Data resource security control method in thin client mode

A data resource and thin client technology, applied in the field of network security, can solve problems such as data loss, leakage or tampering, and achieve the effect of ensuring legality and authenticity

Active Publication Date: 2013-12-11
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF3 Cites 71 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although technologies such as trusted computing and host monitoring can improve the security protection capabilities of terminals, in the face of endless network attack methods, diverse usage scenarios,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data resource security control method in thin client mode
  • Data resource security control method in thin client mode
  • Data resource security control method in thin client mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The method of the present invention will be described in detail below in conjunction with the flow chart.

[0061] Step 1: Start the browser, the user logs in to the server through the USBKEY and user name and password, and the server completes the user's identity authentication through the identity authentication subsystem.

[0062] Server security management and control software supports multiple identity authentication methods: user name + password, USBKey + PIN code, CA digital certificate. At the same time, it supports custom configuration of password strength policy, account lock policy, pull KEY lock screen, terminal binding and other auxiliary functions.

[0063] Considering that the CA digital certificate system has been widely used and has been used as the basic condition of informatization, the identity authentication is completed by using the bottom library of the authentication device, authentication client and authentication server that has provided the CA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network security, and particularly relates to a data resource security control method in a thin client mode. The data resource security control method in the thin client mode comprises eight subsystems, namely the identity authentication subsystem, the remote application service subsystem, the security label subsystem, the file access control subsystem, the security communication subsystem, the security audit subsystem, the security storage subsystem and the management platform subsystem. Storage and control of files are mainly performed on a background server, the files are stored in different partitions according to user types or security levels of the files, the files are stored and protected, and a server side can not recognize the content of the files. When a user needs to have access to and process the files, the user logs in on a browser, identity authentication is conducted between the user and a server, and then file access connection is established. The files of a thin client are processed on the server side (provided by a physical application server or a virtual application server), no application or agent needs to be installed on the thin client, and interface interoperability is supported by related services released by remote application services.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a data resource security management and control method in a thin client mode. Background technique [0002] With the improvement of informatization popularization, the military, party and government or government agencies have established internal networks. Network erection and information system construction have brought many conveniences to these units, such as resource sharing, office automation, and convenient information transmission. Greatly improved work efficiency. However, with the improvement of the openness of the closed system, more and more information security issues have emerged at the same time. The openness and sharing characteristics of the network make the important information resources distributed in each host in a high-risk state, and these data are vulnerable to various malicious attacks such as illegal monitoring, illegal copying, and illegal acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/60
Inventor 周炼赤陈志浩段翼真武越王斌王晓程
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products