Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for monitoring objective software and intelligent cryptographic key device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of intelligent key device and target software, which is applied in the field of information security, can solve problems such as anti-virus monitoring, illegal tampering, and user loss, and achieve the effect of reducing the performance of the host
Active Publication Date: 2011-08-17
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
When the host is infected with a virus, various software in the host may be damaged, such as Office software cannot run, users cannot edit and read Office files; users cannot use Photoshop software to edit images; and antivirus software cannot detect and anti-virus etc.
[0004] In the prior art, anti-virus software is usually used to detect whether the host is infected by viruses, but whether the target software in the host is damaged cannot be monitored by anti-virus software. When the target software is damaged, the user uses the target software again. When the software is damaged, it can be found that it has been damaged. If the user has not used the target software for a long time, the target software cannot be found in time. Sensitive information of the user may be lost, missing or illegally tampered with, resulting in immeasurable losses to the user Loss
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0040] see figure 1 , the embodiment of the present invention provides a method for monitoring target software, specifically including:
[0041] Step 101: The smart key device establishes a connection with the host, and declares itself as a removable storage device. If the smart key device declares itself as an optical disc, the host will recognize the smart key device as an optical disc.
[0042] Step 102: The automatic running program in the smart key device monitors the start-up and operation of the target software in the host, and at the same time, the first time delay for starting the smart key device is used to record the time when the smart key device is connected to the host.
[0043]The smart key device stores an autorun program, i.e. the autorun.Inf file. When the host recognizes the smart key device, the autorun program runs automatically, and begins to monitor the startup and operation of the target software in the host. Wherein, the automatic running program can ...
Embodiment 2
[0056] Referring to Fig. 2, an embodiment of the present invention also provides a smart key device for monitoring target software, specifically including a communication module, a statement module, an automatic operation module, a first delay module, a control module and a connection control module;
[0057] The communication module is used to realize the communication between the smart key device and the host after the connection control module establishes the connection between the smart key device and the host;
[0058] A declaration module, used for declaring that the smart key device is a mobile storage device when the connection between the smart key device and the host is established;
[0059] The automatic operation module is used to automatically monitor the startup and operation of the target software in the host after the declaration module declares that the smart key device is a mobile storage device;
[0060] The first delay module is used to start the first dela...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method of monitoring object software and an intelligent cipher key device, which belongs to the information security field. The method comprises the following steps: the intelligent cipher key device establishes a connection with a main frame and announces the cipher key device as a mobile memory device; a first time delay is started, and an automatic run program monitors the startup and running of the object software in the main frame; when the time delay reaches a preset first time value, the cipher key device is disconnected with the main frame and returns to the step of establishing the connection with the main frame. The device comprises a communication module, an announcement module, an automatic run module, a first time delay module, a control module and aconnection control module. According to the invention, the time delay intelligent cipher key device is connected and disconnected with the main frame alternately, and the automatic run program monitors the startup and running of the object software in the main frame when the cipher key device is connected with the main frame, thereby realizing the aim of monitoring the object software in time andeffectively preventing the problems of sensitive information loss, deficiency or illegal distortion caused by damages on the object software.
Description
technical field [0001] The invention relates to the field of information security, in particular to a method for monitoring target software and an intelligent key device. Background technique [0002] In today's increasingly developed information technology, more and more target software that contains data information and involves personal privacy and business secrets is running on the host, and the target software running on the host is easily attacked by viruses, causing sensitive information to be lost, missing or illegal. Tampering, while bringing huge economic losses to people, also makes further work impossible to continue. Therefore, the security and confidentiality of target software containing data and information are increasingly valued by people. [0003] In practical applications, loopholes in various operating systems and server software are constantly being discovered, and attack methods emerge in endlessly. Skilled hackers can still break through layers of pr...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.