Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic document full-life-cycle security protection method based on security tag

A full-life-cycle, electronic document technology, applied in the field of network security, can solve problems such as hidden dangers, leakage, and easy tampering of secret-level identification.

Inactive Publication Date: 2017-09-19
BEIJING INST OF COMP TECH & APPL
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) Potential safety hazards in the production stage of electronic documents based on security labels
[0004] In the generation stage of electronic documents, it is impossible to clarify the scope of knowledge, authority, confidentiality level and confidentiality period of electronic documents. It is difficult to trace the track of documents after the confidentiality level is changed, and the confidentiality level identification is easy to be tampered with.
There are problems of ambiguity and different cognitions in classification (multi-level approval, designation of classification approvers)
[0005] (2) Potential safety hazards in the circulation stage of electronic documents based on security labels
When electronic documents are transmitted on the internal network, there are high-level electronic documents flowing to low-level users; when the electronic documents are transmitted outside the internal network, there are security risks such as theft, denial of sending and receiving, etc.; Security implications for recipients to read
[0007] (3) Potential safety hazards in the application stage of electronic documents based on security labels
[0008] Different work departments and different types of work have different requirements for electronic documents. If the authority and operation authority of electronic documents are not fine-grained, there will be security risks such as illegal access and copying of electronic documents.
[0009] (4) Potential safety hazards in the storage stage of electronic documents based on security labels
[0010] For electronic documents stored on terminals and servers, there are security risks such as tampering, leakage, and destruction of electronic documents during the storage process
Important electronic documents are stored in the external environment, lacking perfect management and control methods
[0011] (5) Potential safety hazards in the destruction stage of electronic documents based on security labels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic document full-life-cycle security protection method based on security tag
  • Electronic document full-life-cycle security protection method based on security tag
  • Electronic document full-life-cycle security protection method based on security tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0026] figure 1 Shown is a module diagram of the security protection architecture for the entire life cycle of electronic documents based on security labels, such as figure 1 As shown, the security protection framework for the entire life cycle of electronic documents based on security labels is divided into three parts. The first part is electronic document security labels 1, which provide different security functions at different stages in the entire life cycle of electronic documents. The second part is the security of the electronic document operating environment 2. The physical environment, terminals and servers, networks and applications provide security mechanisms for the entire life cycle of electronic document...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electronic document full-life-cycle security protection method based on a security tag. The method comprises the steps that whether a user has an access permission to a document is judged; the integrity of the document is verified; the electronic document is decrypted; permission control information of the security tag is judged, and the document is submitted to a circulation responsible person terminal; when the document is read, duplicated and edited, the permission control information of the security tag is judged; when the document is destroyed, the document is submitted to a destruction responsible person terminal, and the destruction responsible person terminal performs approval; the circulation responsible person terminal performs information approval; when the document is read, duplicated and edited, the permission control information of the security tag is judged, and operation by the user is controlled; and when the document is sent out, the document is submitted to a sending responsible person terminal, and the circulation responsible person terminal modifies permission information of the security tag to determine that the document can only be subjected to controllable operation on a known terminal.

Description

technical field [0001] The invention belongs to the technical field of network security, and proposes a security label-based security framework for the entire life cycle of electronic documents. Background technique [0002] State secrets and commercial secrets are important intangible assets and core competitiveness of the country, government, and enterprises. Electronic documents are a common carrier of such assets. The security label 1 can realize the status record, track tracking and fine-grained Security management and control. Electronic documents based on security labels face the following five security risks during the entire life cycle of generation, circulation, application, storage and destruction. [0003] (1) Potential safety hazards in the production stage of electronic documents based on security labels [0004] In the generation stage of electronic documents, it is impossible to clarify the scope of knowledge, authority, confidentiality level and confidentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06
Inventor 周益周姚金利曾颖明
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products