File protection method, device and system, medium and electronic equipment

A file and sub-area technology, applied in computer security devices, program/content distribution protection, electronic digital data processing, etc., can solve problems such as low file protection quality and file protection

Inactive Publication Date: 2021-08-20
中航金网(北京)电子商务有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the file password is usually used to control the file usage authority. However, this file protection method can only protect the file when the file is opened, and cannot be used in real time during the continuous process of the file being used. File protection, file protection quality is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method, device and system, medium and electronic equipment
  • File protection method, device and system, medium and electronic equipment
  • File protection method, device and system, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this application will be thorough and complete, and will fully convey the concepts of example embodiments to those skilled in the art.

[0040] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the application. However, those skilled in the art will appreciate that the technical solutions of the present application may be practiced without one or more of the specific details, or other methods, components, devices, steps, etc. may be employed. In other instances, well-known methods,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a file protection method, device and system, a computer readable medium and electronic equipment. The method comprises the steps: when it is detected that a file is used, acquiring the biological characteristics of a file user using the file; determining identity information of the file user through the biological characteristics; based on the identity information, determining the permission of the file user to use the file; and when the file user does not have the permission to use the file, executing an instruction for prohibiting the file user from using the file. According to the technical scheme provided by the embodiment of the invention, the security of the file in use can be improved.

Description

technical field [0001] The present application relates to the technical field of computer and file protection, in particular, to a file protection method, device, system, computer readable medium and electronic equipment. Background technique [0002] At present, documents basically exist in the form of electronic documents. Coupled with the rapid development of the network and the popularity of computers and mobile terminals, the safety of electronic documents has attracted more and more attention from enterprises and all walks of life. In the prior art, the file password is usually used to control the file usage authority. However, this file protection method can only protect the file when the file is opened, and cannot be used in real time during the continuous process of the file being used. The file is protected, and the file protection quality is not high. Based on this, how to improve the security of files when they are used is a technical problem to be solved urgent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/45G06F21/12
CPCG06F21/121G06F21/32G06F21/45
Inventor 刘伟
Owner 中航金网(北京)电子商务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products