TWI637282B - System and method of controlling and limiting number of files access - Google Patents
System and method of controlling and limiting number of files access Download PDFInfo
- Publication number
- TWI637282B TWI637282B TW106112048A TW106112048A TWI637282B TW I637282 B TWI637282 B TW I637282B TW 106112048 A TW106112048 A TW 106112048A TW 106112048 A TW106112048 A TW 106112048A TW I637282 B TWI637282 B TW I637282B
- Authority
- TW
- Taiwan
- Prior art keywords
- file
- files
- client
- control unit
- limiting
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
一種限制檔案處理數量之系統,包括:一管理端,包括第一處理器、一檔案控制單元以及一資料庫,該檔案控制單元與資料庫係各別耦合至第一處理器;以及至少一用戶端,包括一第二處理器、一儲存單元以及一檔案處理單元,該儲存單元與檔案處理單元係各別耦合至第二處理器;其中該檔案控制單元係用以限制至少一用戶端複製檔案、刪除檔案或移動檔案之數量。 A system for limiting the number of files processed includes: a management terminal including a first processor, a file control unit and a database, the file control unit and the database are respectively coupled to the first processor; and at least one user Terminal, including a second processor, a storage unit and a file processing unit, the storage unit and the file processing unit are respectively coupled to the second processor; wherein the file control unit is used to restrict at least one client from copying files , Number of deleted files, or moved files.
Description
本發明係關於一種檔案存取控管之技術,且特別有關於一種檔案操作紀錄及檔案存取數量之控管與限制之系統與方法,其中管理端可以在特定用戶端上進行檔案存取數量之控管與限制。 The present invention relates to a file access control technology, and more particularly, to a system and method for controlling and limiting file operation records and file access numbers, in which a management terminal can perform file access numbers on a specific client Control and restrictions.
隨著電腦科技的發展,現代人不管在工作、學習或其他應用皆以電腦作為重要工具。因此,在現代生活中,不管是家庭、學校、政府機關、軍方、商業機構或其他各式各樣的單位,每天都在產生大量的電子文件。其中不乏包含重要機密之文件,包含軍事機密、商業機密、考試資訊及其他等。另外,由於網際網路的發達,各式各樣的有線/無線網路的發展及儲存裝置的應用等,這些電子文件的保密便顯得相當不容易。由於現代電腦的作業系統多可容納多組使用者帳號,亦或網路伺服器的分享,因此在多位使用者同時共享下,就必須對各種不同機密程度的文件加以區分。 With the development of computer technology, modern people use computers as an important tool whether they are at work, study or other applications. Therefore, in modern life, whether it is homes, schools, government agencies, military, commercial organizations or other various units, a large number of electronic files are being generated every day. Many of them contain important confidential documents, including military secrets, trade secrets, test information, and more. In addition, due to the development of the Internet, the development of various wired / wireless networks and the application of storage devices, the confidentiality of these electronic files has become quite difficult. Because the operating system of modern computers can accommodate multiple groups of user accounts, or sharing by web servers, it is necessary to distinguish between various documents with different levels of confidentiality when multiple users share at the same time.
另外,傳統之電子檔案有多種保密方法。其中最常見者係利用軟體程式在電子檔案儲存時依照檔案產生者設定使用者或使用群組賦予特定權限。而當開啟電子檔案時,則依照使用者名稱及密碼判定使用者或使用群組是否賦予權限處理檔案。未經認可的使用者或使用群組將無法處理電子檔案,以防止機密電子檔案外洩。 In addition, traditional electronic archives have multiple methods of confidentiality. The most common is to use software programs to set users based on the creator of the file or use groups to grant specific permissions when storing electronic files. When the electronic file is opened, it is determined whether the user or the use group has given permission to process the file according to the user name and password. Unauthorized users or user groups will not be able to process electronic files to prevent leakage of confidential electronic files.
上述電子檔案儲存流程為電子檔案儲存時先行選擇是否設定使用權限。若不是,則直接存檔;若是,則先設定使用者或使用群組,再設定使用權限而完成電子檔案存檔流程。再則,電子檔案開啟流程為軟體程式將電子檔案開啟時先行判斷開啟人是否為檔案產生者。若是,則直接開啟並執行操作;若不是,則判斷是否為認可之使用者或使用群組,若是,則依所賦予之權限開啟電子檔案並執行操作,若不是,則拒絕開啟。 The above electronic file storage process is to first select whether to set the use permission when the electronic file is stored. If not, then archive directly; if so, first set up users or use groups, and then set usage rights to complete the electronic file archiving process. Furthermore, the electronic file opening process is a software program that first determines whether the opener is the file producer when opening the electronic file. If it is, then directly open and execute the operation; if not, determine whether it is a recognized user or use group; if so, open the electronic file and perform the operation according to the permissions granted; if not, refuse to open.
習知技術中,閱讀檔案資料者應可瞭解電子檔案之加密係攸關其 多項相關細節。舉凡所欲受密檔案之類型、所採用之加密法或加密規則、所允許之使用者及其權限設定、檔案所處之加密層級、觸發檔案自動加密之動作...等。今依據不同的使用場合與情境,加密檔案亦會有其不同之設定與作法。舉例言之,於某些場合中,機密文件之權限控管範圍不僅限於企業內部相關人員,亦可能需要於企業外部流通、發表。例如,當企業要對客戶宣傳其新推出、未公開之產品、專案、電路佈局、或機構設計圖時,無可避免地,其機密檔案或文件須於該客戶端裝置處進行開啟與發表,其可能是交由業務部門人員攜至客戶端進行推廣或簡報。此時,公司之資安管理人員(Management Information System:MIS)就必須對該機密檔案加密並開放業務人員得以存取該機密檔案之權限。又,某些機密檔案攸關公司重要資訊,如企業之研發結果、營業秘密、財務狀況、或客戶資料等,這類資訊一旦洩漏,將對企業造成無法彌補的損害。故,對於此類檔案須採行嚴格的加密控管機制。惟,針對電子檔案之加密,目前業界缺乏一種可對各種檔案加密項目,包括加解密之方式與作法、權限設定等,進行分類之系統架構,以方便管理者暨使用者操作應用。 Readers should be able to understand that the encryption of electronic files Several related details. For example, the types of files to be encrypted, the encryption method or encryption rules used, the allowed users and their permission settings, the encryption level of the files, the actions that trigger automatic encryption of the files, etc. Today, encrypted files will have different settings and practices based on different usage occasions and situations. For example, in some cases, the scope of control over the authority of confidential documents is not limited to relevant personnel within the enterprise, but may also need to be circulated and published outside the enterprise. For example, when a company wants to publicize its newly launched, undisclosed product, project, circuit layout, or institutional design to customers, it is inevitable that its confidential files or documents must be opened and published on the client device. It may be handed over to a client for promotion or presentation by business personnel. At this time, the company's management information system (Management Information System: MIS) must encrypt the confidential file and open the business personnel to access the confidential file. In addition, certain confidential files are important to the company's important information, such as the company's research and development results, business secrets, financial status, or customer information. Once such information is leaked, it will cause irreparable damage to the company. Therefore, a strict encryption control mechanism must be adopted for such files. However, for the encryption of electronic files, the industry currently lacks a system structure that can classify various file encryption items, including encryption and decryption methods and methods, and permission settings, to facilitate the operation of applications by managers and users.
如前所述,習知技術均圍繞在利用使用者設定的密碼以加密的方法來進行檔案的防護。然而,對於檔案數量的管制、檔案本身的保護並沒有進一步限制,因此,無法有效達到檔案防護與檔案數量的管制效果。 As mentioned earlier, the conventional techniques are all about protecting files by encrypting them with a password set by the user. However, there are no further restrictions on the control of the number of files and the protection of the files themselves. Therefore, the effects of file protection and control of the number of files cannot be effectively achieved.
鑒於上述習知技術的缺點,本發明提供一種嶄新的檔案存取數量之控管與限制方法以克服上述缺點。 In view of the shortcomings of the above-mentioned conventional technologies, the present invention provides a new method for controlling and limiting the number of file accesses to overcome the above shortcomings.
本發明提供一種限制檔案處理數量之系統,包括:一管理端,包括第一處理器、一檔案控制單元以及一資料庫,該檔案控制單元與資料庫係各別耦合至第一處理器;以及至少一用戶端,包括一第二處理器、一儲存單元以及一檔案處理單元,該儲存單元與檔案處理單元係各別耦合至第二處理器;其中該檔案控制單元係用以限制至少一用戶端複製檔案、刪除檔案或移動檔案之數量。 The present invention provides a system for limiting the number of files processed, including: a management terminal including a first processor, a file control unit, and a database; the file control unit and the database are respectively coupled to the first processor; and At least one client includes a second processor, a storage unit, and a file processing unit. The storage unit and the file processing unit are respectively coupled to the second processor. The file control unit is used to limit at least one user. Number of files copied, deleted or moved.
根據本發明之一觀點,其中該管理端更包括一第一網路耦合介面,耦合至第一處理器。 According to an aspect of the present invention, the management terminal further includes a first network coupling interface coupled to the first processor.
根據本發明之一觀點,其中該至少一用戶端更包括一第二網路耦合介面,耦合至第二處理器,其中第一網路耦合介面透過一網路以溝通第二網 路耦合介面。 According to an aspect of the present invention, the at least one client further includes a second network coupling interface coupled to the second processor, wherein the first network coupling interface communicates with the second network through a network. Road coupling interface.
根據本發明之另一觀點,其中該至少一用戶端更包括一網路瀏覽器,用以瀏覽檔案。 According to another aspect of the present invention, the at least one client further includes a web browser for browsing files.
根據本發明之又一觀點,該資料庫係用以儲存至少一用戶端之帳號資料、複數個檔案數量資料。 According to another aspect of the present invention, the database is used to store account data of at least one client and data of a plurality of files.
根據本發明之再一觀點,其中該檔案控制單元係用以設定或編輯資料庫中所儲存之帳號資料、複數個檔案數量資料。 According to another aspect of the present invention, the file control unit is configured to set or edit account data and a plurality of file quantity data stored in a database.
根據本發明之一觀點,其中該檔案控制單元係用以監控至少一用戶端之使用者日誌,以得到至少一用戶端複製檔案、刪除檔案或移動檔案之數量。 According to an aspect of the present invention, the file control unit is configured to monitor a user log of at least one client to obtain the number of files copied, deleted, or moved by the at least one client.
根據本發明之一觀點,其中透過該檔案處理單元之處理得以取得至少一用戶端複製檔案、刪除檔案或移動檔案之數量。 According to an aspect of the present invention, the number of copied files, deleted files, or moved files of the at least one client can be obtained through processing by the file processing unit.
根據本發明之一觀點,當該至少一用戶端之一複製檔案、刪除檔案或移動檔案之數量達到或超過了該檔案控制單元所設定的一預定值或門檻值,則該系統禁止或警告該至少一用戶端之一複製檔案、刪除檔案或移動檔案。 According to one aspect of the present invention, when the number of files copied, deleted, or moved by one of the at least one client reaches or exceeds a predetermined value or threshold set by the file control unit, the system prohibits or warns the Copy, delete, or move files from at least one of the clients.
此些優點及其他優點從以下較佳實施例之敘述及申請專利範圍將使讀者得以清楚了解本發明。 These advantages and other advantages will make the reader understand the present invention clearly from the description of the following preferred embodiments and the scope of patent application.
10‧‧‧管理系統 10‧‧‧Management System
100‧‧‧管理端(伺服器) 100‧‧‧Management (server)
110‧‧‧處理單元 110‧‧‧processing unit
120‧‧‧檔案控制單元(模組) 120‧‧‧File control unit (module)
125‧‧‧網路 125‧‧‧Internet
130‧‧‧資料庫 130‧‧‧Database
132‧‧‧帳號資料 132‧‧‧Account Information
134‧‧‧檔案數量資料 134‧‧‧File number data
136‧‧‧檔案識別碼 136‧‧‧File ID
140‧‧‧網路耦合介面 140‧‧‧ network coupling interface
200‧‧‧用戶端(使用者端裝置) 200‧‧‧Client (user device)
210‧‧‧處理單元 210‧‧‧processing unit
220‧‧‧儲存單元 220‧‧‧Storage unit
222‧‧‧檔案 222‧‧‧Archives
224‧‧‧檔案識別碼 224‧‧‧File ID
230‧‧‧檔案處理單元(模組) 230‧‧‧File processing unit (module)
240‧‧‧網路耦合介面 240‧‧‧ network coupling interface
250‧‧‧網路瀏覽器 250‧‧‧ web browser
如下所述之對本發明的詳細描述與實施例之示意圖,應使本發明更被充分地理解;然而,應可理解此僅限於作為理解本發明應用之參考,而非限制本發明於一特定實施例之中。 The detailed description of the present invention and the schematic diagrams of the embodiments described below should make the present invention more fully understood; however, it should be understood that this is only used as a reference for understanding the application of the present invention, rather than limiting the present invention to a specific implementation. Example.
第一圖顯示根據本發明之一實施例之檔案存取數量之管理系統之一示意圖;第二圖顯示根據本發明之一實施例之檔案存取數量之管理系統之伺服器之資料庫中之帳號資料、檔案數量及檔案識別碼之對應關係圖之一示意圖。 The first figure shows a schematic diagram of a file access quantity management system according to an embodiment of the present invention; the second figure shows a database in a server database of the file access quantity management system according to an embodiment of the present invention Schematic diagram of the correspondence between account information, file number, and file identification code.
此處本發明將針對發明具體實施例及其觀點加以詳細描述,此類描述為解釋本發明之結構或步驟流程,其係供以說明之用而非用以限制本發明之申請專利範圍。因此,除說明書中之具體實施例與較佳實施例外,本發明亦 可廣泛施行於其他不同的實施例中。 The present invention will be described in detail herein with regard to specific embodiments of the invention and their perspectives. Such descriptions are intended to explain the structure or flow of steps of the present invention, and are intended to be illustrative and not to limit the scope of patent application of the present invention. Therefore, in addition to the specific embodiments and preferred embodiments in the description, the present invention also It can be widely implemented in other different embodiments.
第一圖顯示根據本發明之一實施例之一檔案存取數量之管理、控管與限制之系統之一示意圖。本發明係揭露一種檔案使用、存取之管理系統,以管理使用者對檔案存取之數量。參照第一圖,於本發明之較佳實施例中,本發明之檔案存取數量之管理系統10包含至少一用戶端(使用者端裝置)200,例如個人電腦、筆記型電腦、個人數位助理(PDA)等,管理端(伺服器)100以及網路125。網路125包含但不限於有線網路,例如區域網路(Local Area Network;LAN)、網際網路(Internet)、虛擬私人網路(Virtual Private Network;VPN)等各類網路,或無線網路,例如無線區域網路(wireless local area network;WLAN)。上述有線網路輸入/輸出介面可為通用序列匯排流(universal serial bus,USB)或IEEE 1394。上述無線區域網路模組包含相容於藍芽規格之模組、相容於Wi-Fi規格之模組或相容於802.11x規格之模組,其中x可為a、b、g或n。在另一例子中,上述無線區域網路模組可與全球互通微波存取(Worldwide Interoperability for Microwave Access;WiMAX)之規格相容。 The first figure shows a schematic diagram of a system for managing, controlling, and restricting the number of file accesses according to an embodiment of the present invention. The invention discloses a management system for file use and access to manage the number of files accessed by users. Referring to the first figure, in a preferred embodiment of the present invention, the file access quantity management system 10 of the present invention includes at least one client (user-end device) 200, such as a personal computer, a notebook computer, and a personal digital assistant. (PDA), management terminal (server) 100, and network 125. The network 125 includes, but is not limited to, a wired network, such as various types of networks such as a local area network (LAN), the Internet, a virtual private network (VPN), or a wireless network. Such as a wireless local area network (WLAN). The above-mentioned wired network input / output interface may be a universal serial bus (USB) or IEEE 1394. The above wireless LAN modules include Bluetooth-compatible modules, Wi-Fi-compatible modules, or 802.11x-compatible modules, where x can be a, b, g, or n . In another example, the wireless LAN module may be compatible with the specifications of Worldwide Interoperability for Microwave Access (WiMAX).
於本發明之一實施例中,用戶端(使用者端裝置)200包含處理單元(處理器)210、儲存單元220、檔案處理單元(模組)230以及網路耦合介面240。儲存單元220、檔案處理單元230以及網路耦合介面240係各別耦合至處理單元210。用戶端200更包含網路瀏覽器250。儲存單元220係用以儲存複數個檔案222。在一實施例之中,儲存單元220可用以儲存複數個檔案識別碼(File ID)224。舉例而言,每一檔案222係伴隨一唯一之檔案識別碼224。儲存單元220可以包括記憶體,記憶體包含唯讀記憶體(Read-Only Memory:ROM)、隨機存取記憶體(Random Access Memory:RAM)及/或非揮發性快閃記憶體(nonvolatile FLASH memory)。檔案處理單元230係用以對每一檔案之處理。此處所述對檔案之處理包含但不限於讀取、寫入、複製、刪除或移動檔案..等。於本發明之一實施例中,檔案處理單元230可以軟體實施。網路耦合介面140可以耦合至網路125。網路耦合介面240也可以耦合至網路125。透過網路125,網路耦合介面240可以溝通網路耦合介面140。 In one embodiment of the present invention, the client (user-end device) 200 includes a processing unit (processor) 210, a storage unit 220, a file processing unit (module) 230, and a network coupling interface 240. The storage unit 220, the file processing unit 230, and the network coupling interface 240 are respectively coupled to the processing unit 210. The client 200 further includes a web browser 250. The storage unit 220 is configured to store a plurality of files 222. In one embodiment, the storage unit 220 may be used to store a plurality of File IDs 224. For example, each file 222 is accompanied by a unique file identification number 224. The storage unit 220 may include a memory. The memory includes a read-only memory (ROM), a random access memory (RAM), and / or a nonvolatile flash memory (nonvolatile FLASH memory). ). The file processing unit 230 is used for processing each file. The processing of files described here includes, but is not limited to, reading, writing, copying, deleting, or moving files .. etc. In one embodiment of the present invention, the file processing unit 230 may be implemented by software. The network coupling interface 140 may be coupled to the network 125. The network coupling interface 240 may also be coupled to the network 125. Through the network 125, the network coupling interface 240 can communicate with the network coupling interface 140.
網路耦合介面140包含有線網路耦合介面或無線網路耦合介面。網路耦合介面240亦包含有線網路耦合介面或無線網路耦合介面。本發明將可讓使用者選擇適當的無線模組,用以處理檔案,例如執行檔案存取。舉例 而言,使用者欲藉由WiFi或WiMax執行檔案存取,則方法包含耦合至網際網路或存取點(Access Point),接著啟動檔案處理單元230以進行檔案存取,期間亦包含利用網路瀏覽器250以瀏覽檔案。網路瀏覽器250例如為網路芳鄰。在用戶端200之中打開網路芳鄰250,可以在視窗裡看到區域網路上之其他用戶端200及/或伺服器100。區域網路上安裝了通用隨插即用(Universal Plug and Play;UPnP),其他用戶端200及/或伺服器100之中所有的檔案標示將會出現在網路芳鄰250之中。使用者於本用戶端200之網路芳鄰250之中,可以針對其他用戶端200及/或伺服器100之中顯示於網路芳鄰250中的該些檔案標示,利用檔案處理單元230來決定:存(擷)取檔案(access file)、複製檔案(copy file)、刪除檔案(delete file)、移動檔案(move file)、新增檔案(create file)或重新命名檔案名稱(rename file)、或對檔案進行設定。 The network coupling interface 140 includes a wired network coupling interface or a wireless network coupling interface. The network coupling interface 240 also includes a wired network coupling interface or a wireless network coupling interface. The present invention will allow users to select an appropriate wireless module for processing files, such as performing file access. For example For example, if a user wants to perform file access via WiFi or WiMax, the method includes coupling to the Internet or an access point, and then activating the file processing unit 230 for file access. Browser 250 to browse files. The web browser 250 is, for example, a network neighborhood. Open Network Neighborhood 250 in the client 200. You can see other clients 200 and / or servers 100 on the local network in the window. Universal Plug and Play (UPnP) is installed on the local area network. All file identifiers in other clients 200 and / or server 100 will appear in Network Neighborhood 250. In the network neighborhood 250 of the client 200, the user can use the file processing unit 230 to determine the file identifiers displayed in the network neighborhood 250 in other clients 200 and / or the server 100: Save (retrieve) an access file, copy a file, delete a file, move a file, create a file or rename a file, or Set the file.
於本發明之一實施例中,如第一圖所示,管理端(伺服器)100係包含處理單元(處理器)110、檔案控制單元(模組)120、資料庫130以及網路耦合介面140。檔案控制單元120、資料庫130以及網路耦合介面140係各別耦合至處理單元110。管理端(伺服器)100係透過網路耦合介面140耦合至網路125,以進一步透過網路耦合介面240耦合至用戶端200。資料庫130係用以儲存複數個使用者之帳號資料132、複數個相對應的檔案數量資料134以及複數個檔案識別碼136。資料庫130可以作為電子化的檔案櫃、儲存電子檔案之所在。使用者可以對該些電子檔案中的資料執行新增、擷取、複製、更新、刪除等操作。此外,資料庫130係指以一定方式儲存在一起、能為多個用戶端200共享、具有儘可能小的冗餘度、與應用程式彼此獨立之資料集合。 In an embodiment of the present invention, as shown in the first figure, the management terminal (server) 100 includes a processing unit (processor) 110, a file control unit (module) 120, a database 130, and a network coupling interface. 140. The file control unit 120, the database 130, and the network coupling interface 140 are respectively coupled to the processing unit 110. The management terminal (server) 100 is coupled to the network 125 through the network coupling interface 140 to further couple to the client 200 through the network coupling interface 240. The database 130 is used to store a plurality of user account data 132, a plurality of corresponding file number data 134, and a plurality of file identification codes 136. The database 130 can be used as an electronic filing cabinet to store electronic files. Users can perform operations such as adding, retrieving, copying, updating, and deleting the data in these electronic files. In addition, the database 130 refers to a data set that is stored together in a certain manner, can be shared by multiple clients 200, has the least redundancy, and is independent of the applications.
管理端(伺服器)100之檔案控制單元120係用以設定或編輯資料庫130中所儲存之帳號資料132、檔案數量資料134以及檔案識別碼136。舉例而言,檔案控制單元115可用以編輯(例如刪除、變更或新增)資料庫130中所儲存之帳號資料132、檔案數量資料134以及檔案識別碼資料136,或可用以設定編輯該些帳號資料132、檔案數量資料134以及檔案識別碼136之時間排程。其中檔案數量資料134例如為記錄或統計每一帳號資料132所存取檔案、複製檔案、刪除檔案或移動檔案之數量。網路耦合介面240係用以耦合至網路125。網路耦合介面240包含有線網路耦合介面或無線網路耦合介面。 The file control unit 120 of the management terminal (server) 100 is used to set or edit the account data 132, file quantity data 134, and file identification code 136 stored in the database 130. For example, the file control unit 115 can be used to edit (e.g., delete, change or add) the account data 132, file number data 134, and file identification data 136 stored in the database 130, or it can be used to set and edit those accounts Schedule of data 132, file quantity data 134, and file identification code 136. The file quantity data 134 is, for example, for recording or counting the number of files accessed, copied, deleted, or moved by each account data 132. The network coupling interface 240 is used for coupling to the network 125. The network coupling interface 240 includes a wired network coupling interface or a wireless network coupling interface.
如第二圖所示,在一實施例之中,利用檔案控制單元120可以修 改或編輯每一帳號資料132所存取檔案、複製檔案、刪除檔案或移動檔案之數量,例如以參數設定的方式來修改或編輯。另外,利用檔案控制單元120也可以限制每一帳號資料132所存取檔案、複製檔案、刪除檔案或移動檔案之最大的數量。舉一實施例而言,利用管理端(伺服器)100之檔案控制單元120來監控每一帳號之用戶端200的使用者日誌(log),以得到檔案複製、刪除或移動之數量。使用者日誌包含檔案數量資料134以及檔案識別碼136。 As shown in the second figure, in one embodiment, the file control unit 120 can be used to repair Modify or edit the number of files accessed, copied, deleted, or moved by each account data 132, for example, by modifying or editing parameters. In addition, the file control unit 120 can also limit the maximum number of files accessed, copied, deleted, or moved by each account data 132. For one embodiment, the file control unit 120 of the management terminal (server) 100 is used to monitor the user log of the user terminal 200 of each account to obtain the number of files copied, deleted or moved. The user log contains file number data 134 and a file identification code 136.
使用者日誌分析(log analysis)主要是針對電腦所產生的日誌檔(log files)進行歷程分析,以瞭解資訊系統的運作狀況。日誌檔一般都以特定格式記錄在電腦內部,因此又稱為電腦日誌(computer logs),其種類多樣、用途各異,例如包括:複製日誌檔(copy log files)、刪除日誌檔(delete log files)、移動日誌檔(move log files)、請求日誌檔(request log files)、管理日誌檔(manager log files)、存取日誌檔(access log files)、錯誤日誌檔(error log files)、參考日誌檔(referral log files)、代理日誌檔(agent log files)等。日誌分析係為系統人員監測資訊系統使用狀況之工具,而日誌檔能提供關於使用者之資訊,例如:使用時間、使用資料類型、瀏覽模式等。 The user log analysis mainly analyzes the log files generated by the computer to understand the operation status of the information system. Log files are usually recorded inside the computer in a specific format, so they are also called computer logs. They are of various types and different uses, such as: copy log files, delete log files ), Move log files, request log files, manager log files, access log files, error log files, reference logs Referral log files, agent log files, etc. Log analysis is a tool for system personnel to monitor the use of information systems, and log files can provide information about users, such as: time of use, type of data used, browsing mode, etc.
在另一實施例之中,直接從每一帳號之用戶端200之檔案處理單元230之中取得檔案複製、刪除或移動之數量。此處,檔案處理之數量係指單次執行動作之數量、或者是多次執行動作之總量。 In another embodiment, the number of files copied, deleted or moved is obtained directly from the file processing unit 230 of the client 200 of each account. Here, the number of file processing refers to the number of single executions of the action or the total number of multiple executions of the action.
在帳號資料132執行複製檔案的例子之中,第二圖之檔案1、檔案2、檔案3...檔案N、檔案M表示帳號1的用戶端200與帳號2的用戶端200所複製的檔案。於檔案總管或其他資料夾之中,帳號1的用戶端200複製了檔案1、檔案2、檔案3...檔案N,而儲存於儲存單元220之中(例如存入於磁碟路徑D:)。在此檔案複製數量的限制、防護機制之中,例如係透過第一圖之檔案控制單元120來加以限制與防護。舉例而言,當帳號1之用戶端200複製的檔案數量N達到了或超過了檔案控制單元120所設定的一預定值或門檻值(threshold value),則系統禁止帳號1之用戶端200的檔案複製動作,使其無法再複製檔案。在另一例子之中,當帳號1之用戶端200複製的檔案數量N達到檔案控制單元120所設定的一預定值,則系統先發出警告信號,以警告帳號1之用戶端200所複製的檔案數量已過多。而在另一例子之中,當帳號1之用戶端200複製的檔案數量N達到了檔案控制單元120所設定的一預定值,則系統先發出禁止或警 告信號,以告知帳號1之用戶端200無法再複製檔案;而經過帳號1之用戶端200向系統申請,則可以准許其再複製一定數量之檔案。帳號2的用戶端200複製了檔案1、檔案2、檔案3...檔案M,其複製檔案之機制與帳號1的用戶端200者相同,省略其詳細說明。 In the example of copying files in the account data 132, file 1, file 2, file 3 ... file N, file M in the second figure represent files copied by the client 200 of the account 1 and the client 200 of the account 2 . In the file manager or other folders, the client 200 of the account 1 copies file 1, file 2, file 3 ... file N, and stores it in the storage unit 220 (for example, in the disk path D: ). Among the limitation and protection mechanism of the number of file copies, for example, it is limited and protected by the file control unit 120 of the first figure. For example, when the number of files N copied by the client 200 of the account 1 reaches or exceeds a predetermined value or threshold value set by the file control unit 120, the system prohibits the files of the client 200 of the account 1 Copy action so that it can no longer copy files. In another example, when the number of files N copied by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a warning signal to warn the files copied by the client 200 of the account 1 There are too many. In another example, when the number of files N copied by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a prohibition or alarm. The notification signal informs the client 200 of the account 1 that the file cannot be copied again; and the client 200 of the account 1 applies to the system to allow it to copy a certain number of files. The client 200 of the account 2 has copied the file 1, the file 2, the file 3 ... the file M, and the mechanism for copying the files is the same as that of the client 200 of the account 1, and detailed descriptions thereof are omitted.
另外,在帳號資料132執行移動檔案的例子之中,第二圖之檔案1、檔案2、檔案3...檔案N、檔案M表示帳號1的用戶端200與帳號2的用戶端200所移動的檔案。於檔案總管或其他資料夾之中,帳號1的用戶端200移動了檔案1、檔案2、檔案3...檔案N,該些移動的檔案例如儲存於儲存單元220之中(例如存入於磁碟路徑D:)。在此檔案移動數量的限制、防護機制之中,例如係透過第一圖之檔案控制單元120來加以限制與防護。舉例而言,當帳號1之用戶端200移動的檔案數量N達到了或超過了檔案控制單元120所設定的一預定值或門檻值(threshold value),則系統禁止帳號1之用戶端200的檔案移動動作,使其無法再移動檔案。在另一例子之中,當帳號1之用戶端200移動的檔案數量N達到檔案控制單元120所設定的一預定值,則系統先發出警告信號,以警告帳號1之用戶端200移動的檔案數量已過多。而在另一例子之中,當帳號1之用戶端200移動的檔案數量N達到了檔案控制單元120所設定的一預定值,則系統先發出禁止或警告信號,以告知帳號1之用戶端200無法再移動檔案;而經過帳號1之用戶端200向系統申請,則可以准許其再移動一定數量之檔案。帳號2的用戶端200移動檔案1、檔案2、檔案3...檔案M,其移動檔案之機制與帳號1的用戶端200者相同,省略其詳細說明。 In addition, in the example in which the account data 132 executes the mobile file, the file 1, file 2, file 3 ... file N, file M in the second figure indicates that the client 200 of the account 1 and the client 200 of the account 2 are moved. File. In the file manager or other folders, the client 200 of the account 1 moves file 1, file 2, file 3 ... file N, and the moved files are stored in the storage unit 220 (for example, stored in Disk path D :). Among the limitation and protection mechanisms of the number of file movements, for example, the file control unit 120 in the first figure is used to limit and protect. For example, when the number of files N moved by the client 200 of the account 1 reaches or exceeds a predetermined value or threshold value set by the file control unit 120, the system prohibits the files of the client 200 of the account 1 Move action so that it can no longer move files. In another example, when the number of files N moved by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a warning signal to warn the number of files moved by the client 200 of account 1 Too much. In another example, when the number of files N moved by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a prohibition or warning signal to inform the client 200 of the account 1 It is no longer possible to move files; while the client 200 with account number 1 applies to the system, it may be allowed to move a certain number of files. The client 200 of the account 2 moves the file 1, the file 2, the file 3 ... the file M. The mechanism of moving the file is the same as that of the client 200 of the account 1, and detailed descriptions thereof are omitted.
再者,在帳號資料132執行刪除檔案的例子之中,第二圖之檔案1、檔案2、檔案3...檔案N、檔案M表示帳號1的用戶端200與帳號2的用戶端200所刪除的檔案。於檔案總管或其他資料夾之中,帳號1的用戶端200刪除了檔案1、檔案2、檔案3...檔案N。在此檔案刪除數量的限制、防護機制之中,例如係透過第一圖之檔案控制單元120來加以限制與防護。舉例而言,當帳號1之用戶端200刪除的檔案數量N達到了或超過了檔案控制單元120所設定的一預定值或門檻值(threshold value),則系統禁止帳號1之用戶端200的檔案刪除動作,使其無法再刪除檔案。在另一例子之中,當帳號1之用戶端200刪除的檔案數量N達到檔案控制單元120所設定的一預定值,則系統先發出警告信號,以警告帳號1之用戶端200刪除的檔案數量已過多。而在另一例子之中, 當帳號1之用戶端200刪除的檔案數量N達到了檔案控制單元120所設定的一預定值,則系統先發出禁止或警告信號,以告知帳號1之用戶端200無法再刪除檔案;而經過帳號1之用戶端200向系統申請,則可以准許其再刪除一定數量之檔案。帳號2的用戶端200刪除檔案1、檔案2、檔案3...檔案M,其刪除檔案之機制與帳號1的用戶端200者相同,省略其詳細說明。 Furthermore, in the example of deleting files in the account data 132, file 1, file 2, file 3 ... file N, file M in the second figure represent the client 200 of account 1 and the client 200 of account 2. Deleted files. In the file manager or other folders, the client 200 of the account 1 deletes file 1, file 2, file 3 ... file N. Among the limitation and protection mechanisms for the number of deleted files, for example, the file control unit 120 in the first figure is used to limit and protect. For example, when the number of files N deleted by the client 200 of the account 1 reaches or exceeds a predetermined value or threshold value set by the file control unit 120, the system prohibits the files of the client 200 of the account 1 Delete action so that it can no longer delete files. In another example, when the number of files N deleted by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a warning signal to warn the number of files deleted by the client 200 of account Too much. In another example, When the number of files N deleted by the client 200 of the account 1 reaches a predetermined value set by the file control unit 120, the system first issues a prohibition or warning signal to inform the client 200 of the account 1 that the files cannot be deleted again; The client 200 of 1 applies to the system, and then it can allow it to delete a certain number of files. The client 200 of the account 2 deletes the file 1, the file 2, the file 3 ... the file M, and the mechanism for deleting files is the same as that of the client 200 of the account 1, and detailed descriptions thereof are omitted.
因此,透過本案之檔案處理之防護流程及系統,使用者可以在特定主機上對於一檔案或電子文件之存取、複製、刪除或移動進行限制。此外,亦可強化檔案之控管機制,以增加檔案之防護以及檔案處理之彈性。 Therefore, through the protection process and system of file processing in this case, users can restrict access to a file or electronic file, copy, delete or move on a specific host. In addition, the control mechanism of files can be strengthened to increase the protection of files and the flexibility of file processing.
本發明之檔案存取數量之管理、控管與限制之系統及方法,其特定型態或其部份,可以以程式碼的型態包含於實體媒體,例如:軟碟、光碟片、硬碟、或是任何其他機器可讀取(例如電腦可讀取)儲存媒體;其中當程式碼被機器,例如電腦,載入且執行時,此機器變成用以實現本發明之裝置。本發明之方法與裝置也可以以程式碼型態透過一些傳送媒體,例如:電線或電纜、光纖、或是任何傳輸型態進行傳送,其中當程式碼被機器,例如電腦接收、載入且執行時,此機器變成用以實現本發明之裝置。當在一般用途處理器實作時,程式碼結合處理器提供一操作類似於應用特定邏輯電路之獨特裝置。 In the system and method for managing, controlling, and limiting the number of file accesses of the present invention, a specific type or part thereof can be included in the physical media as a code type, such as: a floppy disk, an optical disk, or a hard disk. Or any other machine-readable (eg, computer-readable) storage medium; wherein when the code is loaded and executed by a machine, such as a computer, this machine becomes a device for implementing the present invention. The method and device of the present invention can also be transmitted in code form through some transmission media, such as: wire or cable, optical fiber, or any transmission type, wherein when the code is received, loaded, and executed by a machine, such as a computer At this time, the machine becomes a device for implementing the present invention. When implemented on a general-purpose processor, the code in combination with the processor provides a unique device that operates similarly to application-specific logic circuits.
除描述於此之外,可藉由敘述於本發明中之實施例及實施方式所達成之不同改良方式,皆應涵蓋於本發明之範疇中。因此,上述敘述係為本發明之較佳實施例。此領域之技藝者應得以領會其係用以說明本發明而非用以限定本發明所主張之專利權利範圍。其專利保護範圍當視後附之申請專利範圍及其等同領域而定。凡熟悉此領域之技藝者,在不脫離本專利精神或範圍內,所作之更動或潤飾,均屬於本發明所揭示精神下所完成之等效改變或設計,且應包含在下述之申請專利範圍內。 In addition to the descriptions here, different improvements that can be achieved by the examples and implementations described in the present invention should be covered in the scope of the present invention. Therefore, the above description is a preferred embodiment of the present invention. Those skilled in the art should understand that it is used to explain the present invention and not to limit the scope of the patent rights claimed by the present invention. The scope of its patent protection shall depend on the scope of the attached patent application and its equivalent fields. Anyone skilled in this field can make changes or modifications without departing from the spirit or scope of this patent, which belong to the equivalent changes or designs made in the spirit disclosed by the present invention, and should be included in the scope of patent application described below. Inside.
Claims (10)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106112048A TWI637282B (en) | 2017-04-11 | 2017-04-11 | System and method of controlling and limiting number of files access |
| CN201710304264.XA CN108694334A (en) | 2017-04-11 | 2017-05-03 | System for limiting file processing quantity |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106112048A TWI637282B (en) | 2017-04-11 | 2017-04-11 | System and method of controlling and limiting number of files access |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI637282B true TWI637282B (en) | 2018-10-01 |
| TW201837753A TW201837753A (en) | 2018-10-16 |
Family
ID=63843863
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106112048A TWI637282B (en) | 2017-04-11 | 2017-04-11 | System and method of controlling and limiting number of files access |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108694334A (en) |
| TW (1) | TWI637282B (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030115147A1 (en) * | 2001-08-27 | 2003-06-19 | Feldman Timothy R. | Secure access method and system |
| US20080066178A1 (en) * | 2002-12-19 | 2008-03-13 | International Business Machines Corporation | System and Method to Proactively Detect Software Tampering |
| TWM380519U (en) * | 2009-11-02 | 2010-05-11 | Aptos Technology Inc | Security type storage device and data security system |
| TW201101093A (en) * | 2009-06-17 | 2011-01-01 | Fineart Technology Co Ltd | File usage permission management system |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101673229A (en) * | 2008-09-10 | 2010-03-17 | 创惟科技股份有限公司 | Storage system and method for automatically backing up storage data of flash memory |
| CN101957893B (en) * | 2009-07-15 | 2013-02-20 | 精品科技股份有限公司 | File usage rights management system |
| CN104680070A (en) * | 2014-12-27 | 2015-06-03 | 宁波江东恒冠信息技术有限公司 | Method, device and system for managing files used by user |
| CN105653974B (en) * | 2015-12-23 | 2019-07-23 | 北京奇虎科技有限公司 | A kind of document means of defence and device |
-
2017
- 2017-04-11 TW TW106112048A patent/TWI637282B/en active
- 2017-05-03 CN CN201710304264.XA patent/CN108694334A/en not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030115147A1 (en) * | 2001-08-27 | 2003-06-19 | Feldman Timothy R. | Secure access method and system |
| US20080066178A1 (en) * | 2002-12-19 | 2008-03-13 | International Business Machines Corporation | System and Method to Proactively Detect Software Tampering |
| TW201101093A (en) * | 2009-06-17 | 2011-01-01 | Fineart Technology Co Ltd | File usage permission management system |
| TWM380519U (en) * | 2009-11-02 | 2010-05-11 | Aptos Technology Inc | Security type storage device and data security system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108694334A (en) | 2018-10-23 |
| TW201837753A (en) | 2018-10-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11372994B2 (en) | Security application for data security formatting, tagging and control | |
| EP3210175B1 (en) | Access blocking for data loss prevention in collaborative environments | |
| US10079835B1 (en) | Systems and methods for data loss prevention of unidentifiable and unsupported object types | |
| CN102959558B (en) | The system and method implemented for document policies | |
| US20140019498A1 (en) | System, method and computer readable medium for file management | |
| US20140019497A1 (en) | Modification of files within a cloud computing environment | |
| US20160140207A1 (en) | Systems and methods for aggregating information-asset classifications | |
| CN102609667A (en) | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program | |
| US11336628B2 (en) | Methods and systems for securing organizational assets in a shared computing environment | |
| CN105205403A (en) | Method and system for managing and controlling file data of local area network based on file filtering | |
| US9734195B1 (en) | Automated data flow tracking | |
| KR20130079004A (en) | Mobile data loss prevention system and method for providing virtual security environment using file system virtualization on smart phone | |
| US20090012972A1 (en) | System for Processing Unstructured Data | |
| US20080077423A1 (en) | Systems, methods, and media for providing rights protected electronic records | |
| TWI637282B (en) | System and method of controlling and limiting number of files access | |
| CN101957893A (en) | File usage rights management system | |
| KR102338774B1 (en) | Data protection method to prevent data leakage and corruption by preventing file contents from being read and written at the kernel level of the storage operating system | |
| JP6690453B2 (en) | Information processing device and program | |
| CN113254997A (en) | Method and device for defending database against dragging, electronic equipment and computer medium | |
| US11625365B2 (en) | Method for managing virtual file, apparatus for the same, computer program for the same, and recording medium storing computer program thereof | |
| CN115917542A (en) | data protection system | |
| KR102750148B1 (en) | Method for maintaining meta information of secure document, apparatus for the same, computer program for the same, and recording medium storing computer program thereof | |
| TW201525758A (en) | Data security access method and the system thereof | |
| Escobar | Understanding the complexities of operational technology security | |
| US11748306B1 (en) | Distributed data classification |