Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for protecting computer system security

A computer system and security technology, applied in the computer field, can solve data leakage and other problems, and achieve the effect of ensuring data security

Active Publication Date: 2021-09-17
JIANGSU VOCATIONAL INST OF ARCHITECTURAL TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In some large companies and enterprises, some top-secret data cannot be viewed by irrelevant personnel. Generally, such data is placed on a computer, and then the computer is properly kept, but In this way, there is still a risk of data leakage, therefore, the protection of computer data security is very important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for protecting computer system security
  • A method for protecting computer system security
  • A method for protecting computer system security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides a method for protecting the security of a computer system, and implements the present invention through basic necessary technical features to solve the problems raised in the technical background section of this application document.

[0036] Specifically, such as figure 1 As shown, the embodiment of the present invention provides a method for protecting computer system security, including the following steps:

[0037] S1: Enter the user login interface when starting the system, compare the user's input information with the reserved information, if the user's input information is consistent with the reserved information, go to step S2, if the user's input information is inconsistent with the reserved information and If the number of inconsistencies reaches the set number of times, the system will be locked, and the reserved information will be set by the administrator;

[0038] In this step, by comparing the information registered by the user w...

Embodiment 2

[0050] This example is based on Example 1 and optimizes the implementation in Example 1, so that this example is more stable and has better performance during operation, but it is not limited to the one described in this example implementation.

[0051] In this embodiment, a further description is made on the method of dynamic identity verification in the above embodiments, so that the user's files are more secure.

[0052] Specifically, such as figure 2As shown, in step S4, the method for dynamic identity verification includes the following steps:

[0053] S4-1: When the user wants to display hidden files, generate a verification code;

[0054] In this step, when the user wants to change the attribute of the hidden file and display the hidden folder, the system generates a verification code. Specifically, the verification code is generated through a random function.

[0055] S4-2: Encrypt the verification code through an encryption algorithm to obtain verification inform...

Embodiment 3

[0065] This example is based on Example 1 and optimizes the implementation in Example 1, so that this example is more stable and has better performance during operation, but it is not limited to the one described in this example implementation.

[0066] In this embodiment, the user's identity information is further verified through randomly selected topics, and non-professional users are excluded, so that the central file of the system is more secure.

[0067] Specifically, such as image 3 As shown, in step S5, the following steps are included:

[0068] S5-1: The computer receives the type selected by the user, and randomly selects a set number of questions from the question bank of this type;

[0069] In this step, according to the file type that the user wants to view, a certain number of questions are randomly selected from the question bank of this type, generally, three questions are selected for display to the user.

[0070] S5-2: Display the questions to the user in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention specifically discloses a method for protecting the safety of a computer system, which includes the following steps: S1: enter the user login interface when starting the system, and compare the user's input information and reserved information; S2: carry out important files in the system Hide, and monitor the user's operation on the system at the same time; S3: mark the categories of important files in the system; S4: when the user wants to display hidden files, verify the user's identity through the dynamic authentication method; S5: Let the user choose the type of hidden file to be displayed through the selection interface. After the user selects, according to the type selected by the user, a question consistent with the type will be randomly obtained. If the user answers incorrectly, the system will be locked. The invention confirms the user's identity multiple times, so that the user receives layers of restrictions when he wants to consult important files, and at the same time locks the system when the confirmation fails to ensure data security, so that important data will not be stolen .

Description

technical field [0001] The invention relates to the computer field, in particular to a method for protecting computer system security. Background technique [0002] In the era of big data, the amount of information is increasing, and there is also a lot of information that must be kept confidential, so data security is particularly important. In some large companies and enterprises, some top-secret data cannot be viewed by irrelevant personnel. Generally, such data is placed on a computer, and then the computer is properly kept, but There is still a risk of data being leaked like this, therefore, it is very important for the protection of computer data security. Contents of the invention [0003] The purpose of the present invention is to overcome the problems existing in the above-mentioned prior art, and provide a method for protecting the security of a computer system. By confirming the identity of the user multiple times, the user is restricted layer by layer when he ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 董爱民
Owner JIANGSU VOCATIONAL INST OF ARCHITECTURAL TECH