Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method of dynamically isolating computer systems

A computer system and isolation system technology, applied in the field of computer security, can solve problems such as difficult to completely remove viruses and comprehensive antivirus, and achieve the effects of low time consumption and calculation costs, guaranteed safety, and broad application prospects

Active Publication Date: 2016-02-10
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current solutions of computer manufacturers all need the support of U disk, that is, the U disk must be started with autorun.inf, and this method can only defend against this self-starting virus. , digital camera, SD card, etc.)
At the same time, when there are viruses in the data stored in the peripherals, these viruses will still spread to the host. This is because the current computer manufacturers mainly adopt the anti-virus method of first infecting and then killing. This method must be used by some Trojan horse viruses , it is difficult to completely remove these viruses when you are infected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of dynamically isolating computer systems
  • A method of dynamically isolating computer systems
  • A method of dynamically isolating computer systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] Refer to the attached figure 2 , the content of the present invention is described with a specific example to realize the process of this method.

[0024] As described in the summary of the invention, the architecture of the present invention mainly includes: a host interaction unit, an isolation unit and a peripheral interaction unit, wherein:

[0025] The host interaction unit is mainly responsible for the resource interaction between the isolation system and the host, and monitors the isolation unit;

[0026] The isolation unit is mainly responsible for security analysis and feedback of the data to be exchanged between the current host and peripherals;

[0027] The peripheral interaction unit is responsible for the reconstruction of the peripheral boot module, so that after the peripheral is loaded, the data is submitted to the isolation system first.

[0028] The implementation of the high security system of the dynamically isolated computer system is described a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for dynamically isolating computer system. An isolating system is established via a virtual environment to isolate a peripheral and a host, so that the virus inflection risk for resources in the host can be reduced. The isolating system comprises a host interaction unit, an isolating unit and a peripheral interaction unit, wherein the host interaction unit is used for isolating resource interactions between the system and the host and monitoring the isolating unit, the isolating unit is used for analyzing and reporting safeness of interactive data between the host and the peripheral, and the peripheral interaction unit is used for reconstructing a peripheral lead module and preferentially submitting data to the isolating system after the peripheral is loaded. The isolating process includes that an isolating system is started when a new peripheral such as a virtual machine is loaded, isolating operations are implemented to the peripheral, network and a mobile hard disk drive by the isolating system when a universal serial bus flash disk accesses, the isolating system is eliminated directly when a safety problem is found, and a new isolating system is created to guarantee the safeties of the host system and host resources.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an active isolated computer system high security architecture. technical background [0002] At present, the U disk virus is rampant, invading countless personal computers, and making the majority of computer users troubled. [0003] For this reason, most security software manufacturers provide U disk killing tools on their respective products, that is, when loading a U disk, create an antorun.inf folder in the root directory of the U disk to prevent the U disk from Start by itself to avoid viruses generated by automatic loading. [0004] The current solutions of computer manufacturers all need the support of U disk, that is, the U disk must be started with autorun.inf, and this method can only defend against this self-starting virus. , digital camera, SD card, etc.) are difficult to fully antivirus. At the same time, when there are viruses in the data stored in the peripheral...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71G06F21/82G06F21/53
Inventor 王帅高飞
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More