Method for realizing control and leakage prevention of data out of service system

A data control and business system technology, applied in the field of data security, can solve problems such as inconvenient daily work, achieve the effect of easy office and increased security

Inactive Publication Date: 2016-08-31
MR RAY CHENGDU TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What users need is instant and seamless access to data on any device at any point of time, which brings great inconvenience to users' daily work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing control and leakage prevention of data out of service system
  • Method for realizing control and leakage prevention of data out of service system
  • Method for realizing control and leakage prevention of data out of service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] During the work process, the same data of the same user can run in different client terminals, and different data can also run in the same client terminal. When the data management user sends a piece of data that needs to be protected to the data receiving user through his client, the data management user's client will first send the "data identifier" of the local data to be protected to the data security management cloud platform and request security protection. Services, including the encryption key and control strategy of the data to be protected, etc., the data security management cloud platform will not store the local data of the data sending user. The security management cloud platform generates an encryption key and a decryption key according to the "data identifier" of the received local data; the "data identifier" of each piece of local data corresponds to a unique encryption key and decryption key. The security management cloud platform generates a control st...

Embodiment 2

[0045]In this embodiment, on the basis of Embodiment 1, all operation records of the data security management cloud platform, including time, identity, operation, location, etc., will be saved to the data security management cloud platform accordingly, and aggregated for monitoring by the management panel analyze. In addition, the administrator can modify the control policy through the management panel to determine the period of use of the key. In this way, when different users use the same data, they can have different operation permissions on this data, and the use period of the data will also be different. For example: for the same piece of data, the administrator can grant user A the permission to open, edit, copy, and share by modifying the control policy, while only granting user B the permission to open and edit. At this time, the operation permissions of different user terminals on the data are It will be different; in addition, when the data usage period of the data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing control and leakage prevention of data out of service system. The method comprises following steps of sending data identifier of local data of a user to a data security management cloud platform for requesting for data security service; producing an encryption secret key and a decryption secret key according to the received data identifier; producing a control strategy according to the received data identifier; setting the effective period of the decryption secret key and inspection and modification of the control strategy; receiving the encryption secret key produced by the security management cloud platform; encrypting the local data; sending a data use request to the security management cloud platform; receiving the decryption secret key produced by the security management cloud platform; decrypting the local data; receiving the data use request of the local data; and sending the decryption secret key to the local data if the data use request is consistent with the control strategy and the time of the data use request is in the effective period of the decryption secret key. According to the method, the data of any type and any platform can be protected, monitored and controlled.

Description

technical field [0001] The invention belongs to the field of data security, and in particular relates to a data control and anti-leakage method outside a business system. Background technique [0002] In today's world, the high degree of digitalization of information resources has exacerbated the occurrence of dangerous accidents such as data leakage. For enterprises, in the face of continuous productivity and cooperation between various companies and service providers, in order to prevent such dangerous accidents, it is urgent to change the response method to directly protect the data itself. [0003] Enterprises store and share information in different repositories, and in daily work, they will redistribute the data to different systems, including CRM, ERP, HRM and even financial systems. Even for a company with a clear cloud and data control strategy, such scattered data sources and data sharing services will greatly weaken the company's ability to monitor and control th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/06H04L63/10H04L67/60
Inventor 陈瑞霞王贝贝
Owner MR RAY CHENGDU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products