Enterprise mobile safety gateway method of application flow management, application acceleration and safety

A technology of application traffic and security gateway, applied in the field of data security and interaction, can solve problems such as hidden dangers of enterprise information security, illegal uploading of enterprise data, and performance degradation of mobile terminals, so as to improve performance and battery life, solve slow access speed, Effect of increasing data exchange speed

Inactive Publication Date: 2015-09-16
SHENZHEN HI GALAXY NETWORK SCI & TECH CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. Enterprise employees can access and store enterprise data at will, so there is a risk that enterprise data will be illegally uploaded, shared and leaked by individuals
Such as office emails, documents, pictures, communication records and short messages related to business content stored in mobile phones. The leakage of these sensitive information brings great information security risks to enterprises.
[0005] 3. The mobile device is lost or stolen, and the sensitive corporate data stored in the mobile device is also exposed to the risk of leakage
[0006] 4. Mobile phone viruses are growing exponentially, and mobile devices have become a springboard for infiltrating corporate intranets
[0012] (1) The current user solutions are only applicable to mobile terminals, and cannot be effectively transplanted to computer terminals with larger scale and higher utilization rate
[0013] (2) Since the protective measures are all applied to mobile terminals, and no standard user management system is used, there are great difficulties in management, and it is impossible to effectively manage users and mobile devices centrally
[0015] (4) Since all virus protection, security monitoring and other operations are performed by the mobile terminal, the load on the mobile terminal is greatly increased, resulting in reduced performance and increased energy consumption of the mobile terminal
At the same time, since the update of the software is completed by the individual mobile terminal, if it is not updated in time, it will cause security risks at the same time
[0016] (5) If some documents in the office area need to be opened by calling the program in the personal area, then the information will also jump from the office area to the personal area, which will still cause a great hidden danger to the information security of the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise mobile safety gateway method of application flow management, application acceleration and safety
  • Enterprise mobile safety gateway method of application flow management, application acceleration and safety
  • Enterprise mobile safety gateway method of application flow management, application acceleration and safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] When an enterprise mobile user needs to access sensitive data on an enterprise server, the software module running on the mobile terminal is designed to establish a VPN security channel with the gateway, and the gateway provides the mobile security administrator with information such as user identity, access content, used equipment, and equipment status. The software module running on the gateway implements corresponding security policies to control the mobile terminal's access to data based on the information provided by the user identity, access content, device use, and device status, and the mobile terminal interacts with the enterprise server for applications. At the same time, functions such as application delivery, application acceleration, and application security are implemented through the software modules running on the gateway.

[0037] Among the above software modules installed on the gateway, the following functional modules are included:

[0038] A. Applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise mobile safety gateway method of application flow management, application acceleration and safety. By utilizing a software module running on a mobile terminal and a software module running on a switch, various mobile terminal equipment, protection equipment and control data are managed in a unified manner. The method successively comprises the following steps: establishing a VPN safety channel between the software module designed to run on the mobile terminal and a gateway, providing a user identity, an access content, using equipment, equipment state and other information to a mobile safety administrator through the gateway, executing a corresponding safety strategy by the software module running on the gateway according to the provided user identity, the access content, the using equipment, the equipment state and the other information, controlling the mobile terminal to be capable of accessing the data authority, and performing application delivery, application acceleration and application safety through the software module running on the gateway. The interactive method can manage various mobile terminal equipment, protection equipment and control data in a unified manner, and can greatly improve enterprise mobile safety.

Description

technical field [0001] The invention relates to the fields of flow management, application delivery, application acceleration and security, and in particular to data security and interaction when using different network environments and various hand-held mobile terminals to access sensitive data. Background technique [0002] With the maturity and popularization of smart terminals, personal smart terminal devices represented by mobile phones and tablet computers have gradually entered the field of enterprise applications. According to the forecast of Gartner, an international authoritative consulting company, by 2014, 90% of enterprises will support employees to run corporate office applications on personal mobile devices. Employees using personal smart terminal devices for office work has become an irreversible trend. This phenomenon known as BYOD (Bring Your Own Device) has brought new challenges to enterprise security and management: [0003] 1. The mobile devices of cor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W24/02
CPCH04W12/06H04W24/02
Inventor 高振国杨海雷李孝金王倬遥
Owner SHENZHEN HI GALAXY NETWORK SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products