Access quarantine method of public file in data divulgence protection system
A technology for public files and protection systems, applied in the field of information security, can solve problems such as affecting user use, increasing the difficulty and cost of system management and maintenance, and data asynchrony, avoiding data asynchrony, reliable and efficient data isolation, and solving application programs. Effects of public documents
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example one
[0031] In this embodiment, the data leakage protection system divides the application process into two levels: a security level and a normal level. The purpose of protection is that sensitive data can only be accessed by processes of the security level and cannot be accessed by processes of the common level. The following uses the Microsoft Office Word (hereinafter referred to as word) application as an example to illustrate how to isolate Word's access to the Normal.dotm file under different security levels.
[0032] In the Word application, Normal.dotm is a Word template file, which can be read and written when using Word to edit doc type files. This file is usually located in the program data directory of the currently logged in user, for example:
[0033] C:\Users\UserName\AppData\Roaming\Microsoft\Templates\Normal.dotm
[0034] In this embodiment, the description is given in an environment where the Word process P1 in the security level L1 accesses the publi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap