Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method for accessing computer system and I/0 ports

A computer system and access control technology, applied in the field of computer systems, can solve the problems of inability to disclose secrets, inflexible methods, and inability for users to intuitively understand port disablement, etc., to achieve flexible access control and prevent access control functions.

Active Publication Date: 2007-07-25
LENOVO (BEIJING) CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has indeed played a very good role in the disclosure of confidential documents in the form of copying. However, for many R&D enterprise units, or R&D departments within the enterprise unit, there are usually many confidential data and confidential documents stored in the developer's computer. In the case of documents, program design documents, etc., it is impossible to use this confidential information management system to prevent confidential disclosure of the data copy method
[0004] In addition, there is another method to prevent the secret leakage of the copy method. This method is to install a kernel-level software in the user operating system, through which the I / O port is controlled by the kernel-level software. However, This approach cannot prevent users from deleting the kernel-level software by entering the safe mode of the operating system
[0005] Some of the existing methods are either extreme or inflexible, and it is impossible for computer system administrators to dynamically set the access rights of I / O ports according to needs, or to temporarily allow users to use these ports according to needs, or to prevent users from removing them by themselves. The switch control function of the I / O port, in addition, does not allow the user to intuitively understand the disabled status of the port, that is, which ports are allowed to be used and which ports are prohibited from being used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for accessing computer system and I/0 ports
  • Control method for accessing computer system and I/0 ports
  • Control method for accessing computer system and I/0 ports

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Fig. 1 shows the structural representation of computer system of the present invention, shown controlled computer comprises service operating system (SOS), user operating system (COS), virtual machine monitor (VMM), I / O state monitor and hardware platform. Among them, the user operating system is the operating system used by the end user, such as widows XP; the service operating system is the operating system that provides various services for the user operating system; the virtual machine monitor is the highest level " Privilege layer ", has the right to control system resources, is used to control the software layer allocated by system hardware resources (processor, memory, other equipment, etc.), and the user operating system and service operating system run on the virtual machine monitor; I The / O status monitor is used to display the current disabled status of the I / O port; wherein, the hardware platform supports virtual computing instructions.

[0041] The above-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer system enabling to control access of its I / O port comprises user operation unit with client end module for carrying out interaction with service end module and for receiving inputted I / O port access control parameters, service operation unit with service end module for carrying out interaction with client end module and for executing said control parameters, virtualizer monitor with I / O switch control module for deciding whether I / O command from user operation unit is to be executed or not according to said control parameters and I / O state monitor for displaying state of I / O port.

Description

technical field [0001] The invention relates to a computer system, in particular to a computer system and an I / O port access control method thereof. Background technique [0002] With the development of computer technology and network technology, the level of office automation of modern enterprises is gradually improving, and enterprises are increasingly dependent on computers and networks, and information security issues have become an inevitable major problem faced by enterprises. Among them, confidential data Leakage is a matter of great concern to many high-tech companies, because the leakage of confidential data will cause immeasurable losses to the company. Therefore, in order to avoid leakage of confidential data, many enterprises have taken some measures. Most enterprises isolate the computer storing confidential data from the external network, and use the internal network and private network to prevent illegal access to the data of the unit by outsiders. For confid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F11/30G06F21/85
Inventor 王晚丁
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products