Supercharge Your Innovation With Domain-Expert AI Agents!

Secret level marking and checking method and device thereof

A verification method and a technology of a verification device, which are applied in the field of information security and can solve problems such as large watermark capacity requirements

Active Publication Date: 2017-05-31
成都卫士通信息安全技术有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are many existing security-level identification technologies, there are still some problems. For example, digital watermarking technology has a large demand for watermarking capacity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret level marking and checking method and device thereof
  • Secret level marking and checking method and device thereof
  • Secret level marking and checking method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0055] Please refer to Figure 7 , Figure 7 It is a flow chart of the secret level identification and verification method provided by the first embodiment of the present invention, and the method is applied to the secret level identification and verification system 10 . The specific flow of the confidentiality level identification and verification method will be described in detail below.

[0056] Step S110 , the sending terminal 200 responds to the file selection operation, and sends the selected file to the client 100 .

[0057] In this embodiment, the sending terminal 200 may include an input device (such as a mouse), and may also include an interactive interface for receiving a file selection operation. In the implementation of this embodiment, the interactive interface may be a touch screen. Wherein, the touch display screen may be a capacitive touch screen or a resistive touch screen supporting single-point and multi-touch operations. Supporting single-point and mul...

no. 2 example

[0081] Please refer to Figure 8 , Figure 8 It is a schematic flow chart of the confidentiality level identification and verification method provided by the second embodiment of the present invention. The method is applied to the client 100 communicating with the sending terminal 200 , the encryption terminal 300 and the server 400 . The specific flow of the confidentiality level identification and verification method is described below.

[0082] Step S210, receiving the file sent by the sending terminal 200 in response to the file selection operation, and judging whether the file has been encrypted.

[0083] Please refer to Figure 9 , Figure 9 for Figure 8 A schematic flowchart of the sub-steps included in step S210. The step S210 includes sub-steps S212 and S214.

[0084] The sub-step S212 is to calculate the hash digest of the file through a hash algorithm, and send the hash digest to the server 400 .

[0085] In the sub-step S214, the server 400 compares the re...

no. 3 example

[0108] Please refer to Figure 14 , Figure 14 It is a schematic block diagram of the confidentiality identification and verification device 600 provided by the third embodiment of the present invention. The confidentiality identification and verification device 600 includes:

[0109] A receiving query module 610, configured to receive the file sent by the sending terminal 200 in response to the file selection operation, and query the encryption status of the file;

[0110] An encryption module 620, configured to encrypt the file through the encryption terminal 300 when the file is not encrypted;

[0111] The verification module 630 is configured to obtain the file encryption level of the file through the server 400 when the file has been encrypted, and verify the file according to the file encryption level.

[0112] In this embodiment, the receiving query module 610 receives the file sent by the sending terminal 200 in response to the file selection operation, and the way ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret level marking and checking method and a device thereof. The method comprises the following steps: sending selected files to a client terminal via a sending terminal, and inquiring secret level marking states of the files via a server after receiving the files via the client terminal; marking secret levels of the files via a secret level setting terminal when the files are not marked with secret levels; and obtaining file secret levels of the files via the server when the files are marked with secret levels, and checking the files according to the file secret levels. According to the technical scheme, the files which are not marked with secret levels can be marked with secret levels; meanwhile, the files marked with secret levels can be checked; access rights of users to the files marked with secret levels can be managed and controlled, so that the current situation that secret divulging events often occur can be improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, to a secret-level identification and verification method and device. Background technique [0002] With the rapid development of computer and Internet technology, e-government systems and office automation have been popularized, so that a large number of documents are circulated in the confidential system in the form of electronic documents, and the problem of document classification identification has arisen. In units involving state secrets and commercial secrets, such as the party and government, military industry, enterprises and institutions, although the control of leaking channels and the post-event auditing of leaking incidents have been strengthened, the occurrence of leaking incidents cannot be completely eliminated. Only by establishing and improving the secret-related information management system, and strictly implementing hierarchical management a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 吴汝钰李龙徐建徐凌云付静
Owner 成都卫士通信息安全技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More