Confidential file protection method

A confidential file and computer technology, applied in memory systems, computer security devices, instruments, etc., can solve problems such as tampering and performance deterioration, reduce the possibility of tampering, suppress performance deterioration, and prevent improper access behaviors Effect

Inactive Publication Date: 2008-09-24
HITACHI SOFTWARE ENG
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] First, since it is an external authentication method that captures API release events, communication processing between the filter module and the application authentication module that captures API release events, and communication processing between the application authentication module and the I / O monitoring module, existence and pass The problem of performance degradation compared to internal code installation
Even if it is assumed that the application is authenticated only when the API of the file OPEN is captured, the performance of the application cannot be avoided because the file OPEN is issued multiple times.
[0013] Secondly, there is a possibility that the contents of the hash management table registering application information that is authorized to access confidential files may be falsified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidential file protection method
  • Confidential file protection method
  • Confidential file protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Hereinafter, an embodiment of the present invention will be specifically described with reference to the drawings.

[0045] figure 1 It is a functional block diagram showing an embodiment of a system (secret document protection system) to which the present invention is applied.

[0046] A client computer (secret file protection device) 1 includes a keyboard 2, a mouse 3, a display 4, a CPU 5, an external storage device 6, and a memory 7, and the memory 7 stores business application programs 101 for various tasks.

[0047] Furthermore, a process authentication / file I / O capture module 103 for protecting a confidential file 109 is stored.

[0048] The process authentication·file I / O capture module 103 has a process management table 107, captures the registration of the process and the file I / O command, and performs process authentication according to the management information registered in the process management table 107, for the process from which the authentication is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of protecting confidential files is provided to definitely protect business confidential files in accordance with a security policy. In the method of protecting confidential files, a management server registers in advance information of business applications to allow an access to confidential files and the information of such registered applications is distributed to each client as needed. When a business application refers to confidential files, it is judged (application is authenticated) at a starting-up time of a business application if the application is registered in advance in the server, and its own process information is registered in an I / O acquisition module only when the application is successfully authenticated. In the I / O acquisition module, the access to confidential information is permitted only in the case that a process is consistent with the registered process information, and any access is otherwise rejected.

Description

technical field [0001] The present invention relates to a method and a system for protecting business confidential files by controlling access to confidential information by business application programs in units of application programs or processes. Background technique [0002] In recent years, important personal information leaks such as customer information leaks have occurred frequently. For enterprises, the protection of customer information has become a matter of great concern. [0003] In addition, since April 2005, the personal information protection law has been fully implemented for private companies, so interest in security countermeasure applications has rapidly increased. [0004] In the security application program, it is important to protect the confidential information (data including personal information, etc.) that is not expected to be leaked to the outside in business, or the confidential information of the security application program itself (operation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F12/00G06F21/20G06F21/22G06F21/12G06F21/31G06F21/44G06F21/60G06F21/62
CPCG06F21/6245
Inventor 宫林尚英
Owner HITACHI SOFTWARE ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products