Method for retrieving confidential information of file and judging and marking security classification based on content correlation

A technology of relevance and content, which is applied in the fields of file confidential content retrieval, classification judgment and labeling based on content correlation, can solve the problems of no way to involve confidential content, low accuracy, and hidden dangers of confidential work, so as to prevent The effect of random setting of secrets, reducing workload and improving efficiency

Inactive Publication Date: 2012-12-12
徐亮 +1
View PDF1 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The accuracy is not high
Some keywords and feature points are confidential only in a specific context, and simple matching of keywords and feature points can only find out whether the word and feature point are contained in the file, and cannot effectively judge the location. The context of the text, therefore, many times the "classified content" found out is not actually classified
[0004] 2. Integrity is not strong
There are many ways to express the content of the document, including text, pictures, video, audio, etc. In terms of text alone, there are thousands of different ways to express a thing, which makes it impossible to use some fixed keywords or feature points to cover all related issues. Confidential information, keywords and feature points can only serve as an outline, and the method based on sim

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for retrieving confidential information of file and judging and marking security classification based on content correlation
  • Method for retrieving confidential information of file and judging and marking security classification based on content correlation
  • Method for retrieving confidential information of file and judging and marking security classification based on content correlation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] refer to figure 1 , the specific steps of the process of retrieval, classification determination and labeling of classified content of documents based on content correlation are described as follows:

[0039] A. Loading steps: The user fills in relevant information, such as department name, confidentiality person, item name, etc., and submits the document. Among them, the confidentiality person is a required item, and other items can be automatically generated by the system, according to the department filled by the user The information loads the classified keywords and matching rule base, ontology base and confidentiality rule base within the scope. If the user does not fill in the department information, the default secret-related keywords and matching rule base, ontology base and confidentiality rule base will be loaded.

[0040] B. Parsing step: Segment the submitted document, and parse out the hidden information in the pictures, videos, and audio contained in the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for retrieving confidential information of a file and judging and marking the security classification based on content correlation is mainly characterized by comprising the following steps of: selecting corresponding confidential keywords and a matched rule base according to the range to which a document belongs; accurately and comprehensively searching confidential information in the document by carrying out word segmenting operation on the document contents and constructing a semantic correlation network; carrying out security classification judgment and encryption processing on each confidential information point according to a secret-level setting rule in a secret-level setting rule base; then giving out corresponding security classifications by integrating the security classifications of various confidential information points; and finally, marking related confidential information in the documents. According to the method, the confidential information in the document can be efficiently searched and the security classification of the document is accurately judged, so that the workload of manual secret-level setting is reduced, the efficiencies of secret-level setting work and the security classification appraisal work are increased, the random secret-level setting phenomenon in the secret-level setting process is effectively prevented and new confidential keywords and matching rules can be automatically learned, and further the precision of retrieval and security classification judgment is continuously improved.

Description

technical field [0001] The invention relates to a method for retrieving, judging and labeling secret-related content of documents based on content correlation for specific content in electronic documents. Background technique [0002] In the current secrecy work, the management and use of confidential documents is a very important link, and the determination of the confidentiality level of documents is a very important task. The current classification of confidentiality all depends on manual implementation, which makes the period of determination work too long and the accuracy is not high, and the determination of the classification of confidentiality involves the entire document, which brings some problems to the reference of some non-classified content in confidential documents. Great inconvenience. For this reason, it is particularly important to be able to rely on a computer to automatically and effectively judge whether the content of a file is classified, which specif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F17/27
Inventor 徐亮谭煌
Owner 徐亮
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products