Intelligent computer remote interaction system

A remote interaction, computer technology, applied in the computer field, can solve the problems of poor security, no traceability, data leakage, etc., to achieve the effect of improving security, avoiding leakage, and ensuring security

Inactive Publication Date: 2016-12-07
HEIHE UNIV
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing computer modes for preventing information from being stolen only have the simple measure of setting a power-on password, which has poor security. Most data and application programs can be used as long as they are turned on. For example, when performing remote control, it is easy to cause data loss. leakage, and all operations are not traceable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent computer remote interaction system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] Such as figure 1 As shown, the embodiment of the present invention provides an intelligent computer remote interaction system, including

[0033] The man-machine operation module is used to input identity verification information, complete the authentication of user identity information through the built-in identity verification module, and send the authentication result to the remote monitoring terminal; it is also used to input power-on command information, data call information and various a control command;

[0034] The remote monitoring terminal is used to match the authority according to the identity authentication result and outp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent computer remote interaction system, which comprises a man-machine operation module, a remote monitoring terminal, a security gateway connection module, a central processor, a startup and shutdown module, a timing module, a database format conversion module, a permission granting module, a timing inspection module and a defense decision generation module. All data and application programs are in an encrypted mode, and corresponding permission is granted only after biological authentication is conducted, so the data is well protected from leaking. Different kinds of permission are connected and transmitted through different service nodes, thereby further ensuring data security. Vocal print authentication, face authentication, palm vein authentication and random secret key authentication are combined as a whole, so the system is greatly improved in security. Each control command and each data calling command are traceable. Moreover, permission designs all need to be controlled by the remote monitoring terminal, so the security of a host is further improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to an intelligent computer remote interaction system. Background technique [0002] With the development of science and technology and the progress of society, computers have become a necessity in our daily life. Whether it is work, study or entertainment, we cannot do without computers, so computers are now an indispensable part of us. [0003] Due to the development of computer networks, it has also brought hidden dangers to the security of users' computer information. Network information theft, information attacks, virus transmission, etc. exist and occur all the time. Most of the existing computer modes for preventing information from being stolen only have the simple measure of setting a power-on password, which has poor security. Most data and application programs can be used as long as the power is turned on. For example, when performing remote control, it is easy to cause data loss....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 姜坤王诗莹索向峰
Owner HEIHE UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products