Security defending system for single host

A security protection, stand-alone technology, applied in transmission systems, user identity/authority verification, digital data authentication, etc., can solve problems such as poor protection performance, single protection measures, and no protection system.

Active Publication Date: 2013-11-27
水利部信息中心 +1
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the stand-alone safety protection system in the related art, its protection measures are often

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defending system for single host
  • Security defending system for single host
  • Security defending system for single host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The present invention will be described in further detail below through specific implementation examples and in conjunction with the accompanying drawings.

[0072] The embodiment of the present invention provides a stand-alone safety protection system. see figure 1 As shown, it includes the login control subsystem, the host monitoring and patch distribution subsystem, and the CD burning monitoring subsystem.

[0073] The login control subsystem is used to control the login process of the user logging into the stand-alone operating system through a USB key; the host monitoring and patch distribution subsystem is used to monitor the security of the running process of the stand-alone computer and manage the patch distribution ; The optical disc recording monitoring subsystem is used for safety monitoring of optical disc recording.

[0074] As a specific implementable manner, the login control subsystem includes a USBKey management module (USBKeyManager), a USBKey client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of security defense of a single host and particularly relates to a security defending system for a single host. The security defending system comprises a login control subsystem, a main engine monitoring and patch distributing subsystem and a compact disc recording monitoring subsystem, wherein the login control subsystem is used for controlling a login process of a user login single host operation system by a USBkey (Universal Serial Bus key); the main engine monitoring and patch distributing subsystem is used for carrying out security monitoring on an operation process of the single host and managing patch distribution; the compact disc recording monitoring subsystem is used for carrying out the security monitoring on compact disc recording. The security defending system provided by the invention can comprehensively carry out security defense on the single host and the defending performance is preferable.

Description

technical field [0001] The invention relates to the field of stand-alone safety protection, in particular to a stand-alone safety protection system. Background technique [0002] With the improvement of modern network security management system, the demand for stand-alone security management in the network is strongly highlighted. A correct and comprehensive understanding of the development trend and technical characteristics of terminal management products is a development choice faced by IT R&D manufacturers, and it is also a topic that must be considered by IT managers and high-level decision makers of enterprises and institutions when deploying terminal desktop security protection. [0003] The security defense survey in the past two years also shows that more than 80% of the management and security problems in government, enterprises, financial securities and other units come from terminals. Terminals, mainly represented by computers, widely involve every user. , The l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34H04L9/32H04L29/06
Inventor 蔡阳詹全忠高曦陈子丹付静程益联周维续唐燕成建国陈德清谢文君
Owner 水利部信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products