Computer system and method for managing computer user right

A technology for managing computers and computer systems, applied in the field of computer systems and managing computer user rights, can solve the problems of not distinguishing user rights, single functions, and no association between equipment and user rights, so as to protect important data and personal privacy, and save costs. Effect

Active Publication Date: 2015-04-22
北京明朝万达科技股份有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) Bind ordinary U disk, but the function is single, there is no distinction between user permissions, and the device is not associated with user permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and method for managing computer user right
  • Computer system and method for managing computer user right
  • Computer system and method for managing computer user right

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056]Embodiment 1 provides a computer user rights management method for identifying user rights based on different USB disks.

[0057] combine Figure 1-2 The U disk binding computer and operation flow chart describe the realization process of the overall technical solution:

[0058] 1) Install the software system

[0059] Install software packages, including setup programs, network filter drivers, file system filter drivers, and service programs. The setting program is used to set the U disk binding and permission association; the network filter driver is used to filter network access; the file system filter driver is used to protect files and folders; the service program is used to detect the U disk and communicate with the driver.

[0060] After installation, use the setup program to pass all files / folders to be protected to the file system filter driver.

[0061] 2) Bind U disk

[0062] (1) Open the setup program, insert the U disk, read the device information of the ...

Embodiment 2

[0119] combined with Figure 4-5 The USB peripheral binding computer flow chart in the description describes the implementation process of the overall technical solution of embodiment 2:

[0120] 1) Install the software system

[0121]Install software packages, including setup programs, network filter drivers, file system filter drivers, and service programs. The setup program is used to set the removable device binding and permission association; the network filter driver is used to filter network access; the file system filter driver is used to protect files and folders; the service program is used to detect the removable device and communicate with the driver.

[0122] After installation, use the setup program to pass all files / folders to be protected to the file system filter driver.

[0123] 2) Bind the removable device

[0124] (1) Open the setting program, insert the USB removable device, and read the information of the USB device and the hardware information of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer system and a method for managing a computer user right. The computer system comprises a computer and a USB peripheral. The method comprises the following steps that the USB peripheral is inserted into a computer, hardware recognition information of the USB peripheral and the computer is read, a user identity recognition file is generated according to the hardware recognition information of the USB peripheral and the computer, and right management information of a computer user is stored in the user identity recognition file. When the fact that the USB peripheral is inserted into the computer is detected, right management can be performed on the computer user according to the right management information in the user identity recognition file.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a computer system and a method for managing computer user rights. Background technique [0002] There will be some very important data on the computer of the company or individual, and unauthorized people cannot access the computer; or leave the work place temporarily, need to manually lock the screen, and enter the password to use the system after returning. The usual method is to set a password, but the password can be disseminated, and once you want to cancel the authorization, you need to change the password and notify the relevant people. If you can tether a small, removable device to your computer, you can effectively protect your data. [0003] In addition, there are situations where multiple people can access the same computer. At this time, different users may have different needs. For example, some filtering restrictions are required on the network content accessed by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34
CPCG06F21/34G06F2221/2141
Inventor 李海京王志海喻波张磊白佳亮曾雄
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products