Security management method for enterprise-level electronic documents

An electronic document and security management technology, applied in the field of information security, can solve problems such as stay

Inactive Publication Date: 2014-03-26
THE THIRD RES INST OF CHINA ELECTRONICS TECH GRP CORP
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At present, in China, most of the research on file encryption system technology implemented by researchers using the file system filter driver is still in the theoretical research stage, or they only realize encryption for specific types of files or directories; although the method has nothing to do with the file format, it is still based on The entire file is encrypted to completely prevent leaks, and a large number of other technical means are needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method for enterprise-level electronic documents
  • Security management method for enterprise-level electronic documents
  • Security management method for enterprise-level electronic documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] see figure 1 , figure 2 , a security management method for enterprise-level electronic documents, the security management method comprising the following steps:

[0026] (1) Steps for transparent decryption of electronic documents:

[0027] A. The user logs into the electronic document security management system, requests authentication and authorization, and requests authorization control policy information;

[0028] B. Judging the encryption status of the electronic document: when the user creates or opens an electronic document, if the electronic document does not contain an encryption mark, then the electronic document is defined as a new document or a plain text document; if the electronic document contains an encryption mark, then the electronic document is defined as encrypted document;

[0029] C. Obtain authorization: the user obtains the authorization control policy information and obtains the authorization to read the document, then go to step D; if the a...

Embodiment 2

[0055] This embodiment is improved on the basis of the first embodiment, and the content of the same part as the first embodiment will not be described repeatedly.

[0056] see image 3 , in this embodiment, the security management method of enterprise-level electronic documents also includes the following steps:

[0057] 2) Steps for transparent encryption of electronic documents:

[0058] E. The user obtains the authorization control policy information and obtains the authorization to write the document, then go to step F; if the authorization to write the document is not obtained, the ciphertext document cannot be edited;

[0059] F. Users who are authorized to write documents have the right to obtain the authorization key, and transparently encrypt the ciphertext document according to the authorization key and save it.

[0060] In this embodiment, the user operates the client unit to read the authorization control policy information, and if authorized to write the docume...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security management method for enterprise-level electronic documents. In the method, information communication is performed on the basis of a remote interaction platform; the remote interaction platform comprises a server unit, a database unit and a client unit which are positioned in one network environment and are in network connection with each other; electronic document security management software is installed in the server unit. A server-client system design mode, encryption environment management, online and offline decryption management and a file transparency encryption and decryption technology are introduced to prevent electronic documents from being leaked. According to an electronic document security management system, password-based identification, data integrity protection and non-repudiation services are provided in a C / S mode, so that authentication and authorization management under the control of a decision server is realized, and security management and control of each electronic document security management system client are realized.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security management method for enterprise-level electronic documents. Background technique [0002] With the popularization and development of the network, data security has been paid more and more attention by people. Combining with the "National Archives Industry Development "Twelfth Five-Year" Plan" and the requirements of the National Archives Directors' Conference, according to the needs of the development of the archives industry and the actual situation of archives work, the construction of an archives security system centering on the security and confidentiality of archives, and at the same time for the internal network of enterprises In the office environment, the demand for electronic document resource sharing and cross-department security distribution is growing rapidly. As one of the basic technologies to ensure the security of electronic d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L29/08G06Q10/10
CPCG06F21/6209G06F21/604
Inventor 蒋铭张小博胡艳平庞卫丽王磊李倩玉张德
Owner THE THIRD RES INST OF CHINA ELECTRONICS TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products