Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dataflow control method facing virtual desktop and information safety device

A virtual desktop and control method technology, applied in the field of information security, can solve problems such as illegal copying of internal sensitive data, data loss, etc., achieve strong practicability and ease of use, and prevent bypassing

Inactive Publication Date: 2015-11-11
BEIJING PENGCHUANG TIANDI TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the actual production system, there is a problem of security control of internal and external data flows. When the data exchange channel is opened, data can be transmitted bidirectionally between the virtual desktop and the operating platform. Once there are illegal personnel or Trojan horse programs, There is a possibility of illegal copying of internal sensitive data to external carriers, resulting in data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dataflow control method facing virtual desktop and information safety device
  • Dataflow control method facing virtual desktop and information safety device
  • Dataflow control method facing virtual desktop and information safety device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] An information security device capable of effectively preventing data from being stolen, the device comprising:

[0041] One or more servers, implement hardware virtualization technology on the server, virtualize a plurality of virtual machines, and deploy a virtual desktop system on the virtual machines;

[0042] One or more user terminals, the user operates on the terminal operating platform, accesses the virtual desktop system, and sends a data exchange request;

[0043] A hardware gateway, deployed between the virtual desktop and the operating platform;

[0044] The hardware gateway predefines a set of security policies as the basis for data flow control between the virtual desktop and the operating platform;

[0045] The hardware gateway intercepts the data exchange request and suspends the request, and parses the data exchange request to obtain request initiator information, request recipient information, and the data type of the request exchange;

[0046] The h...

Embodiment 2

[0050] A data flow control method applied to virtual desktops, comprising the following steps:

[0051] Add a middleman identity step between the virtual desktop and the operating platform;

[0052] The controlled establishment of a channel is carried out by an intermediary according to a defined policy.

specific Embodiment 2

[0053] Specific embodiment 2 is applied to the implementation of multi-level variable security requirements.

[0054] Such as figure 2 As shown, a virtual desktop-oriented data flow control method includes the following steps:

[0055] S1. The operating platform initiates a data exchange request to the virtual desktop;

[0056] S2. The identity authentication unit of the hardware gateway suspends the data exchange request;

[0057] S2. The identity authentication unit of the hardware gateway starts to parse the data exchange request, obtains the identity of the requester, the data type requested for exchange, that is, the data channel that is applied for establishment, and sends it to the data channel management unit. After receiving it, the data channel management unit will generate a query request , initiate a query to the policy management unit;

[0058] S3. The policy management unit reads a preset security policy;

[0059] S4. If the security policy allows the exchan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dataflow control method facing a virtual desk top and an information safety device. The method comprises the following steps that an identity of a middleman is added between the virtual desktop and an operation platform, and the middleman establishes control for channels according to set strategies. Thus, data exchange between the virtual desktop and the operation platform is effectively controlled, and data safety in the virtual desktop system is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for controlling data flow in a virtual desktop environment and an information security device. Background technique [0002] Virtual desktop is an emerging virtualization application. It uses hardware virtualization technology to virtualize a large number of virtual machines with a small number of servers, and deploys desktop operating systems on virtual machines to reuse server hardware resources. Users can use different terminals, such as traditional PCs, laptops, and smart phones. , thin terminal, etc. to access these desktop operating systems through the network. The virtual desktop has changed the management mode of terminals in the production environment. It has transformed the traditional decentralized management mode of user PC terminals into an intensive management mode, which can effectively reduce system operation and maintenance costs and worklo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/801
CPCH04L47/10H04L63/08H04L63/10H04L63/107H04L67/131
Inventor 李晓勇
Owner BEIJING PENGCHUANG TIANDI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products