Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal dependable computing and data static safety system and method

A static security and data technology, applied in the field of remote desktop systems, can solve problems such as security risks, cost, computing power, unsatisfactory graphical desktop experience, and difficulty in improving information security capabilities of network protocols and operating system kernels.

Active Publication Date: 2017-03-15
山东微创软件有限公司
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For mode (1), information security mainly depends on the security mechanism of the network protocol and the operating system kernel. The terminal operating system is in an uncontrollable and untrustworthy operating environment, and the mainstream operating systems of the terminal are all from abroad, and incidents of interfaces and backdoors have been repeatedly raised. And, it is difficult to improve information security capabilities by modifying network protocols and operating system kernels
For mode (2), since the core technology (such as virtualization) is in the hands of foreign manufacturers, it is difficult for the security mechanism of the application layer to achieve high reliability
Moreover, multiple virtual machines sharing the same physical device have more security risks, and security issues are more likely to spread
In addition, mode (2) is unsatisfactory in terms of cost, computing power, graphical desktop experience, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal dependable computing and data static safety system and method
  • Terminal dependable computing and data static safety system and method
  • Terminal dependable computing and data static safety system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.

[0028] The terminal trusted and data static security system of the present invention is a trusted remote desktop system that can provide remote security monitoring. By establishing a set of security control measures between the hardware of the client computer and the operating system software, the user's The operating application system performs unified back-end management, and assigns each user a trusted desktop running computing environment. Utilizing the security architecture of the terminal trusted and data static security system of the present invention, the operating system and data are stored on the local hard disk in a sector structure, and the data pointer technology of the sector can effectively prevent attacks from tool...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal dependable computing and data static safety system. The system comprises a server, a client computer and an authenticated microsystem module. The server is connected with the client computer through the network, and a template file of a dependable root system and a data pointer file from the client computer are stored in the server; a dependable authenticated microsystem is stored in the authenticated microsystem module and used for comparing data information of the server with that of the client computer, and after the client computer passes the hardware dependable authentication, the data pointer file, stored in the server, of the client computer is mapped to the hardware of the client computer; the authenticated microsystem module compares the data of the dependable root system tagged by the data pointer file with the corresponding data of a dependable root system of a storage sector of a hard disk; if the data is inconsistent, it is determined that the client computer is not dependable. The invention further discloses a terminal dependable computing and data static safety method. Real-time dependable monitoring is achieved before a remote terminal enters a system layer, and data safety is protected.

Description

technical field [0001] The invention relates to a remote desktop system, in particular to a terminal trusted computing and data static security system and method based on terminal computing resources and server strict monitoring. Background technique [0002] In recent years, with the rapid development of computer networks, distributed technology, and cloud computing, various cloud services have become more and more accepted by government and enterprises. At the same time, terminals carrying these services face many security risks such as unknown boundaries, false authentication, and lack of controllability. Incidents that endanger information security continue to occur, and the information security situation is becoming increasingly severe. [0003] At present, our country pays more and more attention to confidentiality work. Relevant state agencies and the State Secrets Bureau have successively promulgated a series of confidentiality laws and regulations such as the "Impl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/57G06F11/14
CPCG06F11/1448G06F12/1416G06F21/57
Inventor 黄辉
Owner 山东微创软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products