Binary collaborative security client architecture

A client and application client technology, which is applied in the fields of computer, network software, information security, and mobile terminals, can solve problems such as hidden viruses, authentication, encryption, signature counterfeiting fraud, information leakage, etc. The effect of preventing leakage and enhancing security

Inactive Publication Date: 2019-07-26
深圳金澜汉源科技有限公司
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for e-mail and social services, users still operate and process on a single client, and multiple applications coexist and update may hide viruses and spy programs, and the risk of information leakage still exists
Another example is e-commerce and online banking. Users also operate and process on a single client. Even if an external dedicated cryptographic device (such as a hardware USB-KEY) is connected, authentication, encryption, and signature may be counterfeited and fraudulent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary collaborative security client architecture
  • Binary collaborative security client architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] A dual collaborative and secure email service system client, referred to as the email client, is implemented below to illustrate a suitable implementation of the present invention. It should be noted that the following examples should not be understood as the entire possible scope of the present invention, nor should they be construed as limiting the rights of the present invention.

[0020] refer to figure 1 and its description. The application client (1), that is, the mail client, is binary distributed into two mobile phone APP program entities, the private end (11) and the open end (12), which will be installed on the first universal terminal (110) and the second universal terminal (110) respectively. Run concurrently on the terminal (120). The two general-purpose terminals are specifically two mobile phones, both of which are Android (Android) operating systems, and the short-distance interconnection between the two ends is realized through Bluetooth communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a binary collaborative security client architecture, and relates to the technical field of computers, mobile terminals, network software and information security. The application client is distributed into a private end and an open end which are of binary structures and can be universally installed, the private end and the open end are respectively deployed on a first universal terminal and a second universal terminal which are relatively independent and are in short-range interconnection for concurrent operation to form a private space and an open space of a user, andshort-range trust channels are established at the two ends of the private space and the open space; the private end closes off-network, the management key executes a cryptographic algorithm to limit sending of a plaintext, and the encrypted or signed message secret mirror image is sent to the open end to send a ciphertext; the open end opens networking for external interaction, and the external message is transparently mirrored to the private end for decryption or verification to present a plaintext; the two ends collaboratively follow an application logic related state conversion synchronization protocol, the mutual transmission state collaboration message drives the two ends to perform linkage interoperation, and application scenes at the two ends are mutually mirrored collaboratively. The binary collaborative security client architecture is suitable for an online application service system, information leakage is effectively avoided, and the information security level is remarkablyimproved.

Description

technical field [0001] The invention relates to the technical fields of computers, mobile terminals, network software and information security. Background technique [0002] There are many kinds of online application services, such as e-mail, social instant messaging, cloud storage, online office, e-commerce, etc., usually provide users with application client software, install and run on the user terminal to provide service functions, and realize the connection between users and servers. or online interactions with other users of information or messages. There are also various user terminals, such as electronic devices such as computers, mobile phones, information tablets, and wearable devices. Due to computer viruses, spy programs and hackers, information security in the network environment has always had serious information leakage risks, and security incidents also occur from time to time, causing many troubles and losses to users. In order to solve the information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W4/80H04W12/00H04W12/06H04W76/14H04W12/03H04W12/0433H04W12/088
CPCH04L63/0218H04L63/0428H04L67/1095H04W4/80H04W12/06H04W76/14H04W12/03H04W12/50
Inventor 杨筑平周跃平其他发明人请求不公开姓名
Owner 深圳金澜汉源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products