CN100447701C - Applied software file storing method - Google Patents
Applied software file storing method Download PDFInfo
- Publication number
- CN100447701C CN100447701C CNB2005100659823A CN200510065982A CN100447701C CN 100447701 C CN100447701 C CN 100447701C CN B2005100659823 A CNB2005100659823 A CN B2005100659823A CN 200510065982 A CN200510065982 A CN 200510065982A CN 100447701 C CN100447701 C CN 100447701C
- Authority
- CN
- China
- Prior art keywords
- application software
- archives
- flow process
- real time
- storing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to an archive storage method of application software. The method is characterized in that a dynamic monitoring program is embedded into the application software, archives used by the application software are encrypted and coded; the dynamic monitoring program is called when the application software is executed, and the specified information of the application software is specifically obtained through an interface; if the specified information is determined to be obtained, dynamic register is completed, a dynamic monitoring state is available, and the archives opened by the application software are decrypted; before the archives are closed, the archives are newly encrypted, and the archives are limited to be replicated, pasted, printed, etc. so as to ensure the confidentiality of the archives.
Description
Technical field
The present invention relates to a kind of file storing method of application software, refer to especially a kind ofly make the built-in real-time monitoring of application software of specific purpose exploitation save mechanism from damage, restriction specific I/O action is with the method for guaranteeing that its link archives are not leaked and are stolen.
Background technology
Computing machine is undoubtedly the management tool and the data storage medium of modern's the best, because various application software at various different purposes constantly are developed appearance, for example Human Resources Management System, financial management system, accounting system, inventory management system or the like, numerous too numerous to enumerate, and the user is provided convenient and practical management tool.No matter be the user's interface or the application software of computing machine, be handled easily and use, all improve the affinity of interface, to reduce user's operating barrier as far as possible as far as possible.And that aforesaid human oriented design no doubt is determined is kindhearted, but is similarly the corporate espionage or the computing machine hacker steals/provide when destroying data excellent shortcut.For guaranteeing the safety of archives material, be encrypted as one of necessary means, the Encryption Tool that just general computing machine can provide, with archives is that object is encrypted with password one by one, the shortcoming of this kind encryption method is very remarkable, and promptly quantity is too huge, carries out too time and effort consuming, and when the quantity of encrypted file was huge, Password Management was again another problem.
So-called coded lock is in the streets no doubt arranged again, but its locking to as if computing machine, the result of generation is the standard-sized sheet full lock, its inconvenience is well imagined with the low of practical value.In brief, computing machine is a management tool easily, but the archives of on computers application program, software and storage thereof are installed, and is not that each all needs to encrypt, therefore with the execution instrument as lock object from belonging to not intelligence.From another perspective, carry out monitoring locking, type archives such as occurrences in human life, finance, accounting for example, the preservation measures of valid rate at the archives of particular type.As previously mentioned, with archives be unit as cryptographic object, quite lack efficient, and both with file type as the foundation of whether encrypting, then with the application program of the type profile associated or system software as cryptographic object, will be the high effective measures of efficient.
Summary of the invention
The objective of the invention is to overcome the deficiencies in the prior art and defective, provide a kind of application software to monitor in real time at specific file type association, and the execution of restricting specific function, use the method for effectively saving the particular type archives from damage, i.e. the file storing method of application software.
For reaching above-mentioned purpose, the invention provides a kind of file storing method of application software, its major technique means of taking are to embed one to monitor flow process in real time in application software, and the archives of this application software association are encrypted, and wherein monitor flow performing the following step in real time:
Receive application software and carry out the call forwarding message that the back produces;
The customizing messages of acquisition application software;
The customizing messages that utilization obtains is finished real-time registration, temporary this materials for registration, and enter real-time monitor state;
When application software is opened the archives of association type, to this file opening deciphering;
The restriction user to duplicating of carrying out of archives, stick, actions such as unloading, printing;
When these archives are closed, give again after encrypting earlier and closing;
When application software finishes, delete real-time materials for registration.
Utilize above-mentioned technology, the application software that can carry out the particular type archives is a monitored object, in case application software is performed, its new generation or related archives promptly enter the real-time monitor state that specific action is carried out in restriction, because the action that monitored that archives duplicate such as in using, stick, unloading, printing etc. may be taken data away all is lockable, so can guarantee the security of data.For the exploitation dealer of application software, also promote its commercial value again because of the embedding of saving mechanism from damage.
Description of drawings
Fig. 1 is a process flow diagram of the present invention.
Embodiment
A relevant preferred embodiment of the present invention, know clearly as described below: the present invention mainly is the object of saving from damage as monitoring with application software, the new archive that its monitoring range extends to the old archives of this application software association and in use produces, because all files that application software produces under the monitor state all can be encrypted before closing, therefore, when application software is carried out once more, and when opening related old archives, can give unlatching again to old file declassification earlier, thus, not only reach the purpose that all files of particular type is encrypted, because of encrypting one by one to all files, convenience with height, and also will give automatic deciphering during with the application software file opening monitored, so there is not the problem of Password Management.
I/O such as the present invention is main again saves that archives itself duplicate, stick as being to limit from damage, unloading and printing move, do aforementioned preservation measures and the data that prevents leaks in case of necessity when the archives material of application software association, can utilize the present invention to carry out the aforesaid conduct of saving from damage.Its concrete technology contents is detailed as described below:
The present invention is embedded in one in application software to monitor flow process in real time, this real-time monitoring flow process will be to using the archives that produced in the software execute process, encrypt, the opportunity of its encryption is before archives are closed, then after archives are opened, be detailed later as for adoptable encryption/decryption technique the opportunity of deciphering.And aforementioned real-time monitoring flow process is in the operation after application software is carried out, limits that this application software opens that any archives execution is duplicated, sticked, actions such as unloading and printing, is illegally stolen to avoid data to follow these pipelines.Real-time concrete steps of monitoring flow process see also shown in Figure 1ly, comprise step:
Receive application software and carry out the call forwarding message (101) that the back produces: because the monitoring flow process directly is embedded in the application software in real time, will set up a linking relationship between itself and application software, and when application software is performed, will call out immediately and start real-time monitoring flow process.
The customizing messages (102) of acquisition application software: after this is monitored flow process in real time and is activated, will be (for example: Windows 32bits ApplicationProgramming Interface by the built-in interface of computer interface system, hereinafter to be referred as API) capture the customizing messages of this application software, this customizing messages is specified by real-time monitoring flow process, time of producing of archives size, data type, shelves name or this archives or the like for example is with as follow-up dynamic registration action.
The customizing messages that utilization obtains is finished real-time registration (103): monitor flow process will be used to registration by the information of API acquisition usefulness in real time, after obtaining the customizing messages of appointment by API, promptly finish the dynamic registration action simultaneously, and the customizing messages of registration usefulness will be by temporary, subsequently and enter real-time monitor state (104);
Under real-time monitor state, when application software is opened the archives of association type, promptly earlier this file opening is decrypted (105,106), a kind of feasible encryption and decryption technology is DES III, also can link the ciphering and deciphering device (for example hardware lock) or other the independently developed algorithm that are provided with peripheral form in addition.
And during application software is opened and used these archives, the monitoring flow process will limit the user to duplicating that archives are carried out in real time, stick, unloading, print and wait action (107), these limit movements mainly cooperate the built-in Installable File System function of Windows, this InstallableFile System was the generation for operating system control archives originally, open, read, action such as write, therefore real-time monitoring flow process of the present invention its tackle its signal and to the generation of specific archives, open, read, action such as write and monitor, and restriction is duplicated, stick, unloading, print the execution that waits action.And when the archives in the aforementioned use are closed (108), close (109) with giving again after encrypting earlier.
When application software finishes to carry out (110), promptly delete aforesaid materials for registration (111), when carrying out once more next time, re-register again.
Can understand the concrete technology contents of a preferred embodiment of the present invention by above-mentioned explanation, can the exploitation dealer that flow process offers application software will be monitored in real time with these data security methods, to be somebody's turn to do in real time for the dealer, the monitoring flow process is embedded in its application software of developing based on special-purpose, can give application software one data of its exploitation and save mechanism from damage, thereby can promote its practical value and surcharge.When this real-time monitoring flow process has the user of plural number, can further built-in ID identification mechanism, its give each group in real time monitoring flow process have different ID respectively, when starting application software, will carry out ID earlier and confirm action, avoid different users's the mechanism of saving from damage can be general.
From the above; the data security method of actions such as the present invention mainly provides a kind of and protects the particular type archives material to monitor in real time to limit its execution to duplicate, sticks, unloading, printing; its both non-locking whole computing machine; also non-ly one by one each archives is encrypted; but carry out the grouping monitoring at the particular type archives of application software association; it not only provides guarantees that confidential data is not leaked, and more takes into account the affinity of operation interface.
Claims (8)
1. the file storing method of an application software is characterized in that, embeds one and monitor flow process in real time in application software, and the archives of using software context are encrypted, and wherein monitors flow performing the following step in real time:
Receive application software and carry out the call forwarding message that the back produces;
The customizing messages of acquisition application software;
The customizing messages that utilization obtains is finished real-time registration, and enters real-time monitor state;
When application software is opened the archives of association type, to this file opening deciphering;
The specific action that the restriction user carries out archives;
When these archives are closed, encrypt afterwards earlier and close.
2. the file storing method of application software according to claim 1 wherein, after this is monitored flow process in real time and obtains the customizing messages of application software and finish registration, will be kept in this materials for registration, when application software finishes, promptly delete real-time materials for registration.
3. as the file storing method of application software as described in the claim 2, wherein, this customizing messages comprises: the time that archives size, data type, shelves name or this archives produce.
4. the file storing method of application software according to claim 1, wherein, this monitors flow process in real time will link an encryption and decryption flow process, and so that archives are decrypted and encrypt, this encryption and decryption flow process is DES III or other algorithm.
5. the file storing method of application software according to claim 1, wherein, this monitors the ciphering and deciphering device that the flow process link is provided with peripheral form in real time.
6. as the file storing method of application software as described in the claim 3, wherein, this monitors flow process in real time is by the customizing messages of the built-in Windows 32 bits ApplicationProgramming Interface of Windows with the acquisition application software.
7. the file storing method of application software according to claim 1, wherein, this is monitored flow process restriction user under monitor state in real time in real time archives is duplicated, sticks, changes the action of pasting or printing.
8. as the file storing method of application software as described in claim 1 or 7, wherein, this monitors flow process in real time is by the built-in Installable File System function restriction user of Windows archives to be carried out specific action.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100659823A CN100447701C (en) | 2005-04-19 | 2005-04-19 | Applied software file storing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100659823A CN100447701C (en) | 2005-04-19 | 2005-04-19 | Applied software file storing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1854962A CN1854962A (en) | 2006-11-01 |
CN100447701C true CN100447701C (en) | 2008-12-31 |
Family
ID=37195175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100659823A Expired - Fee Related CN100447701C (en) | 2005-04-19 | 2005-04-19 | Applied software file storing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100447701C (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000029737A (en) * | 1998-03-20 | 2000-01-28 | Texas Instr Inc <Ti> | Processor having real-time outer instruction insertion for debugging functions |
CN1302436A (en) * | 1999-04-30 | 2001-07-04 | 皇家菲利浦电子有限公司 | Registering copy protected material in check-out, check-in system |
JP2002258972A (en) * | 2001-02-28 | 2002-09-13 | Toshiba Corp | Illegal operation monitor device and its program |
-
2005
- 2005-04-19 CN CNB2005100659823A patent/CN100447701C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000029737A (en) * | 1998-03-20 | 2000-01-28 | Texas Instr Inc <Ti> | Processor having real-time outer instruction insertion for debugging functions |
CN1302436A (en) * | 1999-04-30 | 2001-07-04 | 皇家菲利浦电子有限公司 | Registering copy protected material in check-out, check-in system |
JP2002258972A (en) * | 2001-02-28 | 2002-09-13 | Toshiba Corp | Illegal operation monitor device and its program |
Also Published As
Publication number | Publication date |
---|---|
CN1854962A (en) | 2006-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101729550B (en) | Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof | |
CN101853363B (en) | File protection method and system | |
CN101430752B (en) | Sensitive data switching control module and method for computer and movable memory device | |
CN100592313C (en) | Electric document anti-disclosure system and its implementing method | |
CN101650693B (en) | Security control method for mobile hard disk and security mobile hard disk | |
CN100585608C (en) | Data file safe treatment method and system | |
CN102118512A (en) | Method and system for preventing application program of mobile phone from being cracked | |
CN103488954B (en) | A kind of file encryption system | |
EP2264639A2 (en) | Securing executable code integrity using auto-derivative key | |
JP5354001B2 (en) | Information processing apparatus, information processing system, and program | |
CN101719210A (en) | File use control method based on linux platform digital copyright management | |
CN112131595B (en) | Safe access method and device for SQLite database file | |
CN105303074A (en) | Method for protecting security of Web application | |
CN103218576A (en) | System and method for preventing electronic files from being copied | |
CN109376119B (en) | Method for creating disk image file encrypted snapshot, method for using disk image file encrypted snapshot and storage medium | |
JP4662138B2 (en) | Information leakage prevention method and system | |
JP2007188445A (en) | Information leakage prevention system and information leakage prevention method | |
CN100543762C (en) | Computer-aided design data encryption protecting method based on hardware environment | |
CN111539042B (en) | Safe operation method based on trusted storage of core data files | |
CN100447701C (en) | Applied software file storing method | |
CN101604296A (en) | Disk-data sector-level encryption method | |
CN101901320A (en) | Data leakage prevention method for electronic book reader | |
JP2012215973A (en) | Method for preventing information leakage | |
US12072988B2 (en) | Encryption converter | |
CN104200173A (en) | Electronic document trust and security control method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081231 Termination date: 20190419 |