Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital content safeguard system based on transparent encryption and decryption method thereof

A technology of transparent encryption and decryption, digital content, applied in the field of information security, can solve the problems of subdivided authority control, low security, affecting user habits and so on

Inactive Publication Date: 2010-06-09
NORTHWEST UNIV(CN)
View PDF0 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Low security
Most products use the user mode of the operating system to complete the encryption and decryption operations. This method is low in security and will cause the digital content to be "landed in plain text" during use, that is, the plain text content is stored on the disk, which may easily lead to the loss of confidential information. and leaks;
[0006] 2. Low speed
Due to the relatively low speed of the encryption and decryption operations completed in the user mode of the operating system, the efficiency of file processing is not high enough; for example, the Shanghai Suoyuan Docsecurity system does not use a filter driver and changes the file format, so that the encrypted file must use a limited application program operation, the speed is low, and affects the user's usage habits;
[0007] 3. The authority control is not detailed enough
Although most security products can allow or deny users access to protected digital content, they cannot provide more subdivided permission control. This static security product that provides "all or zero" permissions cannot meet today's dynamic business needs.
For example, Iron Scroll Electronic Document Security System, although filter driver technology is introduced, does not support fine-grained authority control and cannot meet the dynamic needs of users;
[0008] 4. Lack of monitoring mechanism
Most similar products are relatively simple in design, and have not achieved a complete track record of digital content usage behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital content safeguard system based on transparent encryption and decryption method thereof
  • Digital content safeguard system based on transparent encryption and decryption method thereof
  • Digital content safeguard system based on transparent encryption and decryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The applicable operating system of the present invention has: Microsoft Windows XP, Microsoft Windows2000, Microsoft Windows 2003, Microsoft Windows vista etc.; Hardware environment: Pentium (R) 3CPU, more than 256M memory; Application software: Microsoft Office2000 / XP / 2003 / 2007, Adobe Reader, AutoCAD, etc.; Applicable development languages: C++, C, C#.

[0089] see figure 1 , a digital content security protection system based on transparent encryption and decryption, including a client and a server, wherein,

[0090] The client includes the following units:

[0091] The transparent encryption and decryption module interacts with the communication proxy module, and is used to receive the digital content encryption request sent by the application program through the communication proxy module, and encrypt the digital content according to the request; during the opening, reading and writing operations, through the communication proxy module Dynamically obtain the requir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information safety, providing a digital content safeguard system based on transparent encryption and decryption. The system comprises a transparent encryption and decryption module, an access control module, a monitoring module, a certificate authority module, a communication proxy module, a management center and a permission server module, wherein the transparent encryption and decryption module, the access control module and the monitoring module are on a client side, and the management center and the permission server module are on a server side; the client side and the server side are connected by the communication proxy module and the permission server module. Aiming at the safeguard system, the invention provides a dynamic encryption and decryption method which carries out encryption and access control to digital content as well as opens, reads and writes cipher texts. The method realizes transparent encryption and decryption to the digital content by realizing filtering driving on the bottom layer of an operating system and records an intact log to all operation of a user, thus improving system safety, and greatly improving encryption and decryption speed. Compared with the existing like products, the system of the invention has the advantages of safe and efficient encryption mode, fine grit access control, perfect log audit function and convenient and efficient management mode.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a digital content security protection system and an encryption and decryption method based on transparent encryption and decryption. Background technique [0002] With the widespread application of computers and the rapid development of the Internet, more and more technical inventions and innovations rely on computer technology. Therefore, many core confidential documents are stored electronically on computers, and even most of the core technical documents of enterprises It is an electronic document of design drawings, program source code, etc. Therefore, technological progress has brought new challenges to information security. The popularization of network technology and the widespread use of mobile office equipment, mobile storage devices, and notebook computers have brought efficiency and convenience to people and increased the risk of information being detecte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/00G06F21/10
Inventor 房鼎益张汉宁高丽汤战勇陈晓江杭继春高沛苏琳章哲安娜李磊赵玉洁杨朕何路陈峰王妮胡伟杨红
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products