Computer information security system

An information security system and computer technology, applied in the field of computer information security systems, can solve problems such as information loss, and achieve the effects of improving security, preventing viruses, and improving operational comfort.

Inactive Publication Date: 2019-04-30
广州破折号信息科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing users leave the computer due to other reasons during use, and forget to turn off or lock the computer, making it possible for other operators to operate the computer intermittently, and there is a risk of information loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security system
  • Computer information security system
  • Computer information security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see Figure 1~2 , in Embodiment 1 of the present invention, a computer information security system includes:

[0027] The man-machine operation module is used for user registration, and collects and generates biometric data corresponding to the user registration identity, and saves the biometric data in the user registration database; it is used for inputting information access requests and data modification requests and modifications Operation; for making an input requiring storage of data and sending the entered data to the processor; for entering biometric data and sending the data to the processor.

[0028] The identity authentication module is used to compare the received biometric data with the biometric data in the user registration database, and send the comparison result to the processor.

[0029] The identity verification module intermittently sends requests to the processor to verify the identity of the operator; this setting ensures that the operator is a l...

Embodiment 2

[0039] see image 3 , the main difference between Embodiment 2 and Embodiment 1 is that a computer information security system also includes:

[0040] The advertisement blocking module is used to block advertisements, improve user's operating comfort, prevent advertisements from containing viruses, and improve system security.

[0041] The working principle of the present invention is:

[0042] Through the identity verification module, intermittently send a request to the processor to verify the identity of the operator, and the processor sends a biometric data verification instruction to the identity verification module according to the request, collects the biometric data of the operator, and compares the data with the database. Compare the data stored in the computer and send the result to the processor. When the verification result is that the logged-in user and the operator are the same person, no instruction is given. If the operator is inconsistent with the logged-in u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security system, and relates to the technical field of computer security. The system comprises a man-machine operation module; an identity authenticationmodule used for comparing the received biological characteristic data with biological characteristic data in a user registration database and sending a comparison result to the processor; an identityverification module; wherein the identity verification module is used for intermittently sending an identity verification request for requesting to verify an operator to the processor; an alarm module; a database module is used for storing data; a processor. The computer information security system ensures that the operator is consistent with the login user and ensures the data security.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a computer information security system. Background technique [0002] Computers and computer networks have become important information carriers and transmission channels for enterprises, governments and various other organizations, greatly improving work efficiency and enabling the storage and processing of massive information. Computers and computer networks have brought great convenience to people's work and life, but there have also emerged information security issues that have attracted widespread attention. [0003] Existing users leave the computer due to other reasons during use, and forget to turn off or lock the computer, making it possible for other operators to operate the computer during this interval, and there is a risk of information loss. Contents of the invention [0004] The purpose of the present invention is to provide a computer information secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/81G06F21/55
CPCG06F21/32G06F21/554G06F21/81G06F2221/2135G06F2221/2141
Inventor 徐章峰
Owner 广州破折号信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products