Method and device for achieving data security of operation system

A data security and operating system technology, applied in the field of IT data security, can solve problems such as inapplicability, achieve the effect of improving login security, preventing tampering, and reducing the risk of employee number and password leakage

Inactive Publication Date: 2014-01-01
北京思特奇信息技术股份有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This method is to modify the existing system, and has a certain dependence on the CSS style of the system; th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for achieving data security of operation system
  • Method and device for achieving data security of operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] A method for realizing operating system data security, comprising the following steps:

[0042] Step 1: Compare the input verification data with the preset password data, if they are the same, go to step 2, otherwise, prompt to re-enter, and re-execute step 1;

[0043] Step 2: Divide system sensitive data and data data in the operating system;

[0044] Step 3: When it is detected that the sensitive data of the system is copied, go to step 4. When a transmission request for sensitive data of the system is received, go to step 5. When a download request for downloading data is received, go to step 5. 6;

[0045] Step 4: Prohibit the shortcut key or the copy function of the right mouse button operation, end;

[0046] Step 5: Generate a digital watermark based on system sensitive data encryption, store the digital watermark in the database, transmit the digital watermark to the sender of the transmission request, and end; use the java class to generate a digital watermark...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for achieving data security of an operation system. The method includes the following steps: comparing inputted verification data with preset password data; dividing systematic sensitive data and material data in the operation system; when monitoring that the systematic sensitive data are copied, shifting into a step 4, when receiving a transmission request for transmitting the systematic sensitive data, shifting into a step 5, and when receiving a download request for downloading the material data, shifting into a step 6; prohibiting a copy function of operation of a shortcut key or right mouse button, and finishing; generating digital watermarks by encryption according to the systematic sensitive data, storing the digital watermarks in a database, transmitting the digital watermarks to a sender sending the transmission request, and finishing; judging download permission of a requester sending the download request, transmitting the material data when the requester has the download permission, and finishing. By the method and the device, risk of job number and password disclosure can be reduced, and system login safety is improved.

Description

technical field [0001] The invention relates to the field of IT data security, in particular to a method and device for realizing data security of an operating system. Background technique [0002] With the development of mobile Internet, enterprises and institutions have more and more demands for using mobile Internet resources for office work. At the same time, there are many problems. Firstly, the system only uses the keyboard to input the password and there is a danger of password leakage. In addition, some key sensitive data of enterprises and institutions are not allowed to be leaked. For data leaked through special means, it is necessary to provide tracking of the data leak method. In response to these problems, the system should strengthen the security protection of user passwords to prevent users from obtaining data through copying and other methods. After the system generates sensitive data, a person with the authority to maintain the data table will modify the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/60
CPCG06F21/60
Inventor 昶向威
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products