Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for detecting computer security information based on U disc authentication

A computer security and information detection technology, applied in computer security devices, calculations, instruments, etc., can solve problems such as difficult data processing, hardware incompatibility, and inability to detect software running status

Inactive Publication Date: 2012-12-26
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The detection equipment and the computer to be tested must be provided by the same manufacturer, otherwise the hardware is not compatible, and different computers can only use different monitoring equipment;
[0005] (2) The monitoring equipment and the monitored computer are connected through a dedicated line, so that the monitored computer can only be within a certain range;
[0006] (3) The monitoring equipment can only monitor the hardware, but cannot detect the running status of the software, especially for multi-tasking systems, the normal hardware cannot guarantee the normal software;
[0007] (4) The monitoring equipment must be manned
[0009] (1) The network protocol is too complicated and abstract, and the monitoring software is basically provided by foreign countries (such as: HP-OpenView), which is difficult for ordinary managers to grasp and play a big role;
[0010] (2) Generally, it is only used to detect the status of the network itself, such as traffic, congestion, bit errors, etc. However, the normality of the network cannot guarantee the normality of the application software;
[0011] (3) Many application software do not support the SNMP protocol, so the faults of these application software cannot be found;
[0012] (4) The monitoring software generates a large amount of monitoring data, and it is difficult to process the data;
[0013] (5) The monitoring equipment must be manned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting computer security information based on U disc authentication
  • System and method for detecting computer security information based on U disc authentication
  • System and method for detecting computer security information based on U disc authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] Such as figure 1 and figure 2 As shown, the computer security information detection system based on U disk authentication of the present invention includes a data collection terminal 2 for collecting and transmitting the security information data of the detected computer 1 and a data collection terminal 2 for receiving data collected by the data collection terminal 2. The data that arrives and carry out the data analysis processor 3 of analysis processing, the quantity of described data collection terminal 2 and detected computer 1 is one or more, and described data collection terminal 2 comprises embedded microprocessor 2-1, and Embedded microprocessor 2-1 connected SDRAM memory module 2-2, FLASH memory module 2-3, serial port communication circuit module 2-4, USB interface circuit module 2-5, network card 2-6 and touch screen drive circuit module 2 -7, and the authentication U disk 2-8 connected with the USB interface circuit module 2-5, the touch screen 2-9 connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for detecting computer security information based on U disc authentication. The system comprises a data collecting terminal and a data analyzing processor, wherein the data collecting terminal comprises an embedded micro processor, an SDRAM memory module, a FLASH memory module, a serial communication circuit module, a USB interface circuit module, a network card, a touch screen driving circuit module, an authenticated U disc, a touch screen and a power supply managing module; the method comprises the steps of firstly, initializing system parameters; secondly, collecting data and performing encrypted signature; thirdly, securely storing and protecting a data file; fourthly, transporting the data; and fifthly, analyzing and processing the received data with the data analyzing processor to obtain an analytic processing result, and storing and displaying the result. The invention has novel and rational design, convenient implementation, convenient use and operation, high real-time capability and accuracy of data collection and transportation, high monitoring efficiency of the security of the computer, flexible and convenient use, strong practicability and high popularizing and applying values.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a computer security information detection system and method based on USB disk authentication. Background technique [0002] The current monitoring and inspection of computer security information mainly includes two categories: detection based on hardware devices and detection based on network protocols. [0003] The detection method based on hardware equipment is mainly to connect the monitoring interface (hardware) of each computer through a dedicated monitoring equipment to detect the power supply, fan, temperature, CPU status, etc. of the computer equipment. Once a predetermined condition occurs, the monitoring equipment Sound and light alarm. The main disadvantages of this detection method are: [0004] (1) The detection equipment and the computer to be tested must be provided by the same manufacturer, otherwise the hardware is not compatible, and diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 范九伦刘建华吴昊
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products