CN107517176A - File security delivery system and method based on Bluetooth beacon - Google Patents

File security delivery system and method based on Bluetooth beacon Download PDF

Info

Publication number
CN107517176A
CN107517176A CN201610417363.4A CN201610417363A CN107517176A CN 107517176 A CN107517176 A CN 107517176A CN 201610417363 A CN201610417363 A CN 201610417363A CN 107517176 A CN107517176 A CN 107517176A
Authority
CN
China
Prior art keywords
file
bluetooth beacon
released
access terminal
label information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610417363.4A
Other languages
Chinese (zh)
Inventor
魏力群
吴昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Xin Faction Technology Co Ltd
Original Assignee
Hangzhou Xin Faction Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Xin Faction Technology Co Ltd filed Critical Hangzhou Xin Faction Technology Co Ltd
Priority to CN201610417363.4A priority Critical patent/CN107517176A/en
Publication of CN107517176A publication Critical patent/CN107517176A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

The present invention provides a kind of file security delivery system and method based on Bluetooth beacon, the file security delivery system based on Bluetooth beacon includes file server, file access terminal and at least one Bluetooth beacon, the file server includes file information block and location information module, file server is used to load file to be released, the access rights of file to be released are set, the file to be released and the Bluetooth beacon are associated, file access terminal is used to detect and send the label information of the Bluetooth beacon.When the file server judges that the label information that the file access terminal is sent is legal, file to be released corresponding to the label information is returned;If not conforming to rule refuses the file access terminal access file to be released, it is ensured that file can only be accessed by specific user in locality, and and if only if occurs in the coverage of legal Bluetooth beacon for file access.

Description

File security delivery system and method based on Bluetooth beacon
Technical field
The present invention relates to information security field, more particularly to a kind of file security delivery system and side based on Bluetooth beacon Method.
Background technology
It is always target that enterprise is necessary to ensure that for a long time that how safety, which is issued with preview file,.When reverting to traditional papery In generation, although paper document can preserve for a long time on the premise of physical security, convenience and chronicity are that file papery is deposited The insurmountable problem of shelves.To the information age, although the shared of file becomes very convenient, various security challenges Emerge in an endless stream.File leakage may cause very serious injury to enterprise.How the security and convenience of file is taken into account, more In kind corporate environment, the mainstream technology and product analysis researched and developed and applied at present are as follows:
1. file encryption is the main force of protecting information safety now, the technology is intended to carry out full disk encryption to disk, so as to real Existing data force encryption, provide the user the running environment of a safety.The shortcomings that disk encryption technology is, disk encryption Time cycle is longer, causes the project implementation cycle longer.In addition, file encryption is not equal to the safety of data in a network Property.File once departs from disk into network transmission, it is necessary to new safety prevention measure.Prior art can ensure the storage of file Security, but in the network service flourishing epoch, unless file is only deposited in peace by this document completely without network transmission Being perfectly safe for file is not meant in full storage medium.Who am visible, wherein visible for file, is file transfer management The emphasis and difficult point in field;
2. traditional information security technology, such as fire wall, intrusion detection, anti-virus, it is mainly used in pointedly preventing enterprise Network is invaded, and prevents file system by virus attack, to be mainly used in Internet and file layers.The shortcomings that program is, Technology specific aim is not strong, can not efficiently control shared file.For example, traditional anti-virus software can not meticulously analyze it is each The content of individual file is so as to protecting each file;
3. reveal guard system in terminal installation data(DLP).The system features are, special according to files such as content-keywords Sign is analyzed, so as to be managed to the operation behavior of file.For example, forbid copying file of certain content etc..The program The shortcomings that be, leakage prevention system deployment is complex, it is necessary to persistently monitors the state of each file, Synchronization Analysis File content, more significantly affect the response performance of whole system;
4. safety management is carried out to file by virtual desktop or virtual application.User can only be in the desktop and void of virtualization The application of planization(Such as Windows remote desktops)Middle to open specific file, client is only see file projection, and can not be straight Obtain and take file.The shortcomings that program, is in need to specially build virtualization could realize file access, resource using desktop system Consumption is big, and cost is high.
It is noted that also there is a common problem in above-mentioned piecemeal solution scheme, in the information age, it is difficult to as text Part papery management period is the same, it is ensured that file can only be accessed by specific user in locality.
Therefore, it is necessary a kind of file security secret sharing that lightweight is provided, inexpensive in the information age, by text The transmission and preview of part become more meticulous, and neatly help user to realize the safety management of file.
The content of the invention
The present invention is intended to provide a kind of file security delivery system and method based on Bluetooth beacon, it is ensured that file can only be by Specific user accesses in locality.
The present invention is intended to provide a kind of file security delivery system and method based on Bluetooth beacon, file access when and only When generation is in the coverage of legal Bluetooth beacon.
To realize the foregoing invention purpose of the present invention, the present invention uses following technical scheme:
A kind of file security delivery system based on Bluetooth beacon, including file server, file access terminal and at least one Bluetooth beacon, wherein the file server includes file information block and location information module, the file information block is used In the label information for storing the Bluetooth beacon, the Bluetooth beacon is associated with file to be released, the positional information mould Block is used for the positional information for storing the Bluetooth beacon, and the Bluetooth beacon is associated with its covering position;
File server is used to load file to be released, sets the access rights of file to be released, associates the file to be released With the Bluetooth beacon, file access terminal is used to detect and send the label information of the Bluetooth beacon;With
When the file server judges that the label information that the file access terminal is sent is legal, the label information pair is returned The file to be released answered;When the file server judges that the label information that the file access terminal is sent is illegal, refuse The exhausted file access terminal access file to be released.
Wherein, the file server periodically obtains the label information that the file access terminal is sent, when the file When server judges that the label information is illegal, the file access terminal access file to be released is terminated.According to the present invention's Preferred embodiment and its variant embodiment, a kind of file security dissemination method based on Bluetooth beacon, including step:
(1)Bluetooth beacon, file information block and location information module are initialized, to the file information block and the position Information module marks the label information and positional information of the Bluetooth beacon respectively;
(2)File server loads file to be released, sets the access rights of file to be released;
(3)The file server associates file to be released and the Bluetooth beacon;
(4)File access terminal detects and sends the label information of the Bluetooth beacon;
(5)When the file server judges that the label information that the file access terminal is sent is legal, mark letter is returned File to be released corresponding to breath;When the file server judges that the label information that the file access terminal is sent is illegal When, refuse the file access terminal access file to be released.
Wherein, step 6 is further comprised:The file server periodically obtains the mark that the file access terminal is sent Information, when the file server judges that the label information is illegal, terminate the file access terminal access text to be released Part.
Wherein, the label information in step 1 is the ID of the Bluetooth beacon.
Wherein, the positional information in step 1 is the signal intensity of the Bluetooth beacon.
Wherein, in step 1, random parameter is synchronously generated when marking the label information, the random parameter and the indigo plant Tooth beacon is uniquely bound.
Wherein, in step 1, the file server supports certification login or anonymous login.
Wherein, in step 2, the file access authority to be released includes read-only access and readable write access.
Wherein, in step 5, the file server and the file access terminal selectively using cipher mode or Non-encrypted mode communicates.
Brief description of the drawings
Fig. 1 is structural representation according to a preferred embodiment of the invention.
Fig. 2 is the schematic flow sheet according to the above preferred embodiment of the present invention.
Embodiment
Describe to be used to disclose the present invention below so that those skilled in the art can realize the present invention.It is excellent in describing below Embodiment is selected to be only used as illustrating, it may occur to persons skilled in the art that other obvious modifications.Define in the following description General principle of the invention can apply to other embodiments, deformation program, improvement project, equivalent and do not carry on the back From the other technologies scheme of the spirit and scope of the present invention.
The invention discloses a kind of file security delivery system and method based on Bluetooth beacon, Fig. 1 of refer to the attached drawing, root According to the preferred embodiments of the present invention, the file security delivery system based on Bluetooth beacon includes file server 11, file Terminal 12 and at least one Bluetooth beacon 13 are accessed, wherein the file server includes file information block 111 and position is believed Module 112 is ceased, the file information block 111 is used for the label information for storing the Bluetooth beacon 13, by the Bluetooth beacon 13 is associated with file to be released;The location information module 112 is used for the positional information for storing the Bluetooth beacon 13, by institute It is associated with its covering position to state Bluetooth beacon 13.
Bluetooth technology(Beacon)Short distance broadcast notice and indoor positioning can be applied to, ensures that a certain service can only be Found and accessed by user in pre-determined distance, can be associated with the label information of specific Bluetooth beacon, as with Bluetooth beacon ID is bound, it is ensured that the exact controllability of service.Low in hardware cost with Bluetooth function, single cost is relatively low to be easy on a large scale Popularization.In the information age, Bluetooth technology is increasingly widespread, and most of smart mobile phone, tablet personal computer, notebook computer are all interior Bluetooth function is put, the use cost of user is greatly reduced.Bluetooth beacon is the hardware based on bluetooth, can be continued into preset range Exclusive label information is sent to low-power, as the ID of Bluetooth beacon, the ID can be scanned and parsed by bluetooth equipment.
According to above preferred embodiment, the file security dissemination method based on Bluetooth beacon walks including system initialization Suddenly, file distribution step and file access steps.
Preferably, the system initialization step includes:
1. the file server 11 loads file to be released.Wherein, the file server 11 can be the WEB based on http Server or a kind of server based on system file.The file server 11 support user authentication log in or Anonymous login;
2. the initialization Bluetooth beacon 13.The file server 11 is by the label information of the Bluetooth beacon 13(This is preferably Embodiment uses the ID of the Bluetooth beacon 13)File information block 111 described in typing;
3. the initialization file information block 111.The file server 11 marks the Bluetooth beacon 13 and text to be released The corresponding relation of part;
4. the initialization location information module 112.The file server 11 marks the Bluetooth beacon 13 and covering position Corresponding relation.
It is worth noting that, in the step 1 of the system initialization step, when the file server 11 is by the indigo plant File information block 111 described in the label information typing of tooth beacon 13, the file server 11 by URL address informations point to The associated address of the file server 11.The file information block 111 is preferably using the above-mentioned mark letter of database purchase Breath.The address information is used for false proof, the further one random parameter K of generation at random of the file server 11(Originally it is preferable to carry out The character string that example is formed using unordered character).For example, http://www.filesecure.cn/k= 1j2hjhjk1l12312hhh.The label information of the Bluetooth beacon 13(ID)Relation citing with the random parameter K is such as Under:
Bluetooth beacon label information(ID)Parameter K
0001 1j2hjhjkfwhk1l12312
0001 1j2hsdfsdadsdfsfsdf
0002 4fgdfgdgdf121312123
0003 1j2hjytyrte112131jh
0004 Dsfdsftertry6576111。
It is worth noting that, in the step 3 of the system initialization step, when the label information of the Bluetooth beacon 13 During duplication of name, the file server 11 refuses the label information of the typing Bluetooth beacon 13.The Bluetooth beacon 13 and to be released The relativeness of file is the relation of multi-to-multi.In other words, it is pending can to associate one or more for the single Bluetooth beacon 13 Cloth file, single file to be released can associate one or more Bluetooth beacon 13.For example, Bluetooth beacon 0001 associates text Part 0001 and file 0002, file 0003 associate Bluetooth beacon 0002 and Bluetooth beacon 0004, and file 0004 is individually and bluetooth Beacon 0003 associates.
It is worth noting that, in the step 4 of the system initialization step, the covering position is specifically defined as space Longitude, latitude and height above sea level.The characteristics of being limited in scope using the signal function of Bluetooth beacon 13, the file server 11 will The Bluetooth beacon 13 joins with the space correlation where it.The location information module 112 is preferably above-mentioned using database purchase The information of covering position.For example, in building, which room that the location information module 112 can store same floor can be examined The label information of the Bluetooth beacon 13 is measured, or which room of which floor can detect the Bluetooth beacon 13 Label information.
It is worth noting that, the Bluetooth beacon 13 is sustainable with low power to preset range broadcast flag information, in reality The single Bluetooth beacon 13 is likely to occur in the application of border situation about finding is detected in multiple labeled covering positions. When there is the above situation, the file server 11 marks the signal intensity of each Bluetooth beacon 13, strong by signal Degree just more accurately marks the corresponding relation of each Bluetooth beacon 13 and each covering position, is exemplified below:
Bluetooth beacon label information(ID)Room number signal intensity
The room 90 of 0001 Stall 101
The room 50 of 0002 Stall 102
The room 90 of 0003 second floor 103
00310 buildings 501 rooms 95.
Preferably, include referring to Fig. 2 of accompanying drawing, the file distribution step:
1. the file server 11 loads file to be released, the file server 11 sets the access right of file to be released Limit.2. the file server 11 is searched for and filters the Bluetooth beacon 13 to obtain the Bluetooth beacon 13.
3. the file to be released described in the associated steps 1 of file server 11 and the Bluetooth beacon 13 described in step 2.
It is worth noting that, in the step 1 of the file distribution step, the associated permissions of file to be released are included but not It is limited to:File to be released and which covering position is set to be associated;The mark of file to be released and the Bluetooth beacon 13 is believed It is number associated;File to be released can be accessed or accessed without personnel by specific people and limit;The addressable time of file to be released Section;File to be released is read-only access or readable write access.
According to the above preferred embodiment of the present invention, the file access terminal 12 can use the electronics with Bluetooth function Equipment, such as mobile phone or computer.The file server 11 and the file access terminal 12, which optionally use, to be added Close or non-encrypted mode communicates.
Preferably, include referring to Fig. 2 of accompanying drawing, the file access steps:
1. the file access terminal 12 and the bi-directional acknowledged communication of file server 11 are unimpeded;
2. the file access terminal 12 opens bluetooth, the Bluetooth beacon 13 on periphery is searched for;
3. anonymous login or certification log in the file server 11;
4. the file server 11 is according to label information(ID)Select the Bluetooth beacon 13;
5. the file server 11 obtain the Bluetooth beacon 13 that the file access terminal 12 is sent label information and Its random parameter K;
6. label information and random parameter K described in the judgment step 5 of file server 11, when the label information and institute Random parameter K is stated not to be inconsistent, i.e., it is illegal, then refuse the file access terminal 12 and obtain file to be released, when the mark letter Breath is consistent with the random parameter K, i.e., legal, then the file server 11 is inquired about all and mark of the Bluetooth beacon 13 and believed The file to be released of manner of breathing association;
7. the file server 11 returns to qualified file to be released to the file access terminal 12;
8. the file server 11 periodically obtains the mark letter for the Bluetooth beacon 13 that the file access terminal 12 is sent Breath and its random parameter K, when the label information and random parameter K described in the judgment step 7 of file server 11, when described When label information is not inconsistent with the random parameter K or obtains the non-default label information, it is whole to terminate the file access End 12 accesses file to be released.
It is worth noting that, the above preferred embodiment according to the present invention:
Document to be protected is needed to upload in the file server 11, each file to be released is in the file server 11 With exclusive path;
The access rights of file to be released are set, and who can access file(Need certification or anonymity), be read-only access also It is readable write access;
The label information of file to be released and the Bluetooth beacon 13 is associated, by file to be released and the Bluetooth beacon 13 Covering position be associated;
In ad-hoc location, by the label information of the most strong Bluetooth beacon 13 of signal intensity(ID)Enter to advance with the covering position One step associates;
The incidence relation of file to be released and the Bluetooth beacon 13, it may be possible to 1 pair 1, either more than 1 pair or multipair 1, or Multi-to-multi;
The file access terminal 12 and the two-way communication of file server 11, if necessary to certification, the file access is whole End 12 authenticated need to can just log in the file server 11;
After the file access terminal 12 is successfully connected the file server 11, the neighbouring Bluetooth beacon is begun look for 13。
If the Bluetooth beacon 13 can be searched out, the file access terminal 12 believes the most strong bluetooth of signal intensity The label information of mark 13 is sent to the file server 11;
The file server 11 verifies whether legal the information of Bluetooth beacon is, for example whether with the file information block 111 presupposed information is consistent;
If the label information of the Bluetooth beacon 13 is consistent, the file server 11 returns to the file access terminal 12 File to be released, returning to the access rights that form depends on formerly setting is read-only access or can change access;
The file access terminal 12 obtains file to be released by the file server 11;
The file access terminal 12 need to periodically detect the Bluetooth beacon 13 after file to be released is obtained, and by institute The label information for stating Bluetooth beacon 13 is sent to the file server 11, and the file server 11 need to continue blue described in certification Validity between tooth beacon 13 and file to be released.If the label information and papers continued to be released of the Bluetooth beacon 13 Effectively, then the file access terminal 12 can be with continuous access, and otherwise the file server 11 will terminate the file access Terminal 12 accesses file to be released.If file access terminal 12 can not nearby detect any effective Bluetooth beacon 13 Marking signal, automatic terminate access file to be released.
It will be appreciated by those skilled in the art that above preferred embodiment of the present invention also has mode of texturing.For example, the text Part information module 111 and the location information module 112 can merge into same module, and the module stores the Bluetooth beacon respectively 13 label information and positional information.And for example, the file security delivery system based on Bluetooth beacon is believed using exclusive bluetooth Mark, and if only if scans and parse the label information of the exclusive Bluetooth beacon of the system for the file access terminal 12, and refuses The marking signal outside exclusive Bluetooth beacon is sent absolutely.On the other hand, due to bluetooth equipment generally existing and marking signal has Uniqueness, the file access terminal 12 can scan and parse the label information of including but not limited to exclusive Bluetooth beacon, example Special handset such as specific user is arranged to legal Bluetooth beacon, as long as the file access terminal 12 is scanned and is resolved to The mobile phone then may have access to file to be released corresponding to the mobile phone.
It should be understood by those skilled in the art that the embodiments of the invention shown in foregoing description and accompanying drawing are only used as illustrating And it is not intended to limit the present invention.The purpose of the present invention completely and effectively realizes.The function and structural principle of the present invention exists Show and illustrate in embodiment, under without departing from the principle, embodiments of the present invention can have any deformation or modification.

Claims (10)

  1. A kind of 1. file security delivery system based on Bluetooth beacon, it is characterised in that including:
    File server, file access terminal and at least one Bluetooth beacon, wherein the file server includes fileinfo Module and location information module, the file information block is used for the label information for storing the Bluetooth beacon, by the bluetooth Beacon is associated with file to be released, and the location information module is used for the positional information for storing the Bluetooth beacon, by described in Bluetooth beacon is associated with its covering position;
    File server is used to load file to be released, sets the access rights of file to be released, associates the file to be released With the Bluetooth beacon, file access terminal is used to detect and send the label information of the Bluetooth beacon;With
    When the file server judges that the label information that the file access terminal is sent is legal, the label information pair is returned The file to be released answered;When the file server judges that the label information that the file access terminal is sent is illegal, refuse The exhausted file access terminal access file to be released.
  2. 2. the document security delivery system according to claim 1 based on Bluetooth beacon, it is characterised in that the file clothes Business device periodically obtains the label information that the file access terminal is sent, when the file server judges that the label information does not conform to During method, the file access terminal access file to be released is terminated.
  3. 3. a kind of file security dissemination method based on Bluetooth beacon, it is characterised in that including step:
    (1)Bluetooth beacon, file information block and location information module are initialized, to the file information block and the position Information module marks the label information and positional information of the Bluetooth beacon respectively;
    (2)File server loads file to be released, sets the access rights of file to be released;
    (3)The file server associates file to be released and the Bluetooth beacon;
    (4)File access terminal detects and sends the label information of the Bluetooth beacon;
    (5)When the file server judges that the label information that the file access terminal is sent is legal, mark letter is returned File to be released corresponding to breath;When the file server judges that the label information that the file access terminal is sent is illegal When, refuse the file access terminal access file to be released.
  4. 4. the file security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that further comprise Step 6:The file server periodically obtains the label information that the file access terminal is sent, when the file server is sentenced When the label information is illegal calmly, the file access terminal access file to be released is terminated.
  5. 5. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1 Label information is the ID of the Bluetooth beacon.
  6. 6. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1 Positional information is the signal intensity of the Bluetooth beacon.
  7. 7. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1, Random parameter is synchronously generated when marking the label information, the random parameter is uniquely bound with the Bluetooth beacon.
  8. 8. the file security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 1, institute State file server and support certification login or anonymous login.
  9. 9. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 2, institute Stating file access authority to be released includes read-only access and readable write access.
  10. 10. the document security dissemination method according to claim 3 based on Bluetooth beacon, it is characterised in that in step 5, Communicated using cipher mode or non-encrypted mode the file server and the file access terminal selectively.
CN201610417363.4A 2016-06-15 2016-06-15 File security delivery system and method based on Bluetooth beacon Pending CN107517176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610417363.4A CN107517176A (en) 2016-06-15 2016-06-15 File security delivery system and method based on Bluetooth beacon

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610417363.4A CN107517176A (en) 2016-06-15 2016-06-15 File security delivery system and method based on Bluetooth beacon

Publications (1)

Publication Number Publication Date
CN107517176A true CN107517176A (en) 2017-12-26

Family

ID=60720511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610417363.4A Pending CN107517176A (en) 2016-06-15 2016-06-15 File security delivery system and method based on Bluetooth beacon

Country Status (1)

Country Link
CN (1) CN107517176A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077620A1 (en) * 2007-05-17 2009-03-19 Ravi Ranjith Chirakkoly Method and System for Location-Based Wireless Network
CN101668293A (en) * 2009-10-21 2010-03-10 杭州华三通信技术有限公司 Control method and system of network access authority in WLAN
CN102685142A (en) * 2012-05-23 2012-09-19 华为技术有限公司 File authority control method, device and system
CN103077672A (en) * 2012-12-28 2013-05-01 合肥工业大学 Geographical position related public traffic advertisement issuing system
CN103581179A (en) * 2013-10-25 2014-02-12 福建伊时代信息科技股份有限公司 Data access control system based on position, server and method
CN104636645A (en) * 2015-01-27 2015-05-20 腾讯科技(深圳)有限公司 Method and device for controlling data accessing
CN104717223A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Data access method and device
CN104717204A (en) * 2015-02-02 2015-06-17 深圳市中兴移动通信有限公司 Method for controlling file access permission and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077620A1 (en) * 2007-05-17 2009-03-19 Ravi Ranjith Chirakkoly Method and System for Location-Based Wireless Network
CN101668293A (en) * 2009-10-21 2010-03-10 杭州华三通信技术有限公司 Control method and system of network access authority in WLAN
CN102685142A (en) * 2012-05-23 2012-09-19 华为技术有限公司 File authority control method, device and system
CN103077672A (en) * 2012-12-28 2013-05-01 合肥工业大学 Geographical position related public traffic advertisement issuing system
CN103581179A (en) * 2013-10-25 2014-02-12 福建伊时代信息科技股份有限公司 Data access control system based on position, server and method
CN104636645A (en) * 2015-01-27 2015-05-20 腾讯科技(深圳)有限公司 Method and device for controlling data accessing
CN104717204A (en) * 2015-02-02 2015-06-17 深圳市中兴移动通信有限公司 Method for controlling file access permission and terminal
CN104717223A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Data access method and device

Similar Documents

Publication Publication Date Title
CN104169940B (en) Company's digital information is limited in the method in organizational boundaries
Mathisen Security challenges and solutions in cloud computing
Tsai et al. Information security issue of enterprises adopting the application of cloud computing
TWI691861B (en) Resource permission management method and device
CN104717223A (en) Data access method and device
GB2503230A (en) Location based network access
CN108293044A (en) System and method for detecting malware infection via domain name service flow analysis
Shackelford Business and cyber peace: We need you!
CN101909298A (en) Secure access control method and device for wireless network
US20050238174A1 (en) Method and system for secure communications over a public network
CN108200073B (en) Sensitive data safety protection system
TW201421936A (en) Method for distinguishing and blocking off network node
Meshram et al. A survey paper on vulnerabilities in android OS and security of android devices
CN105659247B (en) The proactive Threat Management system of context-aware
JP4450653B2 (en) Electronic information management system
GB2535579A (en) Preventing unauthorized access to an application server
JP6729013B2 (en) Information processing system, information processing apparatus, and program
Wu The problems in campus network information security and its solutions
CN107517176A (en) File security delivery system and method based on Bluetooth beacon
Byeong-Ho Ubiquitous computing environment threats and defensive measures
HARRIS et al. Mobile Device Security Issues Within the US Disadvantaged Business Enterprise Program.
Xiao Research on Cyberspace Security System Based on Cloud Computing Environment
KR101304452B1 (en) A cloud system for document management using location
CN101778108B (en) Method and device for preventing falsification of homepage of server
KR20010016070A (en) a Hidden Password in the Throwaway Identification System

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171226