Computer I/O port control program

A port control, computer technology, used in computing, user identity/authority verification, instruments, etc.

Inactive Publication Date: 2010-02-17
CATECH TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are many similar network security software on the market, such as Trojan Star, Encryption Expert, Network Management Expert, etc. Many of them can protect the computer to a certain extent, but usually by entering passwords or data verification. Realize, seldom have software to control the use authority of optical drive, floppy drive, USB by directly interfering with computer I / O port, the I / O LOCK computer security software that the inventor designs has used this method innovatively to protect I / O resource , restrict the illegal use of unauthorized personnel
[0003] In short, from the perspective of existing technologies, network security software has not been able to effectively protect and manage the confidential information of internal networks and stand-alone computers from the basic channel of information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer I/O port control program
  • Computer I/O port control program
  • Computer I/O port control program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 As shown, the computer I / O port control method of the present invention directly controls the I / O port resources of the computer through the management terminal software of the server and the corresponding client software, including the following steps:

[0031] Step 1, the client software runs;

[0032] Step 2, the client submits an application for using the device;

[0033] Step 3, the application is transmitted to the server through the network;

[0034] Step 4, the server verifies the identity of the client;

[0035] Step 5, if the verification fails, feed back to the client, and the client will process it after receiving the feedback; if the verification passes, execute step 6;

[0036] Step 6, verify customer authority;

[0037] Step 7, if the verification fails, refuse to use the device and give feedback to the client, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a computer I / O port control program. It is characterized by that it utilizes management end software of server and correspondent customer terminal software to directly make authority control for I / O port resource of computer. The adoption of said method can completely proceed from angle of said method can completely proceed from angle of user, can be directed againstthe characteristics of that all the safety measures and authority distribution are completely transparent for all the users and can effectively prevent internal various possible illegal connections with interconnected network, illegal copy and data transfer, illegal data utilization, unauthorized contact with confidential data and document and malicious breakage of data, etc. so as to implement monitoring control and safety management of whole internal network and single computer.

Description

technical field [0001] The invention relates to the field of computer safety management in information technology and Internet technology, in particular to a computer I / O port control method. Background technique [0002] At present, there are many similar network security software on the market, such as Trojan Star, Encryption Expert, Network Management Expert, etc. Many of them can protect the computer to a certain extent, but usually by entering passwords or data verification. Realize, seldom have software to control the use authority of optical drive, floppy drive, USB by directly interfering with computer I / O port, the I / O LOCK computer security software that the inventor designs has used this method innovatively to protect I / O resource , to limit the illegal use of unauthorized personnel. [0003] In short, from the perspective of existing technologies, network security software cannot effectively protect and manage internal network and stand-alone confidential inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00H04L9/32
Inventor 李苏安
Owner CATECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products