User data security lock

A technology of user data and security lock, which is applied in the field of computer security, can solve problems such as data destruction, personal firewall resistance effect is negligible, and achieve the effect of ensuring security

Inactive Publication Date: 2017-10-03
CHONGQING TECH & BUSINESS INST
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the safety of data in the computer, the first thing users need to do is to install a set of anti-virus software and set up a personal firewall. The effect of defense is negligible, therefore, hacker attacks should also be included in the prevention object
Onc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data security lock
  • User data security lock
  • User data security lock

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Example 1:

[0025] Such as figure 1 The user data security lock shown includes a power supply module connected to the host, and it also includes a detection module for detecting the network security of the host. When a dangerous situation is detected, it can first send an emergency signal to the power control module. Then send a lock signal to the lock module. When the detection situation is safe, the unlock module can be controlled to turn on and send a safety signal to the sleep control module;

[0026] The power control module is used to receive emergency signals and safety signals, and can control the power on and off of the data disk in the host;

[0027] Sleep control module. The detection module first sends an emergency signal to the sleep control module. After receiving the emergency signal, the sleep control signal controls the data disk to sleep, stops the data connection between the data disk and the host, and then is sent by the sleep control module Lock signal t...

Example Embodiment

[0036] Example 2:

[0037] Such as image 3 As shown, the difference from embodiment 1 is that: the unlocking module in this embodiment is a password verification module set on the host, including a password entry unit for the user to enter a password; a password storage unit for storing correct password information ; The password comparison unit is used to compare the entered password signal with the correct password information in the password storage unit, and output an unlock signal to the power control module after the comparison is successful.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer security, and provides a user data security lock which can protect data during computer repair. The user data security lock comprises a power supply module connected with a host, a detection module, a power supply control module, a locking module and an unlocking module; the detection module is used for detecting the network security situation of the host, when it is detected that hazardous situations exist, an emergency signal can be sent to a power supply control module first, then, a locking signal is sent to a locking module, and when it is detected that the situations are safe, an unlocking module can be controlled to start and send the security signal to the power supply control module; the power supply control module is used for receiving the emergency signal and the security signal, and can control on and off of a data disk power supply in the host; the power supply control module is locked after the locking module is received, and the power supply control module cannot output a power supply signal after being locked; the unlocking module in an on state can be used for unlocking the power supply control module.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a user data security lock. Background technique [0002] With the development of science and technology, computers exist in all aspects of our lives, so the importance of its security is particularly important. Only by strengthening effective security protection measures can we reduce computer security threats. The most important thing in a computer is the security of stored data. The main threats it faces include: computer viruses, illegal access, computer electromagnetic radiation, hardware damage, etc. Among them, computer viruses and illegal access have always plagued computers. user. [0003] In order to ensure the safety of data in the computer, the first thing users need to do is to install a set of anti-virus software and set up a personal firewall. The effect of defense is negligible, therefore, hacker attacks should also be included in the prevention object. Once a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/56G06F21/32
Inventor 李巨陈林基
Owner CHONGQING TECH & BUSINESS INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products