Client computer for protecting confidential file, server computer therefor, method therefor, and computer program

A technology for confidential documents and computers, applied in computer security devices, computing, digital data protection, etc., can solve problems such as reduced office efficiency and poor convenience

Active Publication Date: 2011-10-26
IBM CORP
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] But even with these measures, there may be undue intrusions caused by forgetting to update the definition files of security software
Additionally, the above countermeasures force use...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
  • Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
  • Client computer for protecting confidential file, server computer therefor, method therefor, and computer program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] Hereinafter, embodiments of the present invention will be described with reference to the drawings. It should be understood that this example is an example illustrating a preferred embodiment of the present invention, and the content described here is not intended to limit the scope of the present invention. Also, the same symbols in the following drawings refer to the same objects unless otherwise specified.

[0096] figure 1 An example of a configuration of a client computer (101) representing an embodiment of the present invention is shown.

[0097] The client computer (101) includes a security requirement monitoring unit (102), an encryption / decryption unit (103), a compliance requirement storage unit (client side) (104), an encryption key storage unit (105), a decryption key storage unit part (106), encrypted object storage part (107). In addition, security software (108) such as antivirus software (109) and spyware monitoring software (110) and general applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A client computer includes an encryption/decryption unit for encrypting a confidential file in which an encryption key ID is embedded using an encryption key corresponding to the encryption key ID and decrypting the confidential file using a decryption key corresponding to the encryption key ID, an encryption key storage unit for storing the encryption key, a decryption key storage unit for storing the decryption key, a compliance requirement storage unit for storing security compliance requirements for the client computer transmitted from a server computer, and a security requirement monitoring unit for determining, according to a read command or a write command for the confidential file issued by application software, whether the client computer complies with the security compliance requirements, and, when the requirements are complied with, passing the encryption key and the encryption key ID corresponding to the encryption key from the encryption key storage unit to the encryption/decryption unit in response to the write command or passing the decryption key corresponding to the encryption key ID embedded in the encrypted confidential file from the decryption key storage unit to the encryption/decryption unit in response to the read command.

Description

technical field [0001] The present invention relates to a client computer and a server computer thereof, as well as a method and a computer program thereof, for protecting confidential documents. Background technique [0002] Outflow of confidential information caused by file sharing software such as P2P often occurs. The reason is that personal computers (hereinafter referred to as PCs) lack adequate security countermeasures. In order to prevent the leakage of confidential information from happening again, companies or government agencies are implementing the following countermeasures. [0003] ・The system administrator promotes security countermeasures for all PCs of each user. [0004] Introduce security software, such as antivirus software and spyware monitoring software, and instruct individual users on the security compliance requirements. [0005] Import the Health Check utility that monitors whether each user's PC satisfies the defined security compliance requirem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F12/00G06F21/20H04L9/08G06F21/62
CPCG06F21/6209H04L9/0897H04L9/32G06F21/577
Inventor 知念充野田伸介
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products