Multi-network environment isolation method and terminal

A multi-network environment and terminal technology, applied in the multi-network environment isolation method and terminal field, can solve problems such as the inability to solve terminal data security well, and achieve the effects of meeting security isolation requirements, anti-virus data leakage, and simple deployment.

Inactive Publication Date: 2012-09-19
SANGFOR NETWORK TECH SHENZHEN
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a method that is convenient for users to perform safe operations in different working environments of the terminal, aiming at the problem that the existing technology cannot well solve the data security of the terminal in multiple working environments and the problem of convenient use. Multi-network environment isolation method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-network environment isolation method and terminal
  • Multi-network environment isolation method and terminal
  • Multi-network environment isolation method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0047] In the embodiment of the present invention, multiple isolated virtual environments are set in the same terminal, and different virtual environments are connected to different networks, thereby effectively ensuring data security in a multi-network environment, and is convenient for users to use, and reduces implementation costs. . The terminal in the embodiment of the present invention may be a personal PC or a mobile terminal such as a laptop computer and a smart phone. The following embodiments take a personal PC terminal as an example.

[0048] The multi-network environment isolation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-network environment isolation method and a terminal. The method comprises the following steps of: establishing a plurality of virtual environments in a terminal operation system, wherein a plurality of the virtual environments are mutually isolated and a plurality of the virtual environments are mutually isolated from an original environment in the terminal operation system; and setting access permissions for accessing different networks in a plurality of the virtual environments. The invention realizes a safe network access control and data isolation function in different virtual tabletops, so as to achieve the aims of preventing viruses and preventing data from being leaked; and the realization scheme has the characteristics of low cost, simple arrangement, safety and convenience for use, easiness for maintenance and the like.

Description

Technical field [0001] The invention relates to the field of computer virtual environments, in particular to a method and terminal for isolating multiple network environments. Background technique [0002] Inside an enterprise, there are generally three working environments: one is a normal office environment, where users perform personal document editing, use PC peripherals and other operations; the other is an Internet environment, where users connect to the Internet for network interaction ; The third is the internal business office environment of the enterprise, and users need to process confidential data in this environment. Faced with these environments, companies generally have the following solutions to achieve data security and anti-virus Trojan horses: [0003] The first is to restrict the use of the Internet. From the management perspective, the use of peripheral devices is restricted. Only work related to the internal business of the enterprise is allowed to be process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈楚明胡斌林彦
Owner SANGFOR NETWORK TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products