CN112231762A - File access method, device and storage medium - Google Patents

File access method, device and storage medium Download PDF

Info

Publication number
CN112231762A
CN112231762A CN202011468428.0A CN202011468428A CN112231762A CN 112231762 A CN112231762 A CN 112231762A CN 202011468428 A CN202011468428 A CN 202011468428A CN 112231762 A CN112231762 A CN 112231762A
Authority
CN
China
Prior art keywords
file
cloud database
user side
information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011468428.0A
Other languages
Chinese (zh)
Inventor
袁磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lenovo Synergy Technology Co Ltd
Original Assignee
Beijing Lenovo Synergy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lenovo Synergy Technology Co Ltd filed Critical Beijing Lenovo Synergy Technology Co Ltd
Priority to CN202011468428.0A priority Critical patent/CN112231762A/en
Publication of CN112231762A publication Critical patent/CN112231762A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention discloses a file access method, a device and a storage medium, wherein the method is applied to a user side and comprises the following steps: sending an access request aiming at a first file to a cloud database; receiving a second file corresponding to the first file issued by the cloud database according to the access request; acquiring identity verification information of the user side according to the second file; when the identity verification information of the user side meets a preset condition, acquiring a first file from a cloud database according to a second file; a first file is accessed. The method can effectively avoid the file from being illegally authorized to access, can realize the confidentiality of the file, does not need to encrypt or decrypt the file or the format of the file when the file is confidential, and avoids the problem that hardware resources and time are consumed in the encryption and decryption operation process, so that the confidentiality of the file can be quickly realized no matter how large the file is; and a second file corresponding to the first file is issued through the cloud database, so that a user can be prompted how to obtain correct authorization.

Description

File access method, device and storage medium
Technical Field
The present application relates to the field of file security technologies, and in particular, to a file access method, device and storage medium.
Background
The traditional file security methods are to encrypt the file integrally or encrypt the file format, but the security methods have some problems: when the file is integrally encrypted, because the original file structure is damaged by the encrypted file, the user can report errors when directly opening the file, the experience is not friendly, the user cannot know how to apply proper authorization, and hardware resources and time are consumed in the file encryption and decryption process; when the file format is encrypted, although the user can be normally opened and prompted to provide the password, the user still cannot know how to obtain correct authorization, and once the password is revealed, the file cannot be protected, and the file format encryption and decryption process still needs to consume hardware resources and time.
Disclosure of Invention
The embodiment of the application provides a file access method, a file access device and a storage medium, and aims to solve the problem that hardware resources and time are consumed in an encryption and decryption process in a file encryption method in the prior art.
In order to solve the above problem, in a first aspect, an embodiment of the present application provides a file access method, where the method is applied to a user side, and the method includes: sending an access request aiming at a first file to a cloud database; receiving a second file corresponding to the first file issued by the cloud database according to the access request; acquiring identity verification information of the user side according to the second file; when the identity verification information of the user side meets a preset condition, acquiring a first file from a cloud database according to a second file; a first file is accessed.
Optionally, obtaining the identity verification information of the user side according to the second file includes: sending identity information of a user side to a cloud database; and acquiring the identity verification information returned after verification.
Optionally, before obtaining the identity verification information of the user side according to the second file, the file access method further includes: and determining a client access program corresponding to the local cloud database according to the second file.
Optionally, the file access method further includes: and when the client access program corresponding to the cloud database does not exist locally, sending out first prompt information.
Optionally, the second file includes identification information of the first file, and the obtaining of the first file from the cloud database according to the second file includes: and acquiring the first file from the cloud database according to the identification information of the first file.
Optionally, the second file includes path information of the first file, and the obtaining of the first file from the cloud database according to the second file includes: and acquiring the first file from the cloud database according to the path information of the first file.
Optionally, the file access method further includes: and when the identity verification information of the user side does not meet the preset condition, sending out second prompt information.
In a second aspect, an embodiment of the present invention provides a file access device, where the file access device is applied to a user side, and the file access device includes: the sending unit is used for sending an access request aiming at the first file to the cloud database; the receiving unit is used for receiving a second file corresponding to the first file issued by the cloud database according to the access request; the first acquisition unit is used for acquiring the identity verification information of the user side according to the second file; the second obtaining unit is used for obtaining the first file from the cloud database according to the second file when the identity verification information of the user side meets the preset condition; and the access unit is used for accessing the first file.
In a third aspect, an embodiment of the present invention provides a computer, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the file access method as in the first aspect or any of the embodiments of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where computer instructions are stored, and the computer instructions are configured to cause a computer to execute the file access method according to the first aspect or any implementation manner of the first aspect.
The file access method, the file access device and the storage medium provided by the embodiment of the invention have the advantages that the first file is pre-stored in the cloud database, and the first file is subjected to certain rule configuration, therefore, when the user needs to access the first file, the cloud database will issue the second file corresponding to the first file to prompt the user to check the identity of the user, when the identity verification of the user terminal passes, the first file can be obtained from the cloud database and accessed, thereby effectively avoiding the first file from being illegally authorized to access, realizing the security of the first file, when the first file is kept secret, the first file or the format of the first file does not need to be encrypted and decrypted, so that the problems that hardware resources and time are consumed in the encryption and decryption operation process are solved, and the first file can be kept secret quickly no matter how large the first file is; when the first file is confidential, the second file corresponding to the first file is issued through the cloud database, and the fact that identity information of the user side needs to be checked is prompted, so that the user can be prompted how to obtain correct authorization, and the problem that the user cannot know how to obtain correct authorization can be solved.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
FIG. 1 is a schematic flow chart illustrating a file access method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a file access apparatus according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a hardware structure of a computer according to an embodiment of the present invention.
Detailed Description
An embodiment of the present application provides a file access method, which is applied to a user side, and as shown in fig. 1, the method includes:
s101, sending an access request aiming at a first file to a cloud database; specifically, the first file may be a document file, a video file, an image file, or the like. The first file can be uploaded to a cloud database for storage through a cloud database administrator, and the rule setting and the authority distribution can be carried out on the first file in the cloud database. The rule setting is mainly to set a specific operation flow when the first file is required to be accessed. The authority distribution mainly sets an identity information list of the user terminals capable of accessing the first file, that is, sets which user terminals can access the first file. When the authority of the user side needs to be verified, the authority of the user side can be verified through the identity information of the user side. When the user side needs to access the first file, an access request for the first file can be sent to the cloud database.
S102, receiving a second file corresponding to the first file issued by the cloud database according to the access request; specifically, the second file may be a document file, a video file, an image file, or the like. The rules set for the first file in the cloud database may include: when the cloud database receives an access request aiming at a first file sent by a user side, the cloud database automatically generates a second file corresponding to the first file, automatically inserts prompt information, characteristic information of the first file (unique identification information of the first file or path information of the first file) and the like into the second file, and then sends the second file to the user side. The prompt message may be that the first document is protected and the identity information of the user side needs to be verified. The prompting message can be in the form of characters, videos, pictures and the like. The user side can receive a second file corresponding to the first file issued by the cloud database according to the access request after sending the access request aiming at the first file to the cloud database.
S103, acquiring identity verification information of the user side according to the second file; specifically, the identity verification information of the user side is information obtained by verifying the identity information of the user side by the cloud database. After the user side receives the second file, the user side can analyze the second file, and under the prompt of the prompt information of the second file, the identity information of the user side can be sent to the cloud database for authority verification. The rule set for the first file in the cloud database may further include: after the cloud database receives the identity information of the user side, the identity information of the user side can be matched with an identity information list of the user side capable of accessing the first file, when the identity information of the user side is in the identity information list of the user side, the identity information of the user side passes verification, and the user side has the authority of accessing the first file. When the identity information of the user side is not in the identity information list of the user side, the identity information of the user side is not verified, and the user side does not have the authority of accessing the first file. After the identity information of the user side is verified, the identity verification information of the user side can be generated, and the identity verification information of the user side can be sent to the user side. The user side can receive identity verification information returned by the cloud database.
S104, when the identity verification information of the user side meets a preset condition, acquiring a first file from a cloud database according to a second file; specifically, the second file may include unique identification information of the first file or path information of the first file. The identity verification information of the user side meets the preset condition that the identity information of the user side passes the verification. When the identity information of the user side passes the verification, the first file can be acquired from the cloud database according to the identification information of the first file in the second file or the path information of the first file.
And S105, accessing the first file.
The file access method provided by the embodiment of the invention stores the first file in the cloud database in advance, and performs some rule configuration on the first file, therefore, when the user needs to access the first file, the cloud database will issue the second file corresponding to the first file to prompt the user to check the identity of the user, when the identity verification of the user terminal passes, the first file can be obtained from the cloud database and accessed, thereby effectively avoiding the first file from being illegally authorized to access, realizing the security of the first file, when the first file is kept secret, the first file or the format of the first file does not need to be encrypted and decrypted, so that the problems that hardware resources and time are consumed in the encryption and decryption operation process are solved, and the first file can be kept secret quickly no matter how large the first file is; when the first file is confidential, the second file corresponding to the first file is issued through the cloud database, and the fact that identity information of the user side needs to be checked is prompted, so that the user can be prompted how to obtain correct authorization, and the problem that the user cannot know how to obtain correct authorization can be solved.
In an alternative embodiment, step S103, acquiring the identity verification information of the user side according to the second file includes: sending identity information of a user side to a cloud database; and acquiring the identity verification information returned after verification. Specifically, after the user side receives the second file, the second file can be analyzed, the identity information of the user side is sent to the cloud database under the prompt of the prompt information of the second file, and after the identity information of the user side is verified by the cloud database, the identity verification information returned by the cloud database is received, so that the identity verification information of the user side is obtained.
The identity information of the user side is sent to the cloud database, and the identity verification information returned after verification is obtained, so that whether the user side is authorized by the cloud database can be accurately known.
In an optional embodiment, in step S103, before acquiring the identity verification information of the user side according to the second file, the file access method further includes: and determining a client access program corresponding to the local cloud database according to the second file. Specifically, when a client access program corresponding to the cloud database exists locally, and the client access program detects that the client tries to open the second file, the client program can automatically analyze the content of the second file, and when it is determined that the access to the first file needs to verify the identity information of the client according to the content of the second file, the client can be prevented from opening the second file through the client program, unnecessary opening of the second file is reduced, and the user identity information corresponding to the client access program can be sent to the cloud database through the prompt of the second file.
Therefore, the client access program corresponding to the cloud database is determined to exist locally according to the second file, and the identity information of the user side corresponding to the client access program can be determined, so that the identity information of the user side can be acquired and sent to the cloud database for verification, the identity information verification of the user side is more targeted, and unnecessary identity information verification of the user side is reduced.
In an optional embodiment, the file access method further includes: and when the client access program corresponding to the cloud database does not exist locally, sending out first prompt information. Specifically, when a client access program corresponding to the cloud database does not exist locally, it is indicated that the client may not be authorized, and a first prompt message may be directly sent by the client, where the first prompt message may be that the first file is protected and the client access program corresponding to the cloud database needs to be installed; or opening a second file by calling the application of the user side, and displaying the first prompt message through the second file.
When the client access program corresponding to the cloud database does not exist locally, the first prompt information is sent out, user-friendly prompt information can be given, a user is prompted how to obtain correct authorization in time, and the experience of the user can be improved.
In an optional embodiment, when the file includes the identification information of the first file, in step S104, acquiring the first file from the cloud database according to the second file includes: and acquiring the first file from the cloud database according to the identification information of the first file.
The first file is obtained from the cloud database through the identification information of the first file, and the identification information of the first file has uniqueness, so that the first file can be quickly obtained.
In an optional embodiment, when the second file includes the path information of the first file, in step S104, acquiring the first file from the cloud database according to the second file includes: and acquiring the first file from the cloud database according to the path information of the first file.
The first file is obtained from the cloud database through the path information of the first file, and the path information of the first file is unique, so that the first file can be obtained quickly.
In an optional embodiment, the file access method further includes: and when the identity verification information of the user side does not meet the preset condition, sending out second prompt information.
Specifically, the identity verification information of the user side does not meet the preset condition, that is, the identity information of the user side does not pass the verification, when the identity information of the user side does not pass the verification, the user side can directly send out second prompt information, and the second prompt information can be that the identity information of the user side does not pass the verification; the user side can also call the application program to open the second file, and send out the second prompt message through the second file.
When the identity verification information of the user side does not meet the preset condition, the second prompt information is sent, user-friendly prompt information can be given, the user can be prompted how to obtain correct authorization in time, and the experience of the user can be improved.
An embodiment of the present invention further provides a file access device, where the file access device is applied to a user side, and as shown in fig. 2, the file access device includes: a sending unit 201, configured to send an access request for a first file to a cloud database; the detailed description of the specific implementation manner is given in step S101 in the above embodiments, and is not repeated herein. The receiving unit 202 is configured to receive a second file corresponding to the first file issued by the cloud database according to the access request; the detailed description of the specific implementation manner is given in step S102 in the above embodiments, and is not repeated herein. A first obtaining unit 203, configured to obtain identity verification information of the user side according to the second file; the detailed description of the specific implementation manner is given in step S103 in the above embodiments, and is not repeated herein. The second obtaining unit 204 is configured to obtain the first file from the cloud database according to the second file when the identity verification information of the user side meets a preset condition; the detailed description of the specific implementation manner is given in step S104 in the above embodiments, and is not repeated herein. An accessing unit 205 is configured to access the first file. The detailed description of the specific implementation manner is given in step S105 in the above embodiments, and is not repeated herein.
The file access device provided by the embodiment of the invention stores the first file in the cloud database in advance, and performs some rule configuration on the first file, therefore, when the user needs to access the first file, the cloud database will issue the second file corresponding to the first file to prompt the user to check the identity of the user, when the identity verification of the user terminal passes, the first file can be obtained from the cloud database and accessed, thereby effectively avoiding the first file from being illegally authorized to access, realizing the security of the first file, when the first file is kept secret, the first file or the format of the first file does not need to be encrypted and decrypted, so that the problems that hardware resources and time are consumed in the encryption and decryption operation process are solved, and the first file can be kept secret quickly no matter how large the first file is; when the first file is confidential, the second file corresponding to the first file is issued through the cloud database, and the fact that identity information of the user side needs to be checked is prompted, so that the user can be prompted how to obtain correct authorization, and the problem that the user cannot know how to obtain correct authorization can be solved.
Based on the same inventive concept as the file access method in the previous embodiment, the present invention also provides a computer having stored thereon a computer program which, when executed by a processor, implements the steps of any one of the aforementioned file access methods.
Where in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
Based on the same inventive concept as the file access method in the foregoing embodiments, the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of:
sending an access request aiming at a first file to a cloud database;
receiving a second file corresponding to the first file issued by the cloud database according to the access request;
acquiring identity verification information of the user side according to the second file;
when the identity verification information of the user side meets a preset condition, acquiring a first file from a cloud database according to a second file; a first file is accessed.
In a specific implementation, when the program is executed by a processor, any method step in the first embodiment may be further implemented.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable information processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable information processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable information processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable information processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A file access method is applied to a user side, and comprises the following steps:
sending an access request aiming at a first file to a cloud database;
receiving a second file corresponding to the first file issued by the cloud database according to the access request;
acquiring identity verification information of the user side according to the second file;
when the identity verification information of the user side meets a preset condition, acquiring the first file from the cloud database according to the second file;
and accessing the first file.
2. The method according to claim 1, wherein the obtaining the identity verification information of the user side according to the second file comprises:
sending the identity information of the user side to the cloud database;
and acquiring the identity verification information returned after verification.
3. The method according to claim 2, further comprising, before the obtaining the identity verification information of the user side according to the second file:
and determining that a client access program corresponding to the cloud database exists locally according to the second file.
4. The file access method according to claim 3, further comprising:
and when the client access program corresponding to the cloud database does not exist locally, sending out first prompt information.
5. The file access method according to claim 1, wherein the second file includes identification information of the first file,
the obtaining the first file from the cloud database according to the second file includes:
and acquiring the first file from the cloud database according to the identification information of the first file.
6. The file access method according to claim 1, wherein the second file includes path information of the first file,
the obtaining the first file from the cloud database according to the second file includes:
and acquiring the first file from the cloud database according to the path information of the first file.
7. The file access method according to claim 1, further comprising:
and when the identity verification information of the user side does not meet the preset condition, sending out second prompt information.
8. A file access device, wherein the device is applied to a user side, and the device comprises:
the sending unit is used for sending an access request aiming at the first file to the cloud database;
the receiving unit is used for receiving a second file corresponding to the first file issued by the cloud database according to the access request;
the first acquisition unit is used for acquiring the identity verification information of the user side according to the second file;
the second obtaining unit is used for obtaining the first file from the cloud database according to the second file when the identity verification information of the user side meets a preset condition;
and the access unit is used for accessing the first file.
9. A computer, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the one processor to cause the at least one processor to perform the file access method of any one of claims 1-7.
10. A computer-readable storage medium storing computer instructions for causing a computer to execute the file access method according to any one of claims 1 to 7.
CN202011468428.0A 2020-12-15 2020-12-15 File access method, device and storage medium Pending CN112231762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011468428.0A CN112231762A (en) 2020-12-15 2020-12-15 File access method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011468428.0A CN112231762A (en) 2020-12-15 2020-12-15 File access method, device and storage medium

Publications (1)

Publication Number Publication Date
CN112231762A true CN112231762A (en) 2021-01-15

Family

ID=74123700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011468428.0A Pending CN112231762A (en) 2020-12-15 2020-12-15 File access method, device and storage medium

Country Status (1)

Country Link
CN (1) CN112231762A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326763A (en) * 2015-06-15 2017-01-11 阿里巴巴集团控股有限公司 Method and device for obtaining electronic file
CN106911751A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 File acquisition method, device and system
CN109150927A (en) * 2017-06-15 2019-01-04 北京京东尚科信息技术有限公司 File delivery method and device for document storage system
CN110704375A (en) * 2019-09-26 2020-01-17 深圳前海大数金融服务有限公司 File management method, device, equipment and computer storage medium
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326763A (en) * 2015-06-15 2017-01-11 阿里巴巴集团控股有限公司 Method and device for obtaining electronic file
CN106911751A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 File acquisition method, device and system
CN109150927A (en) * 2017-06-15 2019-01-04 北京京东尚科信息技术有限公司 File delivery method and device for document storage system
CN110704375A (en) * 2019-09-26 2020-01-17 深圳前海大数金融服务有限公司 File management method, device, equipment and computer storage medium
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system

Similar Documents

Publication Publication Date Title
CN106571951B (en) Audit log obtaining method, system and device
CN110213276B (en) Authorization verification method under micro-service architecture, server, terminal and medium
CN106790183A (en) Logging on authentication method of calibration, device
CN107483495B (en) Big data cluster host management method, management system and server
CN111800378B (en) Login authentication method, device, system and storage medium
CN114900338A (en) Encryption and decryption method, device, equipment and medium
CN106302606B (en) Across the application access method and device of one kind
CN111914293A (en) Data access authority verification method and device, computer equipment and storage medium
CN110598429B (en) Data encryption storage and reading method, terminal equipment and storage medium
CN113472720A (en) Digital certificate key processing method and device, terminal equipment and storage medium
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
CN104104650A (en) Data file visit method and terminal equipment
CN111399980A (en) Safety authentication method, device and system for container organizer
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN116881936A (en) Trusted computing method and related equipment
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN113297563B (en) Method and device for accessing privileged resources of system on chip and system on chip
CN114372241A (en) Internet of things terminal identity authentication method, system, device and storage medium
CN111523128B (en) Information protection method, system, electronic equipment and medium
CN112231762A (en) File access method, device and storage medium
CN114024682A (en) Cross-domain single sign-on method, service equipment and authentication equipment
CN113468591A (en) Data access method, system, electronic device and computer readable storage medium
CN103179088A (en) Protection method and protection system of common gateway interface business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210115