CN101098224A - Method for encrypting/deciphering dynamically data file - Google Patents

Method for encrypting/deciphering dynamically data file Download PDF

Info

Publication number
CN101098224A
CN101098224A CNA2006100180298A CN200610018029A CN101098224A CN 101098224 A CN101098224 A CN 101098224A CN A2006100180298 A CNA2006100180298 A CN A2006100180298A CN 200610018029 A CN200610018029 A CN 200610018029A CN 101098224 A CN101098224 A CN 101098224A
Authority
CN
China
Prior art keywords
key
file
server end
document
sman
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100180298A
Other languages
Chinese (zh)
Other versions
CN101098224B (en
Inventor
尚卫民
张宏
崔光现
赵健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Nonferrous Metals Processing Technology Co Ltd
Original Assignee
China Nonferrous Metals Processing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Nonferrous Metals Processing Technology Co Ltd filed Critical China Nonferrous Metals Processing Technology Co Ltd
Priority to CN2006100180298A priority Critical patent/CN101098224B/en
Publication of CN101098224A publication Critical patent/CN101098224A/en
Application granted granted Critical
Publication of CN101098224B publication Critical patent/CN101098224B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for dynamically encrypting and decrypting data document, which comprises that in network condition, via C/S mode, manager centralized controls important documents of user computer, the system dynamically decrypts and encrypts clear text, the important documents can only be read or changed under the control of server in special network condition, which content is shown as cryptogram when off the network condition, when user copies clear text document from other places, the documents can not be changed when the system is sensitive, or else, in storage, the documents are converted into cryptogram type. The invention is based on software platform, correlated only with operation system, but not application programs, to dynamically encrypt and decrypt the data documents, therefore, the data documents can only work in private network condition, while the leaked document is in cryptogram type, to protect intellectual property.

Description

Method to data file dynamic encryption and decryption
Technical field:
The present invention relates to the technical field of LAN data file security, a kind of method to data file dynamic encryption and decryption.
Background technology:
Along with further developing of computer and network technology thereof, global information integral and national security contradiction are progressively outstanding.Show to selling that from public document, enterprise engineering drawing, S.O.P. all kinds of documents are vital to steadily effectively moving of government, company.Therefore, information security has become the core of current government and enterprise security.Mention information security, people will expect virus damage and assault naturally.Actually this is not so, the loss that the loss that government and enterprise are caused because of information is stolen is caused considerably beyond virus damage and assault.According to authoritative institution investigation, the security threat 2/3rds or more is from divulging a secret and internal staff's crime, but not viral and external hacker causes.Network security protections such as fire compartment wall, intrusion detection, spacer assembly are for preventing that outside invasion from having irreplaceable effect; seem and have no way out and divulge a secret for inside; perhaps, the hacker who really has purpose to steal or destroy information just is being hidden in inside, may cause serious threat to government and enterprise at any time.
Our technical documentation or classified papers all are to be in expressly state such as word file, dwg drawing file etc., be easy to be blazed abroad and can open and use by the participant, as more existing systems as in soft mine dam, the network security row of company of SURFILTER etc. all be to monitor and can not stop the generation of this behavior.
Summary of the invention:
For the technical solution document or classified papers are easily divulged a secret from the participant such as word file, dwg drawing file and other clear text file and inner criminal blazes abroad and can open and use, the purpose of this invention is to provide a kind of method to data file dynamic encryption and decryption; This method is based on Microsoft's platform; only relevant with operating system and with concrete application program irrelevant the data file is carried out dynamic encryption and decryption, its data file can only be operated in the present networks environment, even the data file leakage; also be to be in the ciphertext state, played the effect that protects the intellectual property.
In order to realize the foregoing invention purpose, the present invention adopts following technical scheme:
A kind of method to data file dynamic encryption and decryption, in the windows network environment, its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, and the vital document in the centralized control subscriber computer, and by FTP client FTP it is expressly carried out dynamic encryption and decryption and manage; This vital document can only could be read or be revised by server controls in the network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
A kind of method to data file dynamic encryption and decryption, the structure function of its system comprises: client, server end and switch.
A, client after the client-side program of this software has been installed, are controlled by the strategy that server end is formulated, and the sensitive document of client is carried out dynamically encryption and decryption handle.When the user copies into clear text file from other places, make amendment when these files can not be in sensitiveness in system, otherwise when storage will be converted into the ciphertext form automatically and deposit; Its function is divided as follows:
A.) client layer comprises:
1) key distribution is used for the server end authentification of user, consults the key of each file with server end;
2) process monitoring is used for driving and service routine monitoring (DSMon);
3) policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises:
1) file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption;
2) process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end; Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
B, server end are used for the data base administration of strategy customization and key, comprising:
A.) hypervisor (SMan) is used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
C, switch are used for connecting the client and server end by the ssl protocol transmission.
A kind of method to data file dynamic encryption and decryption in native system, is carried out the qualified method of Collective qualification by server to subscriber data file; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
Its program circuit is as follows:
(1) after server OS starts, runtime server end service routine SMan and database D B; Server end service routine SMan is used to monitor the connection request of KeyPolDispatch.
(2) during the subscriber computer os starting, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon.
(3) KeyPolDispatch sets up SSL with SMan and is connected consulting session key.
(4) user logins to SMan by KeyPolDispatch, and KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon for the SMan checking; After having only checking correct, SMan just can provide key to KeyPolDispatch in the operation afterwards.
(5) FsFilter monitors common process will open a sensitive document time, and notice KeyPolDispatch is to the key of SMan application this document.
(6) key of SMan passback this document, KeyPolDispatch passes to FsFilter to this key.
When (7) common process read this document, FsFilter was decrypted content, and after this, system enters sensitiveness.
(8) during common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document and key on this machine, then encrypt storage, otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
(9) when system is in sensitiveness, if the file that is modified is not a sensitive document, it is that it distributes the required parameter of encryption to encrypt storage that FsFilter will require KeyPolDispatch, and it is made sensitivity label.
(10) during close file, if sensitive document and key on this machine, are then destroyed key.
(11) during common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of SMan application; SMan generates a new key, unique file sequence number and initial value IV, and SMan passes to KeyPolDispatch to these values, and encrypts these values of storage.
Because adopt technique scheme, the present invention has following superiority:
This a kind of method to data file dynamic encryption and decryption, based on Microsoft's platform, only relevant with operating system and with concrete application program irrelevant the data file is carried out dynamic encryption and decryption, be that realization to data file dynamic encryption and decryption is an inventive point with the file monitor driving; Our data file can only be operated in the network environment of our company like this, even data file is revealed, also is to be in the ciphertext state, has played the effect that protects the intellectual property.
Solve in the development of internet technology progressively distinct issues of global information integral and national security contradiction, solved maintaining secrecy and steadily effectively operation of public document, enterprise engineering drawing, S.O.P. and all kinds of documents; Overcome from divulging a secret and inner criminal, may cause serious threat to government and enterprise at any time.
Overcome technical documentation or classified papers and easily blazed abroad by the participant such as word file, dwg drawing file etc., and the generation that can stop its File Open to use.
The present invention has obtained trying out in the emphasis section office of my institute, has played the effect that well protects the intellectual property, and also makes us keep perch in commercial competition.
Description of drawings:
Fig. 1, be the system architecture diagram of data file dynamic encryption and decryption method;
Fig. 2, be the workflow diagram of data file dynamic encryption and decryption method;
Embodiment:
As shown in fig. 1: this kind operates in the windows network environment the method for data file dynamic encryption and decryption, and its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, the vital document in the centralized control subscriber computer, and by FTP client FTP other expressly carries out the management of dynamic encryption and decryption to its word file, dwg drawing file etc.; These vital documents can only could be read or be revised by server controls in the particular network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
This kind be to the software of data file dynamic encryption and decryption, and the client of its system configuration function after the client-side program of this software has been installed, is controlled by the strategy that server end is formulated, and the sensitive document of client carried out dynamically encryption and decryption handle; The function of its client is divided as follows:
A.) client layer comprises: key distribution is used for the server end authentification of user, consults the key of each file with server end; Process monitoring is used for driving and service routine monitoring (DSMon); Policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises: file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption; Process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end; Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
This kind is to the software of data file dynamic encryption and decryption, and the server end of its system configuration function after the server of this software has been installed, is used for the formulation of strategy and the data base administration of key, and its function is divided as follows:
A.) hypervisor (SMan).Be used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
This kind is to the software of data file dynamic encryption and decryption, and the switch of its system configuration function is used for connecting the client and server end by the ssl protocol transmission; Its ssl protocol is secure socket layer protocol (Securesocket Layer), mainly be to use the RSA arithmetic and the confidentiality and integrity of digital certificate technique protection message transmission X.509, it can not guarantee information non repudiation, mainly be applicable to the message transmission between point-to-point, Web Server mode commonly used; Secure socket layer protocol (SSL) is the security protocol based on the WEB application that Netscape proposes.
A kind of method to data file dynamic encryption and decryption in native system, is carried out the qualified method of Collective qualification by server to subscriber data file; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
As shown in Figure 2: its workflow is as follows:
1, in the windows network environment, after server OS starts (1), runtime server end service routine SMan and database D B, promptly ask (4), upload current daily record (5) by management, server end service routine SMan monitors the connection request of KeyPolDispatch, waits (2) to be connected.
2, during the subscriber computer os starting (16) of client, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon certificate server (17).
3, client service program KeyPolDispatch sets up SSL with server end service routine SMan and is connected, and consulting session key, server end enter connection request and judge (3).
4, when the service routine SMan user login (6) of the KeyPolDispatch of user by client to server end, KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon and verifies for the audit user profile (7) of the service routine SMan of server end.Enter by denying (8), after checking is correct, by, successful information (9) sent to finishing (10), the service routine SMan of server end just can provide key to client KeyPolDispatch in the operation afterwards, and authentication authorization and accounting server (17) passes through to encryption and decryption thread manager (18); After authentication failed, do not pass through, transmission failure information (11) is to finishing (10), and the service routine SMan of server end can show error message (28) by client certificate server (17), and process time-delay (29) is once more to server authentication.
5, the file filter of client monitoring driver FsFilter (23) monitors the common process of encryption and decryption thread manager (18),
In the time will opening a sensitive document (19), notice KeyPolDispatch is to the key of the service routine SMan of server end application this document, i.e. key request (15).
6, the key of the service routine SMan of server end passback this document, KeyPolDispatch passes to client file to this key and filters monitoring program FsFilter (23).
7, when common process reads this document, client file filter F sFilter (23) is decrypted content by encryption and decryption thread manager (18), and after this, system enters sensitiveness; Encrypt file stream (20) and document flow (21) are read.
8, when common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document (19) and key on this client computer, then encrypt storage; Otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
9, when system is in sensitiveness, if the file that is modified is not sensitive document (19), through letting pass by (22), will require KeyPolDispatch by the file filter device FsFilter (23) of client is that it distributes and encrypts required parameter, encrypt storage, and it is made sensitivity label.
10, when close file, if sensitive document (19) and key be on this machine, then encryption and decryption thread manager (18) is destroyed key.
11, when common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of the service routine SMan of server end application.Service routine SMan generates a new key, unique file sequence number and initial value IV, and the service routine SMan of server end passes to KeyPolDispatch to these values, and encrypts these values of storage.
If, system whether shut down (24) be the shutdown attitude, whether system is handling sensitive document (25), if system arrives end (27) through delay process again to finishing (26).
If when the user worked in this LAN environment, other clear text file such as its word file, dwg drawing file can only could be read or be revised by server controls in this particular network environment; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit; In case break away from the network environment at its place, its content just occurs with the ciphertext form.

Claims (3)

1, a kind of method to data file dynamic encryption and decryption is characterized in that: in the windows network environment, its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, and the vital document in the centralized control subscriber computer, and by FTP client FTP it is expressly carried out dynamic encryption and decryption and manage; This vital document can only could be read or be revised by server controls in the network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
2, a kind of method according to claim 1 to data file dynamic encryption and decryption, it is characterized in that: the structure function of its system comprises: client, server end and switch;
A, client after the client-side program of this software has been installed, are controlled by the strategy that server end is formulated, and the sensitive document of client is carried out dynamically encryption and decryption handle.When the user copies into clear text file from other places, make amendment when these files can not be in sensitiveness in system, otherwise when storage will be converted into the ciphertext form automatically and deposit; Function is divided as follows:
A.) client layer comprises:
1) key distribution is used for the server end authentification of user, consults the key of each file with server end;
2) process monitoring is used for driving and service routine monitoring (DSMon);
3) policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises:
1) file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption;
2) process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end.Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
B, server end are used for the data base administration of strategy customization and key, comprising:
A.) hypervisor (SMan) is used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
C, switch are used for connecting the client and server end by the ssl protocol transmission.
3, a kind of method to data file dynamic encryption and decryption according to claim 1 is characterized in that: this method is carried out the qualified method of Collective qualification by server to subscriber data file in native system; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
Its program circuit is as follows:
(1) after server OS starts, runtime server end service routine SMan and database D B; Server end service routine SMan
Be used to monitor the connection request of KeyPolDispatch.
(2) during the subscriber computer os starting, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon.
(3) KeyPolDispatch sets up SSL with SMan and is connected consulting session key.
(4) user logins to SMan by KeyPolDispatch, and KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon for the SMan checking; After having only checking correct, SMan just can provide key to KeyPolDispatch in the operation afterwards.
(5) FsFilter monitors common process will open a sensitive document time, and notice KeyPolDispatch is to the key of SMan application this document.
(6) key of SMan passback this document, KeyPolDispatch passes to FsFilter to this key.
When (7) common process read this document, FsFilter was decrypted content, and after this, system enters sensitiveness.
(8) during common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document and key on this machine, then encrypt storage, otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
(9) when system is in sensitiveness, if the file that is modified is not a sensitive document, it is that it distributes the required parameter of encryption to encrypt storage that FsFilter will require KeyPolDispatch, and it is made sensitivity label.
(10) during close file, if sensitive document and key on this machine, are then destroyed key.
(11) during common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of SMan application; SMan generates a new key, unique file sequence number and initial value IV, and SMan passes to KeyPolDispatch to these values, and encrypts these values of storage.
CN2006100180298A 2006-06-28 2006-06-28 Method for encrypting/deciphering dynamically data file Expired - Fee Related CN101098224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006100180298A CN101098224B (en) 2006-06-28 2006-06-28 Method for encrypting/deciphering dynamically data file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100180298A CN101098224B (en) 2006-06-28 2006-06-28 Method for encrypting/deciphering dynamically data file

Publications (2)

Publication Number Publication Date
CN101098224A true CN101098224A (en) 2008-01-02
CN101098224B CN101098224B (en) 2010-08-25

Family

ID=39011768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100180298A Expired - Fee Related CN101098224B (en) 2006-06-28 2006-06-28 Method for encrypting/deciphering dynamically data file

Country Status (1)

Country Link
CN (1) CN101098224B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572698A (en) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 Network transmission common encryption method for files
CN101729550B (en) * 2009-11-09 2012-07-25 西北大学 Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN102609667A (en) * 2012-02-22 2012-07-25 浙江机电职业技术学院 Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program
CN101572659B (en) * 2008-04-30 2012-08-15 北京明朝万达科技有限公司 Network sharing range control method for files
CN103413100A (en) * 2013-08-30 2013-11-27 国家电网公司 File security protection system
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN104572169A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 Software distribution and installation system on basis of UEFI (Unified Extensible Firmware Interface)
CN105245336A (en) * 2015-11-12 2016-01-13 南威软件股份有限公司 Document encryption management system
CN107426151A (en) * 2017-03-31 2017-12-01 武汉斗鱼网络科技有限公司 A kind of file decryption method and device
CN107925664A (en) * 2015-08-31 2018-04-17 尤尼斯康通用身份控制股份有限公司 Method for safely and efficiently accessing connection data
CN112115493A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data leakage protection system based on data acquisition

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000236325A (en) * 1999-02-09 2000-08-29 Lg Electronics Inc Device and method for enciphering digital data file
US20170118214A1 (en) * 2001-12-12 2017-04-27 Pervasive Security Systems, Inc. Method and architecture for providing access to secured data from non-secured clients
CN1545295A (en) * 2003-11-17 2004-11-10 中国科学院计算技术研究所 A method for user-oriented remote access control of network file system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572659B (en) * 2008-04-30 2012-08-15 北京明朝万达科技有限公司 Network sharing range control method for files
CN101572698B (en) * 2008-04-30 2014-07-02 北京明朝万达科技有限公司 Network transmission common encryption method for files
CN101572698A (en) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 Network transmission common encryption method for files
CN101729550B (en) * 2009-11-09 2012-07-25 西北大学 Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN102609667A (en) * 2012-02-22 2012-07-25 浙江机电职业技术学院 Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program
CN103413100A (en) * 2013-08-30 2013-11-27 国家电网公司 File security protection system
CN103413100B (en) * 2013-08-30 2016-09-07 国家电网公司 File security protection system
CN104572169B (en) * 2014-09-10 2017-10-27 中电科技(北京)有限公司 A kind of software distribution and installation system based on UEFI
CN104572169A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 Software distribution and installation system on basis of UEFI (Unified Extensible Firmware Interface)
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN107925664A (en) * 2015-08-31 2018-04-17 尤尼斯康通用身份控制股份有限公司 Method for safely and efficiently accessing connection data
CN107925664B (en) * 2015-08-31 2021-10-01 尤尼斯康通用身份控制股份有限公司 Method for secure and efficient access to connection data
CN105245336A (en) * 2015-11-12 2016-01-13 南威软件股份有限公司 Document encryption management system
CN105245336B (en) * 2015-11-12 2019-01-18 南威软件股份有限公司 A kind of file encryption management system
CN107426151A (en) * 2017-03-31 2017-12-01 武汉斗鱼网络科技有限公司 A kind of file decryption method and device
CN112115493A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data leakage protection system based on data acquisition

Also Published As

Publication number Publication date
CN101098224B (en) 2010-08-25

Similar Documents

Publication Publication Date Title
CN101098224B (en) Method for encrypting/deciphering dynamically data file
CN100568251C (en) The guard method of security files under cooperative working environment
CN109561047B (en) Encrypted data storage system and method based on key remote storage
US8135135B2 (en) Secure data protection during disasters
CN100592313C (en) Electric document anti-disclosure system and its implementing method
US9647834B2 (en) Systems and methods with cryptography and tamper resistance software security
US20020046350A1 (en) Method and system for establishing an audit trail to protect objects distributed over a network
WO2003107156A2 (en) METHOD FOR CONFIGURING AND COMMISSIONING CSMs
CN103530570A (en) Electronic document safety management system and method
CN105740725A (en) File protection method and system
CN104219077A (en) Information management system for middle and small-sized enterprises
CN107563221A (en) A kind of certification decoding security management system for encrypting database
TWI573079B (en) Information security management system and method for electronic document
CN1819590A (en) Enciphering method of computer electronic documents
TWI381285B (en) Rights management system for electronic files
CN115221538B (en) Encryption method and system suitable for financial data
CN101826964A (en) Outgoing document security management system supporting collaboration
CN113901507B (en) Multi-party resource processing method and privacy computing system
CN111343421B (en) Video sharing method and system based on white-box encryption
McGowan et al. SAN security
CN110933042A (en) Data security messenger method and system suitable for alliance chain
CN1617487A (en) Preventing system for information leakage under cooperative work environment and its realizing method
CN104239810B (en) A kind of encrypting and decrypting method and device based on remote control
Арустамов et al. Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие
Johnson et al. Healthcare system's operational security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100825

Termination date: 20110628