Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security middleware and use method

A technology of information security and intermediate equipment, applied in the field of information security, can solve problems such as inability to prevent data hijacking

Active Publication Date: 2012-06-27
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the disadvantage of ordinary information security equipment is that it cannot prevent data hijacking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security middleware and use method
  • Information security middleware and use method
  • Information security middleware and use method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] see figure 1 , an embodiment of the present invention provides an information security intermediate device, including:

[0103] The first interface module 101 is used to connect the information security intermediate device and the host, and is responsible for message interaction between the information security intermediate device and the host;

[0104] The second interface module 102 is used to connect the information security intermediate device and the information security device, and is responsible for message interaction between the information security intermediate device and the information security device, and the information security intermediate device controls the information security device through the second interface module 102;

[0105] The filter module 103 is used to judge whether there is key information in the message received by the information security device, if there is key information, output the key information through the output module 104, and...

Embodiment 2

[0147] see figure 2 , the embodiment of the present invention also provides a method for using the information security intermediate device as in Embodiment 1, which specifically includes:

[0148] Step 201: the information security intermediate device connects the host and the information security device;

[0149] In this embodiment, the information security intermediate device connecting the host and the information security device may include one of the following situations:

[0150] 201a: The information security intermediate device connects to the host, and the information security intermediate device sends a descriptor to the host, and reports to the host that its device type is the first type; at this time, the information security device connects to the information security intermediate device, and the information security device sends information The security intermediate device sends its own descriptor and reports that its device type is the second type, which is d...

Embodiment 3

[0185] see image 3 , the embodiment of the present invention also provides an information security intermediate device, specifically including:

[0186] AT91RM9200 main control chip, USB HUB, USB interface, LCD display, keyboard, battery, sound device, download interface, random access memory, Flash chip, power supply. Among them, USB HUB, USB interface, liquid crystal display, keyboard, storage battery, sound generating device, download interface, RAM, Flash chip, power supply are connected with AT91RM9200 main control chip, and USB interface is connected with USB HUB.

[0187] The AT91RM9200 main control chip is used to filter key data in the message and analyze sensitive instructions, and can complete the conversion process of the message and the integration of the message. The chip has built-in 128K ROM, which can be used to store data and programs.

[0188] The main control chip of AT91RM9200 expands a large-capacity Flash chip to store programs, function libraries, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security middleware and a use method, belonging to the field of information security. The middleware comprises a first interface module, a second interface module, a filter module, an output module, an input module and a power supply module. The method comprises the following steps: the information security middleware is connected with a host and informationsecurity equipment to judge whether key information or sensitive instructions exist in a message sent by the host; if the key information exists, the key information is output to users and then forwarded to the information security equipment after the users confirm that the information is correct, and the processed results are transferred to the host; if the users confirm that the information is wrong or does not confirm after timeout, the wrong information is returned to the host; if the sensitive instructions exist, the sensitive instructions are parsed and processed and then sent to the information security equipment, and the processed results are transferred to the host; and if both the key information or sensitive instructions do not exist, a message is forwarded to the information security equipment, and the processed results are returned to the host. The invention prevents the key information of the users from being hijacked so as to improve the security of the information security equipment.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information security intermediate device and a method for using the same. Background technique [0002] In today's Internet-driven society, online banking, also known as online banking, has become an integral part of the overall development strategy of financial institutions. In recent years, the number of users using online banking has grown tremendously, and has maintained a steady momentum of development every year. While online banking brings many convenient services to its users, saves the bank's expenses and brings more profit growth points, it also bears many security risks. Many banks are aware of this and have taken actions one after another, including continuously educating users to improve their own security awareness, installing anti-virus software, anti-Trojan software; using information security devices such as hardware USB Keys or dynamic tokens for identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L12/18
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES