External terminal protection equipment and protection system comprising identity information verification

A technology of identity information and protective equipment, applied in the field of computer security, can solve problems such as damage, lack of security awareness, lack of identification ability, etc., to solve security risks, avoid illegal intrusion and theft, and reduce system security risks.

Pending Publication Date: 2020-11-06
北京中科麒麟信息工程有限责任公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. Non-standard external equipment, as well as system misoperation or deliberate destruction, will cause adverse effects or even heavy losses on agencies, enterprises and institutions.
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station/worker station in some industrial fields, these hosts/equipment are often not suitable for such systems on the market due to the particularity of the system. Security protection software, or the installation of se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External terminal protection equipment and protection system comprising identity information verification
  • External terminal protection equipment and protection system comprising identity information verification

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] According to a preferred embodiment of the present invention, the file monitoring module includes:

[0030] An identity information storage unit, used to temporarily store the identity information of the user;

[0031] The identity identification unit is used for verifying whether the identity information of the user satisfies the preset access authority.

[0032] According to a preferred embodiment of the present invention, the identity information storage unit is further configured to pre-store the identity information of users who satisfy the access rights.

[0033] According to a preferred embodiment of the present invention, when the external interface is connected to an external device, the identity identification unit matches the identity information collected from the user with the pre-stored identity information of the user satisfying the access authority. If the match is successful, the user satisfies the access permission.

[0034] According to a preferred ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses external terminal protection equipment and a protection system comprising identity information verification. The external terminal protection equipment comprises: a plurality of external interfaces used for being connected with one or more external equipment and a piece of protected equipment respectively; the identity information acquisition module that is used for acquiring identity information of a user in real time; the file monitoring module that is connected with the identity information acquisition module, is used for verifying the identity information, and is also used for controlling the security authentication of external equipment accessed to the external interface; and the file transmission module that is connected with the file monitoring module and isused for transmitting the file data imported by the external equipment to the protected equipment under the control of the file monitoring module. According to the invention, the purpose of performingsafety protection on the protected equipment without installing safety protection software on the protected equipment can be achieved, and the safety risk of the system is greatly reduced by verifying and determining the identity and the use permission of the current operator.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an external terminal protection device and a protection system including identity information verification. Background technique [0002] In recent years, the rapid development of computer and information technology has greatly promoted the popularization of the network. When people enjoy the convenience brought by this computer and information technology, it is also the data in the computer used by people in production / life. Security has brought new threats, such as common unauthorized access, posing as a legitimate user, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses, and man-in-the-middle eavesdropping and so on. [0003] There are many technical means to solve intranet security problems, such as installing and using network security products such as firewalls, anti-viruses, and intrusio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/85G06F21/60G06F21/32G06F21/36
CPCG06F21/32G06F21/36G06F21/606G06F21/85
Inventor 褚峨维张昊刘鹏
Owner 北京中科麒麟信息工程有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products