Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method and control system for accessing to computer file contents

A technology of file control and control method, applied in computer security devices, computing, special data processing applications, etc., can solve problems such as information protection defects, file security management system without network communication analysis and monitoring functions, and incomplete information protection, etc., to achieve Significant practical significance, advanced technology, and the effect of solving information security problems

Active Publication Date: 2014-04-23
CHONGQING XIUER INFORMATION TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The firewall product is actually just an isolation technology, which protects the communication between different networks through the analysis of network communication, so as to prevent illegal personnel from invading and accessing the network, but it lacks access to information sources and computer file content on the terminal Therefore, from the perspective of the components of information protection, its information protection is incomplete
[0004] Also, from the point of view of information storage and use, some existing document security management systems or products can also play a protective role; however, such systems or products lack the protection and monitoring functions for information transmission. If illegal personnel invade the terminal through the network, the intruder will completely control and access the files on the terminal. This kind of document security management system does not have the function of network communication analysis and monitoring, and there are serious defects in information protection; at the same time, the file access control technology adopted by it is relatively The development and actual application of computer technology have lagged far behind
[0005] To sum up, in the current field of computer and network information security technology, there is still a lack of a complete, effective, rigorous and advanced integrated information security protection system. Therefore, how to establish an advanced and effective information security protection system an urgent and inescapable problem within the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and control system for accessing to computer file contents
  • Control method and control system for accessing to computer file contents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] In this embodiment, the operation of restricting access to file content through a remote desktop network connection is used as an example to illustrate, and it is applied in a systematic manner, and the network communication analysis system runs in the network equipment of the access layer, and the situation of distributed deployment is not considered here , the computer file control system runs on multiple terminals, and the terminals have network connections with the network device.

[0054] First, set the network communication analysis rule set based on the above S01 and S03. The specific method is: include the remote desktop network connection in the network communication exception rules to form a corresponding network communication analysis rule set; here the remote desktop network The judgment of the connection can be based on the following characteristics: TCP protocol, TPKT protocol, COTP protocol, etc.; the setting of the target address (MAC) is set in the way o...

Embodiment 2

[0067] This embodiment is illustrated by a control system 10 for accessing computer file content by restricting access to file content 300 through a remote desktop network connection mode, and implementing the network communication analysis module 100 and the computer file control module 200 to run on the same on a terminal.

[0068] First, the user needs to set the network communication analysis rule set unit 101, and include the remote desktop network connection in the network communication exception rules. Here, the judgment of the remote desktop network connection can be based on the following characteristics: TCP protocol, TPKT protocol, COTP protocol, etc.; The network communication analysis module 100 and the computer file control module 200 run on the same terminal, so the setting of the target / source address (MAC) is manually set, and the terminal address (MAC) can be obtained through some software tools or other software techniques. ), and then recorded in the networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control method and a control system for accessing to computer file contents. The control method is a system technology which is capable of analyzing the network communication of a relevant node, detecting and determining whether the network communication is abnormal according to a predetermined network communication rule, and if the network communication is abnormal, notifying a corresponding computer file control system of taking a protection measure to control the access to the contents of a protected file and prevent illegal access to the protected file to cause file leakage. Simultaneously, the invention provides a method of controlling the access to the contents of the protected file through network communication analysis. The network communication analysis system provided by the invention is capable of operating on a terminal, and operating either on the same terminal device with the computer file control system or on any network device of any layer. According to the system and the method, an effectively, complete, strict and advanced file security protection system is established; as a result, the information security problem in informatization is fundamentally solved.

Description

technical field [0001] The present invention relates to the technical fields of computer file system and information security, and more specifically, relates to a method and system for controlling access to computer file content. Background technique [0002] At present, in the field of computer and network information security technology, there are various information security products, and the information security technology adopted by these information security products plays a corresponding protective role in their respective information security links. However, on the whole, the entire process of information security protection is divided into independent links. For example, some information security products are mainly used in the transmission of information, while others are mainly used in the storage and use of information. These information security products come from different manufacturers, and they play different protective roles in different links. It is obvious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F21/604G06F21/6218
Inventor 董渝曦
Owner CHONGQING XIUER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products