CN107517176A - File security delivery system and method based on Bluetooth beacon - Google Patents
File security delivery system and method based on Bluetooth beacon Download PDFInfo
- Publication number
- CN107517176A CN107517176A CN201610417363.4A CN201610417363A CN107517176A CN 107517176 A CN107517176 A CN 107517176A CN 201610417363 A CN201610417363 A CN 201610417363A CN 107517176 A CN107517176 A CN 107517176A
- Authority
- CN
- China
- Prior art keywords
- file
- bluetooth beacon
- released
- access terminal
- label information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Abstract
The present invention provides a kind of file security delivery system and method based on Bluetooth beacon, the file security delivery system based on Bluetooth beacon includes file server, file access terminal and at least one Bluetooth beacon, the file server includes file information block and location information module, file server is used to load file to be released, the access rights of file to be released are set, the file to be released and the Bluetooth beacon are associated, file access terminal is used to detect and send the label information of the Bluetooth beacon.When the file server judges that the label information that the file access terminal is sent is legal, file to be released corresponding to the label information is returned;If not conforming to rule refuses the file access terminal access file to be released, it is ensured that file can only be accessed by specific user in locality, and and if only if occurs in the coverage of legal Bluetooth beacon for file access.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of file security delivery system and side based on Bluetooth beacon
Method.
Background technology
It is always target that enterprise is necessary to ensure that for a long time that how safety, which is issued with preview file,.When reverting to traditional papery
In generation, although paper document can preserve for a long time on the premise of physical security, convenience and chronicity are that file papery is deposited
The insurmountable problem of shelves.To the information age, although the shared of file becomes very convenient, various security challenges
Emerge in an endless stream.File leakage may cause very serious injury to enterprise.How the security and convenience of file is taken into account, more
In kind corporate environment, the mainstream technology and product analysis researched and developed and applied at present are as follows:
1. file encryption is the main force of protecting information safety now, the technology is intended to carry out full disk encryption to disk, so as to real
Existing data force encryption, provide the user the running environment of a safety.The shortcomings that disk encryption technology is, disk encryption
Time cycle is longer, causes the project implementation cycle longer.In addition, file encryption is not equal to the safety of data in a network
Property.File once departs from disk into network transmission, it is necessary to new safety prevention measure.Prior art can ensure the storage of file
Security, but in the network service flourishing epoch, unless file is only deposited in peace by this document completely without network transmission
Being perfectly safe for file is not meant in full storage medium.Who am visible, wherein visible for file, is file transfer management
The emphasis and difficult point in field;
2. traditional information security technology, such as fire wall, intrusion detection, anti-virus, it is mainly used in pointedly preventing enterprise
Network is invaded, and prevents file system by virus attack, to be mainly used in Internet and file layers.The shortcomings that program is,
Technology specific aim is not strong, can not efficiently control shared file.For example, traditional anti-virus software can not meticulously analyze it is each
The content of individual file is so as to protecting each file;
3. reveal guard system in terminal installation data(DLP).The system features are, special according to files such as content-keywords
Sign is analyzed, so as to be managed to the operation behavior of file.For example, forbid copying file of certain content etc..The program
The shortcomings that be, leakage prevention system deployment is complex, it is necessary to persistently monitors the state of each file, Synchronization Analysis
File content, more significantly affect the response performance of whole system;
4. safety management is carried out to file by virtual desktop or virtual application.User can only be in the desktop and void of virtualization
The application of planization(Such as Windows remote desktops)Middle to open specific file, client is only see file projection, and can not be straight
Obtain and take file.The shortcomings that program, is in need to specially build virtualization could realize file access, resource using desktop system
Consumption is big, and cost is high.
It is noted that also there is a common problem in above-mentioned piecemeal solution scheme, in the information age, it is difficult to as text
Part papery management period is the same, it is ensured that file can only be accessed by specific user in locality.
Therefore, it is necessary a kind of file security secret sharing that lightweight is provided, inexpensive in the information age, by text
The transmission and preview of part become more meticulous, and neatly help user to realize the safety management of file.
The content of the invention
The present invention is intended to provide a kind of file security delivery system and method based on Bluetooth beacon, it is ensured that file can only be by
Specific user accesses in locality.
The present invention is intended to provide a kind of file security delivery system and method based on Bluetooth beacon, file access when and only
When generation is in the coverage of legal Bluetooth beacon.
To realize the foregoing invention purpose of the present invention, the present invention uses following technical scheme:
A kind of file security delivery system based on Bluetooth beacon, including file server, file access terminal and at least one
Bluetooth beacon, wherein the file server includes file information block and location information module, the file information block is used
In the label information for storing the Bluetooth beacon, the Bluetooth beacon is associated with file to be released, the positional information mould
Block is used for the positional information for storing the Bluetooth beacon, and the Bluetooth beacon is associated with its covering position;
File server is used to load file to be released, sets the access rights of file to be released, associates the file to be released
With the Bluetooth beacon, file access terminal is used to detect and send the label information of the Bluetooth beacon;With
When the file server judges that the label information that the file access terminal is sent is legal, the label information pair is returned
The file to be released answered;When the file server judges that the label information that the file access terminal is sent is illegal, refuse
The exhausted file access terminal access file to be released.
Wherein, the file server periodically obtains the label information that the file access terminal is sent, when the file
When server judges that the label information is illegal, the file access terminal access file to be released is terminated.According to the present invention's
Preferred embodiment and its variant embodiment, a kind of file security dissemination method based on Bluetooth beacon, including step:
(1)Bluetooth beacon, file information block and location information module are initialized, to the file information block and the position
Information module marks the label information and positional information of the Bluetooth beacon respectively;
(2)File server loads file to be released, sets the access rights of file to be released;
(3)The file server associates file to be released and the Bluetooth beacon;
(4)File access terminal detects and sends the label information of the Bluetooth beacon;
(5)When the file server judges that the label information that the file access terminal is sent is legal, mark letter is returned
File to be released corresponding to breath;When the file server judges that the label information that the file access terminal is sent is illegal
When, refuse the file access terminal access file to be released.
Wherein, step 6 is further comprised:The file server periodically obtains the mark that the file access terminal is sent
Information, when the file server judges that the label information is illegal, terminate the file access terminal access text to be released
Part.
Wherein, the label information in step 1 is the ID of the Bluetooth beacon.
Wherein, the positional information in step 1 is the signal intensity of the Bluetooth beacon.
Wherein, in step 1, random parameter is synchronously generated when marking the label information, the random parameter and the indigo plant
Tooth beacon is uniquely bound.
Wherein, in step 1, the file server supports certification login or anonymous login.
Wherein, in step 2, the file access authority to be released includes read-only access and readable write access.
Wherein, in step 5, the file server and the file access terminal selectively using cipher mode or
Non-encrypted mode communicates.
Brief description of the drawings
Fig. 1 is structural representation according to a preferred embodiment of the invention.
Fig. 2 is the schematic flow sheet according to the above preferred embodiment of the present invention.
Embodiment
Describe to be used to disclose the present invention below so that those skilled in the art can realize the present invention.It is excellent in describing below
Embodiment is selected to be only used as illustrating, it may occur to persons skilled in the art that other obvious modifications.Define in the following description
General principle of the invention can apply to other embodiments, deformation program, improvement project, equivalent and do not carry on the back
From the other technologies scheme of the spirit and scope of the present invention.
The invention discloses a kind of file security delivery system and method based on Bluetooth beacon, Fig. 1 of refer to the attached drawing, root
According to the preferred embodiments of the present invention, the file security delivery system based on Bluetooth beacon includes file server 11, file
Terminal 12 and at least one Bluetooth beacon 13 are accessed, wherein the file server includes file information block 111 and position is believed
Module 112 is ceased, the file information block 111 is used for the label information for storing the Bluetooth beacon 13, by the Bluetooth beacon
13 is associated with file to be released;The location information module 112 is used for the positional information for storing the Bluetooth beacon 13, by institute
It is associated with its covering position to state Bluetooth beacon 13.
Bluetooth technology(Beacon)Short distance broadcast notice and indoor positioning can be applied to, ensures that a certain service can only be
Found and accessed by user in pre-determined distance, can be associated with the label information of specific Bluetooth beacon, as with Bluetooth beacon
ID is bound, it is ensured that the exact controllability of service.Low in hardware cost with Bluetooth function, single cost is relatively low to be easy on a large scale
Popularization.In the information age, Bluetooth technology is increasingly widespread, and most of smart mobile phone, tablet personal computer, notebook computer are all interior
Bluetooth function is put, the use cost of user is greatly reduced.Bluetooth beacon is the hardware based on bluetooth, can be continued into preset range
Exclusive label information is sent to low-power, as the ID of Bluetooth beacon, the ID can be scanned and parsed by bluetooth equipment.
According to above preferred embodiment, the file security dissemination method based on Bluetooth beacon walks including system initialization
Suddenly, file distribution step and file access steps.
Preferably, the system initialization step includes:
1. the file server 11 loads file to be released.Wherein, the file server 11 can be the WEB based on http
Server or a kind of server based on system file.The file server 11 support user authentication log in or
Anonymous login;
2. the initialization Bluetooth beacon 13.The file server 11 is by the label information of the Bluetooth beacon 13(This is preferably
Embodiment uses the ID of the Bluetooth beacon 13)File information block 111 described in typing;
3. the initialization file information block 111.The file server 11 marks the Bluetooth beacon 13 and text to be released
The corresponding relation of part;
4. the initialization location information module 112.The file server 11 marks the Bluetooth beacon 13 and covering position
Corresponding relation.
It is worth noting that, in the step 1 of the system initialization step, when the file server 11 is by the indigo plant
File information block 111 described in the label information typing of tooth beacon 13, the file server 11 by URL address informations point to
The associated address of the file server 11.The file information block 111 is preferably using the above-mentioned mark letter of database purchase
Breath.The address information is used for false proof, the further one random parameter K of generation at random of the file server 11(Originally it is preferable to carry out
The character string that example is formed using unordered character).For example, http://www.filesecure.cn/k=
1j2hjhjk1l12312hhh.The label information of the Bluetooth beacon 13(ID)Relation citing with the random parameter K is such as
Under:
Bluetooth beacon label information(ID)Parameter K
0001 1j2hjhjkfwhk1l12312
0001 1j2hsdfsdadsdfsfsdf
0002 4fgdfgdgdf121312123
0003 1j2hjytyrte112131jh
0004 Dsfdsftertry6576111。
It is worth noting that, in the step 3 of the system initialization step, when the label information of the Bluetooth beacon 13
During duplication of name, the file server 11 refuses the label information of the typing Bluetooth beacon 13.The Bluetooth beacon 13 and to be released
The relativeness of file is the relation of multi-to-multi.In other words, it is pending can to associate one or more for the single Bluetooth beacon 13
Cloth file, single file to be released can associate one or more Bluetooth beacon 13.For example, Bluetooth beacon 0001 associates text
Part 0001 and file 0002, file 0003 associate Bluetooth beacon 0002 and Bluetooth beacon 0004, and file 0004 is individually and bluetooth
Beacon 0003 associates.
It is worth noting that, in the step 4 of the system initialization step, the covering position is specifically defined as space
Longitude, latitude and height above sea level.The characteristics of being limited in scope using the signal function of Bluetooth beacon 13, the file server 11 will
The Bluetooth beacon 13 joins with the space correlation where it.The location information module 112 is preferably above-mentioned using database purchase
The information of covering position.For example, in building, which room that the location information module 112 can store same floor can be examined
The label information of the Bluetooth beacon 13 is measured, or which room of which floor can detect the Bluetooth beacon 13
Label information.
It is worth noting that, the Bluetooth beacon 13 is sustainable with low power to preset range broadcast flag information, in reality
The single Bluetooth beacon 13 is likely to occur in the application of border situation about finding is detected in multiple labeled covering positions.
When there is the above situation, the file server 11 marks the signal intensity of each Bluetooth beacon 13, strong by signal
Degree just more accurately marks the corresponding relation of each Bluetooth beacon 13 and each covering position, is exemplified below:
Bluetooth beacon label information(ID)Room number signal intensity
The room 90 of 0001 Stall 101
The room 50 of 0002 Stall 102
The room 90 of 0003 second floor 103
00310 buildings 501 rooms 95.
Preferably, include referring to Fig. 2 of accompanying drawing, the file distribution step:
1. the file server 11 loads file to be released, the file server 11 sets the access right of file to be released
Limit.2. the file server 11 is searched for and filters the Bluetooth beacon 13 to obtain the Bluetooth beacon 13.
3. the file to be released described in the associated steps 1 of file server 11 and the Bluetooth beacon 13 described in step 2.
It is worth noting that, in the step 1 of the file distribution step, the associated permissions of file to be released are included but not
It is limited to:File to be released and which covering position is set to be associated;The mark of file to be released and the Bluetooth beacon 13 is believed
It is number associated;File to be released can be accessed or accessed without personnel by specific people and limit;The addressable time of file to be released
Section;File to be released is read-only access or readable write access.
According to the above preferred embodiment of the present invention, the file access terminal 12 can use the electronics with Bluetooth function
Equipment, such as mobile phone or computer.The file server 11 and the file access terminal 12, which optionally use, to be added
Close or non-encrypted mode communicates.
Preferably, include referring to Fig. 2 of accompanying drawing, the file access steps:
1. the file access terminal 12 and the bi-directional acknowledged communication of file server 11 are unimpeded;
2. the file access terminal 12 opens bluetooth, the Bluetooth beacon 13 on periphery is searched for;
3. anonymous login or certification log in the file server 11;
4. the file server 11 is according to label information(ID)Select the Bluetooth beacon 13;
5. the file server 11 obtain the Bluetooth beacon 13 that the file access terminal 12 is sent label information and
Its random parameter K;
6. label information and random parameter K described in the judgment step 5 of file server 11, when the label information and institute
Random parameter K is stated not to be inconsistent, i.e., it is illegal, then refuse the file access terminal 12 and obtain file to be released, when the mark letter
Breath is consistent with the random parameter K, i.e., legal, then the file server 11 is inquired about all and mark of the Bluetooth beacon 13 and believed
The file to be released of manner of breathing association;
7. the file server 11 returns to qualified file to be released to the file access terminal 12;
8. the file server 11 periodically obtains the mark letter for the Bluetooth beacon 13 that the file access terminal 12 is sent
Breath and its random parameter K, when the label information and random parameter K described in the judgment step 7 of file server 11, when described
When label information is not inconsistent with the random parameter K or obtains the non-default label information, it is whole to terminate the file access
End 12 accesses file to be released.
It is worth noting that, the above preferred embodiment according to the present invention:
Document to be protected is needed to upload in the file server 11, each file to be released is in the file server 11
With exclusive path;
The access rights of file to be released are set, and who can access file(Need certification or anonymity), be read-only access also
It is readable write access;
The label information of file to be released and the Bluetooth beacon 13 is associated, by file to be released and the Bluetooth beacon 13
Covering position be associated;
In ad-hoc location, by the label information of the most strong Bluetooth beacon 13 of signal intensity(ID)Enter to advance with the covering position
One step associates;
The incidence relation of file to be released and the Bluetooth beacon 13, it may be possible to 1 pair 1, either more than 1 pair or multipair 1, or
Multi-to-multi;
The file access terminal 12 and the two-way communication of file server 11, if necessary to certification, the file access is whole
End 12 authenticated need to can just log in the file server 11;
After the file access terminal 12 is successfully connected the file server 11, the neighbouring Bluetooth beacon is begun look for
13。
If the Bluetooth beacon 13 can be searched out, the file access terminal 12 believes the most strong bluetooth of signal intensity
The label information of mark 13 is sent to the file server 11;
The file server 11 verifies whether legal the information of Bluetooth beacon is, for example whether with the file information block
111 presupposed information is consistent;
If the label information of the Bluetooth beacon 13 is consistent, the file server 11 returns to the file access terminal 12
File to be released, returning to the access rights that form depends on formerly setting is read-only access or can change access;
The file access terminal 12 obtains file to be released by the file server 11;
The file access terminal 12 need to periodically detect the Bluetooth beacon 13 after file to be released is obtained, and by institute
The label information for stating Bluetooth beacon 13 is sent to the file server 11, and the file server 11 need to continue blue described in certification
Validity between tooth beacon 13 and file to be released.If the label information and papers continued to be released of the Bluetooth beacon 13
Effectively, then the file access terminal 12 can be with continuous access, and otherwise the file server 11 will terminate the file access
Terminal 12 accesses file to be released.If file access terminal 12 can not nearby detect any effective Bluetooth beacon 13
Marking signal, automatic terminate access file to be released.
It will be appreciated by those skilled in the art that above preferred embodiment of the present invention also has mode of texturing.For example, the text
Part information module 111 and the location information module 112 can merge into same module, and the module stores the Bluetooth beacon respectively
13 label information and positional information.And for example, the file security delivery system based on Bluetooth beacon is believed using exclusive bluetooth
Mark, and if only if scans and parse the label information of the exclusive Bluetooth beacon of the system for the file access terminal 12, and refuses
The marking signal outside exclusive Bluetooth beacon is sent absolutely.On the other hand, due to bluetooth equipment generally existing and marking signal has
Uniqueness, the file access terminal 12 can scan and parse the label information of including but not limited to exclusive Bluetooth beacon, example
Special handset such as specific user is arranged to legal Bluetooth beacon, as long as the file access terminal 12 is scanned and is resolved to
The mobile phone then may have access to file to be released corresponding to the mobile phone.
It should be understood by those skilled in the art that the embodiments of the invention shown in foregoing description and accompanying drawing are only used as illustrating
And it is not intended to limit the present invention.The purpose of the present invention completely and effectively realizes.The function and structural principle of the present invention exists
Show and illustrate in embodiment, under without departing from the principle, embodiments of the present invention can have any deformation or modification.
Claims (10)
- A kind of 1. file security delivery system based on Bluetooth beacon, it is characterised in that including:File server, file access terminal and at least one Bluetooth beacon, wherein the file server includes fileinfo Module and location information module, the file information block is used for the label information for storing the Bluetooth beacon, by the bluetooth Beacon is associated with file to be released, and the location information module is used for the positional information for storing the Bluetooth beacon, by described in Bluetooth beacon is associated with its covering position;File server is used to load file to be released, sets the access rights of file to be released, associates the file to be released With the Bluetooth beacon, file access terminal is used to detect and send the label information of the Bluetooth beacon;WithWhen the file server judges that the label information that the file access terminal is sent is legal, the label information pair is returned The file to be released answered;When the file server judges that the label information that the file access terminal is sent is illegal, refuse The exhausted file access terminal access file to be released.
- 2. the document security delivery system according to claim 1 based on Bluetooth beacon, it is characterised in that the file clothes Business device periodically obtains the label information that the file access terminal is sent, when the file server judges that the label information does not conform to During method, the file access terminal access file to be released is terminated.
- 3. a kind of file security dissemination method based on Bluetooth beacon, it is characterised in that including step:(1)Bluetooth beacon, file information block and location information module are initialized, to the file information block and the position Information module marks the label information and positional information of the Bluetooth beacon respectively;(2)File server loads file to be released, sets the access rights of file to be released;(3)The file server associates file to be released and the Bluetooth beacon;(4)File access terminal detects and sends the label information of the Bluetooth beacon;(5)When the file server judges that the label information that the file access terminal is sent is legal, mark letter is returned File to be released corresponding to breath;When the file server judges that the label information that the file access terminal is sent is illegal When, refuse the file access terminal access file to be released.
- 4. the file security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that further comprise Step 6:The file server periodically obtains the label information that the file access terminal is sent, when the file server is sentenced When the label information is illegal calmly, the file access terminal access file to be released is terminated.
- 5. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1 Label information is the ID of the Bluetooth beacon.
- 6. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1 Positional information is the signal intensity of the Bluetooth beacon.
- 7. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1, Random parameter is synchronously generated when marking the label information, the random parameter is uniquely bound with the Bluetooth beacon.
- 8. the file security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1, institute State file server and support certification login or anonymous login.
- 9. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 2, institute Stating file access authority to be released includes read-only access and readable write access.
- 10. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 5, Communicated using cipher mode or non-encrypted mode the file server and the file access terminal selectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610417363.4A CN107517176A (en) | 2016-06-15 | 2016-06-15 | File security delivery system and method based on Bluetooth beacon |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610417363.4A CN107517176A (en) | 2016-06-15 | 2016-06-15 | File security delivery system and method based on Bluetooth beacon |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107517176A true CN107517176A (en) | 2017-12-26 |
Family
ID=60720511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610417363.4A Pending CN107517176A (en) | 2016-06-15 | 2016-06-15 | File security delivery system and method based on Bluetooth beacon |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107517176A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090077620A1 (en) * | 2007-05-17 | 2009-03-19 | Ravi Ranjith Chirakkoly | Method and System for Location-Based Wireless Network |
CN101668293A (en) * | 2009-10-21 | 2010-03-10 | 杭州华三通信技术有限公司 | Control method and system of network access authority in WLAN |
CN102685142A (en) * | 2012-05-23 | 2012-09-19 | 华为技术有限公司 | File authority control method, device and system |
CN103077672A (en) * | 2012-12-28 | 2013-05-01 | 合肥工业大学 | Geographical position related public traffic advertisement issuing system |
CN103581179A (en) * | 2013-10-25 | 2014-02-12 | 福建伊时代信息科技股份有限公司 | Data access control system based on position, server and method |
CN104636645A (en) * | 2015-01-27 | 2015-05-20 | 腾讯科技(深圳)有限公司 | Method and device for controlling data accessing |
CN104717223A (en) * | 2015-03-26 | 2015-06-17 | 小米科技有限责任公司 | Data access method and device |
CN104717204A (en) * | 2015-02-02 | 2015-06-17 | 深圳市中兴移动通信有限公司 | Method for controlling file access permission and terminal |
-
2016
- 2016-06-15 CN CN201610417363.4A patent/CN107517176A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090077620A1 (en) * | 2007-05-17 | 2009-03-19 | Ravi Ranjith Chirakkoly | Method and System for Location-Based Wireless Network |
CN101668293A (en) * | 2009-10-21 | 2010-03-10 | 杭州华三通信技术有限公司 | Control method and system of network access authority in WLAN |
CN102685142A (en) * | 2012-05-23 | 2012-09-19 | 华为技术有限公司 | File authority control method, device and system |
CN103077672A (en) * | 2012-12-28 | 2013-05-01 | 合肥工业大学 | Geographical position related public traffic advertisement issuing system |
CN103581179A (en) * | 2013-10-25 | 2014-02-12 | 福建伊时代信息科技股份有限公司 | Data access control system based on position, server and method |
CN104636645A (en) * | 2015-01-27 | 2015-05-20 | 腾讯科技(深圳)有限公司 | Method and device for controlling data accessing |
CN104717204A (en) * | 2015-02-02 | 2015-06-17 | 深圳市中兴移动通信有限公司 | Method for controlling file access permission and terminal |
CN104717223A (en) * | 2015-03-26 | 2015-06-17 | 小米科技有限责任公司 | Data access method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104169940B (en) | Company's digital information is limited in the method in organizational boundaries | |
Mathisen | Security challenges and solutions in cloud computing | |
Tsai et al. | Information security issue of enterprises adopting the application of cloud computing | |
TWI691861B (en) | Resource permission management method and device | |
CN104717223A (en) | Data access method and device | |
GB2503230A (en) | Location based network access | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
Shackelford | Business and cyber peace: We need you! | |
CN101909298A (en) | Secure access control method and device for wireless network | |
US20050238174A1 (en) | Method and system for secure communications over a public network | |
CN108200073B (en) | Sensitive data safety protection system | |
TW201421936A (en) | Method for distinguishing and blocking off network node | |
Meshram et al. | A survey paper on vulnerabilities in android OS and security of android devices | |
CN105659247B (en) | The proactive Threat Management system of context-aware | |
JP4450653B2 (en) | Electronic information management system | |
GB2535579A (en) | Preventing unauthorized access to an application server | |
JP6729013B2 (en) | Information processing system, information processing apparatus, and program | |
Wu | The problems in campus network information security and its solutions | |
CN107517176A (en) | File security delivery system and method based on Bluetooth beacon | |
Byeong-Ho | Ubiquitous computing environment threats and defensive measures | |
HARRIS et al. | Mobile Device Security Issues Within the US Disadvantaged Business Enterprise Program. | |
Xiao | Research on Cyberspace Security System Based on Cloud Computing Environment | |
KR101304452B1 (en) | A cloud system for document management using location | |
CN101778108B (en) | Method and device for preventing falsification of homepage of server | |
KR20010016070A (en) | a Hidden Password in the Throwaway Identification System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171226 |