Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedded type file information security management system

An embedded file and information security technology, applied in the field of information security, can solve the problem of document transmission easily causing leakage and other problems

Active Publication Date: 2010-03-31
BEIJING LANXUM NEW TECH CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention aims to provide an embedded file information security management system, which can solve the problem that the management of files in the prior art is mainly enforced by the confidentiality management system, especially for paper files, which are basically completed by manual registration and review, resulting in file It is easier to cause leaks in transmission, distribution and other links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded type file information security management system
  • Embedded type file information security management system
  • Embedded type file information security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0020] image 3 A block diagram of an embedded file information security management system according to an embodiment of the present invention is shown, including:

[0021] Watermark embedding module 10, for generating the original paper document of embedding watermark;

[0022] The configuration and audit module 20 is used to configure the operation authority of the user;

[0023] The copy control module 30 is used to extract the confidential information of the watermark of the original paper document, and when it is judged that the current user has the authority to make a copy according to the confidential information and the operation authority of the current user, generate a watermark-embedded copy of the original paper document, And embed the current user's identity information in the watermark of the copy.

[0024] In this e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an embedded type file information security management system, comprising a watermark embedding module for generating an original paper file embedded with a watermark; aconfiguring and auditing module for configuring the operation authority of a user; and a copy control module for extracting the security classification information of the watermark of the original paper file, generating the watermark embedded type copy of the original paper file when the current user is judged to have the authority to copy according to the security classification information and the operation authority of the current user, and embedding the identification information of the current user in the watermark of the copy. The invention overcomes the drawback that file management inthe prior art is mainly implemented forcedly by security management system, particularly the paper file is basically registered and audited manually, leading to easy divulgence of documents in transmission and distribution.

Description

technical field [0001] The invention relates to the field of information security, in particular to an embedded file information security management system. Background technique [0002] The military, government, confidential scientific research and other units need to ensure the security of the distribution of secret documents. The existing implementation plan is to store intensive documents in a secret room, equip a dedicated copier in the secret room, and set up a full-time administrator to guard them. When the viewer needs to copy At that time, an administrator will check to ensure whether the document can be copied, and manually register the copy. The registration content includes the person who consulted, the date of copying, the title of the copied document, the number of pages copied, and the number of copies. Copying operations are permitted using copiers. The content of the copy registration is filled in by hand, and the characteristics of paper and handwriting ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/00H04N1/44
Inventor 李卫平
Owner BEIJING LANXUM NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products