A method for protecting computer system security
A computer system and security technology, applied in the computer field, can solve data leakage and other problems, and achieve the effect of ensuring data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] This embodiment provides a method for protecting the security of a computer system, and implements the present invention through basic necessary technical features to solve the problems raised in the technical background section of this application document.
[0036] Specifically, such as figure 1 As shown, the embodiment of the present invention provides a method for protecting computer system security, including the following steps:
[0037] S1: Enter the user login interface when starting the system, compare the user's input information with the reserved information, if the user's input information is consistent with the reserved information, go to step S2, if the user's input information is inconsistent with the reserved information and If the number of inconsistencies reaches the set number of times, the system will be locked, and the reserved information will be set by the administrator;
[0038] In this step, by comparing the information registered by the user w...
Embodiment 2
[0050] This example is based on Example 1 and optimizes the implementation in Example 1, so that this example is more stable and has better performance during operation, but it is not limited to the one described in this example implementation.
[0051] In this embodiment, a further description is made on the method of dynamic identity verification in the above embodiments, so that the user's files are more secure.
[0052] Specifically, such as figure 2As shown, in step S4, the method for dynamic identity verification includes the following steps:
[0053] S4-1: When the user wants to display hidden files, generate a verification code;
[0054] In this step, when the user wants to change the attribute of the hidden file and display the hidden folder, the system generates a verification code. Specifically, the verification code is generated through a random function.
[0055] S4-2: Encrypt the verification code through an encryption algorithm to obtain verification inform...
Embodiment 3
[0065] This example is based on Example 1 and optimizes the implementation in Example 1, so that this example is more stable and has better performance during operation, but it is not limited to the one described in this example implementation.
[0066] In this embodiment, the user's identity information is further verified through randomly selected topics, and non-professional users are excluded, so that the central file of the system is more secure.
[0067] Specifically, such as image 3 As shown, in step S5, the following steps are included:
[0068] S5-1: The computer receives the type selected by the user, and randomly selects a set number of questions from the question bank of this type;
[0069] In this step, according to the file type that the user wants to view, a certain number of questions are randomly selected from the question bank of this type, generally, three questions are selected for display to the user.
[0070] S5-2: Display the questions to the user in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


