OA (office automation) data protection method and system based on OA flow

A data protection and data technology, applied in the field of OA data protection methods and systems, can solve problems such as inability to prevent intentional or unintentional offline expansion, inability to prevent printing, screenshots, network transmission, and inability to prevent screenshots, copy and paste, etc. , to achieve the effect of flexible means and time, protection and safety, and short cycle

Inactive Publication Date: 2014-03-12
北京明朝万达科技股份有限公司
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) Unable to prevent intentional or unintentional offline expansion by users who have permission to download attachments
[0010] (2) It is impossible to prevent users who have permission to download attachments from printing, taking screenshots, and sending them over the network
[0011] (3) It is impossible to prevent users from taking screenshots, copying and ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OA (office automation) data protection method and system based on OA flow
  • OA (office automation) data protection method and system based on OA flow
  • OA (office automation) data protection method and system based on OA flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Embodiment 1 provides an overall architecture diagram for protecting OA data. attached figure 2 The system architecture of the present invention includes an OA server that manages OA data and OA processes, user terminals used by common users, and the APS (Application Protection System) proposed by the present invention.

[0069] APS implements the protection of information and data on terminal computers according to policies. This feature of the APS determines the deployment location of the APS. The figure below shows the protection scope and deployment position of APS in the entire information and data leakage prevention protection system, and is also a structural diagram of the entire APS system.

[0070] From this figure, it can be seen that the APS system can not only protect the network communication between the server and the terminal computer, but also protect the local data of the terminal.

[0071] First of all, APS needs to encrypt and store the sensitive ...

Embodiment 2

[0093] Embodiment 2 provides a flowchart of a data protection method.

[0094] Figure 4 It is a typical flow chart of OA attachment download, in which "encrypted attachment file process" is the module for APS to perform anti-disclosure processing. This flowchart describes how the data transferred from the server is protected.

[0095] 1) The user requests to download OA data;

[0096] 2) Determine whether the user has the download permission to download OA data;

[0097] 3) If the user has the download permission to download OA data, the user downloads OA data and jumps to step 5);

[0098] 4) If the user does not have the download permission to download OA data, return to step 1);

[0099] 5) Encrypt the downloaded OA attachment file;

[0100] 6) Download the encrypted OA attachment file to the user terminal;

[0101] 7) When the user opens and views the downloaded OA attachment file, the following functions are activated: prevent screenshots, prevent copying, prevent ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an OA (office automation) data protection method and an OA data protection system based on OA flow. The system comprises an OA server, a user terminal and an APS (application protection system), wherein a user applies for OA data from the OA server; before the OA data are downloaded to the user terminal, the APS encrypts the OA data; when the user checks or edits the OA data, copy, paste and screen capture functions of the user terminal are forbidden, and a watermark is added on a terminal screen for enabling the user to check the OA data, so that the user can be prevented from photographing the OA data; when the user prints the OA data, a watermark is added on a printed document, and relevant information of the printed document is recorded. According to the method and the system, the divulging of the OA data of an enterprise can be prevented, and the safety of the data of the enterprise can be protected.

Description

technical field [0001] The invention relates to the field of data security, in particular to an OA data protection method and system. Background technique [0002] Explanation of technical terms: [0003] OA: Office Automation, office automation, is a new type of office that combines modern office and computer network functions. There is no uniform definition of office automation. Anyone who uses various new technologies, new machines, and new equipment in traditional offices to engage in office business belongs to the field of office automation. In administrative agencies, most office automation is called e-government, and most enterprises and institutions are called OA, that is, office automation. Through the realization of office automation, or digital office, the existing management organization structure can be optimized, the management system can be adjusted, on the basis of improving efficiency, the ability of collaborative office can be increased, the consistency o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/16
CPCG06F21/604G06F21/16G06F21/6218G06Q10/10
Inventor 何晋昊王志海喻波王志华
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products