Privilege control method of encryption document in terminal and terminal

A permission control and terminal technology, applied in the field of information security, can solve the problems of inability to control application layer permissions and to meet user needs, etc.

Inactive Publication Date: 2016-07-20
HUAWEI TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method for controlling the authority of an encrypted document in a terminal and a terminal, so as to solve the problem that the authority of the application layer cannot be controlled and the user's needs cannot be met

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privilege control method of encryption document in terminal and terminal
  • Privilege control method of encryption document in terminal and terminal
  • Privilege control method of encryption document in terminal and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the drawings in the embodiments of the present invention.

[0054] The present invention can be applied to a terminal with a Microsoft Windows (English: Microsoft Windows) operating system, and the terminal includes: a file filter driver, a file management module, and a file authority control module, wherein the file filter driver (English: Filefilterdriver) is a Windows operating system Existing drivers in the Windows operating system together with function drivers form the driver of the Windows operating system, and the function driver is used to process real business, while the file filter driver is a driver that hangs on the upper or lower layer of the function driver, and all function calls will be After the upper file filter dri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privilege control method of an encryption document in a terminal and the terminal. The method comprises that a file filter drive obtains the user identifier of a current user and a file header containing the file identifier of the current to-be-opened file of the user; when the file header comprises a file encryption identifier, the file filter drive sends a file privilege request instruction containing the user identifier and the file identifier to a file management module; the file management module sends received file privilege request instruction to a privilege management server, receives file privileges sent by the privilege management server and finally sends the file privileges to a file privilege control module; and the operations of the current user carried out to the file are controlled according to the file privileges, wherein the file management module sends the received file privileges sent by the privilege management server to the file privilege control module, thus enabling the privilege control module to control the privileges of the application layer needing to be carried out to the file currently by the user, and the processing demand of the user on the file is satisfied.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for controlling the authority of encrypted documents in a terminal and a terminal. Background technique [0002] File transparent encryption technology is a file encryption technology developed for enterprise files including demand applications. The transparency means that users will not be aware of the encryption and decryption process. When users open or edit protected files, the system will Automatically encrypt unencrypted files and decrypt encrypted files. Files are stored in cipher text on the hard disk and in plain text in the memory. Once the use environment is changed, they cannot be opened due to the inability to obtain automatic decryption services, thereby achieving The purpose of protecting file content. [0003] Using the above-mentioned method of controlling file permissions by using file filtering drivers can only control file permissions according to f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F3/12
Inventor 谢永方
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products