Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing CMS based system for grouped security management of files

An implementation method and technology for a management system, which are applied in the field of organization confidential information files and personal privacy information file grouping confidentiality management systems, can solve the problems of poor security, non-compliant files and one-to-many, many-to-many relationships between visitors and visitors. Cloud mode is vulnerable to attacks, etc., to achieve the effect of flexible settings and good confidentiality

Inactive Publication Date: 2016-06-22
丁贤根
View PDF20 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. The relativity of privacy
This method still does not conform to the relativity of privacy mentioned above, and does not conform to the one-to-many, many-to-many relationship between files and visitors
Additionally, security is poor due to the cloud model being vulnerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing CMS based system for grouped security management of files
  • Method for implementing CMS based system for grouped security management of files
  • Method for implementing CMS based system for grouped security management of files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0110] The present invention relates to a kind of realization method based on CMS file grouping security management system, such as Figure 5 As shown, the security management system includes two parts: storage and access group. In the storage, all files are stored, including some files that need to be kept secret, such as file 1, file 2 and file n. In the access group, Contains the root access group, and also contains access group 1, access group 2, and access group n.

[0111] figure 1 It is a group structure diagram of the CMS access group in the present invention. Among them, 1.1.1 is the root access group. Under the root access group, there are three secondary access groups, namely: colleague access group 1.2.1, competitor access group 1.2.2, colleague access group 1.2.3, and , under the colleague visit group, there are two third-level...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for implementing a CMS based system for grouped security management of files. According to the method, accessing persons are divided into a plurality of accessing groups; a CMS security index table is created for files; a security identifier is set for each accessing group, and the accessing group is forbidden to access files with a security identifier and is allowed to access files without a security identifier. An access password and a destruction password are set for each accessing group, wherein the access password is used for entering the access group, and is used for accessing non-confidential files of the accessing group; and the destruction password is used for destructing confidential files in the group. Encryption and decryption are applied to storage and access of confidential files, and a database may also be used for storage. According to the method, a function of locking in case of a wrong password, a function of automatic file destruction in case of a wrong password, a function of an automatic exit in case of no operation, and a function of a manual exit are provided. The method eliminates the defect of that an identity opens all confidential files, is applicable to mobile phone APP / APK design for privacy protection, and is applicable to security design of removable storage products for mobile phones or PCs.

Description

technical field [0001] The invention relates to the storage field of information technology, in particular to the field of storage of confidential information files, and in particular to a method for realizing a group security management system of institutional confidential information files and personal private information files. Background technique [0002] Document security technology has been developed for many years, and it has been used by state agencies, the military, finance, and organizations for a long time. Both the security technology and the security system are perfect. But unfortunately, at the personal level, even in Western countries that pay more attention to personal privacy, the protection of personal privacy, at least from a technical perspective, is still unsatisfactory. You can get a glimpse of the leopard from the endless personal leaks. [0003] At present, the storage of personal information is nothing more than two extremes, one is the cloud storag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F21/6218
Inventor 丁贤根
Owner 丁贤根
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products