Method for managing synthesized confidential file
Technical Field
The invention relates to the field of data management, in particular to a method for managing a synthesized secure file.
Background
The view of the security document needs to sign a security agreement, and only the user who signs the security agreement can view the security document. The traditional paper confidential protocol document needs a user to sign and stamp, but at present, more and more paperless offices and online offices are available, and the on-site signing and stamping mode cannot meet the requirements of the user. Some prior arts adopt electronic signature or online signature to complete signing of the security protocol document, but because the security document and the security protocol document are independent from each other, it cannot be guaranteed that each person viewing the security document signs the security protocol, which brings huge challenge to management of the security document.
Disclosure of Invention
The present invention is directed to a method for managing a composite security file, which overcomes the above-mentioned drawbacks of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for constructing a combined security file management, which is applied to an intelligent terminal, wherein the combined security file is generated by a security file and a security protocol file, and the method comprises the following steps:
s101, receiving a viewing request by the synthesized confidential file;
s102, displaying the security protocol file of the synthesized security file according to the viewing request;
s103, receiving signature information by the security protocol file;
and S104, displaying the security file of the synthesized security file.
Further, the method for managing a combined secure file according to the present invention, after the step S103, further includes:
and S105, storing the signature information in the synthesized secure file.
Further, the method for managing a combined secure file according to the present invention, after the step S105, further includes:
s106, the synthesized secure file receives a first signature viewing request;
and S107, displaying all the signature information stored in the synthesized secure file.
Further, in the method for managing a composite secure file according to the present invention, the step S103 includes:
and S1031, the security protocol file receives at least one of character signature information, picture signature information, audio signature information and video signature information.
In addition, the invention also provides a method for managing the synthesized secure file, which is applied to a management system comprising an intelligent terminal and a server, wherein the synthesized secure file is generated by the secure file and the secure protocol file, and the method comprises the following steps:
s201, receiving a viewing request for the synthesized confidential file stored on the intelligent terminal;
s202, displaying the security protocol file of the synthesized security file according to the viewing request;
s203, the security protocol file receives signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file;
and S204, the intelligent terminal displays the security file of the synthesized security file.
Further, the method for managing a combined secure file according to the present invention, after the step S203, further includes:
s205, the intelligent terminal sends a second signature viewing request to the server, wherein the second signature viewing request comprises the mark information of the synthesized confidential file;
s206, the server issues all the signature information corresponding to the marking information to the intelligent terminal;
and S207, the intelligent terminal receives and displays the signature information.
Further, in the method for managing a composite secure file according to the present invention, the step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the method further includes, after the step S201 and before the step S202:
s2012, uploading the user information and the mark information of the synthesized confidential file to the server;
s2013, the server verifies whether the user information is signed on the synthesized confidential file corresponding to the marking information;
s2014, if not, executing the step S202;
s2015, if yes, execute the step S204.
Further, in the method for managing a composite secure file according to the present invention, the step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the step S203 includes: s2031, the security protocol file receives signature information and sends the signature information and the user information to the server, wherein the signature information contains the mark information of the security protocol file.
Further, in the method for managing a composite secure file according to the present invention, the receiving signature information of the secure protocol file in step S203 includes:
s2032, the security protocol file receives at least one of the character signature information, the picture signature information, the audio signature information and the video signature information.
Further, the method for managing a combined secure file according to the present invention, after the step S204, further includes:
and S208, the intelligent terminal sends operation record information to the server after the confidential file is viewed, wherein the operation record information comprises at least one of viewing starting time, viewing ending time, viewing place, viewing terminal, viewing user, file modification content and data statistical result.
The method for managing the synthesized confidential file has the following beneficial effects: the invention combines the confidential document and the confidential protocol document into a document, and when a user wants to check the confidential document, the user must sign the confidential protocol first, thereby ensuring that each user checking the confidential document signs the confidential protocol and improving the management level of the confidential document.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 2 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 3 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 4 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 5 is a flowchart of a method for composite secure file management, according to an embodiment.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
Example 1
Referring to fig. 1, the method for managing a composite security file of the present embodiment is applied to an intelligent terminal, which includes but is not limited to a computer, a mobile phone, and other terminals having a display screen. The synthesized confidential document is generated by a confidential document and a confidential protocol document which are electronic documents, wherein the confidential document records contents needing confidentiality, such as technical documents, engineering drawings, quotation lists and the like; the file format of the secure file may be in a variety of forms such as a text format, a picture format, an audio format, a video format, and the like. The security agreement document records the security terms which the user needs to comply with, and the security terms are mostly displayed in a text form and can also be displayed in a picture, audio, video and other forms. In the embodiment, the originally independent security file and the security protocol file are combined into an independent combined security file, namely, the combined security file contains the contents contained in the security file and the security protocol file. Because the synthesized security file contains the contents of the security file and the security protocol file, the synchronous transmission and synchronous use of the security file and the security protocol file are realized, and the security file is ensured to carry the security protocol file in real time. Specifically, the method for managing the synthesized secure file comprises the following steps:
s101, the combined secret file receives a viewing request. The method comprises the steps that a check request is received by a composite confidential file of the intelligent terminal through receiving clicking operation of a mouse, touch operation of a touch pad or touch operation of a touch screen, and the check request is used for checking the confidential file in the composite confidential file.
S102, displaying the security protocol file of the synthesized security file according to the viewing request. After the synthesized secure file receives the viewing request of the user, the secure file in the synthesized secure file is not directly displayed, but the secure protocol file of the synthesized secure file is displayed first, and the user needs to read the content of the secure protocol file and sign on the secure protocol file. Through the steps, the user who checks the confidential document is ensured to have to sign, and the signature without omission is realized.
S103, receiving the signature information by the security protocol file. After the user finishes reading the security protocol file, a signature operation is required, and there are many signature modes, and as an option, the step S103 in the method for managing a composite security file in this embodiment includes: and S1031, the security protocol file receives at least one of character signature information, picture signature information, audio signature information and video signature information, for example, a user can sign through an electronic signature pen, sign through a touch screen, sign through an electronic signature, perform voice signature through a microphone, perform video signature through a camera and the like, and the signature mode can be selected according to the needs of the user.
S104, displaying the security document of the synthesized security document. And after the user finishes the signature operation, namely the security protocol file receives the signature information of the user, displaying the security file of the synthesized security file for the user to check and use. Alternatively, the security file still maintains the file format before synthesis, and corresponding software of the intelligent terminal is called to open the security file according to the file format in the process of displaying the security file. Alternatively, the security file is synthesized into a synthesized security file, the file format is converted, the original file format is restored after the signature is completed, and corresponding software of the intelligent terminal is called to open the security file.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol first, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
Example 2
Referring to fig. 2, on the basis of embodiment 1, the method for managing a combined secure file of the present embodiment further includes, after step S103:
and S105, storing the signature information in the synthesized secure file. In order to facilitate the manager to check the user who has used the security document, the signature information of each time needs to be stored in the composite security document. Alternatively, in order to further understand the operation record of each user viewing the file, the embodiment stores the operation record information in the composite secure file after the end of viewing the secure file, where the operation record information includes, but is not limited to, a viewing start time, a viewing end time, a viewing location, a viewing terminal, a viewing user, a file modification content, a data statistics result, and the like.
Alternatively, the signature information can be sent out and sent to a server for storage, the corresponding relation between each synthesized confidential file and the signature information corresponding to the synthesized confidential file is established in the server, and managers can check all the signature information corresponding to each synthesized confidential file. Optionally, in order to further understand the operation record of each user viewing the file, in this embodiment, after the confidential document viewing is finished, the operation record information is also sent to the server, and the corresponding relationship between each signature information and the operation record information thereof is established, where the operation record information includes, but is not limited to, a viewing start time, a viewing end time, a viewing location, a viewing terminal, a viewing user, a file modification content, a data statistics result, and the like.
The embodiment saves the signature information, so that the administrator can check and manage the signature information in the later period, the management efficiency of data is improved, and meanwhile, the signature information can also be used as certification information when needed.
Example 3
Referring to fig. 3, on the basis of embodiment 2, the method for managing a combined secure file of the present embodiment further includes, after step S105:
s106, the first signature viewing request is received by the combined security file. When a user needs to check the signature information of the confidential file, the synthesized confidential file of the intelligent terminal receives a first signature checking request through receiving click operation of a mouse, touch operation of a touch pad or touch operation of a touch screen and the like, and the first signature checking request is used for checking all signature information corresponding to the synthesized confidential file.
Alternatively, if the signature information is stored in the secure file, the first signature view request is used to view all the signature information stored in the composite secure file.
Alternatively, if the signature information is stored in the server, the first signature viewing request is used to view all the signature information stored in the server corresponding to the composite secure file. The combined confidential file sends the first signature viewing request to the server after receiving the first signature viewing request, wherein the first signature information comprises mark information of the combined confidential file, such as file name, file number and the like, and the server searches all signature information corresponding to the combined confidential file and sends the signature information to the intelligent terminal.
S107, displaying all signature information stored in the composite security file. Because the signature information may be one or centralized of character signature information, picture signature information, audio signature information and video signature information, the corresponding display software of the intelligent terminal can be called to display according to the signature information content. Alternatively, if the signature information is stored in the server, all the signature information corresponding to the synthesized confidential file issued by the server is displayed.
Alternatively, all the signature information can be displayed in various manners such as a table manner display, a topological graph manner display, a tree diagram manner display and the like, so that the user can conveniently view the signature information.
In the embodiment, the user can check the signature information stored in the synthesized security file, so that the user who checks the synthesized security file can be mastered, and the management efficiency is improved.
Example 4
Referring to fig. 4, the method for managing a composite security file of the present embodiment is applied to a management system including an intelligent terminal and a server, wherein the intelligent terminal includes, but is not limited to, a computer, a mobile phone, and other terminals having a display screen. The synthesized confidential document is generated by a confidential document and a confidential protocol document which are electronic documents, wherein the confidential document records contents needing confidentiality, such as technical documents, engineering drawings, quotation lists and the like; the file format of the secure file may be in a variety of forms such as a text format, a picture format, an audio format, a video format, and the like. The security agreement document records the security terms which the user needs to comply with, and the security terms are mostly displayed in a text form and can also be displayed in a picture, audio, video and other forms. In the embodiment, the originally independent security file and the security protocol file are combined into an independent combined security file, namely, the combined security file contains the contents contained in the security file and the security protocol file. Because the synthesized security file contains the contents of the security file and the security protocol file, the synchronous transmission and synchronous use of the security file and the security protocol file are realized, and the security file is ensured to carry the security protocol file in real time. Specifically, the method for managing the synthesized secure file comprises the following steps:
s201, receiving a viewing request by the synthesized confidential file stored on the intelligent terminal. The method comprises the steps that a check request is received by a composite confidential file of the intelligent terminal through receiving clicking operation of a mouse, touch operation of a touch pad or touch operation of a touch screen, and the check request is used for checking the confidential file in the composite confidential file.
S202, displaying the security protocol file of the synthesized security file according to the viewing request. After the synthesized secure file receives the viewing request of the user, the secure file in the synthesized secure file is not directly displayed, but the secure protocol file of the synthesized secure file is displayed first, and the user needs to read the content of the secure protocol file and sign on the secure protocol file. Through the steps, the user who checks the confidential document is ensured to have to sign, and the signature without omission is realized.
S203, the security protocol file receives the signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file, and the server establishes the corresponding relation between each synthesized security file and the corresponding signature information. Alternatively, the method for managing a combined secure file according to the present embodiment, wherein the security protocol file reception signature information in step S203 includes: s2032, the security protocol file receives at least one of the text signature information, the picture signature information, the audio signature information and the video signature information, for example, the user can sign through an electronic signature pen, sign through a touch screen, sign through an electronic signature, sign through a microphone, sign through a camera, and the like, and the signature mode can be selected according to the user' S needs.
And S204, the intelligent terminal displays the security file of the synthesized security file. And after the user finishes the signature operation, namely the security protocol file receives the signature information of the user, displaying the security file of the synthesized security file for the user to check and use. Alternatively, the security file still maintains the file format before synthesis, and corresponding software of the intelligent terminal is called to open the security file according to the file format in the process of displaying the security file. Alternatively, the security file is synthesized into a synthesized security file, the file format is converted, the original file format is restored after the signature is completed, and corresponding software of the intelligent terminal is called to open the security file.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol and upload the visa information to the server for storage, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
Example 5
Referring to fig. 5, on the basis of embodiment 4, the method for managing a combined secure file of the present embodiment further includes, after step S203:
s205, the intelligent terminal sends a second signature viewing request to the server, wherein the second signature viewing request comprises mark information of the synthesized confidential files, such as file names, file numbers and the like, and each synthesized confidential file corresponds to one mark information. When a user needs to check the signature information of the confidential file, the intelligent terminal receives a second signature checking request through receiving click operation of a mouse, touch operation of a touch pad or touch operation of a touch screen and the like, wherein the second signature checking request is used for checking all signature information corresponding to the synthesized confidential file.
S206, the server issues all signature information corresponding to the marking information to the intelligent terminal. And after receiving the second signature viewing request, the server extracts the mark information in the second signature viewing request, searches all signature information corresponding to the mark information, and issues all signature information corresponding to the mark information to the intelligent terminal.
And S207, receiving and displaying the signature information by the intelligent terminal. And the intelligent terminal receives all signature information corresponding to the marking information issued by the server and displays the received signature information. Because the signature information may be one or centralized of character signature information, picture signature information, audio signature information and video signature information, the corresponding display software of the intelligent terminal can be called to display according to the signature information content. Alternatively, all the signature information can be displayed in various manners such as a table manner display, a topological graph manner display, a tree diagram manner display and the like, so that the user can conveniently view the signature information.
In the embodiment, the user can check the signature information stored in the synthesized security file, so that the user who checks the synthesized security file can be mastered, and the management efficiency is improved.
Example 6
On the basis of the above embodiment, the step S201 in the combined secure file management method of the present embodiment includes: s2011, receiving a viewing request and user information by a synthesized confidential file stored on the intelligent terminal;
step S203 includes: s2031, the security protocol file receives the signature information and sends the signature information and the user information to the server, wherein the signature information comprises the mark information of the security protocol file. The server correspondingly stores the marking information, the signature information and the user information of the security protocol files and establishes the signature record information of each security protocol file. Alternatively, the combined secure file, the signature information, and the user information may be stored in association with each other, and the signature record information for each combined secure file may be created.
In the embodiment, the signature information of the user and the user information are uploaded to the server, and more signature related information can be recorded.
Example 7
On the basis of the above embodiment, if the user finishes signing when using the composite secure file for the first time, the subsequent user does not need to repeatedly sign, and the embodiment checks whether the user finishes signing through the user information. Specifically, step S201 in the method for managing a combined secure file of the present embodiment includes: s2011, receiving a checking request and user information by a synthesized confidential file stored on the intelligent terminal, wherein the user information is used for marking the identity of a user and can be an account name, a mobile phone number, an identity card number, a job number and the like; alternatively, to enhance security, each user information further includes a corresponding password.
Further, after step S201 and before step S202, the method further includes:
s2012, uploading the user information and the mark information of the synthesized confidential file to a server.
S2013, the server verifies whether the user information is signed on the synthesized confidential file corresponding to the marking information. If the user has finished signing, the signature information is stored in the server and corresponds to the label information of the synthesized secure file. When the user reuses the secret file subsequently, the server only needs to use the user information to verify whether the user finishes signing or not.
S2014, if the user information is not signed on the synthesized secure file corresponding to the mark information, executing S202, displaying the secure protocol file of the synthesized secure file and signing the secure protocol file.
S2015, if the user information is signed on the synthesized secure file corresponding to the marking information, executing the step S204, and directly displaying the secure file in the synthesized secure file instead of displaying the secure protocol file and signing, so that the user operation is facilitated.
The embodiment increases the verification of whether the user has signed or not, avoids the repeated signing of the user, and improves the user experience.
Example 8
On the basis of the above embodiment, in order to further understand the operation record of each user viewing the file, this embodiment also sends the operation record information to the server after the end of viewing the confidential document, and establishes the corresponding relationship between each signature information and the operation record information thereof. Specifically, the method for managing a combined secure file according to this embodiment further includes, after step S204:
s208, the intelligent terminal sends operation record information to the server after the confidential document is checked, the operation record information comprises but is not limited to checking starting time, checking ending time, checking place, checking terminal, checking user, file modification content, data statistical result and the like, and the server establishes the corresponding relation between each signature information and the operation record information.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol first, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above embodiments are merely illustrative of the technical ideas and features of the present invention, and are intended to enable those skilled in the art to understand the contents of the present invention and implement the present invention, and not to limit the scope of the present invention. All equivalent changes and modifications made within the scope of the claims of the present invention should be covered by the claims of the present invention.