1. Technical Field
The embodiments of the present disclosure relate to management technology, and particularly to a file security control system and method.
2. Description of Related Art
In a company, management of files (e.g., patent application files) are important. However, at present, when a user is authorized to operate the file, the user can operate the file without restriction of times. The user can operate as many times (e.g., one hundred times) as she/he wants. For example, the user may print the file two times, copy the file to another computer twenty times, or edit the file fifty times. Thus, information security problems may occur. Therefore, there is room for improvement in the art.
The disclosure is illustrated by way of examples and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one.”
In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an EPROM. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable media include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives.
The setting module 1000 sets security configuration information for the files stored in the server 1. In one embodiment, the security configuration information of each file includes authority setting information, access time setting information, and operation time setting information. The authority setting information includes one or more identifications (IDs), where each ID corresponds to one client 2. In one embodiment, if the ID corresponding to the client 2 is included in the authority setting information, the client 2 may have an authority to access the file. The access time setting information includes times (e.g., nine times) for accessing the file. The operation time setting information includes times (e.g., five times) for operating the file (e.g., printing the file, saving as the file, or sending the file by an e-mail). The ID corresponding to the client 2 may be, but are not limited to, a disk serial number, a globally unique identification (GUID), a network address or a time stamp.
The insertion module 1002 reads a file from the storage system 10 and inserts the security configuration information into the file. In one embodiment, the security configuration information is inserted into a header of the file. Additionally, the security configuration information may be encrypted.
The generation module 1004 generates a new file according to the security configuration information and the file. In one embodiment, the new file is integrated with the security configuration information and the file, and is converted into a new format from the original format of the file. For example, the file may be in the format of A, the new file may be converted into the format of B. Additionally, the generation module 1004 replaces the file by the new file.
The determination module 1006 determines if a client 2 has the authority to access the new file when receiving a request of accessing the new file from the client 2. In one embodiment, if the ID stored in the client 2 is included in the one or more IDs stored in the authority setting information, the client 2 is determined as having the authority to access the new file. Otherwise, if the ID stored in the client 2 is not included in the one or more IDs stored in authority setting information, the client 2 is denied access to the new file.
The determination module 1006 further determines if the client 2 has an authority to operate the new file, in response to a determination that the client 2 has the authority to access the new file. In one embodiment, the determination module 1006 determines if times of operating the new file by the client 2 exceeds the times of the operating the new file stored in the security configuration information. If the times of operating the new file by the client 2 does not exceed the times of the operating the new file stored in the security configuration information, the client 2 is determined as having the authority to operate the new file. If the times of operating the new file by the client 2 exceeds the times of the operating the new file stored in the security configuration information, the client 2 is denied to access or operate by the new file. For example, if the times of operating file is set as five times in the security configuration information, and the new file has been operated five times by the client 2, then the client 2 cannot operate the new file any more.
The updating module 1008 displays content of the new file and operates the new file. In one embodiment, the content of the new file is displayed in a displaying device of the client 2. The updating module 1008 may print, copy, or store the file.
The updating module 1008 further updates the security configuration information in the new file after the new file has been operated by the client 2. In one embodiment, when the client 2 operates the new file, the updating module 1008 accumulates the time of operating the new file by the client 2, and updates the accumulated times of operating the new file by the client 2 into the security configuration information.
In step S100, the setting module 1000 sets security configuration information in the server 1. In one embodiment, the security configuration information includes one or more identifications (ID), times (e.g., nine times) for accessing the file, and times (e.g., five times) for operating the file (e.g., printing the file, saving as the file, or sending the file in format of e-mail). As mentioned above, each ID corresponds to one client 2, and the ID corresponding to the client 2 may be, but are not limited to, a disk serial number, a globally unique identification (GUID), a network address or a time stamp.
In step S102, the insertion module 1002 reads the file from the storage system 10 and inserts the security configuration information into the file. In one embodiment, the security configuration information may be encrypted using a symmetric key encryption or an asymmetric key encryption, and the encrypted security configuration information is inserted into a header of the file.
In step S104, the generation module 1004 generates a new file according to the security configuration information and the file. In one embodiment, the new file is converted into a new format from the original format of the file. The new file is integrated with the security configuration information and the file. For example, the file may be in the format of A, the new file may be converted into the format of B. Additionally, the file is replaced by the new file when the new file is generated.
In step S106, the determination module 1006 determines if a client 2 has an authority to access the new file when receiving a request of accessing the new file from the client 2. In one embodiment, if the ID stored in the client 2 is included in the one or more IDs stored in the authority setting information, the client 2 has the authority to access the new file, the procedure goes to step 5108. Otherwise, if the ID stored in the client 2 is not included in the one or more IDs stored in authority setting information, the client 2 is denied to access the new file, the procedure ends.
In step S108, the determination module 1006 further determines if the client 2 has an authority to operate the new file. In one embodiment, if the times of operating the new file by the client 2 does not exceed the times of the operating the new file stored in the security configuration information, the client 2 is determined as have the authority to operate the new file, the procedure goes to step S110. If the times of operating the new file by the client 2 exceeds the times of the operating the new file stored in the security configuration information, the client 2 is denied to access or operate the new file, the procedure ends.
In step S110, the updating module 1008 displays content of the new file and operates the new file. In one embodiment, the content of the new file is displayed in a displaying device of the client 2. The updating module 1008 may amend the content of the new file, or print the new file.
In step S112, the updating module 1008 further updates the security configuration information in the new file after the new file has been operated by the client 2. In one embodiment, each time when the client 2 operates the new file, the updating module 1008 calculates the times of operating the new file by the client 2, and updates the ID of the client 2 and the times of the operating the new file into the security configuration information.
Although certain inventive embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
| Number | Date | Country | Kind |
|---|---|---|---|
| 2012103321306 | Sep 2012 | CN | national |