Computer information privacy detection method based on network

A detection method and information confidentiality technology, which is applied in the field of information security, can solve the problems of large influence of inspectors on inspection results, lack of sensitive information supervision, unified inspection, and difficulty in covering information security, and achieve the effect of improving awareness of confidentiality and prevention

Active Publication Date: 2013-03-20
CHINA ELECTRIC POWER RES INST +1
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption, dumping, and elimination mechanisms of important information need to be implemented actively by users or administrators, and it is difficult to cover every corner of information security
As far as the information security inspection method is concerned, the current on-site inspection m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information privacy detection method based on network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0026] like figure 1 A network-based computer information security detection method is provided, the method comprising the following steps:

[0027] Step 1: The network server is associated with the computer client;

[0028] Step 2: Set the network server-side detection strategy;

[0029] Step 3: Determine the computer client detection strategy;

[0030] Step 4: File dynamic real-time monitoring and alarming.

[0031] In the step 1, a network server is set up, and the computer client is registered, so that the communication connection between the computer client and the network server is normal.

[0032] In said step 2, set a unified detection strategy on the network server side, perform background detection on the computer client according to the setting of the detection strategy, and satisfy different confidentiality levels through targeted formulation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer information privacy detection method based on a network. The computer information privacy detection method based on the network comprises the following steps. A network server terminal is linked with a computer client terminal. A network server terminal detection strategy is set up. A computer client detection strategy is confirmed. Dynamics of papers are monitored in real time with alarm. Modes of positive detection and passive detection are combined, all detection results are uniformly collected and analyzed and the computer client terminal is prompted to deal correspondingly. A white list which contains sensitive word information set by the computer client terminal is utilized to improve accuracy and search efficiency of privacy detection. Through unified setting and issuing of a privacy detection strategy of the network server terminal, real time monitoring and alarming of dynamics of the papers of the computer client terminal, automatic checking and an early warning mechanism are achieved. The working staff are more aware of secrecy and prevention by a technical method and leakage risks of an enterprise are avoided.

Description

[0001] technical field [0002] The invention belongs to the technical field of information security, and in particular relates to a network-based computer information security detection method. Background technique [0003] Through administrative notices, users are required to consciously implement the management requirements of "going online without involving secrets, and not surfing the Internet if involving secrets". The encryption, dumping, and elimination mechanisms for important information need to be implemented actively by users or administrators, and it is difficult to cover every corner of information security. As far as the information security inspection method is concerned, the current method of on-site inspection of desktop computers not only consumes a lot of manpower and time, but also the inspection effect is greatly affected by the subjective factors of the inspectors; in terms of inspection technical means, there is a lack of Technical means for the super...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 李凌高昆仑郑晓崑王涛赵保华魏桂臣
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products