File protection method and system

A document and self-protection technology, applied in transmission systems, digital data protection, electrical components, etc., can solve problems such as cumbersome operations, cannot prevent users from actively leaking secrets, etc., to reduce complexity, shorten accessible paths, and prevent malicious theft. Effect

Active Publication Date: 2014-04-30
深圳市大成天下信息技术有限公司
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this solution will not be affected by storage media and transmission protocols, this method needs to manually convert the electronic document into the file format of a special reader after the file is generated, so the operation is cumbersome
In addition, since this method requires the user to manually convert the format, it cannot prevent the user from actively leaking the secret

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and system
  • File protection method and system
  • File protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A schematic diagram of a document protection system 100 according to an embodiment of the present invention is shown. Such as figure 1 As shown, the document protection system 100 includes a document protection server 110 and one or more clients 120-140 communicated with the document protection server 110 through a network. A document protection device 200 resides in each client 120-140. Clients 120-140 may be an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file protection device which is arranged on a client side. The client side is provided with an operating system. The operating system is divided into a user space layer and a kernel layer. The file protection device comprises an encryption and decryption module and a self-protection module. The encryption and decryption module runs on the user space layer and monitors operation which is conducted on files by an application on the client side. When the file content is read by the application, the encryption and decryption module obtains encrypted file content from the client side, decrypts the encrypted file content, and places the decrypted content into a temporary storage space to be read by the application. When the file content is stored in the application, the encryption and decryption module encrypts the content in the temporary storage space and stores the encrypted file. The self-protection module runs in the kernel layer and monitors the temporary storage space so that other applications except the application can be prevented from having access to the temporary storage space. The invention further discloses a file protection system with the file protection device and a corresponding file protection method.

Description

technical field [0001] The invention relates to the fields of computers and the Internet, in particular to a technology for preventing documents from being leaked. Background technique [0002] With the popularization and development of computer technology and network technology, abundant network data resources have brought great convenience to people's life, but also brought a lot of confusion. For example, in enterprises, employees can easily transfer some Files involving company secrets are sent outside the company, resulting in file leaks. Therefore, there is a need for a solution that can protect the document to prevent the content of the document from being circulated. [0003] Various schemes have been provided to prevent documents on computing devices from being compromised. One solution is to install special software on computing equipment to block hardware interfaces (such as USB interfaces, infrared interfaces, etc.) and to close network protocols (FTP, HTTP, et...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/62
Inventor 黄鑫吴鲁加
Owner 深圳市大成天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products