Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for safeguarding the continuous safety operation of computers

A safe operation, computer technology, applied in the direction of data error detection, response error generation, etc., in the redundancy of calculation and operation, can solve problems such as loss of notebook computer, system crash, lack of arbitration module, etc., to restore operational intelligence and quick, effective results

Inactive Publication Date: 2007-09-12
张健 +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of the existing software and hardware technology level, the destruction of viruses and Trojan horse programs, the computer becomes very unreliable, and it is prone to system crashes and loss of important data.
The system crash directly leads to the inability to use the computer, and the loss of important data leads to the inability to use the computer to complete the required work. Even with the popularity of laptops, the more serious situation is the loss of laptops. The most fatal situation is the loss of important data on laptops.
[0003] At present, there are many computer protection measures, but the existing computer protection measures are relatively single and one-sided to solve some problems
For example, there are special solutions for data recovery, and there are also special solutions for locking computers, but there is no unified and coordinated solution to ensure the continuous and safe operation of computers.
Especially the lack of arbitration module, when a computer disaster occurs, to a large extent, it can only rely on the experience and judgment of the operator, and rely on the wisdom of the operator to choose an appropriate solution. Ordinary users will be helpless due to the lack of these skills
[0004] Many methods of computer protection and recovery that have appeared at present can only solve part of the problem, and each method will have loopholes when used alone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safeguarding the continuous safety operation of computers
  • Method for safeguarding the continuous safety operation of computers
  • Method for safeguarding the continuous safety operation of computers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Equip the computer with a USB key, which has a unique serial number, the serial number is stored in the arbitration module of the computer, and the password of the legal user is stored. This way, only legitimate users can initiate computations. If there is no legal identity to start the computer, the locking and unlocking module will deadlock the hard disk, even if the hard disk of the computer is removed and connected to other computers, it cannot work. In this way, a certain degree of data security is guaranteed. Especially for laptops, the lock and unlock module can delay the time of critical data leakage.

[0027] The system fast recovery module has a filter driver, when the operating system writes a file, it does not overwrite the old file but creates a new file, and marks it with a date and time. When reading a file, select the closest file from many files with the same name according to the date and time mark, and read the file. When the system needs to be res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for protesting computer system and data security which can keep computer operating continuously and securely. It uses computer as main part, and calls five modules to keep computer operating continuously and securely. It comprises: first module as system fast recovery module, second module as system backup recovery module, third module as data network backup recovery module, forth module as computer block-unblock module, fifth module as arbitrating module. It demands users to input legal account number when the computer is started, then it calls block-unblock module to block the locking of the hard disk; when computer system is out-of-order, arbitrating module adopts fast recovery model to recover the system, if it failures, it adopts backup recovery model and auto recovers user's data from network so that it can keep computer operating continuously and securely.

Description

1. Technical field [0001] The invention relates to a method for computer protection, in particular to a method for protecting computer system and data security. The method can quickly recover the system and data when the computer system and data are damaged, and restore the computer to normal operation. 2. Background technology [0002] As an auxiliary tool, the computer is used more and more frequently and is more and more important. However, due to the limitations of existing software and hardware technology levels, the destruction of viruses and Trojan horse programs, computers have become very unreliable, and are prone to system crashes and loss of important data. The system crash directly leads to the inability to use the computer, and the loss of important data leads to the inability to use the computer to complete the required work. Even with the popularity of laptops, the more serious situation is the loss of laptops. The most fatal situation is the loss of important...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/14G06F1/00
Inventor 张健孙汉翔沈文
Owner 张健
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products