Computer security apparatus and method

A computer security and protective device technology, applied in computer security devices, internal/peripheral computer component protection, computing, etc., can solve problems such as low convenience of use, incompatibility of software or driving computer hardware, etc., and achieve complete security protection Effect

Active Publication Date: 2009-08-12
北京鼎普科技股份有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, as far as the current market is concerned, almost all information security protection products are installed and run on the operating system. When using it, it is necessary to select the appropriate version of software or driver for installation according to the type of operating system installed on the computer. Not only is it not easy to use, but there are problems such as software or drivers may not be compatible with the operating system or computer hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security apparatus and method
  • Computer security apparatus and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The computer safety protection device of the present invention is a hardware card with a PCI adapter card as a carrier, and a key device with verification passwords and authorization files attached. The present invention provides the password verification of computer start-up, provides the protection measure of starting computer hardware at the lowest level at the BIOS layer, and provides a double verification mechanism in combination with hard disk full-disk data protection verification, ensuring that only authorized users can use computer hardware equipment and Hard disk data provides computer system confidentiality and integrity testing; the full disk protection of hard disk data realizes real-time protection of hard disk data and is completely transparent to users; the configurable computer startup medium selection function realizes forced hard disk startup or according to The BIOS is set to start sequentially, which avoids the safety hazard caused by CD-ROM booting....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer security protection device and a method thereof. The device comprises a motherboard interface connected with a computer motherboard, a hard disk interface connected with a computer hard disk, and a hard disk data protection module connected between the motherboard interface and the hard disk interface. The hard disk data protection module performs physical interception on hard disk data, and modifies an IDE data wire which originally is connected to the hard disk from the computer motherboard into the IDE data wire which passes through the hard disk data protection module and then is connected to the hard disk, thereby realizing the protection processing on all the hard disk data including a computer operating system.

Description

technical field [0001] The invention relates to an information security protection device and a method thereof, in particular to a computer security protection device and a method thereof. Background technique [0002] With the rapid development of computer technology, the continuous development of computer network, and the increasing popularity of electronic office, global informatization has become a major trend of human development. More than 80% of the data of governments, enterprises and institutions are stored in computers in electronic format. [0003] While enjoying the convenience and speed brought by informatization, the security of information is also threatened. In order to prevent confidential information, important business data and other sensitive information, information carriers, and information processing processes from leaking out, necessary security protection measures must be taken for confidential computers or computers that store important information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/02G06F21/24G06F9/445G06F21/71G06F21/85
Inventor 于晴王海洋
Owner 北京鼎普科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products