CN103268458A - Take-away equipment as well as processing method, device and system thereof - Google Patents
Take-away equipment as well as processing method, device and system thereof Download PDFInfo
- Publication number
- CN103268458A CN103268458A CN2013102298237A CN201310229823A CN103268458A CN 103268458 A CN103268458 A CN 103268458A CN 2013102298237 A CN2013102298237 A CN 2013102298237A CN 201310229823 A CN201310229823 A CN 201310229823A CN 103268458 A CN103268458 A CN 103268458A
- Authority
- CN
- China
- Prior art keywords
- tyre
- browser
- tape file
- carrying device
- described outer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides take-away equipment as well as a processing method, device and system thereof. The method comprises the following steps of: starting a take-away browsing tool in the take-away equipment, wherein take-away files are carried in the take-away equipment; and judging whether the take-away files can be operated through the take-away browsing tool, if so, and executing the operation of the take-away files through the take-away browsing tool. Through the take-away equipment as well as the processing method, device and system thereof provided by the invention, the problem that the management and protection of take-away some confidential and secret files in the correlation technique are relatively weak is solved, the security control of the whole take-away life cycle of the secret files is realized, and the audit effect of file operation logs is improved at some extent.
Description
Technical field
The present invention relates to communication and field of storage, in particular to a kind of tyre device processes method, Apparatus and system, outer carrying device.
Background technology
Adopt the office of electronic document form more and more widely, electronic document becomes the constituent parts valuable source already, becomes the important form of secret, secret information.In order to prevent that effectively important documents such as secret, secret from divulging a secret, many enterprises and institutions take the form of concentrated management and control or storage to important documents such as secret, secrets in management.But along with popularizing and the increase of mobile office demand of electronic document, electronic document needs also to be increased by demand in addition thereupon.Yet in correlation technique, adopt the administration means management in addition mostly for the concerning security matters electronic document, lack the technological means management; Particularly break away under the state of network at the disengaging built-in system, can't carry out the daily record audit for the operation of tyre document, also just can't guarantee safe electronic document management and the protection of aspect in addition of security files in addition; If document is could the normal running document after need the deciphering by means of other instruments toward contact of ciphertext in addition.Therefore, in correlation technique during for the tyre of some secrets, secret document management and protection just seem weak many comparatively speaking.
Summary of the invention
The invention provides a kind of tyre device processes method, Apparatus and system, outer carrying device, the problem when solving in the correlation technique tyre for some secrets, secret document at least a little less than management and the protection relative thin.
According to an aspect of the present invention, provide a kind of tyre device processes method, having comprised: started the tyre browser in the described outer carrying device, wherein, carry outer tape file in the described outer carrying device; Judging whether can be by the operation of described tyre browser execution to described outer tape file; Be under the situation that is in judged result, carry out operation to described outer tape file by described tyre browser.
Preferably, after the operation of carrying out by described tyre browser tape file outside described, also comprise: to carry out the operation note Operation Log to described outer tape file by described tyre browser.
Preferably, the described tyre browser that starts in the described outer carrying device comprises: described outer carrying device is inserted computing machine; The zone of depositing described tyre browser in the described outer carrying device is mapped to the read-only optical disc CDROM of described computing machine; Start described tyre browser among the described CDROM according to the driving of described computing machine.
Preferably, after the operation of carrying out by described tyre browser tape file outside described, also comprise: tape file and/or described Operation Log outside client upload is described; Described outer carrying device is carried out initialization to empty.
Preferably, before the described tyre browser outside startup is described in the carrying device, also comprise: the operating right that receives described outer tape file and described outer tape file is operated.
According to a further aspect in the invention, provide a kind of tyre device processes device, having comprised: started module, be used for starting the tyre browser of described outer carrying device, wherein, carry outer tape file in the described outer carrying device; Judge module, being used for judging whether can be by the operation of described tyre browser execution to described outer tape file; Execution module, being used in judged result is under the situation that is, by the operation of described tyre browser execution to described outer tape file.
Preferably, this device also comprises: logging modle is used for carry out the operation note Operation Log to described outer tape file by described tyre browser.
Preferably, described startup module comprises: access unit is used for described outer carrying device is inserted computing machine; Map unit is used for the zone that described outer carrying device is deposited described tyre browser is mapped to the read-only optical disc CDROM of described computing machine; Start unit is for the described tyre browser that starts described CDROM according to the driving of described computing machine.
Preferably, this device also comprises: go up transmission module, be used for tape file and/or described Operation Log outside client upload is described; Empty module, be used for that described outer carrying device is carried out initialization and empty.
Preferably, this device also comprises: receiver module is used for the operating right that receives described outer tape file and described outer tape file is operated.
According to another aspect of the invention, a kind of outer carrying device is provided, comprise above-mentioned each described device, the storage space of described outer carrying device comprise following one of at least: be used for depositing the CD district of browser in addition, for the hidden area of depositing outer tape file, the private area that is used for the deposit operation daily record, for the key district of depositing the key that carries out authentication, and standby storage space.
According to also one side of the present invention, a kind of tyre device processes system is provided, except comprising above-mentioned each described device, also comprise: client and service end: described client, the application that is used for external tape file is examined, described outer tape file after examining is write described outer carrying device, and when execution is reclaimed function in addition, described outer tape file is reclaimed; Described service end is used for generating described outer tape file, and the life cycle of described outer tape file is followed the tracks of.
By the present invention, adopt the tyre browser that starts in the described outer carrying device, wherein, carry outer tape file in the described outer carrying device; Judging whether can be by the operation of described tyre browser execution to described outer tape file; Be under the situation that is in judged result; by the operation of described tyre browser execution to described outer tape file; problem when having solved in the correlation technique tyre for some secrets, secret document a little less than management and the protection relative thin; not only realized the security control to security files whole life in addition, and the perfect to a certain extent effect of document function daily record audit.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not constitute improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram according to the tyre device processes method of the embodiment of the invention;
Fig. 2 is the structured flowchart according to the tyre device processes device of the embodiment of the invention;
Fig. 3 is the preferred structure block diagram one according to the tyre device processes device of the embodiment of the invention;
Fig. 4 a is according to the preferred structure block diagram one that starts module 22 in the tyre device processes device of the embodiment of the invention;
Fig. 4 b is according to the preferred structure block diagram two that starts module 22 in the tyre device processes device of the embodiment of the invention;
Fig. 5 is the preferred structure block diagram two according to the tyre device processes device of the embodiment of the invention;
Fig. 6 is the preferred structure block diagram three according to the tyre device processes device of the embodiment of the invention;
Fig. 7 is the structured flowchart according to the outer carrying device of the embodiment of the invention;
Fig. 8 is the structured flowchart according to the tyre device processes system of the embodiment of the invention;
Fig. 9 is at home and abroad with the process flow diagram of application according to the outer tape handling of the electronic document of the embodiment of the invention;
Figure 10 is at home and abroad with the process flow diagram of generation according to the outer tape handling of the electronic document of the embodiment of the invention;
Figure 11 is at home and abroad with the process flow diagram of use according to the outer tape handling of the electronic document of the embodiment of the invention;
Figure 12 is the process flow diagram that receipts are taken back in outer tape handling at home and abroad according to the electronic document of the embodiment of the invention;
Figure 13 is the tyre movable storage device storage space synoptic diagram according to the embodiment of the invention.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
A kind of tyre device processes method is provided in the present embodiment, and Fig. 1 is that as shown in Figure 1, this flow process comprises the steps: according to the process flow diagram of the tyre device processes method of the embodiment of the invention
Step S102 starts the tyre browser in the outer carrying device, wherein, carries outer tape file in this outer carrying device;
Step S104 judges whether to carry out by the tyre browser operation of external tape file;
Step S106 is under the situation that is in judged result, by the operation of this tyre browser execution to above-mentioned outer tape file.
Pass through above-mentioned steps; realize the operation of external tape file (or tyre document) by the tyre browser in the outer carrying device; not only can be in the operation that does not have to realize under the situation of network external tape file; and; has only the operation that realizes external tape file by the tyre browser of tyre equipment self; effectively the safety of tyre document has been carried out favourable protection; not only solved in the correlation technique for some secrets; management and the weak problem of protection relative thin during the tyre of secret document, and realized security control to security files whole life in addition.
In order to improve the effect of document function daily record audit, after carrying out the operation of external tape file by the tyre browser, also comprise: to carry out the operation note Operation Log of external tape file by the tyre browser, wherein, comprise by browsing in addition the operation note that work operates this outer tape file: the external performed operation of tape file itself, for example, what externally tape file carried out reads, write operation etc., also comprise the operation performed to the tyre browser, for example, logining of browser published etc. in addition, also comprises other operation that other is relevant with flow process certainly.
The tyre browser that starts in the outer carrying device can adopt multiple processing mode, for example, can directly start in the carrying device outside this, and wherein, should need to carry the start-up routine that can start this tyre browser in the outer carrying device this moment.Preferably, also can start by the mode that inserts outer computer, for example, can will should insert computing machine by outer carrying device, more preferably, can be after being linked into computing machine, the user's that carries out access operation identity is authenticated, (for example, can carry out the authentication of a pin sign indicating number to user identity earlier); The zone of depositing the tyre browser in the outer carrying device is mapped to the read-only optical disc CDROM of computing machine; According to the tyre browser among the driving startup CDROM of computing machine.Because read-only optical disc can only read, can not carry out other operation, therefore, the purpose that cracks is not distorted by the system that reached, and has realized the security control of external carrying device system itself to a certain extent.
For the outer tape file of strictness control is not divulged a secret, after carrying out the operation of external tape file by the tyre browser, can also be outside client upload tape file and/or Operation Log; External carrying device carries out initialization and empties.Be that external tape file and/or corresponding Operation Log reclaim, need to prove that before externally tape file reclaimed, the outer carrying device that also can first to file reclaims carried out verification, to determine this outer carrying device or its user's identity information.After tape file is finished outside uploading, can also carry out once complete emptying to this outer carrying device, to guarantee can not carry any classified information in the outer carrying device.
More preferably, to the operating right of this outer tape file, can receive the operating right that outer tape file and external tape file are operated outside starting this before tyre browser in carrying device for clearly.
A kind of tyre device processes device also is provided in the present embodiment, and this device is used for realizing above-described embodiment and preferred implementation, had carried out repeating no more of explanation.As used below, the combination of software and/or the hardware of predetermined function can be realized in term " module ".Although the described device of following examples is preferably realized with software, hardware, perhaps the realization of the combination of software and hardware also may and be conceived.
Fig. 2 is the structured flowchart according to the tyre device processes device of the embodiment of the invention, and as shown in Figure 2, this device comprises startup module 22, judge module 24 and execution module 26, below this device is described.
Start module 22, be used for starting the tyre browser of outer carrying device, wherein, carry outer tape file in this outer carrying device; Judge module 24 is connected to above-mentioned startup module 22, is used for judging whether to carry out by the tyre browser operation of external tape file; Execution module 26 is connected to above-mentioned judge module 24, and being used in judged result is under the situation that is, carries out the operation of external tape file by the tyre browser.
Fig. 3 is the preferred structure block diagram one according to the tyre device processes device of the embodiment of the invention, and as shown in Figure 3, this device also comprises logging modle 32 except comprising all modules shown in Figure 2, below this logging modle 32 is described.
Logging modle 32 is used for carry out the operation note Operation Log to this outer tape file by the tyre browser.
Fig. 4 a is that shown in Fig. 4 a, this startup module 22 comprises access unit 42, map unit 44 and start unit 46, below this startup module 22 is described according to the preferred structure block diagram one that starts module 22 in the tyre device processes device of the embodiment of the invention.
Access unit 42 is used for outer carrying device is inserted computing machine; Map unit 44 is connected to above-mentioned access unit 42, is mapped to the read-only optical disc CDROM of computing machine for the zone of outer carrying device being deposited the tyre browser; Start unit 46 is connected to above-mentioned map unit 44, is used for starting according to the driving of computing machine the tyre browser of CDROM.
Fig. 4 b is according to the preferred structure block diagram two that starts module 22 in the tyre device processes device of the embodiment of the invention, shown in Fig. 4 b, this startup module 22 can also comprise authentication ' unit 40 except comprising all modules shown in Fig. 4 a, below this authentication ' unit 40 is described.
Authentication ' unit 40, be connected to above-mentioned access unit 42 and map unit 44, be used for after outer carrying device is inserted computing machine, identity to the user that carries out access operation authenticates, for example, can be by moving this authentication ' unit 40 of a program start that outer carrying device itself carries, authentication ' unit 40 may need the user that relevant informations such as password are provided, thereby user identity is done an authentication.Need to prove that the mode of authentication also can be multiple, for example, carrying device inserts after the computing machine outside, and user identity is carried out the authentication of a pin sign indicating number, and after authentication was passed through, the user could operate the confidential data in the outer carrying device.
Fig. 5 is the preferred structure block diagram two according to the tyre device processes device of the embodiment of the invention, as shown in Figure 3, this device comprises that also this device also comprises except comprising all modules shown in Figure 2: go up transmission module 52 and empty module 54, below this device is described.
Last transmission module 52 is connected to above-mentioned execution module 26, is used for tape file and/or Operation Log outside client upload; Empty module 54, be connected to the above-mentioned transmission module 52 of going up, carry out initialization for external carrying device and empty.
Fig. 6 is the preferred structure block diagram three according to the tyre device processes device of the embodiment of the invention, and as shown in Figure 6, this device also comprises receiver module 62 except comprising all modules shown in Figure 2, below this receiver module 62 is described.
Receiver module 62 is connected to above-mentioned startup module 22, is used for the operating right that the outer tape file of reception and external tape file are operated.
Fig. 7 is the structured flowchart according to the outer carrying device of the embodiment of the invention, as shown in Figure 7, should comprise above-mentioned each described tyre device processes device 72 by outer carrying device 70, wherein, storage space that should outer carrying device comprise following one of at least: be used for depositing the CD district of browser in addition, be used for the hidden area of depositing outer tape file, for the private area of deposit operation daily record, for the key district of depositing the key that carries out authentication, and standby storage space.
Fig. 8 is the structured flowchart according to the tyre device processes system of the embodiment of the invention, as shown in Figure 8, this is device processes system 80 in addition, except comprise above-mentioned each tyre device processes device 72(or claim memory device 72 in addition), also comprise: client 82 and service end 84 describe this system below.
Client 82 is connected to above-mentioned tyre device processes device 72, and the application that is used for external tape file is examined, and the outer tape file after examining is write outer carrying device, and when execution was reclaimed function in addition, externally tape file reclaimed; Service end 84 is connected to above-mentioned client 82, is used for generating outer tape file, and externally the life cycle of tape file is followed the tracks of.By mutually mutual security control and the audit that realizes for the tyre electronic document between the above-mentioned three, wherein memory device can detachment system in addition for hardware, does not externally have under the network environment and uses separately.
Providing a kind of in this preferred embodiment is carrying device and related system thereof outside the electronic document of medium with the movable storage device, by the transparent encryption and decryption to the tyre document, the control of document function authority, and the audit of document function daily record reaches security control and audit for the whole tyre life cycle of concerning security matters electronic document.By above-mentioned processing, the tyre of these concerning security matters electronic documents of can managing safely and effectively and audit.
At mobile office demand in the correlation technique, providing a kind of in the present embodiment is the electronic document storage medium with the mobile device, cooperates relevant control, auditing method, thereby forms cover electronic document management system in addition.Can realize the safety management of security files from applying for that in addition concrete use operation is reclaimed this whole tyre life cycle to last document more in addition by this method.Should be used for a control and audit cover management method of electronic document in addition, can be supported under the net environment, various operation behaviors to document are audited, and can recycle audit log and tyre document, realization is by the control of authority restriction operation to the tyre document, and do not rely on system outside the external charged subdocument of instrument and operate and carry out transparent encryption and decryption.
Fig. 9 is that as shown in Figure 9, this flow process comprises the steps: according to tape handling is at home and abroad with the process flow diagram of application outside the electronic document of the embodiment of the invention
Step S902, the applicant initiates application in addition to client;
Step S904, the client (being called first client herein) that receives application is in addition selected document in addition, is the tyre document setup operating right of selecting;
Step S906, this first client is initiated application in addition to service end;
Step S908, Administrator Client's (being called second client herein) of service end notice management first client examines applying in addition;
Step S910, this second client applies for examining to this in addition, then auditing result is fed back to service end;
Step S912, this service end sends to first client with the auditing result of feedback;
Step S914, applicant insert outer carrying device, and this first client generates in addition according to the auditing result that receives.
The applicant selects needed document by client, and the document function authority is set, and USB flash disk authentication pin sign indicating number in addition is set, and forms one and applies for that in addition request sends to service end.The tyre application process template that service end is good according to configured in advance, the relevant person approving of notice applies for examining to this by client in addition.After the person approving examined end, the applicant obtained the auditing result of service end feedback.If audit by could insert in addition USB flash disk, generate in addition by client.
Figure 10 is that as shown in figure 10, this flow process comprises the steps: according to tape handling is at home and abroad with the process flow diagram of generation outside the electronic document of the embodiment of the invention
Step S1002 when client inserts the tyre mobile device, generates beginning the applicant in addition;
Step S1004, client initialization mobile device storage space imports browser relative program in addition;
Step S1006, client is obtained the tyre relevant information that needs generation;
Step S1008, client is obtained this file permission and file content in addition to service end;
Step S1010, whether service end verification client identity and file permission content be correct;
Step S1012, service end is to client verification succeeds backspace file authority and file content;
Step S1014 imports file permission;
Step S1016 imports file content.
Generate outer carrying device, outer carrying device need be inserted the terminal that the native system client is installed, and this terminal needs the Connection Service device.Operated client on this terminal is chosen and can be generated task in addition through examining, and generates mobile device in addition.In the process that generates, client can be obtained this outer carrying device and applicant's relevant information earlier.Then these information are delivered to service end, bring in verification applicant identity by service, information such as tyre device id, thus avoid unique personage's operation technique means to pretend to be situations such as applicant or the illegal outer carrying device of use to occur.Service end is delivered to client with file permission and file content after finishing verification.After client receives these contents, write file permission earlier, write file content again, guarantee that can not write not congruent situation because of file permission causes file by illegal operation.
Figure 11 is that as shown in figure 11, this flow process comprises the steps: according to tape handling is at home and abroad with the process flow diagram of use outside the electronic document of the embodiment of the invention
Step S1102 starts management tool in addition;
Step S1104, the file management instrument shows login interface in addition;
Step S1106 receives the authentication PIN code that tyre person imports;
Step S1108, the file management instrument is verified PIN code in addition;
Step S1110, file management instrument display navigation tools interfaces in addition;
Step S1112, tyre person carries out the operation of opening outer tape file;
Step S1114, file management tool operation file in addition;
Step S1116, the file management instrument generates file operation daily record in addition in addition.
Outer carrying device can be installed some equipment related driver programs after inserting computing machine, and understands many carries come out a CD drive and a mobile storage disk in computing machine " my computer ".These two drivers are zone corresponding in the outer carrying device to be mapped to insert in the computing machine.The mobile storage disk is a common mobile storage disk before not logining the tyre browser, and the user can deposit any document inside, and these documents are not controlled by native system.What deposit in the CD drive is this outer carrying device some relevant program files of browser in addition, and the form that the user can select manually to move or play automatically CD starts browser in addition.After browser starts in addition, will need the user to import a pin sign indicating number and do authentication.Authentification failure then can't use this tyre browser, also just can't operate the confidential document in this outer carrying device.To eject in addition browser master interface behind the authentication success, the user can see this All Files in addition on this interface, and relevant information such as file permission.By the tyre browser, operate these files.No matter be in the process of operation file (for example, the reading and writing of file, printing etc.) still operation in addition in the process of browser (for example, the logining of browser, publish, password input error etc.), outer carrying device is real-time policer operation process, and preserves with the form of daily record.
Figure 12 is the process flow diagram that receipts are taken back in outer tape handling at home and abroad according to the electronic document of the embodiment of the invention, and as shown in figure 12, this flow process comprises the steps:
When step S1202, applicant insert outer carrying device in client, reclaim in addition and begin;
Step S1204, client is collected information such as outer tape file and Operation Log;
Step S1206, client is to information such as service end upload operation daily records;
Step S1208, service end is handled in addition and is reclaimed, and relevant information is gone into database;
Step S1210, service end reclaims successfully to client feedback;
Step S1212, client empties outer carrying device.
Reclaiming function need carry out at a computing machine that the native system client has been installed, and this computing machine need connect the native system service end.Only need the user to insert memory device in addition when reclaiming, the tyre that starts client reclaims function.The tyre facility information that client is obtained the user earlier and will be recovered sends to service end and does verification for the first time, and determining should outer carrying device and recovery people identity.Client begins recovery operation after receiving the response of service end, at first client earlier the file data in the outer carrying device is derived and on pass service end back, and then the journal file in the outer carrying device derived upload to service end.Service end complete receive needed theory have reclaim content after, client can be done once complete initialization to establishing in addition.Guarantee can not leave over down classified information in the outer carrying device.
Figure 13 is the tyre movable storage device storage space synoptic diagram according to the embodiment of the invention, as shown in figure 13, this tyre movable storage device storage space comprises: KEY district, private area, hidden area, general area and CD district describe this movable storage device (hardware) below.
Movable storage device is the final carrier of tyre document in the native system in addition, and this equipment will be divided into these several zones of mobile device KEY district, private area, hidden area, general area and CD district.In addition the user of movable storage device can only see general area and CD district, and other zones are because relate to security files or audit log has been done hiding processing.
Mobile device KEY district, this district adopts independent safe storage chip, and external interface is not provided, and the user is hidden.Be mainly used in user's pin sign indicating number authentication, guarantee that movable storage device can not usurped by the stranger in addition.
Private area is used for the audit log behind the storage encryption, and the authority configuration documentation.This zone hides for the user, and the user can't revise this area data.
The hidden area is used for storage electronic document in addition, and this zone hides for the user.And by the transparent encryption and decryption technology of kernel level the reading and writing data of one's respective area is carried out encryption and decryption, the encryption and decryption key is that seed generates at random with user pin sign indicating number, and assurance can't be walked around the tyre electronic document after the control of browser obtains deciphering in addition.
General area just as external memory device the same, arbitrarily use for the user.The CD district adopts the virtual map technology that the movable storage device memory headroom of part is mapped as CDROM, is used for depositing the document browsing instrument of movable storage device in addition.Because CDROM is read-only can not writing, and has so just realized the protection for native system self program.The technology personage that the program that guaranteed can not had ulterior motives revises, thereby has guaranteed its security control for security files.
The user operates the tyre electronic document and can only realize by this unique interface of tyre document browsing instrument that the tyre movable storage device carries.The user has only earlier could normally use document browsing instrument in addition by pin sign indicating number authentication login.The document browsing instrument can be according to the operation of authority configurable limit user to the tyre document in addition, and for example, restricted document is printed, restricted document modification etc.In the process of document function in addition the document browsing instrument can note such as document open, relevant audit logs such as document modification, document printing.
The tyre memory device is carried out when operating in addition, also comprised mutual with client and service end respectively client and service end being described below.
Client mainly is divided into two big modules.One is the functional interface module mutual with service end, comprises flow process application in addition, and flow process audit is in addition reclaimed in addition.Another is the functional module mutual with the tyre movable storage device, is used for operation each functional areas of movable storage device in addition.
Service end will record all tyre tasks that comprise application stage and tyre stage, and these tasks are in addition dispatched in unified management.According to configured strategy, service end can be followed the tracks of the whole life of task in addition.The keeper can clearly understand, and each is the concrete condition of any moment point of task in addition.Service end also will be the open tyre daily record audit function that has reclaimed of keeper on the basis of supporting each function of tyre in addition.For the document function of any tyre task, login situation etc. the daily record record is arranged.The keeper can check various Operation Logs, and to daily record inquire about, operation such as deletion.
By above-described embodiment and preferred implementation, by tyre document function authority is controlled, safety to the tyre storage medium is controlled, data to kernel level are carried out transparent encryption and decryption, and carry out record in the daily record to the tyre document function under net state, not only realized the security control to the security files whole life, and perfect to a certain extent document function daily record audit.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and be carried out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (12)
1. a tyre device processes method is characterized in that, comprising:
Start the tyre browser in the described outer carrying device, wherein, carry outer tape file in the described outer carrying device;
Judging whether can be by the operation of described tyre browser execution to described outer tape file;
Be under the situation that is in judged result, carry out operation to described outer tape file by described tyre browser.
2. method according to claim 1 is characterized in that, after the operation of carrying out by described tyre browser tape file outside described, also comprises:
To carry out the operation note Operation Log to described outer tape file by described tyre browser.
3. method according to claim 1 is characterized in that, the described tyre browser that starts in the described outer carrying device comprises:
Described outer carrying device is inserted computing machine;
The zone of depositing described tyre browser in the described outer carrying device is mapped to the read-only optical disc CDROM of described computing machine;
Start described tyre browser among the described CDROM according to the driving of described computing machine.
4. according to each described method in the claim 1 to 3, it is characterized in that, after the operation of carrying out by described tyre browser tape file outside described, also comprise:
Tape file and/or described Operation Log outside client upload is described;
Described outer carrying device is carried out initialization to empty.
5. according to each described method in the claim 1 to 3, it is characterized in that, before the described tyre browser outside startup is described in the carrying device, also comprise:
The operating right that receives described outer tape file and described outer tape file is operated.
6. a tyre device processes device is characterized in that, comprising:
Start module, be used for starting the tyre browser of described outer carrying device, wherein, carry outer tape file in the described outer carrying device;
Judge module, being used for judging whether can be by the operation of described tyre browser execution to described outer tape file;
Execution module, being used in judged result is under the situation that is, by the operation of described tyre browser execution to described outer tape file.
7. device according to claim 6 is characterized in that, also comprises:
Logging modle is used for carry out the operation note Operation Log to described outer tape file by described tyre browser.
8. device according to claim 6 is characterized in that, described startup module comprises:
Access unit is used for described outer carrying device is inserted computing machine;
Map unit is used for the zone that described outer carrying device is deposited described tyre browser is mapped to the read-only optical disc CDROM of described computing machine;
Start unit is for the described tyre browser that starts described CDROM according to the driving of described computing machine.
9. according to each described device in the claim 6 to 8, it is characterized in that, also comprise:
Last transmission module is used for tape file and/or described Operation Log outside client upload is described;
Empty module, be used for that described outer carrying device is carried out initialization and empty.
10. according to each described device in the claim 6 to 8, it is characterized in that, also comprise:
Receiver module is used for the operating right that receives described outer tape file and described outer tape file is operated.
11. an outer carrying device is characterized in that, comprises each described device in the claim 6 to 10, the storage space of described outer carrying device comprise following one of at least:
Be used for depositing the CD district of browser in addition, for the hidden area of depositing outer tape file, be used for the private area of deposit operation daily record, for the key district of depositing the key that carries out authentication, and standby storage space.
12. a tyre device processes system is characterized in that, each described device, also comprises client and service end in comprising claim 6 to 10:
Described client, the application that is used for external tape file is examined, and the described outer tape file after examining is write described outer carrying device, and when execution is reclaimed function in addition, described outer tape file is reclaimed;
Described service end is used for generating described outer tape file, and the life cycle of described outer tape file is followed the tracks of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102298237A CN103268458A (en) | 2013-06-08 | 2013-06-08 | Take-away equipment as well as processing method, device and system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102298237A CN103268458A (en) | 2013-06-08 | 2013-06-08 | Take-away equipment as well as processing method, device and system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103268458A true CN103268458A (en) | 2013-08-28 |
Family
ID=49012086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013102298237A Pending CN103268458A (en) | 2013-06-08 | 2013-06-08 | Take-away equipment as well as processing method, device and system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103268458A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108268794A (en) * | 2016-12-30 | 2018-07-10 | 珠海金山办公软件有限公司 | A kind of document security privileges of management system record and querying method and device |
CN108280360A (en) * | 2017-01-05 | 2018-07-13 | 珠海金山办公软件有限公司 | A kind of security document blog management method and server |
CN108280363A (en) * | 2017-01-05 | 2018-07-13 | 珠海金山办公软件有限公司 | A kind of document permission computational methods and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1952914A (en) * | 2006-10-13 | 2007-04-25 | 冯浩然 | A encryption U disk system with journal and audits |
US20080147558A1 (en) * | 2006-10-24 | 2008-06-19 | Robert Korbin Kraus | Method and system for providing prospective licensees and/or purchasers with access to licensable media content |
CN102073917A (en) * | 2009-11-19 | 2011-05-25 | 北京明朝万达科技有限公司 | Document approval process method with document authorization management capability |
CN102479296A (en) * | 2010-11-29 | 2012-05-30 | 公安部第一研究所 | Virus and Trojan prevention method for USB (Universal Serial Bus) flash disk data |
CN102609367A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | USB (Universal Serial Bus) flash disc system with safety control and audit |
-
2013
- 2013-06-08 CN CN2013102298237A patent/CN103268458A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1952914A (en) * | 2006-10-13 | 2007-04-25 | 冯浩然 | A encryption U disk system with journal and audits |
US20080147558A1 (en) * | 2006-10-24 | 2008-06-19 | Robert Korbin Kraus | Method and system for providing prospective licensees and/or purchasers with access to licensable media content |
CN102073917A (en) * | 2009-11-19 | 2011-05-25 | 北京明朝万达科技有限公司 | Document approval process method with document authorization management capability |
CN102479296A (en) * | 2010-11-29 | 2012-05-30 | 公安部第一研究所 | Virus and Trojan prevention method for USB (Universal Serial Bus) flash disk data |
CN102609367A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | USB (Universal Serial Bus) flash disc system with safety control and audit |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108268794A (en) * | 2016-12-30 | 2018-07-10 | 珠海金山办公软件有限公司 | A kind of document security privileges of management system record and querying method and device |
CN108280360A (en) * | 2017-01-05 | 2018-07-13 | 珠海金山办公软件有限公司 | A kind of security document blog management method and server |
CN108280363A (en) * | 2017-01-05 | 2018-07-13 | 珠海金山办公软件有限公司 | A kind of document permission computational methods and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7257717B2 (en) | Method with the functions of virtual space and data encryption and invisibility | |
US7725614B2 (en) | Portable mass storage device with virtual machine activation | |
US20130159699A1 (en) | Password Recovery Service | |
CN110136306B (en) | Vehicle key control method and system | |
CN100464313C (en) | Mobile memory device and method for accessing encrypted data in mobile memory device | |
CN102882923A (en) | Secure storage system and method for mobile terminal | |
CN101529366A (en) | Identification and visualization of trusted user interface objects | |
CN107992759A (en) | Realize device, method and the computer-readable recording medium of E-seal | |
CN101840471A (en) | Document right control method and device | |
CN100429668C (en) | Electronic file automatic protection method and system | |
CN110188555A (en) | A kind of hard disk data protection method, system and associated component | |
CN115277143A (en) | Data secure transmission method, device, equipment and storage medium | |
CN101639903A (en) | Method, device and system for stamping of electronic seal | |
CN104361297B (en) | A kind of file encryption-decryption method based on (SuSE) Linux OS | |
CN109388923B (en) | Program execution method and device | |
CN104778954A (en) | Optical disc partition encryption method and system | |
CN101002211A (en) | Data management method, program thereof, and program recording medium | |
CN102118503B (en) | Data protection method, device and terminal | |
CN103268458A (en) | Take-away equipment as well as processing method, device and system thereof | |
CN100595739C (en) | Method and system for accessing finance data | |
CN102592072A (en) | Directory service distributed product activation | |
CN101339589B (en) | Method for implementing information safety by dummy machine technology | |
JP2006172351A (en) | Method and system for content expiration date management by use of removable medium | |
CN103488755A (en) | File system access method and system | |
CN101901320A (en) | Data leakage prevention method for electronic book reader |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130828 |