Information leakage prevention system

An anti-leakage, operating system technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of insecurity, information leakage, theft, etc., and achieve the effect of high security and reliability

Inactive Publication Date: 2009-06-10
北京鼎信高科信息技术有限公司
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) Only specified file formats can be processed, such as PDF, Office, TXT, CAD, etc., and some even require special readers
[0004] 2) There is no protection against the first author, the first author can arbitrarily make a copy of the important information document written by him, so it is easy to leak information through the copy of the document
[0005] 3) After the file encryption is delayed, the current information protection products can only encrypt the entire file, but before that, the file edited/modified by the author is stored in plain text o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage prevention system
  • Information leakage prevention system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] figure 1 It is a structural schematic diagram of the client side of the information leakage prevention system of the present invention. The information leakage prevention system of the present invention includes a server and a client, and the client includes a physical layer, an application layer, and a kernel layer. Audit module. The intelligent monitoring module includes a text / binary area sub-module, a local file I / O monitoring sub-module, a network I / O monitoring sub-module, a clipboard monitoring sub-module, a dragging monitoring sub-module and a printing monitoring sub-module. The dynamic encryption and decryption module and the intelligent monitoring module jointly establish a local security environment for the user. All file I / O and network I / O of the user in the transparent local security environment will be automati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and reliable information anti-leakage system capable of enciphering in real time, which comprises a server and a client, wherein an operating system kernel of the client comprises an intelligent monitoring module, a dynamic enciphering and deciphering module and a log auditing module; the client enters a local safety environment after verified by the server; and the intelligent monitoring module comprises a text/binary discrimination submodule, a local file I/O monitoring submodule, a network I/O monitoring submodule, a clipboard monitoring submodule, a drag monitoring submodule and a printing monitoring submodule. The information anti-leakage system constructs a transparent use environment for users, wherein all file I/O and the all network I/O of the users in the transparent environment are automatically monitored, and all local text file I/O in the environment is automatically enciphered and deciphered. The information anti-leakage system monitors various applications and possible risks at the kernel level of the system, and has higher safety and reliability.

Description

technical field [0001] The invention belongs to the technical field of computers, in particular to an information leakage prevention system. Background technique [0002] The ultimate goal of information security is to ensure the security of information during storage and transmission. Vulnerabilities in information security can exist in wired or wireless, fixed or mobile networks, and can also be formed through direct physical contact through USB and other device interfaces. ) technology and solutions have certain application value in the field of computer security technology. At present, some manufacturers at home and abroad have successively launched different information protection products. These products are all set for document permissions, such as read-only within a certain period of time, limit the number of prints, limit the number of read-only, etc., and there are the following security loopholes and limitations sex: [0003] 1) Only specified file formats can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/18
Inventor (请求不公开姓名)
Owner 北京鼎信高科信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products