Method and system for assembling confidence machine

A technology of trust machine and configuration module, which is applied in the direction of transmission system, program control device, electrical components, etc., can solve the problems of waste of computer resources, computer not fully functioning, etc., and achieve the effect of rapid configuration

Active Publication Date: 2013-03-20
BEIJING QIANXIN TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method and system for configuring a trusted machine to solve the problem that the computer does not fully function due to the setting of the trusted machine, resulting in a waste of computer resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for assembling confidence machine
  • Method and system for assembling confidence machine
  • Method and system for assembling confidence machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] In the management and maintenance of enterprise computer security, it is necessary to designate a computer as a trust machine, and the files on the trust machine are considered to be absolutely safe. That is, if it is detected that the file in a certain computer also exists in the trusted machine, the file can be considered as credible.

[0046]Since the files on the trust machine are considered absolutely safe, the files in the trust machine cannot be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for assembling a confidence machine. The problem that functions of a computer are not fully achieved so that resources of the computer are wasted because of the arranged confidence machine is solved. The system comprises a server and a plurality of terminals. Each terminal comprises a generating module. The terminal which is provided with a confidence virtual machine further comprises an adding module. The server comprises a receiving module and a testing module which obtains terminal information from a control collection in a random mode and tests whether virtual machine information exists in the terminal information, if the virtual machine information exists in the terminal information, an assembling module is triggered, and if the virtual machine information does not exist in the terminal information, the testing module is reused to obtain terminal information from the control collection again to proceed with test operation. The server further comprises the assembling module. The virtual machine information comprises virtual machine identification which is unique identification of virtual hardware in the confidence virtual machine.

Description

technical field [0001] The invention relates to computer security technology, in particular to a method and system for configuring a trusted machine. Background technique [0002] Generally, a user can use a computer for work, such as writing documents, browsing web pages, downloading files, transferring files, etc. Therefore, a computer performing work activities can be called a working machine. However, web pages may be linked to horses, and downloaded files may also contain viruses, so the above-mentioned behaviors cannot be guaranteed to be safe. [0003] However, in the management and maintenance of enterprise computer security, it is necessary to designate a computer as a trust machine, and the files on the trust machine are considered safe. That is, if it is detected that the file in a certain computer also exists in the trusted machine, the file can be considered as credible. [0004] It is precisely because the files on the trust machine are considered absolutely ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F9/455
Inventor 邓振波张家柱温铭李宇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products