首页> 外国专利> Computer securing method, involves verifying that predefined access rules at external unit are validated by communication between external unit and operating system and transmitting communication to recipient if rules are validated

Computer securing method, involves verifying that predefined access rules at external unit are validated by communication between external unit and operating system and transmitting communication to recipient if rules are validated

机译:计算机安全方法,涉及通过外部单元和操作系统之间的通信来验证外部单元上的预定义访问规则是否得到了验证,如果规则得到验证,则将通信传输给接收者

摘要

The method involves intercepting all the communications between an external unit at Microsoft windows(RTM: Operating system) of a computer and or Linux system(RTM: Operating system) by a mediator, where the external unit has a storage unit of secret cryptographic data. Verification is made that predefined access rules at the external unit are validated by the communication. The communication is transmitted to a recipient if the rules are updated. Data transmission of the data is secured before storing the data. Independent claims are also included for the following: (1) a computer program product comprising program code instructions recorded on a medium readable by a computer for implementing a method for securing a computer (2) a system for securing a computer, comprising an interface unit.
机译:该方法包括通过调解器拦截计算机的Microsoft Windows(RTM:操作系统)上的外部单元和或Linux系统(RTM:操作系统)之间的所有通信,其中,外部单元具有秘密密码数据的存储单元。验证通过通信验证了外部单元上的预定义访问规则。如果规则被更新,则通信被发送给接收者。在存储数据之前,确保数据的数据传输。还包括以下方面的独立权利要求:(1)一种计算机程序产品,包括记录在计算机可读介质上的程序代码指令,以实现用于保护计算机的方法(2)用于保护计算机的系统,包括接口单元。

著录项

相似文献

  • 专利
  • 外文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号