Unlock instant, AI-driven research and patent intelligence for your innovation.

Program and apparatus for blocking information leaks, and storage medium for the program

A technology of information leakage and programs, which is applied in the field of programs and devices and the storage media of the programs, and can solve problems such as hard-to-correct resources

Inactive Publication Date: 2005-04-20
FUJITSU LTD
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is difficult to grasp the use of this resource without error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program and apparatus for blocking information leaks, and storage medium for the program
  • Program and apparatus for blocking information leaks, and storage medium for the program
  • Program and apparatus for blocking information leaks, and storage medium for the program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Preferred embodiments of the present invention will be described below with reference to the accompanying drawings. The following description first outlines the invention and then gives a more specific description of how the invention can be practiced.

[0027] Fig. 1 shows the concept of the present invention applied to this embodiment.

[0028] The computer is made to function as the security device 1 by loading the information leakage prevention program according to the present invention.

[0029] The security device 1 is located between an operating system (OS) 2 and a resource 3 to obtain an access request to the resource 3 from the OS 2 and allow or deny the request based on a preset access right.

[0030] OS 2 controls the overall operation of the device. A process or application manipulates a resource 3 through the OS 2 . OS2 has access control functions to limit the use of files (including reading, writing, moving and copying). The resources 3 whose use is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A program for access control through simple procedures to prevent information leakage. When a user logs in, the security device retrieves the user's access right information from the access right information file, and creates a usage restriction table for the user. This use limit table shows the use limit for each resource. Before operating a resource, the device monitors and obtains access requests to the resource from the operating system. When obtaining an access request, the device extracts the use restriction information of the resource specified by the access request from the use restriction table, and restricts the use of the resource according to the use restriction information.

Description

technical field [0001] The present invention relates to a program and apparatus for preventing information leakage and a storage medium of the program, and more particularly, the present invention is applied to a program and apparatus for preventing information leakage through access control to computer system resources, and a storage medium of the program. Background technique [0002] An operating system (OS) has an access control function to prevent information leakage by allowing only authorized users to access files. Although the OS can perform access control on reading, writing, moving, and copying of files, it cannot perform higher-level control such that, for example, only using files on a computer is allowed, but not printing or taking out data through media or networks. [0003] In addition to OS functions, an access control method has been proposed. The method includes the steps of: obtaining an access request to the resource from a process or the OS before opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F9/46G06F12/00G06F21/00
CPCG06F21/6218G06F2221/2141
Inventor 宫本裕司山中祐介田悦佐佐木孝兴
Owner FUJITSU LTD