CN114338238A - Method for accessing computer data by multiple users - Google Patents

Method for accessing computer data by multiple users Download PDF

Info

Publication number
CN114338238A
CN114338238A CN202210199785.4A CN202210199785A CN114338238A CN 114338238 A CN114338238 A CN 114338238A CN 202210199785 A CN202210199785 A CN 202210199785A CN 114338238 A CN114338238 A CN 114338238A
Authority
CN
China
Prior art keywords
data
computer
access
user
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210199785.4A
Other languages
Chinese (zh)
Inventor
金振华
童松文
叶游隆
赵瑶瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Jingyi Software Co ltd
Original Assignee
Xiamen Jingyi Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Jingyi Software Co ltd filed Critical Xiamen Jingyi Software Co ltd
Priority to CN202210199785.4A priority Critical patent/CN114338238A/en
Publication of CN114338238A publication Critical patent/CN114338238A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to the technical field of computer data, in particular to a method for accessing computer data by multiple users, which comprises the following steps: s1, a user logs in an access program, the access program sends a data access request, a data management server in the computer controls an access request queuing module to sort the data access requests of the users, after the sorting is completed, the computer reads the data access requests of the users in sequence so as to judge the priority of the data access requests of the users, the computer extracts data according to the priority of the data access requests of the users, and S2, after the data extraction is completed, the computer generates encryption requests to the users.

Description

Method for accessing computer data by multiple users
Technical Field
The invention relates to the technical field of computer data, in particular to a method for accessing computer data by multiple users.
Background
In computer science, computer data is a generic term of all media of symbols which can be input into a computer and processed by a computer program, and is a generic term of numbers, letters, symbols, analog quantities and the like which have certain meanings and are used for input into an electronic computer for processing, the objects stored and processed by the computer are quite wide, the data representing the objects become more and more complex, and the computer data generally has the following characteristics: the computer data generally relates to data maintenance and recovery and data security, and has the characteristics of dual property, namely the computer evidence has higher precision and vulnerability at the same time, the computer evidence is based on technology and is rarely influenced by subjective factors, and the defects of other evidences, such as misreading of testimony, misreading of certificate and the like, are avoided and are relatively accurate; on the other hand, since computer information exists in the form of digital signals, which are discontinuous, computer evidence is received, listened to, eavesdropped, cut and spliced if someone intentionally or because of an error.
At present, transmitted data information is not encrypted in the existing distributed file system, when multiple users access the distributed file system, the security of data transmitted by a computer is poor, and users can acquire data transmitted by other users.
In summary, the present invention provides a method for accessing computer data by multiple users to solve this problem.
Disclosure of Invention
It is an object of the present invention to provide a method for accessing computer data by multiple users, which solves the above problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for multiple users to access computer data, comprising the steps of:
s1, a user logs in an access program, the access program sends a data access request, a data management server in the computer controls an access request queuing module to sort the data access requests of the users, after the sorting is completed, the computer reads the data access requests of the users in sequence, so that the priority of the data access requests of the users is judged, and the computer extracts data according to the priority of the data access requests of the users;
s2, after the data extraction is finished, the computer generates an encryption request to the user, the user sends a metadata key carrying a user identifier and encrypted by a preset encryption key, the computer encrypts the extracted data by using the received metadata key, and after the encryption is finished, the computer transmits the encrypted data to the user;
and S3, after receiving the encrypted data, the user decrypts the encrypted data by using the metadata key to obtain initial data.
As a preferable scheme of the present invention, the specific operation steps of the sorting process in S1 are as follows: the computer determines the time sequence of each access request according to the sending time stamp of the data access request, and then sorts the access requests according to the determined time sequence.
As a preferable embodiment of the present invention, the specific operation steps of the reading process in S1 are as follows: and the computer reads the user information corresponding to each access request, identifies the identity and the authority of the user and judges the authority of each user.
As a preferable aspect of the present invention, the data in the computer is stored in a hard disk.
As a preferred embodiment of the present invention, the data access request in S1 is a hypertext transfer protocol HTTP request.
As a preferred embodiment of the present invention, the specific operation steps of data extraction in S1 are as follows: the users with the authority as the priority can firstly perform data extraction processing, and the non-priority users perform data extraction in sequence according to the time access request sequence.
As a preferable scheme of the present invention, the metadata key encrypted by the predetermined encryption key and carrying the user identifier in S3 is stored in the cloud server, and the metadata key can be downloaded through the network when needed.
As a preferred embodiment of the present invention, the data access request in S1 includes a name of the data requested to be accessed, a storage location of the data requested to be accessed, and user information.
Compared with the prior art, the invention has the beneficial effects that:
1. in the invention, a user logs in an access program, the access program sends a data access request, a data management server in a computer controls an access request queuing module to sequence data access requests of all users, after the sequencing is finished, the computer reads the data access requests of all users in sequence so as to judge the priority of the data access requests of all users, the computer extracts data according to the priority of the data access requests of all users, after the data extraction is finished, the computer generates an encryption request to the user, the user sends a metadata key which carries a user identifier and is encrypted by a preset encryption key, the computer encrypts the extracted data by using the received metadata key, after the encryption is finished, the computer transmits the encrypted data to the user, and after the user receives the encrypted data, the metadata key is used for decrypting the encrypted data, the initial data is obtained, the metadata key stored in the cloud server is used for encrypting and decrypting the data, so that the data cannot be intercepted by other users in the data transmission process, the safety of the data is guaranteed, meanwhile, the metadata key stored in the cloud server carries user identification, a computer can independently encrypt the data, the data encryption of each user is inconsistent, the situation that other users decrypt the data by using the metadata key is avoided, and the safety of the data is further improved.
2. According to the method, the computer firstly judges the time sequence of each access request according to the sending time stamp of the data access request, then carries out sequencing according to the judged time sequence, reads the user information corresponding to each access request, identifies the identity and the authority of the user, and judges the authority of each user, the user with the authority as the priority can carry out data extraction processing firstly, and the non-priority user carries out data extraction in sequence according to the time access request sequencing, can carry out data extraction according to the priority of the user, and is convenient for the user with higher priority to use.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, rather than all embodiments, and all other embodiments obtained by a person of ordinary skill in the art without any creative work based on the embodiments of the present invention belong to the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, and the terms used herein in the specification of the present invention are for the purpose of describing particular embodiments only and are not intended to limit the present invention, and the term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
The invention provides a technical scheme that:
a method for multiple users to access computer data, comprising the steps of:
s1, a user logs in an access program, the access program sends a data access request, a data management server in the computer controls an access request queuing module to sort the data access requests of the users, after the sorting is completed, the computer reads the data access requests of the users in sequence, so that the priority of the data access requests of the users is judged, and the computer extracts data according to the priority of the data access requests of the users;
s2, after the data extraction is finished, the computer generates an encryption request to the user, the user sends a metadata key carrying a user identifier and encrypted by a preset encryption key, the computer encrypts the extracted data by using the received metadata key, and after the encryption is finished, the computer transmits the encrypted data to the user;
and S3, after receiving the encrypted data, the user decrypts the encrypted data by using the metadata key to obtain initial data.
Further, the specific operation steps of the sorting process in S1 are as follows: the computer determines the time sequence of each access request according to the sending time stamp of the data access request, and then sorts the access requests according to the determined time sequence.
Further, the specific operation steps of the reading process in S1 are as follows: and the computer reads the user information corresponding to each access request, identifies the identity and the authority of the user and judges the authority of each user.
Further, the data in the computer is stored in a hard disk.
Further, the data access request in S1 is a hypertext transfer protocol HTTP request.
Further, the specific operation steps of data extraction in S1 are as follows: the users with the authority as the priority can firstly perform data extraction processing, and the non-priority users perform data extraction in sequence according to the time access request sequence.
Further, the metadata key encrypted by the predetermined encryption key and carrying the user identifier in S3 is stored in the cloud server, and the metadata key can be downloaded by the user through the network when needed.
Further, the data access request in S1 includes the name of the data requested to be accessed, the storage location of the data requested to be accessed, and the user' S own information.
The specific implementation case is as follows:
the user logs in the access program, the access program sends a data access request, the data access request comprises a data name of the access request, a data storage position of the access request and user information, the data access request is a hypertext transfer protocol (HTTP) request, a data management server in the computer controls the access request queuing module to sort the data access requests of the users, the computer judges the time sequence of the access requests according to the sending time stamp of the data access requests, then sorts the data access requests according to the judged time sequence, after the sorting is finished, the computer reads the data access requests of the users in sequence, the computer reads the user information corresponding to the access requests, identifies the identity and the authority of the users, and judges the authority of the users, thereby judging the priority of the data access requests of the users, the computer extracts data according to the priority of the data access request of each user, users with the authority of priority can extract the data first, and non-priority users extract the data in sequence according to the time access request sequence;
after data extraction is completed, a computer generates an encryption request to a user, the user sends a metadata key which carries a user identifier and is encrypted by a preset encryption key, the metadata key which carries the user identifier and is encrypted by the preset encryption key is stored in a cloud server, the user can download the metadata key through a network when needed, the computer encrypts the extracted data by using the received metadata key, the computer transmits the encrypted data to the user after encryption is completed, and the user decrypts the encrypted data by using the metadata key after receiving the encrypted data to obtain initial data.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A method for accessing computer data by multiple users, comprising the steps of:
s1, a user logs in an access program, the access program sends a data access request, a data management server in the computer controls an access request queuing module to sort the data access requests of the users, after the sorting is completed, the computer reads the data access requests of the users in sequence, so that the priority of the data access requests of the users is judged, and the computer extracts data according to the priority of the data access requests of the users;
s2, after the data extraction is finished, the computer generates an encryption request to the user, the user sends a metadata key carrying a user identifier and encrypted by a preset encryption key, the computer encrypts the extracted data by using the received metadata key, and after the encryption is finished, the computer transmits the encrypted data to the user;
and S3, after receiving the encrypted data, the user decrypts the encrypted data by using the metadata key to obtain initial data.
2. A method for multiple users to access computer data as claimed in claim 1 wherein: the specific operation steps of the sorting process in S1 are as follows: the computer determines the time sequence of each access request according to the sending time stamp of the data access request, and then sorts the access requests according to the determined time sequence.
3. A method for multiple users to access computer data as claimed in claim 1 wherein: the specific operation steps of the reading processing in S1 are as follows: and the computer reads the user information corresponding to each access request, identifies the identity and the authority of the user and judges the authority of each user.
4. A method for multiple users to access computer data as claimed in claim 1 wherein: the data in the computer is stored in a hard disk.
5. A method for multiple users to access computer data as claimed in claim 1 wherein: the data access request in S1 is a hypertext transfer protocol HTTP request.
6. A method for multiple users to access computer data as claimed in claim 1 wherein: the specific operation steps of data extraction in S1 are as follows: the users with the authority as the priority can firstly perform data extraction processing, and the non-priority users perform data extraction in sequence according to the time access request sequence.
7. A method for multiple users to access computer data as claimed in claim 1 wherein: the metadata key encrypted by the predetermined encryption key and carrying the user identifier in S3 is stored in the cloud server, and can be downloaded by the user through the network when necessary.
8. A method for multiple users to access computer data as claimed in claim 1 wherein: the data access request in S1 includes the name of the data requested to be accessed, the storage location of the data requested to be accessed, and the user' S own information.
CN202210199785.4A 2022-03-02 2022-03-02 Method for accessing computer data by multiple users Pending CN114338238A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210199785.4A CN114338238A (en) 2022-03-02 2022-03-02 Method for accessing computer data by multiple users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210199785.4A CN114338238A (en) 2022-03-02 2022-03-02 Method for accessing computer data by multiple users

Publications (1)

Publication Number Publication Date
CN114338238A true CN114338238A (en) 2022-04-12

Family

ID=81030107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210199785.4A Pending CN114338238A (en) 2022-03-02 2022-03-02 Method for accessing computer data by multiple users

Country Status (1)

Country Link
CN (1) CN114338238A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010097834A (en) * 2000-04-26 2001-11-08 이영아 Realtime digital watermarking system and operating method in encrypt
CN102457561A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 Data access method and equipment adopting same
US20180341783A1 (en) * 2016-06-10 2018-11-29 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
CN109885775A (en) * 2019-03-05 2019-06-14 重庆工商大学融智学院 A method of realize ecological environment space large data sets at shared
CN109992938A (en) * 2019-03-25 2019-07-09 大夏数据服务有限公司 A kind of method of multi-user access computer data
KR20200079191A (en) * 2018-12-24 2020-07-02 인천대학교 산학협력단 System and Method for Controlling Multi Factor Access Prioritized

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010097834A (en) * 2000-04-26 2001-11-08 이영아 Realtime digital watermarking system and operating method in encrypt
CN102457561A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 Data access method and equipment adopting same
US20180341783A1 (en) * 2016-06-10 2018-11-29 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
KR20200079191A (en) * 2018-12-24 2020-07-02 인천대학교 산학협력단 System and Method for Controlling Multi Factor Access Prioritized
CN109885775A (en) * 2019-03-05 2019-06-14 重庆工商大学融智学院 A method of realize ecological environment space large data sets at shared
CN109992938A (en) * 2019-03-25 2019-07-09 大夏数据服务有限公司 A kind of method of multi-user access computer data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
苏;史国振;付安民;俞研;金伟;: "基于代理重加密的云端多要素访问控制方案", 通信学报, no. 02, pages 100 - 108 *

Similar Documents

Publication Publication Date Title
CN103731432B (en) Multi-user supported searchable encryption method
US8719575B2 (en) Method of secure broadcasting of digital data to an authorized third party
US20030208681A1 (en) Enforcing file authorization access
CN110868301A (en) Identity authentication system and method based on state cryptographic algorithm
CN110138754B (en) Multi-cloud-end information processing system and resource sharing method thereof
US20160112417A1 (en) Terminal for strong authentication of a user
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN113259382B (en) Data transmission method, device, equipment and storage medium
CN112861157A (en) Data sharing method based on decentralized identity and proxy re-encryption
CN111639952A (en) Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain
CN108108632A (en) A kind of multifactor file watermark generation extracting method and system
CN1588365A (en) Ciphertext global search technology
CN110990863B (en) Method for realizing file access control through timestamp and encryption algorithm
CN109039997B (en) Secret key obtaining method, device and system
CN115270182A (en) Power grid project closed-loop control file management system
CN108494724B (en) Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN111614638A (en) Face recognition data distribution system and method based on big data platform
CN114338238A (en) Method for accessing computer data by multiple users
EP2784973A1 (en) Method, system, and device for digital content transmission
CN111917711A (en) Data access method and device, computer equipment and storage medium
CN101399663A (en) Method, system and device for digital content authentication
CN1558580B (en) A network data safety protection method based on cryptography
US8755521B2 (en) Security method and system for media playback devices
CN115982115A (en) Data sharing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination