Computer system for ensuring information security

A computer system and information security technology, applied in the computer field, can solve problems such as inability to effectively ensure user information security, poor encryption effect, etc., and achieve the effect of preventing network virus intrusion, ensuring use security, and stable performance.

Inactive Publication Date: 2018-12-21
江苏慧学堂系统工程有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current computer system is encrypted by a simple encryption system, the encr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system for ensuring information security
  • Computer system for ensuring information security
  • Computer system for ensuring information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] see Figure 1-3 , the present invention provides a technical solution: a computer system for ensuring information security, including a central processing unit 1, a login verification module 2, a storage module 3, a risk assessment module 4, a network virus scanning module 5 and a virus isolation module 6, the The central processing unit 1 is respectively connected to the login verification module 2, the storage module 3, the risk assessment module 4, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer system for ensuring information security, including the CPU, login authentication module, storage module, Risk assessment module, A network virus scanning module anda virus isolation module, A CPU is respectively connected with login authentication modules, the storage module, Risk assessment module, network virus scanning module, The virus isolation module, thealarm module, the database module, the hard disk power controller and the monitoring unit, and the central processor are connected with the background monitoring server through the wireless transmission unit. The invention can effectively ensure the safety of the computer, prevent the data leakage and the network virus intrusion, and effectively ensure the information safety of the user.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a computer system for ensuring information security. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and leak personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), information security refers to information systems (including hardware, software, etc.) , data, people, physical environm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/60G06F21/32
CPCG06F21/32G06F21/561G06F21/568G06F21/602
Inventor 王红林
Owner 江苏慧学堂系统工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products