Computer document operational safety audit system

A technology of operation security and computer, which is applied in the field of computer document operation security audit system, can solve problems such as the decline of competitiveness, failure of enterprise investment, and weak security management of terminal equipment, so as to improve effectiveness, ensure safety and integrity, and facilitate Effect of Intranet Security Analysis

Active Publication Date: 2013-11-27
深圳市利谱信息技术有限公司
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with general embezzlement cases, computer leaks have more hidden methods and greater harm. Malicious leaks of secrets often cause incalculable consequences. Irreparable loss of national interests and people's property. If a leak occurs in an enterprise, such as confidential technical information, customer information and other documents, it may lead to serious consequences such as failure of enterprise investment, decline in competitiveness, and loss of customers.
[0003] Traditional security solutions focus on the border, often ignoring internal network security, especially in government agencies, security departments, scientific research institutions, banks and securities, enterprises and institutions. The security management of terminal equipment in the dense network is very weak, and there are great security risks
Existing security measures have not played their due role, and network managers cannot understand the security status of each network endpoint, and cannot solve various terminal security and management problems even if they are exhausted
Although some units formulate strict security management systems, due to the lack of effective technical means, security strategies cannot be effectively implemented, resulting in frequent security incidents such as leakage of confidential information, hacker attacks, and worm virus transmission, posing new challenges to LAN security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer document operational safety audit system
  • Computer document operational safety audit system
  • Computer document operational safety audit system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

[0027] Such as figure 1 , figure 2 As shown, it includes a monitoring machine and client software, the monitoring machine includes a network communication module for network communication between the monitoring machine and the client; a database operation module is used for real-time recording of document operations sent by the client software Logs, documents suspected of violating regulations, and software and hardware asset information; key management and data encryption modules, which are used to encrypt confidential files and log information transmitted with special protocols, and manage passwords; monitoring machine server configuration management modules are used to define The control strategy for the client includes the control strategy of disabling the U disk, disabling the wireless network, and locking the IP, and sending it to all target clients; the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer document operational safety audit system which is characterized by comprising a monitor and client side software. According to the computer document operational safety audit system, editing work of a monitored terminal document is monitored, according to a predefined strategy, the secret related performance of the document is automatically analyzed, a title of the edited document is recorded to be a log to be sent to a secrecy competent department, the network function of a computer is immediately shielded when the condition that the edited document is possibly related to secrets is discovered, secret divulging behaviors are prevented, meanwhile, an alarm is given to the secrecy competent department and related leaders for check in the future, besides the monitoring on the document edited by users, secret related performance analysis will be automatically carried out on the document when operations such as copying, shearing and printing are carried out on the document, once the secret related function is discovered, the alarm is given to an alarm server, and the copy of the document is saved on the alarm server for check in the future.

Description

technical field [0001] The invention relates to a computer file operation safety audit system. Background technique [0002] With the increasing informatization of production and management in various industries, the occurrence of computer leaks has been on the rise. Compared with general embezzlement cases, computer leaks have more hidden methods and greater harm. Malicious leaks of secrets often cause incalculable consequences. Irreparable loss of national interests and people's property, if the company leaks secrets, such as confidential technical information, customer information and other documents, it may lead to serious consequences such as failure of corporate investment, decline in competitiveness, and loss of customers. [0003] Traditional security solutions focus on the border, often ignoring internal network security, especially in government agencies, security departments, scientific research institutions, banks and securities, enterprises and institutions. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
Inventor 陈宇轩倪昊黄晓刚
Owner 深圳市利谱信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products