CN105095693A - Method and system for safely sharing digital asset based on Internet - Google Patents
Method and system for safely sharing digital asset based on Internet Download PDFInfo
- Publication number
- CN105095693A CN105095693A CN201510409209.8A CN201510409209A CN105095693A CN 105095693 A CN105095693 A CN 105095693A CN 201510409209 A CN201510409209 A CN 201510409209A CN 105095693 A CN105095693 A CN 105095693A
- Authority
- CN
- China
- Prior art keywords
- digital asset
- module
- user
- data assets
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012544 monitoring process Methods 0.000 claims abstract description 19
- 239000003795 chemical substances by application Substances 0.000 claims description 15
- 238000007639 printing Methods 0.000 claims description 8
- 238000013475 authorization Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 238000011161 development Methods 0.000 claims description 3
- 239000000344 soap Substances 0.000 claims description 3
- 241000700605 Viruses Species 0.000 abstract description 3
- 230000006399 behavior Effects 0.000 abstract 2
- 238000004590 computer program Methods 0.000 abstract 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 230000006854 communication Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 206010019233 Headaches Diseases 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 231100000869 headache Toxicity 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for safely sharing digital asset based on the Internet, wherein the system comprises a digital asset catalog module, a permission management-and-control module, a service interface module, a digital asset releasing module, a digital asset using module and an operation system monitoring agent module. According to the invention, permissions to the digital asset that is used by a user are set by the system; the permissions comprise five types: read, write, print, delete and spread; at the same time, the behaviors of using documents like print, copy, past and save as are controlled so as to ensure that various behaviors of using these document is controllable and the user won't spread out the digital asset unintentionally or intentionally; and at the same time, the user's digital asset can also be effectively prevented from being stole by illegal computer programs like viruses and Trojan horse.
Description
Technical field
The present invention relates to internet security precautionary technology field, in particular a kind of method of the digital asset safe sharing based on internet and system thereof.
Background technology
At present, internet there is a large amount of computer users, they need to use computing machine to complete their work in a large number, and in this course of work, a large amount of digital assets will be produced, and the safety problem in the use procedure of these digital assets, become the problem that they have a headache day by day.The safety problem of digital asset; the method of current correspondence mainly uses encryption device, document file management system and firewall device; these three kinds of modes, in the process of safety problem, are protected data assets mainly through the method such as " encrypt plaintext part ", " anti-disabled user steals ", " anti-virus, wooden horse are stolen ", " anti-illegal program is stolen ".But in the process that digital asset is propagated, effective management and control cannot be carried out to the travel path of data assets, the approach that data assets is propagated cannot be understood; Meanwhile, in communication process, also cannot control the illegal operation of user, such as illegally print, illegal paste copy, illegal Internet communication etc.
Therefore, prior art has yet to be improved and developed.
Summary of the invention
The technical problem to be solved in the present invention is, for the above-mentioned defect of prior art, provides a kind of method and system thereof of the digital asset safe sharing based on internet.Be intended to for Internet user provides the security solution of this digital asset based on internet, applications, by being encrypted digital asset, simultaneously, the various aspects such as the issue of digital asset, mandate and use being managed, making digital asset safer in use and shared procedure; The circulation of digital asset or perhaps communication channel are managed, the owner of digital asset can follow the tracks of digital asset use by which user, thus reach the object that digital asset is protected.
The technical scheme that technical solution problem of the present invention adopts is as follows:
Based on a method for the digital asset safe sharing of internet, wherein, comprise step:
A, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
B, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After C, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
D, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After E, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
F, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
G, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
The method of the described digital asset safe sharing based on internet, wherein, described client computer is Windows system.
The method of the described digital asset safe sharing based on internet, wherein, described client computer is apple system.
As above based on a system for the method for the digital asset safe sharing of internet, wherein, comprising:
Data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, and data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
The system of the method for the described digital asset safe sharing based on internet, wherein, described data assets edits and records module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described authority managing and controlling module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described service interface module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described data assets release module.
The system of the method for the described digital asset safe sharing based on internet, wherein, described operating system monitoring agent module.
The method of the digital asset safe sharing based on internet provided by the present invention and system thereof, guarantee that the digitizing assets of user are not by other user's illegal use and illicit distributions.Apparatus system of the present invention is by carrying out authority setting to the digitizing assets that user uses, these authorities comprise: readable, can write, write printing, can delete, can propagate, this five large type, simultaneously by using behavior during these files to user, as printed, copy, clip and paste, the behavior such as to save as controls, guarantee that user is controlled in the various actions of use digital asset, can not because of unintentionally or have a mind to this digital asset is blazed abroad, simultaneously, this software effectively can also prevent virus, the illegal computers programs such as wooden horse steal the digitizing assets of user.
Accompanying drawing explanation
Fig. 1 is the embodiment process flow diagram of the method for the digital asset safe sharing based on internet of the present invention.
Fig. 2 is the system module composition schematic diagram of the method for the digital asset safe sharing based on internet of the present invention.
Embodiment
For making object of the present invention, technical scheme and advantage clearly, clearly, developing simultaneously referring to accompanying drawing, the present invention is described in more detail for embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1 be the embodiment process flow diagram of the method for the digital asset safe sharing based on internet of the present invention.Said method comprising the steps of:
S1, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
S2, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After S3, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
S4, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After S5, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
If user is without any authority, meanwhile, the sharing option of this file has been set as " privately owned ", then user can not see any content.
If user is without any authority, simultaneously, the sharing option of this file has been set as " needing request permissions ", then user can not see any content, but the button of " request Share Permissions " in " share and arrange " tab can use, user can press the next owner's request permissions to this file of this button.
If user has permission, but do not have " owner " and " person liable " authority, this user can only can only see oneself authority information in the list of shared setting, and other function of this tab is all prohibited.
If user has permission, have " owner " or " person liable " authority, this user can see the authorization conditions of all users had permission in " share and arrange " tab, and " sharing figure " function, can be used to check shared relationship figure meanwhile simultaneously.For the authorization options in " checking/add " and user list, then need the setting according to " rights option ".
S6, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
S7, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
If the file opened is a file adopting the encryption of manual input pin mode, system will eject dialog box, allow user input clear crytpographic key.
Application program is after opening these files, and its network function will be blocked, and this file can well be prevented like this by malicious dissemination.
Application program is after opening these files, and its clipbook function can be monitored, if open not having " owner " of the user of this file, " person liable " and " can write " authority, clipbook function can not use.
Application program after opening these files, it save as (SaveAs) function also by monitored, if open the user of this file there is no " person liable " and " can write " authority, saving as (SaveAs) function can not use.
The functional requirement user of application program printout has the authority of " printable ".
After program opens file, system will eject prompting frame, to notify user, he can how this file.
As shown in Figure 2 be the method for the digital asset safe sharing based on internet of the present invention system module composition schematic diagram.Described system comprises: data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, and data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
Described data assets edits and records module.
Described authority managing and controlling module.
Described service interface module.
Described data assets release module.
Described operating system monitoring agent module.
The method of the digital asset safe sharing based on internet provided by the present invention and system thereof, guarantee that the digitizing assets of user are not by other user's illegal use and illicit distributions.Apparatus system of the present invention is by carrying out authority setting to the digitizing assets that user uses, these authorities comprise: readable, can write, write printing, can delete, can propagate, this five large type, simultaneously by using behavior during these files to user, as printed, copy, clip and paste, the behavior such as to save as controls, guarantee that user is controlled in the various actions of use digital asset, can not because of unintentionally or have a mind to this digital asset is blazed abroad, simultaneously, this software effectively can also prevent virus, the illegal computers programs such as wooden horse steal the digitizing assets of user.
Should be understood that, application of the present invention is not limited to above-mentioned citing, for those of ordinary skills, can be improved according to the above description or convert, and all these improve and convert the protection domain that all should belong to claims of the present invention.
Claims (9)
1., based on a method for the digital asset safe sharing of internet, it is characterized in that, comprise step:
A, managerial personnel install digital asset server-side device on Internet Server, and service terminal device comprises digital asset and edits and records module, authority managing and controlling module and service interface module; User installs digital asset client terminal device on a client, and client terminal device comprises operating system monitoring agent, data assets release module and data assets and uses module;
B, user become authorized user by digital asset client registers, and data assets uses module to send WebService request to server end;
After C, server service interface receive client-requested, call authority managing and controlling module, create user at server end, and create unique identification for it;
D, authorized user log in client, and select the digital asset that needs are shared in the client.User needs to input the detailed description information about this file, as title, author, key word, detailed description; Then, for this file arranges security privacy option, as sharing option, rights option and restricted; Then, user can specify the user that this file will be shared; In addition, when user selects to share digital asset, can select whether encrypt file, if having selected encrypt file, client can carry out local cipher to digital asset, and after encrypt, transmission user description information and key information are to server end;
After E, server service interface receive client-requested, call number assets edit and record module, carry out digital asset registration, and registration process is that digital asset generates globally unique mark by service end, and record digital asset relevant information in systems in which;
F, authorized user log in client, controlled digital assets in browing system, whether this file of automatic decision is shared file by system, if, the option of " encrypt file " will be automatically set to unselected state, and meanwhile, system is automatically according to the shared information of this shared file of permission download, and show in the tab of details, the tab of the details of file can use;
G, local system, to the control of authority of digital asset, are monitored monitored and management and control user behavior by system bottom file driving, system handles.
2. the method for the digital asset safe sharing based on internet according to claim 1, is characterized in that, described client computer is Windows system.
3. the method for the digital asset safe sharing based on internet according to claim 1, is characterized in that, described client computer is apple system.
4. one kind adopts the system of the method for the digital asset safe sharing based on internet described in any one of claim 1-3, it is characterized in that, comprise: data assets edits and records module, authority managing and controlling module, service interface module, data assets release module, data assets uses module and operating system monitoring agent module;
Digital asset edits and records module, for being in charge of all controlled data assets, for these data assets generate a globally unique numbering;
Authority managing and controlling module, for being in charge of all authorized users, and the authority that authorized user is enjoyed data assets, these authorities comprise: readable, can write, write printing, can delete, can propagate;
Service interface module, it is application development interface disclosed in a group, adopt WebService, pass through soap protocol, achieve the object that any one client-side technology is all opened, realized by service interface module: searching user's information, obtain AuthorizationToken (authen session), the mandate of enquiring digital assets, interrogate tissue unit information, add digital asset, delete digital asset, digital asset mandate etc. is set;
Digital asset release module, gives other authorized users or tissue for responsible authorized user distributing data assets; During user's distributing data assets, whether encrypt file can be selected;
Data assets uses module, is the office terminal of the reading of a data assets, amendment, printing, propagation, deletion; The all operation of this template all can through authorization identifying;
Operating system monitoring agent module, be a monitoring to operating system bottom layer driving and agency, when data assets uses module to open, will proxy module be activated, real-time monitoring is also effectively tackled reading, is opened the handle of digital asset etc., carries out certification control to the authority of authorized user; Agent intercepts process is completely transparent to user.
5. the system of the method for the digital asset safe sharing based on internet according to claim 4, it is characterized in that, described data assets edits and records module.
6. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described authority managing and controlling module.
7. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described service interface module.
8. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described data assets release module.
9. the system of the method for the digital asset safe sharing based on internet according to claim 4, is characterized in that, described operating system monitoring agent module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510409209.8A CN105095693A (en) | 2015-07-13 | 2015-07-13 | Method and system for safely sharing digital asset based on Internet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510409209.8A CN105095693A (en) | 2015-07-13 | 2015-07-13 | Method and system for safely sharing digital asset based on Internet |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105095693A true CN105095693A (en) | 2015-11-25 |
Family
ID=54576111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510409209.8A Pending CN105095693A (en) | 2015-07-13 | 2015-07-13 | Method and system for safely sharing digital asset based on Internet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105095693A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107481140A (en) * | 2017-07-24 | 2017-12-15 | 湖南搜云网络科技股份有限公司 | Voucher identification code processing method and system, server and storage medium |
CN107832632A (en) * | 2017-10-30 | 2018-03-23 | 天逸财金科技服务股份有限公司 | Asset certification authorization query method, system, electronic device and computer readable storage medium |
CN108197437A (en) * | 2017-12-19 | 2018-06-22 | 山东浪潮云服务信息科技有限公司 | A kind of data circulation method and device |
CN111898154A (en) * | 2020-06-16 | 2020-11-06 | 北京大学 | Negotiation type mobile application private data sharing protocol signing method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729550A (en) * | 2009-11-09 | 2010-06-09 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption method thereof |
CN101951318A (en) * | 2010-09-07 | 2011-01-19 | 南京大学 | Bidirectional mobile streaming media digital copyright protection method and system |
CN101989988A (en) * | 2010-11-05 | 2011-03-23 | 上海传知信息科技发展有限公司 | Copyright protection system and method of ebook online reading |
CN102333076A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | File sharing system and method, and network information integration system and method |
WO2012050367A2 (en) * | 2010-10-12 | 2012-04-19 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading drm module |
CN103002030A (en) * | 2012-11-26 | 2013-03-27 | 北京百度网讯科技有限公司 | File sharing method and system |
CN103561034A (en) * | 2013-11-11 | 2014-02-05 | 武汉理工大学 | Secure file sharing system |
CN103929434A (en) * | 2014-05-04 | 2014-07-16 | 西安电子科技大学 | File sharing method based on encryption and permission system |
-
2015
- 2015-07-13 CN CN201510409209.8A patent/CN105095693A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729550A (en) * | 2009-11-09 | 2010-06-09 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption method thereof |
CN101951318A (en) * | 2010-09-07 | 2011-01-19 | 南京大学 | Bidirectional mobile streaming media digital copyright protection method and system |
WO2012050367A2 (en) * | 2010-10-12 | 2012-04-19 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading drm module |
CN101989988A (en) * | 2010-11-05 | 2011-03-23 | 上海传知信息科技发展有限公司 | Copyright protection system and method of ebook online reading |
CN102333076A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | File sharing system and method, and network information integration system and method |
CN103002030A (en) * | 2012-11-26 | 2013-03-27 | 北京百度网讯科技有限公司 | File sharing method and system |
CN103561034A (en) * | 2013-11-11 | 2014-02-05 | 武汉理工大学 | Secure file sharing system |
CN103929434A (en) * | 2014-05-04 | 2014-07-16 | 西安电子科技大学 | File sharing method based on encryption and permission system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107481140A (en) * | 2017-07-24 | 2017-12-15 | 湖南搜云网络科技股份有限公司 | Voucher identification code processing method and system, server and storage medium |
CN107481140B (en) * | 2017-07-24 | 2021-02-09 | 湖南搜云网络科技股份有限公司 | Voucher identification code processing method and system, server and storage medium |
CN107832632A (en) * | 2017-10-30 | 2018-03-23 | 天逸财金科技服务股份有限公司 | Asset certification authorization query method, system, electronic device and computer readable storage medium |
CN108197437A (en) * | 2017-12-19 | 2018-06-22 | 山东浪潮云服务信息科技有限公司 | A kind of data circulation method and device |
CN111898154A (en) * | 2020-06-16 | 2020-11-06 | 北京大学 | Negotiation type mobile application private data sharing protocol signing method |
CN111898154B (en) * | 2020-06-16 | 2022-08-05 | 北京大学 | Negotiation type mobile application privacy data sharing protocol signing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60301177T2 (en) | Program, procedure and device for data protection | |
US6289450B1 (en) | Information security architecture for encrypting documents for remote access while maintaining access control | |
CN109923548A (en) | Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process | |
JP2007072639A (en) | Content management server | |
JP2003228519A (en) | Method and architecture for providing pervasive security for digital asset | |
CN103763313A (en) | File protection method and system | |
US11061999B2 (en) | Systems and methods for dynamically enforcing digital rights management via embedded browser | |
CN201682524U (en) | Document transfer authority control system based on document filtering driver | |
US8776258B2 (en) | Providing access rights to portions of a software application | |
CN107370604A (en) | A kind of more granularity access control methods under big data environment | |
WO2008001823A1 (en) | Computer data management method, program, and recording medium | |
EP4016338A1 (en) | Access control for data stored on the cloud | |
CN105095693A (en) | Method and system for safely sharing digital asset based on Internet | |
CN104778954B (en) | A kind of CD subregion encryption method and system | |
Grothe et al. | How to break microsoft rights management services | |
JP2017531247A (en) | Data management method, computer program therefor, recording medium therefor, user client for executing data management method, and security policy server | |
US11336628B2 (en) | Methods and systems for securing organizational assets in a shared computing environment | |
KR101315482B1 (en) | Secret information reading service system using by a writer authentication and the control method thereof | |
JP6729013B2 (en) | Information processing system, information processing apparatus, and program | |
KR20090128818A (en) | The management system and management method of a secure area | |
CN109995735A (en) | Downloading and application method, server, client, system, equipment and medium | |
JP2005275669A (en) | Data monitoring method, information processor, program, recording medium, and information processing system | |
Veerubhotla et al. | A DRM framework towards preventing digital piracy | |
JP4974246B2 (en) | File export monitoring system | |
JP2005258606A (en) | Network system with information leakage audit function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151125 |
|
RJ01 | Rejection of invention patent application after publication |