CN110321717A - A kind of file encrypting method and system - Google Patents
A kind of file encrypting method and system Download PDFInfo
- Publication number
- CN110321717A CN110321717A CN201810267667.6A CN201810267667A CN110321717A CN 110321717 A CN110321717 A CN 110321717A CN 201810267667 A CN201810267667 A CN 201810267667A CN 110321717 A CN110321717 A CN 110321717A
- Authority
- CN
- China
- Prior art keywords
- document
- access authority
- domain
- inventory
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000013475 authorization Methods 0.000 claims abstract description 41
- 238000012795 verification Methods 0.000 claims description 12
- 238000012986 modification Methods 0.000 abstract description 10
- 230000004048 modification Effects 0.000 abstract description 10
- 238000007726 management method Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000007639 printing Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 241000406668 Loxodonta cyclotis Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of file encrypting method and systems.This document encryption method includes: the access authority inventory by AD configuration of territory document;When user downloads document, according to the access authority inventory, the document is encrypted;When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user;It can be realized as a result, by the domain AD and Classification Management carried out to permission group and group user, so that personnel's addition and the configuration of new permission become flexibly simple;In addition, eliminating the work of document re-encrypted, it is only necessary to there is the adjustment domain AD end group structure that the permission modification to document has been issued can be realized.
Description
Technical field
The present invention relates to field of information security technology more particularly to a kind of file encrypting method and systems.
Background technique
In some companies, the revision of some technical documentations is related to multiple department's circulation examination & approval, further relates to using link
The production department of various regions factory, it is huge that high challenge is proposed to the security work of document using crowd.
For above situation, it is common practice to which quoting the RMS document authority management technology of Microsoft, (technology file is equal
For EXCEL, WORD, PDF document), by document shell adding and configuring the access authority information of specific user to control user couple
Visual, the modification, printing operation of document content rank, achieve the purpose that limitation is illegally spread.
But when using the above method, user and permissions list are attached on document, add new user or change is existing
It is had to when having user right by document re-encrypted;When needing to carry out the adjustment of extensive permission, extensive document recycling weight
It newly encrypts extremely inconvenient.
Summary of the invention
The purpose of the present invention is to provide a kind of file encrypting method and systems.
On the one hand, the embodiment of the present invention provides a kind of file encrypting method, comprising the following steps:
Pass through the access authority inventory of AD configuration of territory document;
When user downloads document, according to the access authority inventory, the document is encrypted;
When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user.
In file encrypting method provided by the invention, pass through the step of the access authority inventory of AD configuration of territory document
Include:
Administrative staff's load right administration page selects document to be configured, adds personnel's inventory and corresponding access
Permission;
The domain AD permission group is generated in AD domain server according to the access authority;
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory,
The access authority inventory include the domain AD permission group group name and corresponding group of user.
In file encrypting method provided by the invention, in administrative staff's load right administration page, select to be configured
After the step of document, addition personnel's inventory and corresponding access authority, further includes:
The connection domain AD verifies personnel's inventory of addition, after verification passes through, corresponding personnel is added to corresponding
The domain AD permission group.
It is right according to the access authority inventory when user downloads document in file encrypting method provided by the invention
The step that the document is encrypted includes:
When user downloads document, file server is to RMS server application authorization code;
RMS server generates the authorization code according to the access authority inventory;
File server encrypts the document according to the authorization code.
In file encrypting method provided by the invention, RMS server is awarded according to access authority inventory generation
Before the step of weighted code further include:
The access authority inventory is mapped to the operating right of RMS server by AD domain server.
Correspondingly, the present invention also provides a kind of file encryption systems, comprising:
Permission configuration module, for passing through the access authority inventory of AD configuration of territory document;
Encrypting module is connected to the permission configuration module, is used for when user downloads document, according to the access authority
Inventory encrypts the document;
Display module is verified, the encrypting module is connected to, for carrying out permission school when user opens the document
It tests, shows document content corresponding with the access authority of user.
In file encryption system provided by the invention, the permission configuration module includes:
Adding unit selects document to be configured for administrative staff, adds personnel's inventory and corresponding access authority;
The domain AD permission group generation unit, is connected to the adding unit, for being serviced according to the access authority in the domain AD
Device generates the domain AD permission group;
Access authority inventory generation unit is connected to the adding unit and the domain the AD permission group generation unit, is used for
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the access
Right list include the domain AD permission group group name and corresponding group of user.
In file encryption system provided by the invention, the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, and for verifying to personnel's inventory of addition, verification passes through
Afterwards, corresponding personnel are added to the corresponding domain AD permission group.
In file encryption system provided by the invention, the encrypting module includes:
Authorization code application unit, for when user downloads document, file server to be to RMS server application authorization code;
Authorization code generation unit is connected to the authorization code application unit, for RMS server according to the access authority
Inventory generates the authorization code;
Encryption unit is connected to the authorization code generation unit, for file server according to the authorization code, to described
Document is encrypted.
In file encryption system provided by the invention, the encrypting module further include:
The access authority inventory is mapped to the operating right of RMS server for AD domain server by map unit.
The implementation of the embodiments of the present invention has the following beneficial effects: in the present invention, passing through the access right of AD configuration of territory document
Limit inventory;When user downloads document, according to the access authority inventory, the document is encrypted;When user opens institute
When stating document, authorization check is carried out, shows document content corresponding with the access authority of user;It as a result, can be real by the domain AD
Classification Management now is carried out to permission group and group user, so that personnel's addition and the configuration of new permission become flexibly simple;In addition, exempting from
The work of document re-encrypted is gone, it is only necessary to there is the adjustment domain AD end group structure can be realized and become to the permission for having issued document
More.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 show application scenarios schematic diagram of the invention;
Fig. 2 show the flow chart of the file encrypting method of one embodiment of the invention offer;
The flow chart of step S1 shown in Fig. 2 shown in Fig. 3;
The flow chart of step S2 shown in Fig. 2 shown in Fig. 4;
Fig. 5 show the schematic diagram of the file encryption system of one embodiment of the invention offer;
The schematic diagram of permission configuration module shown in fig. 5 shown in Fig. 6;
The schematic diagram of encrypting module shown in fig. 5 shown in Fig. 7.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 show application scenarios schematic diagram of the invention;Fig. 2 show the file encryption of one embodiment of the invention offer
The flow chart of method.As depicted in figs. 1 and 2, file encrypting method provided by the invention, comprising the following steps:
Step S1: pass through the access authority inventory of AD configuration of territory document;
AD (Active Directory, Active Directory) is towards Windows Standard Server, Windows
The directory service of Enterprise Server and Windows Datacenter Server.The domain AD stores related network pair
The information of elephant, and administrator and user is allowed easily can to search and use these information.The domain AD has used a kind of structuring
Data storage method, and logical laminated tissue is carried out to directory information in this, as basis.Therefore, in the present invention
In, Classification Management is carried out to permission group and group user by the domain AD, so that personnel's addition and the configuration of new permission become flexible letter
It is single.Specifically, as shown in figure 3, step S1 includes following sub-step:
Step S11: administrative staff's load right administration page selects document to be configured, adds personnel's inventory and right
The access authority answered;
Step S12: the domain AD permission group is generated in AD domain server according to the access authority;
Step S13: according to access authority, corresponding personnel is added to the corresponding domain AD permission group, generate the access
Right list, the access authority inventory include the domain AD permission group group name and corresponding group of user.
In the present invention, as shown in Figure 1, Web end system provides rights management interface for administrative staff, pass through permission pipe
Interface is managed, administrative staff can choose its document for wanting configuration, after having selected document, then adds for the document and may have access to people
Inventory permission corresponding with its of member, for example, Zhang San, reads;Li Si reads, printing, duplication.After configuring access authority,
The domain AD permission group is generated in AD domain server according to the access authority of Web end system, for example, printing group, modification group, read-only group.
Then, corresponding personnel are added to corresponding permission group, access authority inventory are generated, for example, printing group: Li Si, king five;Only
Reading group, Zhang San.In this way, permission modification can be realized by the permission group in the domain web interface direct configuration management AD, user of service is not
Need to have the relevant technological know-how in the domain AD, improve the efficiency of rights document permission modification.
Further, since the domain AD contains specific personnel, therefore, it is also desirable to the personnel of rights management page addition
Whether inventory carries out authorization check, judge the personnel in the domain AD.It specifically, after step s 11, further include following step
It is rapid:
The connection domain AD verifies personnel's inventory of addition, after verification passes through, corresponding personnel is added to corresponding
The domain AD permission group.
Step S2: when user downloads document, according to the access authority inventory, the document is encrypted;
RMS (Rights Management Services, rights management service) is a kind of information protective technology, it with open
Cooperated with the application program of RMS to help to protect digital information to avoid unwarranted use -- either online or off line,
In firewall or outside firewall.RMS can help tissue to create reliable information protection solution.Made by lasting
Accompanied always with information the information protection of (no matter information arrival where) with strategy offer, RMS has expanded the security strategy of tissue.
In the present invention, as shown in Figure 1, user is when downloading document, file server can be by RMS server to document
It is encrypted, the access authority inventory in the domain AD is generated into a LICENCE and is attached on document simultaneously shell adding.Specifically, such as
Shown in Fig. 4, step S2 includes following sub-step:
Step S21: when user downloads document, file server is to RMS server application authorization code;
The access authority inventory is mapped to the operating right of RMS server by step S22:AD domain server;
Step S23:RMS server generates the authorization code according to the access authority inventory;
Step S24: file server encrypts the document according to the authorization code.
File server carries out being encrypted as the prior art according to authorization code, and details are not described herein.In this way, needing to change power
In limited time, it is only necessary to which permission modification to document has been issued can be realized in the access authority inventory for adjusting the domain AD, eliminates document weight
The work newly encrypted.Background program can read automatically the file under specified directory according to configuration the page generate parameter to document into
Row encryption, avoids manual intervention.
Step S3: when user opens the document, authorization check is carried out, shows text corresponding with the access authority of user
Shelves content.
As shown in Figure 1, local log-on user is carried out school to RMS server by the computer of user when user opens document
It tests, meeting return information tells which permission group local computing office component active user is in after verification passes through, which possesses
Permission, office component can load document content and show.
In the present invention, pass through the access authority inventory of AD configuration of territory document;When user downloads document, according to the visit
It asks right list, the document is encrypted;When user opens the document, authorization check is carried out, display is with user's
The corresponding document content of access authority;It can be realized as a result, by the domain AD and Classification Management carried out to permission group and group user, so that
Personnel's addition and the configuration of new permission become flexibly simple;In addition, eliminating the work of document re-encrypted, it is only necessary to there is adjustment
The permission modification to document has been issued can be realized in the domain AD end group structure.
It should be understood that in embodiments of the present invention, magnitude of the sequence numbers of the above procedures are not meant to the elder generation of execution sequence
Afterwards, the execution sequence of each process should be determined by its function and internal logic, the implementation process structure without coping with the embodiment of the present invention
At any restriction.
Fig. 5 show the schematic diagram of the file encryption system of one embodiment of the invention offer.As shown in figure 5, the present invention mentions
The file encryption system of confession includes:
Permission configuration module 410, for passing through the access authority inventory of AD configuration of territory document;
In the present invention, Classification Management is carried out to permission group and group user by the domain AD, so that personnel's addition and new permission
Configuration become flexibly simple.Specifically, as shown in fig. 6, the permission configuration module includes:
Adding unit 412 selects document to be configured for administrative staff, adds personnel's inventory and corresponding access right
Limit;
The domain AD permission group generation unit 414, is connected to the adding unit, for being taken according to the access authority in the domain AD
Business device generates the domain AD permission group;
Access authority inventory generation unit 416 is connected to the adding unit and the domain the AD permission group generation unit, uses
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the visit
Ask right list include the domain AD permission group group name and corresponding group of user.
Permission modification can be realized by the permission group in the domain permission configuration module direct configuration management AD, user of service is not required to
Have the relevant technological know-how in the domain AD, improves the efficiency of rights document permission modification.
Further, since the domain AD contains specific personnel, therefore, it is also desirable to the personnel of rights management page addition
Whether inventory carries out authorization check, judge the personnel in the domain AD.Specifically, the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, and for verifying to personnel's inventory of addition, verification passes through
Afterwards, corresponding personnel are added to the corresponding domain AD permission group.
Encrypting module 420 is connected to the permission configuration module, is used for when user downloads document, according to the access
Right list encrypts the document;
In the present invention, when downloading document, file server can carry out at encryption document by RMS server user
The access authority inventory in the domain AD is generated a LICENCE and is attached on document simultaneously shell adding by reason.Specifically, as shown in fig. 7, institute
Stating encrypting module includes:
Authorization code application unit 422, for when user downloads document, file server to be to RMS server application authorization
Code;
Authorization code generation unit 424 is connected to the authorization code application unit, for RMS server according to the access
Right list generates the authorization code;
Encryption unit 426 is connected to the authorization code generation unit, right for file server according to the authorization code
The document is encrypted.
The encrypting module further include: the access authority inventory is mapped to RMS for AD domain server by map unit
The operating right of server.
In this way, when needing to change permission, it is only necessary to adjust the domain AD access authority inventory can be realized to descended dispatch
The permission modification of shelves, eliminates the work of document re-encrypted.Background program can read automatically the file under specified directory according to
Document is encrypted in the parameter that the configuration page generates, and avoids manual intervention.
Display module 430 is verified, the encrypting module is connected to, for carrying out permission when user opens the document
Verification shows document content corresponding with the access authority of user.
When user opens document, the computer of user verifies local log-on user to RMS server, and verification passes through
After can return information tell which permission group local computing office component active user is in, possess which permission, office
Component can load document content and show.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Above disclosed is only a preferred embodiment of the present invention, cannot limit the power of the present invention with this certainly
Sharp range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and weighs according to the present invention
Benefit requires made equivalent variations, still belongs to the scope covered by the invention.
Claims (10)
1. a kind of file encrypting method, which comprises the following steps:
Pass through the access authority inventory of AD configuration of territory document;
When user downloads document, according to the access authority inventory, the document is encrypted;
When user opens the document, authorization check is carried out, shows document content corresponding with the access authority of user.
2. file encrypting method according to claim 1, which is characterized in that the access authority by AD configuration of territory document is clear
Single step includes:
Administrative staff's load right administration page selects document to be configured, adds personnel's inventory and corresponding access authority;
The domain AD permission group is generated in AD domain server according to the access authority;
According to access authority, corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, it is described
Access authority inventory include the domain AD permission group group name and corresponding group of user.
3. file encrypting method according to claim 2, which is characterized in that in administrative staff's load right administration page,
Document to be configured is selected, after the step for adding personnel's inventory and corresponding access authority, further includes:
The connection domain AD verifies personnel's inventory of addition, and after verification passes through, corresponding personnel are added to the corresponding domain AD
Permission group.
4. file encrypting method according to claim 2, which is characterized in that when user downloads document, according to the visit
Ask right list, the step encrypted to the document includes:
When user downloads document, file server is to RMS server application authorization code;
RMS server generates the authorization code according to the access authority inventory;
File server encrypts the document according to the authorization code.
5. file encrypting method according to claim 4, which is characterized in that RMS server is clear according to the access authority
Before single step for generating the authorization code further include:
The access authority inventory is mapped to the operating right of RMS server by AD domain server.
6. a kind of file encryption system characterized by comprising
Permission configuration module, for passing through the access authority inventory of AD configuration of territory document;
Encrypting module is connected to the permission configuration module, is used for when user downloads document, clear according to the access authority
It is single, the document is encrypted;
Display module is verified, the encrypting module is connected to, for carrying out authorization check when user opens the document, is shown
Show document content corresponding with the access authority of user.
7. file encryption system according to claim 6, which is characterized in that the permission configuration module includes:
Adding unit selects document to be configured for administrative staff, adds personnel's inventory and corresponding access authority;
The domain AD permission group generation unit, is connected to the adding unit, for raw in AD domain server according to the access authority
At the domain AD permission group;
Access authority inventory generation unit is connected to the adding unit and the domain the AD permission group generation unit, is used for basis
Corresponding personnel are added to the corresponding domain AD permission group, generate the access authority inventory, the access authority by access authority
Inventory include the domain AD permission group group name and corresponding group of user.
8. file encryption system according to claim 7, which is characterized in that the permission configuration module further include:
The domain AD verification unit, is connected to the adding unit, for being verified to personnel's inventory of addition, after verification passes through,
Corresponding personnel are added to the corresponding domain AD permission group.
9. file encryption system according to claim 7, which is characterized in that the encrypting module includes:
Authorization code application unit, for when user downloads document, file server to be to RMS server application authorization code;
Authorization code generation unit is connected to the authorization code application unit, for RMS server according to the access authority inventory
Generate the authorization code;
Encryption unit is connected to the authorization code generation unit, for file server according to the authorization code, to the document
It is encrypted.
10. file encryption system according to claim 9, which is characterized in that the encrypting module further include:
The access authority inventory is mapped to the operating right of RMS server for AD domain server by map unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810267667.6A CN110321717A (en) | 2018-03-28 | 2018-03-28 | A kind of file encrypting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810267667.6A CN110321717A (en) | 2018-03-28 | 2018-03-28 | A kind of file encrypting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110321717A true CN110321717A (en) | 2019-10-11 |
Family
ID=68110382
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810267667.6A Pending CN110321717A (en) | 2018-03-28 | 2018-03-28 | A kind of file encrypting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110321717A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1655502A (en) * | 2004-02-11 | 2005-08-17 | 联想(北京)有限公司 | Method for guaranteeing the safety of electronic documents |
CN1822014A (en) * | 2006-03-23 | 2006-08-23 | 沈明峰 | Protecting method for security files under cooperative working environment |
CN101212457A (en) * | 2006-12-27 | 2008-07-02 | 鸿富锦精密工业(深圳)有限公司 | Webpage privilege control system and method |
CN101986598A (en) * | 2010-10-27 | 2011-03-16 | 北京星网锐捷网络技术有限公司 | Authentication method, server and system |
CN102325029A (en) * | 2011-09-20 | 2012-01-18 | 深圳市深信服电子科技有限公司 | AD (Active Directory) domain single sign on method and server |
CN102667792A (en) * | 2009-11-20 | 2012-09-12 | 宝马股份公司 | Method and device for accessing files of a secure fileserver |
CN103152351A (en) * | 2013-03-15 | 2013-06-12 | 深信服网络科技(深圳)有限公司 | Network equipment and AD (Active Directory) domain single sign on method and system |
CN103268456A (en) * | 2013-05-31 | 2013-08-28 | 杭州华三通信技术有限公司 | Method and device for file safety control |
CN103310165A (en) * | 2013-06-21 | 2013-09-18 | 宁夏新航信息科技有限公司 | Method for achieving document encryption with computer software |
CN103605705A (en) * | 2013-11-11 | 2014-02-26 | 国家电网公司 | SCD (substation configuration description) file management system |
CN104050395A (en) * | 2013-03-15 | 2014-09-17 | 柯尼卡美能达美国研究所有限公司 | Method for controlling access to electronic documents by means of a user centric DRM system |
CN104618384A (en) * | 2015-02-13 | 2015-05-13 | 成都中科合迅科技有限公司 | Single authentication method based on AD (Access Device) server |
CN105704094A (en) * | 2014-11-25 | 2016-06-22 | 杭州华三通信技术有限公司 | Application access authority control method and device |
CN107786518A (en) * | 2016-08-30 | 2018-03-09 | 福建福昕软件开发股份有限公司 | A kind of method of dynamic configuration document access authority |
-
2018
- 2018-03-28 CN CN201810267667.6A patent/CN110321717A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1655502A (en) * | 2004-02-11 | 2005-08-17 | 联想(北京)有限公司 | Method for guaranteeing the safety of electronic documents |
CN1822014A (en) * | 2006-03-23 | 2006-08-23 | 沈明峰 | Protecting method for security files under cooperative working environment |
CN101212457A (en) * | 2006-12-27 | 2008-07-02 | 鸿富锦精密工业(深圳)有限公司 | Webpage privilege control system and method |
CN102667792A (en) * | 2009-11-20 | 2012-09-12 | 宝马股份公司 | Method and device for accessing files of a secure fileserver |
CN101986598A (en) * | 2010-10-27 | 2011-03-16 | 北京星网锐捷网络技术有限公司 | Authentication method, server and system |
CN102325029A (en) * | 2011-09-20 | 2012-01-18 | 深圳市深信服电子科技有限公司 | AD (Active Directory) domain single sign on method and server |
CN103152351A (en) * | 2013-03-15 | 2013-06-12 | 深信服网络科技(深圳)有限公司 | Network equipment and AD (Active Directory) domain single sign on method and system |
CN104050395A (en) * | 2013-03-15 | 2014-09-17 | 柯尼卡美能达美国研究所有限公司 | Method for controlling access to electronic documents by means of a user centric DRM system |
CN103268456A (en) * | 2013-05-31 | 2013-08-28 | 杭州华三通信技术有限公司 | Method and device for file safety control |
CN103310165A (en) * | 2013-06-21 | 2013-09-18 | 宁夏新航信息科技有限公司 | Method for achieving document encryption with computer software |
CN103605705A (en) * | 2013-11-11 | 2014-02-26 | 国家电网公司 | SCD (substation configuration description) file management system |
CN105704094A (en) * | 2014-11-25 | 2016-06-22 | 杭州华三通信技术有限公司 | Application access authority control method and device |
CN104618384A (en) * | 2015-02-13 | 2015-05-13 | 成都中科合迅科技有限公司 | Single authentication method based on AD (Access Device) server |
CN107786518A (en) * | 2016-08-30 | 2018-03-09 | 福建福昕软件开发股份有限公司 | A kind of method of dynamic configuration document access authority |
Non-Patent Citations (2)
Title |
---|
周淼: "浅析基于微软活动目录技术的IT基础架构优化", 《湖南医科大学学报( 社会科学版)》 * |
杨雪婵: "使用AD_RMS保护文档安全", 《网络安全和信息化》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7330596B2 (en) | BLOCKCHAIN DATA ARCHIVING METHOD, BLOCKCHAIN DATA ARCHIVING DEVICE, ELECTRONIC DEVICE, AND COMPUTER PROGRAM | |
CN105453102B (en) | The system and method for the private cipher key leaked for identification | |
WO2010138910A1 (en) | Secure collaborative environment | |
CN109600366A (en) | The method and device of protection user data privacy based on block chain | |
CN105915338A (en) | Key generation method and key generation system | |
CN109981665A (en) | Resource provider method and device, resource access method and device and system | |
US9836585B2 (en) | User centric method and adaptor for digital rights management system | |
CN108306972A (en) | A kind of cloud cryptographic service method, platform, system and computer readable storage medium | |
CN104348838B (en) | A kind of document file management system and method | |
US20120233712A1 (en) | Method and Device for Accessing Control Data According to Provided Permission Information | |
Talib et al. | Towards new data access control technique based on multi agent system architecture for cloud computing | |
CN109784080A (en) | Method for managing security, system and readable storage medium storing program for executing based on GIS data | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN105049209B (en) | Dynamic password formation method and device | |
JP2003271782A (en) | Personal information management system | |
CN109981280A (en) | A kind of electronic data evidence obtaining method and system | |
CN106295267B (en) | It is a kind of access electronic equipment physical memory in private data method and apparatus | |
CN110321717A (en) | A kind of file encrypting method and system | |
CN106575341A (en) | Composite document access | |
Woodward | Applications for multilevel secure operating systems | |
CN109873806A (en) | Numerical control device register method and system based on two dimensional code | |
Garg et al. | Investigation of Cloud Computing Security Issue. | |
Hood et al. | IT Security Plan for Flight Simulation Program | |
Staemmler et al. | Establishing end-to-end security in a nationwide network for telecooperation | |
CN107332840A (en) | Authority intelligent management system and its method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |