Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host file security monitoring method

A security monitoring and file technology, applied in the field of information security, can solve the problems of increasing the internal control security of terminal files, single monitoring function, lack of monitoring strategies, etc., and achieve the effect of simple structure and fast running speed.

Inactive Publication Date: 2013-07-24
WUHAN YOUNG TECH CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) Lack of internal control technology for file information storage security: most of the current strategies and technologies for file information storage security are aimed at external threats, and rarely involve internal monitoring, lack of perfect internal control security measures, and 70% of leaking crimes It comes from the inside, so increasing the internal control security of terminal files is an urgently needed technology in the field of secure storage of file information
[0008] (3) Some file internal control security products on the market have the following defects: lack of a complete monitoring strategy, single monitoring function, and existence of one or another loophole
[0009] In addition, as a requirement for ease of use, the introduction of a secure system should not force users to change the operation and disposal habits of using files when no monitoring software is installed, and the introduction of monitoring protection should not greatly reduce the operating performance of the host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host file security monitoring method
  • Host file security monitoring method
  • Host file security monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0035] This embodiment provides a host file security monitoring protection method, such as Figure 1~Figure 4 As shown, the following steps are included.

[0036] Step 1, when the user creates a new file or reads an existing file on the hard disk, determine whether the current process is authorized, if the current process is an authorized process, and the file type belongs to the file type that needs to be protected, then determine whether the file contains Encryption flag, if it contains, encrypt the file on the hard disk, and put this piece of data in the protected memory area; if it does not contain encryption flag, add encryption flag to the file header.

[0037] Step 2, monitor and protect the file types, and the user is not allowed to change the protected file types.

[0038] Step 3: For the file to which the encryption mark has been added, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a host file security monitoring and protecting method. The method is a file transparent encryption method based on a driver layer and is completely transparent to users; the users cannot sense file encryption and decryption in a use process; an application layer encryption method with higher security and quicker speed is used for assisting; and a file transparent encryption scheme based on a conventional file screening method is provided for more complicated software systems. According to the method, the process and files of a local computer are identified, and security files are automatically encrypted and decrypted, so that problems of memory mapping, file buffering and the like are solved, and the safety is increased.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a host file security monitoring and protection method. Background technique [0002] Digital content itself is easy to copy, and the development of network technology has led to the proliferation of illegal transmission. Inside the company, especially in some units where the information is confidential, employees are not allowed to take away the files and materials in the computer without permission. However, it is obviously not enough to rely on the self-consciousness of employees alone, especially some people want to steal company secrets with subjective malice, and the leakage of company confidential information directly leads to huge losses of economic benefits. With the increasing use of computers to create and process information electronically, protecting corporate information, data and documents has become a daunting and long-term task in corporate business ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/77
Inventor 王玉林陈亦欣时先科
Owner WUHAN YOUNG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products