Computer information safety control system

A technology of information security and control system, applied in the field of computer information security control system, can solve problems such as unguaranteed attacks, achieve the effect of solving the problem of mutual control of application programs and protecting absolute security

Inactive Publication Date: 2009-04-22
吴晓明
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods all have technical defects to varying degrees, some of which cannot guarantee the attack of "network hackers" on the user's hard disk information at the network end, and some need to turn off the computer to convert the hard disk to work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information safety control system
  • Computer information safety control system
  • Computer information safety control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As shown in Figure 1, the computer information security control system includes: a relay drive part, a computer network control relay, a computer power control relay, a computer power supply, a microprocessor, and an interface conversion part; the output port of the microprocessor is converted through the interface all the way One part of the output port is connected to the user computer, and the other output port is connected to the input port of the relay drive part; one output port of the relay drive part is connected to the input port of the computer network control relay, and the other output port is connected to the computer power supply The input port of the control relay; the computer power control relay is used to control the encryption of the computer security hard disk; the computer network control relay is used to control the on-off of the computer network. As shown in Figures 2 and 3, the computer network control relay of the present invention includes two r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computer information security control, and more particularly relates to a computer information security control system which comprises a relay drive part, a computer network control relay, a computer power control relay, a computer power, a microprocessor and an interface conversion part; one circuit of the output port of the microprocessor is connected with a user computer by the interface conversion part; another circuit of the output port of the microprocessor is connected with the input port of the relay drive part; one circuit of the output port of the relay drive part is connected with the input port of the computer network control relay and another circuit of the output port of the relay drive part is connected with the input port of the computer power control relay; the computer power control relay is used for controlling the encryption on the secret HD of the computer; the computer network control relay is used for controlling the on-off of a computer network. The computer information security control system can effectively ensure the absolute security of the information of the user computer.

Description

technical field [0001] The invention belongs to the field of computer information security control, in particular to a computer information security control system. Background technique [0002] With the rapid development of computer technology and network, computer has become an indispensable tool in people's work, study and life. Similarly, the development of computer networks has also brought hidden dangers to the security of users' computer information. Network information theft, information attacks, virus transmission, etc. exist and occur all the time. In order to solve the user's computer information security problem, people have taken many measures and methods, including using a hard disk isolation card to control the work of double hard disks, two different operating systems to control the work of double hard disks, and manually controlling the two hard disks to work separately. These methods all have technical defects to varying degrees, and some cannot guarantee ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/02G06F21/20H04L9/10G06F21/81
Inventor 吴晓明
Owner 吴晓明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products