Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and apparatus for realizing information safety

An information device and information security technology, applied in the field of information security, can solve the problems of cumbersomeness, lack of operability, and inability to be followed and implemented by portable computer users, so as to achieve the effect of simple use and prevention of network leakage incidents

Inactive Publication Date: 2010-10-06
邹涛
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The problem with security and confidentiality rules and regulations is that their implementation depends entirely on people’s subjective consciousness, and it is impossible to guarantee technically that they can be truly observed and implemented by portable computer users.
There are two problems in this technology: (1) this technology can only provide the log data required for post-event inspection and analysis, and cannot prevent the occurrence of leaking incidents in time; Various ways to bypass, for example: information device users can choose to install or not install the software, if the user chooses not to install, the user can also perform illegal online operations; in addition, the user can also pass through various There are various methods or tools to delete historical records, reinstall the system, or even format the hard disk, thereby deleting the Internet log and passing the security inspection smoothly, so that such technology cannot play any role in security and confidentiality supervision.
These methods have the following problems: (1) The method of physical destruction makes the information equipment completely lose the function of accessing the Internet, causing users to be unable to use the computer to access the Internet when they need to access the legal network; (2) Control passwords or control If the equipment is managed by a security administrator, in fact, the security management is closely bound to the normal operation process, and the user of the information equipment needs the security administrator to execute the password every time before using the information equipment to access the legal network for Internet operations. Input or control device plug-in operation is very cumbersome and lacks operability
[0007] It can be seen that in the prior art, it is impossible to technically force the user to use the preventive technology, and even if the user has used the preventive technology in advance, the preventive technology can only be analyzed and checked after the event, resulting in the inability to Automatically prevent the occurrence of illegal Internet behaviors in time
[0008] In addition, in the prior art, there are also defects such as the inability to provide normal network communication functions in the case of legally surfing the Internet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for realizing information safety
  • Method and apparatus for realizing information safety
  • Method and apparatus for realizing information safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Embodiment 1, form special-purpose control member with the form of control circuit hardware:

[0058] see figure 1 , in the first embodiment, the information equipment to be protected for network information security includes at least:

[0059] Network communication device 14 and / or equipment I / O 15 that can provide network communication functions, dedicated control components 13, processor 11 and storage unit 12, wherein:

[0060] The processor 11 and the storage unit 12 are used to realize information processing and storage;

[0061] The network communication device 14 and / or the device I / O 15 capable of providing network communication functions are used to provide network communication functions for the information equipment;

[0062] The dedicated control component 13: used to determine whether the network connection type control function is currently available, and when it is determined that the network connection type control function is currently unavailable, d...

Embodiment 2

[0073] Embodiment 2, the network communication device in the information equipment itself is used as the dedicated control component:

[0074]In Embodiment 2 of the present invention, the dedicated control component for realizing the network communication control function is a special type of network communication device itself, and the dedicated control software is bound together with the drive software of the network communication device itself. It should be noted that the difference between this special type of network communication device and ordinary network communication devices is that the manufacturer of this special type of network communication device only provides a kind of driver software for this network communication device, and the driver software is the same as that of the present invention. The modules responsible for the network connection type control function in the special control software are bound together (that is: as long as the driver of this special t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed method and device for information security comprise: setting a network communication controller in the hardware and other special control members for providing message for whether device I / O interface on work state, and ensuring the device cannot provide network communication without installing a special control member for the control software. It can automatic detect periodically to decide whether the device access the internet. This invention can prevent that the device with secret data illegal accessing Internet efficiently.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and equipment for realizing information security. Background technique [0002] With the continuous development of information and network technology, leaks through the network continue to occur, often causing heavy losses to the country and enterprises. These include a large number of users who take confidential information equipment (especially portable information equipment such as portable computers) out of the unit or take them home, and violate relevant security and confidentiality regulations, and illegally connect them to the Internet (Internet) or connect to the Internet without authorization. The network or other networks that are prohibited from connecting, are attacked by network hackers to steal confidential information or users actively send confidential information, etc., resulting in leakage incidents. Since portable information devices such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L9/00H04L12/24H04L12/26H04L29/06
Inventor 邹涛
Owner 邹涛
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More