Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security control method and security control device

A security control and computer technology, applied in the computer field, can solve problems such as lack of common monitoring and inability to truly guarantee security, and achieve the effect of ensuring security and meeting the needs of use

Inactive Publication Date: 2017-09-15
HENAN POLYTECHNIC
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, when an illegal user uses a computer to enter the computer system, privately extracts data in the computer or performs modification, transfer, copy, etc., the verification of the logged-in user in the related technology lacks joint monitoring from multiple directions, and once the verification is passed, the Have the same authority to use the computer, can use the computer at will, can not really guarantee the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security control method and security control device
  • Computer security control method and security control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to be able to understand the above objectives, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that the embodiments of the application and the features in the embodiments can be combined with each other if there is no conflict.

[0027] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited to the specific details disclosed below. Limitations of the embodiment.

[0028] figure 1 A schematic flowchart of a computer security control method according to an embodiment of the present invention is shown.

[0029] Such as figure 1 As shown, the computer security control ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer security control method and security control device. The computer security control method comprises the steps that when it is detected that a user logs in a computer, historical information generated in the computer using process is acquired, and first authorization verifying information is generated according to the historical information; identity information of the user is collected and sent to specific equipment to acquire second authorization verifying information fed back by the specific equipment on the basis of the identity information of the user; login prompt information is generated according to the first authorization verifying information and the second authorization verifying information; login verifying information input by the user on the basis of the login prompt information is acquired; the authority level of the user is determined according to the login verifying information, the first authorization verifying information and the second authorization verifying information; and a process corresponding to the authority level of the user runs.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to a computer security control method and a computer security control device. Background technique [0002] With the development of science and technology, computers and computer networks have become important information carriers and transmission channels for enterprises, governments and various other organizations, greatly improving work efficiency and enabling the storage and processing of massive amounts of information. [0003] In addition to bringing convenience to people's life and work, computers and computer networks also bring security issues that have received widespread attention. In particular, when an illegal user uses a computer to enter the computer system, privately extract data from the computer or perform modification, transfer, copying, etc., the verification of logged-in users in related technologies lacks joint monitoring from multiple aspects, and once the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815
Inventor 李冰李加彦王盛姚晓辉孙睿王利云
Owner HENAN POLYTECHNIC
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More