Unlock instant, AI-driven research and patent intelligence for your innovation.

File permission management method and device based on file double buffers

A technology of rights management and double cache, applied in the computer field, can solve problems such as document rights confusion, and achieve the effect of malicious disclosure of good documents and easy viewing and editing.

Active Publication Date: 2017-09-08
北京明朝万达科技股份有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] A single encryption process can only open and edit one encrypted document. If multiple documents are opened, document permissions will be confused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File permission management method and device based on file double buffers
  • File permission management method and device based on file double buffers
  • File permission management method and device based on file double buffers

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0096] Such as Figure 5 , a specific embodiment of the present invention is as follows:

[0097] (1) The server configures and distributes file security policies (there may be more than one).

[0098] (2) The confidentiality policy of the terminal receiving files.

[0099] (3) When a user opens a document, according to the document header identifier, a corresponding document security level policy is issued to the document driver for document permission and encryption control.

[0100] This project requires that documents on all PCs in the office need to be encrypted and have corresponding permissions configured when they are transferred between different departments. Editing cannot be decrypted, and a process opens multiple documents with different permissions, which greatly reduces the inconvenience caused by the installation of document control.

[0101] Through the solution provided by the invention, the malicious disclosure of documents can be better controlled; the do...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file permission management method and device based on file double buffers. The method comprises the steps that an opening action of a file is intercepted; a file header is read, whether the file is an encryption document is judged, and if yes, an encryption policy is issued to a file filtering driver; the file filtering driver judges whether the file opening process is an encryption process, and if yes, the encryption process is matched with the encryption policy; a file control block (FCB) is created for the opened file, and the file control block is made to have a plaintext buffer and a ciphertext buffer; and a secret key and a document permission of the file are recorded in the file control block. The invention furthermore discloses a file editing method and a file saving method and device based on the file double buffers. Through the scheme, malicious secret leakage of a document can be better controlled, and it is convenient for staff to check and edit the document under the condition that the document is controlled.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for file authority management based on file double buffering. Background technique [0002] At this stage, the file rights management method based on the file encryption driver is: the security vendor's file encryption product implements one encryption for each document, but the document permissions can only achieve the same process with the same authority, and cannot achieve multiple permissions in the same process. [0003] At this stage, security manufacturers' DLP (Data leakage prevention) product file encryption and rights management process is as follows: [0004] 1) The encryption process opens the document; [0005] 2) The application layer program sends key and permission related information to the driver; [0006] 3) The encryption process uses the key to open the document, and performs corresponding control according to the authority. [0007] A single e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107G06F2221/2141
Inventor 曲恩纯喻波王志海彭洪涛安鹏王志刚
Owner 北京明朝万达科技股份有限公司