Universal security cooperation system

A collaborative system and security technology, applied in the parts of the TV system, image communication, TV, etc., can solve the problem of not being able to make full use of the work efficiency of remote collaborative applications, and achieve the effect of eliminating network attacks

Inactive Publication Date: 2020-07-31
刘小明 +1
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the unit is often in a dilemma: if it insists on complete internal and external network isolation, it must bear the pressure of the business department on long-term failures and frequent system unavailability, and it c...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal security cooperation system
  • Universal security cooperation system
  • Universal security cooperation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention proposes a computer system that can not only satisfy remote collaborative maintenance, but also ensure that it will not bring the three most threatening network security risks of information leakage, network attack or virus infection, which can be called a universal security collaborative KVM system. The present invention includes an operation initiator host and an operated host, runs a KVM application program on the operation initiator host, simulates a KVM system, displays screen images transmitted from the operated host through a one-way video line, and intercepts application graphics Mouse and keyboard operation on the interface, write the mouse and keyboard operation code into the one-way mouse and keyboard communication line. Install a HID device driver program on the host computer at the operated end, implement a keyboard and mouse device on the hardware layer, and convert the mouse and keyboard operations from the operation initiator forward...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer network tool equipment and information security, and discloses a universal security cooperation system, which is used for solving the problem of contradiction between remote cooperation and security between an internal network and an external network in the prior art. The system comprises an operation initiating end host, an operated end host, a one-way keyboard and mouse communication electronic circuit, a one-way video communication electronic circuit, an HID drive program and a simulation KVM application program, wherein the simulation KVM application program is installed in an operation initiating end host, and the HID drive program is installed in an operated initiating end host; during safety cooperation, the operation initiating end host sends keyboard and mouse actions to the operated end host in a one-way mode, and the operated end host sends screen image data to the operation initiating end in a one-way mode. The method is suitable for intranet and extranet equipment security cooperation.

Description

technical field [0001] The invention relates to the field of computer network tool equipment and information security, in particular to a general security cooperation system. Background technique [0002] At present, most units (including governments, public institutions, enterprises and social organizations) have their own internal networks, and a large number of network devices, computers, various professional computer software and business systems run on these internal networks. The computer systems running on this internal network either process information that needs to be kept secret, or are related to the core business of the enterprise, and do not allow information leakage, network attack or virus infection. [0003] The stable operation of computer systems, computers, various professional computer software and business systems on these internal networks is related to the daily operation of the unit. In order to ensure the stable operation of these systems, it is ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/71G06F3/038G06F3/14H04N5/268H04N5/765
CPCG06F3/038G06F3/1454G06F21/71H04N5/268H04N5/765
Inventor 刘小明
Owner 刘小明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products