Audit protection system for data leakage

A protection system and data leakage technology, applied in digital data protection, electronic digital data processing, computing, etc., can solve the problems that it is impossible to recover or delete all leaked files, the degree of harm is immeasurable, and management work is troublesome. The effect of leakage is obvious, the effect of cultivating the habit of preventing leakage and improving safety awareness

Inactive Publication Date: 2012-07-25
BEIJING UVIC SOFTWARE TECH
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the needs of work, it is not realistic to completely ban the use of such applications, which brings great trouble to the management work
Once important documents are leaked illegally, they will spread very quickly through the Internet. Even if the leaker is caught and investigated, it is almost impossible to recover or delete all the leaked documents.
As a result, the aftermath of the illegal leak of documents will last for quite a long time, and the influence of the leaked documents will continue to ferment and expand, and the degree of harm is immeasurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Take the user terminal to change the name of the file 'abc.txt' to 'efg.txt' as an example.

[0048] Log in to the management system, and search for the file name 'abc.txt' in the operation history database through query, and get one or more usage records. Among them, the record with the target file name is what we are looking for. The target file The name 'efg.txt' is the name of the file after renaming. Then record the situation through the target path, you can find the storage location of the renamed file, and finally find the file you want to find. If the file has been deleted, you can also restore the file through the backup file to avoid loss caused by file loss. During the query process, you can also search for the record with the original file name 'abc.txt' in the screenshot history database. After obtaining one or more usage records, the record containing the target file name 'efg.txt' is what we are looking for Record, according to the screenshot informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an audit protection system for data leakage, wherein a client system and a management end system are arranged on a user terminal and a server in an internal network manner; a client system is used to monitor the using situation of programs and files of the user terminal at any time to generate operation record and screenshot record of the target file or the program, and the operation record and screenshot record of the target file or the program are collected in operation historical record database and screenshot historical record data base of the server so as to form text and video track record during the target operation in the management end system, therefore, all process of data leakage are flexibly reproduced, so that the file leakage and responsibility track can be well documented, the anti-leaking effect is obvious, the protection process is safe and reliable, and the audit protection system is particularly suitable for being installed in units such as enterprises, institutions, offices and so on.

Description

technical field [0001] The invention relates to a data security protection system based on an internal network, in particular to a data leakage audit protection system with data tracking protection and computer screen capture as the main means, and belongs to the field of network security control. Background technique [0002] With the popularization of the network, network security has become the focus of attention of enterprises, institutions and institutions. In recent years, there have also been frequent occurrences of file information containing confidentiality requirements being leaked to the outside world by malicious internal personnel, such as: credit card company employees leaking customer information; corporate core technologies are copied or leaked; advertising agencies leak artist privacy ; Bank staff leaked customer account information, etc. Data leaks happen to each of us at any time, and directly or indirectly affect our lives, and even bring serious harm to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F11/30G06F21/60
Inventor 林艳
Owner BEIJING UVIC SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products