CN101894241A - Method for realizing file encryption computer software - Google Patents

Method for realizing file encryption computer software Download PDF

Info

Publication number
CN101894241A
CN101894241A CN2009100271021A CN200910027102A CN101894241A CN 101894241 A CN101894241 A CN 101894241A CN 2009100271021 A CN2009100271021 A CN 2009100271021A CN 200910027102 A CN200910027102 A CN 200910027102A CN 101894241 A CN101894241 A CN 101894241A
Authority
CN
China
Prior art keywords
file
user
computer software
encryption
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100271021A
Other languages
Chinese (zh)
Inventor
李骁淳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Yction Software Co Ltd
Original Assignee
Zhenjiang Yction Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Yction Software Co Ltd filed Critical Zhenjiang Yction Software Co Ltd
Priority to CN2009100271021A priority Critical patent/CN101894241A/en
Publication of CN101894241A publication Critical patent/CN101894241A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a method for realizing file encryption computer software, in particular to a method for realizing computer software for encrypting the reading, modification and deletion authorities of a file by using database technology. In recent years, great progress is made in the application of office automation in China, and many enterprises start to gradually implement the office automation, so that electronic files produced in daily office work replace the conventional paper files. For the encryption technology of the electronic files, all conventional methods are used for encrypting the contents of the electronic files. The invention aims to research a method for realizing encryption on the reading, modification and deletion authorities of the file by using the database technology. Along with the further implementation of the application of the office automation and the further development of information society, the use of a file management system is expanded gradually. Therefore, the setting of the reading, modification and deletion authorities of files in a folder in the file management system by each user is a problem needing to be solved necessarily.

Description

A kind of computer software implementation method of file encryption
Technical field
The present invention relates to a kind of computer software implementation method of file encryption, the computer software implementation method that erase right is encrypted is revised in especially a kind of reading of using database technology to document.
Background technology
In recent years, office automation was applied in the domestic significant progress that obtained, and a lot of enterprises have begun progressively to have implemented office automation, so the electronic document that produces in the routine office work affairs has replaced traditional paper document.Compare with traditional paper document, electronic document have is convenient to the retrieval and the statistics, stored for a long time not bad, revise easy, significant advantages such as environmental protection.
For the encryption technology of electronic document, the method for using is many at present, but all is the cipher mode that carries out at the electronic document content.This patent research be to use the reading of database technology to document, revise the implementation method that erase right is encrypted.
Along with office automation use further deeply, the further developing of information society, the use of document file management system more and more widely.Then use the user to file to each in document file management system, the reading of file is revised, and erase right has been arranged to the problem that must solve.
Summary of the invention
The objective of the invention is to: the deficiency at above prior art exists, a kind of reading of using database technology to document is proposed, modification, the computer software implementation method that erase right is encrypted, thus better meet user's demand.
The implementation method of this method is as follows:
At first set up two authority lists in database, table is the authority at file, and this table has four fields, is respectively user ID, and file ID reads authority, revises authority, erase right; Another table is the authority at file, and this table also has four fields, is respectively user ID, and file ID is read authority, revises authority, erase right.The field of all sign authorities all adopts the Boolean type data storage in two tables, and value 0 sign does not possess corresponding authority, and value 1 sign possesses corresponding authority.User ID is the uniqueness sign of user in system, and file ID is the uniqueness sign of file in system, and file ID is the uniqueness sign of file in system
The present invention also need be equipped with following assembly:
Database---be used to deposit the various documents that the user will store;
MDAC--in order to the document of storing in the accessing database.
The user uses step to be:
Step 1: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document folder;
Step 2: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document;
Step 3: the user chooses certain file, submit the visit application, the table of log file folder access rights takes out corresponding record in the MDAC accessing database, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 4: the user chooses certain file, submit the visit application, the table of log file access rights in the MDAC accessing database takes out corresponding record, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 5: the user can also revise the authority that has been provided with by MDAC, to guarantee upgrading in time of authority.
So, the supvr can be at the personalized access rights of different requirements set, thereby better realize the high-efficiency management of document.
Embodiment
Embodiment one
At first set up two authority lists in database, table is the authority at file, and this table has four fields, is respectively user ID, and file ID reads authority, revises authority, erase right; Another table is the authority at file, and this table also has four fields, is respectively user ID, and file ID is read authority, revises authority, erase right.The field of all sign authorities all adopts the Boolean type data storage in two tables, and value 0 sign does not possess corresponding authority, and value 1 sign possesses corresponding authority.User ID is the uniqueness sign of user in system, and file ID is the uniqueness sign of file in system, and file ID is the uniqueness sign of file in system
The present invention also need be equipped with following assembly:
Database---be used to deposit the various documents that the user will store;
MDAC--in order to the document of storing in the accessing database.
The user uses step to be:
Step 1: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document folder;
Step 2: the keeper is provided with the user ID sequence that allows visit at certain file, and the user of the user ID correspondence in this sequence just can visit this document;
Step 3: the user chooses certain file, submit the visit application, the table of log file folder access rights takes out corresponding record in the MDAC accessing database, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 4: the user chooses certain file, submit the visit application, the table of log file access rights in the MDAC accessing database takes out corresponding record, be 1 as the value of corresponding authority record and allow visit, be 0 as the value of corresponding authority record and do not allow visit;
Step 5: the user can also revise the authority that has been provided with by MDAC, to guarantee upgrading in time of authority.
In addition to the implementation, the present invention can also have other embodiments.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection domain of requirement of the present invention.

Claims (3)

1. the computer software implementation method of a file encryption is characterized in that this encryption method is based on database technology.
2. according to the computer software implementation method of the described a kind of file encryption of claim 1, it is characterized in that: this encryption method is mainly used in the reading to document, revises, and erase right is encrypted.
3. according to the computer software implementation method of the described a kind of file encryption of claim 2, it is characterized in that: this method is mainly used in the document management software systems.
CN2009100271021A 2009-05-22 2009-05-22 Method for realizing file encryption computer software Pending CN101894241A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100271021A CN101894241A (en) 2009-05-22 2009-05-22 Method for realizing file encryption computer software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100271021A CN101894241A (en) 2009-05-22 2009-05-22 Method for realizing file encryption computer software

Publications (1)

Publication Number Publication Date
CN101894241A true CN101894241A (en) 2010-11-24

Family

ID=43103431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100271021A Pending CN101894241A (en) 2009-05-22 2009-05-22 Method for realizing file encryption computer software

Country Status (1)

Country Link
CN (1) CN101894241A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310165A (en) * 2013-06-21 2013-09-18 宁夏新航信息科技有限公司 Method for achieving document encryption with computer software
CN104217168A (en) * 2013-05-30 2014-12-17 宁夏新航信息科技有限公司 Intelligent document encryption computer software realizing method
CN108985080A (en) * 2018-06-25 2018-12-11 安徽师范大学 A kind of office docuemts encryption system and its encryption method
CN111159743A (en) * 2019-12-30 2020-05-15 掌阅科技股份有限公司 File encryption method of electronic book reader, computing device and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张增耀: "浅谈数据库管理系统中数据文件的加密", 《濮阳教育学院学报》 *
张永仁等: "基于数据库的文件管理", 《计算机工程与设计》 *
李琳: "基于B/S架构的文档管理系统的设计与实现", 《中国优秀硕士论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217168A (en) * 2013-05-30 2014-12-17 宁夏新航信息科技有限公司 Intelligent document encryption computer software realizing method
CN103310165A (en) * 2013-06-21 2013-09-18 宁夏新航信息科技有限公司 Method for achieving document encryption with computer software
CN108985080A (en) * 2018-06-25 2018-12-11 安徽师范大学 A kind of office docuemts encryption system and its encryption method
CN111159743A (en) * 2019-12-30 2020-05-15 掌阅科技股份有限公司 File encryption method of electronic book reader, computing device and storage medium

Similar Documents

Publication Publication Date Title
WO2008080143B1 (en) Method and system for searching stored data
US20070136340A1 (en) Document and file indexing system
WO2010150277A4 (en) A method and system for directory management
US20080282355A1 (en) Document container data structure and methods thereof
CN101727502A (en) Data query method, data query device and data query system
CN109977088A (en) A kind of method that preset format file is converted to OFD format
CN101894241A (en) Method for realizing file encryption computer software
CN102110142A (en) Method for dynamically expanding personnel transaction in human resource management information system
CN104239438A (en) File information storage method and file information read-write method based on separate storage
CN104156396A (en) Method and system for improving database performance in big-data environment
CN105843554B (en) The method and its system of Data Migration based on object storage
CN101408882B (en) Method and system for searching authorization document
CN104050424A (en) Method for achieving file access security authority management through smart card and file access method
CN101470861A (en) Post model construction system and method based on GB/T19487
CN102541982B (en) Method for organizing and accessing metadata file log
CN101963993B (en) Method for fast searching database sheet table record
CN101763358A (en) Document management system
CN101320394A (en) Data acquisition method supporting multiple file types
CN102609364A (en) Cache exchange method
CN102609664B (en) Based on the identification of process fingerprint intelligent and fuzzy acquisition system and method thereof that can carry out body
CN102855283A (en) Method for filing and storing files of office automation system
CN103310165A (en) Method for achieving document encryption with computer software
CN106407840A (en) A computer software realization method for document encryption
RU2007114069A (en) METHOD, DEVICE AND MEDIA FOR PROTECTING CONTENTS
TW200643746A (en) Method, system and computer readable recording media for electronic document management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101124