CN101894241A - Method for realizing file encryption computer software - Google Patents
Method for realizing file encryption computer software Download PDFInfo
- Publication number
- CN101894241A CN101894241A CN2009100271021A CN200910027102A CN101894241A CN 101894241 A CN101894241 A CN 101894241A CN 2009100271021 A CN2009100271021 A CN 2009100271021A CN 200910027102 A CN200910027102 A CN 200910027102A CN 101894241 A CN101894241 A CN 101894241A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- computer software
- encryption
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method for realizing file encryption computer software, in particular to a method for realizing computer software for encrypting the reading, modification and deletion authorities of a file by using database technology. In recent years, great progress is made in the application of office automation in China, and many enterprises start to gradually implement the office automation, so that electronic files produced in daily office work replace the conventional paper files. For the encryption technology of the electronic files, all conventional methods are used for encrypting the contents of the electronic files. The invention aims to research a method for realizing encryption on the reading, modification and deletion authorities of the file by using the database technology. Along with the further implementation of the application of the office automation and the further development of information society, the use of a file management system is expanded gradually. Therefore, the setting of the reading, modification and deletion authorities of files in a folder in the file management system by each user is a problem needing to be solved necessarily.
Description
Technical field
The present invention relates to a kind of computer software implementation method of file encryption, the computer software implementation method that erase right is encrypted is revised in especially a kind of reading of using database technology to document.
Background technology
In recent years, office automation was applied in the domestic significant progress that obtained, and a lot of enterprises have begun progressively to have implemented office automation, so the electronic document that produces in the routine office work affairs has replaced traditional paper document.Compare with traditional paper document, electronic document have is convenient to the retrieval and the statistics, stored for a long time not bad, revise easy, significant advantages such as environmental protection.
For the encryption technology of electronic document, the method for using is many at present, but all is the cipher mode that carries out at the electronic document content.This patent research be to use the reading of database technology to document, revise the implementation method that erase right is encrypted.
Along with office automation use further deeply, the further developing of information society, the use of document file management system more and more widely.Then use the user to file to each in document file management system, the reading of file is revised, and erase right has been arranged to the problem that must solve.
Summary of the invention
The objective of the invention is to: the deficiency at above prior art exists, a kind of reading of using database technology to document is proposed, modification, the computer software implementation method that erase right is encrypted, thus better meet user's demand.
The implementation method of this method is as follows:
At first set up two authority lists in database, table is the authority at file, and this table has four fields, is respectively user ID, and file ID reads authority, revises authority, erase right; Another table is the authority at file, and this table also has four fields, is respectively user ID, and file ID is read authority, revises authority, erase right.The field of all sign authorities all adopts the Boolean type data storage in two tables, and value 0 sign does not possess corresponding authority, and value 1 sign possesses corresponding authority.User ID is the uniqueness sign of user in system, and file ID is the uniqueness sign of file in system, and file ID is the uniqueness sign of file in system
The present invention also need be equipped with following assembly:
Database---be used to deposit the various documents that the user will store;
MDAC--in order to the document of storing in the accessing database.
The user uses step to be:
Step 1: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document folder;
Step 2: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document;
Step 3: the user chooses certain file, submit the visit application, the table of log file folder access rights takes out corresponding record in the MDAC accessing database, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 4: the user chooses certain file, submit the visit application, the table of log file access rights in the MDAC accessing database takes out corresponding record, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 5: the user can also revise the authority that has been provided with by MDAC, to guarantee upgrading in time of authority.
So, the supvr can be at the personalized access rights of different requirements set, thereby better realize the high-efficiency management of document.
Embodiment
Embodiment one
At first set up two authority lists in database, table is the authority at file, and this table has four fields, is respectively user ID, and file ID reads authority, revises authority, erase right; Another table is the authority at file, and this table also has four fields, is respectively user ID, and file ID is read authority, revises authority, erase right.The field of all sign authorities all adopts the Boolean type data storage in two tables, and value 0 sign does not possess corresponding authority, and value 1 sign possesses corresponding authority.User ID is the uniqueness sign of user in system, and file ID is the uniqueness sign of file in system, and file ID is the uniqueness sign of file in system
The present invention also need be equipped with following assembly:
Database---be used to deposit the various documents that the user will store;
MDAC--in order to the document of storing in the accessing database.
The user uses step to be:
Step 1: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document folder;
Step 2: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document;
Step 3: the user chooses certain file, submit the visit application, the table of log file folder access rights takes out corresponding record in the MDAC accessing database, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 4: the user chooses certain file, submit the visit application, the table of log file access rights in the MDAC accessing database takes out corresponding record, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 5: the user can also revise the authority that has been provided with by MDAC, to guarantee upgrading in time of authority.
In addition to the implementation, the present invention can also have other embodiments.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection domain of requirement of the present invention.
Claims (3)
1. the computer software implementation method of a file encryption is characterized in that this encryption method is based on database technology.
2. according to the computer software implementation method of the described a kind of file encryption of claim 1, it is characterized in that: this encryption method is mainly used in the reading to document, revises, and erase right is encrypted.
3. according to the computer software implementation method of the described a kind of file encryption of claim 2, it is characterized in that: this method is mainly used in the document management software systems.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100271021A CN101894241A (en) | 2009-05-22 | 2009-05-22 | Method for realizing file encryption computer software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100271021A CN101894241A (en) | 2009-05-22 | 2009-05-22 | Method for realizing file encryption computer software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101894241A true CN101894241A (en) | 2010-11-24 |
Family
ID=43103431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009100271021A Pending CN101894241A (en) | 2009-05-22 | 2009-05-22 | Method for realizing file encryption computer software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101894241A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103310165A (en) * | 2013-06-21 | 2013-09-18 | 宁夏新航信息科技有限公司 | Method for achieving document encryption with computer software |
CN104217168A (en) * | 2013-05-30 | 2014-12-17 | 宁夏新航信息科技有限公司 | Intelligent document encryption computer software realizing method |
CN108985080A (en) * | 2018-06-25 | 2018-12-11 | 安徽师范大学 | A kind of office docuemts encryption system and its encryption method |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
-
2009
- 2009-05-22 CN CN2009100271021A patent/CN101894241A/en active Pending
Non-Patent Citations (3)
Title |
---|
张增耀: "浅谈数据库管理系统中数据文件的加密", 《濮阳教育学院学报》 * |
张永仁等: "基于数据库的文件管理", 《计算机工程与设计》 * |
李琳: "基于B/S架构的文档管理系统的设计与实现", 《中国优秀硕士论文全文数据库》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104217168A (en) * | 2013-05-30 | 2014-12-17 | 宁夏新航信息科技有限公司 | Intelligent document encryption computer software realizing method |
CN103310165A (en) * | 2013-06-21 | 2013-09-18 | 宁夏新航信息科技有限公司 | Method for achieving document encryption with computer software |
CN108985080A (en) * | 2018-06-25 | 2018-12-11 | 安徽师范大学 | A kind of office docuemts encryption system and its encryption method |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008080143B1 (en) | Method and system for searching stored data | |
US20070136340A1 (en) | Document and file indexing system | |
WO2010150277A4 (en) | A method and system for directory management | |
US20080282355A1 (en) | Document container data structure and methods thereof | |
CN101727502A (en) | Data query method, data query device and data query system | |
CN109977088A (en) | A kind of method that preset format file is converted to OFD format | |
CN101894241A (en) | Method for realizing file encryption computer software | |
CN102110142A (en) | Method for dynamically expanding personnel transaction in human resource management information system | |
CN104239438A (en) | File information storage method and file information read-write method based on separate storage | |
CN104156396A (en) | Method and system for improving database performance in big-data environment | |
CN105843554B (en) | The method and its system of Data Migration based on object storage | |
CN101408882B (en) | Method and system for searching authorization document | |
CN104050424A (en) | Method for achieving file access security authority management through smart card and file access method | |
CN101470861A (en) | Post model construction system and method based on GB/T19487 | |
CN102541982B (en) | Method for organizing and accessing metadata file log | |
CN101963993B (en) | Method for fast searching database sheet table record | |
CN101763358A (en) | Document management system | |
CN101320394A (en) | Data acquisition method supporting multiple file types | |
CN102609364A (en) | Cache exchange method | |
CN102609664B (en) | Based on the identification of process fingerprint intelligent and fuzzy acquisition system and method thereof that can carry out body | |
CN102855283A (en) | Method for filing and storing files of office automation system | |
CN103310165A (en) | Method for achieving document encryption with computer software | |
CN106407840A (en) | A computer software realization method for document encryption | |
RU2007114069A (en) | METHOD, DEVICE AND MEDIA FOR PROTECTING CONTENTS | |
TW200643746A (en) | Method, system and computer readable recording media for electronic document management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20101124 |