A Centralized Safe and Trustworthy Auditing Method
A credible and secure technology, applied in secure communication devices, encryption devices with shift registers/memory, digital transmission systems, etc., can solve problems such as inability to obtain audits, and achieve the effect of avoiding illegal operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0028] figure 2 Shown is the block diagram of the composition of the present invention's non-central safe and trusted auditing system, such as figure 2 As shown, each node of the management end can be deployed in different regions according to the needs, so as to prevent users from operating each management end host at the same time. Audit terminals, network devices, and administrator access route requests to a management node for processing through the access gateway. Since the audit terminal, network equipment and administrators do not know the specific address of the management terminal that responds to the request, it avoids the security risk of the user directly tampering with the information on the server term...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


