Computer information security active defense and monitoring system
A technology of active defense and information security, applied in computer security devices, computing, instruments, etc., and can solve problems such as no control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] The invention discloses an active defense and monitoring system for computer information security. The system includes an encryption system installed in a client computer and a software monitoring system. The client computer is connected with an application server through an HTTP protocol, and the application server communicates with the client through a wireless network. The presentation layer data server is connected.
[0020] The encryption system locks the client computer on the login interface and checks whether the dongle is correctly plugged into the USB interface of the client computer in the form of data exchange. If the encryption system cannot complete the data exchange or the data read by the encryption system from the dongle It is different from the data stored in the security login data module of the customer presentation layer data server, and the client computer is still in the security login interface. The stored data is the same, and the client compute...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com