A method for performing security check on a computer terminal

A computer terminal and security inspection technology, which is applied in the field of information security, can solve the problems of high pressure on the server to receive data, the inability to further improve management value, and the unfavorable expansion of security inspection standards, so as to improve real-time performance, participation and real-time performance , Guarantee the effect of configurability and scalability

Active Publication Date: 2018-12-18
CHENGDU AIRCRAFT INDUSTRY GROUP
View PDF16 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the existing technology, it is not possible to conduct automated compliance analysis and output confidential inspection results that are instructive for information security management, and cannot further enhance management value.
In addition, there are the following technical defects: (1) When the number of computer terminals is too large, the pressure on the server to receive data is high, and the real-time performance of data display is poor; (2) When collecting data on the terminal side, certain computer resources will be consumed , poor friendliness, which is not conducive to the expansion of confidentiality inspection standards; (3) When upgrading program functions on the terminal side, it needs to be re-installed and deployed, which is time-consuming and costly, and the software compatibility of different computer terminals must also be considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for performing security check on a computer terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] A method for checking the security of a computer terminal, the specific operation steps are as follows:

[0051] S101. Build a structure combining B / S and C / S, install a server program on the server side, install a client program and multiple script programs for collecting raw data of different security inspection indicators on the computer terminal side;

[0052] S102. The client program controls each script program on the computer terminal side to collect the corresponding original data of the confidentiality inspection index, and then uploads the confidentiality inspection data packet containing the unique identifier of the computer terminal and the newly collected original data of the confidentiality inspection index to the server;

[0053] S103. The server program adopts the message bus-based load balancing technology on the server side to receive the confidentiality inspection data packets from each computer terminal;

[0054] S104. For the computer terminal corre...

Embodiment 2

[0090] Such as figure 1 As shown, the method for checking the security of a computer terminal provided in this embodiment includes the following steps.

[0091] S101. Build a structure combining B / S and C / S, install a server program on the server side, install a client program and multiple script programs for collecting raw data of different security inspection indicators on the computer terminal side.

[0092] In the step S101, the B / S refers to the client / server, the C / S refers to the browser / server, and the original data of the confidentiality inspection index may include, but is not limited to, the device usage code of the computer terminal, Installation location string, MAC address, IP address, hard disk serial number, operating system version number, operating system installation time, operating system log, domain user list, software storage table, running process table, virus database version number of anti-virus software and Operating system patch update time, etc.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and discloses a method for performing security check on a computer terminal. In accordance with the present invention, an automated compliance analysis of confidentiality check index raw data from a computer terminal may be provided, and the confidentiality check methods that integrate compliance check results are summarized, that is to say, on the one hand, through the decision-making compliance analysis of the corresponding confidentiality inspection indicators, flexibility and accuracy of compliance results can be ensured, on the other hand, by integrating the compliance check account of a single computer terminal and including all the confidentiality check indexes, the comprehensiveness and integrity of the compliance check results can be ensured, which is beneficial to output the confidentiality check results with guiding significance for the information security management, and further enhance the management value.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for checking the security of a computer terminal. Background technique [0002] Most of the currently widely used security inspection tools are stand-alone software, which use manual tools to complete the security inspection of computer terminals, but it requires a lot of manpower and material resources, and the efficiency is low. Although a method or system based on the C / S architecture and realizing distributed security and confidentiality inspection has also appeared at present, a single and online security and confidentiality inspection can be carried out on the computer terminal, that is, the relevant information of various confidentiality inspection indicators is collected at the computer terminal first. Data, and then perform simple data display on the server side. [0003] However, in the prior art, it is not possible to perform automate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06F21/60G06F21/62
CPCG06F21/566G06F21/577G06F21/602G06F21/6218G06F2221/033G06F2221/034
Inventor 魏能强黄蓉波郑良谦
Owner CHENGDU AIRCRAFT INDUSTRY GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products