Electronic document security management method and system based on big data

An electronic document and security management technology, applied in the direction of electronic digital data processing, digital data authentication, digital data protection, etc., can solve problems such as difficulty in controlling employees' personal behavior, large number of users, and unguaranteed operation of terminal PCs

Pending Publication Date: 2021-06-11
北京国联易安信息技术有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although each node is equipped with network security equipment, due to the large number of users, it is difficult to control the personal behavior of employees, and the operation of terminal PCs in the network cannot be guaranteed, so that there are still major security risks in the operation of the unit network. Information security also under serious threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic document security management method and system based on big data
  • Electronic document security management method and system based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with embodiment the present invention is described in further detail.

[0035] like figure 1 As shown, in order to carry out proactive defense in advance, the present invention discloses an embodiment of a method for electronic document security management based on big data, including the following steps: encrypted protection of documents, local storage of encrypted documents, and rights management of encrypted documents .

[0036] As a preferred solution, the document encryption protection is specifically: installing a client on the user's secret-related computer, using PKI technology, relying on digital certificates, transparently, compulsively, and automatically encrypting files that need to be protected; Protected files include existing or being generated electronic documents and design drawings.

[0037] The authority management of encrypted documents is as follows: based on the RSA asymmetric algorithm, different users are identified through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an electronic document security management method based on big data. The method comprises the following steps of encryption protection of a document, local storage of the encrypted document, authority management of the encrypted document, output management and control of the encrypted document, automatic backup of the encrypted document and electronic evidence collection after a terminal screen is photographed. The encrypted document output control comprises output equipment control, file output auditing, operation log monitoring, outgoing document control, notebook computer management and decryption application and management. Besides, the invention further discloses a management system of the system. The system comprises a server side, a client side, a decryption side, a management side and a decryption assistant, the server side is installed on a server, and the client side, the decryption side, the management side and the decryption assistant are all installed on terminal computers of corresponding users. The confidentiality and safety management requirements of internal data assets of a company can be perfectly met, and various secret divulging channels are blocked.

Description

technical field [0001] The invention belongs to the technical field of digital content security, and in particular relates to a big data-based electronic document security management method and management system. Background technique [0002] With the advent of the information age, information-based office is becoming more and more popular, the internal information construction of the unit is continuously strengthened, the role of computers is increasing, and the application of computer networks is becoming more and more complex. Although many units currently use a variety of security monitoring and management methods, some employees lack awareness of information security. There are still many problems in the current use, resulting in reduced work efficiency. Important internal documents and information data are copied through mobile media, Screen photography, printing, network transmission, etc. are leaked, and sometimes the source of the leak cannot be traced. [0003] At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F21/33
CPCG06F21/33G06F21/602G06F21/6218G06F21/64G06F2221/2107
Inventor 门嘉平
Owner 北京国联易安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products