A method for safe circulation of documents

A document and security technology, which is applied in the field of network information security, can solve the problems of unable to audit document circulation, data leakage, etc., and achieve the effect of improving the security management mechanism and recovering losses

Active Publication Date: 2020-10-16
北京长御科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Documents are circulated within the organization through email, instant messaging, U disk, and file sharing. These methods have hidden dangers of data leakage and cannot audit the circulation of documents.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for safe circulation of documents
  • A method for safe circulation of documents
  • A method for safe circulation of documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0043] Such as figure 1 As shown, the present invention proposes a method for safe circulation of documents, including the following steps:

[0044] S1: the first client sends a transmission request to the server, and the request includes relevant parameters of the document to be transmitted;

[0045] S2: the first client obtains the first link from the server, and sends the first link to the second client;

[0046] S3: the second client accesses the first li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe circulation method for documents, comprising the steps that a first client end sends transmission request to a server, wherein the request includes related parameters of documents to be transmitted; the first client end obtains a first link from the server, and sends the first link to a second client end; the second client end accesses to the first link and sends areceiving request to the server; the server conducts auditing on the receiving request, and if the audit is qualified, the document can be sent to the second client end; if the audit is not qualified,the second client end will be rejected to download documents. The invention is advantageous in that all documents requiring transmission are uploaded to the server for centralized management and storage; for the transmission of any documents, the monitoring and auditing of the server is a must, and thereby a large part of leaking accidents can be prevented; even if leaking accidents occur, leaking approaches can be rapidly found, so that where responsibility lies can be quickly ascertained and loss can be recovered.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a method for secure document transfer. Background technique [0002] The popularization and application of computers and networks makes the production, storage, acquisition, sharing and dissemination of information more convenient, but also increases the risk of important information leakage within the organization. At present, most of the relevant technologies use firewalls, intrusion detection or private networks, which can effectively prevent illegal access by external personnel, but cannot prevent internal personnel from sending some sensitive files to others via email or mobile storage media. Especially in recent years, the storage capacity of U disks and mobile hard disks has increased rapidly, and notebook computers have become more popular, which makes leak prevention more important and urgent. [0003] However, traditional document secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/10H04L67/06
Inventor 魏园
Owner 北京长御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products