CN103281302A - Management method and management system for realizing information security - Google Patents
Management method and management system for realizing information security Download PDFInfo
- Publication number
- CN103281302A CN103281302A CN2013101537457A CN201310153745A CN103281302A CN 103281302 A CN103281302 A CN 103281302A CN 2013101537457 A CN2013101537457 A CN 2013101537457A CN 201310153745 A CN201310153745 A CN 201310153745A CN 103281302 A CN103281302 A CN 103281302A
- Authority
- CN
- China
- Prior art keywords
- targeted customer
- management center
- center server
- source user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention provides a management method and a management system for realizing information security. The method comprises the following steps: a source user builds access limit information and transmits a call request to a management center server; after the management center server obtains a target user access right, the source user binds the target user access right and the access limit information and transmits a distributing policy request to a policy controller; the policy controller feeds back a distributing policy response to the source user; the source user transmits the bound target user access right and access limit information to the target user according to a distributing policy; and the target user processes the information after being certified by the management center server. The policy controller periodically counts the accident rate since the source user outwards transmits the information, and adjusts the useful life of the access limit information within a foreign authorization policy table in the management center server according to the accident rate and a useful life adjusting policy.
Description
Technical field
The invention belongs to network communication field, relate in particular to a kind of management method and system that realizes information security.
Background technology
In network communication field, the information safety protection of electronic document is a very important aspect.Current, need the scheme of highly effective badly for the information safety protection of electronic document.
Summary of the invention
The invention provides a kind of management method and system that realizes information security, to address the above problem.
The invention provides a kind of management method that realizes information security.Said method may further comprise the steps: source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request; After management center server obtained targeted customer's access rights, source user bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller, wherein, carried entity type information under the targeted customer in the distribution policy request; Strategy controller wherein, carries distribution policy in the distribution policy response to the response of source user feedback distribution policy; Source user is sent to the targeted customer according to distribution policy with targeted customer's access rights and the visit limited information of binding; The targeted customer handles described information after authenticating by management center server.Wherein, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.The cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
The present invention also provides a kind of management system that realizes information security, comprises source user, targeted customer, management center server, communication server and strategy controller.Management center server connects source user, targeted customer and strategy controller respectively.Communication server connects source user and targeted customer, and strategy controller connects source user and management center server.Source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.After management center server obtained targeted customer's access rights, source user bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller, wherein, carried entity type information under the targeted customer in the distribution policy request.Strategy controller wherein, carries distribution policy in the distribution policy response to the response of source user feedback distribution policy.Source user is sent to the targeted customer according to distribution policy with targeted customer's access rights and the visit limited information of binding.The targeted customer handles described information after authenticating by management center server.The accident rate that externally transmission information of strategy controller periodic statistics source user causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server according to accident rate and the term of validity.The cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.
Compared to prior art, management method and system according to realization information security provided by the invention, after management center server obtains targeted customer's access rights, source user is according to entity type under the targeted customer, obtain distribution policy from strategy controller, according to distribution policy, bound targets access privilege and visit limited information are sent to the targeted customer.So, realize the safety certification of information, thereby guaranteed information security.In addition, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.So, can adjust safeguard measure in real time according to actual conditions.In addition, the cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.So, avoid cpu load excessive, thereby guaranteed communication security.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not constitute improper restriction of the present invention.In the accompanying drawings:
Figure 1 shows that the flow chart of the management method of the realization information security that preferred embodiment according to the present invention provides;
Figure 2 shows that the schematic diagram of the management system of the realization information security that preferred embodiment according to the present invention provides.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Figure 1 shows that the flow chart of the management method of the realization information security that preferred embodiment according to the present invention provides.As shown in Figure 1, the management method of the realization information security that provides of preferred embodiment of the present invention comprises step 101~105.
In step 101, source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.Wherein, the visit limited information for example comprises top-secret information, confidential information and secret information.In addition, under the targeted customer entity for example comprise the board of directors of our company, Finance Department of our company, Legal Service of our company, technology department of our company, our company cooperation unit, do not have cooperative relationship and non-competing adversary's unit, the benign competition adversary of our company and the vicious competitor of our company with our company.Yet the present invention does not limit this.In practical application, can specifically arrange entity under visit limited information and the targeted customer as required.
In step 102, after described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request.
In present embodiment, the management center server storage targeted customer access rights table of comparisons, and targeted customer's access rights table of comparisons comprises the corresponding relation of the affiliated entity type of targeted customer, visit limited information and access rights.In this, targeted customer's access rights table of comparisons example is as shown in table 1.Yet the present invention is not limited thereto.
Table 1
In this, targeted customer's access rights table of comparisons can be preset.Management center server obtains targeted customer's access rights according to table 1, and targeted customer's access rights of obtaining are returned to source user.Yet the present invention does not limit this.In other embodiment, management center server for example only obtains the template of targeted customer's access rights, and described template returned to source user, source user can be set required targeted customer's access rights according to described template, thereby obtains the final objective access privilege.
In present embodiment, after source user obtained targeted customer's access rights, bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller.Wherein, carry source user, the affiliated entity type information of targeted customer in the distribution policy request.
In step 103, described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy.
In step 104, described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding.Wherein, source user is according to distribution policy, and targeted customer's access rights and visit limited information with binding are sent to the targeted customer by communication server.
In present embodiment, safe class or the priority level of entity under the strategy controller storage user; Distribution policy.Particularly, if the priority level of entity or safe class are greater than preset value under the targeted customer, distribution policy is: source user is sent to the targeted customer with targeted customer's access rights and visit limited information; If priority level or the safe class of entity are less than or equal to described preset value under the targeted customer, distribution policy is: source user is sent to targeted customer's access rights and visit limited information the keeper of entity under the targeted customer, described keeper encrypts described targeted customer's access rights and visit limited information, and described targeted customer's access rights after will encrypting and visit limited information and be sent to all targeted customers.
For example, if entity comprises the board of directors of our company under the targeted customer, Finance Department of our company, Legal Service of our company and technology department of our company, and the priority level of entity from height to low order is under the targeted customer: the board of directors of our company (the 8th grade), Legal Service of our company (the 7th grade), Finance Department of our company (the 6th grade), technology department of our company (the 5th grade), the cooperation unit of our company (fourth estate), there is not cooperative relationship and non-competing adversary's unit (tertiary gradient) with our company, the benign competition adversary of our company (second grade), the vicious competitor of our company (the first estate).At this moment, if entity for example is the board of directors of our company (that is the 8th grade) under the targeted customer, and preset value for example is the fourth estate, then according to distribution policy, source user can directly be sent to the directors of our company (that is targeted customer) with targeted customer's access rights and visit limited information.In addition, if the cooperation unit that the affiliated entity of targeted customer for example is our company (namely, the fourth estate), then according to distribution policy, source user can and be visited the keeper that limited information is sent to the cooperation unit of our company with targeted customer's access rights, and the keeper encrypts targeted customer's access rights and the visit limited information that receives from source user.Wherein, the present invention does not limit the keeper to the cipher mode of information.Targeted customer's access rights after the keeper will encrypt and visit limited information are sent to targeted customer (that is the personnel of the cooperation unit of our company).So, distinguish the difference of distribution policy according to priority level or the safe class of entity under the targeted customer, thereby guarantee the information safety of transmission.
In step 105, described targeted customer handles described information after authenticating by described management center server.Particularly, after targeted customer's access rights that targeted customer's reception sources user sends and the visit limited information, can send authentication request to management center server.Wherein, authentication request for example comprises targeted customer's information.Management center server receives described authentication request, and by behind targeted customer's the authentification of message, the targeted customer obtains the associated rights (for example, the targeted customer can check confidential information) of described visit limited information.
In present embodiment, if the targeted customer receives targeted customer's access rights and the visit limited information of encryption, and the targeted customer is by after the management center server authentication, and management center server is notified the keeper will decipher rule and is sent to the targeted customer.Particularly, if the targeted customer receives targeted customer's access rights and the visit limited information of encryption from the keeper, and management center server is by behind targeted customer's the authentification of message, management center server sends announcement information to the keeper of entity under the targeted customer, and described keeper receives and will decipher rule accordingly behind the announcement information and be sent to the targeted customer.After targeted customer's receiving and deciphering rule, targeted customer's access rights and visit limited information are decrypted, and after deciphering, obtain the associated rights (for example, checking confidential information) of visit limited information.
In addition, in present embodiment, if targeted customer and described source user do not belong to same company, then management center server determines that according to external delegated strategy table source user externally sends the delegated strategy of information.Wherein, external delegated strategy table comprises the corresponding relation of the term of validity of source user rank, the affiliated entity type of targeted customer, delegated strategy, visit limited information level of confidentiality, access rights and visit limited information.In this, externally delegated strategy table example is as shown in table 2, yet the present invention does not limit this.
Table 2
In practical application, the content of table 2 can arrange according to company's actual needs.In this, the source user rank comprises president, general manager and director, minister's rank, section chief's rank and clerk's rank.According to other difference of source user level, source user externally sends the authority difference of information, and at different other unit is visited limited information level of confidentiality, access rights and has time limit all different.So, guarantee fail safe that external information is sent.
In addition, in present embodiment, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server according to accident rate and the term of validity.In this, externally delegated strategy table example is as shown in table 3, yet the present invention does not limit this.
Accident rate | The term of validity of visit limited information is adjusted strategy |
0-5% | Preset value |
5%-10% | Reduce by 10% |
10%-20% | Reduce by 20% |
More than 20% | Refusal sends |
Table 3
For example, if because externally transmission information of source user causes having an accident, and the accident rate in a measurement period for example be 7%(wherein, accident rate equals the ratio that accident frequency that the external transmission information in the measurement period causes and source user externally send the information total degree), then according to table 3 as can be known, what strategy controller can be adjusted all-access limited information in the table 2 of management center server storage has a time limit (that is, reducing by 10%).So, can adjust safeguard measure in real time according to actual conditions.
Concrete implementation is: strategy controller sends term of validity adjustment request to management center server, wherein, carries the term of validity of visit limited information in the described term of validity adjustment request and adjusts policy information; After management center server is received term of validity adjustment request, carry out the term of validity of visit limited information and adjust strategy.0~5%, then term of validity adjustment request can not trigger as if the accident rate in the measurement period, and the term of validity is still according to original preset value.
In addition, in present embodiment, strategy controller is the cpu busy percentage of Real-time Monitor Management central server also, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.In this, strategy controller arranges the timeslice poll strategy table of comparisons, and example is as shown in table 4, yet the present invention does not limit this.
Table 4
Particularly, strategy controller periodically detects the cpu busy percentage of management center server, when if the cpu busy percentage of management center server reaches respective threshold, strategy controller can be with the work slice of management center server, the mode by poll, distributes.For example, when the cpu busy percentage of management center server reached 80%, strategy controller distributed request to management center server transmitting time sheet, wherein, carried timeslice poll policy information in the described timeslice distribution request.After described management center server receives that described timeslice is distributed request, time of implementation sheet poll strategy; At this moment, management center server is controlled its work slice, by the mode of poll, distributes to other request work of president, general manager and director, minister's rank and section chief's level, and suspends other work of clerk's level.In like manner, if the cpu busy percentage of management center server is more high, then corresponding work slice by the mode of poll, is left the more high source user of rank for.So, be responsible for the work slice of allocation manager central server according to the cpu busy percentage situation of management center server by strategy controller, guaranteed higher-level user's request, promoted higher-level user's experience, simultaneously, avoid cpu load excessive, guaranteed communication security.
Figure 2 shows that the schematic diagram of the management system of the realization information security that preferred embodiment according to the present invention provides.As shown in Figure 2, the management system of the realization information security that provides of preferred embodiment of the present invention comprises source user 10, targeted customer 16, management center server 12, communication server 14 and strategy controller 18.Management center server 12 connects source user 10, targeted customer 16 and strategy controller 18 respectively, and communication server 14 connects source user 10 and targeted customer 16, and strategy controller 18 connects source user 10 and management center server 12.
In present embodiment, source user 10 is created the visit limited information and is sent call request to management center server 12, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.After management center server 12 obtains targeted customer's access rights, source user 10 bound targets access privileges and visit limited information also send the distribution policy requests to strategy controller 18, wherein, carry the affiliated entity type information of targeted customer in the distribution policy request.Strategy controller 18 wherein, carries distribution policy in the distribution policy response to source user 10 feedback distribution policy responses.Source user 10 is sent to targeted customer 16 according to distribution policy with targeted customer's access rights and the visit limited information of binding.Targeted customer 16 handles described information after authenticating by management center server 12.The accident rate that strategy controller 18 periodic statistics source users 10 external transmission information cause, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server 12 according to accident rate and the term of validity.The cpu busy percentage of strategy controller 18 supervision and management center servers 12, if the cpu busy percentage of management center server 12 reaches preset value, strategy controller 18 carries out poll according to the timeslice of source user level allocation management center server 12.About the specific operation process of described system, described with above-mentioned method, so repeat no more in this.
In sum, management method and the system of the realization information security that preferred embodiment provides according to the present invention, after management center server obtains targeted customer's access rights, source user is according to entity type under the targeted customer, obtain distribution policy from strategy controller, according to distribution policy, bound targets access privilege and visit limited information are sent to the targeted customer.So, realize the safety certification of information, thereby guaranteed information security.In addition, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.So, can adjust safeguard measure in real time according to actual conditions.In addition, the cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.So, avoid cpu load excessive, thereby guaranteed communication security.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1. a management method that realizes information security is characterized in that, may further comprise the steps:
Source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request;
After described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request;
Described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy;
Described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding;
Described targeted customer handles described information after authenticating by described management center server,
Wherein, the accident rate that externally transmission information of the described source user of described strategy controller periodic statistics causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the described management center server of term of validity adjustment
Described strategy controller is monitored the cpu busy percentage of described management center server, if the cpu busy percentage of described management center server reaches preset value, described strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
2. method according to claim 1, it is characterized in that, the described management center server storage targeted customer access rights table of comparisons, described targeted customer's access rights table of comparisons comprises the corresponding relation of the affiliated entity type of targeted customer, visit limited information and access rights.
3. method according to claim 1 and 2 is characterized in that, described visit limited information comprises top-secret information, confidential information and secret information.
4. method according to claim 1, it is characterized in that, if the priority level of entity or safe class are greater than preset value under the targeted customer, described distribution policy is: described source user is sent to all targeted customers with described targeted customer's access rights and visit limited information;
If priority level or the safe class of entity are less than or equal to described preset value under the targeted customer, described distribution policy is: described source user is sent to described targeted customer's access rights and visit limited information the keeper of entity under the targeted customer, described keeper encrypts described targeted customer's access rights and visit limited information, and described targeted customer's access rights after will encrypting and visit limited information and be sent to all targeted customers.
5. method according to claim 4, it is characterized in that, described targeted customer receives described targeted customer's access rights and the visit limited information of encryption, and after described targeted customer authenticated by described management center server, described management center server was notified described keeper will decipher rule and is sent to described targeted customer.
6. method according to claim 1 is characterized in that, if targeted customer and described source user do not belong to same company, then described management center server determines that according to described external delegated strategy table described source user externally sends the delegated strategy of information.
7. method according to claim 6, it is characterized in that described external delegated strategy table comprises the corresponding relation of the term of validity of source user rank, the affiliated entity type of targeted customer, delegated strategy, visit limited information level of confidentiality, access rights and visit limited information.
8. management system that realizes information security, it is characterized in that, comprise source user, targeted customer, management center server, communication server and strategy controller, described management center server connects described source user, described targeted customer and described strategy controller respectively, described communication server connects described source user and described targeted customer, described strategy controller connects described source user and described management center server
Wherein, described source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request,
After described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to described strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request
Described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy,
Described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding,
Described targeted customer handles described information after authenticating by described management center server,
The accident rate that externally transmission information of the described source user of described strategy controller periodic statistics causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the described management center server according to accident rate and the term of validity
Described strategy controller is monitored the cpu busy percentage of described management center server, if the cpu busy percentage of described management center server reaches preset value, described strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101537457A CN103281302A (en) | 2013-04-28 | 2013-04-28 | Management method and management system for realizing information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101537457A CN103281302A (en) | 2013-04-28 | 2013-04-28 | Management method and management system for realizing information security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103281302A true CN103281302A (en) | 2013-09-04 |
Family
ID=49063749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013101537457A Pending CN103281302A (en) | 2013-04-28 | 2013-04-28 | Management method and management system for realizing information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103281302A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530570A (en) * | 2013-09-24 | 2014-01-22 | 国家电网公司 | Electronic document safety management system and method |
WO2014176899A1 (en) * | 2013-04-28 | 2014-11-06 | 苏州亿倍信息技术有限公司 | Information security management method and system |
CN114510738A (en) * | 2021-12-31 | 2022-05-17 | 华能烟台八角热电有限公司 | Data use risk assessment method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080005779A1 (en) * | 2006-07-03 | 2008-01-03 | Fujitsu Limited | Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method |
CN102087690A (en) * | 2009-12-02 | 2011-06-08 | 富士施乐株式会社 | Document management system and document management method |
CN102724221A (en) * | 2011-03-30 | 2012-10-10 | 上海微河信息科技有限公司 | Enterprise information system using cloud computing and method for setting user authority thereof |
-
2013
- 2013-04-28 CN CN2013101537457A patent/CN103281302A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080005779A1 (en) * | 2006-07-03 | 2008-01-03 | Fujitsu Limited | Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method |
CN102087690A (en) * | 2009-12-02 | 2011-06-08 | 富士施乐株式会社 | Document management system and document management method |
CN102724221A (en) * | 2011-03-30 | 2012-10-10 | 上海微河信息科技有限公司 | Enterprise information system using cloud computing and method for setting user authority thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014176899A1 (en) * | 2013-04-28 | 2014-11-06 | 苏州亿倍信息技术有限公司 | Information security management method and system |
CN103530570A (en) * | 2013-09-24 | 2014-01-22 | 国家电网公司 | Electronic document safety management system and method |
CN103530570B (en) * | 2013-09-24 | 2016-08-17 | 国家电网公司 | A kind of electronic document safety management system and method |
CN114510738A (en) * | 2021-12-31 | 2022-05-17 | 华能烟台八角热电有限公司 | Data use risk assessment method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3474172B1 (en) | Access control using a blockchain | |
CN109547445B (en) | Method and system for verifying legality of network request of client | |
EP2574090B1 (en) | Managing mobile device applications | |
CN102404726B (en) | Distributed control method for information of accessing internet of things by user | |
CN104756441A (en) | Methods and apparatus for data access control | |
CN103179114A (en) | Fine-grained access control method for data in cloud storage | |
CN101872399A (en) | Dynamic digital copyright protection method based on dual identity authentication | |
CN103220141B (en) | A kind of protecting sensitive data method and system based on group key strategy | |
DE10393847B4 (en) | Method and apparatus for finding shared confidential information without affecting non-shared confidential information | |
CN113645195B (en) | Cloud medical record ciphertext access control system and method based on CP-ABE and SM4 | |
US10172003B2 (en) | Communication security processing method, and apparatus | |
Yan et al. | Controlling cloud data access based on reputation | |
CN103297963B (en) | Based on the method and system without the M2M secret protection of certificate and key management | |
KR20120072032A (en) | The system and method for performing mutual authentication of mobile terminal | |
CN103281302A (en) | Management method and management system for realizing information security | |
CN102999710A (en) | Method, equipment and system for safely sharing digital content | |
CN103269268A (en) | Method and system for managing information safety | |
CN109413648B (en) | Access control method, terminal, smart card, background server and storage medium | |
CN117527378A (en) | Data encryption transmission method and system based on user attribute and dynamic strategy | |
CN103281304A (en) | Information safety processing method and system | |
US8699710B2 (en) | Controlled security domains | |
CN103186724B (en) | The dissemination method of digital content and device, terminal | |
CN101166090A (en) | An authorization method based on multiple authentication and RSA authentication | |
CN102932354A (en) | Verification method and device for internet protocol (IP) address | |
CN102819696B (en) | Prevent account data by the method for unauthorized access and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130904 |