Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

External terminal protection equipment and protection system comprising identity information verification

A technology of identity information and protective equipment, applied in the field of computer security, can solve problems such as damage, lack of security awareness, lack of identification ability, etc., to solve security risks, avoid illegal intrusion and theft, and reduce system security risks.

Pending Publication Date: 2020-11-06
北京中科麒麟信息工程有限责任公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to statistics, 70% of computer crimes are caused by the illegal use of key resources such as hosts by insiders, and only 30% of the real threats come from outside. Non-standard external equipment, as well as system misoperation or deliberate destruction, will cause adverse effects or even heavy losses on agencies, enterprises and institutions.
[0004] At the same time, for some special equipment, such as the host equipped with special software control, the equipment of the engineer station / worker station in some industrial fields, these hosts / equipment are often not suitable for such systems on the market due to the particularity of the system. Security protection software, or the installation of security software may easily cause compatibility problems with the original software of the host, or even affect performance
In addition, the hosts of these engineer stations / worker stations basically do not upgrade the operating system after they go online. Even after installing security software, they often do not update the anti-malware software version and malicious code library in time, and cannot achieve comprehensive security protection.
[0005] In addition, for some external protective devices, due to the lack of identification ability for specific users, they are easy to be cracked, invaded or stolen by unauthorized users, resulting in the relevant external protective devices not having privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External terminal protection equipment and protection system comprising identity information verification
  • External terminal protection equipment and protection system comprising identity information verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0029] According to a preferred embodiment of the present invention, the file monitoring module includes:

[0030] The identity information storage unit is used to temporarily store the identity information of the user;

[0031] An identity recognition unit, configured to verify whether the user's identity information satisfies a preset access right.

[0032] According to a preferred embodiment of the present invention, the identity information storage unit is further configured to pre-store identity information of users satisfying access rights.

[0033] According to a preferred embodiment of the present invention, when the external interface is connected to an external device, the identity recognition unit matches the identity information collected from the user with the pre-stored identity information of the user who meets the access authority, if If the matching is successful, the user meets the access rights.

[0034] According to a preferred embodiment of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses external terminal protection equipment and a protection system comprising identity information verification. The external terminal protection equipment comprises: a plurality of external interfaces used for being connected with one or more external equipment and a piece of protected equipment respectively; the identity information acquisition module that is used for acquiring identity information of a user in real time; the file monitoring module that is connected with the identity information acquisition module, is used for verifying the identity information, and is also used for controlling the security authentication of external equipment accessed to the external interface; and the file transmission module that is connected with the file monitoring module and isused for transmitting the file data imported by the external equipment to the protected equipment under the control of the file monitoring module. According to the invention, the purpose of performingsafety protection on the protected equipment without installing safety protection software on the protected equipment can be achieved, and the safety risk of the system is greatly reduced by verifying and determining the identity and the use permission of the current operator.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an external terminal protection device and a protection system including identity information verification. Background technique [0002] In recent years, the rapid development of computer and information technology has greatly promoted the popularization of the network. When people enjoy the convenience brought by this computer and information technology, it is also the data in the computer used by people in production / life. Security has brought new threats, such as common unauthorized access, posing as a legitimate user, destroying data integrity, interfering with the normal operation of the system, using the network to spread viruses, and man-in-the-middle eavesdropping and so on. [0003] There are many technical means to solve intranet security problems, such as installing and using network security products such as firewalls, anti-viruses, and intrusio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/85G06F21/60G06F21/32G06F21/36
CPCG06F21/85G06F21/606G06F21/32G06F21/36
Inventor 褚峨维张昊刘鹏
Owner 北京中科麒麟信息工程有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products