CONTROL METHOD OF RECOVERABLE FILE PROTECTION DEVICE AND PROTECTION METHOD OF RECOVERABLE FILE
    1.
    发明申请
    CONTROL METHOD OF RECOVERABLE FILE PROTECTION DEVICE AND PROTECTION METHOD OF RECOVERABLE FILE 审中-公开
    可恢复文件保护装置的控制方法和可恢复文件的保护方法

    公开(公告)号:US20170024401A1

    公开(公告)日:2017-01-26

    申请号:US15213640

    申请日:2016-07-19

    Abstract: A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content in an unprotected data, a secured content protection mode is selected. In accordance with the secured protection mode, the recoverable file protection device can move the secured content and the marked content can replace the secured content. An authentication key is inputted to encrypt the secured content. If a user would like to open the file, the user is requested to verify an identification data. If the identification data complies with the authentication key, the recoverable file protection device moves the secured content to recover the original content. If the identification data doesn't comply with the authentication key, the file content without the secured content is opened. Therefore, a security of an e-file can be achieved.

    Abstract translation: 提供了可恢复文件保护装置的控制方法和可恢复文件的保护方法。 文件所有者在未受保护的数据中设置受保护的内容后,选择安全的内容保护模式。 根据安全保护模式,可恢复文件保护装置可移动安全内容,标记内容可以替代安全内容。 输入认证密钥来加密安全内容。 如果用户想要打开文件,则请求用户验证标识数据。 如果识别数据符合认证密钥,则可恢复文件保护装置移动安全内容以恢复原始内容。 如果识别数据不符合认证密钥,则没有安全内​​容的文件内容被打开。 因此,可以实现电子文件的安全性。

    Control method of recoverable file protection device and protection method of recoverable file

    公开(公告)号:US10216745B2

    公开(公告)日:2019-02-26

    申请号:US15213640

    申请日:2016-07-19

    Abstract: A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content in an unprotected data, a secured content protection mode is selected. In accordance with the secured protection mode, the recoverable file protection device can move the secured content and the marked content can replace the secured content. An authentication key is inputted to encrypt the secured content. If a user would like to open the file, the user is requested to verify an identification data. If the identification data complies with the authentication key, the recoverable file protection device moves the secured content to recover the original content. If the identification data doesn't comply with the authentication key, the file content without the secured content is opened. Therefore, a security of an e-file can be achieved.

Patent Agency Ranking