Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for manage confidential documents

A technology of secret-related documents and management methods, which is applied in the field of secret-related document management methods and systems, can solve problems such as document leakage, poor security, and inconsistent management methods, and achieve the effects of increasing production speed, wide application range, and flexible algorithms

Inactive Publication Date: 2019-03-26
卢淳杰
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. There are a large number of secret-related documents, which are scattered and stored in different locations, and are easily affected by technical or human factors, resulting in the leakage of documents. If ordinary Internet file management methods are adopted, it is easy to cause document leakage
[0004] 2. Confidentiality-related documents have different levels of confidentiality, existing management methods are not uniform, and files of different confidentiality levels are stored in a mixed manner
In addition, most confidential documents have a confidentiality period. Due to management and technical constraints, many documents cannot be decrypted in time after the confidentiality period expires.
[0005] 3. The secret-related file management system that relies on the existing confidential private network operation is prone to loopholes in authority control. Hackers and spies will use technical means to elevate authority, illegally access and read files beyond the scope of normal authority
[0006] 4. The fine-grained management of confidential documents is not enough, and it is impossible to accurately control the number of times the documents are read
[0007] 5. The vast majority of important confidential documents dare not go online, making it inconvenient to check
If confidential files are stored centrally, it will bring serious consequences in the event of intrusion or physical damage
[0008] 6. It is impossible to fundamentally solve the problem of secret agents, malicious personnel, hackers, etc. sneaking into the secret room to take pictures and steal files
[0009] Generally speaking, in the current technology, the management of confidential documents has problems such as inability to manage them in a unified manner, complex and cumbersome management methods, and poor security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for manage confidential documents
  • A method and system for manage confidential documents
  • A method and system for manage confidential documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] For the step numbers in the embodiment of the present invention, it is only set for the convenience of explanation and description, and there is no limitation on the order of the steps. The execution order of each step in the embodiment can be carried out according to the understanding of those skilled in the art Adaptive adjustment.

[0073] refer to figure 1 , the present embodiment provides a secret-related file management method, comprising the following steps:

[0074] S1. Create a confidential document and set the confidential information of the confidential document; the confidential information includes at least the confidentiality level, the confidentiality period, the list of document readers and the limit of reading times; the document reader list refers to the readers who can read the document The list information, the reading limit refers to the limit on the number of times each reader can read the file, which can be set to any number of times, for example...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a confidential document management method and a system. The method comprises the following steps: creating a confidential document; Using the public key of the secondary unit to encrypt the confidential file to obtain the first encrypted file; encrypting The first encrypted file by using the private key of the first level unit to obtain the second encrypted file, and encrypting the reader list set by the first level unit by using the private key of the first level unit. Adopting A block chain consensus mechanism algorithm to respectively create a block of confidential document and a block of reader list for the second encrypted file and the encrypted reader list; and adopting the block chain consensus mechanism algorithm to respectively create a block of confidential document and a block of reader list for the second encrypted file and the encrypted reader list. Broadcasting the newly created block of confidential documents and the block of reader list to the network, and notifying the relevant secondary units. The invention effectively improves the generation speed of the block, can realize the anti-tampering and traceability of the confidential documents,can realize the unified management of the confidential documents, has high safety, flexible algorithm, simple management and wide application range, and can be widely applied in the Internet industry.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and system for managing secret-related files. Background technique [0002] In some units, the transfer of some confidential documents is often involved. The traditional approach is to set up a special secrecy agency for the management of confidential documents and communication of confidential information, and a full-time secrecy officer for management. Due to concerns about document leaks, most documents are delivered in paper form, and relevant personnel need to go to a special confidential room to read them when they want to read them. With the development of Internet technology and mobile terminal technology, these relevant units have begun to try to build a confidential private network for the transmission and reading of confidential documents. Due to concerns about insufficient security levels and protection measures, different departments of the same unit,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/182G06F16/13G06F16/901
CPCG06F21/602G06F21/6218
Inventor 卢淳杰
Owner 卢淳杰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products