Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access quarantine method of public file in data divulgence protection system

A technology for public files and protection systems, applied in the field of information security, can solve problems such as affecting user use, increasing the difficulty and cost of system management and maintenance, and data asynchrony, avoiding data asynchrony, reliable and efficient data isolation, and solving application programs. Effects of public documents

Inactive Publication Date: 2011-05-04
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, most of the copy files do not contain sensitive information during normal use. Using a simple copy technology will cause a large number of copy files in the system, reduce system performance, and may cause the same application running in different security levels. The data is not synchronized, which affects the use of users and increases the difficulty and cost of system management and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access quarantine method of public file in data divulgence protection system
  • Access quarantine method of public file in data divulgence protection system
  • Access quarantine method of public file in data divulgence protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] In this embodiment, the data leakage protection system divides the application process into two levels: security level and common level. The purpose of protection is that sensitive data can only be accessed by security level processes, but not by normal level processes. The following uses the Microsoft Office Word (hereinafter referred to as word) application program as an example to illustrate how to isolate Word's access to the Normal.dotm file under different security levels.

[0032] In the Word application, Normal.dotm is a Word template file, which is read and written when Word is used to edit a doc type file. This file is usually located in the program data directory of the currently logged in user, for example:

[0033] C:\Users\UserName\AppData\Roaming\Microsoft\Templates\Normal.dotm

[0034] In this embodiment, the Word process P1 in the security level L1 accesses the public file F, and the Word process P2 in the normal level L2 accesses the public file F. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access quarantine method of a public file in a data divulgence protection system. The method comprises the following steps: application process is divided into different security levels; a public file is marked; and when the application process accesses the public file, the strategy of copy-on-write is implemented. In the access quarantine method in the data divulgence protection system, a first copy file is set in the first security level; when the application process accesses the public file, the access to the public file is redirected to the first copy file; and the copy file redirecting technology is utilized to perform safe quarantine on the public file, thus the access quarantine of the public file can be realized and the problem of the application program public file in the data divulgence protection system can be solved.

Description

technical field [0001] The invention belongs to the field of information security, and specifically relates to an access isolation method for public files in a data leakage protection system for data security protection in a computer. Background technique [0002] Sensitive data such as internal strategic planning, technical secrets, and commercial secrets widely exist in government agencies, enterprises and institutions. These sensitive data are usually required to be strictly limited to a certain range of use. If leaked outside the organization, it will harm the interests of the organization. Cause serious damage, even devastating blows. According to the survey, most of the leaks within the organization are caused by internal staff. [0003] In order to prevent the occurrence of leaks, many organizations have strict management systems. For example, the R&D department of a high-tech enterprise usually uses a physically isolated internal network, and R&D personnel are proh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/60
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products