A data leakage prevention system based on computer behavior

An anti-leakage, computer technology, applied in the field of information security, can solve problems such as loss, lack of security protection measures, enterprise loss, etc., and achieve the effect of safe and reasonable design, avoiding access and publishing information

Pending Publication Date: 2019-01-22
HENAN POLYTECHNIC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of informatization, traditional paper documents are gradually replaced by electronic documents. However, electronic documents related to the core commercial secrets of enterprises, such as: internal planning, marketing strategies and financial data reports, etc., once leaked or stolen will cause irreparable losses to the enterprise
[0003] If there are no relevant security protection measures to deal with data leakage and risks, enterprises may bring serious losses to enterprises at any time due to data security. How to strengthen information security and confidentiality is an urgent problem to be solved in the construction of enterprise informationization. Although the current The functions of the data leakage prevention system based on computer behavior are being gradually improved, but there are still some deficiencies that need to be improved
[0004] The existing data leakage prevention system based on computer behavior has the following problems: According to the survey data of authoritative organizations in recent years, the loss caused by information leakage caused by unauthorized access and release of internal users continues to be at the forefront of enterprise information security risks , but the data leakage prevention system based on computer behavior currently on the market (application publication number 201510065288) does not have relevant security protection measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data leakage prevention system based on computer behavior
  • A data leakage prevention system based on computer behavior
  • A data leakage prevention system based on computer behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] see Figure 1-3, the present invention provides the following technical solutions: a data leakage prevention system based on computer behavior, including a drive module 1, a user behavior analysis module 3 is arranged on one side of the driver module 1, and a data type judgment is arranged below the user behavior analysis module 3 Module 2, the data type judgment module 2 is provided with a user identity comparison module 6 away from the side of the user behavior analysis module 3, a side of the user identity comparison module 6 is provided with a sending file storage module 5, and the other side of the user identity comparison module 6 The side is provided with a user display module 7, and the side of the sending file storage module 5 away from the user identity comparison module 6 is provided with a historical information retrieval module 4, a driving module 1 and a user behavior analysis module 3, and a data type judgment module 2 and a user behavior analysis module. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data leakage prevention system based on computer behavior. The system comprises a user information comparison module, a data type judging module judges whether the transmitted file is a confidential module file or a top-secret file when in use, If the file is confidential, a confidential file module transmits relevant electrical signals to a microprocessor, the microprocessor respectively triggers actions of a user identity input module and a confidential storage module, a user identity entry module displays a window on the computer display for user identity input, aconfidential storage module imports the internal personnel list of the operable confidential files into the microprocessor, the microprocessor compares the received identity information with the list,and if the comparison result is correct, the signal is transmitted to the user display module for confirmation of transmission; the comparison result improperly transmits the signal to a driver module, and the driver module prevents the file from outgoing and avoids the internal user from accessing and publishing the information under the unauthorized condition.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a data leakage prevention system based on computer behavior. Background technique [0002] With the development of informatization, traditional paper documents are gradually replaced by electronic documents. However, electronic documents related to the core business secrets of enterprises, such as: internal planning, marketing strategies and financial data reports, etc., once leaked or stolen It will bring irreparable losses to the enterprise. [0003] If there are no relevant security protection measures to deal with data leakage problems and risks, enterprises may bring serious losses to enterprises at any time because of data security. How to strengthen information security and confidentiality work is an urgent problem to be solved in the construction of enterprise informatization. Although the current The functions of the data leakage prevention syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/316G06F21/604
Inventor 潘晓萌牛全兴李铮
Owner HENAN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products