Safe terminal system and terminal safety method

A security terminal and terminal security technology, applied in transmission systems, computer security devices, instruments, etc., can solve problems such as single security means and functions, and achieve security requirements and high effects

Active Publication Date: 2009-09-02
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to propose a new security terminal system and terminal security method in view of the single-function defect of each of the above-mentioned security means

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe terminal system and terminal safety method
  • Safe terminal system and terminal safety method
  • Safe terminal system and terminal safety method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a new secure terminal system and terminal security method, the core idea of ​​which is: build a security-reinforced trusted operating system (such as a trusted Linux operating system), and maintain a verified list of safe software, The above-mentioned trusted operating system, safety software list and safety software are pre-installed on a mobile storage device (such as a mobile hard disk or a flash drive, etc.), and the mobile storage device is used to start an ordinary terminal, so that the terminal runs the trusted operation on the mobile storage device system, thereby creating a secure endpoint environment. When the terminal is running, the security management client located on the mobile storage device interacts with the security management center located in the protected network inside the organization and / or enterprise to monitor user behavior on the terminal system. After the mobile storage device is unplugged, the terminal will re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe terminal system which comprises a terminal and a mobile storage device connected to the terminal through a data interface, wherein the terminal comprises a trusted operating system module and a safe management client-side module which are loaded on the mobile storage device; the trusted operating system module is used for a trusted operating system which controls the operation of the terminal, and the safe management client-side module is used for collecting client identity information and collecting and registering operating procedures. The invention also provides a corresponding terminal safety method. The invention realizes the safety requests and the high property of the terminal in such a way that the trusted operating system loaded on the mobile storage device controls the terminal to thoroughly shield an original system environment of the terminal so as to form a pure safe terminal environment.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a security terminal system and a terminal security method. Background technique [0002] With the rapid improvement of informatization and the electronicization of production and office systems, the internal network of enterprises has become the main carrier of confidential information and intellectual property rights of organizations and or enterprises. FBI (Federal Bureau of Investigation, US Federal Bureau of Investigation) and CSI (Crime Scene Investigation, US Crime Scene Forensics Section) have investigated 484 companies and found that more than 85% of security threats come from within the enterprise, of which 16% come from internal unauthorized 14% of the access comes from the theft of patent information, 12% from the financial deception of insiders, and 11% from the destruction of data or networks. [0003] Therefore, the terminal in the enterprise internal network has b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L29/06G06F21/60
Inventor 戚建淮邹跃军唐威
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products