External terminal protection device and protection system based on file monitoring service

A kind of protective equipment, external technology, applied in the direction of transmission system, electrical components, etc., can solve problems such as damage, system misoperation, and influence of enterprises and institutions, and achieve the effect of ensuring safe transmission, improving safety performance, and reducing safety risks

Active Publication Date: 2020-11-03
北京中科麒麟信息工程有限责任公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. Non-standard external storage devices, as well as system misoperation or deliberate damage, will cause adverse effects or even heavy losses on agencies, enterprises and institutions.
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station / worker station in some industrial fields, these hosts / equipment are often not suitable for such systems on the market due to the particularity of the system. Security protection software, or the installation of security software may easily cause compatibility problems with the original software of the host, or even affect performance
In addition, the hosts of these engineer stations / worker stations basically do not upgrade the operating system after they go online. Even after installing security software, they often do not update the anti-malware software version and malicious code library in time, and cannot achieve comprehensive security protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External terminal protection device and protection system based on file monitoring service
  • External terminal protection device and protection system based on file monitoring service
  • External terminal protection device and protection system based on file monitoring service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Below, see figure 1 , figure 2 and image 3 An embodiment of the external terminal protection device based on the file monitoring service of the present invention is described.

[0030] In this example, the external terminal protection device of the present invention is externally connected to the protected device, and the external terminal protection device includes a file monitoring module and a file output module, wherein the file monitoring module can be connected to an external storage device for The external storage device and the file data contained in it are monitored safely; the file output module is connected with the protected device through the internal interface or port, and transmits the file data to the protected device.

[0031] figure 1 A schematic block diagram of the internal structure of the external terminal protection device based on the file monitoring service of the present invention.

[0032] Such as figure 1 As shown, the file monitoring ...

Embodiment 2

[0063] see Figure 4 and Figure 5 , the present invention also provides a protection system, the external terminal protection device A described in Embodiment 1 of the present invention, wherein the secure file service module establishes a secure communication connection with the file output module to transmit confidential data and retrieve files data, and transmit the file data to the protected device B.

[0064] It should be noted that, in Embodiment 2, descriptions of the same parts as in Embodiment 1 are omitted.

[0065] Preferably, in order to further realize the electrical safety between connected devices, targeted design is also carried out:

[0066] 1) The interface or port adopts a current-limiting and pressure-limiting design

[0067] The electrical safety protection of the terminal protection equipment mentioned in the scheme means that the equipment function uses hardware design to prevent the damage of strong discharge equipment, and introduces a current-limi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an external terminal protection device and protection system based on file monitoring service. The equipment comprises a file monitoring module which can be connected with external storage equipment and is used for carrying out safety monitoring on the external storage equipment and file data contained in the external storage equipment, wherein the file monitoring module comprises a data monitoring module, a safety file service module and a main control module, the safety file service module is used for managing and transmitting file data, and the main control module isused for controlling monitoring, management and transmission of file data; and a file output module which performs confidential data transmission with the security file service module to call securityfile data, and transmits the security file data to the protected equipment. According to the invention, the security monitoring of the external storage device and the file data contained in the external storage device can be realized, and the security risk of the protected device is greatly reduced while the secure transmission of the file data is ensured.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an external terminal protection device and a protection system based on file monitoring services. Background technique [0002] In recent years, the rapid development of computer and information technology has greatly promoted the popularization of the network. When people enjoy the convenience brought by this computer and information technology, it is also the data in the computer used by people in production / life. Security has brought new threats, such as common unauthorized access, posing as a legitimate user, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses, and man-in-the-middle eavesdropping and so on. [0003] There are many technical means to solve intranet security problems, such as installing and using network security products such as firewalls, anti-viruses, and intrusion detectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/06H04L63/0428
Inventor 褚峨维
Owner 北京中科麒麟信息工程有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products