Method and system for safely managing files based on pre-installation environment (PE) system
A system security and document technology, applied in the computer field, can solve problems such as the inability to guarantee the security of external confidential files, and achieve the effect of solving security problems, ensuring security, and making up for loopholes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] This embodiment provides a PE system-based security management document system, such as figure 1 As shown, the system 1 based on the security management document of the PE system includes: a PE system 11, an encryption client 12, and an external interface 13; the PE (Preinstallation Environment) system 11 serves as the system 1 based on the security management document of the PE system operating environment: the encryption client 12 is embedded in the PE operating system 11 and is used to open encrypted files; the external interface 13 is used to communicate with the server 2 outside the hard disk 1 .
[0034] Further, the encryption client 12 is embedded into the PE system 11 through a driver. The encryption client 12 opens the encrypted file through the matching key file. The external interface 13 includes a USB interface.
[0035] The PE system-based security management file system described in the present invention is a practical, effective, and flexible file mana...
Embodiment 2
[0037] This embodiment provides a method for securely managing documents based on the PE system, such as figure 2 As shown, the method based on the PE system security management document includes:
[0038] Step 1, build a PE system.
[0039] Step 2, embedding the encryption client in the PE system; specifically, storing an encryption client program and its driver in the PE system; driving the encryption client program into the PE system through the driver.
[0040] Step 3, start the PE system offline, start the encryption client through the PE system, and open the encrypted file through the encryption client. Specifically, the process for the encryption client to open the encrypted file is: judge whether the key in the key file matches the key used in the encrypted file; if they match, then use the key to open the encrypted file; otherwise, the encrypted file cannot be opened .
[0041] Further, the PE system can be built in a separate hard disk, which can be a mobile hard...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
