Information divulgement prevention method based on credible program

A program and trusted technology, applied in the field of information leakage prevention based on trusted programs, can solve data leakage and other problems

Inactive Publication Date: 2012-08-15
WUXI CINSEC INFORMATION TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, data security is very important to enterprises and institutions, so the data encryption industry came into being. For the terminals of various enterprises and institutions, do they use trusted applications to work, or do they have malicious intentions? People imitate trusted programs to cause data leakage of enterprises and institutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information divulgement prevention method based on credible program
  • Information divulgement prevention method based on credible program
  • Information divulgement prevention method based on credible program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.

[0015] Such as figure 1 , 2 As shown, a method for preventing information leakage based on a trusted program, wherein the method steps include:

[0016] First, the clients on the terminals of each enterprise and institution collect the secret-related applications that each enterprise and institution needs to use manually or automatically, and perform MD5 on the secret-related applications organized by each terminal The calculations are uploaded to the server for storage; each enterprise and institution establishes a server to store data, and when each enterprise and institution uses its own terminal, if an untrusted program is used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information divulgement prevention method based on a credible program. The method comprises the following steps of: establishing a server of each enterprise and public institution, arranging a storage module at each server, collecting an application program uploaded by a collection terminal, and storing and backing up the application program. The application program called by the terminal cannot be normally used until data of the application program are compared with that of each server. A credible progress of each client is collected manually or automatically; the credible progresses are subjected to MD5 value measurement, uniformly uploaded to the servers for storage, recorded and distributed and then monitored by each client in real time, so that whether the application program used by the current user is the credible program is judged; and therefore, the information confidentiality of the enterprise and public institution is guaranteed, and an information divulgement event caused by a program problem is effectively prevented.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and in particular relates to an information leakage prevention method based on a trusted program. Background technique [0002] In response to the popularization of computer applications and the development of the Internet and mobile storage devices, the previous paper documents have been gradually transformed into electronic documents. Electronic documents have many advantages such as small size and convenient viewing, which is also the reason for the rapid development of electronic documents. At the same time, the easy-to-change and easy-to-spread characteristics of electronic files have seriously affected the security of electronic file storage and communication. How to effectively store, centrally manage and use important files within enterprises and institutions becomes a file The security of drawings is facing severe challenges. [0003] For enterprises and institutio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06
Inventor 耿振明杨磊
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products