Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for identifying security classification of electronic file

An electronic file, classified technology, applied in electrical components, digital data protection, transmission systems, etc., can solve the problem that electronic files are easily tampered with illegally, the management of classified files cannot be guaranteed, the content of classified files and the integrity of classified parts cannot be guaranteed, etc. question

Active Publication Date: 2014-06-04
CHINA NAT SOFTWARE & SERVICE
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the easy-to-change and dissemination characteristics of electronic documents, how to ensure the security of electronic documents after setting and calibrating the confidentiality level, to ensure that no information leakage occurs in confidential electronic documents, and to ensure that the main body of the document and the identification of the confidentiality level are not separated or tampered with, How to manage and control encrypted electronic files is an important task and a severe challenge at present
[0003] At present, most of the secret file management methods have the following problems. The integrity of the secret file content and the marked part cannot be guaranteed, and the electronic files marked with the secret mark are easy to be illegally tampered with.
The management of the use, circulation, scope, security, etc. of classified documents cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying security classification of electronic file
  • Method for identifying security classification of electronic file
  • Method for identifying security classification of electronic file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Hereinafter, the present invention will be described in detail through a specific embodiment in conjunction with the accompanying drawings.

[0027] In this embodiment, the present invention is described in detail by taking the electronic document management system based on the confidentiality identification method of the present invention used by a certain unit as an example. Such as image 3 As shown, the system includes a server (the server is equipped with a secret level management center (software) and a database), and multiple clients for users to use.

[0028] Each part of the above-mentioned system is described below.

[0029] A server

[0030] The server is used to store the corresponding terminal user information of the client, the unique identifier of the classified file, the management and control information of the classified file, and the hash value of the classified file. The server includes a database module, a registration module and an approval mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying the security classification of an electronic file, which belongs to the technical field of information security and computer software technology. The method of the invention comprises the following steps that: a) a user makes a security identification application of the electronic file to a server at a client, wherein the application comprises the security classification of the electronic file and the management control information of the electronic file; b) a manager verifies the application on the server; c) after the verification passes, security classification information and the management control information are added into the electronic file and a unique identifier and a hash value of the electronic file are stored in the electronic file, the server and a universal serial bus (USB) key respectively; and d) when the electronic file is opened, the hash value of the electronic file is calculated, the sameness between the hash value and the hash value stored in the electronic file, the server and the USB key is verified and the determination which indicates that the electronic file is not tampered is made if the hash value is the same as the hash value stored in the electronic file, the server and the USB key. The method can be applied to security management of the electronic file.

Description

technical field [0001] The invention relates to the security technology of electronic files, in particular to a secret-level identification distribution of electronic files, and belongs to the technical fields of information security and computer software. Background technique [0002] At present, there are many kinds of confidentiality identification management and issuance of electronic documents, and the information generated, stored, processed, transmitted, archived and output in the confidential information system needs to be classified. However, due to the easy-to-change and dissemination characteristics of electronic documents, how to ensure the security of electronic documents after setting and calibrating the confidentiality level, to ensure that no information leakage occurs in confidential electronic documents, and to ensure that the main body of the document and the identification of the confidentiality level are not separated or tampered with, How to manage and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62G06F21/60
Inventor 陈尚义周显敬孟令强刘胜平
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products