Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service system dynamic isolation protecting method and system based on browser

A business system, isolation and protection technology, applied in the field of information security, can solve problems such as cross-leaking of business systems, inability to use basic functions of browsers such as the Internet, and inability to isolate

Active Publication Date: 2014-01-29
CHINA NAT SOFTWARE & SERVICE
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the protection of such business systems by security software has the following limitations: 1) Whether to access the protected business system of the enterprise, the user needs to identify the access object in advance; 2) When the user recognizes that he wants to access the protected business system, It is not possible to use general-purpose browsers (such as Internet Explorer, Google Chrome, Firefox, etc.), and must rely on special security browsers; 3) Users need to manually switch modes to use protected business systems; 4) Enterprises need to change Hardware basic settings, access control through gateways and other devices; 5) The business system itself needs to be rebuilt; 6) When accessing the protected business system, you cannot access other business systems, nor can you use the basic functions of browsers such as the Internet
7) When users use the documents of the protected business system, they cannot be isolated, and there is a risk of cross-leakage between different business systems and cross-leakage between different users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service system dynamic isolation protecting method and system based on browser
  • Service system dynamic isolation protecting method and system based on browser
  • Service system dynamic isolation protecting method and system based on browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The browser-based business system dynamic isolation protection and its working method of the present invention will be further elaborated below in conjunction with the accompanying drawings.

[0067] In the present invention, users can freely use the business system without resorting to a special way such as a dedicated security browser, manually switching the security desktop, or hardware gateway equipment, and without any modification of the business system itself. The identification and isolation of protected business systems are done automatically without user participation. The present invention realizes the isolation and protection of the service system, does not affect the use of other functions by the user, does not change the user's usage habit, and satisfies the enterprise's requirements for data protection while taking into account the user's use experience.

[0068] figure 1 It is a schematic diagram of components in a browser-based business system dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a service system dynamic isolation protecting method and system based on a browser. According to the service system dynamic isolation protecting method and system based on the browser, intelligent recognition of a service system is taken as the core, a protected service system is dynamically recognized in real time, documents of the protected service system, users of the protected service system and users accessing the protected service system currently are bound, the protected service system is made to be isolated from the other service systems and external networks, and the documents of the current users are isolated from the other users. When the users access the protected service system through the browser, the accessing objects do not need to be recognized actively, manual switching is not needed, the assistance of a dedicated safe browser or other hardware equipment is not needed either, and the service system can be used directly. The users can continue to use the external networks or other service systems when using the protected service system. Meanwhile, isolation protection is carried out on the data of the protected service system, and thus the risks of exposure of data of enterprises are eliminated.

Description

technical field [0001] The invention relates to isolation and protection of business systems, in particular to a browser-based dynamic isolation and protection method for business systems, belonging to the field of information security. Background technique [0002] With the deepening of informatization, more and more enterprises use browser-based business systems (such as OA, ERP, etc.) to conduct centralized management of internal documents. After the centralized management of documents, in order to protect the security of documents under the premise of ensuring the normal use of documents by employees, various enterprises have adopted different measures, which can be mainly divided into two categories: 1) Restricting employee behavior through security systems; 2) Restricting employee behavior through security software Protect internal data. The way of institutionalized restraint cannot prevent the leakage of secrets caused by employees who choose to take risks out of per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 王文宇苑海彬刘玉红吴生东
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products