Computer network security system and a working method thereof

A computer network and security system technology, applied in the field of computer network security systems, can solve the problems of increasing the safety factor, unable to meet the needs of use, inconvenience, etc., and achieve the effects of increasing the use effect, increasing the difficulty of opening, and improving the safety factor

Inactive Publication Date: 2019-02-22
HUBEI POLYTECHNIC INST
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Today’s employees usually leave the company to go out to do business. In order to protect their computers from being opened by others, they usually use a power-on password for protection. Although the method increases the safety factor, sometimes colleagues need to help open the computer to obtain information when doing business outside, and fingerprint authentication prevents colleagues from opening the computer; The use of people has brought great inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network security system and a working method thereof
  • Computer network security system and a working method thereof
  • Computer network security system and a working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative work, any modifications, equivalent replacements, improvements, etc., shall be included in the protection scope of the present invention Inside.

[0024] like Figure 1 to Figure 4 As shown, a computer network security system includes a computer, a camera, and the computer is connected to the camera line. The computer network security system also includes a mobile terminal, and the mobile terminal is wirelessly connected to the computer; the computer includes a password confirmation module and a gesture confirmation module. , a net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network security system and a working method thereof. The system comprises a computer, a camera and a mobile end. The computer is connected with the camera circuit and the mobile end is connected with the computer wirelessly. The computer comprises a password confirmation module, a gesture confirmation module, a network information sending module, a display module, a mobile information receiving module and an information analyzing module. The working method comprises the following steps: S1, the computer performs password verification operation after boot-up;2, when the authentication fails, the password confirmation module transmits the fail information to the mobile terminal; if it is successful, gesture verification is carried out by a computer; S3, the gesture confirmation module completes the gesture verification through the camera, and the computer enters the display module when the verification is successful; the gesture confirmation module transmits the failure information to the mobile terminal when the failure occurs. S4, the mobile terminal issues an operation instruction to the information analysis module after receiving the verification failure information, and the information analysis module analyzes the instruction and transmits the instruction information to the camera or the display module.

Description

technical field [0001] The invention relates to the field of computers, in particular to a computer network security system and its working method. Background technique [0002] Computers and computer networks have become important information carriers and transmission channels for enterprises, governments and various other organizations, greatly improving work efficiency and enabling the storage and processing of massive information. Computers and computer networks have brought great convenience to people's work and life, but there have also emerged information security issues that have attracted widespread attention. [0003] In a company, each employee usually has his own computer, which stores the employee's own work information, personal information and other private information. This information is not only related to the employee's own interests, but may also be related to the company's development; Therefore, this information is particularly important and requires s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 潘志安沈平
Owner HUBEI POLYTECHNIC INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products