Decoding and coding security isolation method based on double containers

A security isolation and dual-container technology, which is applied in the field of security isolation of decoding and encoding based on dual-containers, can solve problems such as difficult to find, and achieve the effect of preventing illegal and unknown input import and improving security

Pending Publication Date: 2020-11-20
ZHONGTIE XINAN BEIJING INFORMATION SECURITY TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is difficult to detect when the file contains content or the file contains an unknown virus T

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decoding and coding security isolation method based on double containers
  • Decoding and coding security isolation method based on double containers
  • Decoding and coding security isolation method based on double containers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0050] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a decoding and coding security isolation method, system and device based on double containers and a computer readable storage medium. The method comprises thefollowing steps: acquiring a target file from mobile equipment; decoding or analyzing the target file in a first container to obtain a visual target file; recoding the visual target file in a second container according to a preset rule, and taking the recoded file as a new target file; and importing the new target file into a local device, and importing the source file in pairs in an isolated manner. In this way, illegal unknown input import can be prevented, and the safety of file import is improved.

Description

technical field [0001] Embodiments of the present disclosure generally relate to the field of office security, and more specifically, relate to a dual-container-based decoding and encoding security isolation method, system, device, and computer-readable storage medium. Background technique [0002] With the continuous development of society, people use computers more and more frequently, and computers have become an indispensable tool in daily life. However, the ensuing security issues should also cause us to pay enough attention. [0003] With the popularization and use of mobile devices, viruses also wantonly infringe on users' computers along with the mobile devices. The principle of virus propagation is to rely on the automatic operation function of the operating system, so that when a computer user double-clicks to open a file with a virus, the virus and Trojan horse programs will automatically run, thereby causing the computer system to be polluted and invaded. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/53G06F21/56
CPCG06F21/53G06F21/56
Inventor 杨勇罗述涛唐三平
Owner ZHONGTIE XINAN BEIJING INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products