Computer system for data divulgence protection

A computer system and computer technology, applied in the field of information security, can solve problems such as the inability to balance the convenience and security of the data leakage protection system, and achieve the effects of reducing the possibility of illegal operations, simplifying the implementation method, and ensuring ease of use.

Active Publication Date: 2011-05-04
BEIJING SENSESHIELD TECH
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve the technical problem that the data leakage protection system in the prior art cannot be both convenient and safe, the present invention proposes a data leakage protection system that can prevent intentional or unintentional data leakage and is easy to operate at the same time. computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system for data divulgence protection
  • Computer system for data divulgence protection
  • Computer system for data divulgence protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] In this embodiment, the problem to be solved is to create different computer operating environments for users, so that users are in separate operating interfaces when operating sensitive data and non-sensitive data, so as to effectively protect data.

[0058] The application environment of this embodiment: all users who normally log in to the computer system and have successfully installed the application software of the multi-desktop management system.

[0059] according to figure 1 with figure 2 As shown, the specific scheme of the present embodiment is as follows:

[0060] 1. The desktop management system first creates multiple desktops for the logged-in user and names them. For example, create two desktops: "Work Desktop" and "Internet Desktop". In the Windows operating system, a new desktop can be created by calling the system interface function "CreateDesktop".

[0061] 2. The desktop management system sets the security level of "working desktop" and "Interne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer system for data divulgence protection. The computer system is characterized by comprising a plurality of parallel running desktops, wherein the desktops are provided with resource access strategies of different security levels respectively, and the plurality of desktops are isolated one another. The computer system for data divulgence protection creates differentcomputer operating environments for a user so that the user can operate sensitive data and non-sensitive data in respectively independent operating interfaces, an implementation method for a data divulgence protection system can be effectively simplified, and the possibility of illegal operation of the user is greatly reduced.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a computer system used for data leakage protection for data security protection in a computer. Background technique [0002] Sensitive data such as internal strategic planning, technical secrets, and commercial secrets widely exist in government agencies, enterprises and institutions. These sensitive data are usually required to be strictly limited to a certain range of use. If leaked outside the organization, it will harm the interests of the organization. Cause serious damage, even devastating blows. According to the survey, most of the leaks in the organization are caused by the intentional or unintentional operation of the internal staff. [0003] In order to prevent the occurrence of leaks, many organizations have strict management systems. For example, the R&D department of a high-tech enterprise usually uses a physically isolated internal network, and R&D ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/60
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products