Electronic document full-life-cycle security protection method based on security tag
A full-life-cycle, electronic document technology, applied in the field of network security, can solve problems such as hidden dangers, leakage, and easy tampering of secret-level identification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0026] figure 1 Shown is a module diagram of the security protection architecture for the entire life cycle of electronic documents based on security labels, such as figure 1 As shown, the security protection framework for the entire life cycle of electronic documents based on security labels is divided into three parts. The first part is electronic document security labels 1, which provide different security functions at different stages in the entire life cycle of electronic documents. The second part is the security of the electronic document operating environment 2. The physical environment, terminals and servers, networks and applications provide security mechanisms for the entire life cycle of electronic document...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com