Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method and system of electronic document

An electronic file and file system technology, applied in the field of information security, can solve problems such as file security threats, file decryption that cannot be encrypted, passwords are easy to forget and leak, and achieve the effect of convenient use and high security

Active Publication Date: 2008-12-24
FEITIAN TECHNOLOGIES
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the above-mentioned file protection method of encrypting files can protect electronic files to a certain extent, if a user accidentally accesses a file or an illegal operator accesses a file, since the file is stored in ciphertext, the file will try to recover automatically , the file becomes corrupted and unusable
And this method needs to create a file list to list encrypted files. Once the file list is lost, the encrypted file cannot be decrypted, resulting in the inability to operate the file.
And the above-mentioned method of utilizing password verification to protect files, because passwords are easily forgotten and leaked, also can cause threat to the security of files
Therefore, neither of the above two methods can effectively protect electronic files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and system of electronic document
  • Protection method and system of electronic document
  • Protection method and system of electronic document

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described in detail in conjunction with the accompanying drawings and embodiments.

[0043] The protection mechanism of the present invention to file is: utilize existing key mechanism in conjunction with file system to filter and drive, the protected file is encrypted, then revise the extension of file cipher text (specific implementation is example with the extension of revising file, The method for modifying the file name is the same as the method for modifying the file extension), and finally the file is written to the computer disk through the file system driver; when the user accesses the protected file, the file system filter driver automatically restores the file name to the original file name, The file is then decrypted and the user can access the file. The following describes the specific file protection, browsing, opening, reading and writing processes one by one.

[0044] The process of the system to protect files is: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one method to code and protect electron files by use of modifying file names and combining file system filter and intelligent key device and its realization protection system, wherein, this invention adopts file system filter drive to process files; user needs not adopt protection actions when visiting and operating files for user easy; its adopts intelligent key device combining with file system filter coding files to make the file of higher safety.

Description

technical field [0001] The invention relates to information security technology, in particular to a method and system for protecting electronic files by modifying file names and combining file system filter drivers. Background technique [0002] With the rapid development of computer technology and information technology, computers have become an indispensable tool for people's daily life, office work and study. More and more data information is stored on computers in the form of electronic files. While this form brings convenience to people, it also poses security risks—many document information is confidential and cannot be read or tampered at will, so it is necessary to ensure the security of sensitive information. At present, people mainly use encryption and password authentication technology to control illegal operators' access to sensitive information, such as using various key mechanisms to encrypt files, or using password authentication to verify the identity of oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/24G06F21/60
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES