Specifically embodied in: stop and crack down on fake and shoddy products, stop and crack down on trademark infringement and patent infringement, and stop and crack down on copyright infringement and copyright infringement.
Electronic files protected as intellectual property rights include documents, design drawings, images, audio and video, etc.
It is very imperfect and unsystematic to rely solely on the above administrative means.
It provides a powerful tool for users to protect their intellectual property rights.
1. Monitor common application software
Commonly used office design application software such as MS Offices, PDF, AutoCAD, etc. Users only need to add programs to be monitored in IPPS environment, and they can complete the design and browse file information according to the usual application usage. The encryption and decryption operations of information files are transparent to users.
2. Automatic encryption and decryption technology
Dynamic encryption and decryption means that in IPPS environment, when users write files, the system will automatically encrypt and store them as ciphertext; When reading a file, the system automatically decrypts the file and opens it in clear text; The encryption and decryption process in the middle is driven by reading and writing I/O operations, which is completely transparent to users. It avoids a series of security risks that may be brought by active encryption (for example, the author forgot to encrypt the information file, or the author himself is an unsafe factor).
3. Prevent file information from leaking.
The client's hard disk retains ciphertext, and any important information files leaked through U disk copying and network transmission are ciphertext, and plaintext can only be seen in IPPS environment. At the same time, in a transparent and secure environment, copying, printing, copying, importing, exporting and internal and external communication are prohibited to prevent the client from actively revealing information. For the file illegally circulated to the outside, because the external PC is not authorized to log in and authenticate, it is impossible to obtain the contents of the encryption and decryption policy and the encryption key, and it is impossible to open the encrypted file at all. Prevent all files from being leaked by people or peripheral devices.
4. Accident tracking and evidence collection
The special log audit management software records the detailed information of all users, any time and specified application operations (reading, writing, deleting, modifying, etc.). ) detailed; And automatically generate various reports to facilitate log access and centralized management, as well as post-audit and accountability for leaks; There are various alarm mechanisms such as voice and email for users to choose from.