard method as claimed in claim 4, is characterized in that, described " comparing the temporal information that locks of described current time and described data " specifically comprises:
Calculate the corresponding time of described current time in described time zone;
Whether compare the described corresponding time was in the described period to judge the described corresponding time with the described period.
6. a time-based data protection terminal, is characterized in that, comprising:
Acquisition module, for when the visit data, obtains current time;
Comparing module, for comparing the temporal information that locks of described current time and described data;
Control module, for allowing data described in access or denied access according to comparison result.
7. time-based data protection terminal as claimed in claim 6, is characterized in that, also comprises:
Module is set, for locking temporal information described data are locked described in arranging.
8. time-based data protection terminal as claimed in claim 7, is characterized in that, described in lock temporal information comprise period, time zone and to time server.
9. time-based data protection terminal as claimed in claim 8, is characterized in that, described acquisition module is specially:
Access described to time server to obtain current time.
10. time-based data protection terminal as claimed in claim 9, is characterized in that, described comparing module specifically comprises:
Computing unit, for calculating the corresponding time of described current time in described time zone;
Whether judging unit, be in the described period to judge the described corresponding time with the described period for comparing the described corresponding time.
CN201310507250.XA 2013-10-24 2013-10-24 Data protecting method and terminal based on time Pending CN103559456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310507250.XA CN103559456A (en) 2013-10-24 2013-10-24 Data protecting method and terminal based on time

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310507250.XA CN103559456A (en) 2013-10-24 2013-10-24 Data protecting method and terminal based on time

Publications (1)

Publication Number Publication Date
CN103559456A true CN103559456A (en) 2014-02-05

Family

ID=50013700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310507250.XA Pending CN103559456A (en) 2013-10-24 2013-10-24 Data protecting method and terminal based on time

Country Status (1)

Country Link
CN (1) CN103559456A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635055A (en) * 2014-11-01 2016-06-01 江苏威盾网络科技有限公司 Cloud data safety usage method
CN106572101A (en) * 2016-10-26 2017-04-19 努比亚技术有限公司 Server, terminal and data management method
CN107196925A (en) * 2017-05-09 2017-09-22 北京同余科技有限公司 The private data guard method and system of access time self-regulation
CN108009432A (en) * 2017-11-29 2018-05-08 郑州云海信息技术有限公司 A kind of management method, device and equipment for accessing storage system
CN112395136A (en) * 2021-01-20 2021-02-23 深圳市中科鼎创科技股份有限公司 Continuous data protection system combined with snapshot technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003114830A (en) * 2001-07-09 2003-04-18 Matsushita Electric Ind Co Ltd Contents management system and information storage medium
CN1679102A (en) * 2002-08-28 2005-10-05 松下电器产业株式会社 Key delivery apparatus, terminal apparatus, recording medium and key delivery system
CN101341748A (en) * 2005-12-19 2009-01-07 松下电器产业株式会社 Content management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003114830A (en) * 2001-07-09 2003-04-18 Matsushita Electric Ind Co Ltd Contents management system and information storage medium
CN1679102A (en) * 2002-08-28 2005-10-05 松下电器产业株式会社 Key delivery apparatus, terminal apparatus, recording medium and key delivery system
CN101341748A (en) * 2005-12-19 2009-01-07 松下电器产业株式会社 Content management system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635055A (en) * 2014-11-01 2016-06-01 江苏威盾网络科技有限公司 Cloud data safety usage method
CN106572101A (en) * 2016-10-26 2017-04-19 努比亚技术有限公司 Server, terminal and data management method
CN107196925A (en) * 2017-05-09 2017-09-22 北京同余科技有限公司 The private data guard method and system of access time self-regulation
CN108009432A (en) * 2017-11-29 2018-05-08 郑州云海信息技术有限公司 A kind of management method, device and equipment for accessing storage system
CN108009432B (en) * 2017-11-29 2021-06-11 郑州云海信息技术有限公司 Management method, device and equipment for accessing storage system
CN112395136A (en) * 2021-01-20 2021-02-23 深圳市中科鼎创科技股份有限公司 Continuous data protection system combined with snapshot technology
CN112395136B (en) * 2021-01-20 2021-04-16 深圳市中科鼎创科技股份有限公司 Continuous data protection system combined with snapshot technology

Similar Documents

Publication Publication Date Title
KR101419984B1 (en) System and method for sharing content suing nfc in cloud circumstance
US20190238341A1 (en) Trusted internet identity
CN109196841B (en) Method and apparatus for issuing assertions in distributed databases of a mobile telecommunications network and for personalizing internet of things devices
CN103559456A (en) Data protecting method and terminal based on time
US10769316B2 (en) Protecting mobile devices from unauthorized device resets
US20130111582A1 (en) Security access method for automotive electronic control units
CN106953831B (en) User resource authorization method, device and system
CN103249045A (en) Identification method, device and system
KR20090089472A (en) Method and apparatus for creating licenses in a mobile digital rights management network
CN106161348B (en) Single sign-on method, system and terminal
CN102479305A (en) Software licensing verification method and system
CN103514000A (en) Browser plug-in installation method and device
CN104321776A (en) Offline authentication with embedded authorization attributes
CN106936600B (en) Flow charging method and system and related equipment
CN101309293A (en) Authentication method and system based on hypertext transmission protocol
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN110661779A (en) Block chain network-based electronic certificate management method, system, device and medium
US20090025061A1 (en) Conditional peer-to-peer trust in the absence of certificates pertaining to mutually trusted entities
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN112669104A (en) Data processing method of rental equipment
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
US20050015605A1 (en) System and method for ensuring mobile device data and content security
WO2015154469A1 (en) Database operation method and device
CN104902480A (en) Smartphone WIFI grading management method
Park et al. An efficient motion estimation method for QTBT structure in JVET future video coding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140205