Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security control module and safeguard control method thereof

A computer security and control module technology, which is applied in computing, program control devices, instruments, etc., can solve problems such as untrustworthiness, lower system security, and lower ease of use, so as to improve ease of use, ensure safety, and prevent stolen effect

Inactive Publication Date: 2005-06-01
北京太极英泰信息科技有限公司 +1
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the interconnection and interaction between these security devices is very difficult, and even if the linkage of these security devices is realized, this loosely coupled structure will inevitably reduce the security of the entire system; The complexity of unified management greatly reduces the ease of use
[0005] Second, the existing security equipment lacks the monitoring and control of the protected computer host system
For example, a firewall device can ensure that the network channel connected to the firewall on the computer is protected, but when this computer starts another network channel (such as dial-up, wireless network card, USB interface network card) and is not connected to the Internet through the firewall, then the network channel on this computer Cyber ​​Security Gets Out of Control
The firewall device cannot discover that the host system has another network channel, let alone close or take other corresponding measures against the unsafe network channel on the host system
[0006] Third, lack of trusted platform to control and manage computer peripherals
However, this method can only start and close the peripherals before the computer starts, and it is very inconvenient to restart or close the non-plug-and-play devices during the operation of the computer.
[0007] Fourth, existing devices cannot solve the problem of malicious attackers directly accessing or destroying memory by writing underlying drivers.
Therefore, the existing open computer system architecture is an untrusted platform. In order to achieve real security, it is necessary to provide a trusted platform for the control and management of computer peripherals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security control module and safeguard control method thereof
  • Computer security control module and safeguard control method thereof
  • Computer security control module and safeguard control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Such as figure 1 Shown is a schematic structural diagram of the computer security control module of the present invention. The computer security control module has a central processing unit (CPU) 10, and a memory 11, a floppy disk drive 12, an IDE controller 13 and a SCSI controller 14 are connected to the CPU 10. The computer security control module is a hardware module, and may also be a chip containing the computer security control module, or other forms of devices containing the computer security control module. The computer security control module implements security control on the computer through the PCI interface, or it may Outside computer; CPU10 it is the processor based on X86 core, can also be the processor of ARM, MIPS, POWER PC core, or other specialized processors; Memory 11 comprises random access memory and electrically erasable memory or / and only Read memory; IDE controller 13 and SCSI controller 14 are connected with hard disk, hard disk is no longer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The computer safety control module includes CPU, memory connected to the CPU, connector, safety coprocessor, IDE controller, SCSI controller and identity authority identifier. The computer safety protecting control method includes: starting self-test with the safety module in the computer, alarming and waiting for the user to process in case of abnormality found in the self-test, and initiating BIOS program with the computer system unit to initialize the computer; calling computer safety control module PCI to expand ROM and to turn off the unsafe peripheral; performing user authority identification with the user's authority identifier; starting the hardware units based on the authority; entering the computer operation system, monitoring the system unit state and reporting regularly to the safety control module with the background monitoring program, and performing safety processing with the safety control module in case of illegal operation, etc.

Description

technical field [0001] The invention relates to a computer safety control module and a safety protection control method thereof, in particular to an embedded computer safety control module based on a PCI bus interface and a safety protection control method thereof. Background technique [0002] With the development of the times, the use of computers is very common, so the dependence on computers is getting stronger and stronger. Once the computer has a problem, it will be very serious and fatal, so ensuring the safety of the computer is becoming more and more important. There are many existing computer security devices, including hardware security devices and security software. [0003] However, the existing security equipment has the following shortcomings: [0004] First, the existing security equipment only solves a certain aspect of security issues. Therefore, a systematic and complete solution to computer security issues requires the simultaneous use of multiple secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00G06F9/445
Inventor 于万瑞李光肖飞刘金刚姜立辉牛峰黄建军余综甘萌贾立宗从秀芳章文康张拥政沈涵飞李卓王雨晨郑宇乔驰唐海李清俊
Owner 北京太极英泰信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products