Terminal data isolation method and device for one-end multi-network environment

A technology of data isolation and environment, applied in program control devices, electrical digital data processing, instruments, etc., can solve the problems of waste of resources and low user convenience, and achieve the effect of ensuring safety, saving costs and office space

Active Publication Date: 2020-12-18
ELECTRIC POWER RES INST OF GUANGXI POWER GRID CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, at present, it is basically implemented in a terminal-specific way, and one terminal can only access one network, which results in a great waste of resources and relatively low user convenience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal data isolation method and device for one-end multi-network environment
  • Terminal data isolation method and device for one-end multi-network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , figure 1 It is a schematic flowchart of a method for isolating terminal data in a one-end multi-network environment in an embodiment of the present invention.

[0031] Such as figure 1 As shown, a terminal data isolation method in a multi-network environment at one end, log in to the host machine with administrator privileges to operate, make an application image according to the office needs of the unit, and push it to the application store, and set the image to allow the network container Running in, wherein, said method comprises:

[0032] S11: Start the network container corresponding to the network to be accessed, and start the desktop process;

[0033] In the specific implementation process of the present invention, the starting of the network container corresponding to the network to be accessed includes: initializing the LXC environment, building an isolated runtime environment, and loading the data volume corresponding to the network container...

Embodiment 2

[0056] see figure 2 , figure 2 It is a schematic diagram of the structure and composition of a terminal data isolation device in a one-end multi-network environment in an embodiment of the present invention.

[0057] Such as figure 2 As shown, a terminal data isolation device in a one-end multi-network environment, the device includes:

[0058] Startup module 11: used to start the network container corresponding to the network that needs to be accessed, and start the desktop process;

[0059] Display module 12: used for the desktop process to display the application software allowed to be used by the network container;

[0060] Judgment module 13: for when the network container is running, the host computer judges whether the application software, or running program, or data volume, or network behavior in the network container conforms to the preset configuration of the network container Certainly.

[0061] Specifically, for the working principle of the device-related ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal data isolation method and device for a one-end multi-network environment, and the method comprises the steps: logging in a host machine for operation through the authority of an administrator, making an application mirror image according to the office demands of a unit, pushing the application mirror image to an application store, and setting that the mirror image is allowed to run in a network container, the method comprises the steps that a network container corresponding to a network needing to be accessed is started, and a desktop process is started; thedesktop process displays application software allowed to be used by the network container; when the network container runs, the host machine judges whether the application software, or the running program, or the data volume, or the network behavior in the network container conforms to the preset of the network container or not; if yes, the network container operates normally; and if not, the network container refuses to operate. In the embodiment of the invention, when a plurality of networks are accessed on one terminal system, the application data corresponding to the networks can be isolated from each other, so that the safety of the data is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of terminal data isolation, in particular to a terminal data isolation method and device in a one-end multi-network environment. Background technique [0002] In the current user environment, there are multiple networks with different security requirements, such as government extranet, government intranet, Internet, and production network. In order to meet the security requirements of each network and prevent risk penetration and data leakage between different networks, At present, business processing is basically realized through "one terminal, one network", that is, the same PC can only access one network, and end users may use multiple PCs for office work at the same time. According to the relevant policy requirements in the industry, different networks should be isolated to prevent risk spread and data leakage security incidents. Therefore, at present, it is basically implemented in a terminal-s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F9/445G06F9/451G06F9/455G06F8/61
CPCH04L63/02H04L63/10H04L67/1095H04L67/34G06F9/445G06F9/451G06F9/45558G06F8/63G06F2009/45595Y02D10/00
Inventor 杨春燕宾冬梅余通凌颖黎新
Owner ELECTRIC POWER RES INST OF GUANGXI POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products