Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security protection method and system based on hyper-fusion concept

A data security and reasonable technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., to prevent loss and ensure safety

Active Publication Date: 2019-12-06
湖南麒麟信安科技股份有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after several years of promotion in the domestic market, the products of foreign manufacturers have obvious "acclimatization". Log audit-based data leakage protection cannot meet the needs of those insiders who deliberately steal internal confidential information, or resigned employees who are full of resentment and copy important data, or even remove the hard disk directly to steal data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and system based on hyper-fusion concept
  • Data security protection method and system based on hyper-fusion concept
  • Data security protection method and system based on hyper-fusion concept

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In the following, the data security protection method and system based on the concept of hyper-convergence proposed by the present invention will be further described in detail by taking the actual user A logging in on the windows operating system, linux operating system, and Android device and performing file sharing and U disk export operations as an example.

[0034] Such as figure 1 As shown, the implementation steps of the data security protection method based on the concept of hyper-convergence in this embodiment include:

[0035] 1) The cloud desktop server receives a login request from the cloud desktop client;

[0036] 2) The cloud desktop server performs challenge-based identity authentication for the login request of the cloud desktop client. If the authentication passes, it will jump to the next step; otherwise, it will return the authentication failure information, end and exit;

[0037] 3) The cloud desktop server starts the cloud desktop virtual machine ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security protection method and system based on a hyper-fusion concept. The method comprises: carrying out, by a cloud desktop server, identity authentication after receiving a login request; if so, starting the cloud desktop virtual machine; after the cloud desktop virtual machine logs in, forbidding the login user to perform write operation on the peripheral equipment; and hiding the local disk, redirecting the desktop to the network disk and starting the resource manager, mounting the network disk encrypted and stored on the encrypted storage server in a centralized manner by the login user into the cloud desktop virtual machine to realize an encrypted storage function of user data, and approving and auditing data output operation of the login user. According to the invention, an integrated solution can be provided for data security protection, an identity authentication mechanism based on challenges, a virtual desktop environment, multi-level authorization document circulation approval, terminal equipment seal control, data centralized encryption storage and other functions are provided, the requirements for data security methods in China can be met, and the characteristics of comprehensive protection and cross-platform capacity support are achieved.

Description

technical field [0001] The present invention relates to the technical field of data security protection, in particular to a method and system for data security protection based on the concept of hyper-convergence. Background technique [0002] Data security protection technology started earlier in foreign countries, and has accumulated more than 10 years of technology accumulation. The leading manufacturers of foreign data security protection have indisputable advantages compared with domestic manufacturers in terms of product maturity, reliability, The stability and the integrity of the solution are ahead of domestic manufacturers. However, after several years of promotion in the domestic market, the products of foreign manufacturers have obvious "acclimatization". Log audit-based data leakage protection cannot meet the needs of those insiders who deliberately steal internal confidential information, or resigned employees who are full of resentment and copy important data,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F9/455
CPCG06F21/602G06F21/604G06F21/6218G06F9/45533G06F2221/2107G06F2009/45587
Inventor 罗毅波彭勇申锟铠李广辉陈松政杨涛
Owner 湖南麒麟信安科技股份有限公司