CN103366129A - Data file control and management system and method base on network - Google Patents

Data file control and management system and method base on network Download PDF

Info

Publication number
CN103366129A
CN103366129A CN2012100822153A CN201210082215A CN103366129A CN 103366129 A CN103366129 A CN 103366129A CN 2012100822153 A CN2012100822153 A CN 2012100822153A CN 201210082215 A CN201210082215 A CN 201210082215A CN 103366129 A CN103366129 A CN 103366129A
Authority
CN
China
Prior art keywords
data file
client
service end
back plate
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100822153A
Other languages
Chinese (zh)
Inventor
邱全成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YINGSHUNYUAN (CHONGQING) TECHNOLOGY Co Ltd
Inventec Chongqing Corp
Inventec Corp
Original Assignee
YINGSHUNYUAN (CHONGQING) TECHNOLOGY Co Ltd
Inventec Chongqing Corp
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YINGSHUNYUAN (CHONGQING) TECHNOLOGY Co Ltd, Inventec Chongqing Corp, Inventec Corp filed Critical YINGSHUNYUAN (CHONGQING) TECHNOLOGY Co Ltd
Priority to CN2012100822153A priority Critical patent/CN103366129A/en
Publication of CN103366129A publication Critical patent/CN103366129A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data file control and management system and method based on network. Data files stored at a database service terminal are controlled and managed through a control and management service terminal. A client transmission operation instruction is executed to generate operation results to be transmitted back to a client so as to avoid data files stored at the client and the data files from being stolen during transmission, and safety of the data files is increased.

Description

Based on network data file control-management system and data file control and management method thereof
Technical field
The present invention is relevant for a kind of control-management system and method thereof, refers to especially a kind of based on network data file control-management system and data file control and management method thereof of avoiding client storage data file and data file to be stolen in transmission course.
Background technology
In recent years, along with popularizing with flourish of world-wide web, each manufacturer also utilizes network to come integration management all departments one after another, and hope can promote by the fast sharing of data the production efficiency of commodity.
Generally speaking, the manufacturing of commodity and sale are by research and development, design, checking, make, sell, logistics, analyze ... etc. process, research and development namely are with reference to the data of having collected, product orientation data ... wait the research of carrying out product, design namely provides model data, analysis report ... the Theoretical Design result who waits, checking namely provides test data, test report ... wait the theory with design process to be realized, and provide design process to be improved, finish research and development, after design and the checking, can enter a large amount of manufacture processes, note again material inventory and make, production efficiency, produce yield, after the product manufacturing finished, by sale and logistics product is sold again, and sales data, market survey, sales analysis namely can further offer development research or the existing product improvement that new product is carried out in research and development.
But, research and development are carried out in the research and development unit of enterprise often with design process, when having arrived checking and manufacture process, then be that manufacturer in enterprise carries out, by the time when sale and logistics, then be again that marketing unit in enterprise carries out, when having arrived analytic process, but be that unit of analysis in enterprise carries out, above-mentioned only is the differentiation of summary, in fact can each process all independently be carried out for commensurate not according to the demand of enterprise, during every many processed in units processes, except the increase of cost, more cause the problem of data transmission inconvenience in the process.
In view of this, just there is manufacturer need with network and server overall management to propose the data (hereinafter referred to as data file) of transmission.But, although can improve in this way the efficient of transmitting data file, also because produce the not good problem of security by network delivery.Therefore, more there is manufacturer's proposition in the process of transmitting data file, to carry out the processing of data encryption, and data file embedding digital relief watermark is altered with proof.But, the computing machine that the data file after the encryption still can be by having high arithmetic capability is decrypted in the mode of Brute Force, and the method that there is no in the above described manner effectively solves the not good problem of documentary safety in data.
In sum, there has been the not good problem of documentary safety in data in prior art always since the midium or long term as can be known, therefore is necessary to propose improved technological means in fact, solves this problem.
Summary of the invention
Because the problem that prior art exists, so the present invention discloses a kind of based on network data file control-management system and data file control and management method thereof.
Based on network data file control-management system disclosed in this invention, this system comprises: database service end, client and keyholed back plate service end.Wherein, database service end storage data file, each data file include file authority and file class; Client is in order to transmitting log-on message, and transfer operation instruction after receiving the login license, and the operating result that receives described operational order is to export; The keyholed back plate service end is in order to interconnect with database service end and client respectively by network, this keyholed back plate service end comprises authentication module and control module, its authentication module is in order to the log-on message of checking from client, generation login license and acquisition authority information after being proved to be successful, and will login license and be sent to client, as for control module then in order to carry out operational order from client according to authority information to produce operating result and to be sent to client, and compare when conforming at the file permission of authority information and described data file and file class, allow the operational order access of data files of client.
As for based on network data file control and management method of the present invention, be applied to have the database service end, the network environment of client and keyholed back plate service end, its step comprises: provide data file at the database service end, each data file include file authority and file class; Client transmits log-on message to the keyholed back plate service end; Keyholed back plate service end checking is from the log-on message of client, generation login license and obtain authority information after being proved to be successful, and will login and permit and be sent to client; Client is to the rear transfer operation instruction of login license to the keyholed back plate service end; The keyholed back plate service end is carried out operational order from client to produce operating result and to be sent to client according to authority information, and compare when conforming at the file permission of authority information and described data file and file class, allow the operational order access of data files of client; The operating result of client operational order is to export.
System and method for disclosed in this invention as above, and the difference between the prior art is that the present invention carries out keyholed back plate by the keyholed back plate service end to the data file that is stored in the database service end, and the operational order of carrying out client transmissions is back to client to produce operating result, avoids client storage data file and data file to be stolen in transmission course.
By above-mentioned technological means, the present invention can reach the technology effect that improves documentary safety in data.
Description of drawings
Fig. 1 is the system block diagrams that the present invention is based on the data file control-management system of network.
Fig. 2 A to Fig. 2 C is the method flow diagram that the present invention is based on the data file control and management method of network.
Fig. 3 is for using the present invention in the synoptic diagram of manufacturing management system.
[critical piece description of reference numerals]
110 database service ends
120 clients
130 keyholed back plate service ends
131 authentication modules
132 control modules
140 external service ends
Embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, whereby to the present invention how the application technology means implementation procedure that solves technical matters and reach the technology effect can fully understand and implement according to this.
Before explanation based on network data file control-management system disclosed in this invention and data file control and management method thereof, first the noun of institute of the present invention self-defining explained, data file of the present invention and external data file refer to can be for the file of computer access, wherein each data file include file authority and file class, take file permission as example, it can be to reading, write and the operation such as execution limiting; Take file class as example, it can comprise research and development, design, checking, manufacturing, sale, logistics, analysis, maintain secrecy ... etc. classification.
Be noted that especially the file permission of data file can record owner and group name, and represents different rights with nine bits on reality is implemented, bit " 1 " representative allows; Bit " 0 " representative does not allow, wherein from left to right first represents sequentially to the 3rd bit that " owner's the authority that reads, writes and carry out ", the 4th to the 6th bit sequentially represent " with the authority that reads, writes and carry out of group ", the 7th to the 9th bit sequentially represents " anyone authority that reads, writes and carry out ", when file permission is " 700 ", its binary representation is " 111000000 ", so representative only has the owner can read, write and carry out.
Below in conjunction with accompanying drawing data file control-management system and the method thereof that the present invention is based on network is described further, see also Fig. 1, Fig. 1 is the system block diagrams that the present invention is based on the data file control-management system of network, comprises: database service end 110, client 120 and keyholed back plate service end 130.Wherein, database service end 110 is in order to the storage data file, and much more no longer each data file include file authority and file class owing to data file explains in the noun of previous self-defining, so to give unnecessary details at this.
Client 120 is in order to transmitting log-on message, and after receiving the login license operational order is sent to keyholed back plate service end 130, and self-control tube service end 130 receives the operating result of described operational order to export.Described log-on message comprises account number, password ... Deng can be in order to identify user's information.Then can comprise the voluntarily instruction of generation of operation institute that instruction that the user keys in client 120 or client 120 detect the user as for operational order, for example: the user can key in the request that instruction " vi " is sent the browsing data file to described keyholed back plate service end 130, or client 120 is detecting the user when inserting Portable disk, produces instruction " usb_on " and is sent to keyholed back plate service end 130 with the behaviour in service of the universal serial bus of informing keyholed back plate service end 130 present clients 120.
From the above since client 120 only the transfer operation instruction is to keyholed back plate service end 130, and self-control tube service end 130 receives the operating result that produces after described operational order is carried out.Therefore, can't transmit complete data file between client 120 and the keyholed back plate service end 130, so can avoid data file to be stolen.
Keyholed back plate service end 130 is in order to interconnect with database service end 110 and client 120 respectively by network, and this keyholed back plate service end comprises: authentication module 131 and control module 132.Wherein, the log-on message that authentication module 131 transmits from client 120 in order to checking, generation login license and obtain authority information after being proved to be successful, and will login license and be sent to client 120, owing to verify that log-on message is prior art, so much more no longer to give unnecessary details at this, be noted that especially on reality is implemented, during authentication module 131 authentication failed, can produce information warning and be recorded in the keyholed back plate service end, this information warning can be verified successful client 120 and browse.
Control module 132 is in order to carry out operational order from client 120 to produce operating result and to be sent to client 120 according to authority information, for example: suppose that authority information is " chief executive ", then control module 132 allows to carry out all operations instruction from client 120; Suppose that authority information is " user ", then only allows the operational order of browsing data file.In addition, when in the process of executable operations instruction, needing access of data files, control module 132 also can be compared file permission and the file class of authority information and data file, and when comparison conforms to, allows the operational order access of data files of client 120.For instance, the owner of tentation data file is " chief executive ", and the operation that the file permission of data file allows the owner to read, write and carry out, so when authority information is " chief executive ", control module 132 will be judged as comparison and meet, and allow this data file is read, writes and carries out.Be noted that especially, after producing operating result, control module 132 can be encrypted this operating result, and allow the operating result after 120 pairs of encryptions of client to be decrypted, its ciphering process can be encrypted by public-key cryptography (Public Key), and is decrypted by the private cipher key (Private Key) of client 120.
On reality is implemented, also can arrange in pairs or groups the again file class of data file of control module 132 is judged, for example: no matter authority information is " chief executive " or " user ", when if its file class of wanting the data file of access is secret, then forbidden energy (disable) to this data file copy, the mobile and operational order that transmits, in order to reduce the possibility that data file is replicated or steals.Although the present invention is in the above-mentioned mode judged of collocation file class that illustrates, yet do not do restriction with this, in other words, control module 132 also may be in order to accept or reject between administrative convenience and security, and only for authority information for " user " come forbidden energy to this data file copy, the mobile and operational order that transmits.
In addition, said system also can comprise the external service end 140 that stores external data file, this outside service end 140 interconnects by network and keyholed back plate service end 130, and allows keyholed back plate service end 130 to make data file in the database service end 110 and the external data file in the external service end 140 carry out exchanges data by the operational orders of carrying out.On reality was implemented, manufacturer or department that described external service end 140 can offer supply chain logined, so that manufacturer or department are sent to the data such as instant sale and logistics this outside service end 140 and save as external data file.In other words, described external service end 140 is to offer the manufacturer of supply chain or the usefulness of department's (being the external staff of company) immediate feedback data, operates but not offer the personnel of intra-company such as client 120.
Then, see also Fig. 2 A to Fig. 2 C, Fig. 2 A to Fig. 2 C is the method flow diagram that the present invention is based on the data file control and management method of network, be applied to have database service end 110, the network environment of client 120 and keyholed back plate service end 130, its step comprises: provide data file at database service end 110, each data file include file authority and file class (step 210); Client 120 transmits log-on message to keyholed back plate service end 130 (step 220); Keyholed back plate service end 130 checking is from the log-on message of client 120, generation login license and obtain authority information after being proved to be successful, and will login and permit and be sent to client 120 (step 230); The transfer operation instruction was to keyholed back plate service end 130 (step 240) after client 120 received the login license; Keyholed back plate service end 130 is carried out operational order from client 120 to produce operating result and to be sent to client 120 according to authority information, and compare when conforming at the file permission of authority information and data file and file class, allow the described data file of operational order access (step 250) of client 120; Client 120 receives the operating result of described operational order to export (step 260).Pass through above-mentioned steps, can carry out keyholed back plate by the data file that 130 pairs of keyholed back plate service ends are stored in database service end 110, and the operational order of carrying out client 120 transmission is back to client 120 to produce operating result, avoids client 120 storage data files and data file to be stolen in transmission course.
Be noted that especially when step 230 authentication failed, can produce information warning and be recorded in keyholed back plate service end 130, and the client 120 that allows to be proved to be successful is browsed this information warning (step 231); When the instruction of step 250 executable operations, more can make the data file of database service end 110 and the external data file of external service end 140 carry out exchanges data (step 251) by the operational order of carrying out.In addition, at the operating result (step 2501) that step 250 produces, be resent to client 120 after it can be encrypted, and allow the operating result after 120 pairs of encryptions of client to be decrypted (step 2502); And in the situation of the operational order access of data files (step 2503) that allows client 120, in the time of can being secret at the file class of its data file, the operational order (step 2504) that forbidden energy copies, moves and transmit, the possibility that is replicated and steals to reduce data file.
Carry out following explanation below in conjunction with Fig. 3 in the mode of embodiment, see also Fig. 3, Fig. 3 is for using the present invention in the synoptic diagram of manufacturing management system.Wherein, the equipment of client 120 for providing the user to operate, as: PC, notebook computer, personal digital assistant ... etc.; 130 of keyholed back plate service ends can be considered department system, as: manufacturing sector, research and development department, sales department ... etc.; Client 120 in order to the transfer operation instruction to keyholed back plate service end 130, in order to come the executable operations instruction by keyholed back plate service end 130, and return to client 120 exporting by the operating result that keyholed back plate service end 130 produces the executable operations instruction, as: show by display.Can be considered data center as for 110 at database service end, in order to storing relevant all data files that may use in the chain of making, as: test file, stock file, research and development file, sale file ... etc..
Take research and development department as example, client 120 interconnects with keyholed back plate service end 130 as development system, and keyholed back plate service end 130 more interconnects with database service end 110 as data center.Thus, when the research staff wants to browse the research and development file (being that file class is the data file of " research and development ") that is stored in database service end 110, can be first by client 120 input account numbers and password so that client 120 produce corresponding log-on messages and be sent to keyholed back plate service end 130 so that keyholed back plate service end 130 these log-on messages of checking are identified research staff's identity.
Then, the authentication module 131 of keyholed back plate service end 130 is after identification is finished to this log-on message, can produce the login license and obtain corresponding this research staff's authority information, and will login and permit and be sent to client 120.After client 120 receives the login license that keyholed back plate service ends 130 transmit, client 120 will according to research staff's operation (for example: click browse the button request and browse the research and development file with cursor), be sent to keyholed back plate service end 130 with corresponding operational order.
Next, after keyholed back plate service end 130 receives this operational order, control module 132 will be carried out the operational order that the research and development file is browsed in request according to this research staff's authority information.The authority information of supposing the research staff is " abc; The research staff ", wherein " abc " is research staff's account number or title; " research staff " is group name.So, control module 132 is carried out when asking to browse the operational order of research and development file, is the tabulation of the data file of " research and development " with All Files classification in the Query Database service end 110, and this tabulation is back to client 120 as operating result.Thus, be positioned at the title that the research staff " abc " of client 120 can be by screen browsing data file.
Afterwards, when research staff " abc " wish is opened one of them data file, can click the data file that wish is opened by cursor equally, client 120 can produce corresponding operational order and be sent to keyholed back plate service end 130 according to this operation equally.Receive the operational order of request turn-on data file when keyholed back plate service end 130 after, control module 132 can be " abc with authority information; The research staff " compare; suppose that file permission collection of record group name is called " research staff ", file class is " research and development "; control module 132 will be judged as to compare and meet so, and this data file of access is sent to client 120 with its content as operating result and shows by file permission and the file class of the data file of opening with wish.
Then, take sales department as example, client 120 interconnects with keyholed back plate service end 130 as marketing system, and keyholed back plate service end 130 more interconnects with database service end 110 as data center.Thus, the sales force can operate in client 120 equally, and by client 120 log-on message and operational order is sent to keyholed back plate service end 130.What they were different from research and development department is, because the sales force has different authority informations with the research staff, so the data file of control module 132 access that allows is also not identical.Be noted that especially, when wanting inter-department cooperation, only need to change file permission or file class, the personnel that data file can be offered different departments use jointly, and for example: the file permission of data file can be made as anyone and all can read or file class is made as " research and development, checking " to offer research staff and tester use.
From the above, the present invention is in practical application, keyholed back plate service end 130 can be complied with different departments as verification system, manufacturing system, logistics system, marketing system, analytic system, development system, design system ... etc., and provide connected client 120 to operate and the display operation result, the needed data file unification of each system is stored by database service end 110 and provides, and data file can not be sent to client 120, avoid data file via the user of client 120 with the Portable disk pirate, or in the transport process of data file, stolen.
At last, the present invention more can provide external service end 140 with as supply chain high in the clouds for logistics and sale, and stores external data file in this outside service end 140, and this outside data file can be logistics and the sales data of the external staff of company feedback.On reality was implemented, external service end 140 interconnected with keyholed back plate service end 130, and external service end 140 allows keyholed back plate service end 130 to make data file and external data file carry out exchanges data by the operational order of carrying out.Thus, the personnel of logistics or sales department just can pass through client 120 transfer operation instructions, the 130 executable operations instructions of keyholed back plate service end are upgraded sells or logistics data, for example: upgrade sales data older in the database service end 110 according to sales data up-to-date in the external service end 140, and the process of this renewal or exchanges data is only by actual transmitting data file is just arranged between database service end 110, keyholed back plate service end 130 and the external service end 140.
In sum, difference between the present invention and the prior art is that the data file that is stored in database service end 110 by 130 pairs of keyholed back plate service ends carries out keyholed back plate as can be known, and the operational order of carrying out client 120 transmission is back to client 120 to produce operating result, avoid client 120 storage data files and data file in transmission course, to be stolen, can solve the existing problem of prior art by this technological means, and then reach the technology effect that improves documentary safety in data.
Although the present invention with aforesaid embodiment openly as above; so it is not to limit the present invention; any those skilled in the art; without departing from the spirit and scope of the present invention; when can doing a little change and retouching, therefore scope of patent protection of the present invention must be looked this instructions appending claims person of defining and is as the criterion.

Claims (10)

1. a based on network data file control-management system is characterized in that, comprises:
The database service end is in order to store at least one data file, each data file include file authority and file class;
Client in order to transmitting log-on message, and transmits at least one operational order after receiving the login license, and the operating result that receives described operational order is to export; And
The keyholed back plate service end, in order to interconnect with this database service end and this client respectively by network, this keyholed back plate service end comprises:
Authentication module, in order to checking from this log-on message of this client, this login license of generation and obtain an authority information after being proved to be successful, and should login and permit and be sent to this client; And
Control module, in order to carry out described operational order from this client according to this authority information to produce this operating result and to be sent to this client, and compare when conforming in this document authority of this authority information and described data file and this document classification, allow the described data file of operational order access of this client.
2. based on network data file control-management system as claimed in claim 1, it is characterized in that, this system also comprises the external service end, this external service end interconnects and stores at least one external data file by network and this keyholed back plate service end, and this external service end allows this keyholed back plate service end to make described data file and described external data file carry out exchanges data by the described operational order of carrying out.
3. based on network data file control-management system as claimed in claim 1 is characterized in that, this authentication module produces when authentication failed and records information warning, and this client that allows to be proved to be successful is browsed this information warning.
4. based on network data file control-management system as claimed in claim 1 is characterized in that, when the file class of the described data file of this control module access is secret, and the operational order that forbidden energy copies, moves and transmit.
5. based on network data file control-management system as claimed in claim 1 is characterized in that, this control module also comprises this operating result is encrypted, and allows this client that this operating result after encrypting is decrypted.
6. based on network data file control and management method is applied to have the database service end, the network environment of client and keyholed back plate service end, and its step comprises:
Provide at least one data file at this database service end, each data file include file authority and file class;
This client transmits log-on message to this keyholed back plate service end;
The checking of this keyholed back plate service end is from this log-on message of this client, generation login license and obtain authority information after being proved to be successful, and should login and permit and be sent to this client;
This client transmits at least one operational order to this keyholed back plate service end after this login license;
This keyholed back plate service end is carried out described operational order from this client to produce operating result and to be sent to this client according to this authority information, and compare when conforming in this document authority of this authority information and described data file and this document classification, allow the described data file of operational order access of this client; And
This operating result of the described operational order of this client is to export.
7. based on network data file control and management method as claimed in claim 6, it is characterized in that the method also comprises this keyholed back plate service end makes described data file and at least one external data file that is stored in the external service end carry out the step of exchanges data by the described operational order of carrying out.
8. based on network data file control and management method as claimed in claim 6, it is characterized in that, this keyholed back plate service end verifies when the step of this log-on message also is included in authentication failed, produces also record information warning, and this client that allows to be proved to be successful is browsed the step of this information warning.
9. based on network data file control and management method as claimed in claim 6, it is characterized in that, this allows the step of the described data file of operational order access of this client also to comprise when the file class of the described data file of access when being secret, and forbidden energy copies, the step of the mobile and operational order that transmits.
10. based on network data file control and management method as claimed in claim 6, it is characterized in that, this keyholed back plate service end is carried out described operational order from this client according to this authority information and is also comprised with the step that produces this operating result this operating result is encrypted, and the step that allows this client that this operating result after encrypting is decrypted.
CN2012100822153A 2012-03-26 2012-03-26 Data file control and management system and method base on network Pending CN103366129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100822153A CN103366129A (en) 2012-03-26 2012-03-26 Data file control and management system and method base on network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100822153A CN103366129A (en) 2012-03-26 2012-03-26 Data file control and management system and method base on network

Publications (1)

Publication Number Publication Date
CN103366129A true CN103366129A (en) 2013-10-23

Family

ID=49367445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100822153A Pending CN103366129A (en) 2012-03-26 2012-03-26 Data file control and management system and method base on network

Country Status (1)

Country Link
CN (1) CN103366129A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684878A (en) * 2013-12-30 2014-03-26 大唐移动通信设备有限公司 Operating command parameter control method and device
CN105718817A (en) * 2016-01-22 2016-06-29 合肥工业大学 Data safety exchange system and method based on authority mapping
CN106570419A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 File read-write device and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320414A (en) * 2007-06-05 2008-12-10 精品科技股份有限公司 Electronic document information security control system and method thereof
CN101957893A (en) * 2009-07-15 2011-01-26 精品科技股份有限公司 File permission management system
US20110271353A1 (en) * 2010-04-29 2011-11-03 International Business Machines Corporation Performing authorization control in a cloud storage system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320414A (en) * 2007-06-05 2008-12-10 精品科技股份有限公司 Electronic document information security control system and method thereof
CN101957893A (en) * 2009-07-15 2011-01-26 精品科技股份有限公司 File permission management system
US20110271353A1 (en) * 2010-04-29 2011-11-03 International Business Machines Corporation Performing authorization control in a cloud storage system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684878A (en) * 2013-12-30 2014-03-26 大唐移动通信设备有限公司 Operating command parameter control method and device
CN103684878B (en) * 2013-12-30 2017-01-25 大唐移动通信设备有限公司 Operating command parameter control method and device
CN105718817A (en) * 2016-01-22 2016-06-29 合肥工业大学 Data safety exchange system and method based on authority mapping
CN105718817B (en) * 2016-01-22 2018-05-18 合肥工业大学 A kind of data safety exchange system and method based on permissions mapping
CN106570419A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 File read-write device and method

Similar Documents

Publication Publication Date Title
Gao et al. CoC: A unified distributed ledger based supply chain management system
US10776513B2 (en) Device using secure storage and retrieval of data
CN110602248B (en) Abnormal behavior information identification method, system, device, equipment and medium
US20170277773A1 (en) Systems and methods for secure storage of user information in a user profile
CN102422590B (en) The protection of encryption key in database
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
CN109074462A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN103051600A (en) File access control method and system
US20170277775A1 (en) Systems and methods for secure storage of user information in a user profile
CN102812473A (en) Executable Identity Based File Access
EP3469512A1 (en) Systems and methods for secure storage of user information in a user profile
CN103455744B (en) A kind of data security protection method based on vein identification technology and system
CN110659515B (en) Open type integrated circuit collaborative design cloud platform and method thereof
CN102307185A (en) Data isolation method used in storage cloud
CN106682521B (en) File transparent encryption and decryption system and method based on driver layer
CN110889130A (en) Database-based fine-grained data encryption method, system and device
CN101840471A (en) Document right control method and device
JP3528701B2 (en) Security management system
Accorsi Automated privacy audits to complement the notion of control for identity management
JPH11272681A (en) Recording method for individual information and record medium thereof
CN103366129A (en) Data file control and management system and method base on network
CN116800423B (en) RFID-based data acquisition and double encryption and decryption data protection method and device
CN111614638A (en) Face recognition data distribution system and method based on big data platform
CN116432193A (en) Financial database data protection transformation method and financial data protection system thereof
CN100550735C (en) The method of multifunction intelligent key equipment and security control thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131023