Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application dynamic trusting method in file encryption

An application program and file encryption technology, applied in the field of information security, can solve problems such as error-prone, difficult to configure, heavy workload of policy configuration, etc., and achieve the effect of good prognosis and simple configuration

Active Publication Date: 2017-06-23
山东华软金盾软件股份有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, its workflow is as attached figure 1 As shown, the traditional policy configuration workload is huge and error-prone
For traditional and commonly used software, better results can be achieved through practice accumulation, but when encountering new software, it will be difficult to configure
Even if it is configured for a while, if a certain unpopular function in the software is used one day, there may still be problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application dynamic trusting method in file encryption
  • Application dynamic trusting method in file encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0014] First, the abbreviations and key terms appearing in this embodiment are explained.

[0015] File encryption: It is a technology that automatically encrypts data written to the storage medium at the operating system layer according to requirements. Currently, the two mainstream methods are disk encryption and file content encryption. The main method of disk encryption is to encrypt the entire disk medium, and all internal data is encrypted regardless of whether it corresponds to a specific file, such as Microsoft's Bitlocker technology. File content encryption is selective encryption according to different specific files. Different files may have different encryption states, such as the file encryption technology contained in the NTFS file system.

[0016] Transparent encryption: Transparent encryption technology is a file encryption tec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application dynamic trusting method in file encryption. According to the method, an incompletely configured policy can achieve a complete effect in a dynamic trusting mode, the configuration is simple and convenient, and a certain intelligent characteristic is achieved; as long as a main program and a main file type are configured and a dynamic trusting rule is selectively configured, a good effect can be achieved; and the predictability is good, and due to existence of the rule, file access outside a basic policy also can be automatically processed.

Description

technical field [0001] The invention relates to a dynamic authorization method for application programs in file encryption, which belongs to the technical field of information security. Background technique [0002] File encryption technology is a common technology used by many users to protect their sensitive data. Generally, files remain encrypted on the storage medium, and these encrypted files will have different effects depending on the current use environment. Trusted programs can normally access and modify these files, while non-trusted programs cannot access or can only access encrypted data. Trusted programs generally include special-purpose drawing, programming, and design programs, and all other programs, especially mail clients, IM clients, compression tools, and other programs used for dissemination and outgoing distribution, are non-trusted programs. In this way, all access programs can be divided into two categories and treated differently, so as to achieve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/71
CPCG06F21/44G06F21/71G06F2221/2145
Inventor 陆腾
Owner 山东华软金盾软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products