CN107770160B - Data security protection method, device and computer readable storage medium - Google Patents

Data security protection method, device and computer readable storage medium Download PDF

Info

Publication number
CN107770160B
CN107770160B CN201710928259.6A CN201710928259A CN107770160B CN 107770160 B CN107770160 B CN 107770160B CN 201710928259 A CN201710928259 A CN 201710928259A CN 107770160 B CN107770160 B CN 107770160B
Authority
CN
China
Prior art keywords
data
data transmission
intranet
virtual desktop
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710928259.6A
Other languages
Chinese (zh)
Other versions
CN107770160A (en
Inventor
周文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201710928259.6A priority Critical patent/CN107770160B/en
Publication of CN107770160A publication Critical patent/CN107770160A/en
Application granted granted Critical
Publication of CN107770160B publication Critical patent/CN107770160B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data security protection method, which comprises the following steps: detecting a data transmission request triggered based on a preset intranet safety virtual desktop; determining a data transmission mode corresponding to the data transmission request; and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy. The invention also discloses a data security protection device and a computer readable storage medium. The method and the device can reduce the leakage risk of the confidential data of the intranet.

Description

Data security protection method, device and computer readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data security protection method, device, and computer-readable storage medium.
Background
Data such as production, technology, customers, cost, strategic planning of an enterprise are always core confidential data on which the enterprise lives, and loss or leakage of the data often causes huge loss to the enterprise, so that how to effectively protect the data is a major concern of most enterprises.
At present, with the birth of VDI (Virtual Desktop Infrastructure) products, the problem of terminal data falling to the ground is thoroughly solved, that is, in a VDI system, all terminal data are uniformly stored in a cloud server, and a Virtual Desktop of an enterprise intranet needs to have a certain authority to acquire data of the cloud server, so that leakage of confidential data of the enterprise can be prevented to a certain extent by the method, but the following defects also exist: the authority of data external transmission of different virtual desktops in the intranet (that is, data is transmitted from the intranet to the external internet) is not clearly divided, and the flow of data between different virtual desktops in the intranet is not limited, so that if confidential data flows to a virtual desktop with the authority of data external transmission, the confidential data is likely to be leaked.
Disclosure of Invention
The invention mainly aims to provide a data security protection method, data security protection equipment and a computer readable storage medium, and aims to reduce the leakage risk of confidential data in an intranet.
In order to achieve the above object, the present invention provides a data security protection method, which comprises the following steps:
detecting a data transmission request triggered based on a preset intranet safety virtual desktop;
determining a data transmission mode corresponding to the data transmission request;
and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy.
Optionally, before the step of detecting a data transmission request triggered based on a preset intranet secure virtual desktop, the method may further include:
the method comprises the steps of dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop, wherein the intranet safe virtual desktop and the intranet non-safe virtual desktop are mutually isolated in network, setting the intranet safe virtual desktop to have local area network access permission but not external internet access permission, and setting the intranet non-safe virtual desktop to have external internet access permission but not local area network access permission.
Optionally, the step of performing policy control on the data transmission request according to the data transmission control policy includes:
acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
Optionally, the data transmission mode includes transmission through a USB interface, and the step of controlling the data to be transmitted according to the data transmission mode includes:
and when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted.
Optionally, the data transmission method further includes transmitting through a preset virtualization application, and the step of controlling the data to be transmitted according to the data transmission method further includes:
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
In addition, to achieve the above object, the present invention further provides a data security device, including: a memory, a processor, and a data security program stored on the memory and executable on the processor, the data security program when executed by the processor implementing the steps of:
detecting a data transmission request triggered based on a preset intranet safety virtual desktop;
determining a data transmission mode corresponding to the data transmission request;
and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy.
Optionally, the data security protection program further implements the following steps when executed by the processor:
the method comprises the steps of dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop, wherein the intranet safe virtual desktop and the intranet non-safe virtual desktop are mutually isolated in network, setting the intranet safe virtual desktop to have local area network access permission but not external internet access permission, and setting the intranet non-safe virtual desktop to have external internet access permission but not local area network access permission.
Optionally, the data security protection program further implements the following steps when executed by the processor:
acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
Optionally, the data transmission mode includes transmission through a USB interface and transmission through a preset virtualized application, and when executed by the processor, the data security protection program further implements the following steps:
when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted;
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium, having a data security program stored thereon, where the data security program, when executed by a processor, implements the steps of the data security method as described above.
The method comprises the steps of detecting a data transmission request triggered based on a preset intranet safety virtual desktop; determining a data transmission mode corresponding to the data transmission request; and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy. Through the mode, the virtual desktop in the intranet is set to comprise the intranet safety virtual desktop, and further data outgoing permission control and intranet data transmission strategy control are carried out on the data transmission request triggered based on the intranet safety virtual desktop, so that the leakage risk of the intranet confidential data can be reduced.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a data security protection method according to the present invention;
FIG. 3 is a schematic diagram of a scenario for dividing an intranet virtual desktop in an implementation of the present invention;
fig. 4 is a schematic diagram illustrating a detailed step of performing policy control on the data transmission request according to the data transmission control policy in fig. 2.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: detecting a data transmission request triggered based on a preset intranet safety virtual desktop; determining a data transmission mode corresponding to the data transmission request; and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy.
In the prior art, the virtual desktop infrastructure based on the VDI product can prevent the leakage of confidential data of an enterprise to a certain extent, but has the following defects: the authority of data external transmission of different virtual desktops in the intranet (that is, data is transmitted from the intranet to the external internet) is not clearly divided, and the flow of data between different virtual desktops in the intranet is not limited, so that if confidential data flows to a virtual desktop with the authority of data external transmission, the confidential data is likely to be leaked.
According to the method, the virtual desktop in the intranet is set to comprise the intranet safety virtual desktop, and further data outgoing permission control and intranet data transmission strategy control are carried out on the data transmission request triggered based on the intranet safety virtual desktop, so that the leakage risk of confidential data of the intranet can be reduced.
The invention provides a data security protection method.
As shown in fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The data security protection device in the embodiment of the present invention may be a terminal device such as a PC or a server (e.g., an X86 server) equipped with a virtualization platform.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the device architecture shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a data security program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to invoke a data security program stored in the memory 1005 and perform the following operations:
detecting a data transmission request triggered based on a preset intranet safety virtual desktop;
determining a data transmission mode corresponding to the data transmission request;
and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy.
Further, processor 1001 may call a data security program stored in memory 1005, and also perform the following operations:
the method comprises the steps of dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop, wherein the intranet safe virtual desktop and the intranet non-safe virtual desktop are mutually isolated in network, setting the intranet safe virtual desktop to have local area network access permission but not external internet access permission, and setting the intranet non-safe virtual desktop to have external internet access permission but not local area network access permission.
Further, processor 1001 may call a data security program stored in memory 1005, and also perform the following operations:
acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
Further, the data transmission mode includes transmission through a USB interface, and the processor 1001 may call a data security protection program stored in the memory 1005, and further perform the following operations:
and when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted.
Further, the data transmission mode further includes transmission through a preset virtualization application, and the processor 1001 may call the data security protection program stored in the memory 1005, and further perform the following operations:
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
Based on the hardware structure, the embodiment of the data security protection method is provided.
Referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of a data security protection method of the present invention, where the method includes:
step S10, detecting a data transmission request triggered based on a preset intranet safety virtual desktop;
the present embodiment may be implemented by a desktop virtualization server in a virtual desktop infrastructure. In the virtual desktop infrastructure, a desktop operating system is operated and enterprise applications are published on a desktop virtualization server of a data center, a user can use various enterprise applications anytime and anywhere only by remotely logging in a dedicated virtual desktop, and the effect is consistent with that of a desktop using a physical computer in an enterprise.
In the existing virtual desktop infrastructure, the authority of data external transmission of different virtual desktops in an intranet (that is, data is transmitted from the intranet to the external internet) is not explicitly divided, and the flow of data between different virtual desktops in the intranet is not limited, so that if confidential data flows to a virtual desktop with the authority of data external transmission, the confidential data is likely to be leaked. Therefore, the invention provides a data security protection method based on a virtual desktop infrastructure.
First, the virtual desktop of the intranet of the enterprise needs to be divided into an intranet secure virtual desktop and an intranet non-secure virtual desktop in advance, that is, before step S10, the method may further include: the method comprises the steps of dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop, wherein the intranet safe virtual desktop and the intranet non-safe virtual desktop are mutually isolated in network, setting the intranet safe virtual desktop to have local area network access permission but not external internet access permission, and setting the intranet non-safe virtual desktop to have external internet access permission but not local area network access permission. Referring to fig. 3, fig. 3 is a schematic view of a scene for dividing an intranet virtual desktop in the implementation of the present invention, wherein the intranet secure virtual desktop only allows access to a local area network and does not have a data outgoing permission; the intranet non-safety desktop only allows access to the internet, namely the external internet, and has a data outgoing permission, so that network isolation between the intranet safety virtual desktop and the intranet non-safety desktop is realized. At a certain moment, a user wants to transmit data in the divided intranet secure virtual desktop to an external network (including transmission to an intranet non-secure virtual desktop and transmission to the external internet), so that a corresponding data transmission request is triggered through the intranet secure virtual desktop, and at this moment, the desktop virtualization server detects the data transmission request triggered based on the preset intranet secure virtual desktop.
Step S20, determining a data transmission mode corresponding to the data transmission request;
because the intranet security virtual desktop does not have the access right of the external internet, the data transmission request has two conditions: the requested data is streamed or transferred to the external storage device within the intranet. At this time, the desktop virtualization server further determines a data transmission mode corresponding to the data transmission request. When the data is transferred to the external storage device, the data transmission mode corresponding to the data transmission request may include transmission through a USB interface, a printer, or a recorder; when data is circulated in the intranet, the data transmission mode corresponding to the data transmission request may include transmission through a preset virtualization application (e.g., a mail application, a chat application). Specifically, the desktop virtualization server may parse the detected data transmission request to determine the corresponding data transmission manner, for example, if the detected data transmission request is to send data to an external storage device connected to the client, the corresponding data transmission manner may be determined to be transmitted through the USB interface.
Step S30, a preset data transmission control policy corresponding to the data transmission mode is loaded, and the data transmission request is policy-controlled according to the data transmission control policy.
After the data transmission mode corresponding to the detected data transmission request is determined, the desktop virtualization server loads a preset data transmission control strategy corresponding to the data transmission mode, and carries out strategy control on the data transmission request according to the loaded data transmission control strategy. The data transmission management and control policy corresponding to the data transmission request may be flexibly set according to actual needs, and a data transmission manner is described as an example of transmission through a preset virtualized application.
The virtualized application relies on application virtualization technology, so-called application virtualization, that is, the human-computer interaction logic (application program interface, keyboard and mouse operations, audio input and output, card reader, printout, etc.) of an application program is isolated from the computing logic, when a user accesses an application virtualized by a server, the user client transmits the human-computer interaction logic to the server, the server establishes an independent session space for the user, the computing logic of the application program operates in the session space, then the changed human-computer interaction logic is transmitted to the client and displayed on corresponding equipment of the client, so that the user obtains the same access feeling as the local application program.
In this embodiment, an application virtualization technology is adopted in the virtual desktop infrastructure, and when the data transmission mode is transmission through a preset virtualization application, the corresponding application scenario may be: according to business needs, a research and development team of an enterprise needs to send mails to a technical support team, the research and development team uses an intranet secure virtual desktop, the technical support team uses an intranet non-secure virtual desktop, and if confidential data of the enterprise is sent in the mails, the confidential data has a risk of being sent out through the intranet non-secure virtual desktop, so that a corresponding data transmission control strategy can be set as follows: when a research and development team sends a mail to a technical support team, the system starts an auditing or approving program, related personnel audit or approve the mail content, the mail is allowed to be sent only when the auditing or approving is passed, and in addition, the auditing or approving result can be stored so as to facilitate subsequent tracing. Therefore, when the desktop virtualization server detects a data transmission request based on the preset mail application, the content of the mail is audited or approved according to the strategy, and the mail is allowed to be sent only when the audit or approval is passed, so that the risk of sending confidential data is reduced.
It should be noted that, in addition to the above auditing or approving manner, the data to be transmitted may be encrypted by the encryption software and then transmitted, and the data may be flexibly set in specific implementation.
In this embodiment, the desktop virtualization server detects a data transmission request triggered based on a preset intranet secure virtual desktop; determining a data transmission mode corresponding to the data transmission request; and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy. In this way, this embodiment sets up the virtual desktop in the intranet into including intranet safety virtual desktop, and then carries out data outgoing authority management and control and intranet data transmission strategy management and control to the data transmission request based on this intranet safety virtual desktop triggers to can reduce enterprise intranet confidential data's the risk of revealing.
Further, based on the first embodiment of the data security protection method of the present invention, a second embodiment of the data security protection method of the present invention is provided. Referring to fig. 4, fig. 4 is a schematic diagram illustrating a detailed step of performing policy control on the data transmission request according to the data transmission control policy in fig. 2. Based on the embodiment shown in fig. 2, the step of performing policy control on the data transmission request according to the data transmission control policy may include:
step S31, acquiring the data to be transmitted corresponding to the data transmission request;
step S32, auditing or approving the acquired data to be transmitted according to a preset rule;
and step S33, when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
In this embodiment, when the desktop virtualization server performs policy control on the data transmission request, the data to be transmitted corresponding to the data transmission request may be first obtained, and then the obtained data to be transmitted is audited or approved according to a preset rule. The auditing can comprise judging the confidentiality degree of the data to be transmitted, and if the data is preset data with higher confidentiality degree without transmission permission, the auditing is not passed; the examination and approval is to send the data to be transmitted to a corresponding examination and approval person (such as a leader) for examination and approval so as to determine whether the data to be transmitted has transmission authority. When the method is implemented specifically, the rules of auditing or approving can be flexibly set, for example, whether the mail is allowed to be sent or not can be judged only by a sender and a receiver of the mail, or whether the mail is allowed to be sent or not is determined by judging the confidentiality degree of data to be sent, and the like; and if the audit or the approval is not passed, forbidding the transmission of the data to be transmitted, and if the audit or the approval is passed, controlling the data to be transmitted to transmit according to the corresponding data transmission mode.
Further, the data transmission mode may include transmission through a USB interface and transmission through a preset virtualized application.
When the data transmission mode is transmission through a USB interface, the desktop virtualization server calls the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted so as to transmit the data to be transmitted to the external storage device; when the data transmission mode is transmission through a preset virtualization application, the desktop virtualization server sends the data to be transmitted to the corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted, wherein a network where the application virtualization server is located, an intranet safe virtual desktop and a network where the intranet non-safe virtual desktop is located are both in communication, and the data to be transmitted sent by the intranet safe desktop can be forwarded to the intranet non-safe virtual desktop.
According to the embodiment, the data to be transmitted is audited or approved, and the data to be transmitted is allowed to be transmitted only when the audit or approval is passed, so that the leakage risk of confidential data in an intranet is greatly reduced.
The invention also provides data safety protection equipment.
The data security protection device of the invention comprises: a memory, a processor, and a data security program stored on the memory and executable on the processor, the data security program when executed by the processor implementing the steps of:
detecting a data transmission request triggered based on a preset intranet safety virtual desktop;
determining a data transmission mode corresponding to the data transmission request;
and loading a preset data transmission control strategy corresponding to the data transmission mode, and carrying out strategy control on the data transmission request according to the data transmission control strategy.
Further, when executed by the processor, the data security protection program further implements the steps of:
the method comprises the steps of dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop, wherein the intranet safe virtual desktop and the intranet non-safe virtual desktop are mutually isolated in network, setting the intranet safe virtual desktop to have local area network access permission but not external internet access permission, and setting the intranet non-safe virtual desktop to have external internet access permission but not local area network access permission.
Further, when executed by the processor, the data security protection program further implements the steps of:
acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
Further, the data transmission mode includes transmission through a USB interface and transmission through a preset virtualized application, and the data security protection program further implements the following steps when executed by the processor:
when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted;
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
The method implemented when the data security protection program running on the processor is executed may refer to the embodiment of the data security protection method of the present invention, and details thereof are not described here.
The invention also provides a computer readable storage medium.
The computer readable storage medium of the present invention stores a data security program, and the data security program implements the steps of the data security method as described above when executed by a processor.
The method implemented when the data security protection program running on the processor is executed may refer to the embodiment of the data security protection method of the present invention, and details thereof are not described here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (6)

1. A data security protection method is characterized by comprising the following steps:
dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop which are mutually isolated from each other in a network, and setting the intranet safe virtual desktop to have local area network access authority but not external internet access authority, wherein the intranet non-safe virtual desktop has external internet access authority but not local area network access authority;
detecting a data transmission request which is triggered based on the intranet safety virtual desktop and is transmitted to an external network;
determining a data transmission mode corresponding to the data transmission request;
loading a preset data transmission control strategy corresponding to the data transmission mode, and acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
2. The data security protection method according to claim 1, wherein the data transmission mode includes transmission through a USB interface, and the step of controlling the data to be transmitted according to the data transmission mode includes:
and when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted.
3. The data security protection method according to claim 1, wherein the data transmission mode includes transmission by a preset virtualized application, and the step of controlling the data to be transmitted according to the data transmission mode includes:
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
4. A data security apparatus, the data security apparatus comprising: a memory, a processor, and a data security program stored on the memory and executable on the processor, the data security program when executed by the processor implementing the steps of:
dividing an intranet virtual desktop into an intranet safe virtual desktop and an intranet non-safe virtual desktop which are mutually isolated from each other in a network, and setting the intranet safe virtual desktop to have local area network access authority but not external internet access authority, wherein the intranet non-safe virtual desktop has external internet access authority but not local area network access authority;
detecting a data transmission request which is triggered based on the intranet safety virtual desktop and is transmitted to an external network;
determining a data transmission mode corresponding to the data transmission request;
loading a preset data transmission control strategy corresponding to the data transmission mode, and acquiring data to be transmitted corresponding to the data transmission request;
auditing or approving the acquired data to be transmitted according to a preset rule;
and when the audit or the approval is passed, controlling the data to be transmitted according to the data transmission mode.
5. The data security device of claim 4, wherein the data transmission modes include transmission through a USB interface and transmission through a preset virtualized application, and the data security program when executed by the processor further implements the steps of:
when the data transmission mode is transmission through a USB interface, calling the USB interface of the intranet safety virtual desktop to transmit the data to be transmitted;
and when the data transmission mode is transmission through a preset virtualization application, sending the data to be transmitted to a corresponding application virtualization server so that the application virtualization server transmits the data to be transmitted.
6. A computer-readable storage medium, having stored thereon a data security program which, when executed by a processor, implements the steps of the data security method according to any one of claims 1-3.
CN201710928259.6A 2017-09-30 2017-09-30 Data security protection method, device and computer readable storage medium Active CN107770160B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710928259.6A CN107770160B (en) 2017-09-30 2017-09-30 Data security protection method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710928259.6A CN107770160B (en) 2017-09-30 2017-09-30 Data security protection method, device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107770160A CN107770160A (en) 2018-03-06
CN107770160B true CN107770160B (en) 2021-03-09

Family

ID=61267166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710928259.6A Active CN107770160B (en) 2017-09-30 2017-09-30 Data security protection method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107770160B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109934011A (en) * 2019-03-18 2019-06-25 国网安徽省电力有限公司黄山供电公司 A kind of data safety partition method applied to O&M auditing system
CN110543775B (en) * 2019-08-30 2022-07-29 湖南麒麟信安科技股份有限公司 Data security protection method and system based on super-fusion concept
CN110545324B (en) * 2019-09-04 2022-06-14 北京百度网讯科技有限公司 Data processing method, device, system, network equipment and storage medium
CN112448957B (en) * 2020-11-27 2023-04-25 成都新希望金融信息有限公司 Network isolation method, device, system, server side and readable storage medium
CN114512151B (en) * 2021-12-28 2024-03-22 奇安信科技集团股份有限公司 Method and system for auditing, managing and controlling optical disk writing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333072A (en) * 2011-06-09 2012-01-25 张欢 Network banking trusted transaction system and method based on intelligent terminal
CN102346818A (en) * 2010-08-02 2012-02-08 南京壹进制信息技术有限公司 Computer network environment isolation system implemented by using software
CN102843352A (en) * 2012-05-15 2012-12-26 广东电网公司茂名供电局 Cross-physical isolation data transparent transmission system and method between intranet and extranet
CN104753887A (en) * 2013-12-31 2015-07-01 中国移动通信集团黑龙江有限公司 Safety control implementation method and system and cloud desktop system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140188977A1 (en) * 2012-12-28 2014-07-03 Futurewei Technologies, Inc. Appratus, method for deploying applications in a virtual desktop interface system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102346818A (en) * 2010-08-02 2012-02-08 南京壹进制信息技术有限公司 Computer network environment isolation system implemented by using software
CN102333072A (en) * 2011-06-09 2012-01-25 张欢 Network banking trusted transaction system and method based on intelligent terminal
CN102843352A (en) * 2012-05-15 2012-12-26 广东电网公司茂名供电局 Cross-physical isolation data transparent transmission system and method between intranet and extranet
CN104753887A (en) * 2013-12-31 2015-07-01 中国移动通信集团黑龙江有限公司 Safety control implementation method and system and cloud desktop system

Also Published As

Publication number Publication date
CN107770160A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN107770160B (en) Data security protection method, device and computer readable storage medium
US9923902B2 (en) Remote processsing of mobile applications
US11741222B2 (en) Sandbox environment for document preview and analysis
EP3788760B1 (en) Systems and methods for adding watermarks using an embedded browser
US9402184B2 (en) Associating services to perimeters
CN109639652B (en) Method and system for accessing internetwork data based on security isolation
US9223970B2 (en) Evaluating application integrity
US20140283071A1 (en) Application malware isolation via hardware separation
US11893123B2 (en) Systems and methods for screenshot mediation based on policy
CN109873803A (en) The authority control method and device of application program, storage medium, computer equipment
CN107566400A (en) Application with multiple operator schemes
US11841931B2 (en) Systems and methods for dynamically enforcing digital rights management via embedded browser
KR20110074484A (en) Collaborative malware detection and prevention on mobile devices
CN102291387A (en) Encrypted network traffic interception and inspection
US20190019154A1 (en) Intelligent, context-based delivery of sensitive email content to mobile devices
US11023606B2 (en) Systems and methods for dynamically applying information rights management policies to documents
US9137333B1 (en) Method and system for adding plug-in functionality to virtualized applications
US11822643B2 (en) Method and system for creating quarantined workspaces through controlled interaction between a host and virtual guests
EP2570960A2 (en) Method of controlling information processing system, program for controlling apparatus
CN112711770A (en) Sensitive behavior blocking method, device, terminal and storage medium
CN105554005A (en) Enterprise network security management method, device and system and security gateway
EP3308319B1 (en) Method and system for anonymizing a user identity and/or user data of a subscriber of a data protection service, program and computer program product
CN113761515A (en) Cloud desktop security detection method and system, computing device and storage medium
US9871873B2 (en) Adapter for communication between web applications within a browser
Ben Rebah et al. Cloud Computing: Potential Risks and Security Approaches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Data security protection methods, equipment, and computer-readable storage media

Effective date of registration: 20231212

Granted publication date: 20210309

Pledgee: Shenzhen Branch of China Merchants Bank Co.,Ltd.

Pledgor: SANGFOR TECHNOLOGIES Inc.

Registration number: Y2023980070863