Computer network environment isolation system implemented by using software

A computer network and software implementation technology, applied in computer security devices, internal/peripheral computer component protection, calculation, etc., can solve the problems of inconvenient operation and high cost, and achieve the effect of good compatibility and low cost

Active Publication Date: 2012-02-08
NANJING UNARY INFORMATION TECH
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are many technical solutions to the isolation between the internal and external networks. Among them, the original method is to use two computers, A and B, to connect the internal network and the external network respectively, which are independent and do not interfere with each other. Convenience: Another method is that the two hosts A and B are connected to the internal network and the external network respectively, but both share peripheral devices such as monitors and keyboards. Because there are two hosts, high cost is still an important disadvantage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network environment isolation system implemented by using software
  • Computer network environment isolation system implemented by using software
  • Computer network environment isolation system implemented by using software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0019] figure 1 Shows the hardware structural diagram of realizing computer environment isolation among the present invention, as figure 1 As shown, the computer is equipped with two physical network cards, and the network environment is dual wiring, wherein the one network card is connected to a non-secret network (such as an office subnet, the internet, etc.), and the other network card is connected to a secret network. Further, on the computer, a secret-related working environment is created through a virtual platform creation module: a virtual operating system is created through process monitoring and virtual desktop technology, and the virtual disk in the virtual operating system is used as a working disk in a secret-related working environment, Define the user name and password for entering the confidential environment; all data gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a computer network environment isolation system. The system comprises at least one computer, wherein the computer is connected to at least one non-confidential network and at least one confidential network; the computer comprises at least one first operating system connected with the non-confidential network and at least one second operating system connected with the confidential network; the computer also comprises an environment switching module, and the environment switching module is used for switching between the first operating system and the second operating system; and the first operating system cannot access the data in the second operating system. A virtual disk in a virtual operating system is used as the working disk under the confidential network environment, and a user can switch the two different operating systems in the non-confidential network and the confidential network, so data file and data transmission in different network environments can be controlled and isolated; and the system also has the characteristics of low cost and good compatibility.

Description

technical field [0001] The invention relates to a computer environment isolation system, in particular to a computer environment isolation system realized by software. Background technique [0002] With the continuous development of computer and network technology, computers will be in different working environments. Each terminal device must not only connect to the internal work network (such as the office network) but also need to access the external Internet, and the internal network may have multiple , In government agencies, large enterprises, etc., it is often encountered that applications need to be switched between multiple networks. At this time, network security issues are particularly important. [0003] Since this way of simultaneously connecting the internal and external networks has great security risks, measures are often taken to realize the isolation and conversion of multiple networks. The method for realizing network conversion in the prior art usually n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/74
Inventor 李毅张有成
Owner NANJING UNARY INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products