Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secrecy method and system for displaying file to external user through network

A technology of external users and confidentiality methods, applied in transmission systems, electrical components, digital data protection, etc., can solve the problems of large investment, poor timeliness of acquisition, waste, etc., and achieve the effect of preventing leakage, enhancing confidentiality, and avoiding leakage.

Pending Publication Date: 2021-07-27
上海辛格迪健康科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] According to the industry definition, drugs in a broad sense include drugs, medical devices and health products, and drug-related industries include research and development (GLP), clinical trials (GCP), and production (GMP). The cycle is long, the investment is large, and the confidentiality of documents and data is highly valued. Once the R&D, clinical and production data related to drugs or medical devices are lost, it may result in a waste of up to hundreds of millions of dollars in R&D expenses.
However, pharmaceutical-related industries also need to disclose sensitive information and display relevant documents to external users such as peers and investment institutions. How to raise the threshold for information disclosure and protect their own secrets are the most important needs. Traditional emails, IM software, network disks, physical file express delivery and other methods all have problems such as difficulty in keeping secrets, poor timeliness in obtaining, and inability to determine the responsible person after leaking. A method or system that can facilitate traceability of leakers after leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secrecy method and system for displaying file to external user through network
  • Secrecy method and system for displaying file to external user through network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044]Embodiment 1: Divide the local data room and the virtual data room in the server-side database, and configure the internal users and external users to use one of their names, companies, account names, or a combination of any two or more of them as IDs and configure them in different In the network user group, and set permissions for different network user groups; so that internal users have different file approval, operation and access permissions and connection permissions of the local data room and virtual data room, and external users have different file access permissions and virtual data rooms. The connection authority of the data room; internal users with authority create files in the local data room; the user group with approval authority approves the file according to the quality management system process, and the file becomes effective if it passes the approval, and the file is modified until it passes the approval ;Set the effective file attribute to controlled,...

Embodiment 2

[0045] Embodiment 2: The user can combine the system of the present invention with various types of internal office management systems of oneself, and directly import the files (such as word files, wps files, pdf files, picture files) of oneself originally into the database, and approval can be set The document will take effect after any user in the network user group of internal users completes the approval process or a certain number of users complete the approval process in order. The user uses an electronic signature to complete the approval process. The electronic signature is a biometric signature and a password. Signature or its combination, biometric signature includes handwriting, appearance, pupil, other steps are the same as embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secrecy method and system for displaying a file to an external user through a network, and belongs to the technical field of file secrecy. The method comprises the steps: dividing a local data room and a virtual data room in a database, setting different IDs for an internal user and the external user, configuring the IDs into different network user groups, and setting permissions for different network user groups; the internal user with the corresponding authority creating a file in the local data room; approving the file according to a quality management system flow, the file taking effect if approval passes, and modifying the file until the file passes if approval does not pass; setting the effective file attribute to be controlled, and adding a controlled watermark on the file; the internal user copying the file to a virtual data room for the external user to access; and when the external user accesses the file of the virtual data room, generating a real-time watermark on the surface of the file and then displaying the watermark. According to the method, the displayed file cannot be downloaded, printed, photographed or screenshot, and the confidentiality of an enterprise when the file is displayed to the outside is enhanced.

Description

technical field [0001] The invention belongs to the technical field of document security, and in particular relates to a security method and system for displaying documents to external users through a network. Background technique [0002] According to the industry definition, drugs in a broad sense include drugs, medical devices and health products, and drug-related industries include research and development (GLP), clinical trials (GCP), and production (GMP). The cycle is long, the investment is large, and the confidentiality of documents and data is extremely important. Once the data related to research and development, clinical and production of drugs or medical devices are lost, it may result in a waste of research and development costs of up to hundreds of millions of dollars. However, pharmaceutical-related industries also need to disclose sensitive information and display relevant documents to external users such as peers and investment institutions. How to raise the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/16G06F21/32G06F21/60H04L29/06
CPCG06F21/6209G06F21/32G06F21/16G06F21/604H04L63/0428G06F2221/2107G06F2221/2141
Inventor 谭平莫晓欢孔繁祥朱振宇徐超
Owner 上海辛格迪健康科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products