Method for guarantee safety of electronic file

An electronic file and security technology, applied in the field of encryption and decryption of electronic files, can solve the problems of not being able to control the use of files by users, permissions, and inability to view, and achieve the effect of low cost and increased protection.

Inactive Publication Date: 2011-10-05
XIAN DINGLAN COMM TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing document protection scheme mainly encrypts the data stored on the hard disk to prevent users from copying data from the internal network to the external network, that is, on the computer where the protection scheme client is installed, all documents, programs and other data are stored without the user's awareness. In the case of encrypted storage, when the user opens the file, the file will be transparently decrypted and the user can watch it, but when the file is copied to another computer that does not have a client installed, it cannot be viewed because there is no decryption program, and this solution cannot control file distribution by users , the use of divided permissions, that is to say, all users who normally use this machine have full permissions to the file; secondly, if you want to track the usage of the file, you must run your own process on the client side to monitor the user's behavior. Large deficiencies in resource consumption and user satisfaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guarantee safety of electronic file
  • Method for guarantee safety of electronic file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The content of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0040] see figure 1 , the concrete flow process of the encryption process of the present invention is:

[0041] First, the initial confidential personnel of the document log in to the encryption server, upload various documents that need to be encrypted, and after verifying the document format, select the required encryption method. The specific options are:

[0042] 1. Do you need to join server identity verification?

[0043] 2. Do you need to bind the local MAC address for verification?

[0044] 3. Whether user fingerprints are required for authentication

[0045] 4. Select the maximum allowable number of verification failures

[0046] 5. Choose whether to make a mandatory order

[0047] Among the above 5 options, at least one of the first 3 items must be selected, and the last two items are mandatory. After the selection is completed, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for ensuring the safety of an electronic file, which comprises an encryption process and a decryption process. The passive protection technology is embedded on the basis of active encryption, so that the control of tissues to the electronic file can be kept outside a fire wall; the use strategy of the file is managed in a dynamic manner to extend the value of prior IT investment to the outer part of safety control and content management system, thereby reducing the cost of sharing information among customers, supplier, cooperative partners and other relevant parties.

Description

technical field [0001] The invention relates to an encryption and decryption technology of electronic files, in particular to a method for ensuring the safety of electronic files. Background technique [0002] In the paperless digital age, the security of electronic documents has become an increasingly important part of information security. The existing document protection scheme mainly encrypts the data stored on the hard disk to prevent users from copying data from the internal network to the external network, that is, on the computer where the protection scheme client is installed, all documents, programs and other data are stored without the user's awareness. In the case of encrypted storage, when the user opens the file, the file will be transparently decrypted and the user can watch it, but when the file is copied to another computer that does not have a client installed, it cannot be viewed because there is no decryption program, and this solution cannot control file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/00G06F21/32
Inventor 孙涛孙佳
Owner XIAN DINGLAN COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products