A method and device for public-private isolation

A public-private, workspace technology, applied in the field of public-private isolation, can solve problems such as root privilege abuse

Active Publication Date: 2016-02-17
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, due to the abuse of root permissions and new hacking techniques, mobile terminals can easily become a springboard for hackers to infiltrate the corporate intranet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for public-private isolation
  • A method and device for public-private isolation
  • A method and device for public-private isolation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated. The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] The company isolation method of the present invention ensures the safety of working data and applications on the mobile terminal by establishing a strict office area or work area on the mobile terminal, and by various means such as encryption and monitoring.

[0024] figure 1 It is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public and private isolation method and device. The method includes monitoring system events on a mobile terminal, judging whether the system events accord with a preset working area rule, executing operation corresponding to the system events in the working area space on yes judgment and encrypting and storing data corresponding to the operation in a database of the working area space. According to the public and private isolation method and device, a safe independent working area is built on the mobile terminal, all working data are stored in a protected safe area, personal applications cannot visit enterprise data, the enterprise data are prevented from being stored illegally by the personal applications, IT departments can well protect enterprise applications and the enterprise data, indistinctive personal application experience is provided for workers, and the dual purpose effect is achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a public-private isolation method and device. Background technique [0002] With the maturity and popularization of smart terminals, personal smart terminal devices represented by mobile phones and tablets have gradually entered the enterprise field. According to the forecast of an international authoritative consulting company, by 2014, 90% of enterprises will support employees to run corporate office applications on personal mobile terminals. Employees using personal smart terminal devices for office work has become an irreversible trend. This phenomenon, known as BYOD (BringYourOwnDevice, Bring Your Own Device Office), brings new challenges to enterprise security and management. The mobile devices of enterprise employees can access the mobile Internet or public / home Wi-Fi networks at any time and place, and the enterprise data in mobile terminals will also be exposed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/60H04W88/02
Inventor 王力王鹏程李旋苏云琳
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products