Cloud security management system of security electronic documents and method

An electronic document and security management technology, applied in the field of information security, can solve the problems of time cost and uncontrollability, and achieve the effect of high cost performance and wide application range

Active Publication Date: 2012-10-03
DALIAN JIAMU INFORMATION SAFETY SOFTWARE TECH
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] For life cycle management, a data leakage prevention management system that is closely related to the working environment is also adopted. This method has the limitation that legitimate users must be in a specific environment to use it, and life cycle parameters accompany electronic files in encrypted form. For those who deliberately Organizations that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security management system of security electronic documents and method
  • Cloud security management system of security electronic documents and method
  • Cloud security management system of security electronic documents and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] In this implementation case scenario, all design electronic files inside unit A are ciphertext electronic files, and no encryption operation is required.

[0080] If it is sent directly, even if the receiving end has installed the receiving environment, it cannot be opened.

[0081] The processing flow of the receiving end is as attached Figure 5 shown.

[0082] In this implementation case scenario, only designated terminals are allowed to browse and distribute electronic files. For the first time to distribute electronic documents, the terminal "Zhang San" device needs to be installed with a receiving environment.

[0083] There are two receiving environment installation strategies. One is to install by password. This installation mode has a higher security level, and an authorization password must be entered during installation. After successful installation, you can browse the corresponding distribution electronic files. The other is to install according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud security management system and a method applying the system. The system is based on a PKI (Public Key Infrastructure) encryption system and is provided with a transmitting end, a receiving end and a could security service end, wherein the transmitting end is used for helping a sender to send security documents, the receiving end helps a user to receive, read and operate the security documents, and the cloud security service end is used for controlling and managing all documents in the system. According to the system and the method, the whole life cycles of the sent electronic documents are subjected to dynamic management, and various safety strategies are provided as follows: dynamic limits of authority control, operation statistics, out-of-limit recovery, moving track support, a cloud security-based work environment for sending the electronic documents containing sensitive information is constructed, and the applicable range is wide. According to the method, the operation habit of the user cannot be changed, and the cost performance is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a cloud security management method for confidential electronic files. Background technique [0002] Today, with increasingly detailed social division of labor, increasingly close economic exchanges, rapid changes in information technology, and rapid development and integration of various networks, information and data are showing an explosive growth trend. How to effectively protect your intellectual property rights and reduce data leakage? The resulting risk is a severe test that every user has to face. In order to solve the security problem of sensitive information, an effective method is to directly control the carrier and source of information, that is, access control and encryption of terminal data. [0003] Since confidential electronic documents are easy to copy and transmit, sovereignty control has always been a difficult problem to solve. Once the above-me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 张建军高建福姜真喜姚立锋
Owner DALIAN JIAMU INFORMATION SAFETY SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products