System for monitoring and auditing compact disc burning
An optical disc and the technology of this system are applied in the directions of optical recording/reproduction/erasing methods, calculations, computer security devices, etc., and can solve secret information leaks, which are not conducive to secret information tracking, and conscious or unconscious disc information leaks and other issues to achieve the effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] as attached figure 1 As shown, the optical disc recording monitoring and auditing system of the present invention includes a management platform and a client, the management platform realizes system management, system version control and upgrade, and alarms, and the client realizes CD / DVD device management and the use of trusted recording tools , Burning control and trusted CD / DVD program loading, the system runs in the background of the computer, customers must use the system's own trusted burning tool for safe data burning and ordinary data burning, burning logs are actively stored by the system and can be called at any time Check it out.
[0069] The management platform adopts the principle of separation of security management, authorization and auditing, and the three complement each other to realize the security management of the system; the system can send the recording operation of illegal users and the detected illegal recording results to the alarm terminal fo...
Embodiment 2
[0072] attached Figure 5 It is the recording flow chart of the system, and the specific steps are as follows:
[0073] Step 101: When the recording operation is detected by the system, first determine whether a trusted recording tool has been installed in the system, if the trusted recording tool has been installed, then proceed to the next step 102 to determine whether the user has the authority to use the trusted recording tool, otherwise Returns the system initialization state.
[0074] Step 102: After the recording tool is installed in the system, the system judges the authority of the system user. If the user is an authorized user, proceed to the next step 103 to prepare for recording, otherwise return to the system initialization state.
[0075] Step 103: When the system judges that the authorized user has installed the trusted recording tool, the user needs to judge whether to record, and if he chooses to record, then enter the next step 104 to determine the recording...
Embodiment 3
[0081]In order to improve the security of the system, this solution consists of a computer's trusted CD-ROM drive, a USB lock and the user's fingerprint. The function of the USB lock in the CD burning monitoring and auditing system has the following two aspects:
[0082] First: The USB lock has a fingerprint recognition function. Only when the user's fingerprint matches the fingerprint information inside the USB lock, the system is allowed to access the program in the lock.
[0083] Second: Some programs of the trusted recording system are configured in the USB lock. Only after the user inserts the USB lock for the system, the trusted recording system accesses the program in the USB lock to make the system program complete, and then related recording or reading can be performed. Security disc.
[0084] The structure of the USB lock used is shown in the attached Figure 6 Among them, the side of the USB lock has a special area for receiving the user's fingerprint information....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 