Current location - Education and Training Encyclopedia - Education and training - F-Lock paper CAD outward encryption software, what is the effect?
F-Lock paper CAD outward encryption software, what is the effect?
F-LOCK drawing CAD outward encryption software, the function is simpler; It is recommended that Heli Tianxia document delivery control system is powerful and suitable for all kinds of design companies.

Heli tianxia document outgoing control system (HL-Datacreator) V2020

In today's information society, sending electronic documents has become an indispensable way in our daily work and life, but on many occasions,

We often encounter such problems:

How to prevent documents sent abroad from being tampered with and copied?

How to prevent outgoing files from spreading to the objects we don't want to give?

Can you control the outgoing file from being printed?

Can you control the number of times the outgoing document is allowed to open or the time limit?

In view of the above difficulties in document delivery, our company launched a document delivery control system in 2008: HL-dataASCreator.

Application characteristics of Helitianxia document delivery control system;

1、? After the file is issued, it can get complete content protection, password verification, time control and authority control, and can control the use authority and automatic destruction time of the outgoing file. For example, read-only, non-editing, non-saving, non-forwarding, non-cutting/copying, non-screen recording, non-screen capturing, non-printing, and non-protection of company copyright watermark documents; At the same time, you can bind the USB flash drive, bind the computer, limit it to the computer that is opened for the first time, set the opening times, set the opening password and other operations.

2、? The installation, operation and use are extremely simple, and the receiver can read the file only by double clicking with the mouse; No need to install third-party plug-ins or client software.

3、? All outgoing documents are sent in ciphertext, not plain text, and the documents will be automatically destroyed when they expire; In case of illegal copying and dissemination, the file will be automatically destroyed.

4、? Helitianxia document delivery control system supports: office documents, PDF, various pictures, drawings, videos and other document formats.

5, the operation is simple, the generated outgoing file is not an EXE program, and can be generated by a single machine; You can also generate outgoing documents after the administrator reviews them through the outgoing application process. .

6. The generated outgoing document can be edited by the recipient and sent back again, which is convenient for employees to communicate with customers or partners within the scope of authority control.

Proprietary technical advantages of Heli Tianxia document delivery control system;

1, Helitianxia file transfer control system is ciphertext+authority control, not a common plaintext+authority control file transfer tool, that is to say, the TEMP file generated by the operating system cache when opening the outgoing file is also encrypted ciphertext. Other manufacturers' document delivery tools only do permission control such as prohibiting printing and screen capture, but the TEMP cache file is plaintext, and changing the suffix of the TEMP file is plaintext, without any restrictions, which loses the role of document protection.

2. The automatic destruction time of outgoing files can realize both the traditional online time verification mode and the offline time verification mode; Moreover, there is no need to configure a hardware time lock, and the automatic destruction time of outgoing documents is based on the date of the computer that made the outgoing documents, so it is invalid for readers to adjust the computer time to open the documents privately.

3. The file transfer control system of Helitianxia can be deployed in stand-alone, LAN C/S architecture or Internet B/S architecture.

4. Heli Tianxia file transfer control system can be seamlessly integrated with the company's existing ERP, OA, CRM or other business systems, and authorized employees can access and make outgoing files through browsers through computers, mobile phones or other network terminals.

5. It can be used in combination with the examination and approval function module to conduct online examination and approval for the distribution outside the document.

Common application scope of HL-dataASCreator:

Send or distribute all kinds of official documents, statistical data, confidential documents, meeting minutes and military intelligence documents;

Issue or distribute research reports, investigation reports, design plans, consulting plans, lecturers' speeches, accounting reports, audit reports and other documents;

Issue or distribute resolutions, notices, contracts, bidding documents, customer information, price lists, technical white papers and other documents of the board of directors;

Education and training courseware, various drawings, decoration design, PPT, PDF, OFFICE, pictures and other documents are protected;

Provide content protection and use time control of various downloaded materials distributed on the online server after downloading.

Successful case of Helitianxia file transfer control system in enterprise's actual business application

Application case 1: Protecting the drawing safety of design companies in OEM mode.

Predicament and demand:

A world-famous sports brand company is responsible for the design and marketing of new products and outsourcing its production to manufacturing enterprises all over the world. Their data security status and requirements at that time were:

A, our company has relatively perfect safety measures, but due to production needs, we need to send design drawings and other documents to the production enterprises;

B, worried that the production enterprise can't keep the design data well, which will lead to leaks;

C, worried that the production enterprise will change the design on this basis after obtaining the information and infringe its own intellectual property rights;

Industries with similar needs

Similar to this enterprise, in the fields of heavy industry, automobile manufacturing, electronic component design, TV refrigerator and other household appliances design, lamps and bathroom and other industries involving industrial design, advertising design, water conservancy design institute, electric power design institute, telecom design institute and other units, due to the need of division of labor and cooperation between enterprises, they will disclose their product drawings, processing technology and other information documents to their partners. How can we prevent the other party from illegally using, modifying and disseminating these documents?

Solution of Heli Tianxia Document Outgoing Control System

1) Change the file transfer mode in which drawings and documents are directly distributed to production enterprises in the past, and use file transfer management tools instead to make the files to be transferred into encrypted packages; And specify when packaging:

? A. The production enterprise has the right to browse the outgoing documents (read-only, no screen capture, no printing, no saving, and automatic destruction upon expiration).

? B. service life of outgoing packaging.

2) Send the outgoing encrypted file package to the production enterprise.

3) The production enterprise browses the documents in the outsourcing contract.

In addition, outgoing encrypted packages can do the following:

A. outgoing documents and data packets are highly encrypted.

B. Only outgoing documents can be browsed; Users can't get the file content by printing, copying the content, saving the file as, taking screen shots, recording the screen, and can't change the file content.

C. you can control the service life of the outgoing file. For example, if the contract period of the production enterprise is 3 months, the service life of the outgoing documents is set to 3 months. After expiration, these documents can no longer be browsed and used.

Application effect:

?

In the past, users could only distribute and control important drawings by attaching confidentiality clauses to contracts. The effect of confidentiality is unknown, because it is difficult to obtain evidence for leaks, and even most leaks will not be exposed. After adopting the solution of Helitianxia Document Outgoing Control System, the spread of outgoing documents is technically prevented, the security loopholes of enterprises are blocked, and the intellectual property rights of users are protected.

?

Application Case 2: Intellectual Property Protection in Consulting Industry

Trouble: The main products of companies specializing in investigation and consultation are reports summarized after interviews, investigations and statistics. Obviously, the company doesn't want to sell each report to only one customer. But the problem they face is that after a report is sold to several customers, they will be embarrassed to find that the report can already be seen in the hands of "prospective customers" or even online.

Solution: Only customers can read the report set for each customer by Heli Tianxia file transfer control system. Even if they send the documents to the third party, the third party can't open the report, which can effectively prevent the loss of the investigation report and play a good technical guarantee role in expanding the sales of consulting products.

?

Application case 3: Manufacturing enterprises issue drawings to outsourcing units.

Trouble: As a product designer, you want to send the drawings to an outsourcing enterprise for manufacturing, but you are worried that the drawings will be tampered with, lost, or even changed slightly to become someone else's design. Sign a confidentiality agreement with the other party? Because of the difficulty of discovery and proof, how binding is it? ?

Solution: Helitianxia document delivery control system can control the contents of drawings sent to outsourcing enterprises from being copied and tampered by the other party, and control the time when drawings can be used. The other party can't spread the drawings to the third party intentionally or unintentionally (because the drawings are encrypted, authorized users can be appointed, even if unauthorized people get the documents, they can't open them), which effectively protects the drawing safety and intellectual property rights of manufacturing enterprises.

?

Application Case 4: Participate in bidding and send a tender to Party A?

Trouble: participate in the bidding, which contains the design scheme and even contains a lot of technical content to show our advantages. But I'm worried that Party A will take your bid to find another company to cooperate with. ?

Solution: Helitianxia document delivery control system can control the technical data in the tender not to be copied and tampered with by Party A (for example, the other party can't take your design data to someone else), and control how long Party A can only read it (for example, 1 day, read only, no screen capture, no printing, no saving, automatic destruction upon expiration, and the tender can't be opened at the end). After you win the bid, give him the design information. Even if you don't win the bid, you don't have to worry that the bidding will affect your competitors.

?

Application Case 5: Advertising companies and decoration design companies distribute design schemes and renderings to intended customers.

Trouble: advertising, decoration design, consulting company, etc. Distribute design schemes and renderings to target customers. At this time, the customer is still in the stage of consultation and selection, and has not signed a contract. You are worried that customers will take your information to seek cooperation with other companies. ?

Solution: Heli Tianxia Document Delivery Control System can control that these technical materials can only be browsed by intended customers in a limited way, for example, they can't be used by third parties, and they can only be browsed for how long (for example, 1 day, read-only, no screen capture, no printing, no saving and automatic destruction after expiration). After signing the contract, you can give him the design materials, which can effectively protect the creativity and intellectual property security of the enterprise.