File protection method and system

A file and file header technology, applied in the fields of digital data protection, instruments, computing, etc., can solve the problems of long time, easy to be leaked, and low security of sensitive files.

Active Publication Date: 2016-07-06
PEKING UNIV
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some file protection software only protect files when the user uses the software and selects the file to be protected. Since the file exists in plain text before being selected by the user, it is easy to be leaked and obtained illegally. Therefore, this protection method is relatively unsafe
[0007] (2) The security of the method of protecting sensitive documents is very low;
However, current file protection software (such as Lockdir) is based on the perspective of convenient implementation, and most of them use the method of hiding files, so that sensitive files still exist in the computer in plain text. Once an attacker uses a file detection tool to detect hidden files, It is easy to obtain sensitive information in the file, and the security is very low
[0009] (3) The effectiveness of encryption key management methods is low;
[0011] (4) It is difficult to support applications in a multi-user sharing environment;
Shared users who have obtained passwords have the same file operation rights as administrators, and do not distinguish user rights and operation levels. Such file protection software cannot be used in a multi-user sharing environment.
[0013] (5) Unable to balance safety and effectiveness;
However, because the existing file system encrypts an entire disk partition at a time, it often takes a long time to protect a file, ignoring the user's waiting time, and the efficiency is not high
Existing methods are difficult to achieve a file protection mechanism that balances the security and effectiveness of file protection tools

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and system
  • File protection method and system
  • File protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0069] The present invention provides a file protection method and system, which provide real-time security protection for files in any format by managing users, monitoring files, generating file keys in layers and a file management method based on a security directory.

[0070] The present invention will be described in detail below by taking a shared security directory created by a user on a server as an example. figure 1 Shown is the system structure of this embodiment, figure 2 For the file protection method flow and system module relationship diagram provided in this embodiment, the specific implementation of the present invention includes the following steps:

[0071] A1) The administrator creates a security directory

[0072] The administrator enters the account password to enter the file ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file protection method and system. The method comprises the following steps: creating a security catalog by a system manager, and generating a system manager ID and a system manager ticket according to system manager information, wherein the manager has an authority of operating a user authority description table, users can be authenticated to use self-defined user tickets to carry out user authentication, and all the authority information of the users is recorded in the user authority description table; continuously detecting the user operations in the security catalog and giving response in real time to determine whether to protect files, wherein the protection is re-packaging the files into uniform-format files after extracting and encrypting the file contents; and adopting a three-layer secret key generation structure of the files to achieve the aim of encrypting or decrypting the files. The method and the system are based on the security catalog, so that real-time, secure and efficient protection is provided for the files of any format through managing the users, monitoring the files, generating file secret keys in layers and managing the files.

Description

technical field [0001] The present invention relates to file protection, in particular to a sensitive file protection method and system based on a safe directory which is independent of the format of the file to be protected. Background technique [0002] In recent years, with the vigorous development of network and digital technology, the digitization of files has made files the most direct and common carrier for people to store sensitive information. Due to the sensitivity and confidentiality of stored information, the protection of sensitive files has attracted more and more attention. [0003] Existing file protection tools can be divided into two categories: file protection systems and encryption software. The most common and popular file protection system at present is the EFS (Encrypted File System) provided by Microsoft Corporation. EFS provides users with sensitive information protection by encrypting the files that need to be protected. However, for files that n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107G06F2221/2141
Inventor 沈熳婷俞银燕汤帜崔晓瑜
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products