Identity authentication based virtual terminal safety environment protection method and system

A technology of virtual terminal and security environment, applied in the field of protection of virtual terminal security environment, can solve the problems of data not being retained, data leakage, and data protection processing, etc., to prevent data leakage and ensure security.

Active Publication Date: 2014-05-07
北京明朝万达科技股份有限公司
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] A. For the sandbox technology, the data cannot be stored inside the environment, and the data cannot be protected and processed, and there is a risk of data leakage
[0022] B. For privacy protection technology, the addition of data is all manual operations, and does not provide protection for data generated by actual applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication based virtual terminal safety environment protection method and system
  • Identity authentication based virtual terminal safety environment protection method and system
  • Identity authentication based virtual terminal safety environment protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] image 3 It is the overall system frame diagram in the present invention.

[0077] The virtual terminal safety environment protection system based on identity authentication proposed by the present invention is generally divided into three layers: an intelligent storage monitoring layer, a storage service layer, and a core security layer. The intelligent monitoring layer is responsible for monitoring and analyzing the data access behavior of the application program, executing actions according to the configuration rules, and the redirection module transfers I / O access according to the access control rules; the storage service layer is responsible for encrypting or decrypting files or data, and recording files Mapping relationship; the core security layer is the foundation of the entire architecture, providing key management functions, providing encryption and decryption support for the storage service layer, and scheduling different algorithms according to requirements....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication based virtual terminal safety environment protection method and system. The system comprises an intelligent storage monitoring layer, a storage serving layer, and a core safety layer, wherein the intelligent storage monitoring layer comprises a storage access redirecting module, is in charge of monitoring and analyzing data access acts of application programs, and performs actions according to configuration rules, the storage access redirecting module transfers input/output access according to access control rules, the storage serving layer is in charge of encrypting and decrypting files or data and recording file mapping relations, and the core safety layer is the basis of the whole framework, provides a key management function, provides encryption and decryption support for the storage serving layer, and dispatches different algorithms as desired. By means of the identity authentication based virtual terminal safety environment protection method and system, safety of core application data can be protected, data leakage is prevented, and data inside and outside the environment are isolated without influence and do not influence user operation habits.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a method for protecting a virtual terminal security environment based on identity authentication and [0002] system. Background technique [0003] As smart terminals such as mobile phones are more and more widely used, the protection of data on smart terminals is becoming more and more urgent. For example, in recent years, with the rapid development and expansion of mobile networks, mobile policing has also had a bigger stage. Due to its professional specificity, better security of the network is required. The mobile network is an open environment for everyone, and anyone can intercept other people's information. Therefore, everyone focuses on link and access security, often ignoring local application security and data security. Once a mobile device is lost or mistaken, it will cause major consequences. At present, some mobile applications similar to sandbox technology ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/78
CPCG06F16/188G06F21/6218G06F21/78G06F2221/2107
Inventor 王志刚彭洪涛喻波王志海何晋昊
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products