Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection of confidential resource data

A data and database technology, applied in the direction of digital data protection, electrical digital data processing, instruments, etc., to achieve the effect of reducing the burden

Inactive Publication Date: 2014-06-25
RES INST OF SUN YAT SEN UNIV & SHENZHEN
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, traditional data protection technologies cannot be applied on these mobile devices; however, as mobile devices are more and more widely used, how to protect the confidential files on these mobile devices from being leaked becomes very important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection of confidential resource data
  • Protection of confidential resource data
  • Protection of confidential resource data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0020] As described above, the present invention can prevent confidential file data of mobile devices in an enterprise from being transmitted or leaked.

[0021] figure 1 10 in represents a mobile device controlled by the enterprise. 12 represents the computer server of the enterprise, 16 represents the mobile device, and 22 and 24 represent the direct communication between the two devices. 12 may be a desktop computer or other computer servers with relatively po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to protection of confidential resource data. The protection is achieved by building a local trusted signature database on mobile equipment. When resource-limited equipment (such as a mobile phone) joins an enterprise network, the agent in the equipment generates a digital signature for each file in the equipment and transmits the signatures to an enterprise controller; the controller compares the digital signatures of the files with a globe digital signature database, the filter of the controller filters sensitive digital signatures and feeds the sensitive digital signatures back to the equipment agent, and the agent receives digital signature information and solidifies the same to the database of the agent; the agent analyzes each to-be-transmitted file according to the local digital signature database and DLP rules; transmission of one file is stopped if the signature of the file is found in the local database; if a new file is created, the agent generates a digital signature of the file and transmits the signature to the controller for checking, and if the signature is sensitive, the signature is saved in the local digital signature database; if the DLP controller updates, the equipment retransmits the digital signatures for comparison.

Description

technical field [0001] The present invention relates to data leakage prevention for computing devices in general. In particular, the present invention relates to the protection of confidential resource data. Background technique [0002] For commercial or legal reasons, the information of some organizations and entities is very important and confidential; this information may be stored in the form of text, databases, images, and pictures. Some illegal organizations or individuals will delete or destroy this information from the outside through the Internet, and there is also a danger of the information being stolen during Internet transmission. For example, a disgruntled employee might spread the data via email. [0003] In addition to some simple business reasons, the company does not want confidential information to be leaked; many government departments and company documents only want to be published internally, and do not want to be known to the outside world. HIPAA c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/64G06F2221/2107
Inventor 汤武惊李圳龙罗笑南杨艾琳刘海亮吴超如郭江波
Owner RES INST OF SUN YAT SEN UNIV & SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products