A method and system for dynamic adaptation and control of electronic file permissions

A dynamic adaptation and electronic file technology, applied in the field of G06 computing, can solve the problems of judging protection loopholes and poor real-time performance

Active Publication Date: 2011-12-07
DALIAN JIAMU INFORMATION SAFETY SOFTWARE TECH
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are also defects in the use of this kind of method. The main manifestations are that the first is "using keywords to scan electronic documents afterwards", which has poor real-time performance; the second is that "condit...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for dynamic adaptation and control of electronic file permissions
  • A method and system for dynamic adaptation and control of electronic file permissions
  • A method and system for dynamic adaptation and control of electronic file permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Example 1, for organizational structure image 3 , specify the method of operation of the present invention:

[0048] The system administrator on the server side sets authority control policies for employees according to the needs of the organizational structure, such as the manager of the financial department, and sets the manager to have control over all documents of the financial department, such as the September financial statements, etc., which have the ability to read, edit and delete Permissions, as well as read permissions for documents related to finance in the production management department. It is set that the business department manager has no authority to the above two types of files. At the same time, set access rules for the control files of the finance department. The file control policies and file access rules are stored and delivered to the clients of the two employees, and stored in the permission control policy pool of the clients.

[0049] When ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic file permission dynamic adaptive control method. The method is characterized by comprising the following steps of: configuring a plurality of permission control strategies; generating and storing a control strategy tank with the plurality of control strategies; analyzing the control strategies in the control strategy tank to obtain permission characteristic codes; obtaining file identification codes of a currently operated file in a system process; analyzing the file identification codes to obtain file confidential attribute identification codes; adaptively analyzing the permission characteristic codes and the file confidential attribute identification codes; if the permission characteristic codes are matched with the file confidential attribute identification codes, generating file adaptive operation codes; according to the operation codes, encrypting and decrypting files; and, if the permission characteristic codes are not matched with the file confidential attribute identification codes, obtaining a file non-adaptive operation.

Description

technical field [0001] The present invention relates to G06 Calculation; Calculation; Counting in the International Patent Main Classification, especially relates to G06F21 / 00, a security device for protecting computers or computer systems from unauthorized actions. Background technique [0002] With the continuous improvement of electronic informatization, governments, industries and enterprises rely more and more on computers and information systems. While strengthening and facilitating communication, it also increases the risk of illegal diffusion of information. People use mobile storage devices in large quantities, and various important files are transmitted by email or instant messaging tools, resulting in more and more data leakage, intentional or unintentional. Driven by interests, some internal employees even directly participated in the theft of important information and data. Relevant statistics show that information security threats from the intranet account for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/00G06F21/60
Inventor 张建军高建福姜真喜刘恩
Owner DALIAN JIAMU INFORMATION SAFETY SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products