Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for ensuring computer information security in open environment

An information security, computer technology, applied in the field of information security

Pending Publication Date: 2017-11-17
宣以政
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Compared with the existing technology, the positive effect of the present invention is to solve the long-standing defects of the existing technology and products, overcome various disadvantages caused by manually setting the "white list program" rules, and aim at data security protection Problems in products such as document transparent encryption software, mandatory centralized control system, document security management system and secret disk products provide a new way to solve problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for ensuring computer information security in open environment
  • Method and system for ensuring computer information security in open environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] see figure 1 , the present invention provides a method and system for computer information security protection in an open environment. On the basis of the system desktop, a "closed" security desktop is constructed by using driver layer isolation technology, and the functions of the system desktop are kept intact. Affected. There may be one or more secure desktops. Ensure the legitimacy of secure desktop users through the login control module; provide users with data storage services through the virtual disk module; automatically encrypt the data on the secret disk through the disk transparent encryption module; automatically encrypt the files of the secure desktop through the document transparent encryption module; The desktop is used as a sign to identify legitimate programs, which realizes the purpose of avoiding manual setting of whitelist program policies; using drive layer isolation technologies such as network isolation, storage isolation, application isolation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for ensuring computer information security in an open environment. According to the method, on the basis of a computer operating system, an isolated and closed secure desktop is constructed with driver layer isolation technologies such as network isolation, storage isolation, application isolation and peripheral isolation. The system comprises a login control module, a secure desktop switching module, a network isolation module, a storage isolation module, an application isolation module, a peripheral isolation module, a virtual disk module, a disk transparent encryption module, a file transparent encryption module and a file import and export module; the secure desktop is used for completing secret-related work, and a system desktop is used for completing non-secret work. The method and system have the advantages that normal work is ensured in the open environment, and meanwhile important data is protected from leakage or divulgation or diffusion; with the secure desktop serving as an identifier for identifying process legality, the purpose of omitting manual setting of white list program strategies is achieved.

Description

technical field [0001] The present invention belongs to the technical field of information security, and in particular relates to data security protection. Using drive layer isolation technologies such as network isolation, storage isolation, application isolation, and peripheral isolation, a "closed" security desktop is constructed, and the security desktop is used for secret-related work. , to access the security information system, thereby preventing the leakage of internal data. Background technique [0002] With the popularization and application of computer and network systems, internal leaks and internal attacks have become the biggest hidden dangers that threaten network security applications, such as confidential documents, sensitive information, important data, design drawings, formulas, software source codes, etc. through different channels, Once methods and means are lost and leaked, once they fall into the hands of competitors or even hostile forces, the consequ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/54G06F21/60G06F21/62G06F21/78G06F21/80H04L29/06
CPCH04L63/02H04L63/0428H04L63/107G06F21/54G06F21/602G06F21/6209G06F21/78G06F21/80G06F2221/2107
Inventor 宣以政
Owner 宣以政
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More