CN105095693A - Method and system for safely sharing digital asset based on Internet - Google Patents

Method and system for safely sharing digital asset based on Internet Download PDF

Info

Publication number
CN105095693A
CN105095693A CN201510409209.8A CN201510409209A CN105095693A CN 105095693 A CN105095693 A CN 105095693A CN 201510409209 A CN201510409209 A CN 201510409209A CN 105095693 A CN105095693 A CN 105095693A
Authority
CN
China
Prior art keywords
digital asset
module
user
data assets
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510409209.8A
Other languages
Chinese (zh)
Inventor
李一峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Jianguo Technology Development Co Ltd
Original Assignee
Jiangsu Jianguo Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Jianguo Technology Development Co Ltd filed Critical Jiangsu Jianguo Technology Development Co Ltd
Priority to CN201510409209.8A priority Critical patent/CN105095693A/en
Publication of CN105095693A publication Critical patent/CN105095693A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for safely sharing digital asset based on the Internet, wherein the system comprises a digital asset catalog module, a permission management-and-control module, a service interface module, a digital asset releasing module, a digital asset using module and an operation system monitoring agent module. According to the invention, permissions to the digital asset that is used by a user are set by the system; the permissions comprise five types: read, write, print, delete and spread; at the same time, the behaviors of using documents like print, copy, past and save as are controlled so as to ensure that various behaviors of using these document is controllable and the user won't spread out the digital asset unintentionally or intentionally; and at the same time, the user's digital asset can also be effectively prevented from being stole by illegal computer programs like viruses and Trojan horse.

Description

A kind of method of the digital asset safe sharing based on internet and system thereof
Technical field
The present invention relates to internet security precautionary technology field, in particular a kind of method of the digital asset safe sharing based on internet and system thereof.
Background technology
At present, internet there is a large amount of computer users, they need to use computing machine to complete their work in a large number, and in this course of work, a large amount of digital assets will be produced, and the safety problem in the use procedure of these digital assets, become the problem that they have a headache day by day.The safety problem of digital asset; the method of current correspondence mainly uses encryption device, document file management system and firewall device; these three kinds of modes, in the process of safety problem, are protected data assets mainly through the method such as " encrypt plaintext part ", " anti-disabled user steals ", " anti-virus, wooden horse are stolen ", " anti-illegal program is stolen ".But in the process that digital asset is propagated, effective management and control cannot be carried out to the travel path of data assets, the approach that data assets is propagated cannot be understood; Meanwhile, in communication process, also cannot control the illegal operation of user, such as illegally print, illegal paste copy, illegal Internet communication etc.
Therefore, prior art has yet to be improved and developed.
Summary of the invention
The technical problem to be solved in the present invention is, for the above-mentioned defect of prior art, provides a kind of method and system thereof of the digital asset safe sharing based on internet.Be intended to for Internet user provides the security solution of this digital asset based on internet, applications, by being encrypted digital asset, simultaneously, the various aspects such as the issue of digital asset, mandate and use being managed, making digital asset safer in use and shared procedure; The circulation of digital asset or perhaps communication channel are managed, the owner of digital asset can follow the tracks of digital asset use by which user, thus reach the object that digital asset is protected.
The technical scheme that technical solution problem of the present invention adopts is as follows:
Based on a method for the digital asset safe sharing of internet, wherein, comprise step:
A, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
B, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After C, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
D, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After E, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
F, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
G, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
The method of the described digital asset safe sharing based on internet, wherein, described client computer is Windows system.
The method of the described digital asset safe sharing based on internet, wherein, described client computer is apple system.
As above based on a system for the method for the digital asset safe sharing of internet, wherein, comprising:
Data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, and data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
The system of the method for the described digital asset safe sharing based on internet, wherein, described data assets edits and records module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described authority managing and controlling module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described service interface module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described data assets release module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described operating system monitoring agent module.
The method of the digital asset safe sharing based on internet provided by the present invention and system thereof, guarantee that the digitizing assets of user are not by other user's illegal use and illicit distributions.Apparatus system of the present invention is by carrying out authority setting to the digitizing assets that user uses, these authorities comprise: readable, can write, write printing, can delete, can propagate, this five large type, simultaneously by using behavior during these files to user, as printed, copy, clip and paste, the behavior such as to save as controls, guarantee that user is controlled in the various actions of use digital asset, can not because of unintentionally or have a mind to this digital asset is blazed abroad, simultaneously, this software effectively can also prevent virus, the illegal computers programs such as wooden horse steal the digitizing assets of user.
Accompanying drawing explanation
Fig. 1 is the embodiment process flow diagram of the method for the digital asset safe sharing based on internet of the present invention.
Fig. 2 is the system module composition schematic diagram of the method for the digital asset safe sharing based on internet of the present invention.
Embodiment
For making object of the present invention, technical scheme and advantage clearly, clearly, developing simultaneously referring to accompanying drawing, the present invention is described in more detail for embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1 be the embodiment process flow diagram of the method for the digital asset safe sharing based on internet of the present invention.Said method comprising the steps of:
S1, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
S2, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After S3, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
S4, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After S5, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
If user is without any authority, meanwhile, the sharing option of this file has been set as " privately owned ", then user can not see any content.
If user is without any authority, simultaneously, the sharing option of this file has been set as " needing request permissions ", then user can not see any content, but the button of " request Share Permissions " in " share and arrange " tab can use, user can press the next owner's request permissions to this file of this button.
If user has permission, but do not have " owner " and " person liable " authority, this user can only can only see oneself authority information in the list of shared setting, and other function of this tab is all prohibited.
If user has permission, have " owner " or " person liable " authority, this user can see the authorization conditions of all users had permission in " share and arrange " tab, and " sharing figure " function, can be used to check shared relationship figure meanwhile simultaneously.For the authorization options in " checking/add " and user list, then need the setting according to " rights option ".
S6, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
S7, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
If the file opened is a file adopting the encryption of manual input pin mode, system will eject dialog box, allow user input clear crytpographic key.
Application program is after opening these files, and its network function will be blocked, and this file can well be prevented like this by malicious dissemination.
Application program is after opening these files, and its clipbook function can be monitored, if open not having " owner " of the user of this file, " person liable " and " can write " authority, clipbook function can not use.
Application program after opening these files, it save as (SaveAs) function also by monitored, if open the user of this file there is no " person liable " and " can write " authority, saving as (SaveAs) function can not use.
The functional requirement user of application program printout has the authority of " printable ".
After program opens file, system will eject prompting frame, to notify user, he can how this file.
As shown in Figure 2 be the method for the digital asset safe sharing based on internet of the present invention system module composition schematic diagram.Described system comprises: data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, and data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
Described data assets edits and records module.
Described authority managing and controlling module.
Described service interface module.
Described data assets release module.
Described operating system monitoring agent module.
The method of the digital asset safe sharing based on internet provided by the present invention and system thereof, guarantee that the digitizing assets of user are not by other user's illegal use and illicit distributions.Apparatus system of the present invention is by carrying out authority setting to the digitizing assets that user uses, these authorities comprise: readable, can write, write printing, can delete, can propagate, this five large type, simultaneously by using behavior during these files to user, as printed, copy, clip and paste, the behavior such as to save as controls, guarantee that user is controlled in the various actions of use digital asset, can not because of unintentionally or have a mind to this digital asset is blazed abroad, simultaneously, this software effectively can also prevent virus, the illegal computers programs such as wooden horse steal the digitizing assets of user.
Should be understood that, application of the present invention is not limited to above-mentioned citing, for those of ordinary skills, can be improved according to the above description or convert, and all these improve and convert the protection domain that all should belong to claims of the present invention.

Claims (9)

1., based on a method for the digital asset safe sharing of internet, it is characterized in that, comprise step:
A, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
B, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After C, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
D, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After E, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
F, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
G, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
2. the method for the digital asset safe sharing based on internet according to claim 1, is characterized in that, described client computer is Windows system.
3. the method for the digital asset safe sharing based on internet according to claim 1, is characterized in that, described client computer is apple system.
4. one kind adopts the system of the method for the digital asset safe sharing based on internet described in any one of claim 1-3, it is characterized in that, comprise: data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
5. the system of the method for the digital asset safe sharing based on internet according to claim 4, it is characterized in that, described data assets edits and records module.
6. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described authority managing and controlling module.
7. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described service interface module.
8. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described data assets release module.
9. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described operating system monitoring agent module.
CN201510409209.8A 2015-07-13 2015-07-13 Method and system for safely sharing digital asset based on Internet Pending CN105095693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510409209.8A CN105095693A (en) 2015-07-13 2015-07-13 Method and system for safely sharing digital asset based on Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510409209.8A CN105095693A (en) 2015-07-13 2015-07-13 Method and system for safely sharing digital asset based on Internet

Publications (1)

Publication Number Publication Date
CN105095693A true CN105095693A (en) 2015-11-25

Family

ID=54576111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510409209.8A Pending CN105095693A (en) 2015-07-13 2015-07-13 Method and system for safely sharing digital asset based on Internet

Country Status (1)

Country Link
CN (1) CN105095693A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481140A (en) * 2017-07-24 2017-12-15 湖南搜云网络科技股份有限公司 Voucher identification code processing method and system, server and storage medium
CN107832632A (en) * 2017-10-30 2018-03-23 天逸财金科技服务股份有限公司 Asset certification authorization query method, system, electronic device and computer readable storage medium
CN108197437A (en) * 2017-12-19 2018-06-22 山东浪潮云服务信息科技有限公司 A kind of data circulation method and device
CN111898154A (en) * 2020-06-16 2020-11-06 北京大学 Negotiation type mobile application private data sharing protocol signing method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof
CN101951318A (en) * 2010-09-07 2011-01-19 南京大学 Bidirectional mobile streaming media digital copyright protection method and system
CN101989988A (en) * 2010-11-05 2011-03-23 上海传知信息科技发展有限公司 Copyright protection system and method of ebook online reading
CN102333076A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 File sharing system and method, and network information integration system and method
WO2012050367A2 (en) * 2010-10-12 2012-04-19 Samsung Electronics Co., Ltd. Method and apparatus for downloading drm module
CN103002030A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 File sharing method and system
CN103561034A (en) * 2013-11-11 2014-02-05 武汉理工大学 Secure file sharing system
CN103929434A (en) * 2014-05-04 2014-07-16 西安电子科技大学 File sharing method based on encryption and permission system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof
CN101951318A (en) * 2010-09-07 2011-01-19 南京大学 Bidirectional mobile streaming media digital copyright protection method and system
WO2012050367A2 (en) * 2010-10-12 2012-04-19 Samsung Electronics Co., Ltd. Method and apparatus for downloading drm module
CN101989988A (en) * 2010-11-05 2011-03-23 上海传知信息科技发展有限公司 Copyright protection system and method of ebook online reading
CN102333076A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 File sharing system and method, and network information integration system and method
CN103002030A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 File sharing method and system
CN103561034A (en) * 2013-11-11 2014-02-05 武汉理工大学 Secure file sharing system
CN103929434A (en) * 2014-05-04 2014-07-16 西安电子科技大学 File sharing method based on encryption and permission system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481140A (en) * 2017-07-24 2017-12-15 湖南搜云网络科技股份有限公司 Voucher identification code processing method and system, server and storage medium
CN107481140B (en) * 2017-07-24 2021-02-09 湖南搜云网络科技股份有限公司 Voucher identification code processing method and system, server and storage medium
CN107832632A (en) * 2017-10-30 2018-03-23 天逸财金科技服务股份有限公司 Asset certification authorization query method, system, electronic device and computer readable storage medium
CN108197437A (en) * 2017-12-19 2018-06-22 山东浪潮云服务信息科技有限公司 A kind of data circulation method and device
CN111898154A (en) * 2020-06-16 2020-11-06 北京大学 Negotiation type mobile application private data sharing protocol signing method
CN111898154B (en) * 2020-06-16 2022-08-05 北京大学 Negotiation type mobile application privacy data sharing protocol signing method

Similar Documents

Publication Publication Date Title
DE60301177T2 (en) Program, procedure and device for data protection
US6289450B1 (en) Information security architecture for encrypting documents for remote access while maintaining access control
CN109923548A (en) Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process
JP2007072639A (en) Content management server
JP2003228519A (en) Method and architecture for providing pervasive security for digital asset
CN103763313A (en) File protection method and system
US11061999B2 (en) Systems and methods for dynamically enforcing digital rights management via embedded browser
CN201682524U (en) Document transfer authority control system based on document filtering driver
US8776258B2 (en) Providing access rights to portions of a software application
CN107370604A (en) A kind of more granularity access control methods under big data environment
WO2008001823A1 (en) Computer data management method, program, and recording medium
EP4016338A1 (en) Access control for data stored on the cloud
CN105095693A (en) Method and system for safely sharing digital asset based on Internet
CN104778954B (en) A kind of CD subregion encryption method and system
Grothe et al. How to break microsoft rights management services
JP2017531247A (en) Data management method, computer program therefor, recording medium therefor, user client for executing data management method, and security policy server
US11336628B2 (en) Methods and systems for securing organizational assets in a shared computing environment
KR101315482B1 (en) Secret information reading service system using by a writer authentication and the control method thereof
JP6729013B2 (en) Information processing system, information processing apparatus, and program
KR20090128818A (en) The management system and management method of a secure area
CN109995735A (en) Downloading and application method, server, client, system, equipment and medium
JP2005275669A (en) Data monitoring method, information processor, program, recording medium, and information processing system
Veerubhotla et al. A DRM framework towards preventing digital piracy
JP4974246B2 (en) File export monitoring system
JP2005258606A (en) Network system with information leakage audit function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151125

RJ01 Rejection of invention patent application after publication