Document information embedding and tracking methods and systems and proxy service equipment

A document information and document technology, applied in the field of system and agency service equipment, can solve the unfavorable long-term preservation of audit information, difficulties and other problems, and achieve the effect of solving the problem of easy operability and long-term preservation

Active Publication Date: 2015-05-27
SANGFOR TECH INC
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The most direct defect of audit equipment is that it is not conducive to long-term storage of audit information due to limitations such as storage capacity.
In addition, when internal documents are leaked and reposted on multiple websites, it is very difficult to trace the source of the leak from multiple websites
So is there still a more effective way to track the source of Office documents?

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document information embedding and tracking methods and systems and proxy service equipment
  • Document information embedding and tracking methods and systems and proxy service equipment
  • Document information embedding and tracking methods and systems and proxy service equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Based on the unique Open XML feature of Microsoft Office documents 2007 and later versions, the present invention can embed information embedded in office documents in the proxy server, track new methods and systems under the condition that the client PC does not install specific software. The function is to embed files related to the leaker in the original structure of office documents uploaded to the external network through the switch. The forwarding behavior information related to the leak includes the user name logged in at the source terminal node and the IP of the source terminal node. Address, time of leak and other information. When the relevant organization discovers that the document has leaked, it can obtain relevant information generated by the leak by viewing or decrypting the forwarding behavior information embedded in the leaked office document, making it possible to trace the specific leaker. And in the present invention, by embedding the leaking behavi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides document information embedding and tracking methods and systems and proxy service equipment. The document information embedding method comprises the following steps: receiving a first office document uploaded from a source terminal node in a local area network to an extranet; generating a trace file in an xml (extensive markup language) format from forward behavior information according to a configuration strategy, wherein the forward behavior information comprises at least source terminal node login information, an IP (Internet Protocol) address of the source terminal node and office document upload time; embedding the tracking file in the xml format into the first office document to obtain a second office document for uploading. After information leakage, related information generated by a secret leakage behavior can be acquired by examining or decoding operator information in the leaked Office document.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a document information embedding and tracking method and system of an office document and a proxy service device. Background technique [0002] With the development of Internet technology, the business of traditional enterprises has begun to migrate to the Internet. While enterprises feel the huge development opportunities brought by the Internet, they are also facing new challenges. Among them, information leakage is one of the challenges. At present, the commonly used methods for document security management include embedding watermark encryption in documents, setting up gateway audit devices on the switch side, and classifying and supervising documents that need to be kept secret. But these are limited to the document monitoring and supervision in the early stage, and the tracking of Office documents in the later stage is usually realized through the gateway...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/16
CPCG06F21/16
Inventor 张志良梁景波
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products