A method of computer protection

A computer and program technology, applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve problems such as trouble, leakage of computer login password, illegal login computer password input, etc., and achieve the effect of portability

Active Publication Date: 2017-01-18
李彦锋
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a computer protection method that effectively solves the problems of computer being illegally logged into the computer due to the leakage and guessing of the login password and troublesome password input.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of computer protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Hereinafter, embodiments of the present invention will be described with reference to the drawings.

[0014] Such as figure 1 As shown, the method to unlock the computer, the specific steps are as follows:

[0015] In the first step, when connecting the hardware device storing the locking program and decryption program to the computer, first determine whether the locking program is installed in the computer, if the locking program has been installed in the computer, directly perform the second step; program, execute the locking program in the hardware device.

[0016] The second step is to judge whether the computer is locked. If the computer is not locked, it is not necessary to unlock the computer; if the computer is locked, a login information file is generated. The login information file can be sent to Users' handheld mobile terminals, including mobile phones, tablets, smart watches, etc.

[0017] In the third step, the user confirms whether the user is logging i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer protection method. Hardware equipment is included, a lock program and an unlock program are loaded in the hardware equipment, and the lock program is mounted in the computer when the hardware equipment is connected with the computer for the first time. The lock program locks a screen and an input / output (I / O) interface after the computer is powered on, and the unlock program unlocks the locked computer after the hardware equipment is connected with the computer. The method is characterized in that the hardware equipment is connected with and unlocks the computer and generates a login information file which is sent to a user through the network, and the user determines whether the user himself logs in according to the login information file; the user sends a lock signal to the computer if the person logs in is not the user himself, and the lock program locks a computer screen and the I / O interface. By the aid of the method, the computer utilization condition can be monitored effectively during authorization utilization.

Description

technical field [0001] The invention relates to computer security, in particular to a method for protecting a computer for safe login and use, which protects the computer for safe login and use. Background technique [0002] The way people prevent computers from being used by unauthorized people is generally to set user passwords in the computer system, and the passwords are easy to be leaked, and there is no function to disable the password after entering the wrong password many times, so it is easy It is not very safe for people to guess the correct password by entering the password countless times. As long as others know the password, the computer may be used illegally at any time, and even important secrets in the computer may be stolen. Furthermore, manually inputting the password is also cumbersome, and if one accidentally enters a wrong or missing character, it needs to be re-entered. Contents of the invention [0003] The purpose of the present invention is to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/82
CPCG06F21/34G06F21/85
Inventor 李彦锋李波
Owner 李彦锋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products