Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security architecture, its operation method, device and readable storage medium

An operation method and safe technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as low efficiency and trouble, and achieve the effect of ensuring code security

Active Publication Date: 2022-03-22
HUNAN GOKE MICROELECTRONICS
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is extremely inefficient, and sometimes requires multiple communications to understand the specific on-site situation, and it will be more troublesome for problems that can only be reproduced on-site

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security architecture, its operation method, device and readable storage medium
  • A security architecture, its operation method, device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] On-site customer support mainly faces two security risks: how to safely copy out local programming and how to safely synchronize code with the company’s internal security. The present invention sets up a security system on the client side to ensure that sensitive data will not be leaked in the remote connection, establishes a security audit between the security system and the data transmission of the public system, and isolates the data between the secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a security architecture and its operation method, including a target server and a client, the client includes a security system and a public system, wherein: among the clients, only the security system is remotely connected to the target server, The security system performs data transmission with the target server according to internal encryption and decryption rules, and sends local files that have passed the security audit to the public system according to instructions. The present invention sets up a security system on the client side, and there are only two kinds of data streams in the security system, one is the data transmission with the target server according to the internal encryption and decryption rules, and the other is that only the local files that pass the security review can be sent by the security system to For the public system, the former ensures that sensitive data will not be leaked in the remote connection, and the latter ensures the data isolation between the security system and the public system, so the present invention guarantees the code security in the process of remote communication and local programming at the same time.

Description

technical field [0001] The invention relates to the field of development environment construction, in particular to a security framework and its operation method, equipment and readable storage medium. Background technique [0002] With the rapid development of computer and communication technology, software has become an important infrastructure of information construction, and the leakage of software core source code may bring huge losses to IT enterprises. On the other hand, for embedded SoC products, the staff often have to bring computers to debug on the customer site. The site conditions are complex and changeable, the links are chaotic, and code leakage is very easy to occur. Therefore, how to manage the on-site computers is a prominent issue. The problem. [0003] Customers often face compiling, debugging, programming and other links on site, and most of them use USB, network port, serial port, etc. to program code to the board. In fact, these interfaces are inhere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/12G06F21/602G06F2221/2141
Inventor 王德勇李军陈恩洪傅文海
Owner HUNAN GOKE MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products