Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent computer safety system

A computer security and computer power supply technology, applied in the field of intelligent computer security systems, can solve problems such as inconvenient use, loss, user data leakage, etc., and achieve the effect of ensuring security

Pending Publication Date: 2019-06-18
HUANGGANG POLYTECHNIC COLLEGE
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, to protect data through hardware, you can use IC card or UKEY and other similar peripheral hardware methods to encrypt and protect data, but the protection method using peripheral hardware is like having an additional key, and you need a "key" every time you use it To decrypt, inconvenient to use
On the other hand, because the peripheral hardware cannot be bound to the host system, there are still hidden dangers of loss and theft. Losing the "key" may not only leak user data, but even make the user unable to use the encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent computer safety system
  • Intelligent computer safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0022] like Figure 1-Figure 2 As shown, an intelligent computer security system according to an embodiment of the present invention includes a computer main body casing, a computer mainframe base, a computer power switch installed on the computer main casing, a fingerprint reader installed on the computer power switch, an installation The power interface electrically connected to the main board in the computer mainframe casing and the power cord connector installed in the computer mainframe casin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent computer security system. The system comprises a fingerprint identifier mounted on a computer power switch, a power interface which is installed in the computerhost shell and electrically connected with the mainboard, and a power line connector which is installed in the computer host shell through the electric push rod, the power interface and the power lineconnector are correspondingly arranged in a matched mode, the input end of the controller is connected with the fingerprint identifier, and the output end of the controller is connected with the electric push rod. An automatic data encryption and decryption module is loaded in the computer host and is used for decrypting and encrypting data corresponding to each data disk in the computer host according to an identification result of the fingerprint identifier after the computer is started; Each data disk is divided into a plurality of grid areas which are not overlapped with one another, andeach grid area adopts a unique logic number. The security of data in the computer is greatly improved by combining software encryption, a biological information identification technology and corresponding hardware structure design from the aspect of system operation authority, and meanwhile, the theft prevention of the computer host is realized.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an intelligent computer security system. Background technique [0002] With the development of society, computers have become inaccessible equipment for people's work and life, and at the same time, they have brought great hidden dangers to information security. At present, the data protection methods generally used on personal computers are mostly established at the application layer of the operating system and rely on software implementation. The data protection method provided by the software is to use pseudo-random numbers or user passwords as keys to encrypt data on the disk. Because software encryption can be traced and debugged to crack the key, it is impossible to effectively protect the key used to encrypt data, especially for more important computer data, it is difficult for software protection to achieve the required security. [0003] Encryption and protection of da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/32G06F21/88G06F1/18
Inventor 唐永明
Owner HUANGGANG POLYTECHNIC COLLEGE