Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information processing system and a trusted security management system

An information processing system and a credible technology, applied in the field of information processing, can solve problems such as file damage, single security protection of clients and servers, and decline of user interest, so as to achieve accurate security protection and increase interest in use

Active Publication Date: 2020-01-10
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an information processing system and a trusted security management system to at least solve the problem that both the client and the server perform unified security protection in the related art, and cannot actively perform security protection on the internal information of the client, which is easy Technical problems that cause file damage and decrease user interest

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing system and a trusted security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0019] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information processing system and a trusted security management system. The information processing system comprises a target client and a target server end; the target server end is used for establishing communication connection with the target client registered at the target server end, sending trusted protection software to the target client and processing related information of the target client after the target client starts the trusted protection software; the trusted protection software is used for carrying out active security protection on the target client; and the target client is used for receiving and installing the trusted protection software, and performing security protection on the trusted protection software based on the pre-configured permissioninformation in the operation process of the trusted protection software.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to an information processing system and a trusted security management system. Background technique [0002] In related technologies, when performing security protection, the client and the server are usually a single security protection, which cannot allow the client and the server to cooperate with each other. The data on the upper part of the client stores or calculates the data of the client; this single security protection can only realize the passive defense of the internal information of the client. It will cause damage to the file, which cannot be repaired, and the client cannot be used normally. [0003] For the above problems, no effective solution has been proposed yet. Contents of the invention [0004] The embodiment of the present invention provides an information processing system and a trusted security management system to at least solve the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06G06F21/60G06F21/62
CPCH04L67/141H04L63/0428G06F21/60G06F21/602G06F21/6218
Inventor 孙瑜夏攀王大海杨成刚王伟何成成
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products