Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for detecting computer security information based on U disc authentication

A computer security and information detection technology, applied in the field of computer information security, can solve problems such as data processing difficulties, hardware incompatibility, and failure to detect software running status

Inactive Publication Date: 2014-11-12
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The detection equipment and the computer to be tested must be provided by the same manufacturer, otherwise the hardware is not compatible, and different computers can only use different monitoring equipment;
[0005] (2) The monitoring equipment and the monitored computer are connected through a dedicated line, so that the monitored computer can only be within a certain range;
[0006] (3) The monitoring equipment can only monitor the hardware, but cannot detect the running status of the software, especially for multi-tasking systems, the normal hardware cannot guarantee the normal software;
[0007] (4) The monitoring equipment must be manned
[0009] (1) The network protocol is too complicated and abstract, and the monitoring software is basically provided by foreign countries (such as: HP-OpenView), which is difficult for ordinary managers to grasp and play a big role;
[0010] (2) Generally, it is only used to detect the status of the network itself, such as traffic, congestion, bit errors, etc. However, the normality of the network cannot guarantee the normality of the application software;
[0011] (3) Many application software do not support the SNMP protocol, so the faults of these application software cannot be found;
[0012] (4) The monitoring software generates a large amount of monitoring data, and it is difficult to process the data;
[0013] (5) The monitoring equipment must be manned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting computer security information based on U disc authentication
  • System and method for detecting computer security information based on U disc authentication
  • System and method for detecting computer security information based on U disc authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] Such as figure 1 with figure 2 As shown, the computer safety information detection system based on U disk authentication of the present invention includes a data collection terminal 2 for collecting and transmitting safety information data of the detected computer 1 and a data collection terminal 2 for receiving data collected by the data collection terminal 2 The data analysis processor 3 for analyzing and processing the received data, the number of the data collection terminal 2 and the detected computer 1 are one or more, the data collection terminal 2 includes an embedded microprocessor 2-1, and Embedded microprocessor 2-1 connected SDRAM memory module 2-2, FLASH memory module 2-3, serial communication circuit module 2-4, USB interface circuit module 2-5, network card 2-6 and touch screen drive circuit module 2 -7, and the certified U disk 2-8 connected to the USB interface circuit module 2-5, the touch screen 2-9 connected to the touch screen drive circuit module 2-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for detecting computer security information based on U disc authentication. The system comprises a data collecting terminal and a data analyzing processor, wherein the data collecting terminal comprises an embedded micro processor, an SDRAM memory module, a FLASH memory module, a serial communication circuit module, a USB interface circuit module, a network card, a touch screen driving circuit module, an authenticated U disc, a touch screen and a power supply managing module; the method comprises the steps of firstly, initializing system parameters; secondly, collecting data and performing encrypted signature; thirdly, securely storing and protecting a data file; fourthly, transporting the data; and fifthly, analyzing and processing the received data with the data analyzing processor to obtain an analytic processing result, and storing and displaying the result. The invention has novel and rational design, convenient implementation, convenient use and operation, high real-time capability and accuracy of data collection and transportation, high monitoring efficiency of the security of the computer, flexible and convenient use, strong practicability and high popularizing and applying values.

Description

Technical field [0001] The invention relates to the technical field of computer information security, in particular to a computer security information detection system and method based on U disk authentication. Background technique [0002] The current computer security information monitoring and inspection side mainly includes two categories: hardware device-based inspection and network protocol-based inspection. [0003] The detection method based on hardware equipment is mainly to connect special monitoring equipment to the monitoring interface (hardware) of each computer to detect the power supply, fan, temperature, CPU status, etc. of the computer equipment. Once a certain predetermined condition occurs, the monitoring equipment Carry out sound and light alarm. The main disadvantages of this detection method are: [0004] (1) The testing equipment and the computer to be tested must be provided by the same manufacturer, otherwise the hardware is incompatible, and different comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 范九伦刘建华吴昊
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products