Information safety protecting method and system

A technology of information security and safety detection, applied in transmission systems, digital transmission systems, safety communication devices, etc., can solve problems such as misleading users and high safety risks, and achieve the effect of ensuring safety and improving safety

Inactive Publication Date: 2014-01-01
SHENZHEN EXCELSECU DATA TECH
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the C / S architecture requires the installation of client software, there is a security risk that the client software may be replaced; for example, illegal programs mislead users to install fake client software, thereby using fake client software to capture users' personal accounts and Password information, etc.; therefore, using the above method to install client software on the C / S architecture has a high security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety protecting method and system
  • Information safety protecting method and system
  • Information safety protecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057]In the embodiment of the information security protection method and system of the present invention, the second-generation USB Key is used as the security basis of the terminal app (Application, application program), and the built-in first reliable app (that is, the first A security detection program, which will be referred to as app1 later for the convenience of description), and app1 is used to download, verify, and manage other apps on the verification terminal. When the USB Key and the terminal are not bound, the USB Key cannot be used; and after the USB Key is successfully paired with the terminal, the terminal must first install the built-in app1 of the US...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information safety protecting method and system. According to the information safety protecting method and system, a reliable application program, namely a first safety detection program, is provided through a USB Key, other application programs on a terminal are verified through the reliable application program, then the legality of the application programs on the terminal is effectively verified, the problem that potential safety hazards exist due to the fact that the legality of downloading and installation of traditional application programs can not be verified is avoided, safety of the application programs on the terminal is improved, and furthermore safety of personal information of a user is guaranteed.

Description

technical field [0001] The present invention relates to information security technology, and also to the field of smart keys, in particular to an information security protection method and system. Background technique [0002] With the development of wireless Internet, electronic banking has also been widely used, and gradually expanded from traditional PCs to mobile devices such as mobile phones and tablet computers. At present, there are two ways of electronic banking application on the terminal: the B / S structure that uses the browser to access the transaction webpage to complete the transaction, and the C / S structure that installs the application client on the terminal to complete the transaction. The B / S architecture must rely on the browser, and the browser, as an open basic application software, has high security risks; while the C / S architecture is the application software independently developed by each bank. Compared with the B / S structure, with a certain degree o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/12H04L9/00
Inventor 陈柳章
Owner SHENZHEN EXCELSECU DATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products