CN102930194A - Data security operating system and method based on authority management and control - Google Patents
Data security operating system and method based on authority management and control Download PDFInfo
- Publication number
- CN102930194A CN102930194A CN2012103537141A CN201210353714A CN102930194A CN 102930194 A CN102930194 A CN 102930194A CN 2012103537141 A CN2012103537141 A CN 2012103537141A CN 201210353714 A CN201210353714 A CN 201210353714A CN 102930194 A CN102930194 A CN 102930194A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- authority
- information
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a data security operating system and method based on authority management and control. The data security operating system comprises identification equipment, a client side, a data acquisition center and a data processing center, wherein the identification equipment is used for acquiring identity feature information of a user performing operation on data; the client side is connected with the identification equipment and is used for uploading the identity feature information of the user and information of the operation performed on the data by the user; the data acquisition center is used for storing identity feather information and authorities of all users; and the data processing center is connected with the client side and the data acquisition center respectively and is used for judging whether the user has the authority to perform the operating information or not, and if so, the user is permitted to perform the operating information through the client side, otherwise, the identification equipment is commanded to acquire the identity feather information of the user again. According to the invention, the identification equipment is used for acquiring the information of the user, the authority of the operation user is judged before the user performs the data operation, and only can the user meeting authority requirements perform the corresponding data operation, so that the data operation is managed, and the data are protected comprehensively.
Description
Technical field
The invention belongs to field of information security technology, relate to a kind of safe transmission method of data, particularly relate to a kind of data security operating system and method based on authority managing and controlling.
Background technology
Electronic information tide take computing machine, network and movable storage device as sign has covered different social sectors, has liberated greatly yield-power, has improved speed and the validity of information interaction.When informationization covered comprehensively, safety problem, the especially information also brought were illegally abused, and for example: the employee sells the rival with document, and file is illegally stolen etc.For addressing the above problem, the product take encryption technology as means is active gradually.In today that cryptographic algorithm comes into the open, key has served as the role of key and lock, although it is very high that all big enterprises all represent to encrypt file security later, how security product is stablized, but who is not sure of in the situation that changed raw data by algorithm, whether can cause in the conversion process of encryption and decryption data to suffer irreversible damage, and during encryption and decryption data on the impact of read or write speed also be one inevitably true.The factors such as seen, the encryption/decryption speed that exists in reality is implemented is too slow, destroys file, and is unstable are indicating further that also secrecy technology awaits further raising.
How to prevent efficiently the leakage of classified papers, become those skilled in the art's urgent problem.Data security exists many levels, as: system safety, technical security, computing safety, storage security, transmission security, products ﹠ services wait safely.For Computer Data Security: system is taken stopgap measures safely, and technical security effects a permanent cure, other safety links that also are absolutely necessary.Data security is one of important subject of the subjects such as computing machine and network.It not only is related to individual privacy, the commercial privacy of enterprise; And Technology On Data Encryption directly affects national security.
Summary of the invention
The shortcoming of prior art the object of the present invention is to provide a kind of data security operating system and method based on authority managing and controlling in view of the above, in order to realize data message is carried out the function of operation protection.
Reach for achieving the above object other relevant purposes, the invention provides a kind of data security operating system and method based on authority managing and controlling.
A kind of data security operating system based on authority managing and controlling, described data security operating system based on authority managing and controlling comprises: identification apparatus, client, data acquisition center, data processing centre (DPC); Described identification apparatus is in order to gather in advance the user's that data are operated identity characteristic information; Described client links to each other with described identification apparatus, the operation information that in advance data is carried out in order to the identity characteristic information of uploading the user and user; Described data acquisition center stores whole users' identity characteristic information and authority thereof; Described data processing centre (DPC) links to each other respectively with client, data acquisition center, judges whether described user has authority to carry out described operation information; Then allow described user by the described operation information of client executing if having; Otherwise make identification apparatus Resurvey user's identity characteristic information.
Preferably, described identification apparatus comprises that fingerprint identification device, face recognition equipment are or/and the retina identification equipment.
Preferably, described fingerprint identification device is a mouse, and described mouse is provided with the finger scan module.
A kind of data security method of operating based on authority managing and controlling, described data security method of operating based on authority managing and controlling comprises:
Step 1, the operation information that client upload user carries out data in advance;
Step 2, data processing centre (DPC) judges whether described operation information needs authority to judge; If do not need the then described operation information of the direct execution of commands client; If need then execution in step three;
The user's that step 3, identification apparatus collection operate data in advance identity characteristic information;
Step 5, data processing centre (DPC) judges whether described user has authority to carry out described operation information; If any then making the described operation information of client executing, and make marks; If then do not return execution in step three.
Preferably, described step 3 also comprises: judge whether the collection of described identity equipment has gathered 3 users' identity characteristic information for described operation information; If then finish the operation of client; Otherwise continued to gather by identity-acquiring equipment.
Preferably, described identification apparatus comprises that fingerprint identification device, face recognition equipment are or/and the retina identification equipment; Described identity characteristic information comprises that fingerprint, face feature information are or/and the retina characteristic information.
Preferably, described fingerprint identification device is a mouse, and described mouse is provided with the finger scan module.
Preferably, described data security method of operating based on authority managing and controlling also comprises: step 6, data processing centre (DPC) will upload in the mode of daily record processing time, operation behavior, operation user, the result of data and be saved to data acquisition center.
Preferably, described data security method of operating based on authority managing and controlling also comprises the establishment document method, and described establishment document method comprises:
Steps A, client upload creates file operation information;
Step B, the identification apparatus collection creates the user's of file identity information;
Step C, data processing centre (DPC) judges by data acquisition center whether the user of described establishment file exists; If there is then execution in step D; Otherwise store user and the identity information acquisition thereof of described establishment file into data acquisition center, again execution in step D;
Step D, client input data, and will input data and be associated the new file after the formation establishment with the user's of described establishment file identity information.
Preferably, the described operation information that needs authority to judge of step 2 comprise to file make increase, delete, change, check, screenshotss are or/and copy.
As mentioned above, data security operating system and method based on authority managing and controlling of the present invention have following beneficial effect:
The present invention adopts identification apparatus to collect user's information; judge in the authority that data is operated the line operate user that advances; meet the user that authority requires and just can carry out corresponding data manipulation, the operation of data is managed, realized the omnibearing protection to data.
Description of drawings
Fig. 1 is shown as the structural representation of the data security operating system based on authority managing and controlling of the present invention.
Fig. 2 is shown as the schematic flow sheet of the data security method of operating based on authority managing and controlling of the present invention.
Fig. 3 is shown as the schematic flow sheet of embodiment two described establishment document methods.
The element numbers explanation
1 identification apparatus;
2 clients;
3 data acquisition centers;
4 data processing centre (DPC)s;
11 fingerprint identification devices;
12 face recognition equipment;
13 retina identification equipments.
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by the disclosed content of this instructions.The present invention can also be implemented or be used by other different embodiment, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications or change under the spirit of the present invention not deviating from.
See also accompanying drawing.Need to prove, the diagram that provides in the present embodiment only illustrates basic conception of the present invention in a schematic way, satisfy only show in graphic with the present invention in relevant assembly but not component count, shape and size drafting when implementing according to reality, kenel, quantity and the ratio of each assembly can be a kind of random change during its actual enforcement, and its assembly layout kenel also may be more complicated.
In order to solve the problem of available data safety, the present invention proposes a kind of data security operating system and method based on authority managing and controlling, it mainly is to pass through identity recognizing technology, the data that the author who has identity information is made identify, and additions and deletions change look into and the transmission of data in carry out effective rights management by identify label.Because the present invention just carries out management and control to the authority of operation, can not produce change to data itself, also can not solve huge and affect speed owing to the data of encryption and decryption, more stable, quickly the problem of data security.
The present invention is described in detail below in conjunction with embodiment and accompanying drawing.
Embodiment one
The present embodiment provides a kind of data security operating system based on authority managing and controlling, and as shown in Figure 1, described data security operating system based on authority managing and controlling comprises: identification apparatus 1, client 2, data acquisition center 3, data processing centre (DPC) 4; Described identification apparatus 1 is in order to gather in advance the user's that data are operated identity characteristic information; Described client 2 links to each other with described identification apparatus 1, the operation information that in advance data is carried out in order to the identity characteristic information of uploading the user and user; Described data acquisition center 3 stores whole users' identity characteristic information and authority thereof; Described data processing centre (DPC) 4 links to each other respectively with client 2, data acquisition center 3, judges whether described user has authority to carry out described operation information; Then allow described user by the described operation information of client executing if having; Otherwise make identification apparatus Resurvey user's identity characteristic information.
Further, described identification apparatus 1 comprises that fingerprint identification device 11, face recognition equipment 12 are or/and retina identification equipment 13.
Particularly, described fingerprint identification device 11 is a mouse, and described mouse is provided with the finger scan module.
In the data security operating system of the present invention, data acquisition center, data processing centre (DPC), client and adaptive identification apparatus are indispensable, identification apparatus is the basis of data security operating system, be responsible for collecting user's information, and by data line information constantly be sent to client.Before system's operation, want the corresponding identity characteristic information of typing and corresponding user, and be kept in the data acquisition center.By the setting to the data processing enter, every operating conditions that meets all can trigger identification apparatus and carry out scanning recognition, and by making corresponding operation by client after data processing centre's processing.There is Process Protection mechanism in client, can prevent from causing system not come into force owing to client is impaired.The present invention adopts identification apparatus to collect user's information; judge in the authority that data is operated the line operate user that advances; meet the user that authority requires and just can carry out corresponding data manipulation, the operation of data is managed, realized the omnibearing protection to data.
Embodiment two
The present embodiment provides a kind of data security method of operating based on authority managing and controlling, and as shown in Figure 2, described data security method of operating based on authority managing and controlling comprises:
The operation information that S1, client upload user carry out data in advance.
S2, data processing centre (DPC) judge whether described operation information needs authority to judge; If do not need the then described operation information of the direct execution of commands client; If need then execution in step S3.Particularly, the described operation information that needs authority to judge of step S2 comprise to file make increase, delete, change, check, screenshotss are or/and copy.
S3, the user's that the identification apparatus collection operates data in advance identity characteristic information.
Further, described step S3 also comprises: data processing centre (DPC) judges whether the collection of described identity equipment has gathered 3 users' identity characteristic information for described operation information; If then finish the operation of client; Otherwise continued to gather by identity-acquiring equipment.
Further, described identification apparatus comprises that fingerprint identification device, face recognition equipment are or/and the retina identification equipment; Described identity characteristic information comprises that fingerprint, face feature information are or/and the retina characteristic information.Particularly, described fingerprint identification device is a mouse, and described mouse is provided with the finger scan module.
S4, data processing centre (DPC) judge whether described user exists; If there is the authority of then transferring described user from data acquisition center; If do not exist, then return execution in step S3.
S5, data processing centre (DPC) judge whether described user has authority to carry out described operation information; If any then making the described operation information of client executing, and make marks; If then do not return execution in step S3.
S6, data processing centre (DPC) will upload in the mode of daily record processing time, operation behavior, operation user, the result of data and be saved to data acquisition center.
Further, described data security method of operating based on authority managing and controlling also comprises the establishment document method, and as shown in Figure 3, described establishment document method comprises:
Steps A, client upload creates file operation information;
Step B, the identification apparatus collection creates the user's of file identity information;
Step C, data processing centre (DPC) judges by data acquisition center whether the user of described establishment file exists; If there is then execution in step D; Otherwise store user and the identity information acquisition thereof of described establishment file into data acquisition center, again execution in step D;
Step D, client input data, and will input data and be associated the new file after the formation establishment with the user's of described establishment file identity information.
The realization system of the described data security method of operating based on authority managing and controlling of the present embodiment includes but not limited to embodiment one described data security operating system based on authority managing and controlling.
In the data security method of operating based on authority managing and controlling of the present invention, client is responsible for sending the information that fingerprint identification device is uploaded to data processing centre (DPC) and is analyzed, and result is acted on client; Client has multi-process guard function, prevents that client from being stopped by force.
Described data acquisition center passes through identification apparatus typing identity information, and corresponding identity information is related by the form of name or coding with identity information typing person (being the user).
Described data processing centre (DPC) by collecting client upload identity information and the data of data acquisition center compare, comparing result is fed back to client executing, and processing time, operation behavior, operation user, result etc. are uploaded to data acquisition center in the mode of daily record preserve; The data processing centre (DPC) that needs equally of systemic-function setting, right assignment processes.
The present invention has message identification and identification, data access authority control, screenshotss protection, paste and copy and the function such as drag and drop protection.Message identification and identification are identity information is scanned up to client and processes to data processing centre (DPC) by client upload by identification apparatus.When new document creation, identification apparatus can gather user's identity information, and confirms could input data after this identity information is present in data acquisition center; If do not scan identity information or information is not mated when creating file, system then can eject prompting frame, requires identity information is identified; But when not obtaining the enter instruction that data processing centre (DPC) returns, can't carry out writing of data; When data processing centre (DPC) returns can the new user of typing and during the instruction of identity information, client can write data, and user profile/code (or name) mode with the author in attribute that will be related with data writing identifies.
Wherein, data access authority control (being authority managing and controlling) refers to when file being made the instruction of operations such as increasing, delete, change, look into, the user's that identification apparatus can scan when sending instruction identity information is analyzed by client upload to data processing centre (DPC), if the identification information of data place file is presented within the scope that this user carries out corresponding operating, can be to this document executable operations; Otherwise this file identification information then limits the operation of this moment outside the scope of this user's corresponding operating.Under the default situations, the file that only has this talent of author that oneself is created has additions and deletions and changes to look into and wait all operations authority, other users to the file of this author's making without any operating right.
The screenshotss protection is to arrange by data processing centre (DPC), for client or identification information (these two conditions also can satisfy simultaneously), the client of correspondence or the file of message identification are opened in every strategy (being screenshotss protection strategy), client can with the on-screen display (osd) area blackening, also just can't be truncated to effective information during screenshotss; For corresponding client or the file of message identification, normally screenshotss in strategy not.
Paste that to copy with drag and drop protections be to arrange by data processing centre (DPC) equally; client or identification information (these two conditions also can satisfy simultaneously); data in the file of the client of correspondence or message identification can't copy and drag and drop in every strategy (namely pasting replication strategy).For the individual, also can copy the user identity of pasting with the drag and drop authority and identify having, if scanning meets then and can operate accordingly.
The present invention adopts identification apparatus to collect user's information; judge in the authority that data is operated the line operate user that advances; meet the user that authority requires and just can carry out corresponding data manipulation, the operation of data is managed, realized the omnibearing protection to data.
In sum, the present invention has effectively overcome various shortcoming of the prior art and the tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not is used for restriction the present invention.Any person skilled in the art scholar all can be under spirit of the present invention and category, and above-described embodiment is modified or changed.Therefore, have in the technical field under such as and know that usually the knowledgeable modifies or changes not breaking away from all equivalences of finishing under disclosed spirit and the technological thought, must be contained by claim of the present invention.
Claims (10)
1. the data security operating system based on authority managing and controlling is characterized in that, described data security operating system based on authority managing and controlling comprises:
Identification apparatus is in order to gather in advance the user's that data are operated identity characteristic information;
Client links to each other with described identification apparatus, the operation information that in advance data is carried out in order to the identity characteristic information of uploading the user and user;
Data acquisition center stores whole users' identity characteristic information and authority thereof;
Data processing centre (DPC) links to each other respectively with client, data acquisition center, judges whether described user has authority to carry out described operation information; Then allow described user by the described operation information of client executing if having; Otherwise make identification apparatus Resurvey user's identity characteristic information.
2. the data security operating system based on authority managing and controlling according to claim 1, it is characterized in that: described identification apparatus comprises that fingerprint identification device, face recognition equipment are or/and the retina identification equipment.
3. the data security operating system based on authority managing and controlling according to claim 2, it is characterized in that: described fingerprint identification device is a mouse, and described mouse is provided with the finger scan module.
4. the data security method of operating based on authority managing and controlling is characterized in that, described data security method of operating based on authority managing and controlling comprises:
Step 1, the operation information that client upload user carries out data in advance;
Step 2, data processing centre (DPC) judges whether described operation information needs authority to judge; If do not need the then described operation information of the direct execution of commands client; If need then execution in step three;
The user's that step 3, identification apparatus collection operate data in advance identity characteristic information;
Step 4, data processing centre (DPC) judges whether described user exists; If there is the authority of then transferring described user from data acquisition center; If do not exist, then return execution in step three;
Step 5, data processing centre (DPC) judges whether described user has authority to carry out described operation information; If any then making the described operation information of client executing, and make marks; If then do not return execution in step three.
5. the data security method of operating based on authority managing and controlling according to claim 4, it is characterized in that: described step 3 also comprises: judge whether the collection of described identity equipment has gathered 3 users' identity characteristic information for described operation information; If then finish the operation of client; Otherwise continued to gather by identity-acquiring equipment.
6. the data security method of operating based on authority managing and controlling according to claim 4, it is characterized in that: described identification apparatus comprises that fingerprint identification device, face recognition equipment are or/and the retina identification equipment; Described identity characteristic information comprises that fingerprint, face feature information are or/and the retina characteristic information.
7. the data security method of operating based on authority managing and controlling according to claim 6, it is characterized in that: described fingerprint identification device is a mouse, and described mouse is provided with the finger scan module.
8. the data security method of operating based on authority managing and controlling according to claim 4, it is characterized in that, described data security method of operating based on authority managing and controlling also comprises: step 6, data processing centre (DPC) will upload in the mode of daily record processing time, operation behavior, operation user, the result of data and be saved to data acquisition center.
9. the data security method of operating based on authority managing and controlling according to claim 4 is characterized in that, described data security method of operating based on authority managing and controlling also comprises the establishment document method, and described establishment document method comprises:
Steps A, client upload creates file operation information;
Step B, the identification apparatus collection creates the user's of file identity information;
Step C, data processing centre (DPC) judges by data acquisition center whether the user of described establishment file exists; If there is then execution in step D; Otherwise store user and the identity information acquisition thereof of described establishment file into data acquisition center, again execution in step D;
Step D, client input data, and will input data and be associated the new file after the formation establishment with the user's of described establishment file identity information.
10. the data security method of operating based on authority managing and controlling according to claim 9 is characterized in that: the described operation information that needs authority to judge of step 2 comprise to file make increase, delete, change, check, screenshotss are or/and copy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103537141A CN102930194A (en) | 2012-09-20 | 2012-09-20 | Data security operating system and method based on authority management and control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103537141A CN102930194A (en) | 2012-09-20 | 2012-09-20 | Data security operating system and method based on authority management and control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102930194A true CN102930194A (en) | 2013-02-13 |
Family
ID=47644991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103537141A Pending CN102930194A (en) | 2012-09-20 | 2012-09-20 | Data security operating system and method based on authority management and control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102930194A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514390A (en) * | 2013-09-18 | 2014-01-15 | 吴先洪 | Method and device for data self-destroying and digital device |
CN104361455A (en) * | 2014-11-19 | 2015-02-18 | 成都实景信息技术有限公司 | Enterprise employee information processing method |
CN105282155A (en) * | 2015-09-30 | 2016-01-27 | 努比亚技术有限公司 | Authority control method, device and system for interaction among terminals |
CN105760733A (en) * | 2016-01-29 | 2016-07-13 | 上海摩软通讯技术有限公司 | Data encrypting method and module and data accessing method and module |
CN105868602A (en) * | 2015-02-09 | 2016-08-17 | 东芝泰格有限公司 | Information processing apparatus and security control method therefor |
CN106372480A (en) * | 2016-08-19 | 2017-02-01 | 刘晓亮 | Computer for guaranteeing database information security |
CN106406838A (en) * | 2015-07-31 | 2017-02-15 | 腾讯科技(深圳)有限公司 | Screen shot sharing method, apparatus, and system |
CN107248079A (en) * | 2016-09-05 | 2017-10-13 | 新材料与产业技术北京研究院 | One kind is traced to the source anti counterfeit appts, system and method |
CN107995164A (en) * | 2017-10-30 | 2018-05-04 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal |
CN108376216A (en) * | 2017-02-01 | 2018-08-07 | 恩德莱斯和豪瑟尔分析仪表两合公司 | The method for being used to measuring, calibrate and recording sensor using computer |
CN109862062A (en) * | 2018-10-24 | 2019-06-07 | 平安科技(深圳)有限公司 | Content uploading management method and device, electronic equipment and storage medium |
CN111049806A (en) * | 2019-11-21 | 2020-04-21 | 腾讯科技(深圳)有限公司 | Joint authority control method and device, electronic equipment and storage medium |
CN111949956A (en) * | 2020-07-31 | 2020-11-17 | 华为技术有限公司 | Secure interaction method and device |
CN113935700A (en) * | 2020-06-29 | 2022-01-14 | 广州西门子变压器有限公司 | Tool management method, system and computer storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1987832A (en) * | 2005-12-20 | 2007-06-27 | 鸿富锦精密工业(深圳)有限公司 | Input device with finger print identifying function and its finger print identifying method |
CN101169810A (en) * | 2006-10-27 | 2008-04-30 | 环达电脑(上海)有限公司 | Electronic device possessing fingerprint identification system and its usage method |
CN101415075A (en) * | 2007-10-16 | 2009-04-22 | 佛山普立华科技有限公司 | Digital camera with fingerprint identification function and use method thereof |
CN101547199A (en) * | 2009-05-05 | 2009-09-30 | 北京神舟航天软件技术有限公司 | Electronic document safety guarantee system and method |
CN101827148A (en) * | 2010-05-18 | 2010-09-08 | 深圳桑菲消费通信有限公司 | Fingerprint identification system applied to mobile phone and operating method thereof |
CN102684920A (en) * | 2012-05-18 | 2012-09-19 | 苏州佰思迈信息咨询有限公司 | User permission management system |
-
2012
- 2012-09-20 CN CN2012103537141A patent/CN102930194A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1987832A (en) * | 2005-12-20 | 2007-06-27 | 鸿富锦精密工业(深圳)有限公司 | Input device with finger print identifying function and its finger print identifying method |
CN101169810A (en) * | 2006-10-27 | 2008-04-30 | 环达电脑(上海)有限公司 | Electronic device possessing fingerprint identification system and its usage method |
CN101415075A (en) * | 2007-10-16 | 2009-04-22 | 佛山普立华科技有限公司 | Digital camera with fingerprint identification function and use method thereof |
CN101547199A (en) * | 2009-05-05 | 2009-09-30 | 北京神舟航天软件技术有限公司 | Electronic document safety guarantee system and method |
CN101827148A (en) * | 2010-05-18 | 2010-09-08 | 深圳桑菲消费通信有限公司 | Fingerprint identification system applied to mobile phone and operating method thereof |
CN102684920A (en) * | 2012-05-18 | 2012-09-19 | 苏州佰思迈信息咨询有限公司 | User permission management system |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514390A (en) * | 2013-09-18 | 2014-01-15 | 吴先洪 | Method and device for data self-destroying and digital device |
CN104361455A (en) * | 2014-11-19 | 2015-02-18 | 成都实景信息技术有限公司 | Enterprise employee information processing method |
CN105868602B (en) * | 2015-02-09 | 2019-07-30 | 东芝泰格有限公司 | Information processing unit and its safety method |
CN105868602A (en) * | 2015-02-09 | 2016-08-17 | 东芝泰格有限公司 | Information processing apparatus and security control method therefor |
CN106406838A (en) * | 2015-07-31 | 2017-02-15 | 腾讯科技(深圳)有限公司 | Screen shot sharing method, apparatus, and system |
CN105282155B (en) * | 2015-09-30 | 2020-08-21 | 南京飞米农业科技有限公司 | Authority control method, device and system for interaction between terminals |
CN105282155A (en) * | 2015-09-30 | 2016-01-27 | 努比亚技术有限公司 | Authority control method, device and system for interaction among terminals |
CN105760733B (en) * | 2016-01-29 | 2018-11-23 | 上海摩软通讯技术有限公司 | Data ciphering method and module, data access method and module |
CN105760733A (en) * | 2016-01-29 | 2016-07-13 | 上海摩软通讯技术有限公司 | Data encrypting method and module and data accessing method and module |
CN106372480A (en) * | 2016-08-19 | 2017-02-01 | 刘晓亮 | Computer for guaranteeing database information security |
CN107248079A (en) * | 2016-09-05 | 2017-10-13 | 新材料与产业技术北京研究院 | One kind is traced to the source anti counterfeit appts, system and method |
CN108376216A (en) * | 2017-02-01 | 2018-08-07 | 恩德莱斯和豪瑟尔分析仪表两合公司 | The method for being used to measuring, calibrate and recording sensor using computer |
CN107995164B (en) * | 2017-10-30 | 2019-11-15 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal |
CN107995164A (en) * | 2017-10-30 | 2018-05-04 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal |
CN109862062A (en) * | 2018-10-24 | 2019-06-07 | 平安科技(深圳)有限公司 | Content uploading management method and device, electronic equipment and storage medium |
CN109862062B (en) * | 2018-10-24 | 2022-10-18 | 平安科技(深圳)有限公司 | Content uploading management method and device, electronic equipment and storage medium |
CN111049806A (en) * | 2019-11-21 | 2020-04-21 | 腾讯科技(深圳)有限公司 | Joint authority control method and device, electronic equipment and storage medium |
CN113935700A (en) * | 2020-06-29 | 2022-01-14 | 广州西门子变压器有限公司 | Tool management method, system and computer storage medium |
CN111949956A (en) * | 2020-07-31 | 2020-11-17 | 华为技术有限公司 | Secure interaction method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102930194A (en) | Data security operating system and method based on authority management and control | |
CN105429761B (en) | A kind of key generation method and device | |
US10547453B2 (en) | Methods for digitally signing an electronic file and authentication method | |
CN103455744B (en) | A kind of data security protection method based on vein identification technology and system | |
CN102724044A (en) | Electronic evidence verification and preservation method | |
CN105933113A (en) | Secret key backup recovering method and system, and related devices | |
CN101221612A (en) | Method for enciphering and deciphering electric document file by face recognition | |
US20150149784A1 (en) | Communication method utilizing fingerprint information authentication | |
CN103488481A (en) | Application program control method, terminal equipment and remote control system | |
CN205901794U (en) | System for it encrypts to carry out selectivity to big data content | |
CN105095719B (en) | A kind of unlocked by fingerprint method and its system and the electronic equipment with the system | |
CN107871081A (en) | A kind of computer information safe system | |
CN102831500A (en) | Paperless examination security monitoring system and method | |
CN103152425A (en) | Safety management system for mobile device based on cloud technology | |
CN103177207A (en) | Method and system for protecting data based on iris identification | |
CN102194066A (en) | Method for taking fingerprint information as key | |
CN107066868A (en) | A kind of data guard method and device of identity-based certification | |
CN107256353A (en) | Possesses the display methods of privacy protection function | |
CN105681034B (en) | A kind of document privacy management method and system based on digital label | |
CN113779592A (en) | Intelligent equipment shear plate data encryption system and method | |
CN101118639A (en) | Safety electric national census system | |
CN103368736A (en) | Business information encryption and decryption method and device | |
CN102542210A (en) | Electronic device and method for managing file permissions | |
EP2883182B1 (en) | Device assembly for carrying out or releasing an electronic service and method for securely entering authorization data | |
CN106952659B (en) | CD multistage imprinting encryption method based on XTS encryption mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130213 |
|
RJ01 | Rejection of invention patent application after publication |