Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User data security lock

A technology of user data and security lock, which is applied in the field of computer security, can solve problems such as data destruction, personal firewall resistance effect is negligible, and achieve the effect of ensuring security

Inactive Publication Date: 2017-10-03
CHONGQING TECH & BUSINESS INST
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the safety of data in the computer, the first thing users need to do is to install a set of anti-virus software and set up a personal firewall. The effect of defense is negligible, therefore, hacker attacks should also be included in the prevention object
Once a computer is infected by a virus or maliciously attacked, the data in the computer may still be damaged during the period when the antivirus software is killing the virus or the computer is being repaired, so the data security problem needs to be solved urgently during this period.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data security lock
  • User data security lock
  • User data security lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Such as figure 1 The user data security lock shown includes a power supply module connected to the host, and also includes a detection module for detecting the network security of the host. When a dangerous situation is detected, an emergency signal can be sent to the power control module first. Then send a locking signal to the locking module, and when the detection situation is safe, the unlocking module can be controlled to open and send a safety signal to the dormancy control module;

[0026] The power control module is used to receive emergency signals and safety signals, and can control the power on and off of the data disk in the host;

[0027] The dormancy control module, the detection module first sends the emergency signal to the dormancy control module. After receiving the emergency signal, the dormancy control signal controls the data disk to enter the dormant state, stops the data connection between the data disk and the host, and then the dormancy control ...

Embodiment 2

[0037] Such as image 3 As shown, the difference from Embodiment 1 is that the unlocking module in this embodiment is a password verification module arranged on the host computer, including a password input unit for the user to input a password; a password storage unit for storing correct password information The password comparison unit is used to compare the entered password signal with the correct password information in the password storage unit, and output an unlocking signal to the power control module after the comparison is successful.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer security, and provides a user data security lock which can protect data during computer repair. The user data security lock comprises a power supply module connected with a host, a detection module, a power supply control module, a locking module and an unlocking module; the detection module is used for detecting the network security situation of the host, when it is detected that hazardous situations exist, an emergency signal can be sent to a power supply control module first, then, a locking signal is sent to a locking module, and when it is detected that the situations are safe, an unlocking module can be controlled to start and send the security signal to the power supply control module; the power supply control module is used for receiving the emergency signal and the security signal, and can control on and off of a data disk power supply in the host; the power supply control module is locked after the locking module is received, and the power supply control module cannot output a power supply signal after being locked; the unlocking module in an on state can be used for unlocking the power supply control module.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a user data security lock. Background technique [0002] With the development of science and technology, computers exist in all aspects of our lives, so the importance of its security is particularly important. Only by strengthening effective security protection measures can we reduce computer security threats. The most important thing in a computer is the security of stored data. The main threats it faces include: computer viruses, illegal access, computer electromagnetic radiation, hardware damage, etc. Among them, computer viruses and illegal access have always plagued computers. user. [0003] In order to ensure the safety of data in the computer, the first thing users need to do is to install a set of anti-virus software and set up a personal firewall. The effect of defense is negligible, therefore, hacker attacks should also be included in the prevention object. Once a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/56G06F21/32
Inventor 李巨陈林基
Owner CHONGQING TECH & BUSINESS INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products