Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system of file operation

A target file and file operation technology, applied in the field of enterprise version security, to achieve the effect of strong flexibility

Active Publication Date: 2013-07-10
BEIJING QIANXIN TECH
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this "private cloud" system still needs to be perfected and improved in function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of file operation
  • Method and system of file operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0042] see figure 1 , the embodiment of the present invention first provides a file operation control method, the method may include the following steps:

[0043] S101: the client monitors the target operation behavior of the target file;

[0044] The so-called target operation behavior may include running a target file, viewing a file of another program by one program (such as an address book, etc.) or a photo stored in a hard di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for controlling file operation. The method includes intercepting an operation request when the operation request of object operation to an object file is monitored and obtaining security attribute information which includes private attribute and public attribute of the object file from the management control center of a security control server through network by a client, wherein the private attribute is the security class information set for the object file by a security administrator of the management control center, determining whether permitting the object operation to the object file according to the security attribute information of the object file and a security strategy which is for the current client and obtained from the management control center, and processing the intercepted request according to the determining result. According to the method and the system of file operation and control, enterprise security products have individualized characteristics of different enterprises, and the great flexibility of the security control can be obtained.

Description

technical field [0001] The invention relates to the technical field of enterprise version security, in particular to a method and system for running files. Background technique [0002] In the traditional enterprise network environment, various security desktop products, such as anti-virus software, are piled up on enterprise terminal computers. These software products usually come from different manufacturers, cannot be managed in a unified manner, and occupy a large amount of system resources, greatly affecting the enterprise's performance. work efficiency. In order to solve this problem, the enterprise version security products came into being. Enterprise version security products are usually composed of two parts: the management control center and the security product client (the management control center is deployed on the server managed by IT personnel such as the network administrator, and the client is installed on the PCs of each employee). Centralized management ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
Inventor 温铭李宇胡劲张家柱
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products