Realization system and method for safely visiting and storing intranet data by mobile equipment

A mobile device, secure access technology, applied in the field of network security, can solve problems such as attacks, complex encryption algorithms for non-confidential data, leakage of secret data in the intranet, etc., to resist counterfeiting attacks and denial attacks, improve encryption and decryption efficiency, The effect of high authentication efficiency

Inactive Publication Date: 2010-08-11
JINAN UNIVERSITY
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Among them, the common security problem is: Unauthorized mobile devices are connected to the intranet of the unit. If the mobile device is infected with a virus at this time, the virus can easily bypass the anti-virus software deployed on the gateway of the intranet of the unit. and firewalls, attacking the internal network of the unit, and even leading to the leakage of secret data on the internal network
This method must rely on a third-party authentication center, which also leads to hidden dangers in the security of intranet data, and the authentication efficiency is not high
[0007] (3) There is no confidentiality classification for intranet data saved to mobile devices, and the same encryption algorithm is used for encryption of all data, which may result in the use of simple encryption algorithms for confidential data, and may also be used for non-confidential data using a complex encryption algorithm
Therefore, there are problems of low encryption efficiency and easy decryption of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization system and method for safely visiting and storing intranet data by mobile equipment
  • Realization system and method for safely visiting and storing intranet data by mobile equipment
  • Realization system and method for safely visiting and storing intranet data by mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] Such as figure 1 As shown, a system for implementing secure access and storage of intranet data by mobile devices, including:

[0048] The security management platform for accessing the intranet is used for registration and two-way authentication of mobile devices to access the intranet, registration of mobile devices allowed to access the intranet, and two-way authentication of registered mobile devices, allowing two-way After the successful authentication, the mobile device is connected to the intranet and monitored by the monitoring module, and the mobile device that has not registered and failed the two-way authentication is rejected to access the intranet, so that if the mobile device has not been authenticated by the platform, it will not be able to communicate with the intranet and computer equipment. exchange of information;

[0049] The monitoring module, which runs on the intranet, is used to monitor mobile devices accessing the intranet, save the monitoring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a realization system and a method for safely visiting and storing intranet data by mobile equipment. The method comprises the following steps: judging whether the mobile equipment is registered or not by a security management platform; carrying out mutual authentication on the registered mobile equipment; allowing the accession to the intranet after the authentication success; rejecting the accession to the intranet of unregistered mobile equipment and authentication failed mobile equipment; invoking an encryption module when a monitoring module discovers that the mobile equipment is about to store the intranet data in the intranet into the mobile equipment per se; selecting corresponding encryption methods by the encryption module under the monitoring of the monitoring module according to the confidentiality levels of the intranet data for encrypting the intranet data to be stored into the mobile equipment; and inquiring whether the encryption data is confidentiality data or not by a decryption module to the monitoring module in the intranet when the encryption data stored in the mobile equipment needs to be decrypted, and then, selecting corresponding methods for decrypting the encryption data. The invention implements different encryption and decryption methods according to different confidentiality levels, improves the encryption and decryption efficiency and data confidentiality, integrally utilizes the mutual authentication method and the encryption and decryption method, and improves the security of the intranet data.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a system and method for implementing secure access and storage of intranet data by mobile devices, and more specifically involves two-way authentication technology and data encryption and decryption between mobile devices and intranets technology. Background technique [0002] With the in-depth advancement of social informatization and the continuous development of mobile devices and networks, mobile devices are increasingly popular in various fields of society. Due to the advantages of easy portability and flexible use, mobile devices have developed rapidly in the process of informatization. Therefore, the use of mobile devices within the organization has also become a trend. At the same time, the use of mobile devices (such as laptops, cell phones, and PDAs, etc.) in the intranet has also caused a series of security issues. [0003] Among them, the common se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/28
Inventor 姚国祥罗伟其官全龙梁德恒魏林锋邱振谋
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products