Computer system and its safety encryption

A computer system and security technology, applied in computing, instruments, electrical and digital data processing, etc., can solve the problems of reduced security protection, the system is not really effectively protected, the system vulnerability weakens the actual effect, etc., to ensure security protection. , Avoid hacker attacks, good security protection effect

Inactive Publication Date: 2007-04-04
LENOVO (BEIJING) LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Since the system reinforcement software runs on the original operating system, the vulnerability of the system itself will greatly weaken its actual effect;
[0006] 2) Since system reinforcement is carried out regularly or artificially, and the latest virus attacks or hackers exploiting the latest system vulnerabilities to destroy and steal information are often ahead of these system security reinforcement behaviors, therefore, the entire system has not actually received real protection. effective protection;
[0007] 3) In practical applications, since various system hardening software are separated, a tightly integrated system hardening solution cannot be formed
For example, the automatic download of the anti-virus virus database and the automatic download of the operating system patch cannot be performed at the same time, which reduces the security protection effect of the above-mentioned system reinforcement technology on the entire system;
[0008] 4) At the same time, since there is no secure system channel to download system patches and virus databases, etc., the security of the system hardening file itself cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and its safety encryption
  • Computer system and its safety encryption
  • Computer system and its safety encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The computer system security hardening method of the present invention will be described below with reference to the accompanying drawings.

[0035] FIG. 1 is a structural diagram of a computer system that can implement the security hardening method of the present invention. As shown in FIG. 1 , the computer system includes hardware 1 , BIOS 2 and virtual machine monitor 3 , on which at least one servo operating system 4 and at least one user operating system 5 run. The servo operating system 4 can be an embedded operating system, such as an embedded Linux operating system, which has a security hardening agent module 41, and has a security hardening module 51 in the user operating system 5, and the security hardening module 51 is a kernel-level security hardening module.

[0036] FIG. 2 is a schematic diagram of communication between the local computer system and the security server in the network where the user is located through the security hardening agent module 41...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer system comprises hardware, BIOS and virtualizer monitor with at least one servo operation unit and at least one user operation unit both being operated on virtualizer monitor. It is featured as setting a safety consolidation agent module on servo operation unit and setting a safety consolidation module on user operation unit.

Description

technical field [0001] The invention relates to computer system security technology, in particular to a computer system security reinforcement method based on virtual machine technology. Background technique [0002] With the increasing development of computer and Internet technology, people's dependence on computers is increasing, and the demand for information security is also increasing. At the same time, the attack methods of hackers are constantly changing, and the harm of various computer attacks (such as denial of service attacks, viruses, Trojan horses, and information theft, etc.) is becoming more and more serious. [0003] There are two main types of existing computer security hardening technologies. Among them, a computer security hardening technology is: updating and hardening the computer system by regularly downloading the latest system patch or virus database through the software running on the original operating system. And another kind of computer security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F21/50
CPCG06F21/50
Inventor 刘永锋宋春雨柯克
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products