Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer system, computer network and data communication method

A computer system and computer network technology, applied in the field of computer security, can solve problems such as attacks that cannot solve processes and systems, and achieve the effect of strengthening security

Active Publication Date: 2011-05-25
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, in order to solve the above-mentioned problems, a chain of trust solution has emerged, which detects and repairs the attacked module when it is started, but it cannot solve the attacker's attack on the process and system during the operation of the operating system. In particular, implanting virus programs in system memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system, computer network and data communication method
  • Computer system, computer network and data communication method
  • Computer system, computer network and data communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In the embodiment of the present invention, by setting up a security system independent of the client operating system, the security subsystem verifies the externally input data, and sends the verified data to the client operating system, so as to realize safe data communication.

[0082] The computer system of the embodiment of the present invention is as figure 1 As shown, it includes a guest operating system GOS (GuestOperation System), a service operating system SOS (Service Operation System), a virtual machine monitor VMM (Virtual Machine Monitor) and a user system detection module, wherein:

[0083] A communication module is set in the VMM;

[0084] The settings in SOS are:

[0085] Real network driver, data interaction with physical network card, receiving data transmitted by physical network card;

[0086] Device model DM (Device Module), used to provide virtual network card for GOS;

[0087] The settings in GOS are:

[0088] The virtual network card is use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a computer system, a computer network and a data communication method, wherein the computer system comprises a client operating system with a virtual network card driving module, a real network card driving module and a virtual machine monitor with a communication module; the computer system also comprises a safety system which is arranged outside of the client operating system, operates in a virtual machine simultaneously with the client operating system and is used for detecting and authenticating external data received by the real network card driving module according to a safety rule; and the virtual network card driving module is used for acquiring first external data passing the detection and authentication in the external data acquired from the safety system through the communication module and sends the first external data to the client operating system. The embodiment of the invention ensures that the system cannot be attacked by various attack data and strengthens the safety of the computer system.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a computer system, a computer network and a data communication method. Background technique [0002] At present, the security software or security module of the computer is installed on the computer, and the operation of the security software or security module is based on the user's current operating system. When the user's operating system is attacked, the attacker controls the security software or security module based on the operating system. Do something to make it invalid, or give an error message like: [0003] The host firewall solution, when the operating system is attacked, the attacker can freely set firewall-strong security rules on the basis of controlling the operating system; [0004] The host intrusion detection system and anti-virus software solution is based on pattern matching technology. After the operating system is attacked, the intrusion detectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 韦卫
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products