Unlock instant, AI-driven research and patent intelligence for your innovation.

Data collecting method, information security management method and information security management host

A data collection and information security technology, applied in the field of information security, can solve problems such as high labor costs and inconvenient use, and achieve the effects of saving storage space, saving manpower, and facilitating search operations

Inactive Publication Date: 2013-07-17
FINEART TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing information security management methods require a large number of pictures displayed on the user's computer to be collected, and the contents on the pictures cannot be quickly compared to whether the captured pictures are related to confidential data by means of keyword search. It needs to arrange a lot of manpower to compare whether the large number of images collected involve confidential data
Therefore, the existing information security management methods are extremely inconvenient to use and require a lot of labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data collecting method, information security management method and information security management host
  • Data collecting method, information security management method and information security management host
  • Data collecting method, information security management method and information security management host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to further explain the technical means and effects adopted by the present invention to achieve the intended purpose of the invention, the data collection method, information security management method and information security management host proposed according to the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments. Embodiments, methods, steps, structures, features and effects are described in detail below.

[0028] figure 1 It is a schematic diagram of an information security management host disclosed by an embodiment of the present invention. Such as figure 1 As shown, the information security management host 110 in this embodiment is suitable for managing one or more user hosts 120, wherein the user hosts 120 can be computer devices commonly used in the industry, such as notebook computers, desktop computers, and tablet computers. In this embodiment, the user host 120 may include a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data collecting method, which is suitable for collecting data of a user host. The user host is installed with an operation system, and the interior of the operation system comprises at least one input method software and at least one application program. The data collecting method comprises the following steps of according to triggering conditions, capturing a picture displayed on the user host to generate corresponding picture capturing data; detecting whether the input method software on the user host generates character data to the operation system or not; when the input method software generates the character data to the operation system, capturing the character data to generate the corresponding input character capturing data; and recording the picture capturing data and the input character capturing data. The invention also relates to an information security management method and an information security management host. The data collecting method, the information security management method and the information security management host have the advantages that convenience in use is realized, and labor is greatly saved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an easy-to-use and manpower-saving data collection method, an information security management method and an information security management device. Background technique [0002] With the development of science and technology, computers and other electronic devices with computing power have become important tools in people's daily life and work. Therefore, with the increasing popularity of computers, information security has become an increasingly important subject. The existing information security management method regularly intercepts the screen displayed on the user's computer, so as to detect whether the user steals confidential data. However, the existing information security management methods require a large number of pictures displayed on the user's computer to be collected, and the contents on the pictures cannot be quickly compared to whether the captured pictures a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
Inventor 蔡宜霖
Owner FINEART TECH CO LTD