Information leakage preventing technology based on safety desktop for network environment

A technology of secure desktop and network environment, which is applied in the field of information leakage prevention based on secure desktop, can solve the problems of unable to prevent data leakage and employees themselves, and achieve the effect of providing convenience, convenient and flexible deployment, and preventing replay attacks

Inactive Publication Date: 2007-11-14
LINKAGE SYST INTEGRATION
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In short, this method can prevent people other than the owner of the personal computer from reading the data on this computer, but it cannot preven

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage preventing technology based on safety desktop for network environment
  • Information leakage preventing technology based on safety desktop for network environment
  • Information leakage preventing technology based on safety desktop for network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] 1 Structural diagram of the security desktop-based network environment information leakage prevention technology scheme:

[0063] The terminal can be inside the enterprise or outside the enterprise network. Because the SSL VPN networking mode is adopted between the secure desktop and the content control gateway, it can break through the limitation of the network boundary and ensure security.

[0064] 2 Flowchart of the security desktop-based network environment information leakage prevention technology solution:

[0065] The specific process diagram of this scheme is shown in Figure 11, which mainly includes:

[0066] Step ①: When the terminal computer tries to access the intranet server, it must first log in to the content control gateway.

[0067] The content control gateway checks whether the computer is enabled with a secure desktop, and this handshake negotiation mechanism is carried out periodically. Moreover, it is performed in an encrypted channel, effectivel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Through content control gateway (CCG), computer communicates to inner network server (INS). CCG is setup in front of INS. Computer inside inner network includes working software of 'security desktop'. Encrypted tunnel is adopted between computer and CCG. Cipher mode is used for local computer to save files. Cipher key is setup at local computer. Based on working software of 'security desktop', working system uses cipher mode to save files in local computer, and carry out network transmission. When trying to access INS, terminal computer must log on CCG first. Based on authorization of terminal and condition to activate 'security desktop', CCG determines whether to execute accessing proxy. If 'security desktop' is not activated, then access from the terminal is refused, or 'security desktop' is forced to be turned to on to continue accessing. Through 'security desktop', terminal can only access CCG, and cannot access other network addresses.

Description

technical field [0001] The invention relates to a network security method, in particular to an information leakage prevention method based on a secure desktop in a network environment. Background technique: [0002] The development of computer and network technology has turned many transactions that could only be handled manually into electronic processes. Daily tasks such as writing documents, producing design drawings, publishing news, and transmitting information can now be carried out in a highly electronic form. As electronic office and life become more and more irreplaceable, the resulting security factors have become increasingly severe. [0003] Many units and enterprises involving high confidentiality have to take various measures to deal with the harm of information leakage caused by computers and networks while enjoying the huge benefits brought about by electronic office. Under such demands, various terminal security solutions have emerged in the market. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/46G06Q10/00G06F21/00
Inventor 顾恺黄丽亚杨震刘道灿张尊平
Owner LINKAGE SYST INTEGRATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products