Dynamic transparent isolation protection based enterprise data asset protection method

An asset and transparent technology, applied in the field of enterprise data asset protection based on dynamic transparent isolation and protection, can solve problems such as changing operating habits, high network performance requirements, and large impact areas, and achieves enhanced adaptability and robustness, network dependence Low sexiness, guaranteed consistent effect

Active Publication Date: 2015-07-01
南京盛泰惠智能科技有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can ensure that no secrets are kept locally, but it has high requirements on network bandwidth, and at the same time, when a failure occurs, the impact area is too large, which may easily cause long-term interruption of the operation of the enterprise information system
[0004] All in all, in terms of enterprise data asset protection, the existing solutions either use the idea of ​​"blocking" to control sensitive information transmission channels, without considering the security protection of data production and consumption ends, making it difficult to achieve comprehensive and effective control; or It is difficult to perform targeted encryption on the processes and data in the host. Only sensitive data and sensitive processes are processed, which affects system performance. At the same time, it is difficult to achieve personalized customization; or adopt the method of separating calculation and data Centralized data storage has high requirements on network performance, which changes the user's operating habits and increases the complexity of security management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic transparent isolation protection based enterprise data asset protection method
  • Dynamic transparent isolation protection based enterprise data asset protection method
  • Dynamic transparent isolation protection based enterprise data asset protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] In the embodiment of the present invention, in the example of the present invention, a method for protecting enterprise data assets based on dynamic transparent isolation protection, the steps are as follows:

[0022] (1) Divide the user host group into a risk host group and a trusted host group. The trusted host group is equipped with a security protection terminal, which can penetrate the core data assets to access the gateway, and then access the enterprise's core data assets; and the risk host group It is difficult to penetrate and can only access other network resources.

[0023] (2) In the hosts located in the trusted host group, the processes running in the system are divided into risk process domain and trusted process domain. Under the initial conditions, all processes are located in the risk process domain, and the process behavior is not controlled, but any behavior that accesses the core data assets of the enterprise will be detected, and then automatically ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic transparent isolation protection based enterprise data asset protection method. The dynamic transparent isolation protection based enterprise data asset protection method comprises the steps that user mainframe groups are into a risk mainframe group and a trusted mainframe group, wherein the trusted mainframe group is provided with a safety protection terminal, and enterprise core data asset can be accessed; the risk mainframe group cannot be accessed; progresses of mainframes of the trusted mainframe group are divided into risk progress domains and trusted progress domains, and the risk progress domains are converted into trusted progresses when sensitive data asset is accessed on purpose; transparent isolation protection processing is conducted on storage resources depended by the progresses to run, local OS environments and the like in the trusted processes, meanwhile a network and external access are under the control of a safety management strategy, and the risk progresses cannot access any data of a transparent isolation protection environment. By means of the dynamic transparent isolation protection based enterprise data asset protection method, the trusted processes and the risk progresses coexist, data leakage is avoided, local computing resources are applied to the maximum extent, and dependency on the network is reduced. The dynamic transparent isolation protection based enterprise data asset protection method has good adaptability and robustness.

Description

technical field [0001] The invention relates to the field of computer system security methods, in particular to an enterprise data asset protection method based on dynamic transparent isolation protection. Background technique [0002] In recent years, with the continuous advancement of informatization construction, the degree of informatization of enterprises has become higher and higher, and electronic data has become an important asset of enterprises, and the security and integrity of these data assets are directly related to the competitiveness of enterprises . Therefore, the security and leakage prevention of data assets has become an important part of the information security field, and it has also attracted the attention of more and more enterprises. Among the current data leakage prevention methods, the most widely used ones include control methods, encryption methods, filtering methods, and centralized control methods. [0003] The core idea of ​​the control metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q10/06
Inventor 陈锋鲍爱华
Owner 南京盛泰惠智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products