Data file security management system and method based on information separation

A data file and security management technology, applied in the direction of digital data protection, etc., can solve the problems of illegal theft of information and data, difficulty in obtaining encryption algorithms, and difficulty in achieving low-cost and high-intensity security management for core data, so as to prevent illegal theft Or crack, prevent the effect of random spread

Inactive Publication Date: 2013-12-18
ZHENJIANG NEWFORD SOFTWARE SYST
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, the network and computer system have improved the sharing of data and equipment, but it has brought information and data to be illegally stolen, copied, used, etc., which has greatly affected the security management of sensitive data within the enterprise. At present, files are mainly managed through encryption algorithms and authentication and authorization methods. However, for encryption, high-strength encryption algorithms are difficult to obtain, and the cost of effective key management is huge. With the continuous improvement of decryption technology and computing speed, It also constantly threatens the security of the ciphertext
For authentication and authorization, a complete authentication and authorization mechanism is difficult to implement in small-scale systems
Therefore, according to existing technical means, it is difficult to achieve low-cost and high-intensity security management for core data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data file security management system and method based on information separation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Attached below figure 1 The data file security management system based on information separation of the present invention is further described:

[0017] The nouns appearing in this article are explained as follows:

[0018] Featureless data file: A linear transformation algorithm is used to crush the format information of the target file, so that the information content of the document is evenly distributed,

[0019] SK file: The extracted data and location information form an SK file, which is stored in a dedicated SK disk as the key file used to open the corresponding document, and can only be saved in a dedicated SK disk. The SK file cannot be viewed or opened by ordinary methods ;

[0020] Security master file: the subject of the file after random extraction of the featureless data file, it needs to cooperate with the SK file to restore the original file;

[0021] Confidential file: security master file and Sk file from the same file;

[0022] SK disk: U disk de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data file security management system and method based on information separation, and belongs to the field of security management of data files. The system comprises an office interface module, a document transformation module and a security main file and SK file generating module, wherein the office application interface module is used for acquiring file reading-writing operations of an office system and calling the document transformation module, the security main file and SK file generating module, the document transformation module is used for generating a characterless data file and inversely transforming the characterless data file, the security main file and SK file generating module is used for extracting information of the characterless data file formed in the document transformation module according to random seeds to generate a security main file and an SK file. Random diffusion of protected data files can be prevented by the system and the method, and contents of the protected data files are prevented from being illegally stolen or cracked.

Description

technical field [0001] The invention relates to the field of safety management of data files, in particular to a data file safety management system and method based on information separation. Background technique [0002] With the development of information technology, the network and computer system have improved the sharing of data and equipment, but it has brought information and data to be illegally stolen, copied, used, etc., which has greatly affected the security management of sensitive data within the enterprise. At present, files are mainly managed through encryption algorithms and authentication and authorization methods, but for encryption, high-strength encryption algorithms are difficult to obtain, effective management of keys is costly, and decryption technology and computing speed are constantly improving. It also constantly threatens the security of the ciphertext. For authentication and authorization, a complete authentication and authorization mechanism is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 谢少平
Owner ZHENJIANG NEWFORD SOFTWARE SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products