Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for document security control and traceability based on digital fingerprints

A digital fingerprint and security control technology, applied in the field of information security control, can solve problems such as lack of digital fingerprint support, loss of watermark, and inability of DLP system to track document flow, etc.

Inactive Publication Date: 2018-10-09
陈佳阳 +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that malicious users can easily clean up these characters in the digital document, and the document will lose the watermark after being printed, copied, screenshotted, or photographed
[0023] 5) Synonym replacement: Insert watermark by replacing synonyms, but there are few completely synonymous words, this method is easy to be perceived by readers, and in some cases it will affect semantic expression
[0036] 1) Expensive to deploy and maintain
In order to deploy a DLP system, it is necessary to deploy special software on the database, server, and client, and even purchase special network security equipment to monitor the flow of sensitive files on the network. For small and medium-sized enterprises, the cost is too high
In particular, these solutions require the deployment of client management and control software on the desktop of each employee, and the purchase of a license is expensive, and each terminal software requires dedicated maintenance, resulting in high daily operation and maintenance costs for the enterprise.
[0037] 2) There is no support for digital fingerprints, and there is no difference between files downloaded through different channels
The existing mainstream DLP system mainly focuses on file access control, and once a file is approved for download, any user who downloads the file will get the same file, and accurate traceability cannot be achieved
When one of multiple downloaders leaks sensitive files, it is theoretically impossible to find out who leaked them
[0038] 3) Unable to trace the source of offline files
However, once the document is printed, copied, screen shot, or photographed, the DLP system cannot track the flow of the document and trace the source of the leaker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for document security control and traceability based on digital fingerprints
  • A method and system for document security control and traceability based on digital fingerprints
  • A method and system for document security control and traceability based on digital fingerprints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] The digital fingerprint-based file security control and traceability method of this embodiment can realize traceability and security management of text files. It is a digital fingerprint algorithm based on natural language analysis and processing, including file upload process and file download process.

[0078] First of all, in order to facilitate understanding and gain a perceptual understanding, let me take an article as an example. This paragraph is a paragraph in the middle school textbook "Moonlight in the Lotus Pond". The original text is as follows:

[0079] on the surface of the winding andtwisting lotus pond floated an endless field of leaves. the leaves lay high in the water, rising up like the skirts of a dancing girl. Among the layers ofleaves white blossoms adorned the vista, some beguilingly open and othersbashfully holding their petals in their petals; just like bright pearls or starsin a blue sky, or like roses just emerging from their bath. beauty. a...

Embodiment 2

[0146] This embodiment mainly illustrates the scene where the method of the present invention can be applied. Since the inserted digital fingerprint does not affect the semantic expression of the document, this solution can be used except those official documents with legal effect, and its use scene will be very Broadly, as follows:

[0147] Company OA official document system: If a certain official document is only an internal official document and is not intended for external release, then a slight text watermark is acceptable while maintaining semantics; in this scenario, when an employee views and downloads, the OA system will The file server of this solution generates a copy for employees, and this copy contains a certain amount of fingerprint information, so each employee bears the responsibility of keeping it confidential.

[0148] Company mailbox system: the attachments of the mailbox system are also stored by the file server. After the file server adopting this soluti...

Embodiment 3

[0153] Such as figure 2 As shown, the digital fingerprint-based file security control and traceability system of this embodiment includes a file server, and the file server includes:

[0154] The fingerprint feature location table generation module is used to use the pattern matching dictionary to start the natural language analysis algorithm when the user uploads the file, scan and match the full text of the file text, find the position where the digital fingerprint can be inserted, and generate a fingerprint feature location table;

[0155] The random code generation module is used to generate a binary random code of the same length according to the length of the fingerprint feature location table when the user initiates a file download request;

[0156] Text processing module, if the corresponding bit of the generated random code is 0, it means that the bit is not modified; if the corresponding bit of the generated random code is 1, it means that the bit is in the corresp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file security control and trace method and system based on digital fingerprints. The method includes the file uploading procedure and the file downloading procedure. In the file uploading procedure, when a user uploads files to a file server, the file server starts a natural language analysis program and conducts full-context scanning and matched analysis on file contexts, a position where the digital fingerprints can be inserted is found, a fingerprint feature position list is generated, the fingerprint feature position list and original files are stored in the file server together, the uploading and downloading record list is generated, and information uploaded this time is recorded. In the file downloading procedure, when the user sends a file downloading request to the file server, the file server generates binary random codes with the same length according to the length of the fingerprint feature position list, when the random code corresponding position is 1, the digital fingerprints are inserted in the contexts at the corresponding position, a new file is generated and sent to the user, and meanwhile the downloaded information is recorded in the uploading and downloading record list. By means of the method and system, the context files can be traced back, and the security of the context files is managed.

Description

technical field [0001] The invention relates to a method for file security control and traceability, in particular to a method and system for file security control and traceability based on digital fingerprints. It belongs to the field of information security management and control. Background technique [0002] With the advancement of information technology, computers and networks have become necessary tools for daily office work, communication and collaboration. However, while information technology improves people's work efficiency, it also puts forward higher requirements for information security precautions. At present, most users still use passive protection methods such as firewalls, intrusion detection, and anti-virus to protect office networks. However, the actual survey data shows that only a very small part of the incidents in which internal secrets of companies or units are leaked through the network are stolen by hackers, and most of the rest are caused by int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/16
Inventor 陈佳阳谢松文
Owner 陈佳阳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products