首页>
外国专利>
Computer securing method, involves verifying that predefined access rules at external unit are validated by communication between external unit and operating system and transmitting communication to recipient if rules are validated
Computer securing method, involves verifying that predefined access rules at external unit are validated by communication between external unit and operating system and transmitting communication to recipient if rules are validated
The method involves intercepting all the communications between an external unit at Microsoft windows(RTM: Operating system) of a computer and or Linux system(RTM: Operating system) by a mediator, where the external unit has a storage unit of secret cryptographic data. Verification is made that predefined access rules at the external unit are validated by the communication. The communication is transmitted to a recipient if the rules are updated. Data transmission of the data is secured before storing the data. Independent claims are also included for the following: (1) a computer program product comprising program code instructions recorded on a medium readable by a computer for implementing a method for securing a computer (2) a system for securing a computer, comprising an interface unit.
展开▼