Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Strong management and control method and system for secret-related files and storage medium

A secret-related document and secret-related technology, applied in transmission systems, electrical components, etc., can solve the problems of secret-related document leakage and other issues, and achieve the effect of improving protection, accurate security protection, and avoiding theft

Active Publication Date: 2020-04-17
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the direct or indirect leaks and destructions of secret-related documents occur in the process of related personnel operating secret-related documents under various undefended circumstances; Confidential document loss and leakage incident

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong management and control method and system for secret-related files and storage medium
  • Strong management and control method and system for secret-related files and storage medium
  • Strong management and control method and system for secret-related files and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0049] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] In the first aspect, the embodiments of the present invention provide a strong management and control method and client for confidential files, which can provide targeted protection for confidential files and related terminal devices.

[0051] figure 1 It is a flow chart of an embodiment of a strong control method for secret-related files in the present invention, setting a secret-related protection zone on the client side, including:

[0052] S101: If a secret-related file is received in the secret-related p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a strong management and control method and system for secret-related files and a storage medium, and relates to the technical field of terminal network security. Secret-related files and secret-related file storage terminal equipment can be protected in a targeted manner. The method comprises the steps of if a secret-related protection area receives a secret-related file, switching a current terminal to a secret-related terminal protection mode; generating a backup request based on the secret-related file and submitting the backup request to a management end to execute backup operation; receiving a secret-related terminal protection strategy issued by the management end and executing file management and control on the secret-related file accordingto the strategy; and if a whole network search instruction issued by the management end is received, searching whether a related secret-related file exists locally, and if so, adding the related secret-related file to a secret-related protection area.

Description

technical field [0001] The invention relates to the technical field of terminal network security, in particular to a strong management and control method, system and storage medium for secret-related files. Background technique [0002] According to statistics from relevant authoritative departments, with the increasing informatization of production and management in various industries, computer leaks are also on the rise. The biggest feature of computer leaks is that compared with general embezzlement cases, its methods are more concealed and more harmful. A malicious leak of secrets will often cause incalculable consequences to the company: at the least, it will require a huge amount of money to remedy it, and at the worst it will kill an enterprise. According to authoritative data, almost all Chinese enterprises have no protection measures for electronic documents, and less than 3% of enterprises have protection measures for information. Some confidential information an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1425H04L63/10H04L63/20H04L67/06
Inventor 辛颖徐翰隆肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products