Encryption-software based automated detection and maintenance methods

An encryption software and automatic detection technology, applied in the field of data security, can solve problems such as increased workload and difficult maintenance, and achieve the effect of simple maintenance

Inactive Publication Date: 2015-03-04
WUXI CINSEC INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption vendors spend a lot of time on simple maintenance, and more difficult maintenance requires long-term debugging and troubleshooting one by one, which increases the workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption-software based automated detection and maintenance methods
  • Encryption-software based automated detection and maintenance methods
  • Encryption-software based automated detection and maintenance methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0043] Such as figure 1 As shown, the present invention is divided into a server-side detection and maintenance method, a management-side detection and maintenance method, and a client-side detection and maintenance method according to the existing commercially available encryption software architecture; and all of them have reminder and alarm functions.

[0044] The detection and maintenance of the server side is mainly to solve the detection of server authorization expiration, startup abnormality detection (including no self-starting and being mistaken by anti-virus software for illegal programs to prevent operation), port abnormality detection, client information feedback, etc.;

[0045] Such as figure 2 As shown, based on the corresponding encryption software, the present invention detects the expiry date of the corresponding authoriza...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides encryption-software based automated detection and maintenance methods which comprise the server side, management side and client side detection and maintenance method. The detection and maintenance of the server side solve the problem on server authorization expiration detention, start abnormity detection and port abnormity detection. The detection and maintenance of the management side solve the problems that the client side can not be used normally or installed because the strategy is not set, the use state is set abnormally and the user authorization amount exceeds the limit. The detection and maintenance of the client side comprise process detection, driving detection, registry detection, port detection, collision detection, prevention item detection and integrity detection. Because the encryption-software is used as the interface to carry out seamless connection, automated detection and simple maintenance are carried out during the maintenance of an encryption system, and the maintenance record is generated to be convenient for subsequent check, the work efficiency of the client and the encryption manufacture is improved, and the inconvenience caused by the system is reduced effectively.

Description

technical field [0001] The present invention relates to the field of data security, in particular to an automatic detection and maintenance method based on encryption software, which is seamlessly connected through an interface with the encryption software, making the use and maintenance of the encryption software more convenient and quicker, and the operation more humanized, suitable for those without A company specializing in network management. Background technique [0002] Today, with the popularity of the Internet and the improvement of office automation, the security of important data has become an issue that cannot be ignored. Major security vendors are also competing to launch their own information security products, including hardware or software information security products. The encryption technology that can solve the problem from the source of various products is undoubtedly the encryption technology, that is, to reorganize the original document with a special ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/56
Inventor 耿振民汪亮
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products