Access quarantine method of public file in data divulgence protection system

A technology for public files and protection systems, applied in the field of information security, can solve problems such as affecting user use, increasing the difficulty and cost of system management and maintenance, and data asynchrony, avoiding data asynchrony, reliable and efficient data isolation, and solving application programs. Effects of public documents

Inactive Publication Date: 2011-05-04
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, most of the copy files do not contain sensitive information during normal use. Using a simple copy technology will cause a large number of copy files in the system, reduce system performance, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access quarantine method of public file in data divulgence protection system
  • Access quarantine method of public file in data divulgence protection system
  • Access quarantine method of public file in data divulgence protection system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] Example one

[0031] In this embodiment, the data leakage protection system divides the application process into two levels: a security level and a normal level. The purpose of protection is that sensitive data can only be accessed by processes of the security level and cannot be accessed by processes of the common level. The following uses the Microsoft Office Word (hereinafter referred to as word) application as an example to illustrate how to isolate Word's access to the Normal.dotm file under different security levels.

[0032] In the Word application, Normal.dotm is a Word template file, which can be read and written when using Word to edit doc type files. This file is usually located in the program data directory of the currently logged in user, for example:

[0033] C:\Users\UserName\AppData\Roaming\Microsoft\Templates\Normal.dotm

[0034] In this embodiment, the description is given in an environment where the Word process P1 in the security level L1 accesses the publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access quarantine method of a public file in a data divulgence protection system. The method comprises the following steps: application process is divided into different security levels; a public file is marked; and when the application process accesses the public file, the strategy of copy-on-write is implemented. In the access quarantine method in the data divulgence protection system, a first copy file is set in the first security level; when the application process accesses the public file, the access to the public file is redirected to the first copy file; and the copy file redirecting technology is utilized to perform safe quarantine on the public file, thus the access quarantine of the public file can be realized and the problem of the application program public file in the data divulgence protection system can be solved.

Description

technical field [0001] The invention belongs to the field of information security, and specifically relates to an access isolation method for public files in a data leakage protection system for data security protection in a computer. Background technique [0002] Sensitive data such as internal strategic planning, technical secrets, and commercial secrets widely exist in government agencies, enterprises and institutions. These sensitive data are usually required to be strictly limited to a certain range of use. If leaked outside the organization, it will harm the interests of the organization. Cause serious damage, even devastating blows. According to the survey, most of the leaks within the organization are caused by internal staff. [0003] In order to prevent the occurrence of leaks, many organizations have strict management systems. For example, the R&D department of a high-tech enterprise usually uses a physically isolated internal network, and R&D personnel are proh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/60
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products