A method for implementing a secure computer

A computer and computer control technology, applied in the computer field, can solve problems such as leaking commercial secrets, and achieve the effect of preventing leaks

Active Publication Date: 2017-10-31
HEFEI LCFC INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if users leave the company network, they can still continue to use their own computers, which may reveal some company-related business secrets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing a secure computer
  • A method for implementing a secure computer
  • A method for implementing a secure computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 As shown, the embodiment according to the present invention involves a business computer 10 and a company server 20, and the communication between the two is through the TCP / IP protocol. When the commercial computer 10 is used for the first time, use the motherboard configuration program of the commercial computer 10, that is, UEFI BIOS SETUP, to set and input the MAC address of the company server 20. When the commercial computer 10 is turned on, after the UEFI BIOS hardware self-test finishes, the network card driver will be loaded in the UEFI BIOS SETUP, and the network detection function will be turned on, such as figure 2 Shown in S101. The commercial computer 10 will send a network packet containing the MAC address of the company server 20 and the MAC address of the commercial computer 10 to the MAC address of the company server 20, such as figure 2 As shown in S102, and encrypt the certificate of the commercial computer 10, and then wait for t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing a safe commercial computer. The method includes: starting the network detection function of the commercial computer; sending the network packet to the MAC address of the server by the commercial computer; Network packets from commercial computers and take corresponding actions according to the judgment results; when receiving network packets from commercial computers, judge the validity of the MAC address of the commercial computers and take corresponding actions accordingly; at the corresponding time Inside, the commercial computer judges whether it has received the feedback network packet from the server and takes corresponding actions accordingly. The invention can prevent the illegal operation of the commercial computer and prevent the disclosure of the company's business secrets.

Description

technical field [0001] The present invention relates to computers, and more particularly to methods of using computers securely. Background technique [0002] For commercial computers, most companies currently use the domain server built by the company, and then the company's computer logs into the domain and enters the password to operate. However, if users leave the company network, they can still continue to use their own computers, which may reveal some company-related business secrets. Contents of the invention [0003] In view of the above problems, the present invention provides three methods for realizing the safe use of computers, so as to realize the safe use of computers and prevent the disclosure of business secrets of enterprises. [0004] To achieve the above object, one aspect of the present invention provides a method for controlling the operating condition of a computer, the method comprising: [0005] Load the network card driver; [0006] Send a netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/602
Inventor 郑红文
Owner HEFEI LCFC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products