CN107633177A - A kind of file management method of graded encryption - Google Patents

A kind of file management method of graded encryption Download PDF

Info

Publication number
CN107633177A
CN107633177A CN201710868835.2A CN201710868835A CN107633177A CN 107633177 A CN107633177 A CN 107633177A CN 201710868835 A CN201710868835 A CN 201710868835A CN 107633177 A CN107633177 A CN 107633177A
Authority
CN
China
Prior art keywords
file
module
encryption
level
management method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710868835.2A
Other languages
Chinese (zh)
Inventor
刘为峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Dacheng Well Data Technology Co Ltd
Original Assignee
Suzhou Dacheng Well Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Dacheng Well Data Technology Co Ltd filed Critical Suzhou Dacheng Well Data Technology Co Ltd
Priority to CN201710868835.2A priority Critical patent/CN107633177A/en
Publication of CN107633177A publication Critical patent/CN107633177A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of file management method of graded encryption, including file recording module, file encryption module, file storage module and decryption access modules, following steps are specifically included:Step 1:Pass through file recording module typing fileinfo;Step 2:File hierarchies are identified, are file encryption by file encryption module;Step 3:Utilize file storage module storage file;Step 4:Using decryption access modules decryption file, file workable for acquisition;Described file encryption module includes one-level encrypting module, two level encrypting module and three-level encrypting module.It can provide a variety of encryption measures, and the file different to importance carries out different encryption measures, can either effectively protect the safety of file, will not apply excessively complicated encryption measures to most of file again, not interfere with routine office work.

Description

A kind of file management method of graded encryption
Technical field
The invention belongs to file management method field, more particularly to a kind of file management method of graded encryption.
Background technology
With the development of science and technology, the form of increasing information and file all by soft copy is using, no paper Change office increasingly to popularize.However, with the electronization of information, information becomes no longer safe, and information leakage often occurs.
As Copyright Awareness large area at home is revived, protection to file also being valued by people all the more. On business circle full of deceit, not only to watch out for theft of the corporate espionage to classified papers, also to avoid employee from issuing file by mistake Third party, cause information leakage.Therefore, a kind of file management method that can protect file security is extremely necessary.
Present file management method, it is primarily present following problem:
1st, present file management method does not possess secrecy provision mostly or secrecy provision is insufficient, causes Company Confidential easy Leakage.
2nd, present file management method only possesses a kind of security classification mostly, and security classification is too low easily to reveal machine Close, security classification is too high to influence routine office work.
The content of the invention
Goal of the invention:In order to overcome the above insufficient, it is an object of the invention to provide a kind of file management side of graded encryption Method, it can provide a variety of encryption measures, and the file different to importance carries out different encryption measures, can either effectively protect The safety of file, excessively complicated encryption measures will not be applied to most of file again, do not interfere with routine office work.
Technical scheme:To achieve these goals, the invention provides a kind of file management method of graded encryption, including File recording module, file encryption module, file storage module and decryption access modules, specifically include following steps:Step 1: Pass through file recording module typing fileinfo;Step 2:File hierarchies are identified, are file encryption by file encryption module; Step 3:Utilize file storage module storage file;Step 4:File is decrypted using decryption access modules, workable for acquisition File.
Heretofore described file recording module includes computer terminal, the network port and scanner.
The setting of heretofore described file recording module, it has widened the canal of file reception by a variety of input equipments Road so that either soft copy can also receive with paper, information management system.
Heretofore described file encryption module includes one-level encrypting module, two level encrypting module and three-level encryption mould Block.
The setting of heretofore described multi-level encryption module, using the teaching of the invention it is possible to provide a variety of different degrees of encryption measures, classification add It is close, the safety of file can either be effectively protected, excessively complicated encryption measures will not be applied to most of file again, ensured daily The normal operation of office.
Heretofore described one-level encrypting module encryption target is the file that employee is commonly used or with privacy File, the one-level encrypting module are realized by using identification code and encrypted.
The setting of heretofore described one-level encrypting module, employee's operational error can be avoided to send file to unrelated personage Cause unnecessary information leakage and economic loss.
Heretofore described two level encrypting module encryption target is that can produce the vital document of interests, the two level encryption Module realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module is arranged at the end specified In end equipment, the mess code is hidden with successful decryption, will not delete.
The setting of heretofore described two level encrypting module so that can not be by by the encrypted file of two level encrypting module Company is taken away, the various files with official seal can be protected not to be stolen use
Heretofore described three-level encrypting module encryption target is the file with company's core technology or interests, described three Level encrypting module is filled by mess code, identification code and self-destruction program realize encryption, and the identification code is used as using biological information to be known Other code.
Heretofore described three-level encrypting module, protection file that can be tight, there can only be the personnel specified to access, once Attempt to steal, just destroy file.
Heretofore described file storage module includes ordinary file memory module and special file memory module, described Self-destruction program is provided with special file memory module.
Heretofore described decryption access modules include one-level deciphering module, two level deciphering module and three level decryption moulds Block.
Heretofore described one-level deciphering module includes decoding program, and the terminal that the decoding program is arranged at company is set Standby upper, the one-level deciphering module is provided with omnipotent identification code;The two level deciphering module includes mess code decoding program and identification Code checking, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password authentification;It is described Three-level decoder module includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at the terminal device specified Interior, the identification code verification is verified by physical characteristic information.
A kind of file management method of heretofore described graded encryption, it is characterised in that:Described three-level decoding mould Block decoding will unsuccessfully destroy file.
A kind of file management method of heretofore described graded encryption, comprises the following steps:Step 1:File is recorded Enter;Step 2:Judge file hierarchies, and file is encrypted using corresponding file encryption module;Step 3:Deposit File storage module;Step 4:File is decrypted and accessed by decrypting access modules.
Above-mentioned technical proposal can be seen that the present invention and have the advantages that:
1st, the file management method of heretofore described a kind of graded encryption, its by setting different grades of encryption measures, The differentiated control to different files is realized, can either effectively protect the safety of file, most of file will not be applied again In the encryption measures of complexity, routine office work is not interfered with.
2nd, the file management method of heretofore described a kind of graded encryption, it passes through to most of unessential file Identification code is set, and employee's operational error can be avoided, which to send file to unrelated personage, causes unnecessary information leakage and economic damage Lose;And decoding process is simple, routine office work will not be impacted.
3rd, the file management method of heretofore described a kind of graded encryption, it passes through the file to being related to company's core Self-destruction program is set, the minimum standard that file is not leaked can be ensured.
Brief description of the drawings
Fig. 1 is the overall structure block diagram of the present invention;
Fig. 2 is the management flow chart of the present invention;
In figure:File recording module -1, computer terminal -11, the network port -12, scanner -13, file encryption module -2, one-level Encrypting module -21, two level encrypting module -22, three-level encrypting module -23, file storage module -3, ordinary file memory module - 31st, special file memory module -32, decryption access modules -4, one-level deciphering module -41, two level deciphering module -42, three-level solution Close module -43.
Embodiment
Below in conjunction with the accompanying drawings and specific embodiment, the present invention is furture elucidated.
Embodiment 1
A kind of file management method of graded encryption as shown in Figure 1, including file recording module 1, file encryption module 2, text Part memory module 3 and decryption access modules 4, specifically include following steps:Step 1:Pass through the typing file of file recording module 1 Information;Step 2:File hierarchies are identified, are file encryption by file encryption module 2;Step 3:Utilize file storage module 3 Storage file;Step 4:File, file workable for acquisition are decrypted using decryption access modules 4.
File recording module 1 described in the present embodiment includes computer terminal 11, the network port 12 and scanner 13.
File encryption module 2 described in the present embodiment includes one-level encrypting module 21, two level encrypting module 22 and three-level Encrypting module 23.
It is file that employee is commonly used or with hidden that one-level encrypting module 21 described in the present embodiment, which encrypts target, Private file, the one-level encrypting module 21 are realized by using identification code and encrypted.
It is that can produce the vital document of interests, the two level that two level encrypting module 22 described in the present embodiment, which encrypts target, Encrypting module 22 realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module 22 is arranged at In the terminal device specified, the mess code is hidden with successful decryption, will not delete.
It is the text with company's core technology or interests that three-level encrypting module 23 described in the present embodiment, which encrypts target, Part, the three-level encrypting module 23 is filled by mess code, identification code and self-destruction program realize encryption, and the identification code uses body Information is as identification code.
File storage module 3 described in the present embodiment includes ordinary file memory module 31 and special file memory module 32, self-destruction program is provided with the special file memory module 32.
Decryption access modules 4 described in the present embodiment include one-level deciphering module 41, two level deciphering module 42 and three-level Deciphering module 43.
One-level deciphering module 41 described in the present embodiment includes decoding program, and the decoding program is arranged at the end of company In end equipment, the one-level deciphering module 41 is provided with omnipotent identification code;The two level deciphering module 42 includes mess code decoding journey Sequence and identification code verification, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password Checking;The three-level decoder module 43 includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at finger In fixed terminal device, the identification code verification is verified by physical characteristic information.
Embodiment 2
A kind of file management method of graded encryption as shown in Figure 2, including file recording module 1, file encryption module 2, text Part memory module 3 and decryption access modules 4, specifically include following steps:Step 1:Pass through the typing file of file recording module 1 Information;Step 2:File hierarchies are identified, are file encryption by file encryption module 2;Step 3:Utilize file storage module 3 Storage file;Step 4:File, file workable for acquisition are decrypted using decryption access modules 4.
File recording module 1 described in the present embodiment includes computer terminal 11, the network port 12 and scanner 13.
File encryption module 2 described in the present embodiment includes one-level encrypting module 21, two level encrypting module 22 and three-level Encrypting module 23.
It is file that employee is commonly used or with hidden that one-level encrypting module 21 described in the present embodiment, which encrypts target, Private file, the one-level encrypting module 21 are realized by using identification code and encrypted.
It is that can produce the vital document of interests, the two level that two level encrypting module 22 described in the present embodiment, which encrypts target, Encrypting module 22 realizes encryption by mess code filling and identification code, and the mess code decryption program of the two level encrypting module 22 is arranged at In the terminal device specified, the mess code is hidden with successful decryption, will not delete.
It is the text with company's core technology or interests that three-level encrypting module 23 described in the present embodiment, which encrypts target, Part, the three-level encrypting module 23 is filled by mess code, identification code and self-destruction program realize encryption, and the identification code uses body Information is as identification code.
File storage module 3 described in the present embodiment includes ordinary file memory module 31 and special file memory module 32, self-destruction program is provided with the special file memory module 32.
Decryption access modules 4 described in the present embodiment include one-level deciphering module 41, two level deciphering module 42 and three-level Deciphering module 43.
One-level deciphering module 41 described in the present embodiment includes decoding program, and the decoding program is arranged at the end of company In end equipment, the one-level deciphering module 41 is provided with omnipotent identification code;The two level deciphering module 42 includes mess code decoding journey Sequence and identification code verification, the mess code decoding program are arranged in the terminal device specified, and the identification code verification passes through password Checking;The three-level decoder module 43 includes mess code decoding program and identification code verification, and the mess code decoding program is arranged at finger In fixed terminal device, the identification code verification is verified by physical characteristic information.
Three-level decoder module 43 described in the present embodiment, which decodes, will unsuccessfully destroy file.
A kind of file management method of graded encryption described in the present embodiment, comprises the following steps:Step 1:File is recorded Enter;Step 2:Judge file hierarchies, and file is encrypted using corresponding file encryption module;Step 3:Deposit File storage module;Step 4:File is decrypted and accessed by decrypting access modules.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvement can also be made, these improvement also should be regarded as the present invention's Protection domain.

Claims (10)

1. a kind of file management method of graded encryption, including file recording module(1), file encryption module(2), file storage Module(3)With decryption access modules(4), it is characterised in that:Specifically include following steps:
Step 1:Pass through file recording module(1)Typing fileinfo;
Step 2:File hierarchies are identified, pass through file encryption module(2)For file encryption;
Step 3:Utilize file storage module(3)Storage file;
Step 4:Use decryption access modules(4)Decrypt file, file workable for acquisition.
A kind of 2. file management method of graded encryption according to claim 1, it is characterised in that:Described file typing Module(1)Including computer terminal(11), the network port(12)And scanner(13).
A kind of 3. file management method of graded encryption according to claim 1, it is characterised in that:Described file encryption Module(2)Including one-level encrypting module(21), two level encrypting module(22)With three-level encrypting module(23).
A kind of 4. file management method of graded encryption according to claim 3, it is characterised in that:Described one-level encryption Module(21)The file that encryption target is commonly used for employee or the file with privacy, the one-level encrypting module(21)It is logical Cross and realize encryption using identification code.
A kind of 5. file management method of graded encryption according to claim 3, it is characterised in that:Described two level encryption Module(22)Encryption target is that can produce the vital document of interests, the two level encrypting module(22)Filled and identified by mess code Code realizes encryption, the two level encrypting module(22)Mess code decryption program be arranged in the terminal device specified, the mess code Hide, will not delete with successful decryption.
A kind of 6. file management method of graded encryption according to claim 3, it is characterised in that:Described three-level encryption Module(23)Encryption target is the file with company's core technology or interests, the three-level encrypting module(23)Pass through mess code Filling, identification code and self-destruction program realize encryption, and the identification code is using biological information as identification code.
A kind of 7. file management method of graded encryption according to claim 1, it is characterised in that:Described file storage Module(3)Including ordinary file memory module(31)With special file memory module(32), the special file memory module (32)Inside it is provided with self-destruction program.
A kind of 8. file management method of graded encryption according to claim 1, it is characterised in that:Described decryption accesses Module(4)Including one-level deciphering module(41), two level deciphering module(42)With three-level deciphering module(43).
A kind of 9. file management method of graded encryption according to claim 8, it is characterised in that:A described level decryption Module(41)Including decoding program, the decoding program is arranged on the terminal device of company, the one-level deciphering module(41) It is provided with omnipotent identification code;The two level deciphering module(42)Including mess code decoding program and identification code verification, the mess code solution Coded program is arranged in the terminal device specified, and the identification code verification passes through password authentification;The three-level decoder module(43) Including mess code decoding program and identification code verification, the mess code decoding program is arranged in the terminal device specified, the identification Code is verified physical characteristic information checking.
A kind of 10. file management method of graded encryption according to claim 9, it is characterised in that:Described three-level solution Code module(43)Decoding will unsuccessfully destroy file.
CN201710868835.2A 2017-09-22 2017-09-22 A kind of file management method of graded encryption Pending CN107633177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710868835.2A CN107633177A (en) 2017-09-22 2017-09-22 A kind of file management method of graded encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710868835.2A CN107633177A (en) 2017-09-22 2017-09-22 A kind of file management method of graded encryption

Publications (1)

Publication Number Publication Date
CN107633177A true CN107633177A (en) 2018-01-26

Family

ID=61103547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710868835.2A Pending CN107633177A (en) 2017-09-22 2017-09-22 A kind of file management method of graded encryption

Country Status (1)

Country Link
CN (1) CN107633177A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 File security protection method and device
CN114896609A (en) * 2022-03-25 2022-08-12 山东日照发电有限公司 Electronic document system and operation monitoring method thereof
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530092A (en) * 2015-12-09 2016-04-27 中国航空工业集团公司西安航空计算技术研究所 IMA processor system information security management method
CN105553940A (en) * 2015-12-09 2016-05-04 北京中科云集科技有限公司 Safety protection method based on big data processing platform
CN106203137A (en) * 2016-07-06 2016-12-07 杨炳 A kind of classified papers access security system
US20170177890A1 (en) * 2015-12-17 2017-06-22 Mastercard International Incorporated Systems, methods, and devices for securing data stored in a cloud environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530092A (en) * 2015-12-09 2016-04-27 中国航空工业集团公司西安航空计算技术研究所 IMA processor system information security management method
CN105553940A (en) * 2015-12-09 2016-05-04 北京中科云集科技有限公司 Safety protection method based on big data processing platform
US20170177890A1 (en) * 2015-12-17 2017-06-22 Mastercard International Incorporated Systems, methods, and devices for securing data stored in a cloud environment
CN106203137A (en) * 2016-07-06 2016-12-07 杨炳 A kind of classified papers access security system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 File security protection method and device
CN110807205B (en) * 2019-09-30 2022-04-15 奇安信科技集团股份有限公司 File security protection method and device
CN114896609A (en) * 2022-03-25 2022-08-12 山东日照发电有限公司 Electronic document system and operation monitoring method thereof
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device

Similar Documents

Publication Publication Date Title
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
CN204595860U (en) A kind of memory device encryption bridge
CN101122942B (en) Data safe reading method and its safe storage device
CN100446018C (en) Secure information storage method and information security apparatus thereof
CN101938497A (en) Multistage security file structure as well as file access control and secret key management user terminal, service terminal, system and method thereof
CN102456116B (en) File encryption method, file decryption method and devices
CN103378971B (en) A kind of data encryption system and method
CN100535876C (en) Smart card and USB combined equipment and method of self-destroy forillegal access and try to pass valve value
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN101951315A (en) Key processing method and device
CN107633177A (en) A kind of file management method of graded encryption
CN106203137B (en) A kind of classified papers access safety system
CN101321065A (en) USB data safety transmission technique with double-factor identity validation function
CN104376631B (en) A kind of implementation method of safety door prohibition system based on commercial cipher algorithm
CN107911221A (en) The key management method of solid-state disk data safety storage
CN102945339A (en) Data protection system for computer
CN100543762C (en) Computer-aided design data encryption protecting method based on hardware environment
CN109145557A (en) A kind of computer data protection system
CN101127013A (en) Enciphered mobile storage apparatus and its data access method
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN101795194B (en) Method for protecting multi-digital certificate of intelligent card
CN103577771A (en) Virtual desktop data leakage-preventive protection technology on basis of disk encryption
CN207475576U (en) A kind of safety mobile terminal system based on safety chip
CN107657162A (en) A kind of safe electronic document management system
CN111343421B (en) Video sharing method and system based on white-box encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180126

RJ01 Rejection of invention patent application after publication