CN113918516A - Business secret safe circulation control system and method based on application virtualization - Google Patents

Business secret safe circulation control system and method based on application virtualization Download PDF

Info

Publication number
CN113918516A
CN113918516A CN202111190320.4A CN202111190320A CN113918516A CN 113918516 A CN113918516 A CN 113918516A CN 202111190320 A CN202111190320 A CN 202111190320A CN 113918516 A CN113918516 A CN 113918516A
Authority
CN
China
Prior art keywords
file
circulation
data
organization
business secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111190320.4A
Other languages
Chinese (zh)
Inventor
黄玉琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhongdian Yuanwei Technology Co ltd
Original Assignee
Zhejiang Zhongdian Yuanwei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zhongdian Yuanwei Technology Co ltd filed Critical Zhejiang Zhongdian Yuanwei Technology Co ltd
Priority to CN202111190320.4A priority Critical patent/CN113918516A/en
Publication of CN113918516A publication Critical patent/CN113918516A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/188Virtual file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a management and control system and a management and control method for business secret circulation based on application virtualization. Has the advantages that: by applying the virtualization technology, after business secret circulation, when an accessor browses and edits a business secret file, the business secret content cannot be copied and pasted, and by adding the watermark to the business secret circulation data, when the accessor browses and edits the business secret file, and stealing the business secret by adopting technologies such as photographing and screen capturing, a right-confirming evidence is left, so that the risk of secret leakage is reduced.

Description

Business secret safe circulation control system and method based on application virtualization
Technical Field
The invention relates to the field of information data transmission, in particular to a system and a method for managing and controlling business secret security circulation based on application virtualization.
Background
The business secret refers to technical information and business information which are not known by the public, have business value and are taken by authorized persons to take corresponding security measures. The business secrets comprise two categories of core technology secrets and business information, the business secrets of the enterprises are the most important intangible assets of the enterprises, and the leakage of the business secrets can cause the loss of the core technology of the enterprises, the loss of client information, the sales of flyers, the purchase of malpractice and other business risks, so that the work of well protecting the business secrets is very critical.
The biggest difference between the business secret and the national secret is that the business secret needs to be widely circulated, and the circulation of the business secret is needed regardless of the sharing between different departments inside a company or the mutual transmission between different enterprises on an industrial chain outside the company, but the circulation is necessarily the safe circulation within a certain range and can control the authority of an accessor. Thus, secure circulation of business secrets is an important work for business secret protection.
An effective solution to the problems in the related art has not been proposed yet.
Disclosure of Invention
Aiming at the problems in the related art, the invention provides a system and a method for managing and controlling the business secret security circulation based on application virtualization, so as to overcome the technical problems in the prior related art.
The technical scheme of the invention is realized as follows:
a management and control system and a method for business secret circulation based on application virtualization comprise a database table, a business secret circulation module, a business secret circulation security management and control module and a system function module in a virtual file system.
Furthermore, a metadata second-level tree structure, a file attribute cache and a centralized directory cache management technology in the virtual file system are adopted, a storage server mainly adopts a multithreading cache technology, the whole name space is divided into a plurality of subspaces according to a directory relation and is distributed to different metadata servers for management, and a specific database table comprises a file metadata table, a file operation table, a file directory table, a folder metadata table, a project group data table, an organization structure directory table and an employee directory table.
Further, the business secret circulation module based on application virtualization adopts data centralized management, transparent encryption and decryption and application virtualization technologies to realize the safe circulation of business secret data;
firstly, after all the business secret data are issued, the business secret data are uniformly and intensively stored in a server side of an enterprise, only a creator of a file keeps the data at a terminal, the data are stored in a local place through a one-person one-secret encryption algorithm, and a secret key of a terminal computer opens the file;
then after the encryption algorithm is issued on the server, the encryption algorithm is encrypted and stored on the storage device of the server according to the same principle, and the encryption algorithm is also one person and one secret;
finally, when someone calls the file, the authority of the user needs to be judged, the opened content is pushed to the client in a video streaming mode by applying a virtualization technology, the user of the client can call the file normally, and the calling and reading authority is divided into online preview and online editing;
creating a service logic system according to the records of the complaints, starting to create files on a computer, performing encrypted local storage, then issuing files and decrypting files, uploading files and encrypting and storing in a centralized manner, and finally mapping the files to corresponding virtual files;
when someone accesses the file, the file needs to be decrypted, application virtualization is started, the system judges the access authority, and preview is finally completed;
the online editing can edit and modify the content of the file, the edited file is still stored on the server, and a new version can be automatically created for encrypted storage so as to provide collaborative worker query and comparison.
Further, the security management and control module for business secret circulation comprises an approval process, authority control and watermark management and control;
the specific data flow control process comprises sending a shared file, wherein the sending of the shared file comprises two modes, namely an internal sent file and an external shared file, the internal sent file comprises public folder sending and personal folder sending, a target user is selected in the sending process, the system judges whether the user has authorization of the file, when the user has authorization capacity, the system automatically sends the file, when the user does not have authorization capacity, the user can select the target folder and can select whether to edit, the system has a watermark format, data leakage caused by screen capturing, photographing and other behaviors of a data visitor is limited through a watermark technology, the reason for application is finally required to be provided, an approver at the end of a client examines and approves the file, and the internal sending is completed.
Furthermore, according to the above complaint records, in the process of external sharing of files, online preview is required, then client software is required to be installed, in the process of online preview, data leakage caused by actions such as screen capture and photographing of a data visitor is prevented through a watermark format designed in the system, in the process, the reason for applying for preview is required, and then approval is carried out through an approver, so that external sharing can be carried out to generate links;
the audit will eventually need to be performed by the administrator of the administration department.
Furthermore, the system is divided into three layers, namely a security target layer, wherein the security target layer comprises the usable, transferable, non-landing and non-storage of the business secret data;
the second is a circulation safety control layer, which comprises the safety control of internal circulation files and the safety control of external sharing files, and comprises online preview, online editing, circulation approval and content control;
and thirdly, a data storage encryption layer which comprises client side encryption and server side encryption.
Further, the file metadata table comprises a file ID, a file Hash value, a file name, a file position, a file creator and a file creation time;
the file operation table comprises a file ID, an operation name, a file operator, file operation time and a publishing target folder name (non-publishing is null);
the file directory table comprises folder IDs, file number, file ID list, file authority list (only browsing, editing and downloading);
the folder metadata table comprises a folder ID, a folder name, folder intensity (organization, temporary organization and employee), an organization ID or employee ID or project group ID or parent folder ID (the root directory is 0);
the system comprises a project organization ID, a project organization name, an employee ID list and a father organization ID (the root organization is 0);
the organization architecture directory table comprises an organization ID, an organization name and a father organization ID (the root organization is 0);
the employee directory table includes employee IDs, employee names, and affiliated organization IDs.
The invention provides a management and control system and a method for business secret safe circulation based on application virtualization, which have the following beneficial effects:
the method realizes online operation of the commercial secrets without falling to the ground after circulation by applying a virtualization technology, realizes centralized storage of the ciphertext by an encryption technology, and realizes a strict approval system of the commercial secret circulation by file classification and authority management of personnel, thereby realizing the effects of controllability, no loophole, visibility, unavailability and the like of the whole circulation process of the commercial secrets;
the business secret data circulation process needs to consider a plurality of application scenes, viewing preview, editing modification and even serving as input data of a third-party system after business secret data circulation is supported, the most important safety index of business secret safety circulation is control of a knowledge range and is not diffused, and the business secret circulation system based on application virtualization can well ensure the control of the knowledge range after the business secret circulation;
by applying a virtualization technology, online preview and online editing of business secret circulation data are realized, but the data cannot fall to the ground, and visitors see video flow at the cloud end and cannot store the business secret data;
by applying virtualization technology, after the business secret is circulated, when an accessor browses and edits the business secret file, the business secret content cannot be copied and pasted;
by adding the watermark to the business secret circulation data, the right confirmation data is reserved when the visitor steals the business secret by adopting technologies such as photographing, screen capturing and the like when browsing and editing the business secret document, so that the risk of divulgence is reduced;
the operation names in the file operation table can be issued, approved, browsed only, edited and downloaded;
note that the transparent encryption and decryption described herein is a one-person-one-secret design.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a database design diagram of a system and method for managing and controlling secure circulation of business secrets based on application virtualization according to an embodiment of the present invention;
FIG. 2 is a business logic diagram of a system and method for managing and controlling secure flow of business secrets based on application virtualization according to an embodiment of the present invention;
fig. 3 is a data flow security control diagram of a system and method for controlling business secret security flow based on application virtualization according to an embodiment of the present invention;
fig. 4 is a functional framework diagram of a system and method for managing and controlling a secure flow of business secrets based on application virtualization according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
The invention is further described with reference to the following drawings and detailed description:
the first embodiment is as follows:
referring to fig. 1 to 4, a system and a method for managing and controlling a business secret flow based on application virtualization according to an embodiment of the present invention includes a database table in a virtual file system, a business secret flow module, a business secret flow security management and control module, and a system function module.
The management technology of metadata two-level tree structure, file attribute cache and centralized directory cache in the virtual file system is characterized in that a storage server mainly adopts a multithreading cache technology, divides the whole name space into a plurality of subspaces according to directory relations and distributes the subspaces to different metadata servers for management, and a specific database table comprises a file metadata table, a file operation table, a file directory table, a folder metadata table, a project group data table, an organization structure directory table and an employee directory table.
The business secret circulation module based on application virtualization adopts data centralized management, transparent encryption and decryption and application virtualization technologies to realize the safe circulation of business secret data;
firstly, after all the business secret data are issued, the business secret data are uniformly and intensively stored in a server side of an enterprise, only a creator of a file keeps the data at a terminal, the data are stored in a local place through a one-person one-secret encryption algorithm, and a secret key of a terminal computer opens the file;
then after the encryption algorithm is issued on the server, the encryption algorithm is encrypted and stored on the storage device of the server according to the same principle, and the encryption algorithm is also one person and one secret;
finally, when someone calls the file, the authority of the user needs to be judged, the opened content is pushed to the client in a video streaming mode by applying a virtualization technology, the user of the client can call the file normally, and the calling and reading authority is divided into online preview and online editing;
creating a service logic system according to the records of the complaints, starting to create files on a computer, performing encrypted local storage, then issuing files and decrypting files, uploading files and encrypting and storing in a centralized manner, and finally mapping the files to corresponding virtual files;
when someone accesses the file, the file needs to be decrypted, application virtualization is started, the system judges the access authority, and preview is finally completed;
the online editing can edit and modify the content of the file, the edited file is still stored on the server, and a new version can be automatically created for encrypted storage so as to provide collaborative worker query and comparison.
The security control module for the business secret circulation comprises an approval process, authority control and watermark control;
the specific data flow control process comprises sending a shared file, wherein the sending of the shared file comprises two modes, namely an internal sent file and an external shared file, the internal sent file comprises public folder sending and personal folder sending, a target user is selected in the sending process, the system judges whether the user has authorization of the file, when the user has authorization capacity, the system automatically sends the file, when the user does not have authorization capacity, the user can select the target folder and can select whether to edit, the system has a watermark format, data leakage caused by screen capturing, photographing and other behaviors of a data visitor is limited through a watermark technology, the reason for application is finally required to be provided, an approver at the end of a client examines and approves the file, and the internal sending is completed.
According to the above complaints and records, in the process of external sharing of files, online preview is needed, then client software is needed to be installed, in the process of online preview, data leakage caused by actions such as screen capture and photographing of a data visitor is prevented through a watermark format designed in a system, in the process, reason for applying for preview is needed, then approval is carried out through an approver, and external sharing can be carried out to generate links;
the audit will eventually need to be performed by the administrator of the administration department.
The system comprises a system function module and a security target layer, wherein the system function module is divided into three layers, namely, the security target layer comprises a usable and transferable business secret data, but cannot fall to the ground or be stored;
the second is a circulation safety control layer, which comprises the safety control of internal circulation files and the safety control of external sharing files, and comprises online preview, online editing, circulation approval and content control;
and thirdly, a data storage encryption layer which comprises client side encryption and server side encryption.
The file metadata table comprises a file ID, a file Hash value, a file name, a file position, a file creator and file creation time;
the file operation table comprises a file ID, an operation name, a file operator, file operation time and a publishing target folder name (non-publishing is null);
the file directory table comprises folder IDs, file number, file ID list, file authority list (only browsing, editing and downloading);
the folder metadata table comprises a folder ID, a folder name, folder intensity (organization, temporary organization and employee), an organization ID or employee ID or project group ID or parent folder ID (the root directory is 0);
the system comprises a project organization ID, a project organization name, an employee ID list and a father organization ID (the root organization is 0);
the organization architecture directory table comprises an organization ID, an organization name and a father organization ID (the root organization is 0);
the employee directory table includes employee IDs, employee names, and affiliated organization IDs.
For the convenience of understanding the technical solutions of the present invention, the following detailed description will be made on the working principle or the operation mode of the present invention in the practical process.
In practical application, the method is suitable for a virtual file system and a data distributed storage method of 'business secret safe circulation based on application virtualization', the business secret safe circulation system based on application virtualization needs data centralized management, for a virtualized application program, the data access is the same as locally stored data, and in order to increase the application range of the system, the method adopts the virtual file system, and forms a flexible and efficient data storage and access system corresponding to distributed storage;
the storage server mainly adopts the multithreading and cache technology, divides the whole name space into a plurality of subspaces according to the directory relation, distributes the subspaces to different metadata servers for management, and obtains better performance, expansibility and usability, and the specific database table is shown in figure one:
the business secret stream based on application virtualization adopts technologies such as data centralized management, transparent encryption and decryption (one person and one secret), application virtualization and the like to realize the safe stream of the business secret data, all the business secret data are firstly released and then uniformly and centrally stored in a server end of an enterprise, only a creator of a file keeps the data at a terminal, the data are stored in a local place through an encryption algorithm of one person and one secret, the file can be opened only through a secret key of a terminal computer, the ciphertext file is transferred to other employee computers, even if other employee computers also have encryption and decryption software, the file cannot be normally opened, the confidentiality of the file is ensured, the stream of the file can be realized only through the system, then the file is released on the server and then encrypted and stored on a storage device of the server by the same principle, the encryption algorithm is also one person and one secret, only the application program on the server can normally decrypt and open the file, the file is transferred to other computers and cannot be normally opened, finally, when someone calls the file, the authority of the user needs to be judged, if the calling authority exists, the file is automatically decrypted, the file is opened through the application program on the corresponding server, the opened content is pushed to a client in a video streaming mode through applying a virtualization technology, the client user can normally call the file, the calling authority is divided into online preview and online editing, the online preview only can check the file content, the file cannot be downloaded and copied, the file content cannot be pasted, the data cannot be locally stored, the online editing can edit and modify the file content, but the file content cannot be stored locally or copied, pasted and copied to the local, and the edited file is still stored on the server, a new version save is automatically created to provide collaborative worker query and comparison;
the safety control of the business secret circulation mainly comprises technologies such as an approval process, authority control, watermark control and the like, the data is realized to be in no land by applying a virtualization technology, the knowledge range of the data flow is limited by the approval process of data access control, the authority range of user operation data is controlled by the authority control, and data leakage brought by actions such as screen capture, photographing and the like of a data visitor is limited by the watermark technology;
the function frame of the system is divided into three layers, namely a safety target layer which comprises usable, transferable, non-landing and non-storage of business secret data, a transfer safety control layer which comprises safety control of internal transfer files and safety control of external sharing files, online preview, online editing, transfer approval, content control and the like, and a data storage encryption layer which comprises client encryption and server side encryption.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. A control system and a method for business secret circulation based on application virtualization are characterized by comprising a database table, a business secret circulation module, a business secret circulation security control module and a system function module in a virtual file system.
2. The system and method for managing and controlling business secret security circulation based on application virtualization of claim 1, wherein a metadata-level tree structure, a file attribute cache, and a centralized directory cache management technology in a virtual file system are provided, a storage server mainly adopts a multithreading and cache technology, a whole name space is divided into a plurality of subspaces according to a directory relationship, and the subspaces are distributed to different metadata servers for management, and specific database tables include a file metadata table, a file operation table, a file directory table, a folder metadata table, a project group data table, an organization structure directory table, and a staff directory table.
3. The system and method for managing and controlling business secret secure circulation based on application virtualization of claim 1, wherein the business secret circulation module based on application virtualization adopts data centralized management, transparent encryption and decryption, and application virtualization technologies to realize the secure circulation of business secret data;
firstly, after all the business secret data are issued, the business secret data are uniformly and intensively stored in a server side of an enterprise, only a creator of a file keeps the data at a terminal, the data are stored in a local place through a one-person one-secret encryption algorithm, and a secret key of a terminal computer opens the file;
then after the encryption algorithm is issued on the server, the encryption algorithm is encrypted and stored on the storage device of the server according to the same principle, and the encryption algorithm is also one person and one secret;
finally, when someone calls the file, the authority of the user needs to be judged, the opened content is pushed to the client in a video streaming mode by applying a virtualization technology, the user of the client can call the file normally, and the calling and reading authority is divided into online preview and online editing;
creating a service logic system according to the records of the complaints, starting to create files on a computer, performing encrypted local storage, then issuing files and decrypting files, uploading files and encrypting and storing in a centralized manner, and finally mapping the files to corresponding virtual files;
when someone accesses the file, the file needs to be decrypted, application virtualization is started, the system judges the access authority, and preview is finally completed;
the online editing can edit and modify the content of the file, the edited file is still stored on the server, and a new version can be automatically created for encrypted storage so as to provide collaborative worker query and comparison.
4. The system and method for managing and controlling business secret security circulation based on application virtualization according to claim 1, wherein the security management and control module for business secret circulation includes approval process, authority control and watermark management and control;
the specific data flow control process comprises sending a shared file, wherein the sending of the shared file comprises two modes, namely an internal sent file and an external shared file, the internal sent file comprises public folder sending and personal folder sending, a target user is selected in the sending process, the system judges whether the user has authorization of the file, when the user has authorization capacity, the system automatically sends the file, when the user does not have authorization capacity, the user can select the target folder and can select whether to edit, the system has a watermark format, data leakage caused by screen capturing, photographing and other behaviors of a data visitor is limited through a watermark technology, the reason for application is finally required to be provided, an approver at the end of a client examines and approves the file, and the internal sending is completed.
5. The system and the method for managing and controlling the business secret safe circulation based on the application virtualization are characterized in that according to the complaint and the description, in the process of external sharing of files, online preview is needed, then client software needs to be installed, in the process of online preview, data leakage caused by actions such as screen capture and photographing of a data visitor is prevented through a watermark format designed in the system, in the process, application preview reasons need to be carried out, then approval is carried out through an approver, and external sharing can be carried out to generate links;
the audit will eventually need to be performed by the administrator of the administration department.
6. The system and method for managing and controlling the secure circulation of business secrets based on application virtualization of claim 1, wherein the system functional modules are divided into three layers, one is a security target layer, which includes the usable, circulated, but not landable, non-storable business secret data;
the second is a circulation safety control layer, which comprises the safety control of internal circulation files and the safety control of external sharing files, and comprises online preview, online editing, circulation approval and content control;
and thirdly, a data storage encryption layer which comprises client side encryption and server side encryption.
7. The system and method for managing and controlling business secret security circulation based on application virtualization of claim 2, wherein the file metadata table comprises a file ID, a file Hash value, a file name, a file location, a file creator, and a file creation time;
the file operation table comprises a file ID, an operation name, a file operator, file operation time and a publishing target folder name (non-publishing is null);
the file directory table comprises folder IDs, file number, file ID list, file authority list (only browsing, editing and downloading);
the folder metadata table comprises a folder ID, a folder name, folder intensity (organization, temporary organization and employee), an organization ID or employee ID or project group ID or parent folder ID (the root directory is 0);
the system comprises a project organization ID, a project organization name, an employee ID list and a father organization ID (the root organization is 0);
the organization architecture directory table comprises an organization ID, an organization name and a father organization ID (the root organization is 0);
the employee directory table includes employee IDs, employee names, and affiliated organization IDs.
CN202111190320.4A 2021-10-12 2021-10-12 Business secret safe circulation control system and method based on application virtualization Pending CN113918516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111190320.4A CN113918516A (en) 2021-10-12 2021-10-12 Business secret safe circulation control system and method based on application virtualization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111190320.4A CN113918516A (en) 2021-10-12 2021-10-12 Business secret safe circulation control system and method based on application virtualization

Publications (1)

Publication Number Publication Date
CN113918516A true CN113918516A (en) 2022-01-11

Family

ID=79240124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111190320.4A Pending CN113918516A (en) 2021-10-12 2021-10-12 Business secret safe circulation control system and method based on application virtualization

Country Status (1)

Country Link
CN (1) CN113918516A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117155759A (en) * 2023-10-27 2023-12-01 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117155759A (en) * 2023-10-27 2023-12-01 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN117155759B (en) * 2023-10-27 2024-01-05 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102761521B (en) Cloud security storage and sharing service platform
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
CN102394894B (en) Network virtual disk file safety management method based on cloud computing
CN102307185B (en) Data isolation method used in storage cloud
CN102833346B (en) Based on cloud sensitive data safety system and the method for storing metadata
US7171557B2 (en) System for optimized key management with file groups
US7237268B2 (en) Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith
CA2944218C (en) Secure workflow and data management facility
CN101547199B (en) Electronic document safety guarantee system and method
CN103824031B (en) Use the method and system of safety of electronic file label guarantee safety of electronic file
CN103530570A (en) Electronic document safety management system and method
US7315859B2 (en) Method and apparatus for management of encrypted data through role separation
CN101729550A (en) Digital content safeguard system based on transparent encryption and decryption method thereof
CN104239812A (en) Local area network data safety protection method and system
CN109284426B (en) Multi-data document classification system based on permission level
CN102790770B (en) Electronic document concentrated preservation and takeout safety management system and method
CN112948870A (en) Electronic document security management method and management system based on big data
CN106682521A (en) File transparent encryption and decryption system and method based on driver layer
CN113918516A (en) Business secret safe circulation control system and method based on application virtualization
KR20000000410A (en) System and method for security management on distributed PC
Liu et al. A consortium medical blockchain data storage and sharing model based on ipfs
CN105205403B (en) Method, the system of control local area network file data based on file filter
TWI381285B (en) Rights management system for electronic files
CN109995735A (en) Downloading and application method, server, client, system, equipment and medium
Wu et al. A New User-controlled and Efficient Encrypted Data Sharing Model in Cloud Storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination