CN102902931B - The close system of files-designated and files-designated decryption method - Google Patents

The close system of files-designated and files-designated decryption method Download PDF

Info

Publication number
CN102902931B
CN102902931B CN201110320966.XA CN201110320966A CN102902931B CN 102902931 B CN102902931 B CN 102902931B CN 201110320966 A CN201110320966 A CN 201110320966A CN 102902931 B CN102902931 B CN 102902931B
Authority
CN
China
Prior art keywords
file
mark
user
close
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110320966.XA
Other languages
Chinese (zh)
Other versions
CN102902931A (en
Inventor
穆森
赵倩
任强
徐马利
杨利
陈剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
No706 Institute Of No2 Research Institute China Aerospace Science & Industry Corp
Original Assignee
No706 Institute Of No2 Research Institute China Aerospace Science & Industry Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by No706 Institute Of No2 Research Institute China Aerospace Science & Industry Corp filed Critical No706 Institute Of No2 Research Institute China Aerospace Science & Industry Corp
Priority to CN201110320966.XA priority Critical patent/CN102902931B/en
Publication of CN102902931A publication Critical patent/CN102902931A/en
Application granted granted Critical
Publication of CN102902931B publication Critical patent/CN102902931B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of close system of files-designated and files-designated decryption method, the close system of files-designated is equipped on operating system platform, including DBM, marks close module and relating module;DBM creates database file store files under each drive of hard disc of computer and is marked close time, by the filename of mark ciphertext part, by the file full path footpath of mark ciphertext part and file level of confidentiality;Relating module associates monitoring user's operation to file with operating system, according to user, the operation of file is generated command adapted thereto and transmits to marking close module;Mark close module and receive instruction, the file stored the database file under the drive relevant to user operation according to instruction is marked close time, is operated by the filename of mark ciphertext part, the file full path footpath and file level of confidentiality of being marked ciphertext part, file is carried out level of confidentiality demarcation, realize the binding of mark confidential information and e-file simultaneously, make e-file not lose at transmission, reproduction process acceptance of the bid confidential information, improve the safety to file and controllability.

Description

The close system of files-designated and files-designated decryption method
Technical field
The present invention relates to network communication security fields, particularly relate to a kind of close system of files-designated and files-designated decryption method.
Background technology
Along with the universalness of network, network communication has incorporated the every aspect of contemporary society's productive life, communication information Safe and secret problem is the most gradually paid attention to by people.Sender also makes transmission successful while being transmitted by real-time performance file File is departing from the control of sender, and sender is difficult to limit the use sending file with propagation, so that sending Person faces the file sent and is abused or the danger of malicious dissemination.
For solving the problems referred to above, prior art CN101826964A discloses a kind of outgoing document safety supporting collaborative work Management system.This safety management system is Generated Certificate by concentration and authority, user carries out on-line authentication and to day Will, the query monitor of file status, it is achieved the moment tracing control to outgoing document, prevent diffusion of information.
Prior art provides monitoring and inquiry just for file outgoing, but cannot ensure other behaviour that file is carried out by user When making, files-designated confidential information is not lost.
In addition the prior art carries out the management of single rank to client, i.e. message in-coming person, carries out file equally single Rank manages.All of client is given identical level of confidentiality authority, All Files is simply divided into can transmit with can not Transmission.This type of management obviously cannot realize multi-level Encryption management and control, it is impossible to realizes portions of client for part literary composition Part gives part authority.
Summary of the invention
Do not lose with digital signature at transmission, reproduction process acceptance of the bid confidential information to realize e-file, improve file Safety and controllability, the present invention proposes a kind of close system of files-designated and files-designated decryption method, can realize e-file Security information is demarcated, and completes the binding marking confidential information with e-file simultaneously, makes e-file close in transmission, reproduction process acceptance of the bid Information is not lost with digital signature, improves the safety to concerning security matters e-file and controllability.
The present invention provides a kind of close system of files-designated, and the close system of this document mark is equipped on operating system platform, including DBM, mark close module and relating module;This DBM creates data under each drive of hard disc of computer Library file, it is complete that this database file store files is marked close time, file by the filename of mark ciphertext part, by mark ciphertext part Path and file level of confidentiality;This relating module associates with this operating system, monitors user's operation to file, according to user to literary composition The operation of part generates command adapted thereto and transmits this instruction to the close module of this mark;The close module of this mark receives the transmission of this relating module Instruction, when the file stored the database file that operate under relevant drive to this user according to this instruction is marked close Between, by the filename of mark ciphertext part, carried out corresponding operating by the mark file full path footpath of ciphertext part and file level of confidentiality.
Alternative file level of confidentiality that the close system of files-designated the most of the present invention provides a user with is not higher than user's level of confidentiality, makes Join compared with file level of confidentiality level of confidentiality with user own, it is to avoid user bypass the immediate leadership mark close.
The present invention also provides for a kind of files-designated decryption method, and the method includes: create under each drive of hard disc of computer Database file store files by mark close time, by the filename of mark ciphertext part, by mark ciphertext part file full path footpath and File level of confidentiality;Monitoring user's operation to file, generates corresponding instruction according to user to the operation of file;Right according to this instruction The file of the database file storage under the drive relevant to this user operation is marked close time, file by mark ciphertext part Name, the file full path footpath and file level of confidentiality of being marked ciphertext part operate.
The beneficial effects of the present invention is, the close system of this document mark is by carrying out level of confidentiality demarcation to file, it is achieved to electronics The control that file security information is demarcated, completes the binding marking confidential information with e-file, makes e-file in transmission, reproduction process Acceptance of the bid confidential information is not lost with digital signature, improves the safety to file and controllability.File the most in certain embodiments Mark close system more can make the own level of confidentiality of file level of confidentiality and user compared with join, it is to avoid user bypass the immediate leadership mark close.
Accompanying drawing explanation
Fig. 1 is the block diagram of files-designated of the present invention close system one embodiment;
Fig. 2 is the block diagram of the relating module of the close system of files-designated of the present invention;
Fig. 3 is the block diagram marking close module of the close system of files-designated of the present invention;
Fig. 4 is the close user interface of files-designated of the close system of files-designated of the present invention;
Fig. 5 is the block diagram of files-designated of the present invention another embodiment of close system;
Fig. 6 is according to the flow chart of files-designated decryption method disclosed in one embodiment of the invention;
Fig. 7 is the flow chart of files-designated decryption method of the present invention.
Detailed description of the invention
The present invention proposes a kind of close system of files-designated, can realize the control demarcating e-file security information, complete mark Confidential information and the binding of e-file, make e-file not lose with digital signature at transmission, reproduction process acceptance of the bid confidential information, carry The high safety to file and controllability.
Fig. 1 is the block diagram of an embodiment of the close system of files-designated of the present invention.In an embodiment, as it is shown in figure 1, files-designated Close system 1 is equipped on operating system platform, including DBM 11, marks close module 12 and relating module 13.Data Library module 11 creates database file under each drive of hard disc of computer and is marked the mark confidential information of close file for storage. Even if moveable magnetic disc Offhost, security information is still saved on this moveable magnetic disc.
Relating module 13 is associated with operating system, monitors user's operation to file, according to user's operation to file Generate command adapted thereto.As in figure 2 it is shown, this relating module 13 includes data obtaining module 131 and directive generation module 132.Letter Breath acquisition module 131 calls API and monitors user's operation to file, obtains the filename of file operated by user, file road Footpath, user are to the action type of file operation and operating time.Directive generation module 132 obtains according to this data obtaining module 131 The action type taken generates corresponding instruction.The action type of file is included by user in some embodiments of the invention: mark close File, duplication file, shearing file, deletion file.But the present invention does not limit and above-mentioned listed action type.This instruction is raw Become module 132, according to user, the close operation of mark, duplication operation, shearing manipulation and the deletion action of file are generated mark close finger accordingly Make, duplicate instructions, shearing instruction, delete instruction.Relating module 13 by the filename of the file operated by user, file path, The instruction of file operation time and generation is transmitted to marking close module 12 by user,.
Mark close module 12 to be connected with DBM 11, relating module 13, receive the user institute of relating module 13 transmission Operating time to file of the filename of file, file path, instruction and user of operation, according to this instruction to operation phase The mark confidential information of the database file storage under the drive closed carries out corresponding operating.
Its acceptance of the bid confidential information includes marking close people, to mark close time, file by the filename of mark ciphertext part, by mark ciphertext part complete Path, by mark ciphertext part level of confidentiality etc..
Mark close module 12 according to the close instruction of this mark to by the data base's write under the drive of mark ciphertext part place or amendment this article The mark confidential information of part;From the data base being replicated the drive of file place, read and replicate this according to duplicate instructions and be replicated literary composition The mark confidential information of part, and the data base under the file place drive pasted writes this mark confidential information and the literary composition of stickup of duplication The path of part;Close according to the mark that this shearing file was read and replicated to shearing instruction from the data base being sheared the drive of file place Information, and to paste file place drive under data base write this mark confidential information of duplication and the road of the file of stickup Footpath, deletes the mark confidential information of this shearing file being sheared in the data base under the drive of file place simultaneously;According to deleting instruction Data base from the drive of deleted file place deletes the mark confidential information of this deleted file.
In some embodiments of the invention, mark close module 12 and include subscriber interface module 121, level of confidentiality filtering module 122, mark Close execution module 123 and receiver module 124, as it is shown on figure 3, level of confidentiality filtering module 122 receives receiver module 124 transmission Mark close instruction, filter out the alternative file level of confidentiality higher than user's level of confidentiality according to the level of confidentiality of user, provide to subscriber interface module 121 The not higher than alternative file level of confidentiality of user's level of confidentiality.Select for user.Subscriber interface module 121 is revealed in operation in tag form In system in file " attribute " hurdle, as shown in Figure 4.The alternative literary composition that subscriber interface module 121 provides according to level of confidentiality filtering module 122 Part level of confidentiality provides a user with selectable file level of confidentiality.User selects a file level of confidentiality to arrange by subscriber interface module 121 This document.Subscriber interface module 121 obtains user and selects the file level of confidentiality of input, and transmission is to the mark marking close module close execution module 123.User determines that the close operation of mark will be acquired in relating module 13.Relating module 13 generates according to this operation and marks close instruction also The file operation time is sent to marking close module 12 by it with the filename of file operated by user, file path, user.Mark The receiver module 124 of close module 12 receives the filename of the file operated by user of relating module 13 transmission, file path, use Family is to file operation time and instruction and transmits to marking close execution module 123, triggers and marks close execution module to by mark ciphertext part Data base under the drive of place writes mark confidential information.After information has write, mark close execution module 123 to subscriber interface module 121 feedback marks are close to be completed, and subscriber interface module 121 display is marked the user name of close people and marks the close time.User interface mould in Fig. 4 Block uses drop-down menu formula interface, and this user interface can be to choose formula interface or input type interface in other embodiments.At certain In a little embodiments, mark and close module 12 only includes subscriber interface module 121, level of confidentiality filtering module 122 and marks close execution module 123, mark close execution module 123 and directly receive the information from relating module 13 transmission.In further embodiments, level of confidentiality filters Module 122 can be integrated in subscriber interface module 121, makes subscriber interface module 121 have the function that level of confidentiality filters.User is to literary composition The amendment operation that the mark confidential information of part is carried out can be as the close operation of the mark of specific type, to mark close instruction triggers mark close execution module 123 data bases under the mark ciphertext part place drive being modified write amended mark confidential information and delete former mark confidential information.
Fig. 5 is the block diagram of another embodiment of the close system of files-designated of the present invention.This embodiment and embodiment illustrated in fig. 1 base This is identical, and its difference is, the close system of files-designated also includes user log-in block 14 in the present embodiment.User log-in block 14 It is connected with marking close module 12.User log-in block 14 reads the user name of user's input, obtains user's level of confidentiality, by user name and use Family level of confidentiality is transmitted to the close module of this mark 12.
In a preferred embodiment of the present invention, the close system of files-designated and other application systems with the use of.Described other are answered By system can be such as mailing system, Subscriber Management System or other file need to be marked close operation, to mark ciphertext part with literary composition Part level of confidentiality carries out the system of management and control.The close system of files-designated provides integrated interface, and other application systems can carry out file by interface Mark the login of close system, thus file is marked management and control, the acquisition files-designated confidential information of close and mark ciphertext part and level of confidentiality, sets Put the close grade of files-designated and be downloaded by the close file of mark in authority.Other application systems can be passed through ChooseDownloadDir method carries out file download, and the mark confidential information of the file after download will not be lost.
In a preferred embodiment, DBM 11 create under each drive of hard disc of computer one entitled The database file of " sensinfo.db ".When carrying out marking close, mark close module 12 security information of selection is write into In " sensinfo.db " database file.In database file, record is marked close people, is marked close time, filename, file full path footpath etc. Information.User's login interface close system of log file mark that user is provided by user log-in block 14, after user logins successfully, User log-in block 14 reads the user name of user's input, obtains that other application systems provide or is obtained by user name retrieval User's level of confidentiality of this user name.User name and user's level of confidentiality are transmitted to marking close module 12 by user log-in block 14.At certain In a little embodiments, user is not logged in the close system of files-designated and then can not mark file close or modify file level of confidentiality.? In one embodiment of the invention, Login method can be used to log on to the close system of files-designated, when exiting, use Logout method to note Pin.The user being not logged in can obtain mark ciphertext part security information by GetSensInfo method, also by GetFileLength obtains the size of file.
Relating module 13 calls API and monitors user's operation to file, catch that user's mark of carrying out file is close, replicate, Shearing, deletion etc. operate.Management module 13 obtains the operating time of the filename of file destination, file path, user simultaneously.
As relating module 13 monitors user, file destination is carried out the close operation of files-designated, then generate mark close instruction transmission extremely Mark close module 12.Marking after close module 12 receives the close instruction of this mark, it is alternative that level of confidentiality filtering module 122 filters higher than user's level of confidentiality File level of confidentiality, it is provided that the not higher than alternative file level of confidentiality of user's level of confidentiality to subscriber interface module 121, subscriber interface module 121 with Label form is revealed in " attribute " hurdle of file in operating system.The alternative file level of confidentiality that subscriber interface module 121 will receive It is supplied to user with the form of optional file level of confidentiality, selects for user.User selects one of which file level of confidentiality to be this document Carrying out marking close, subscriber interface module 121 reads file level of confidentiality that user selects and is transmitted to mark close execution module 123, refers to Make receiver module 124 receive relating module 13 and mark close instruction and the literary composition of file destination according to what the close operation of this mark of user generated Part name, file path, user are to the file destination operating time, and transmit above-mentioned information to marking close execution module 123.Mark close holding Row module 123 is according to marking close instruction by the filename of file, file path and the user operated by file level of confidentiality, user to literary composition Database file under part operating time write file destination drive.After the close operation of mark of file destination completes, mark close execution mould Block 123 marks close completing to subscriber interface module 121 feedback, and subscriber interface module 121 display is marked the user name of close people and marks close Time.
The mark confidential information of file destination is modified operation as relating module 13 monitors user, then generate and transmit and repair Change instruction to marking close module 12.Marking after close module 12 receives this amendment instruction, provide a user with not higher than user's level of confidentiality can Selection part level of confidentiality selects for user.Read the file level of confidentiality of user's selection and obtain the filename of file destination, file path, use The operating time at family.And the file operation time is write by file level of confidentiality, the filename of file destination, file path and user Database file under file destination drive, marks file destination after the amendment of confidential information operated, marks close execution module 123 mark close operation to subscriber interface module 121 feedback completes, and subscriber interface module 121 display is revised the user name of people and repaiies Change the time.
As relating module 13 monitors user, file destination carries out replicating operation, then generate and transmission copying instruction is to mark Close module 12, marks after close module 12 receives this duplicate instructions, by marking close execution module 123 from being replicated the drive of file place Data base in read and replicate this mark confidential information being replicated file, to paste file place drive under data base write This mark confidential information replicated and the path of the file of stickup.Afterwards, close execution module 123 is marked anti-to subscriber interface module 121 Feedback operation completes, and subscriber interface module 121 shows the close user name marking close people being artificially replicated file of the mark of this stickup file And the close time of marking of this stickup file is the time pasting this document.
As relating module 13 monitors user, file destination is carried out shearing manipulation, then generate and transmit shearing instruction to mark Close module 12.Mark close module 12 receive this shearing instruction after, by mark close execution module 123 from being sheared the drive of file place Data base in read and replicate the mark confidential information of this shearing file, and the data base's write under the file place drive pasted This mark confidential information replicated and the path of the file of stickup, delete simultaneously and be sheared in the data base under the drive of file place The mark confidential information of this shearing file.Afterwards, mark close execution module 123 and complete to subscriber interface module 121 feedback operation, Yong Hujie Face mould block 121 shows the close user name marking close people being artificially sheared file of the mark of this stickup file and the mark of this stickup file The close time is the time pasting this document.
As relating module 13 monitors user, file destination is carried out deletion action, then generate and transmit deletion instruction, extremely Mark close module 12.Mark close module 12 receive this shearing instruction after, by mark close execution module 123 from deleted file place drive Under data base in delete the mark confidential information of this deleted file.Afterwards, close execution module 123 is marked to subscriber interface module 121 Feedback completes.
Monitor user's operation to file by monitoring module 13, generate the instruction corresponding to user operation, by marking close mould In database file under the block 12 file place drive to being operated, the mark confidential information of storage performs write, reads, revises, answers Make, paste, the operation such as deletion so that the mark confidential information of this document will not be lost when file is moved into any position.
In preferred embodiment, being used encryption storage by the file that mark is close, Cipher Strength is more than 128.
The present invention also discloses a kind of files-designated decryption method.Fig. 6 show according to file one embodiment of the present invention open Mark decryption method flow chart.In this embodiment, create under this document mark decryption method is included in each drive of hard disc of computer Build database file (step S001);Monitoring user's operation to file, will mark confidential information write into Databasce according to user instruction In file (step S002);Mark secret letter database file under the drive relevant to this user operation stored according to this instruction Breath carries out operating (step S003).Wherein, as it is shown in fig. 7, the step of confidential information write into Databasce file will be marked according to user instruction Suddenly farther include to call API and monitor user's operation to file, obtain the filename of file operated by user, file path And user to the action type (step S021) of file operation and generates corresponding instruction (step according to the action type obtained Rapid S022).
In certain embodiments, user specifically includes the close operation of the mark to file, replicates operation, shearing the operation of file Operation and deletion action;Corresponding instruction includes marking close instruction, duplicate instructions, shearing instruction, deleting instruction.According to this The operation that the mark confidential information that database file under the drive relevant to this user operation is stored by instruction is carried out specifically includes: root According to the close instruction of this mark to by the data base's write under the drive of mark ciphertext part place or the mark confidential information of amendment this document;According to duplication This mark confidential information being replicated file is read and replicates in instruction from the data base being replicated the drive of file place, and to stickup File place drive under data base write this mark confidential information of duplication and the path of the file of stickup;According to shearing instruction The mark confidential information of this shearing file is read and replicates from the data base being sheared the drive of file place, and to the file institute pasted Data base under drive writes this mark confidential information of duplication and the path of the file of stickup, deletes simultaneously and is sheared file institute The mark confidential information of this shearing file in the data base under drive;According to deleting instruction from the drive of deleted file place Data base deletes the mark confidential information of this deleted file.
In certain embodiments, according to the close instruction of this mark to by the data base's write under the drive of mark ciphertext part place or amendment This document mark confidential information step farther include: provide a user with alternative file level of confidentiality, it is provided that file level of confidentiality Not higher than user's level of confidentiality, obtains the file level of confidentiality of user's actual selection, and file level of confidentiality write user selected is by mark ciphertext part Data base under the drive of place.
In the preferred embodiment, in monitoring user's operation to file, according to user, the operation of file is generated corresponding Provide a user with login interface before instruction, read the user name of input when user logs in, obtain user's level of confidentiality.
In the preferred embodiment, files-designated decryption method is implemented as:
The database file of one entitled " sensinfo.db " is created under each drive of hard disc of computer.When carry out When marking close, the security information of selection is write in " sensinfo.db " database file.In database file, record mark is close People, mark the information such as close time, filename, file full path footpath.
Provide a user with log-in interface, read the user name of input when user logs in, obtain what other application systems provided Or user's level of confidentiality of this user name obtained is retrieved by user name.In certain embodiments, user is not logged in the close system of files-designated File then can not be marked close or modify file level of confidentiality by system.In an embodiment of the present invention, Login method can be used Log on to the close system of files-designated, when exiting, use Logout method to be unregistered.The user being not logged in can pass through GetSensInfo Method obtains mark ciphertext part security information, obtains the size of file also by GetFileLength.
Call API and monitor user's operation to file, catch that user's mark of carrying out file is close, replicate, shear, deletion etc. Operation generates corresponding instruction, and obtains the operating time of the filename of file destination, file path, user.
As monitored user, file destination is carried out the close operation of files-designated, then generate and mark close instruction, provide a user with the highest Optional file level of confidentiality in user's level of confidentiality selects for user, and reads the file level of confidentiality that user selects.And by file level of confidentiality, user The operated filename of file, file path and user is to the data base under file operation time write file destination drive File, completes the close operation of the mark to file destination.
The mark confidential information of file destination is modified operation as monitored user, then generate and mark close instruction, carry to user Optional file level of confidentiality for not higher than user's level of confidentiality selects for user.Read the file level of confidentiality of user's selection and obtain file destination Filename, file path, the operating time of user.And by file level of confidentiality, the filename of file destination, file path and use Family, to the database file under file operation time write file destination drive, completes to mark file destination the amendment of confidential information Operation.
Carry out file destination replicating operation as monitored user, then generate duplicate instructions, from being replicated file place dish Data base under Fu reads and replicates this mark confidential information being replicated file, the data base under the file place drive pasted This mark confidential information of write duplication and the path of the file of stickup, complete the operation of the duplication to file destination.
As monitored user, file destination is carried out shearing manipulation, then generate and shear instruction, from being sheared file place dish Data base under Fu reads and replicates the mark confidential information of this shearing file, and the data base under the file place drive pasted This mark confidential information of write duplication and the path of the file of stickup, delete simultaneously and be sheared the data base under the drive of file place In the mark confidential information of this shearing file;Complete the shearing manipulation to file destination.
As monitored user, file destination is carried out deletion action, then generate and delete instruction, from deleted file place dish Data base under Fu deletes the mark confidential information of this deleted file, completes the shearing manipulation to file destination.
By monitoring user's operation to file, generate the instruction corresponding to user operation, to the file place operated In database file under drive the mark confidential information of storage performs write, read, revise, replicate, paste, deletion etc. operates, from And the mark confidential information of this document will not be lost when making file be moved into any position.
With other application systems, such as with the use of mailing system, Subscriber Management System or other file need to be marked Close operation, mark ciphertext part and file level of confidentiality are carried out the system of management and control.The close system of files-designated provides integrated interface, and other apply system System can use files-designated decryption method file to be marked close and mark ciphertext part and the management and control of level of confidentiality, obtains and mark close work by interface Tool information, mark close grade and file download is set.Other application systems can carry out file by ChooseDownloadDir method Downloading, the files-designated confidential information after download will not be lost.
System close with files-designated with the use of mailing system use tower management, for non-flat structure, can be to transmission The mail received carries out security classification settings, addressee and sender is carried out security classification settings, configures corresponding approval process, supervises transfer Daily record, to nonstandard close file content audits and compliance, copies to the data base of storage mark confidential information by the full text of transmission file, to concerning security matters, Classified papers are taked behavior audits and compliance, record to transmit behavior and are marked the data base of confidential information to storage, for relevant personnel inquiry, thus shut out The unordered diffusion of file absolutely.Mailing system, by IE control and the close instrument communication of mark, to access security level identification information, is only marked Close file could be uploaded as adnexa and send;During security documents system start-up the most locked, other processes cannot access, anti- Only mark confidential information is accessed by other processes and distorts.Mark close instrument can make with authorized third party application by open interface With, to obtain or to arrange mark confidential information.
The close system of files-designated can provide to other application systems and mark close record of the audit, and the close system of files-designated passes through http protocol Information is transmitted by the Web address calling other application systems, and reception audit information is carried out record by other application systems.
Those skilled in the art is under conditions of the spirit and scope of the present invention determined without departing from claims, also Above content can be carried out various amendment.Therefore the scope of the present invention is not limited in above explanation, but by The scope of claims determines.

Claims (8)

1. the close system of files-designated, is equipped on operating system platform, it is characterised in that include DBM, mark close Module and relating module;
This DBM creates database file under each drive of hard disc of computer, this database file store files quilt Mark close time, by the filename of mark ciphertext part, by the file full path footpath of mark ciphertext part and file level of confidentiality;
This relating module associates with this operating system, monitors user's operation to file, generates the operation of file according to user This instruction is also transmitted to the close module of this mark by command adapted thereto;
The close module of this mark receives the instruction of this relating module transmission, create this DBM according to this instruction and this use The file of the database file storage under the drive that the operation at family is relevant is marked close time, by the mark filename of ciphertext part, quilt File full path footpath and the file level of confidentiality of mark ciphertext part carry out corresponding operating;
Wherein, this relating module includes data obtaining module and directive generation module;
This data obtaining module calls API and monitors user's operation to file, obtains the filename of file operated by user, literary composition Part path, user are to the action type of file operation and operating time;
This directive generation module generates corresponding instruction according to the action type that this data obtaining module obtains;
The operation of file is included by described user: the user close operation of mark, duplication operation, shearing manipulation and deletion behaviour to file Make;This directive generation module generates the close instruction of mark, duplicate instructions, shearing instruction accordingly, deletes instruction;
The close module of this mark:
According to the close instruction of this mark to by the data base's write under the drive of mark ciphertext part place or the mark confidential information of amendment this document;
From the data base being replicated the drive of file place, read and replicate this mark being replicated file according to duplicate instructions close Information, and to paste file place drive under data base write this mark confidential information of duplication and the road of the file of stickup Footpath;
Read and replicate the mark confidential information of this shearing file from the data base being sheared the drive of file place according to shearing instruction, And the data base under the file place drive pasted writes this mark confidential information of duplication and the path of the file of stickup, simultaneously Delete the mark confidential information of this shearing file being sheared in the data base under the drive of file place;
According to deleting the mark confidential information deleting this deleted file in instruction data base from the drive of deleted file place.
The close system of files-designated the most according to claim 1, it is characterised in that the close module of this mark according to the close instruction of this mark to quilt Data base's write or the mark confidential information of amendment this document under mark ciphertext part place drive farther include: the close module of this mark to Family provides alternative file level of confidentiality, obtains the file level of confidentiality of user's actual selection, file level of confidentiality write user selected By the data base under the drive of mark ciphertext part place.
The close system of files-designated the most according to claim 2, it is characterised in that what the close module of this mark provided a user with is available for choosing The file level of confidentiality selected is not higher than user's level of confidentiality.
The close system of files-designated the most according to claim 1, it is characterised in that the close system of this document mark also includes that user logs in Module, this user log-in block provides a user with log-in interface, reads the user name of user's input, obtains user's level of confidentiality, will use Name in an account book and user's level of confidentiality are transmitted to the close module of this mark.
5. a files-designated decryption method, it is characterised in that the method includes:
Under each drive of hard disc of computer, create database file store files marked close time, literary composition by mark ciphertext part Part name, by the mark file full path footpath of ciphertext part and file level of confidentiality;
Monitoring user's operation to file, generates corresponding instruction according to user to the operation of file;
Close time, quilt is marked according to the file that the database file under the drive relevant to this user operation is stored by this instruction Mark the filename of ciphertext part, operated by file full path footpath and the file level of confidentiality of mark ciphertext part;
Wherein, described monitoring user's operation to file, according to user, file is operated the corresponding step instructed of generation and enter One step includes: calls API and monitors user's operation to file, obtain the filename of file operated by user, file path with And the action type that user is to file operation, generate corresponding instruction according to the action type obtained;
Described user includes the close operation of the mark to file, replicates operation, shearing manipulation and deletion action the operation of file;Institute State corresponding instruction to include marking close instruction, duplicate instructions, shearing instruction, deleting instruction;
The described mark confidential information stored the database file under the drive relevant to this user operation according to this instruction is grasped The step made farther includes:
According to the close instruction of this mark to by the data base's write under the drive of mark ciphertext part place or the mark confidential information of amendment this document;
From the data base being replicated the drive of file place, read and replicate this mark being replicated file according to duplicate instructions close Information, the data base under the file place drive pasted writes this mark confidential information of duplication and the path of the file of stickup;
Read and replicate the mark confidential information of this shearing file from the data base being sheared the drive of file place according to shearing instruction, And the data base under the file place drive pasted writes this mark confidential information of duplication and the path of the file of stickup, simultaneously Delete the mark confidential information of this shearing file being sheared in the data base under the drive of file place;
According to deleting the mark confidential information deleting this deleted file in instruction data base from the drive of deleted file place.
Files-designated decryption method the most according to claim 5, it is characterised in that described according to the close instruction of this mark to by mark ciphertext Data base's write or the step of the mark confidential information of amendment this document under the drive of part place farther include: provide a user with and be available for The file level of confidentiality selected, obtains the file level of confidentiality of user's actual selection, and file level of confidentiality write user selected is by mark ciphertext part Data base under the drive of place.
Files-designated decryption method the most according to claim 6, it is characterised in that described in provide a user with alternative file Level of confidentiality is not higher than user's level of confidentiality.
Files-designated decryption method the most according to claim 5, it is characterised in that monitoring user's operation to file, according to User also includes before file operates the step generating corresponding instruction: provide a user with login interface, reads user and steps on The user name of input during record, obtains user's level of confidentiality.
CN201110320966.XA 2011-07-28 2011-10-20 The close system of files-designated and files-designated decryption method Expired - Fee Related CN102902931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110320966.XA CN102902931B (en) 2011-07-28 2011-10-20 The close system of files-designated and files-designated decryption method

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2011102144564 2011-07-28
CN201110214456.4 2011-07-28
CN201110214456 2011-07-28
CN201110320966.XA CN102902931B (en) 2011-07-28 2011-10-20 The close system of files-designated and files-designated decryption method

Publications (2)

Publication Number Publication Date
CN102902931A CN102902931A (en) 2013-01-30
CN102902931B true CN102902931B (en) 2016-12-14

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826964A (en) * 2010-04-02 2010-09-08 无锡华御信息技术有限公司 Outgoing document security management system supporting collaboration
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826964A (en) * 2010-04-02 2010-09-08 无锡华御信息技术有限公司 Outgoing document security management system supporting collaboration
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
涉密信息系统内电子文件密级标志的需求与应用分析;耿伟;《学术交流》;20110310(第3期);第45-49页 *
电子文件密级标志相关技术浅析;李梅梅;《研究所专栏》;20110510(第5期);第31-34页 *
电子文件密级管理系统的关键技术与设计;王文宇等;《学术研究》;20091010(第10期);第113-117页 *

Similar Documents

Publication Publication Date Title
US10079789B2 (en) Shared attachments
US10242225B2 (en) Systems and methods for facilitating relationship management
CN102193899B (en) System and method for the data of the multiple environment of management spanning
CN103078881B (en) Internet resources Download Info share control system and method
AU2012323244B2 (en) Systems and methods for controlling access to content distributed over a network
CN108111585A (en) Distributed storage method based on block chain
CN101043519B (en) Network storage system
US9712510B2 (en) Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform
US20120173633A1 (en) Email conversation management support
US20150326512A1 (en) Message transmission system and method for a structure of a plurality of organizations
EP4293529A2 (en) Apparatuses, methods, and computer program products for data retention in a common group-based communication channel
US20140222478A1 (en) Method and system for creating and managing schedule on basis of social network
US10645066B2 (en) Rights controlled communication
CN103108009B (en) File sharing method based on off-line space and device
CN109005058A (en) A kind of intelligence system control platform and management-control method
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN104504079B (en) A kind of picture and text file data outgoing method based on PDM
CN102780721A (en) Picture sharing method and picture sharing device for network albums
CN110334068A (en) A kind of organizing cooperating's implementation method, apparatus and system
KR20100059185A (en) System and method for transferring encrypted document
CN104657677A (en) File encryption method based on alternate data streams
CN101005643A (en) Personal comprehensive network service and information system facing mobile terminal customer
US20150327064A1 (en) Message transmission system and method for a structure of a plurality of organizations
CN109274809A (en) Address list creation method, device, terminal and storage medium
CN102902931B (en) The close system of files-designated and files-designated decryption method

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161214

Termination date: 20191020