CN101098224A - Method for encrypting/deciphering dynamically data file - Google Patents
Method for encrypting/deciphering dynamically data file Download PDFInfo
- Publication number
- CN101098224A CN101098224A CNA2006100180298A CN200610018029A CN101098224A CN 101098224 A CN101098224 A CN 101098224A CN A2006100180298 A CNA2006100180298 A CN A2006100180298A CN 200610018029 A CN200610018029 A CN 200610018029A CN 101098224 A CN101098224 A CN 101098224A
- Authority
- CN
- China
- Prior art keywords
- key
- file
- server end
- document
- sman
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method for dynamically encrypting and decrypting data document, which comprises that in network condition, via C/S mode, manager centralized controls important documents of user computer, the system dynamically decrypts and encrypts clear text, the important documents can only be read or changed under the control of server in special network condition, which content is shown as cryptogram when off the network condition, when user copies clear text document from other places, the documents can not be changed when the system is sensitive, or else, in storage, the documents are converted into cryptogram type. The invention is based on software platform, correlated only with operation system, but not application programs, to dynamically encrypt and decrypt the data documents, therefore, the data documents can only work in private network condition, while the leaked document is in cryptogram type, to protect intellectual property.
Description
Technical field:
The present invention relates to the technical field of LAN data file security, a kind of method to data file dynamic encryption and decryption.
Background technology:
Along with further developing of computer and network technology thereof, global information integral and national security contradiction are progressively outstanding.Show to selling that from public document, enterprise engineering drawing, S.O.P. all kinds of documents are vital to steadily effectively moving of government, company.Therefore, information security has become the core of current government and enterprise security.Mention information security, people will expect virus damage and assault naturally.Actually this is not so, the loss that the loss that government and enterprise are caused because of information is stolen is caused considerably beyond virus damage and assault.According to authoritative institution investigation, the security threat 2/3rds or more is from divulging a secret and internal staff's crime, but not viral and external hacker causes.Network security protections such as fire compartment wall, intrusion detection, spacer assembly are for preventing that outside invasion from having irreplaceable effect; seem and have no way out and divulge a secret for inside; perhaps, the hacker who really has purpose to steal or destroy information just is being hidden in inside, may cause serious threat to government and enterprise at any time.
Our technical documentation or classified papers all are to be in expressly state such as word file, dwg drawing file etc., be easy to be blazed abroad and can open and use by the participant, as more existing systems as in soft mine dam, the network security row of company of SURFILTER etc. all be to monitor and can not stop the generation of this behavior.
Summary of the invention:
For the technical solution document or classified papers are easily divulged a secret from the participant such as word file, dwg drawing file and other clear text file and inner criminal blazes abroad and can open and use, the purpose of this invention is to provide a kind of method to data file dynamic encryption and decryption; This method is based on Microsoft's platform; only relevant with operating system and with concrete application program irrelevant the data file is carried out dynamic encryption and decryption, its data file can only be operated in the present networks environment, even the data file leakage; also be to be in the ciphertext state, played the effect that protects the intellectual property.
In order to realize the foregoing invention purpose, the present invention adopts following technical scheme:
A kind of method to data file dynamic encryption and decryption, in the windows network environment, its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, and the vital document in the centralized control subscriber computer, and by FTP client FTP it is expressly carried out dynamic encryption and decryption and manage; This vital document can only could be read or be revised by server controls in the network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
A kind of method to data file dynamic encryption and decryption, the structure function of its system comprises: client, server end and switch.
A, client after the client-side program of this software has been installed, are controlled by the strategy that server end is formulated, and the sensitive document of client is carried out dynamically encryption and decryption handle.When the user copies into clear text file from other places, make amendment when these files can not be in sensitiveness in system, otherwise when storage will be converted into the ciphertext form automatically and deposit; Its function is divided as follows:
A.) client layer comprises:
1) key distribution is used for the server end authentification of user, consults the key of each file with server end;
2) process monitoring is used for driving and service routine monitoring (DSMon);
3) policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises:
1) file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption;
2) process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end; Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
B, server end are used for the data base administration of strategy customization and key, comprising:
A.) hypervisor (SMan) is used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
C, switch are used for connecting the client and server end by the ssl protocol transmission.
A kind of method to data file dynamic encryption and decryption in native system, is carried out the qualified method of Collective qualification by server to subscriber data file; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
Its program circuit is as follows:
(1) after server OS starts, runtime server end service routine SMan and database D B; Server end service routine SMan is used to monitor the connection request of KeyPolDispatch.
(2) during the subscriber computer os starting, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon.
(3) KeyPolDispatch sets up SSL with SMan and is connected consulting session key.
(4) user logins to SMan by KeyPolDispatch, and KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon for the SMan checking; After having only checking correct, SMan just can provide key to KeyPolDispatch in the operation afterwards.
(5) FsFilter monitors common process will open a sensitive document time, and notice KeyPolDispatch is to the key of SMan application this document.
(6) key of SMan passback this document, KeyPolDispatch passes to FsFilter to this key.
When (7) common process read this document, FsFilter was decrypted content, and after this, system enters sensitiveness.
(8) during common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document and key on this machine, then encrypt storage, otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
(9) when system is in sensitiveness, if the file that is modified is not a sensitive document, it is that it distributes the required parameter of encryption to encrypt storage that FsFilter will require KeyPolDispatch, and it is made sensitivity label.
(10) during close file, if sensitive document and key on this machine, are then destroyed key.
(11) during common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of SMan application; SMan generates a new key, unique file sequence number and initial value IV, and SMan passes to KeyPolDispatch to these values, and encrypts these values of storage.
Because adopt technique scheme, the present invention has following superiority:
This a kind of method to data file dynamic encryption and decryption, based on Microsoft's platform, only relevant with operating system and with concrete application program irrelevant the data file is carried out dynamic encryption and decryption, be that realization to data file dynamic encryption and decryption is an inventive point with the file monitor driving; Our data file can only be operated in the network environment of our company like this, even data file is revealed, also is to be in the ciphertext state, has played the effect that protects the intellectual property.
Solve in the development of internet technology progressively distinct issues of global information integral and national security contradiction, solved maintaining secrecy and steadily effectively operation of public document, enterprise engineering drawing, S.O.P. and all kinds of documents; Overcome from divulging a secret and inner criminal, may cause serious threat to government and enterprise at any time.
Overcome technical documentation or classified papers and easily blazed abroad by the participant such as word file, dwg drawing file etc., and the generation that can stop its File Open to use.
The present invention has obtained trying out in the emphasis section office of my institute, has played the effect that well protects the intellectual property, and also makes us keep perch in commercial competition.
Description of drawings:
Fig. 1, be the system architecture diagram of data file dynamic encryption and decryption method;
Fig. 2, be the workflow diagram of data file dynamic encryption and decryption method;
Embodiment:
As shown in fig. 1: this kind operates in the windows network environment the method for data file dynamic encryption and decryption, and its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, the vital document in the centralized control subscriber computer, and by FTP client FTP other expressly carries out the management of dynamic encryption and decryption to its word file, dwg drawing file etc.; These vital documents can only could be read or be revised by server controls in the particular network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
This kind be to the software of data file dynamic encryption and decryption, and the client of its system configuration function after the client-side program of this software has been installed, is controlled by the strategy that server end is formulated, and the sensitive document of client carried out dynamically encryption and decryption handle; The function of its client is divided as follows:
A.) client layer comprises: key distribution is used for the server end authentification of user, consults the key of each file with server end; Process monitoring is used for driving and service routine monitoring (DSMon); Policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises: file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption; Process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end; Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
This kind is to the software of data file dynamic encryption and decryption, and the server end of its system configuration function after the server of this software has been installed, is used for the formulation of strategy and the data base administration of key, and its function is divided as follows:
A.) hypervisor (SMan).Be used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
This kind is to the software of data file dynamic encryption and decryption, and the switch of its system configuration function is used for connecting the client and server end by the ssl protocol transmission; Its ssl protocol is secure socket layer protocol (Securesocket Layer), mainly be to use the RSA arithmetic and the confidentiality and integrity of digital certificate technique protection message transmission X.509, it can not guarantee information non repudiation, mainly be applicable to the message transmission between point-to-point, Web Server mode commonly used; Secure socket layer protocol (SSL) is the security protocol based on the WEB application that Netscape proposes.
A kind of method to data file dynamic encryption and decryption in native system, is carried out the qualified method of Collective qualification by server to subscriber data file; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
As shown in Figure 2: its workflow is as follows:
1, in the windows network environment, after server OS starts (1), runtime server end service routine SMan and database D B, promptly ask (4), upload current daily record (5) by management, server end service routine SMan monitors the connection request of KeyPolDispatch, waits (2) to be connected.
2, during the subscriber computer os starting (16) of client, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon certificate server (17).
3, client service program KeyPolDispatch sets up SSL with server end service routine SMan and is connected, and consulting session key, server end enter connection request and judge (3).
4, when the service routine SMan user login (6) of the KeyPolDispatch of user by client to server end, KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon and verifies for the audit user profile (7) of the service routine SMan of server end.Enter by denying (8), after checking is correct, by, successful information (9) sent to finishing (10), the service routine SMan of server end just can provide key to client KeyPolDispatch in the operation afterwards, and authentication authorization and accounting server (17) passes through to encryption and decryption thread manager (18); After authentication failed, do not pass through, transmission failure information (11) is to finishing (10), and the service routine SMan of server end can show error message (28) by client certificate server (17), and process time-delay (29) is once more to server authentication.
5, the file filter of client monitoring driver FsFilter (23) monitors the common process of encryption and decryption thread manager (18),
In the time will opening a sensitive document (19), notice KeyPolDispatch is to the key of the service routine SMan of server end application this document, i.e. key request (15).
6, the key of the service routine SMan of server end passback this document, KeyPolDispatch passes to client file to this key and filters monitoring program FsFilter (23).
7, when common process reads this document, client file filter F sFilter (23) is decrypted content by encryption and decryption thread manager (18), and after this, system enters sensitiveness; Encrypt file stream (20) and document flow (21) are read.
8, when common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document (19) and key on this client computer, then encrypt storage; Otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
9, when system is in sensitiveness, if the file that is modified is not sensitive document (19), through letting pass by (22), will require KeyPolDispatch by the file filter device FsFilter (23) of client is that it distributes and encrypts required parameter, encrypt storage, and it is made sensitivity label.
10, when close file, if sensitive document (19) and key be on this machine, then encryption and decryption thread manager (18) is destroyed key.
11, when common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of the service routine SMan of server end application.Service routine SMan generates a new key, unique file sequence number and initial value IV, and the service routine SMan of server end passes to KeyPolDispatch to these values, and encrypts these values of storage.
If, system whether shut down (24) be the shutdown attitude, whether system is handling sensitive document (25), if system arrives end (27) through delay process again to finishing (26).
If when the user worked in this LAN environment, other clear text file such as its word file, dwg drawing file can only could be read or be revised by server controls in this particular network environment; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit; In case break away from the network environment at its place, its content just occurs with the ciphertext form.
Claims (3)
1, a kind of method to data file dynamic encryption and decryption is characterized in that: in the windows network environment, its equipment connects each client through switch by twisted-pair feeder by server end; The keeper is generated strategy by server end in the structure of native system, by C/S model, and the vital document in the centralized control subscriber computer, and by FTP client FTP it is expressly carried out dynamic encryption and decryption and manage; This vital document can only could be read or be revised by server controls in the network environment of the dynamic encryption and decryption program of data file quilt; In case break away from the network environment at its place, its content just occurs with the ciphertext form; When the user copies sensitive document into expressly from other places, make amendment when these files can not be in sensitiveness in system, otherwise during storage, will be converted into the ciphertext form automatically and deposit.
2, a kind of method according to claim 1 to data file dynamic encryption and decryption, it is characterized in that: the structure function of its system comprises: client, server end and switch;
A, client after the client-side program of this software has been installed, are controlled by the strategy that server end is formulated, and the sensitive document of client is carried out dynamically encryption and decryption handle.When the user copies into clear text file from other places, make amendment when these files can not be in sensitiveness in system, otherwise when storage will be converted into the ciphertext form automatically and deposit; Function is divided as follows:
A.) client layer comprises:
1) key distribution is used for the server end authentification of user, consults the key of each file with server end;
2) process monitoring is used for driving and service routine monitoring (DSMon);
3) policy control is used for the server end authentification of user, consults the key of each file with server end.
B.) core layer comprises:
1) file monitor drives (FsFilter), is used for to file read-write operation and controls, and vital document is made sensitivity label, and sensitive document is carried out encryption and decryption;
2) process monitoring drives (PsMon): the current state and the classification that are used for process that system is opened are monitored;
Key distribution is with policy control: with the server end authentification of user, consult the key of each file with server end.Drive and service routine monitoring (DSMon): when starting, the integrality of client-side program is verified at every turn.
B, server end are used for the data base administration of strategy customization and key, comprising:
A.) hypervisor (SMan) is used for that integrality to user and client software authenticates, generates, distributes, storage and backup keys, comprising: file conversion, authentification of user, key generation, key distribution and back-up storage;
B.) database (DB) is used to finish user profile, fileinfo, and key information is stored.
C, switch are used for connecting the client and server end by the ssl protocol transmission.
3, a kind of method to data file dynamic encryption and decryption according to claim 1 is characterized in that: this method is carried out the qualified method of Collective qualification by server to subscriber data file in native system; Simultaneously to the method for the vital document encryption and decryption that needs protection; Efficient in order to guarantee to visit has used grouping algorithm that these files are encrypted; Different sensitive documents has different keys, so key generates, distributes, stores and backup by server;
Its program circuit is as follows:
(1) after server OS starts, runtime server end service routine SMan and database D B; Server end service routine SMan
Be used to monitor the connection request of KeyPolDispatch.
(2) during the subscriber computer os starting, load document filter drive program FsFilter, PsMon, and start client service program KeyPolDispatch, DSMon.
(3) KeyPolDispatch sets up SSL with SMan and is connected consulting session key.
(4) user logins to SMan by KeyPolDispatch, and KeyPolDispatch extracts the feature of KeyPolDispatch, DSMon, FsFilter and PsMon for the SMan checking; After having only checking correct, SMan just can provide key to KeyPolDispatch in the operation afterwards.
(5) FsFilter monitors common process will open a sensitive document time, and notice KeyPolDispatch is to the key of SMan application this document.
(6) key of SMan passback this document, KeyPolDispatch passes to FsFilter to this key.
When (7) common process read this document, FsFilter was decrypted content, and after this, system enters sensitiveness.
(8) during common process revised file, when system is in sensitiveness, if the file that is modified be sensitive document and key on this machine, then encrypt storage, otherwise to the key of server application presents or create a new key and mark, and then encrypt storage.
(9) when system is in sensitiveness, if the file that is modified is not a sensitive document, it is that it distributes the required parameter of encryption to encrypt storage that FsFilter will require KeyPolDispatch, and it is made sensitivity label.
(10) during close file, if sensitive document and key on this machine, are then destroyed key.
(11) during common process creation file, if control strategy requires file that this common process creates must the ciphertext storage time, then to new key of SMan application; SMan generates a new key, unique file sequence number and initial value IV, and SMan passes to KeyPolDispatch to these values, and encrypts these values of storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100180298A CN101098224B (en) | 2006-06-28 | 2006-06-28 | Method for encrypting/deciphering dynamically data file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100180298A CN101098224B (en) | 2006-06-28 | 2006-06-28 | Method for encrypting/deciphering dynamically data file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101098224A true CN101098224A (en) | 2008-01-02 |
CN101098224B CN101098224B (en) | 2010-08-25 |
Family
ID=39011768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006100180298A Expired - Fee Related CN101098224B (en) | 2006-06-28 | 2006-06-28 | Method for encrypting/deciphering dynamically data file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101098224B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101572698A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Network transmission common encryption method for files |
CN101729550B (en) * | 2009-11-09 | 2012-07-25 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof |
CN102609667A (en) * | 2012-02-22 | 2012-07-25 | 浙江机电职业技术学院 | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program |
CN101572659B (en) * | 2008-04-30 | 2012-08-15 | 北京明朝万达科技有限公司 | Network sharing range control method for files |
CN103413100A (en) * | 2013-08-30 | 2013-11-27 | 国家电网公司 | File security protection system |
CN104506545A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Data leakage prevention method and data leakage prevention device |
CN104572169A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | Software distribution and installation system on basis of UEFI (Unified Extensible Firmware Interface) |
CN105245336A (en) * | 2015-11-12 | 2016-01-13 | 南威软件股份有限公司 | Document encryption management system |
CN107426151A (en) * | 2017-03-31 | 2017-12-01 | 武汉斗鱼网络科技有限公司 | A kind of file decryption method and device |
CN107925664A (en) * | 2015-08-31 | 2018-04-17 | 尤尼斯康通用身份控制股份有限公司 | Method for safely and efficiently accessing connection data |
CN112115493A (en) * | 2020-09-16 | 2020-12-22 | 安徽长泰信息安全服务有限公司 | Data leakage protection system based on data acquisition |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000236325A (en) * | 1999-02-09 | 2000-08-29 | Lg Electronics Inc | Device and method for enciphering digital data file |
US20170118214A1 (en) * | 2001-12-12 | 2017-04-27 | Pervasive Security Systems, Inc. | Method and architecture for providing access to secured data from non-secured clients |
CN1545295A (en) * | 2003-11-17 | 2004-11-10 | 中国科学院计算技术研究所 | A method for user-oriented remote access control of network file system |
-
2006
- 2006-06-28 CN CN2006100180298A patent/CN101098224B/en not_active Expired - Fee Related
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101572659B (en) * | 2008-04-30 | 2012-08-15 | 北京明朝万达科技有限公司 | Network sharing range control method for files |
CN101572698B (en) * | 2008-04-30 | 2014-07-02 | 北京明朝万达科技有限公司 | Network transmission common encryption method for files |
CN101572698A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Network transmission common encryption method for files |
CN101729550B (en) * | 2009-11-09 | 2012-07-25 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof |
CN102609667A (en) * | 2012-02-22 | 2012-07-25 | 浙江机电职业技术学院 | Automatic file encryption and decryption system and automatic file encryption and decryption method based on filter drive program |
CN103413100A (en) * | 2013-08-30 | 2013-11-27 | 国家电网公司 | File security protection system |
CN103413100B (en) * | 2013-08-30 | 2016-09-07 | 国家电网公司 | File security protection system |
CN104572169B (en) * | 2014-09-10 | 2017-10-27 | 中电科技(北京)有限公司 | A kind of software distribution and installation system based on UEFI |
CN104572169A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | Software distribution and installation system on basis of UEFI (Unified Extensible Firmware Interface) |
CN104506545A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Data leakage prevention method and data leakage prevention device |
CN107925664A (en) * | 2015-08-31 | 2018-04-17 | 尤尼斯康通用身份控制股份有限公司 | Method for safely and efficiently accessing connection data |
CN107925664B (en) * | 2015-08-31 | 2021-10-01 | 尤尼斯康通用身份控制股份有限公司 | Method for secure and efficient access to connection data |
CN105245336A (en) * | 2015-11-12 | 2016-01-13 | 南威软件股份有限公司 | Document encryption management system |
CN105245336B (en) * | 2015-11-12 | 2019-01-18 | 南威软件股份有限公司 | A kind of file encryption management system |
CN107426151A (en) * | 2017-03-31 | 2017-12-01 | 武汉斗鱼网络科技有限公司 | A kind of file decryption method and device |
CN112115493A (en) * | 2020-09-16 | 2020-12-22 | 安徽长泰信息安全服务有限公司 | Data leakage protection system based on data acquisition |
Also Published As
Publication number | Publication date |
---|---|
CN101098224B (en) | 2010-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101098224B (en) | Method for encrypting/deciphering dynamically data file | |
CN100568251C (en) | The guard method of security files under cooperative working environment | |
CN109561047B (en) | Encrypted data storage system and method based on key remote storage | |
US8135135B2 (en) | Secure data protection during disasters | |
CN100592313C (en) | Electric document anti-disclosure system and its implementing method | |
US9647834B2 (en) | Systems and methods with cryptography and tamper resistance software security | |
US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
WO2003107156A2 (en) | METHOD FOR CONFIGURING AND COMMISSIONING CSMs | |
CN103530570A (en) | Electronic document safety management system and method | |
CN105740725A (en) | File protection method and system | |
CN104219077A (en) | Information management system for middle and small-sized enterprises | |
CN107563221A (en) | A kind of certification decoding security management system for encrypting database | |
TWI573079B (en) | Information security management system and method for electronic document | |
CN1819590A (en) | Enciphering method of computer electronic documents | |
TWI381285B (en) | Rights management system for electronic files | |
CN115221538B (en) | Encryption method and system suitable for financial data | |
CN101826964A (en) | Outgoing document security management system supporting collaboration | |
CN113901507B (en) | Multi-party resource processing method and privacy computing system | |
CN111343421B (en) | Video sharing method and system based on white-box encryption | |
McGowan et al. | SAN security | |
CN110933042A (en) | Data security messenger method and system suitable for alliance chain | |
CN1617487A (en) | Preventing system for information leakage under cooperative work environment and its realizing method | |
CN104239810B (en) | A kind of encrypting and decrypting method and device based on remote control | |
Арустамов et al. | Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие | |
Johnson et al. | Healthcare system's operational security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100825 Termination date: 20110628 |