Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information leakage preventing technology based on safety desktop for network environment

A technology of secure desktop and network environment, applied in the field of information leakage prevention based on secure desktop, it can solve the problems of unable to prevent data leakage, unable to prevent employees themselves, etc., to achieve the effect of providing convenience, convenient and flexible deployment, and preventing playback attacks.

Inactive Publication Date: 2010-10-06
LINKAGE SYST INTEGRATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In short, this method can prevent people other than the owner of the personal computer from reading the data on this computer, but it cannot prevent the employee himself from
Moreover, this method cannot prevent employees from downloading data from the company's server and may cause data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage preventing technology based on safety desktop for network environment
  • Information leakage preventing technology based on safety desktop for network environment
  • Information leakage preventing technology based on safety desktop for network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] 1 Structural diagram of the security desktop-based network environment information leakage prevention technology scheme:

[0063] The terminal can be inside the enterprise or outside the enterprise network. Because the SSL VPN networking mode is adopted between the secure desktop and the content control gateway, it can break through the limitation of the network boundary and ensure security.

[0064] 2 Flowchart of the security desktop-based network environment information leakage prevention technology solution:

[0065] The specific process of this program is shown as Figure 11 As shown, it mainly includes:

[0066] Step ①: When the terminal computer tries to access the intranet server, it must first log in to the content control gateway.

[0067] The content control gateway checks whether the computer is enabled with a secure desktop, and this handshake negotiation mechanism is carried out periodically. Moreover, it is performed in an encrypted channel, effective...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Through content control gateway (CCG), computer communicates to inner network server (INS). CCG is setup in front of INS. Computer inside inner network includes working software of 'security desktop'. Encrypted tunnel is adopted between computer and CCG. Cipher mode is used for local computer to save files. Cipher key is setup at local computer. Based on working software of 'security desktop', working system uses cipher mode to save files in local computer, and carry out network transmission. When trying to access INS, terminal computer must log on CCG first. Based on authorization of terminal and condition to activate 'security desktop', CCG determines whether to execute accessing proxy. If 'security desktop' is not activated, then access from the terminal is refused, or 'security desktop' is forced to be turned to on to continue accessing. Through 'security desktop', terminal can only access CCG, and cannot access other network addresses.

Description

technical field [0001] The invention relates to a network security method, in particular to an information leakage prevention method based on a secure desktop in a network environment. Background technique: [0002] The development of computer and network technology has turned many transactions that could only be handled manually into electronic processes. Daily tasks such as writing documents, producing design drawings, publishing news, and transmitting information can now be carried out in a highly electronic form. As electronic office and life become more and more irreplaceable, the resulting security factors have become increasingly severe. [0003] Many units and enterprises involving high confidentiality have to take various measures to deal with the harm of information leakage caused by computers and networks while enjoying the huge benefits brought about by electronic office. Under such demands, various terminal security solutions have emerged in the market. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/46G06Q10/00G06F21/00
Inventor 顾恺黄丽亚杨震刘道灿张尊平
Owner LINKAGE SYST INTEGRATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products