CN204652407U - A kind of document security managing and control system - Google Patents
A kind of document security managing and control system Download PDFInfo
- Publication number
- CN204652407U CN204652407U CN201520258128.8U CN201520258128U CN204652407U CN 204652407 U CN204652407 U CN 204652407U CN 201520258128 U CN201520258128 U CN 201520258128U CN 204652407 U CN204652407 U CN 204652407U
- Authority
- CN
- China
- Prior art keywords
- document
- control system
- equipment
- security managing
- document security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
The utility model discloses a kind of document security managing and control system, described system comprises convergence switch and border router, also comprise network anti-leak equipment, log collection Analysis server, document encryption and decryption server, the PC, border router and the network anti-leak equipment connection that are connected with convergence switch respectively.Document security managing and control system described in the utility model not merely relies on encryption and decryption equipment, and introduce anti-data-leakage equipment, log collection Analysis server, the security reliability of system is strengthened, and it is easy and simple to handle, enthusiasm and the operating efficiency of employee work can be improved, adapt to document management demand.
Description
Technical field
The utility model relates to a kind of document security managing and control system, belongs to technical field of data security.
Background technology
Along with carrying out of IT application in enterprises work, and the progress of Internet technology, enterprise more and more pays close attention to the protection of own intellectual property and the safety problem of inner important documents.
But for the security management and control of document, more or less there is following problem in enterprise: have the equipment such as the computer of classified papers, mobile storage once loss can cause file to be divulged a secret; Rely on simple encipher-decipher method and carry out security management and control to document, its security reliability is not high, and trojan horse program easily steals confidential information; The disconnected outer net of the simple employing of employing, secrecy provision such as envelope USB port, non-print etc. can bring very big inconvenience to routine work, greatly reduce enthusiasm and the operating efficiency of employee work, can not adapt to regulatory requirement etc.Therefore, there is the problem that operation is inconvenient, security reliability is not high in existing document security managing and control system, causes have a strong impact on and threat the normal operation of enterprise.
Utility model content
The purpose of this utility model is, provide a kind of document security managing and control system, it is easy and simple to handle, and security reliability is high.
For solving the problems of the technologies described above, the utility model adopts following technical scheme: a kind of document security managing and control system, comprise convergence switch and border router, also comprise the network anti-leak equipment, log collection Analysis server, document encryption and decryption server and the PC that are connected with convergence switch respectively, border router and network anti-leak equipment connection.
In aforesaid document security managing and control system, described PC comprises document memory, stores all kinds of document information for PC.
In aforesaid document security managing and control system, described PC comprises employee's PC and manager's PC.
Aforesaid document security managing and control system also comprises the document print equipment be connected with PC.
In aforesaid document security managing and control system, described log collection Analysis server also comprises log memory, the log information of the various forms that the various kinds of equipment for log collection Analysis server storage collection produces.
Compared with prior art, the utility model relies on document encryption and decryption server and network anti-leak equipment to carry out omnibearing monitoring to the operation of document and transmission at bottom and follows the tracks of, generate relevant log information, upper strata relies on log collection Analysis server to obtain log information and the alarm of bottom CMOS macro cell, carry out unitizing and storing to information, the function of Realization analysis, association, tracing, evidence.
Document security managing and control system described in the utility model not merely relies on encryption and decryption equipment, and introduce anti-data-leakage equipment, log collection Analysis server, the security reliability of system is strengthened, and it is easy and simple to handle, enthusiasm and the operating efficiency of employee work can be improved, adapt to document management demand.
Accompanying drawing explanation
Fig. 1 is the system configuration schematic diagram of the utility model embodiment.
Reference numeral is: 1-convergence switch, 2-border router, and 3-network anti-leak is established, 4-log collection Analysis server, 5-document encryption and decryption server, 6-employee's PC, 7-manager PC, 8-the Internet.
Below in conjunction with the drawings and specific embodiments, the utility model is further described.
Embodiment
Embodiment of the present utility model: a kind of document security managing and control system, as shown in Figure 1, comprise convergence switch 1 and border router 2, also comprise the network anti-leak equipment 3, log collection Analysis server 4, document encryption and decryption server 5 and the PC that are connected with convergence switch 1 respectively, border router 2 is connected with network anti-leak equipment 3; Described PC comprises employee's PC 6 and manager's PC 7, and described employee's PC 6 and manager's PC 7 are equipped with document memory, and described PC is also connected with document print equipment; Described log collection Analysis server 4 also comprises log memory.
Operation principle: document encryption and decryption server 5 adopts frontier science and technology document security management system product (FD-DSM4.6) and PC to be deployed in same local area network (LAN); and carry out mutual; document encryption and decryption server 5 collects daily record; distributed key; electronic document on employee's PC 6 is encrypted protection on the spot; plain text document is become ciphertext document; employee's opening document can be controlled; can also control employee simultaneously and can carry out which operation to document, such as controllable operation has document reading, documents editing, document copying and document print etc.
Log collection Analysis server 4 adopts Topsec's log collection and analytical system product, and the daily record data of the different-format produced by distinct device carries out consolidation form process, extracts useful information, and clear, show manager's PC 7 clearly.Main realization, to original log efficient storage and inquiry, carries out diversified statistics and analysis to massive logs, supports the functions such as the System Management Mode of real time information security monitoring and "separation of the three powers".
Network anti-leak equipment 3 adopts Topsec network data anti-leak TopDLP-N product; be deployed between the convergence switch 1 of protected network and router two, so just can carry out anti-leak detection to the armamentarium under switch when the Internet 8 externally transmits.The major function that this equipment realizes be the identification of data attribute and detection, the identification of data content and detection, tactical management, data security event response dispose, the statistical analysis of all kinds of time, product self-management and with Third party system interface management etc.
Claims (5)
1. a document security managing and control system, it is characterized in that: comprise convergence switch and border router, also comprise the network anti-leak equipment, log collection Analysis server, document encryption and decryption server and the PC that are connected with convergence switch respectively, border router and network anti-leak equipment connection.
2. document security managing and control system according to claim 1, is characterized in that: described PC comprises document memory.
3. document security managing and control system according to claim 1 and 2, is characterized in that: described PC comprises employee's PC and manager's PC.
4. document security managing and control system according to claim 1 and 2, is characterized in that: also comprise the document print equipment be connected with PC.
5. document security managing and control system according to claim 1 and 2, is characterized in that: described log collection Analysis server also comprises log memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520258128.8U CN204652407U (en) | 2015-04-24 | 2015-04-24 | A kind of document security managing and control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201520258128.8U CN204652407U (en) | 2015-04-24 | 2015-04-24 | A kind of document security managing and control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204652407U true CN204652407U (en) | 2015-09-16 |
Family
ID=54105113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201520258128.8U Active CN204652407U (en) | 2015-04-24 | 2015-04-24 | A kind of document security managing and control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204652407U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106982355A (en) * | 2017-04-06 | 2017-07-25 | 浙江宇视科技有限公司 | The video monitoring system and anti-leak server of a kind of anti-image leakage |
-
2015
- 2015-04-24 CN CN201520258128.8U patent/CN204652407U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106982355A (en) * | 2017-04-06 | 2017-07-25 | 浙江宇视科技有限公司 | The video monitoring system and anti-leak server of a kind of anti-image leakage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104778420A (en) | Method for establishing safety management view of full life cycle of unstructured data | |
CN103413088A (en) | Computer document operational safety audit system | |
CN103326999A (en) | File safety management system based on cloud service | |
CN110222498A (en) | A kind of supervision management system and method based on mobile interchange cloud | |
CN103218575A (en) | Host file security monitoring method | |
CN103455744A (en) | Vein identification technology-based data security protection method and system | |
CN101763225A (en) | System and method for protecting virtual disk files | |
CN102609367A (en) | USB (Universal Serial Bus) flash disc system with safety control and audit | |
CN204652407U (en) | A kind of document security managing and control system | |
CN201854302U (en) | Active anti-disclosure based network security system | |
CN204680024U (en) | Computer security based on dynamic human face recognition technology is taken precautions against and early warning system | |
CN104331259A (en) | File protection based document-centralized file printing system | |
CN107770153B (en) | General electric power information acquisition system based on collaborative safety protection model | |
Zhang et al. | Research on network security analysis based on big data technology application | |
CN104463510A (en) | Finance management system | |
CN107315969A (en) | A kind of job instruction access system based on Quick Response Code | |
CN103699828A (en) | Information security management method | |
CN201608722U (en) | Secure physical isolation device for network | |
CN103685137A (en) | Method for preventing instant chat tool information from being stolen based on encryption | |
CN205788190U (en) | A kind of office computer information security managing and control system based on fingerprint identification technology | |
CN105205405A (en) | Novel electronic file safe management system | |
CN207053551U (en) | A kind of big data information management system | |
CN203299824U (en) | Computer safety device capable of achieving network physical isolation | |
Min et al. | Practices of agile manufacturing enterprise data security and software protection | |
CN114021171A (en) | Data security protection method based on big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |