File usage authority defining system and method

A setting method and permission technology, applied in the field of file usage permission setting system, can solve the problems of wrong permission setting, heavy burden on bosses and supervisors, inefficiency of file management process, etc., and achieve the effect of improving efficiency and security.

Inactive Publication Date: 2003-02-05
大买家科技股份有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a document management process is not only inefficient, but also places a h...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File usage authority defining system and method
  • File usage authority defining system and method
  • File usage authority defining system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Please refer to figure 1 According to the preferred embodiment of the present invention, the file use authority setting system 1 is implemented in a computer 5 and includes an authority checking module 11 and an authority setting module 12 . In the computer 5, a file 3 including authority setting data 31 and content data 32 is stored. The authority setting data 31 includes user identification data 311 and authority level data 312 . In addition, the computer 5 cooperates with a memory card information reading device 7 to read the authentication data 21 stored in the memory card 2 . The user 6 sets the authority setting data 31 in the file 3 through the authority setting module 12 .

[0026] In this embodiment, the computer 5 at least includes a central processing unit, a computer-readable storage device, and other peripheral devices required to complete its functions, such as input devices such as keyboards and mice, and are connected to each other. An electronic sign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system for setting the use authority of the file is utilzied for the data setting of at least part of authorities in the files. The data setting of the authorities incldues the user's id data and the hierarchy data of the user's authority. The ivnented system incldues the authority vertification module and the authority setting module. Based on the authority setting data, the authority vertification module verifies whether the use possesses the part of the authority to use the file or not. If the user possesses the part of the authority to use the file, base on the indication of the user, the authority setting module deletes the user's id data from the authority setting data. The invention also discloses the method for setting the use authority used by the system.

Description

technical field [0001] The invention relates to a file usage authority setting system and method, which allows a user to limitably set the usage authority of other users according to the usage authority of the file. Background technique [0002] With the development of computer software technology, the frequency of using software to deal with various affairs is also increasing. Any drawing, document processing, computer-aided design or financial management can be handled by software, thus greatly improving work efficiency and reducing personnel and time costs. [0003] Since the frequency of using computer software to process various affairs is increasing, how to protect files has become an important issue. The so-called "protecting files" means encrypting files and setting permissions and other protection measures so that people who do not have permission to open the files cannot see the contents of the files. If a user wants to open a file, he must go through an authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F12/16
Inventor 周忠信吴宗锡袁贤铭
Owner 大买家科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products