CN110321717A - A kind of file encrypting method and system - Google Patents

A kind of file encrypting method and system Download PDF

Info

Publication number
CN110321717A
CN110321717A CN201810267667.6A CN201810267667A CN110321717A CN 110321717 A CN110321717 A CN 110321717A CN 201810267667 A CN201810267667 A CN 201810267667A CN 110321717 A CN110321717 A CN 110321717A
Authority
CN
China
Prior art keywords
document
access authority
domain
inventory
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810267667.6A
Other languages
Chinese (zh)
Inventor
龚国钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN LAN-YOU TECHNOLOG Co Ltd
Original Assignee
SHENZHEN LAN-YOU TECHNOLOG Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN LAN-YOU TECHNOLOG Co Ltd filed Critical SHENZHEN LAN-YOU TECHNOLOG Co Ltd
Priority to CN201810267667.6A priority Critical patent/CN110321717A/en
Publication of CN110321717A publication Critical patent/CN110321717A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of file encrypting method and systems.This document encryption method includes: the access authority inventory by AD configuration of territory document;When user downloads document, according to the access authority inventory, the document is encrypted;When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user;It can be realized as a result, by the domain AD and Classification Management carried out to permission group and group user, so that personnel's addition and the configuration of new permission become flexibly simple;In addition, eliminating the work of document re-encrypted, it is only necessary to there is the adjustment domain AD end group structure that the permission modification to document has been issued can be realized.

Description

A kind of file encrypting method and system
Technical field
The present invention relates to field of information security technology more particularly to a kind of file encrypting method and systems.
Background technique
In some companies, the revision of some technical documentations is related to multiple department's circulation examination & approval, further relates to using link The production department of various regions factory, it is huge that high challenge is proposed to the security work of document using crowd.
For above situation, it is common practice to which quoting the RMS document authority management technology of Microsoft, (technology file is equal For EXCEL, WORD, PDF document), by document shell adding and configuring the access authority information of specific user to control user couple Visual, the modification, printing operation of document content rank, achieve the purpose that limitation is illegally spread.
But when using the above method, user and permissions list are attached on document, add new user or change is existing It is had to when having user right by document re-encrypted;When needing to carry out the adjustment of extensive permission, extensive document recycling weight It newly encrypts extremely inconvenient.
Summary of the invention
The purpose of the present invention is to provide a kind of file encrypting method and systems.
On the one hand, the embodiment of the present invention provides a kind of file encrypting method, comprising the following steps:
Pass through the access authority inventory of AD configuration of territory document;
When user downloads document, according to the access authority inventory, the document is encrypted;
When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user.
In file encrypting method provided by the invention, pass through the step of the access authority inventory of AD configuration of territory document Include:
Administrative staff's load right administration page selects document to be configured, adds personnel's inventory and corresponding access Permission;
The domain AD permission group is generated in AD domain server according to the access authority;
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, The access authority inventory include the domain AD permission group group name and corresponding group of user.
In file encrypting method provided by the invention, in administrative staff's load right administration page, select to be configured After the step of document, addition personnel's inventory and corresponding access authority, further includes:
The connection domain AD verifies personnel's inventory of addition, after verification passes through, corresponding personnel is added to corresponding The domain AD permission group.
It is right according to the access authority inventory when user downloads document in file encrypting method provided by the invention The step that the document is encrypted includes:
When user downloads document, file server is to RMS server application authorization code;
RMS server generates the authorization code according to the access authority inventory;
File server encrypts the document according to the authorization code.
In file encrypting method provided by the invention, RMS server is awarded according to access authority inventory generation Before the step of weighted code further include:
The access authority inventory is mapped to the operating right of RMS server by AD domain server.
Correspondingly, the present invention also provides a kind of file encryption systems, comprising:
Permission configuration module, for passing through the access authority inventory of AD configuration of territory document;
Encrypting module is connected to the permission configuration module, is used for when user downloads document, according to the access authority Inventory encrypts the document;
Display module is verified, the encrypting module is connected to, for carrying out permission school when user opens the document It tests, shows document content corresponding with the access authority of user.
In file encryption system provided by the invention, the permission configuration module includes:
Adding unit selects document to be configured for administrative staff, adds personnel's inventory and corresponding access authority;
The domain AD permission group generation unit, is connected to the adding unit, for being serviced according to the access authority in the domain AD Device generates the domain AD permission group;
Access authority inventory generation unit is connected to the adding unit and the domain the AD permission group generation unit, is used for According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the access Right list include the domain AD permission group group name and corresponding group of user.
In file encryption system provided by the invention, the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, and for verifying to personnel's inventory of addition, verification passes through Afterwards, corresponding personnel are added to the corresponding domain AD permission group.
In file encryption system provided by the invention, the encrypting module includes:
Authorization code application unit, for when user downloads document, file server to be to RMS server application authorization code;
Authorization code generation unit is connected to the authorization code application unit, for RMS server according to the access authority Inventory generates the authorization code;
Encryption unit is connected to the authorization code generation unit, for file server according to the authorization code, to described Document is encrypted.
In file encryption system provided by the invention, the encrypting module further include:
The access authority inventory is mapped to the operating right of RMS server for AD domain server by map unit.
The implementation of the embodiments of the present invention has the following beneficial effects: in the present invention, passing through the access right of AD configuration of territory document Limit inventory;When user downloads document, according to the access authority inventory, the document is encrypted;When user opens institute When stating document, authorization check is carried out, shows document content corresponding with the access authority of user;It as a result, can be real by the domain AD Classification Management now is carried out to permission group and group user, so that personnel's addition and the configuration of new permission become flexibly simple;In addition, exempting from The work of document re-encrypted is gone, it is only necessary to there is the adjustment domain AD end group structure can be realized and become to the permission for having issued document More.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 show application scenarios schematic diagram of the invention;
Fig. 2 show the flow chart of the file encrypting method of one embodiment of the invention offer;
The flow chart of step S1 shown in Fig. 2 shown in Fig. 3;
The flow chart of step S2 shown in Fig. 2 shown in Fig. 4;
Fig. 5 show the schematic diagram of the file encryption system of one embodiment of the invention offer;
The schematic diagram of permission configuration module shown in fig. 5 shown in Fig. 6;
The schematic diagram of encrypting module shown in fig. 5 shown in Fig. 7.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 show application scenarios schematic diagram of the invention;Fig. 2 show the file encryption of one embodiment of the invention offer The flow chart of method.As depicted in figs. 1 and 2, file encrypting method provided by the invention, comprising the following steps:
Step S1: pass through the access authority inventory of AD configuration of territory document;
AD (Active Directory, Active Directory) is towards Windows Standard Server, Windows The directory service of Enterprise Server and Windows Datacenter Server.The domain AD stores related network pair The information of elephant, and administrator and user is allowed easily can to search and use these information.The domain AD has used a kind of structuring Data storage method, and logical laminated tissue is carried out to directory information in this, as basis.Therefore, in the present invention In, Classification Management is carried out to permission group and group user by the domain AD, so that personnel's addition and the configuration of new permission become flexible letter It is single.Specifically, as shown in figure 3, step S1 includes following sub-step:
Step S11: administrative staff's load right administration page selects document to be configured, adds personnel's inventory and right The access authority answered;
Step S12: the domain AD permission group is generated in AD domain server according to the access authority;
Step S13: according to access authority, corresponding personnel is added to the corresponding domain AD permission group, generate the access Right list, the access authority inventory include the domain AD permission group group name and corresponding group of user.
In the present invention, as shown in Figure 1, Web end system provides rights management interface for administrative staff, pass through permission pipe Interface is managed, administrative staff can choose its document for wanting configuration, after having selected document, then adds for the document and may have access to people Inventory permission corresponding with its of member, for example, Zhang San, reads;Li Si reads, printing, duplication.After configuring access authority, The domain AD permission group is generated in AD domain server according to the access authority of Web end system, for example, printing group, modification group, read-only group. Then, corresponding personnel are added to corresponding permission group, access authority inventory are generated, for example, printing group: Li Si, king five;Only Reading group, Zhang San.In this way, permission modification can be realized by the permission group in the domain web interface direct configuration management AD, user of service is not Need to have the relevant technological know-how in the domain AD, improve the efficiency of rights document permission modification.
Further, since the domain AD contains specific personnel, therefore, it is also desirable to the personnel of rights management page addition Whether inventory carries out authorization check, judge the personnel in the domain AD.It specifically, after step s 11, further include following step It is rapid:
The connection domain AD verifies personnel's inventory of addition, after verification passes through, corresponding personnel is added to corresponding The domain AD permission group.
Step S2: when user downloads document, according to the access authority inventory, the document is encrypted;
RMS (Rights Management Services, rights management service) is a kind of information protective technology, it with open Cooperated with the application program of RMS to help to protect digital information to avoid unwarranted use -- either online or off line, In firewall or outside firewall.RMS can help tissue to create reliable information protection solution.Made by lasting Accompanied always with information the information protection of (no matter information arrival where) with strategy offer, RMS has expanded the security strategy of tissue.
In the present invention, as shown in Figure 1, user is when downloading document, file server can be by RMS server to document It is encrypted, the access authority inventory in the domain AD is generated into a LICENCE and is attached on document simultaneously shell adding.Specifically, such as Shown in Fig. 4, step S2 includes following sub-step:
Step S21: when user downloads document, file server is to RMS server application authorization code;
The access authority inventory is mapped to the operating right of RMS server by step S22:AD domain server;
Step S23:RMS server generates the authorization code according to the access authority inventory;
Step S24: file server encrypts the document according to the authorization code.
File server carries out being encrypted as the prior art according to authorization code, and details are not described herein.In this way, needing to change power In limited time, it is only necessary to which permission modification to document has been issued can be realized in the access authority inventory for adjusting the domain AD, eliminates document weight The work newly encrypted.Background program can read automatically the file under specified directory according to configuration the page generate parameter to document into Row encryption, avoids manual intervention.
Step S3: when user opens the document, authorization check is carried out, shows text corresponding with the access authority of user Shelves content.
As shown in Figure 1, local log-on user is carried out school to RMS server by the computer of user when user opens document It tests, meeting return information tells which permission group local computing office component active user is in after verification passes through, which possesses Permission, office component can load document content and show.
In the present invention, pass through the access authority inventory of AD configuration of territory document;When user downloads document, according to the visit It asks right list, the document is encrypted;When user opens the document, authorization check is carried out, display is with user's The corresponding document content of access authority;It can be realized as a result, by the domain AD and Classification Management carried out to permission group and group user, so that Personnel's addition and the configuration of new permission become flexibly simple;In addition, eliminating the work of document re-encrypted, it is only necessary to there is adjustment The permission modification to document has been issued can be realized in the domain AD end group structure.
It should be understood that in embodiments of the present invention, magnitude of the sequence numbers of the above procedures are not meant to the elder generation of execution sequence Afterwards, the execution sequence of each process should be determined by its function and internal logic, the implementation process structure without coping with the embodiment of the present invention At any restriction.
Fig. 5 show the schematic diagram of the file encryption system of one embodiment of the invention offer.As shown in figure 5, the present invention mentions The file encryption system of confession includes:
Permission configuration module 410, for passing through the access authority inventory of AD configuration of territory document;
In the present invention, Classification Management is carried out to permission group and group user by the domain AD, so that personnel's addition and new permission Configuration become flexibly simple.Specifically, as shown in fig. 6, the permission configuration module includes:
Adding unit 412 selects document to be configured for administrative staff, adds personnel's inventory and corresponding access right Limit;
The domain AD permission group generation unit 414, is connected to the adding unit, for being taken according to the access authority in the domain AD Business device generates the domain AD permission group;
Access authority inventory generation unit 416 is connected to the adding unit and the domain the AD permission group generation unit, uses According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the visit Ask right list include the domain AD permission group group name and corresponding group of user.
Permission modification can be realized by the permission group in the domain permission configuration module direct configuration management AD, user of service is not required to Have the relevant technological know-how in the domain AD, improves the efficiency of rights document permission modification.
Further, since the domain AD contains specific personnel, therefore, it is also desirable to the personnel of rights management page addition Whether inventory carries out authorization check, judge the personnel in the domain AD.Specifically, the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, and for verifying to personnel's inventory of addition, verification passes through Afterwards, corresponding personnel are added to the corresponding domain AD permission group.
Encrypting module 420 is connected to the permission configuration module, is used for when user downloads document, according to the access Right list encrypts the document;
In the present invention, when downloading document, file server can carry out at encryption document by RMS server user The access authority inventory in the domain AD is generated a LICENCE and is attached on document simultaneously shell adding by reason.Specifically, as shown in fig. 7, institute Stating encrypting module includes:
Authorization code application unit 422, for when user downloads document, file server to be to RMS server application authorization Code;
Authorization code generation unit 424 is connected to the authorization code application unit, for RMS server according to the access Right list generates the authorization code;
Encryption unit 426 is connected to the authorization code generation unit, right for file server according to the authorization code The document is encrypted.
The encrypting module further include: the access authority inventory is mapped to RMS for AD domain server by map unit The operating right of server.
In this way, when needing to change permission, it is only necessary to adjust the domain AD access authority inventory can be realized to descended dispatch The permission modification of shelves, eliminates the work of document re-encrypted.Background program can read automatically the file under specified directory according to Document is encrypted in the parameter that the configuration page generates, and avoids manual intervention.
Display module 430 is verified, the encrypting module is connected to, for carrying out permission when user opens the document Verification shows document content corresponding with the access authority of user.
When user opens document, the computer of user verifies local log-on user to RMS server, and verification passes through After can return information tell which permission group local computing office component active user is in, possess which permission, office Component can load document content and show.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Above disclosed is only a preferred embodiment of the present invention, cannot limit the power of the present invention with this certainly Sharp range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and weighs according to the present invention Benefit requires made equivalent variations, still belongs to the scope covered by the invention.

Claims (10)

1. a kind of file encrypting method, which comprises the following steps:
Pass through the access authority inventory of AD configuration of territory document;
When user downloads document, according to the access authority inventory, the document is encrypted;
When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user.
2. file encrypting method according to claim 1, which is characterized in that the access authority by AD configuration of territory document is clear Single step includes:
Administrative staff's load right administration page selects document to be configured, adds personnel's inventory and corresponding access authority;
The domain AD permission group is generated in AD domain server according to the access authority;
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, it is described Access authority inventory include the domain AD permission group group name and corresponding group of user.
3. file encrypting method according to claim 2, which is characterized in that in administrative staff's load right administration page, Document to be configured is selected, after the step for adding personnel's inventory and corresponding access authority, further includes:
The connection domain AD verifies personnel's inventory of addition, and after verification passes through, corresponding personnel are added to the corresponding domain AD Permission group.
4. file encrypting method according to claim 2, which is characterized in that when user downloads document, according to the visit Ask right list, the step encrypted to the document includes:
When user downloads document, file server is to RMS server application authorization code;
RMS server generates the authorization code according to the access authority inventory;
File server encrypts the document according to the authorization code.
5. file encrypting method according to claim 4, which is characterized in that RMS server is clear according to the access authority Before single step for generating the authorization code further include:
The access authority inventory is mapped to the operating right of RMS server by AD domain server.
6. a kind of file encryption system characterized by comprising
Permission configuration module, for passing through the access authority inventory of AD configuration of territory document;
Encrypting module is connected to the permission configuration module, is used for when user downloads document, clear according to the access authority It is single, the document is encrypted;
Display module is verified, the encrypting module is connected to, for carrying out authorization check when user opens the document, is shown Show document content corresponding with the access authority of user.
7. file encryption system according to claim 6, which is characterized in that the permission configuration module includes:
Adding unit selects document to be configured for administrative staff, adds personnel's inventory and corresponding access authority;
The domain AD permission group generation unit, is connected to the adding unit, for raw in AD domain server according to the access authority At the domain AD permission group;
Access authority inventory generation unit is connected to the adding unit and the domain the AD permission group generation unit, is used for basis Corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the access authority by access authority Inventory include the domain AD permission group group name and corresponding group of user.
8. file encryption system according to claim 7, which is characterized in that the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, for being verified to personnel's inventory of addition, after verification passes through, Corresponding personnel are added to the corresponding domain AD permission group.
9. file encryption system according to claim 7, which is characterized in that the encrypting module includes:
Authorization code application unit, for when user downloads document, file server to be to RMS server application authorization code;
Authorization code generation unit is connected to the authorization code application unit, for RMS server according to the access authority inventory Generate the authorization code;
Encryption unit is connected to the authorization code generation unit, for file server according to the authorization code, to the document It is encrypted.
10. file encryption system according to claim 9, which is characterized in that the encrypting module further include:
The access authority inventory is mapped to the operating right of RMS server for AD domain server by map unit.
CN201810267667.6A 2018-03-28 2018-03-28 A kind of file encrypting method and system Pending CN110321717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810267667.6A CN110321717A (en) 2018-03-28 2018-03-28 A kind of file encrypting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810267667.6A CN110321717A (en) 2018-03-28 2018-03-28 A kind of file encrypting method and system

Publications (1)

Publication Number Publication Date
CN110321717A true CN110321717A (en) 2019-10-11

Family

ID=68110382

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810267667.6A Pending CN110321717A (en) 2018-03-28 2018-03-28 A kind of file encrypting method and system

Country Status (1)

Country Link
CN (1) CN110321717A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655502A (en) * 2004-02-11 2005-08-17 联想(北京)有限公司 Method for guaranteeing the safety of electronic documents
CN1822014A (en) * 2006-03-23 2006-08-23 沈明峰 Protecting method for security files under cooperative working environment
CN101212457A (en) * 2006-12-27 2008-07-02 鸿富锦精密工业(深圳)有限公司 Webpage privilege control system and method
CN101986598A (en) * 2010-10-27 2011-03-16 北京星网锐捷网络技术有限公司 Authentication method, server and system
CN102325029A (en) * 2011-09-20 2012-01-18 深圳市深信服电子科技有限公司 AD (Active Directory) domain single sign on method and server
CN102667792A (en) * 2009-11-20 2012-09-12 宝马股份公司 Method and device for accessing files of a secure fileserver
CN103152351A (en) * 2013-03-15 2013-06-12 深信服网络科技(深圳)有限公司 Network equipment and AD (Active Directory) domain single sign on method and system
CN103268456A (en) * 2013-05-31 2013-08-28 杭州华三通信技术有限公司 Method and device for file safety control
CN103310165A (en) * 2013-06-21 2013-09-18 宁夏新航信息科技有限公司 Method for achieving document encryption with computer software
CN103605705A (en) * 2013-11-11 2014-02-26 国家电网公司 SCD (substation configuration description) file management system
CN104050395A (en) * 2013-03-15 2014-09-17 柯尼卡美能达美国研究所有限公司 Method for controlling access to electronic documents by means of a user centric DRM system
CN104618384A (en) * 2015-02-13 2015-05-13 成都中科合迅科技有限公司 Single authentication method based on AD (Access Device) server
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN107786518A (en) * 2016-08-30 2018-03-09 福建福昕软件开发股份有限公司 A kind of method of dynamic configuration document access authority

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655502A (en) * 2004-02-11 2005-08-17 联想(北京)有限公司 Method for guaranteeing the safety of electronic documents
CN1822014A (en) * 2006-03-23 2006-08-23 沈明峰 Protecting method for security files under cooperative working environment
CN101212457A (en) * 2006-12-27 2008-07-02 鸿富锦精密工业(深圳)有限公司 Webpage privilege control system and method
CN102667792A (en) * 2009-11-20 2012-09-12 宝马股份公司 Method and device for accessing files of a secure fileserver
CN101986598A (en) * 2010-10-27 2011-03-16 北京星网锐捷网络技术有限公司 Authentication method, server and system
CN102325029A (en) * 2011-09-20 2012-01-18 深圳市深信服电子科技有限公司 AD (Active Directory) domain single sign on method and server
CN103152351A (en) * 2013-03-15 2013-06-12 深信服网络科技(深圳)有限公司 Network equipment and AD (Active Directory) domain single sign on method and system
CN104050395A (en) * 2013-03-15 2014-09-17 柯尼卡美能达美国研究所有限公司 Method for controlling access to electronic documents by means of a user centric DRM system
CN103268456A (en) * 2013-05-31 2013-08-28 杭州华三通信技术有限公司 Method and device for file safety control
CN103310165A (en) * 2013-06-21 2013-09-18 宁夏新航信息科技有限公司 Method for achieving document encryption with computer software
CN103605705A (en) * 2013-11-11 2014-02-26 国家电网公司 SCD (substation configuration description) file management system
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN104618384A (en) * 2015-02-13 2015-05-13 成都中科合迅科技有限公司 Single authentication method based on AD (Access Device) server
CN107786518A (en) * 2016-08-30 2018-03-09 福建福昕软件开发股份有限公司 A kind of method of dynamic configuration document access authority

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周淼: "浅析基于微软活动目录技术的IT基础架构优化", 《湖南医科大学学报( 社会科学版)》 *
杨雪婵: "使用AD_RMS保护文档安全", 《网络安全和信息化》 *

Similar Documents

Publication Publication Date Title
JP7330596B2 (en) BLOCKCHAIN DATA ARCHIVING METHOD, BLOCKCHAIN DATA ARCHIVING DEVICE, ELECTRONIC DEVICE, AND COMPUTER PROGRAM
CN105453102B (en) The system and method for the private cipher key leaked for identification
WO2010138910A1 (en) Secure collaborative environment
CN109600366A (en) The method and device of protection user data privacy based on block chain
CN105915338A (en) Key generation method and key generation system
CN109981665A (en) Resource provider method and device, resource access method and device and system
US9836585B2 (en) User centric method and adaptor for digital rights management system
CN108306972A (en) A kind of cloud cryptographic service method, platform, system and computer readable storage medium
CN104348838B (en) A kind of document file management system and method
US20120233712A1 (en) Method and Device for Accessing Control Data According to Provided Permission Information
Talib et al. Towards new data access control technique based on multi agent system architecture for cloud computing
CN109784080A (en) Method for managing security, system and readable storage medium storing program for executing based on GIS data
CN110022207A (en) Key management and the method and apparatus for handling data
CN105049209B (en) Dynamic password formation method and device
JP2003271782A (en) Personal information management system
CN109981280A (en) A kind of electronic data evidence obtaining method and system
CN106295267B (en) It is a kind of access electronic equipment physical memory in private data method and apparatus
CN110321717A (en) A kind of file encrypting method and system
CN106575341A (en) Composite document access
Woodward Applications for multilevel secure operating systems
CN109873806A (en) Numerical control device register method and system based on two dimensional code
Garg et al. Investigation of Cloud Computing Security Issue.
Hood et al. IT Security Plan for Flight Simulation Program
Staemmler et al. Establishing end-to-end security in a nationwide network for telecooperation
CN107332840A (en) Authority intelligent management system and its method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011