Information security middleware and use method
A technology of information security and intermediate equipment, applied in the field of information security, can solve problems such as inability to prevent data hijacking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0102] see figure 1 , an embodiment of the present invention provides an information security intermediate device, including:
[0103] The first interface module 101 is used to connect the information security intermediate device and the host, and is responsible for message interaction between the information security intermediate device and the host;
[0104] The second interface module 102 is used to connect the information security intermediate device and the information security device, and is responsible for message interaction between the information security intermediate device and the information security device, and the information security intermediate device controls the information security device through the second interface module 102;
[0105] The filter module 103 is used to judge whether there is key information in the message received by the information security device, if there is key information, output the key information through the output module 104, and...
Embodiment 2
[0147] see figure 2 , the embodiment of the present invention also provides a method for using the information security intermediate device as in Embodiment 1, which specifically includes:
[0148] Step 201: the information security intermediate device connects the host and the information security device;
[0149] In this embodiment, the information security intermediate device connecting the host and the information security device may include one of the following situations:
[0150] 201a: The information security intermediate device connects to the host, and the information security intermediate device sends a descriptor to the host, and reports to the host that its device type is the first type; at this time, the information security device connects to the information security intermediate device, and the information security device sends information The security intermediate device sends its own descriptor and reports that its device type is the second type, which is d...
Embodiment 3
[0185] see image 3 , the embodiment of the present invention also provides an information security intermediate device, specifically including:
[0186] AT91RM9200 main control chip, USB HUB, USB interface, LCD display, keyboard, battery, sound device, download interface, random access memory, Flash chip, power supply. Among them, USB HUB, USB interface, liquid crystal display, keyboard, storage battery, sound generating device, download interface, RAM, Flash chip, power supply are connected with AT91RM9200 main control chip, and USB interface is connected with USB HUB.
[0187] The AT91RM9200 main control chip is used to filter key data in the message and analyze sensitive instructions, and can complete the conversion process of the message and the integration of the message. The chip has built-in 128K ROM, which can be used to store data and programs.
[0188] The main control chip of AT91RM9200 expands a large-capacity Flash chip to store programs, function libraries, an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 