Supercharge Your Innovation With Domain-Expert AI Agents!

An electronic document trust and security control method and system

An electronic document and security control technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the problems of accidental loss, external information security threats, illegal data diffusion, etc., and achieve the effect of preventing illegal diffusion.

Active Publication Date: 2017-04-05
国网河南省电力公司三门峡市陕州供电公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularization of computer networks and the continuous development of enterprise informatization, more and more materials are stored and disseminated in the form of electronic documents, but this brings convenience and also increases the risk of important information leakage within the organization: 1. External Information security threats: Untrustworthy devices such as external laptops, mobile phones, and U disks can obtain internal data through access to the intranet, WIFI, and Bluetooth transmission; 2. Internal information security risks: devices that store internal data (such as USB disks, CDs) are accidentally lost; internal employees deliberately spread data to untrustworthy areas such as the Internet, and the person responsible for spreading the data cannot be traced; the Trojan horse program in the internal computer waits for an opportunity to steal internal data; 3. Internal data flows disorderly : The data flow of the engineering department is transferred to the financial department; the data of the leadership is transferred to the computers of ordinary employees, resulting in the illegal diffusion of data internally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An electronic document trust and security control method and system
  • An electronic document trust and security control method and system
  • An electronic document trust and security control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] An electronic document trust and security control method, which includes server-side credit granting to client-side, security isolation, circulation control and de-isolation, wherein the server-side credit granting to client-side includes the following steps:

[0037] A. The client connects to the server, queries the security trust management and control information of the unit where it is located, and forms a computer terminal security trust code. The computer terminal security trust code is composed of a unit trust code, a department trust code and a trust serial number;

[0038] B. The client uses the computer terminal security trust code to initiate a security trust code registration to the server, and waits for the server to grant credit;

[0039] C. The server assigns a new security trust code and control strategy to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an electronic document trust and security control method and system in computer networks. The control method comprises the step that a server side carries out trust granting, security isolation, flow control and isolation removal on a client side. The control system adopting the control method is further provided. A server is used for carrying out trust granting on the client side, a security and trust control environment can be built on the client side, the trusted client side and application programs can have normal access to data documents, untrusted client sides and application programs cannot use the data documents. Security and trust codes are embedded into electronic documents, data format conversion is carried out on the documents, and security isolation on the electronic documents can be achieved. The flow strategy is embedded into the electronic documents, control over the flow range of the electronic documents can be achieved, and illegal diffusion of document data is avoided. Security isolation removal of the electronic documents can be achieved through approval and decryption, and the normal access to the electronic documents can be achieved under the non-security and non-trust control environment.

Description

technical field [0001] The invention relates to a security trust control method and system, in particular to an electronic document trust and security control method and system in a computer network. Background technique [0002] With the popularization of computer networks and the continuous development of enterprise informatization, more and more materials are stored and disseminated in the form of electronic documents, but this brings convenience and also increases the risk of important information leakage within the organization: 1. External Information security threats: Untrustworthy devices such as external laptops, mobile phones, and U disks can obtain internal data through access to the intranet, WIFI, and Bluetooth transmission; 2. Internal information security risks: devices that store internal data (such as USB disks, CDs) are accidentally lost; internal employees deliberately spread data to untrustworthy areas such as the Internet, and the person responsible for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/602G06F21/606G06F21/6209G06F21/6227G06F2221/2107G06F2221/2125G06F2221/2141G06F2221/2149
Inventor 刘海东武云博张巨程张晓飞薛源杨峰刘俊彤王岩温灵松南明桥陈德斌李万杰李帅军房佳慧郭瑞杰王宇轩任晓兰张江丽杨金春孙轶超蔡磊孙晓红高文杰员楠霍绍伟宋玮乔林
Owner 国网河南省电力公司三门峡市陕州供电公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More