CN107633177A - A kind of file management method of graded encryption - Google Patents
A kind of file management method of graded encryption Download PDFInfo
- Publication number
- CN107633177A CN107633177A CN201710868835.2A CN201710868835A CN107633177A CN 107633177 A CN107633177 A CN 107633177A CN 201710868835 A CN201710868835 A CN 201710868835A CN 107633177 A CN107633177 A CN 107633177A
- Authority
- CN
- China
- Prior art keywords
- file
- module
- encryption
- level
- management method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of file management method of graded encryption, including file recording module, file encryption module, file storage module and decryption access modules, following steps are specifically included:Step 1:Pass through file recording module typing fileinfo;Step 2:File hierarchies are identified, are file encryption by file encryption module;Step 3:Utilize file storage module storage file;Step 4:Using decryption access modules decryption file, file workable for acquisition;Described file encryption module includes one-level encrypting module, two level encrypting module and three-level encrypting module.It can provide a variety of encryption measures, and the file different to importance carries out different encryption measures, can either effectively protect the safety of file, will not apply excessively complicated encryption measures to most of file again, not interfere with routine office work.
Description
Technical field
The invention belongs to file management method field, more particularly to a kind of file management method of graded encryption.
Background technology
With the development of science and technology, the form of increasing information and file all by soft copy is using, no paper
Change office increasingly to popularize.However, with the electronization of information, information becomes no longer safe, and information leakage often occurs.
As Copyright Awareness large area at home is revived, protection to file also being valued by people all the more.
On business circle full of deceit, not only to watch out for theft of the corporate espionage to classified papers, also to avoid employee from issuing file by mistake
Third party, cause information leakage.Therefore, a kind of file management method that can protect file security is extremely necessary.
Present file management method, it is primarily present following problem:
1st, present file management method does not possess secrecy provision mostly or secrecy provision is insufficient, causes Company Confidential easy
Leakage.
2nd, present file management method only possesses a kind of security classification mostly, and security classification is too low easily to reveal machine
Close, security classification is too high to influence routine office work.
The content of the invention
Goal of the invention:In order to overcome the above insufficient, it is an object of the invention to provide a kind of file management side of graded encryption
Method, it can provide a variety of encryption measures, and the file different to importance carries out different encryption measures, can either effectively protect
The safety of file, excessively complicated encryption measures will not be applied to most of file again, do not interfere with routine office work.
Technical scheme:To achieve these goals, the invention provides a kind of file management method of graded encryption, including
File recording module, file encryption module, file storage module and decryption access modules, specifically include following steps:Step 1:
Pass through file recording module typing fileinfo;Step 2:File hierarchies are identified, are file encryption by file encryption module;
Step 3:Utilize file storage module storage file;Step 4:File is decrypted using decryption access modules, workable for acquisition
File.
Heretofore described file recording module includes computer terminal, the network port and scanner.
The setting of heretofore described file recording module, it has widened the canal of file reception by a variety of input equipments
Road so that either soft copy can also receive with paper, information management system.
Heretofore described file encryption module includes one-level encrypting module, two level encrypting module and three-level encryption mould
Block.
The setting of heretofore described multi-level encryption module, using the teaching of the invention it is possible to provide a variety of different degrees of encryption measures, classification add
It is close, the safety of file can either be effectively protected, excessively complicated encryption measures will not be applied to most of file again, ensured daily
The normal operation of office.
Heretofore described one-level encrypting module encryption target is the file that employee is commonly used or with privacy
File, the one-level encrypting module are realized by using identification code and encrypted.
The setting of heretofore described one-level encrypting module, employee's operational error can be avoided to send file to unrelated personage
Cause unnecessary information leakage and economic loss.
Heretofore described two level encrypting module encryption target is that can produce the vital document of interests, the two level encryption
Module realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module is arranged at the end specified
In end equipment, the mess code is hidden with successful decryption, will not delete.
The setting of heretofore described two level encrypting module so that can not be by by the encrypted file of two level encrypting module
Company is taken away, the various files with official seal can be protected not to be stolen use
Heretofore described three-level encrypting module encryption target is the file with company's core technology or interests, described three
Level encrypting module is filled by mess code, identification code and self-destruction program realize encryption, and the identification code is used as using biological information to be known
Other code.
Heretofore described three-level encrypting module, protection file that can be tight, there can only be the personnel specified to access, once
Attempt to steal, just destroy file.
Heretofore described file storage module includes ordinary file memory module and special file memory module, described
Self-destruction program is provided with special file memory module.
Heretofore described decryption access modules include one-level deciphering module, two level deciphering module and three level decryption moulds
Block.
Heretofore described one-level deciphering module includes decoding program, and the terminal that the decoding program is arranged at company is set
Standby upper, the one-level deciphering module is provided with omnipotent identification code;The two level deciphering module includes mess code decoding program and identification
Code checking, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password authentification;It is described
Three-level decoder module includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at the terminal device specified
Interior, the identification code verification is verified by physical characteristic information.
A kind of file management method of heretofore described graded encryption, it is characterised in that:Described three-level decoding mould
Block decoding will unsuccessfully destroy file.
A kind of file management method of heretofore described graded encryption, comprises the following steps:Step 1:File is recorded
Enter;Step 2:Judge file hierarchies, and file is encrypted using corresponding file encryption module;Step 3:Deposit
File storage module;Step 4:File is decrypted and accessed by decrypting access modules.
Above-mentioned technical proposal can be seen that the present invention and have the advantages that:
1st, the file management method of heretofore described a kind of graded encryption, its by setting different grades of encryption measures,
The differentiated control to different files is realized, can either effectively protect the safety of file, most of file will not be applied again
In the encryption measures of complexity, routine office work is not interfered with.
2nd, the file management method of heretofore described a kind of graded encryption, it passes through to most of unessential file
Identification code is set, and employee's operational error can be avoided, which to send file to unrelated personage, causes unnecessary information leakage and economic damage
Lose;And decoding process is simple, routine office work will not be impacted.
3rd, the file management method of heretofore described a kind of graded encryption, it passes through the file to being related to company's core
Self-destruction program is set, the minimum standard that file is not leaked can be ensured.
Brief description of the drawings
Fig. 1 is the overall structure block diagram of the present invention;
Fig. 2 is the management flow chart of the present invention;
In figure:File recording module -1, computer terminal -11, the network port -12, scanner -13, file encryption module -2, one-level
Encrypting module -21, two level encrypting module -22, three-level encrypting module -23, file storage module -3, ordinary file memory module -
31st, special file memory module -32, decryption access modules -4, one-level deciphering module -41, two level deciphering module -42, three-level solution
Close module -43.
Embodiment
Below in conjunction with the accompanying drawings and specific embodiment, the present invention is furture elucidated.
Embodiment 1
A kind of file management method of graded encryption as shown in Figure 1, including file recording module 1, file encryption module 2, text
Part memory module 3 and decryption access modules 4, specifically include following steps:Step 1:Pass through the typing file of file recording module 1
Information;Step 2:File hierarchies are identified, are file encryption by file encryption module 2;Step 3:Utilize file storage module 3
Storage file;Step 4:File, file workable for acquisition are decrypted using decryption access modules 4.
File recording module 1 described in the present embodiment includes computer terminal 11, the network port 12 and scanner 13.
File encryption module 2 described in the present embodiment includes one-level encrypting module 21, two level encrypting module 22 and three-level
Encrypting module 23.
It is file that employee is commonly used or with hidden that one-level encrypting module 21 described in the present embodiment, which encrypts target,
Private file, the one-level encrypting module 21 are realized by using identification code and encrypted.
It is that can produce the vital document of interests, the two level that two level encrypting module 22 described in the present embodiment, which encrypts target,
Encrypting module 22 realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module 22 is arranged at
In the terminal device specified, the mess code is hidden with successful decryption, will not delete.
It is the text with company's core technology or interests that three-level encrypting module 23 described in the present embodiment, which encrypts target,
Part, the three-level encrypting module 23 is filled by mess code, identification code and self-destruction program realize encryption, and the identification code uses body
Information is as identification code.
File storage module 3 described in the present embodiment includes ordinary file memory module 31 and special file memory module
32, self-destruction program is provided with the special file memory module 32.
Decryption access modules 4 described in the present embodiment include one-level deciphering module 41, two level deciphering module 42 and three-level
Deciphering module 43.
One-level deciphering module 41 described in the present embodiment includes decoding program, and the decoding program is arranged at the end of company
In end equipment, the one-level deciphering module 41 is provided with omnipotent identification code;The two level deciphering module 42 includes mess code decoding journey
Sequence and identification code verification, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password
Checking;The three-level decoder module 43 includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at finger
In fixed terminal device, the identification code verification is verified by physical characteristic information.
Embodiment 2
A kind of file management method of graded encryption as shown in Figure 2, including file recording module 1, file encryption module 2, text
Part memory module 3 and decryption access modules 4, specifically include following steps:Step 1:Pass through the typing file of file recording module 1
Information;Step 2:File hierarchies are identified, are file encryption by file encryption module 2;Step 3:Utilize file storage module 3
Storage file;Step 4:File, file workable for acquisition are decrypted using decryption access modules 4.
File recording module 1 described in the present embodiment includes computer terminal 11, the network port 12 and scanner 13.
File encryption module 2 described in the present embodiment includes one-level encrypting module 21, two level encrypting module 22 and three-level
Encrypting module 23.
It is file that employee is commonly used or with hidden that one-level encrypting module 21 described in the present embodiment, which encrypts target,
Private file, the one-level encrypting module 21 are realized by using identification code and encrypted.
It is that can produce the vital document of interests, the two level that two level encrypting module 22 described in the present embodiment, which encrypts target,
Encrypting module 22 realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module 22 is arranged at
In the terminal device specified, the mess code is hidden with successful decryption, will not delete.
It is the text with company's core technology or interests that three-level encrypting module 23 described in the present embodiment, which encrypts target,
Part, the three-level encrypting module 23 is filled by mess code, identification code and self-destruction program realize encryption, and the identification code uses body
Information is as identification code.
File storage module 3 described in the present embodiment includes ordinary file memory module 31 and special file memory module
32, self-destruction program is provided with the special file memory module 32.
Decryption access modules 4 described in the present embodiment include one-level deciphering module 41, two level deciphering module 42 and three-level
Deciphering module 43.
One-level deciphering module 41 described in the present embodiment includes decoding program, and the decoding program is arranged at the end of company
In end equipment, the one-level deciphering module 41 is provided with omnipotent identification code;The two level deciphering module 42 includes mess code decoding journey
Sequence and identification code verification, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password
Checking;The three-level decoder module 43 includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at finger
In fixed terminal device, the identification code verification is verified by physical characteristic information.
Three-level decoder module 43 described in the present embodiment, which decodes, will unsuccessfully destroy file.
A kind of file management method of graded encryption described in the present embodiment, comprises the following steps:Step 1:File is recorded
Enter;Step 2:Judge file hierarchies, and file is encrypted using corresponding file encryption module;Step 3:Deposit
File storage module;Step 4:File is decrypted and accessed by decrypting access modules.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvement can also be made, these improvement also should be regarded as the present invention's
Protection domain.
Claims (10)
1. a kind of file management method of graded encryption, including file recording module(1), file encryption module(2), file storage
Module(3)With decryption access modules(4), it is characterised in that:Specifically include following steps:
Step 1:Pass through file recording module(1)Typing fileinfo;
Step 2:File hierarchies are identified, pass through file encryption module(2)For file encryption;
Step 3:Utilize file storage module(3)Storage file;
Step 4:Use decryption access modules(4)Decrypt file, file workable for acquisition.
A kind of 2. file management method of graded encryption according to claim 1, it is characterised in that:Described file typing
Module(1)Including computer terminal(11), the network port(12)And scanner(13).
A kind of 3. file management method of graded encryption according to claim 1, it is characterised in that:Described file encryption
Module(2)Including one-level encrypting module(21), two level encrypting module(22)With three-level encrypting module(23).
A kind of 4. file management method of graded encryption according to claim 3, it is characterised in that:Described one-level encryption
Module(21)The file that encryption target is commonly used for employee or the file with privacy, the one-level encrypting module(21)It is logical
Cross and realize encryption using identification code.
A kind of 5. file management method of graded encryption according to claim 3, it is characterised in that:Described two level encryption
Module(22)Encryption target is that can produce the vital document of interests, the two level encrypting module(22)Filled and identified by mess code
Code realizes encryption, the two level encrypting module(22)Mess code decryption program be arranged in the terminal device specified, the mess code
Hide, will not delete with successful decryption.
A kind of 6. file management method of graded encryption according to claim 3, it is characterised in that:Described three-level encryption
Module(23)Encryption target is the file with company's core technology or interests, the three-level encrypting module(23)Pass through mess code
Filling, identification code and self-destruction program realize encryption, and the identification code is using biological information as identification code.
A kind of 7. file management method of graded encryption according to claim 1, it is characterised in that:Described file storage
Module(3)Including ordinary file memory module(31)With special file memory module(32), the special file memory module
(32)Inside it is provided with self-destruction program.
A kind of 8. file management method of graded encryption according to claim 1, it is characterised in that:Described decryption accesses
Module(4)Including one-level deciphering module(41), two level deciphering module(42)With three-level deciphering module(43).
A kind of 9. file management method of graded encryption according to claim 8, it is characterised in that:A described level decryption
Module(41)Including decoding program, the decoding program is arranged on the terminal device of company, the one-level deciphering module(41)
It is provided with omnipotent identification code;The two level deciphering module(42)Including mess code decoding program and identification code verification, the mess code solution
Coded program is arranged in the terminal device specified, and the identification code verification passes through password authentification;The three-level decoder module(43)
Including mess code decoding program and identification code verification, the mess code decoding program is arranged in the terminal device specified, the identification
Code is verified physical characteristic information checking.
A kind of 10. file management method of graded encryption according to claim 9, it is characterised in that:Described three-level solution
Code module(43)Decoding will unsuccessfully destroy file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710868835.2A CN107633177A (en) | 2017-09-22 | 2017-09-22 | A kind of file management method of graded encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710868835.2A CN107633177A (en) | 2017-09-22 | 2017-09-22 | A kind of file management method of graded encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107633177A true CN107633177A (en) | 2018-01-26 |
Family
ID=61103547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710868835.2A Pending CN107633177A (en) | 2017-09-22 | 2017-09-22 | A kind of file management method of graded encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107633177A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807205A (en) * | 2019-09-30 | 2020-02-18 | 奇安信科技集团股份有限公司 | File security protection method and device |
CN114896609A (en) * | 2022-03-25 | 2022-08-12 | 山东日照发电有限公司 | Electronic document system and operation monitoring method thereof |
CN115086718A (en) * | 2022-07-19 | 2022-09-20 | 广州万协通信息技术有限公司 | Video stream encryption method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530092A (en) * | 2015-12-09 | 2016-04-27 | 中国航空工业集团公司西安航空计算技术研究所 | IMA processor system information security management method |
CN105553940A (en) * | 2015-12-09 | 2016-05-04 | 北京中科云集科技有限公司 | Safety protection method based on big data processing platform |
CN106203137A (en) * | 2016-07-06 | 2016-12-07 | 杨炳 | A kind of classified papers access security system |
US20170177890A1 (en) * | 2015-12-17 | 2017-06-22 | Mastercard International Incorporated | Systems, methods, and devices for securing data stored in a cloud environment |
-
2017
- 2017-09-22 CN CN201710868835.2A patent/CN107633177A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530092A (en) * | 2015-12-09 | 2016-04-27 | 中国航空工业集团公司西安航空计算技术研究所 | IMA processor system information security management method |
CN105553940A (en) * | 2015-12-09 | 2016-05-04 | 北京中科云集科技有限公司 | Safety protection method based on big data processing platform |
US20170177890A1 (en) * | 2015-12-17 | 2017-06-22 | Mastercard International Incorporated | Systems, methods, and devices for securing data stored in a cloud environment |
CN106203137A (en) * | 2016-07-06 | 2016-12-07 | 杨炳 | A kind of classified papers access security system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807205A (en) * | 2019-09-30 | 2020-02-18 | 奇安信科技集团股份有限公司 | File security protection method and device |
CN110807205B (en) * | 2019-09-30 | 2022-04-15 | 奇安信科技集团股份有限公司 | File security protection method and device |
CN114896609A (en) * | 2022-03-25 | 2022-08-12 | 山东日照发电有限公司 | Electronic document system and operation monitoring method thereof |
CN115086718A (en) * | 2022-07-19 | 2022-09-20 | 广州万协通信息技术有限公司 | Video stream encryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103198344B (en) | Tax control secure two-dimensional code coding, decoding processing method | |
CN204595860U (en) | A kind of memory device encryption bridge | |
CN101122942B (en) | Data safe reading method and its safe storage device | |
CN100446018C (en) | Secure information storage method and information security apparatus thereof | |
CN101938497A (en) | Multistage security file structure as well as file access control and secret key management user terminal, service terminal, system and method thereof | |
CN102456116B (en) | File encryption method, file decryption method and devices | |
CN103378971B (en) | A kind of data encryption system and method | |
CN100535876C (en) | Smart card and USB combined equipment and method of self-destroy forillegal access and try to pass valve value | |
CN102163267A (en) | Solid state disk as well as method and device for secure access control thereof | |
CN101951315A (en) | Key processing method and device | |
CN107633177A (en) | A kind of file management method of graded encryption | |
CN106203137B (en) | A kind of classified papers access safety system | |
CN101321065A (en) | USB data safety transmission technique with double-factor identity validation function | |
CN104376631B (en) | A kind of implementation method of safety door prohibition system based on commercial cipher algorithm | |
CN107911221A (en) | The key management method of solid-state disk data safety storage | |
CN102945339A (en) | Data protection system for computer | |
CN100543762C (en) | Computer-aided design data encryption protecting method based on hardware environment | |
CN109145557A (en) | A kind of computer data protection system | |
CN101127013A (en) | Enciphered mobile storage apparatus and its data access method | |
CN102270182B (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication | |
CN101795194B (en) | Method for protecting multi-digital certificate of intelligent card | |
CN103577771A (en) | Virtual desktop data leakage-preventive protection technology on basis of disk encryption | |
CN207475576U (en) | A kind of safety mobile terminal system based on safety chip | |
CN107657162A (en) | A kind of safe electronic document management system | |
CN111343421B (en) | Video sharing method and system based on white-box encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180126 |
|
RJ01 | Rejection of invention patent application after publication |