CN110135174A - A kind of file encrypting method, electronic equipment and external equipment - Google Patents

A kind of file encrypting method, electronic equipment and external equipment Download PDF

Info

Publication number
CN110135174A
CN110135174A CN201910323048.9A CN201910323048A CN110135174A CN 110135174 A CN110135174 A CN 110135174A CN 201910323048 A CN201910323048 A CN 201910323048A CN 110135174 A CN110135174 A CN 110135174A
Authority
CN
China
Prior art keywords
authorization
external equipment
judging result
warning message
expressed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910323048.9A
Other languages
Chinese (zh)
Inventor
肖志良
裴真真
黄燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Polytechnic
Original Assignee
Foshan Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Polytechnic filed Critical Foshan Polytechnic
Priority to CN201910323048.9A priority Critical patent/CN110135174A/en
Publication of CN110135174A publication Critical patent/CN110135174A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to information security fields, and more particularly to a kind of file encrypting method, electronic equipment and external equipment, the file encrypting method includes: the access information for obtaining the external equipment for accessing the electronic equipment;Judge whether the external equipment is authorisation device according to the access information, if so, obtaining the authorization parameter of the authorisation device;The authorization parameter includes authorization time limit, authorization at least one of number and authorization privilege;The file for electronic equipment is operated according to the authorization parameter;If it is not, disconnecting the communication connection with the external equipment, and warning message is sent to designated terminal, the present invention can be improved the safety of electronic device file encryption, effectively avoid the privacy leakage problem of electronic equipment.

Description

A kind of file encrypting method, electronic equipment and external equipment
Technical field
The present invention relates to information security fields, more particularly to a kind of file encrypting method, electronic equipment and external equipment.
Background technique
With the development of society, the electronic equipments such as mobile phone, computer become necessity, the mankind store certainly in the electronic device The private informations such as oneself daily life, working document, once it loses, it is easy to it is stolen by criminal, causes privacy leakage.It is existing Although some electronic equipments have the safeguard measures such as cryptoguard, fingerprint recognition to protect file, but traditional encryption method is safe Grade is lower, by the multiple attack that cracks, still can smooth decryption, cause privacy leakage.
Summary of the invention
The object of the present invention is to provide a kind of file encrypting method, electronic equipment and external equipments, to solve existing electronics The problem of file encrypting method security level of equipment is low, be easy to cause privacy leakage.
To achieve the above object, the present invention provides following schemes:
A kind of file encrypting method characterized by comprising
Obtain the access information of external equipment;
Judge whether the external equipment is authorisation device according to the access information, obtains the first judging result;
When it is authorisation device that first judging result, which is expressed as the external equipment, awarding for the authorisation device is obtained Weight parameter, the authorization parameter include authorization time limit, authorization at least one of number and authorization privilege;And according to the authorization Parameter obtains the operating right to encryption file;
When it is authorisation device that first judging result, which is expressed as the external equipment not, disconnect and the external equipment Communication connection, and to designated terminal send warning message, the warning message include external equipment access information.
Further, described obtained according to the authorization parameter specifically includes the operating right of encryption file:
Obtain having used the time limit, number and current operation having been used to instruct for the external equipment;
Whether judgement is described exceeds the authorization time limit with the time limit, obtains the second judging result;
When second judging result be expressed as it is described with the time limit beyond the authorization when prescribe a time limit, disconnect with it is described external The communication connection of equipment, and warning message is sent to designated terminal;
When second judging result be expressed as it is described with the time limit without departing from the authorization when prescribe a time limit, judgement is described have been used Whether number reaches the authorization number, obtains third judging result;
When the third judging result be expressed as it is described reach the authorization number with number when, disconnection with it is described external The communication connection of equipment, and warning message is sent to designated terminal;
When the third judging result be expressed as it is described be not up to the authorization number with number when, judge it is described currently Whether operational order exceeds the authorization privilege, obtains the 4th judging result;
When the 4th judging result is expressed as current operation instruction beyond the authorization privilege, disconnect with it is described The communication connection of external equipment, and warning message is sent to designated terminal;
When the 4th judging result is expressed as the current operation instruction without departing from the authorization privilege, described in response Current operation instruction, triggers the operation to encryption file.
Optionally, the disconnection and the communication connection of the external equipment, and before sending warning message to designated terminal, Further include:
Triggering disconnects the instruction connected to power supply.
Optionally, the disconnection and the communication connection of the external equipment, and after sending warning message to designated terminal, Further include:
The external equipment obtains the permission control instruction of designated terminal passback, is awarded according to permission control instruction acquisition Weight parameter.
A kind of electronic equipment, comprising:
Access information obtains module, for obtaining the access information of external equipment;
First judgment module is obtained for judging whether the external equipment is authorisation device according to the access information First judging result;
Authorization parameter obtains module, for being authorisation device when first judging result is expressed as the external equipment When, the authorization parameter of the authorisation device is obtained, the authorization parameter includes the authorization time limit, authorizes in number and authorization privilege extremely One item missing;
Operating right obtains module, for obtaining the operating right to encryption file according to the authorization parameter;
Warning message sending module, for not being authorisation device when first judging result is expressed as the external equipment When, the communication connection with the external equipment is disconnected, and send warning message to designated terminal, the warning message includes external The access information of equipment.
Further, the operating right obtains module and specifically includes:
External equipment parameter acquiring unit, for obtaining having used the time limit, having used number and current for the external equipment Operational order;
Second judgment unit, for judge it is described whether exceeded the authorization time limit with the time limit, obtain the second judgement knot Fruit;
First warning message transmission unit, for when second judging result be expressed as it is described with the time limit beyond described It prescribes a time limit when authorization, disconnects the communication connection with the external equipment, and send warning message to designated terminal;
Third judging unit, for when second judging result be expressed as it is described used the time limit without departing from the authorization when In limited time, whether judgement is described reaches the authorization number with number, obtains third judging result;
Second warning message transmission unit, for being expressed as described having reached described with number when the third judging result When authorizing number, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
4th judging unit, for being expressed as described being not up to the authorization time with number when the third judging result When number, judge that the current operation instruction whether beyond the authorization privilege, obtains the 4th judging result;
Third warning message transmission unit, for exceeding when the 4th judging result is expressed as the current operation instruction When the authorization privilege, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
Operating unit, for being weighed when the 4th judging result is expressed as the current operation instruction without departing from the authorization In limited time, the current operation instruction is responded, the operation to encryption file is triggered.
Optionally, further includes:
Power supply closedown module, for disconnect with the communication connection of the external equipment, and to designated terminal send alarm signal Before breath, triggering disconnects the instruction connected to power supply.
A kind of external equipment, comprising:
Authorization control module, for obtaining the permission control instruction of designated terminal passback, according to the permission control instruction Obtain authorization parameter.
The beneficial effects of the present invention are: the present invention provides a kind of file encrypting method, electronic equipment and external equipment, root Determine whether accessed external equipment is authorisation device according to the access information of external equipment, and is carried out repeatedly by authorization parameter Verifying, to judge whether the external equipment can carry out corresponding operating to electronic equipment, as long as not meeting authorization parameter, immediately It disconnects, the present invention improves the safety of electronic device file encryption, to effectively avoid the privacy leakage of electronic equipment Problem.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of flow diagram of file encrypting method provided by the present invention;
Fig. 2 is the flow diagram of step 140 provided by the present invention;
Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided by the present invention;
Fig. 4 is the structural schematic diagram that operating right provided by the present invention obtains module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The object of the present invention is to provide a kind of file encrypting method and electronic equipments, can be improved electronic device file encryption Safety, effectively avoid the privacy leakage problem of electronic equipment.
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
Fig. 1 is a kind of file encrypting method flow chart provided by the embodiment of the present invention, as shown in Figure 1, a kind of file adds Decryption method, comprising:
Step 110, the access information for obtaining external equipment.
In embodiment, the electronic equipment prestores the access information of authorisation device, when external equipment accesses the electronics When equipment, the electronic equipment reads the access information of the external equipment automatically, and the access information is described outer for identifying Connect the identity information of equipment.
Step 120 judges whether the external equipment is authorisation device according to the access information, if so, executing step 130, if it is not, executing step 150.
In embodiment, by the way that the access information of the external equipment and the access information for prestoring authorisation device are carried out Matching, if successful match, judges the external equipment for authorisation device, otherwise, the external equipment is not authorisation device.
Step 130, the authorization parameter for obtaining the authorisation device, the authorization parameter include authorization time limit, authorization number At least one of with authorization privilege;
Step 140 obtains the operating right to encryption file according to the authorization parameter;
Step 150, disconnect with the communication connection of the external equipment, and send warning message, the report to designated terminal Alert information includes the access information of external equipment.
With reference to Fig. 2, Fig. 2 is the flow diagram of step 140 provided by the present invention, as further changing for the present embodiment Into the step 140 specifically includes:
Step 141 obtains having used the time limit, number and current operation having been used to instruct for the external equipment;
Whether exceed the authorization time limit with the time limit described in step 142, judgement, if it is not, step 143 is executed, if so, jumping Go to step 146;
Whether reach the authorization number with number described in step 143, judgement, if it is not, step 144 is executed, if so, jumping Go to step 146;
Whether step 144 judges the current operation instruction beyond the authorization privilege;If it is not, step 145 is executed, if It is to jump to step 146;
Step 145, disconnect with the communication connection of the external equipment, and send warning message to designated terminal;
Step 146, the response current operation instruction, trigger the operation to encryption file.
In an alternative embodiment, before the step 150, further includes:
Triggering disconnects the instruction connected to power supply, thus by the connection for automatically powering off isolation and external equipment, protection text The safety of part.
In one embodiment, it after disconnecting power supply connection, needs to control power supply connection by designated terminal.When specified whole When the instruction of end triggering control power supply connection, startup power supply connection.
In another alternative embodiment, after the step 150, further includes:
The external equipment obtains the permission control instruction of designated terminal passback, is awarded according to permission control instruction acquisition Weight parameter.
In one embodiment, after designated terminal receives warning message, user judges whether to award the external equipment Power, when to the external equipment authorization, is configured, otherwise, input is forbidden by the authorization parameter to the external equipment The instruction of authorization, to trigger corresponding permission control instruction, the permission control instruction is returned to institute by the designated terminal State external equipment.
Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention, as shown in figure 3, the electronics is set It is standby to include:
Access information obtains module 210, for obtaining the access information of external equipment.
First judgment module 220 is obtained for judging whether the external equipment is authorisation device according to the access information To the first judging result.
Authorization parameter obtains module 230, for setting when first judging result is expressed as the external equipment for authorization When standby, the authorization parameter of the authorisation device is obtained, the authorization parameter includes in authorization time limit, authorization number and authorization privilege At least one of.
Operating right obtains module 240, for obtaining the operating right to encryption file according to the authorization parameter.
Warning message sending module 250, for being authorization when first judging result is expressed as the external equipment not When equipment, the communication connection with the external equipment is disconnected, and send warning message to designated terminal, the warning message includes The access information of external equipment.
With reference to Fig. 4, as further improvement of this embodiment, the operating right obtains module 240 and specifically includes:
External equipment parameter acquiring unit 241, for obtaining with number and working as with the time limit, for the external equipment Preceding operational order;
Second judgment unit 242, for judge it is described whether exceeded the authorization time limit with the time limit, obtain the second judgement As a result;
First warning message transmission unit 243, for being expressed as described having been exceeded with the time limit when second judging result It prescribes a time limit when the authorization, disconnects the communication connection with the external equipment, and send warning message to designated terminal;
Third judging unit 244, for being expressed as described having been awarded with the time limit without departing from described when second judging result It temporary prescribes a time limit, whether judgement is described reaches the authorization number with number, obtains third judging result;
Second warning message transmission unit 245, for being expressed as described having been reached with number when the third judging result When the authorization number, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
4th judging unit 246, for being expressed as described having been awarded with number is not up to described when the third judging result When weighing number, judge that the current operation instruction whether beyond the authorization privilege, obtains the 4th judging result;
Third warning message transmission unit 247, for being expressed as the current operation instruction when the 4th judging result When beyond the authorization privilege, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
Operating unit 248, for being awarded when the 4th judging result is expressed as the current operation instruction without departing from described When weighing permission, the current operation instruction is responded, the operation to encryption file is triggered.
In an alternative embodiment, the electronic equipment further include:
Power supply closedown module, for disconnect with the communication connection of the external equipment, and to designated terminal send alarm signal Before breath, triggering disconnects the instruction connected to power supply.
The embodiment of the present invention also provides a kind of external equipment, comprising:
Authorization control module, for obtaining the permission control instruction of designated terminal passback, according to the permission control instruction Obtain authorization parameter.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
Principle and implementation of the present invention are described for specific embodiment example used herein, above embodiments Explanation be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, According to the thought of the present invention, there will be changes in the specific implementation manner and application range.In conclusion in this specification Appearance should not be construed as limiting the invention.

Claims (8)

1. a kind of file encrypting method characterized by comprising
Obtain the access information of external equipment;
Judge whether the external equipment is authorisation device according to the access information, obtains the first judging result;
When it is authorisation device that first judging result, which is expressed as the external equipment, the authorization ginseng of the authorisation device is obtained Number, the authorization parameter include authorization time limit, authorization at least one of number and authorization privilege;And according to the authorization parameter Obtain the operating right to encryption file;
When it is authorisation device that first judging result, which is expressed as the external equipment not, disconnect logical with the external equipment Letter connection, and warning message is sent to designated terminal, the warning message includes the access information of external equipment.
2. file encrypting method according to claim 1, which is characterized in that described to be obtained according to the authorization parameter to adding The operating right of ciphertext part specifically includes:
Obtain having used the time limit, number and current operation having been used to instruct for the external equipment;
Whether judgement is described exceeds the authorization time limit with the time limit, obtains the second judging result;
When second judging result be expressed as it is described with the time limit beyond the authorization when prescribe a time limit, disconnect and the external equipment Communication connection, and to designated terminal send warning message;
When second judging result be expressed as it is described with the time limit without departing from the authorization when prescribe a time limit, judgement is described to have used number Whether reach the authorization number, obtains third judging result;
When the third judging result be expressed as it is described reach the authorization number with number when, disconnect and the external equipment Communication connection, and to designated terminal send warning message;
When the third judging result be expressed as it is described be not up to the authorization number with number when, judge the current operation Whether instruction exceeds the authorization privilege, obtains the 4th judging result;
When the 4th judging result is expressed as current operation instruction beyond the authorization privilege, disconnect with it is described external The communication connection of equipment, and warning message is sent to designated terminal;
When the 4th judging result is expressed as the current operation instruction without departing from the authorization privilege, respond described current Operational order triggers the operation to encryption file.
3. file encrypting method according to claim 1, which is characterized in that the communication of the disconnection and the external equipment Connection, and to designated terminal send warning message before, further includes:
Triggering disconnects the instruction connected to power supply.
4. file encrypting method according to claim 1, which is characterized in that the communication of the disconnection and the external equipment Connection, and to designated terminal send warning message after, further includes:
The external equipment obtains the permission control instruction of designated terminal passback, obtains authorization ginseng according to the permission control instruction Number.
5. a kind of electronic equipment characterized by comprising
Access information obtains module, for obtaining the access information of external equipment;
First judgment module obtains first for judging whether the external equipment is authorisation device according to the access information Judging result;
Authorization parameter obtains module, for obtaining when it is authorisation device that first judging result, which is expressed as the external equipment, The authorization parameter of the authorisation device is taken, the authorization parameter includes at least one in authorization time limit, authorization number and authorization privilege ?;
Operating right obtains module, for obtaining the operating right to encryption file according to the authorization parameter;
Warning message sending module, for when it is authorisation device that first judging result, which is expressed as the external equipment not, The communication connection with the external equipment is disconnected, and sends warning message to designated terminal, the warning message includes external sets Standby access information.
6. electronic equipment according to claim 5, which is characterized in that the operating right obtains module and specifically includes:
External equipment parameter acquiring unit, for obtaining having used the time limit, having used number and current operation for the external equipment Instruction;
Second judgment unit, for judge it is described whether exceeded the authorization time limit with the time limit, obtain the second judging result;
First warning message transmission unit, for when second judging result be expressed as it is described with the time limit beyond the authorization When prescribe a time limit, disconnect with the communication connection of the external equipment, and send warning message to designated terminal;
Third judging unit, for being expressed as described having used the time limit without departing from the authorization time limit when second judging result When, whether judgement is described reaches the authorization number with number, obtains third judging result;
Second warning message transmission unit, for being expressed as described having reached the authorization with number when the third judging result When number, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
4th judging unit, for being expressed as described being not up to the authorization number with number when the third judging result When, judge that the current operation instruction whether beyond the authorization privilege, obtains the 4th judging result;
Third warning message transmission unit, for being expressed as the current operation instruction beyond described when the 4th judging result When authorization privilege, the communication connection with the external equipment is disconnected, and send warning message to designated terminal;
Operating unit, for being expressed as the current operation instruction without departing from the authorization privilege when the 4th judging result When, the current operation instruction is responded, the operation to encryption file is triggered.
7. electronic equipment according to claim 5, which is characterized in that further include:
Power supply closedown module, for disconnect with the communication connection of the external equipment, and to designated terminal send warning message it Before, triggering disconnects the instruction connected to power supply.
8. a kind of external equipment characterized by comprising
Authorization control module is obtained for obtaining the permission control instruction of designated terminal passback according to the permission control instruction Authorization parameter.
CN201910323048.9A 2019-04-22 2019-04-22 A kind of file encrypting method, electronic equipment and external equipment Pending CN110135174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910323048.9A CN110135174A (en) 2019-04-22 2019-04-22 A kind of file encrypting method, electronic equipment and external equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910323048.9A CN110135174A (en) 2019-04-22 2019-04-22 A kind of file encrypting method, electronic equipment and external equipment

Publications (1)

Publication Number Publication Date
CN110135174A true CN110135174A (en) 2019-08-16

Family

ID=67570643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910323048.9A Pending CN110135174A (en) 2019-04-22 2019-04-22 A kind of file encrypting method, electronic equipment and external equipment

Country Status (1)

Country Link
CN (1) CN110135174A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW561408B (en) * 2001-12-31 2003-11-11 Mitac Technology Corp Authorization method for reading electronic file
CN1604791A (en) * 2001-08-03 2005-04-06 松下电器产业株式会社 Access control system
CN101159002A (en) * 2007-11-16 2008-04-09 北京大学 Authorization file and mobile terminal binding method of digital content
CN101364986A (en) * 2008-09-19 2009-02-11 广东南方信息安全产业基地有限公司 Credible equipment authentication method under network environment
CN102622311A (en) * 2011-12-29 2012-08-01 北京神州绿盟信息安全科技股份有限公司 USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
CN106657091A (en) * 2016-12-28 2017-05-10 北京奇艺世纪科技有限公司 Online server authorization management method and system
US20170310676A1 (en) * 2014-11-19 2017-10-26 Institute Of Acoustics, Chinese Academy Of Sciences Method for accessing switch external memory from control plane and data plane
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN108875428A (en) * 2017-12-27 2018-11-23 北京安天网络安全技术有限公司 A kind of mobile memory medium connection control method and device
CN109344598A (en) * 2018-09-29 2019-02-15 北京东土科技股份有限公司 The binding of equipment room and authority control method, device, equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604791A (en) * 2001-08-03 2005-04-06 松下电器产业株式会社 Access control system
TW561408B (en) * 2001-12-31 2003-11-11 Mitac Technology Corp Authorization method for reading electronic file
CN101159002A (en) * 2007-11-16 2008-04-09 北京大学 Authorization file and mobile terminal binding method of digital content
CN101364986A (en) * 2008-09-19 2009-02-11 广东南方信息安全产业基地有限公司 Credible equipment authentication method under network environment
CN102622311A (en) * 2011-12-29 2012-08-01 北京神州绿盟信息安全科技股份有限公司 USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
US20170310676A1 (en) * 2014-11-19 2017-10-26 Institute Of Acoustics, Chinese Academy Of Sciences Method for accessing switch external memory from control plane and data plane
CN106657091A (en) * 2016-12-28 2017-05-10 北京奇艺世纪科技有限公司 Online server authorization management method and system
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN108875428A (en) * 2017-12-27 2018-11-23 北京安天网络安全技术有限公司 A kind of mobile memory medium connection control method and device
CN109344598A (en) * 2018-09-29 2019-02-15 北京东土科技股份有限公司 The binding of equipment room and authority control method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王文宇等: "外发电子文件安全工作域的研究和实现", 《信息安全与通信保密》 *
王文宇等: "涉密电子文件集中管控技术的研究", 《信息安全与通信保密》 *

Similar Documents

Publication Publication Date Title
CN105553924B (en) A kind of safety protecting method, smart home and system applied to smart home
CN103544752B (en) A kind of wireless video access control system and its control method based on IGRS protocol
JPS5859644A (en) Computer communication controller
CN107094298A (en) Take precautions against module, wireless network access device and the method for illegal wireless network insertion
CN105827405A (en) Remotely-controlled safety lock device and remote control method thereof
CN110225038A (en) Method, apparatus and system for industrial information safety
CN106656995A (en) Device control method and device
CN109561413A (en) A kind of the bluetooth authentication authorization method and authoring system of BLE equipment
CN101854357B (en) Method and system for monitoring network authentication
CN109785474A (en) A kind of safe, energy-efficient multifunctional intellectual lock system
CN108810892A (en) A kind of wireless network management method, smart machine and router
CN110135174A (en) A kind of file encrypting method, electronic equipment and external equipment
CN105635090B (en) System access method, system access mechanism and terminal
CN105631351A (en) Mobile terminal self-destroying method and apparatus as well as mobile terminal
CN207348677U (en) A kind of safety cabinet based on Internet of Things
CN105049444A (en) Method and client for controlling browser user login
CN110188579A (en) A kind of port security safeguard and port security guard system
CN105095702B (en) A kind of superuser right control method and device
CN206237406U (en) Cable's Fault monitoring system based on OTDR
CN105373718A (en) Virtual machine operation processing method and device
CN104540183A (en) Control method and control device for wireless hotspots
EP2592853B1 (en) Method of preventing fraudulent use of a security module
CN113704061A (en) Secret-related computer protection system
CN202305625U (en) Electricity anti-stealing system based on mobile phone short message verification
CN111147545A (en) Intelligent electricity stealing prevention system based on NB-IoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816