Anti-leakage control method of terminal and terminal

A control method and anti-leakage technology, which is applied in the direction of instruments, electrical digital data processing, computer security devices, etc., can solve the problems of not being able to provide anti-leakage effects, and achieve the effect of low cost, high usability, and anti-leakage

Active Publication Date: 2012-07-18
SANGFOR TECH INC
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a terminal with good anti-leakage effect, high usability and low cost for the defects in the prior art that cannot provide a solution with good anti-leakage effect, high usability and low cost Anti-leakage control method and terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leakage control method of terminal and terminal
  • Anti-leakage control method of terminal and terminal
  • Anti-leakage control method of terminal and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0040] The present invention virtualizes a virtual environment in the operating system, and Internet operations can be performed in the virtual environment, and the original environment of the operating system is set as a relatively closed environment, which is kept disconnected from the external network. Users can only browse the web, chat, entertain, etc. in the virtual environment. It is forbidden to open files in the original environment in the virtual environment, thus avoiding the occurrence of leaks.

[0041] figure 1 It is a terminal anti-leakage control method 100 according to an embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-leakage control method of a terminal and the terminal, wherein the method comprises the following steps of: virtualizing an operating system, isolating a virtual environment, connecting the virtual environment with an extranet, and isolating the original environment of the operating system of a user from the extranet; checking whether a user behavior operation of opening a file exists in the virtual environment, wherein the user behavior operation includes all effective modes capable of opening the file; judging whether the file opened by the user is a file in the original environment if the user behavior operation of opening the file exists; and then preventing the file from being opened if the file opened by the user is the file in the original environment. The method disclosed by the invention can well prevent the leakage of confidential information, and exerts no effect on surfing chat entertainment of the user while exerting no effect on the normal work of the user, so that the usability is high. Besides, the existing arrangement environment is not necessarily changed, so that the cost is low.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method for controlling secret leakage prevention of a terminal and a terminal. Background technique [0002] With the popularization of information technology, especially network technology, the Internet has penetrated into all aspects of work and life. However, due to the uneven quality and security awareness of end users, conscious or unconscious leaks may occur at any time. [0003] Over the years, leaks have been happening, such as the 2002 "Legend" game source code leak, the 2003 Half-Life 2 source code leak, the 2004 Microsoft Windows source code leak, and the 2010 Kaspersky Internet Security 8 source code leak, As for the more familiar ones, such as WikiLeaks, etc., no matter which leak accident it is, it has had an indelible impact on the company or individual involved. [0004] To deal with the complex problem of leaking, there are many solutions, such as: [0005] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/74
Inventor 韦体东
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products