Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document encryption management system

A technology for managing systems and documents, applied in the computer field, can solve problems such as information leakage, inability to fully check and modify manually, long response time, etc.

Active Publication Date: 2016-01-13
LINEWELL SOFTWARE
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (1) The step of notifying the group administrator of the intrusion detection results in the above process is relatively risky. Since manual work cannot be done 24 hours a day and general network intrusions occur during non-working hours, it often waits until the group management Investigators discovered that the information had already been leaked after the intrusion
[0011] (2) The connection between each step of the process is manually operated, the response time is too long and the result of the operation cannot be fed back to the group administrator in time
The workload of the operation is relatively large, and manual inspection and modification are often unable to be carried out comprehensively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document encryption management system
  • Document encryption management system
  • Document encryption management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The embodiment of the present invention provides a document encryption management system, which is used to change the encryption key of the document in time when the system is attacked by network intrusion, effectively preventing the leakage of document information, and has the advantages of automatic completion and no manual participation .

[0027] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0028] The terms "first", "seco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a document encryption management system, which can effectively prevent leakage of document information and has the advantages of automatic completion and non manual participation. The document encryption management system comprises a firewall device, an IOCP server and a client, wherein the firewall device is connected with the IOCP server, the IOCP server is connected with the client, the client subscribes a system intrusion message from the IOCP server, and the IOCP server adds the system intrusion message subscribed by the client in an access list; the firewall device detects whether the document encryption management system suffers a network intrusion attack in a real time manner, and when the firewall device detects the network intrusion attack, the firewall device sends alarm information to the IOCP server; and the IOCP server regenerates an encryption key for the client and sends a key change instruction to the client, and the client re-encrypts documents stored in a storage device managed by the client by use of the updated encryption key.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a file encryption management system. Background technique [0002] At present, the Internet is more and more widely used, and hackers intrude everywhere, which greatly affects the reliability and security of the Internet, and it is imminent to strengthen the construction of network security. Internet groups as small as enterprise intranets and as large as state-level intranets, such as public security networks and government affairs networks, are threatened by hackers all the time. When the group is hacked, it is necessary to modify and re-encrypt the secret-related files of different members of the group with a unified key, which can protect the secret-related information from being stolen again in a timely manner. In a very large group, a large number of team members are often involved. Once an intrusion occurs in the group, it is necessary to issue an intrusion warning to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
Inventor 黄智珍高稳仁林嵩吴清顺林港
Owner LINEWELL SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products