Computer System and Security Reinforcing Method Thereof
First Claim
1. A computer system for carrying out security reinforcing, comprising hardware, a BIOS, and a virtual machine monitor, characterized in further comprising at least one servo operating system and at least one user operating system running on the computer system, wherein,the servo operating system is booted before the user operating system is booted;
- the servo operating system comprises a security reinforcing proxy unit for communicating with a security server in a network in which the computer system locates, to determine whether it is needed to carry out security reinforcing on the user operating system or not, and to determine whether the security reinforcing on the user operating system is to be carried out by the security reinforcing proxy unit itself or not based on the types of security reinforcing files to be reinforced.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a computer system for carrying out security reinforcing and a security reinforcing method. The computer system comprises hardware, a BIOS, and a virtual machine monitor, and has at least one servo operating system and at least one user operating system running thereon, wherein, the servo operating system comprises a security reinforcing proxy module, and the user operating system comprises a security reinforcing module. With the present invention, it is possible to prevent the security reinforcing performance from being tampered by the frangibility of the user operating system, and to avoid hacker attacks which cannot be avoided in case of regular or manual security reinforcing, and also to ensure better secure defense of the computer system and the security of the downloaded security reinforcing files own.
15 Citations
18 Claims
-
1. A computer system for carrying out security reinforcing, comprising hardware, a BIOS, and a virtual machine monitor, characterized in further comprising at least one servo operating system and at least one user operating system running on the computer system, wherein,
the servo operating system is booted before the user operating system is booted; the servo operating system comprises a security reinforcing proxy unit for communicating with a security server in a network in which the computer system locates, to determine whether it is needed to carry out security reinforcing on the user operating system or not, and to determine whether the security reinforcing on the user operating system is to be carried out by the security reinforcing proxy unit itself or not based on the types of security reinforcing files to be reinforced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 13, 14, 15, 16)
-
10. A computer system security reinforcing method, comprising steps of:
-
booting at least one servo operating system before booting a user operating system; communicating with a security server in a network in which the computer system locates by a security reinforcing proxy unit of the servo operating system, to determine whether it is needed to carry out security reinforcing on the user operating system or not; determining whether the security reinforcing on the user operating system is to be carried out by the security reinforcing proxy unit itself or not based on the types of security reinforcing files to be reinforced; and immediately carrying out security reinforcing on the user operating system and updating the corresponding security reinforcing files in the user operating system when it is determined that the security reinforcing on the user operating system is to be carried out by the security reinforcing proxy unit itself. - View Dependent Claims (11, 12, 17, 18)
-
Specification