Unlock instant, AI-driven research and patent intelligence for your innovation.

Operation method of computing device and computing device

A technology of computing equipment and operating methods, applied in the field of computing equipment operating methods and computing equipment, can solve problems such as leaking, lack of data security protection technology, stealing, etc., and achieve the effect of ensuring data security

Inactive Publication Date: 2017-06-20
ANTAIOS (BEIJING) INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above-mentioned traditional protection methods can play a certain positive effect on information security, the protection effect is very limited, because the traditional protection methods are based on the identification technology based on prior knowledge screening, which cannot deal with unknown threats, and only through Doing targeted reinforcement and monitoring for computing equipment, but not completely controlling the terminal, so there will always be new means of leaking and stealing secrets, even unknown ways
[0005] To sum up, the existing technology lacks a data security protection technology that achieves complete control of computing terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation method of computing device and computing device
  • Operation method of computing device and computing device
  • Operation method of computing device and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not intended to automatically limit the application if in fact more than one invention is disclosed The scope is any individual invention or inventive concept.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation method of a computing device and the computing device. The operation method of the computing device comprises the steps that an operating system of the device is operated in a local disk system; after the operation of the operating system, a data control method is executed; a first computing device, which executes the data control method, at least executes the following operation that a target address of a storage instruction to be executed is changed to a disk address of a second computing device, and / or a source address of a reading instruction to be executed is changed to a disk address of a second computing device. The operation method of the computing device and the computing device is capable of making computing devices be in real-time monitor state by the configuration of 'incomplete terminal structure' control, and on the basis of that, data of the computing devices in operation is dumped to the second computing device by the utilization of the data control method so that the data control is achieved, and with no local datamation of the first computing device, the local data has no leak risk meanwhile, thereby guaranteeing the data security of the computing devices.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a computing device operating method and computing device. Background technique [0002] With the rapid development of computer and network technology, on the one hand, it makes people's daily work more convenient, but on the other hand, it also makes people's personal data, corporate data, and even confidential data face a more serious risk of leakage, especially the government. Confidential, military, industrial, financial, medical and other key areas. [0003] In the field of computer information security, the following three technologies are generally used to ensure data security: (1) Data content security technology, including data encryption and decryption technology and end-to-end link encryption technology, to ensure that the content of data is not illegally read during storage and transmission (2) Data security transfer technology, including preventing illega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6218G06F21/604
Inventor 汪家祥孔令超
Owner ANTAIOS (BEIJING) INFORMATION TECH