Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A browser-based business system dynamic isolation protection method and system

A business system, isolation and protection technology, applied in the field of information security, can solve problems such as cross-disclosure, inability to access other business systems, and inability to isolate

Active Publication Date: 2016-08-31
CHINA NAT SOFTWARE & SERVICE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the protection of such business systems by security software has the following limitations: 1) Whether to access the protected business system of the enterprise, the user needs to identify the access object in advance; 2) When the user recognizes that he wants to access the protected business system, It is not possible to use general-purpose browsers (such as Internet Explorer, Google Chrome, Firefox, etc.), and must rely on special security browsers; 3) Users need to manually switch modes to use protected business systems; 4) Enterprises need to change Hardware basic settings, access control through gateways and other devices; 5) The business system itself needs to be rebuilt; 6) When accessing the protected business system, you cannot access other business systems, nor can you use the basic functions of browsers such as the Internet
7) When users use the documents of the protected business system, they cannot be isolated, and there is a risk of cross-leakage between different business systems and cross-leakage between different users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A browser-based business system dynamic isolation protection method and system
  • A browser-based business system dynamic isolation protection method and system
  • A browser-based business system dynamic isolation protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The browser-based business system dynamic isolation protection and its working method of the present invention will be further elaborated below in conjunction with the accompanying drawings.

[0067] In the present invention, users can freely use the business system without resorting to a special way such as a dedicated security browser, manually switching the security desktop, or hardware gateway equipment, and without any modification of the business system itself. The identification and isolation of protected business systems are done automatically without user participation. The present invention realizes the isolation and protection of the service system, does not affect the use of other functions by the user, does not change the user's usage habit, and satisfies the enterprise's requirements for data protection while taking into account the user's use experience.

[0068] figure 1 It is a schematic diagram of components in a browser-based business system dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a browser-based business system dynamic isolation protection method and system. The present invention takes business system intelligent identification as the core, real-time and dynamic identification of protected business systems, and documents of protected business systems and protected business systems And the binding of users currently accessing the protected business system, so that the protected business system is isolated from other business systems and the external network, and the current user's documents are isolated from other users. When users access the protected business system through a browser, they do not need to actively identify the access object, do not need to manually switch, and do not need to resort to a special secure browser or other hardware devices, and can directly use the business system. While using the protected business system, users can continue to use the extranet and other business systems. At the same time, the data of the protected business system is isolated and protected to eliminate the risk of enterprise data leakage.

Description

technical field [0001] The invention relates to isolation and protection of business systems, in particular to a browser-based dynamic isolation and protection method for business systems, belonging to the field of information security. Background technique [0002] With the deepening of informatization, more and more enterprises use browser-based business systems (such as OA, ERP, etc.) to conduct centralized management of internal documents. After the centralized management of documents, in order to protect the security of documents under the premise of ensuring the normal use of documents by employees, various enterprises have adopted different measures, which can be mainly divided into two categories: 1) Restricting employee behavior through security systems; 2) Restricting employee behavior through security software Protect internal data. The way of institutionalized restraint cannot prevent the leakage of secrets caused by employees who choose to take risks out of per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王文宇苑海彬刘玉红吴生东
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products