Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File access method and system

A file access and file technology, applied in the field of Internet applications, can solve problems such as low protection mechanism, hidden dangers of file security, forgery, etc., and achieve the effect of realizing authority and authority reliability

Inactive Publication Date: 2012-09-19
TVMINING BEIJING MEDIA TECH
View PDF4 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The existing published technical solutions aim at the anti-leeching of files by judging the user's local information to distinguish identities, such as http_referer (judgment of origin), IP judgment, User-Agent (user access agent, such as including local operating system, etc.) information), but these technical means can be artificially forged by attackers who have mastered high technology, and the protection mechanism is relatively low.
[0008] Moreover, in the existing way, the server completes the address encryption. The key is that the output address is encrypted by structure. The server only checks the legality of the address structure to judge whether the address request is forged, and does not perform real authority verification. Once the address is encrypted If the algorithm is cracked, the hacker understands the algorithm of constructing the address, and will be able to construct a legal address arbitrarily, which will bring security risks to the files on the server
[0009] In addition, because these encryption methods only prevent the construction of the address, and do not subdivide the permissions of the users who access the address, when the file server obtains the address access, it cannot grasp the specific information of the user corresponding to the request, and cannot complete relevant statistics and other information. All kinds of business logic around users
These restrictions determine that the current anti-leech means cannot meet the requirements for comprehensive and in-depth control of file access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access method and system
  • File access method and system
  • File access method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0035] figure 1 It is a structural schematic diagram of the file access system in the specific embodiment of the present invention. Such as figure 1 As shown, the file access system includes a client 101 , an authentication server 102 , a file server 103 , an authority review server 104 and a storage device 105 .

[0036] The client is connected to the authentication server, and the file server is respectively connected to the client, the authentication server, the authority checking server and the storage device.

[0037] The client submits the authentication information to the authentication server, receives the access token sent by the authentication server, and sends a file acquisition request to the file server, and receives the file or error message sent by the file server; the authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file access method and a file access system. The file access method comprises the following steps that: a client submits authentication information to an authentication server; the authentication server returns an access token, and stores corresponding user information; the client transmits a file acquisition request to a file server; after receiving the file acquisition request, the file server extracts an access token, and transmits the access token to the authentication server to apply for verification; if the access token is verified to be legal, the authentication server returns user information corresponding to the access token to the file server; the file server receives the user information, and transmits a file address and the user information to a right auditing server for right judgment; if determining that the client has right, the right auditing server returns request legality information to the file server; and the file server acquires a file from storage equipment according to the file address, and transmits the file to the client. Due to the adoption of the technical scheme, file access can be accurately controlled according to user identity at a server, and the detailed data statistics of the file access can be realized.

Description

technical field [0001] The invention relates to the technical field of Internet applications, in particular to a file access method and system. Background technique [0002] In Internet applications, the access addresses of files are often directly exposed in the form of URLs in clear text. For access to dynamic content, application developers can control access in the form of user names and passwords. When accessing static files, it is difficult to implement authentication control on user access. [0003] Static files (such as important audio-visual materials, document pictures, etc.) have high privacy and are important resources in the entire system platform. Each file of this type will be managed by the database and then assigned different permissions. Only authorized users can use these files correctly, and can make detailed statistics on the access and usage of each file. [0004] On websites that require permissions, users need to log in with a username and password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 官文吉
Owner TVMINING BEIJING MEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products