Unlock instant, AI-driven research and patent intelligence for your innovation.

Semitransparent encryption method and system for preventing sensitive information leakage, terminal and medium

An encryption method and sensitive information technology, which is applied in the field of terminals and media, systems, and semi-transparent encryption methods, can solve problems in management and use, and cannot meet data security control requirements, etc., to achieve the effect of ensuring security and compatible interaction efficiency

Pending Publication Date: 2022-04-15
STATE GRID CORP OF CHINA +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing encryption methods to prevent sensitive information leakage have problems in the supervision of data transmission channels, sensitive data classification, management and use of core data, and cannot meet the requirements of data security control. More powerful sensitive data security supervision and management are urgently needed. Anti-leakage protection to ensure data security in company information systems
[0004] Through the above analysis, the existing problems and defects of the existing technology are as follows: the existing encryption methods to prevent sensitive information leakage have problems in the supervision of data transmission channels, sensitive data classification, management and use of core data, and cannot meet the requirements of data security. control requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semitransparent encryption method and system for preventing sensitive information leakage, terminal and medium
  • Semitransparent encryption method and system for preventing sensitive information leakage, terminal and medium
  • Semitransparent encryption method and system for preventing sensitive information leakage, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] Aiming at the problems existing in the prior art, the present invention provides a translucent encryption method for preventing leakage of sensitive information. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Those of ordinary skill in the industry of the semi-transparent encryption method for preventing sensitive information from leaking provided by the present invention can also adopt other steps to implement, figure 1 The translucent encryption method provided by the present invention to prevent leakage of sensitive information is only a specific emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a semitransparent encryption method and system for preventing sensitive information leakage, a terminal and a medium, the semitransparent encryption method and system are combined with a transparent encryption strategy for use according to requirements to realize encryption by different departments according to the requirements, and the document interaction efficiency is compatible under the condition of ensuring the security of core data of a user; after a semitransparent encryption strategy is issued through the server platform, the client monitors read-write operation of an application program on a specified type of file in real time according to the strategy; an encrypted document and a common document are intelligently distinguished, and a strategy is controlled to process the encrypted document and the common document; and classifying, compressing and storing the encrypted document data and the common document data. The semitransparent encryption is used as an encryption strategy, can be independently used, and can also be combined with a transparent encryption strategy according to customer requirements, so that encryption can be carried out by different departments according to requirements, and the document interaction efficiency is compatible under the condition that the security of core data of a user is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a translucent encryption method, system, terminal and medium for preventing leakage of sensitive information. Background technique [0002] At present, with the popularity of Internet applications and people's dependence on the Internet, Internet security issues have become increasingly prominent. Malicious programs, various types of phishing and fraud continue to maintain rapid growth. At the same time, hacker attacks and large-scale personal information leakage incidents occur frequently. Accompanied by the substantial growth of various network attacks, the leakage of a large number of Internet users' personal information and property losses continue to increase. . According to public information, since 2011, 1.127 billion user privacy information has been leaked, including basic information, device information, account information, private information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
Inventor 詹伟查志勇余铮罗弦张科董亮徐焕龙霏邓国如郭峰金波
Owner STATE GRID CORP OF CHINA