Document monitor and management system based on comprehensive safety audit

A technology of monitoring management and security management, applied in transmission systems, computer security devices, computing, etc., can solve problems such as single inspection means, reduced user experience, and no monitoring

Inactive Publication Date: 2010-11-24
国都兴业信息审计系统技术(北京)有限公司
View PDF3 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, with the widespread application of information technology, it is easy to copy information stored in electronic documents, and with the popularization of network technology, it takes less than a second for a document to become unique and have tens of thousands of copies, and for security information to be disclosed, tampered and destroyed.
[0011] First, use access control technology to deny unauthorized users access to confidential files, but cannot prevent legal users with authorization from deliberate or misoperation that destroys organizational information security
[0012] Second, document access must be performed in a specific environment provided by the manufacturer, the scope of security protection is limited, access restrictions are increased, and user experience is reduced
[0013] Third, the use of sensing technology and even hardware devices to provide security protection increases the input cost of the solution, and it is impossible to track the behavior of leaking confidential information in non-electronic forms (such as printed documents)
However, the inspection method is single, and there is no monitoring for other network transmission methods
Due to the many ways of network file transmission, if the enumeration method is used to identify the existing file network transmission methods and provide monitoring separately, the requirements for the investment cost of the solution are very high; use auditing technology to record access activities, but only as a basis for post-event analysis , does not have the real-time nature of threat prevention; the protection granularity is too coarse, based on the overall protection of documents, it cannot effectively identify key confidential information, and while increasing security protection, it will greatly affect normal business operations
In addition, because the definition of protection objects is not clear enough, a large number of security threat identification errors or omissions are caused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document monitor and management system based on comprehensive safety audit
  • Document monitor and management system based on comprehensive safety audit
  • Document monitor and management system based on comprehensive safety audit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] Referring to FIG. 1 , FIG. 1 is a schematic diagram of the network structure of an embodiment of the comprehensive security audit-based document monitoring and management system of the present invention.

[0048] Figure 1A Figure 1B Among them, the document monitoring and management system based on comprehensive security audit adopts the B / S (browser / server) structure implementation scheme, which mainly includes a core module, two key modules, and other auxiliary function modules, and comprehensively utilizes identity authentication and access control , data encryption and security audit related technologies, identify and analyze behaviors that endanger the organization's information security, and provide document securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a document monitor and management system based on comprehensive safety audit, comprising a document safety management center module, a network probe auditing module, a terminal accessing and auditing module and a linkage module. In the system, a core switch is connected with a plurality of secondary switches; each secondary switch is connected with a plurality of user terminals; and the terminal accessing and auditing module is provided in each user terminal. Based on the invention, the defect of the prior art is overcome and the safety of the document is ensured effectively.

Description

technical field [0001] The invention relates to the technical field of document monitoring, in particular to a document monitoring and management system based on comprehensive security auditing. Background technique [0002] With the rapid development of information technology, more and more organizations choose to use electronic documents to replace the original paper records. However, while information technology brings convenient and efficient office experience to organizations, it also brings many security risks. [0003] Because paper documents are time-consuming to write and have a single version, it is easy to find behaviors that destroy information integrity such as loss or tampering. In addition, since paper documents are stored in special cabinets, measures such as locking are usually used to provide access control, so it violates regulations. Behaviors that undermine data security, such as peeking at documents, can be identified and tracked by means of access con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/00G06F21/62
Inventor 陈浙一徐亚非董文英常乐
Owner 国都兴业信息审计系统技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products