Protection method for confidential files

A technology for secret files and files, applied in the field of software implementation, can solve problems such as file damage development of complex and transparent encryption software, achieve the effect of strong versatility, reduce the workload of integrated development and testing, and improve reliability

Inactive Publication Date: 2012-10-03
南京赛孚科技有限公司
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Purpose of the invention: In order to solve the defects of the current file management software in terms of terminal data security, and to overcome the file damage r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for confidential files
  • Protection method for confidential files
  • Protection method for confidential files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026]1, the system environment of the present embodiment is the Windows2000 of Microsoft and above version operating system; The function that realizes is to be integrated with the file management software of the third party, allows the user to safely operate (as: open, browse, edit) on the client computer ) The secret-related files downloaded from the server, that is, to control the user from taking the files out of the client computer by copying, saving them, etc. during the process of using the downloaded files, so as to ensure the security of the secret-related files.

[0027] 2. The file security soft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection method for confidential files and uses the sandbox principle for reference. When downloading files through a client program of a file management software, a user redirects the downloaded files into a virtual disk of a client computer and conducts all operations of scanning and editing files in the virtual disk; the modified and newly-created files during the file operation process are controlled to be redirected into the virtual disk and the courses not performed the redirected control are forbidden to access to the virtual disk; and finally, the edited files are uploaded to a server from the virtual disk to complete a process of file modification. The user can normally use the files in the virtual disk, but cannot copy or dump the files out, and the virtual disk is like a sandbox only importing but not exporting. The security software developed by using the method can be integrated with the file management software of a third party, so as to realize secure use and anti-disclosure of the confidential files on the client computer and improve the level of data security management of the user.

Description

technical field [0001] The invention relates to a method for protecting secret-related files, specifically a software implementation method for integrating with a third-party file management software to realize safe use and anti-disclosure functions of secret-related files on a client computer. Background technique [0002] There are a large number of secret-related electronic files in enterprise computers, including a large amount of technology and business information and data. Enterprises urgently need to strengthen the management of these secret-related files and ensure file security. At present, various file management software have been developed in the industry, and their working modes are very similar: they all centrally manage files and control file permissions on a computer as a file server, and users use a networked client computer to Access and manipulate server files. Although the existing file management software satisfies the data management needs of users, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F3/06G06F21/53G06F21/60
Inventor 陆芳廖健廖声亮
Owner 南京赛孚科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products