Method and system for processing counterfeit process in file transparent encryption and decryption system

A technology of transparent encryption, decryption and processing methods, which is applied in the field of forgery process processing, can solve the problems of heavy maintenance workload, undetectable threats, poor usability, etc., and achieve the effect of strong usability and lightening the huge amount of maintenance

Active Publication Date: 2021-02-09
TIANYU SOFTWARE
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the above defects or improvement needs of the prior art, the present invention provides a method and system for processing counterfeit processes in a file transparent encryption and decryption system. The technical problems in the identification method are poor usability, heavy maintenance workload, passive problem solving, inability to detect threats, and inability to leak secrets and obtain evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing counterfeit process in file transparent encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0050] Such as figure 1 Shown, the present invention provides a kind of processing method of the counterfeit process in the file transparent encryption and decryption system, and it comprises the following steps:

[0051] (1) The client obtains the started process, and obtains the process name of the process;

[0052] Specifically, this step first uses the global injection technology based on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a processing method for a forged process in a file transparent encryption and decryption system, comprising: a client acquires the started process and acquires the process name of the process; the client inquires whether the acquired process name exists in its credit database , if it exists, the client extracts the fingerprint information of the process, and inquires whether the fingerprint information exists in its credit database, if it does not exist, the client sends its attribute information, and the attribute information and fingerprint information of the process to the server, and Block the running of the process, and the server judges whether it can query the fingerprint information of the process sent by the client in its credit database. The present invention can solve the technical problems of poor ease of use, heavy maintenance workload, passive problem solving, inability to detect threats, and inability to leak secrets and obtain evidence in the identification method based on process fingerprints widely used in existing file transparent encryption and decryption systems.

Description

technical field [0001] The invention belongs to the technical field of information security, and more particularly relates to a processing method and system for a counterfeit process in a file transparent encryption and decryption system. Background technique [0002] The file transparent encryption and decryption system has been widely used in commercial use. When the electronic file is opened, it is automatically decrypted to the memory for correct identification by the application; when the file is saved, it is automatically encrypted to the disk to prevent the leakage of the electronic file; even if the electronic file Files are copied out, but they are still encrypted, which solves the needs of enterprises for the protection of trade secrets; in addition, the file transparent encryption and decryption system does not change the original file operation process, and has no perception for users. [0003] A key technology in the file transparent encryption and decryption sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/57
CPCG06F21/57G06F21/577G06F21/602
Inventor 陈永府方兴郭振冬刘俊
Owner TIANYU SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products