Document safe browsing method

A document and security technology, applied in computer security devices, instruments, electrical digital data processing, etc., to achieve the effect of preventing copying and spreading, and preventing re-save

Inactive Publication Date: 2015-01-07
广西桂能软件有限公司 +1
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, there is no document security browsing method for the above needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document safe browsing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0023] combined with figure 1 , a document safe browsing method, it comprises the following steps:

[0024] 1. Install the Safe Browsing client;

[0025] 2. After logging in to the client, import the documents to be browsed into the client;

[0026] 3. The user name and password required to browse the document are set by the user;

[0027] 4. The client automatically generates the URL link address;

[0028] 5. The user sends the URL link address and the preset user name and password to the second party who needs to browse the document;

[0029] 6. The second party remotely enters the client through the URL address, user name and password information to browse documents;

[0030] 7. During the second-party browsing process, the client automatically prohibits the copying and screenshot functions of the browsing terminal.

[0031] Preferably, the browsed d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method capable of remotely browsing a document of a second party and effectively preventing a browser from duplicating or disclosing the document. The method includes the steps of firstly installing a safe browsing client side, secondly importing a document to be browsed into the client side after landing the client side, thirdly setting a user name and a password for browsing the document through a user, fourthly, automatically generating a URL (uniform resource locator) link address through the client side, fifthly sending the URL link address and the preset user name and password to a second party needing to browse the document, sixthly entering the client side for browsing the document through the second party through the URL address and user name and password information, and seventhly automatically disabling duplication and screenshot functions of a browsing terminal through the client side during the browsing of the second party.

Description

technical field [0001] The invention relates to a document safe browsing method. Background technique [0002] With the rapid development of informatization, people's demand for information security is coming one after another. Talent competition, market competition, financial crisis, and enemy agents all bring huge risks to the development of enterprises and institutions, such as internal theft, hacker attacks, and unconscious leaks. The means of stealing secrets such as secrets has become a hidden danger between people, between enterprises and between enterprises, and between countries. Market demand, people's safety awareness, and many environmental factors have prompted the rapid development of my country's information security. Information security has experienced from traditional single protection such as firewalls to overall solutions for information security, from traditional old firewalls, intrusion detection , anti-virus software to diversified information security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2141
Inventor 陆健波廖显幸周卫江李倩蓝覃明许桓韶文宏凤舒密李军
Owner 广西桂能软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products