Document leak protecting and tracking system

A tracking system and document technology, applied in the field of document leakage protection tracking system, can solve the problems of not being able to identify the document transmission mode, not being able to recognize the operation behavior, not being able to recognize the leakage of sensitive files to the Internet, etc.

Active Publication Date: 2018-06-05
四川神虎科技有限公司
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The prior art has the following disadvantages in the method of checking whether a document has been stolen or leaked: it cannot detect and prevent the leakage and theft of sensitive documents in time; it cannot identify whether sensitive documents have been leaked to the Internet; it cannot identify the transmission mode of leaked or stolen docu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document leak protecting and tracking system
  • Document leak protecting and tracking system
  • Document leak protecting and tracking system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention provides a document leakage protection and tracking system, which solves the shortcomings of the prior art on whether a document has been stolen or leaked, and can trace the leaked and stolen sensitive files of computers within the deployment range, and identify leaks Ways and ways of stealing, tracking to the leaking source computer, blocking and early warning of explosive Trojan horses and document-stealing programs.

[0027] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, under the condition of not conflicting with each other, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0028] In the following description, many specific details are set forth in order to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a document leak protecting and tracking system which comprises a management module, a sensitive word matching module, a monitoring module, a behavior analysis module, a Trojansandbox module and an early warning analysis module, wherein the management module is used for setting sensitive word configuration information of the protecting and tracking system and user-defined rules as well as issuing planning tasks of document scanning and matching sensitive words for each host operating system; the sensitive word matching module is used for matching documents accessed by all processes for each host operating system as well as recognizing whether configuration key words exist in the documents or not; the monitoring module is used for monitoring local directories and files in real time and controlling access process behaviors of the local directories and files; the behavior analysis module is used for analyzing various behaviors of file access processes; the Trojan sandbox module is used for simulating and backtracking process behavior events with leak behaviors so as to recognize Trojan leak and Trojan outbreak; and the early warning analysis module is used forintercepting and early-warning all host clients when Trojan stealing behaviors are found. The system disclosed by the invention can be used for backtracking leaked and stolen sensitive files in computers as well as recognizing leaking and stealing modes.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a document leakage protection and tracking system. Background technique [0002] Whether the prior art has a method for stealing and leaking secrets can be roughly as follows: identify whether the keyword of setting is contained in the target computer document by active scanning mode (mainly scan the computer file with queue scanning and recursive scanning mode, judge Whether it is a document file, analyze and match the set keywords); according to the keywords, whether there is any information leaked or stolen in the document information from the identification (in the identified document information, the manager can check the content information of the document) check to determine whether the document is a stolen document or a leaked document). [0003] There are following disadvantages in the prior art methods for whether a document has been stolen or leaked: it ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/566G06F21/6218
Inventor 陈虹宇吴刚
Owner 四川神虎科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products