Enterprise and public institution information leakage preventing method based on cloud architecture

An enterprise and cloud architecture technology, applied in the field of computer security, can solve problems such as inability to encrypt files, inability to guarantee file ciphertext, and inability to set permissions for different files to different enterprises and institutions, so as to facilitate mutual communication and communication. Effect

Inactive Publication Date: 2012-07-25
WUXI CINSEC INFORMATION TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the characteristics of easy change and transmission of electronic documents have seriously affected the security of electronic document storage and communication. The risk of document circulation on the network in the form of plain text has become a severe challenge for enterprises and institutions to transmit plain text documents on the network
[0003] At present, some existing simple encryption software has problems of regionality and limitations, and cannot enable various enterprises and institutions to use file encryption seamlessly with each other, nor can it guarantee the process of file exchange between enterprises and institutions It has always existed in the form of ciphertext, and it is not possible to set detailed permissions for different enterprises and institutions for different files, so as to ensure that the files are formed from the beginning, to operation, to circulation, and to the final recipient of the file. exists in encrypted form

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise and public institution information leakage preventing method based on cloud architecture
  • Enterprise and public institution information leakage preventing method based on cloud architecture
  • Enterprise and public institution information leakage preventing method based on cloud architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.

[0023] A method for preventing information leakage of enterprises and institutions based on cloud architecture provided by the present invention, wherein the steps are as follows:

[0024] (1) Establish a large-scale IDC (Internet Data Center) hosting computer room that provides encryption services on the Internet, that is, an encryption service center. All enterprises and institutions apply to the encryption service center for encryption services using different algorithms and the number of user groups that need services and the number of users,

[0025] (2) The encryption service center uniformly distributes different encryption a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise and public institution information leakage preventing method based on cloud architecture. The method is characterized by comprising the following steps: firstly, a large IDC (Internet data center) trust machine room providing an encryption service is established on the Internet, namely an encryption service center; the encryption service center distributes different encryption algorithm services and settable user group number and user number in a unified manner, and can post the matched electronic key to the administrator authority performing two-factor authentication of the applicant; and each enterprise and public institution logs in the encryption service center through the applied administrator account and password and the electronic key to add the user group and user and set the policies of different user groups or independently set the policy of a user. Based on 'cloud security', more detailed and deeper improvement is performed in the invention, so that mutual exchange and communication are facilitated among the enterprise and public institutions. On the premise of ensuring the confidential state of a file, the mutual cooperation among the enterprise and public institutions is not influenced, or the setting of different authorities is performed mutually.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a method for preventing information leakage of enterprises and institutions based on cloud architecture. Background technique [0002] In response to the popularization of computer applications and the development of the Internet and mobile storage devices, the previous paper documents have been gradually transformed into electronic documents. Electronic documents have many advantages such as small size and convenient viewing, which is also the reason for the rapid development of electronic documents. At the same time, the easy-to-change and easy-to-spread characteristics of electronic documents have seriously affected the security of electronic document storage and communication. How to effectively protect important documents within various enterprises and institutions and avoid mutual circulation between enterprises and institutions The risk of document ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 耿振民杨磊
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products