Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Constant-temperature computer safe to start

A computer and computer power supply technology, applied in the computer field, can solve the problems of high temperature of the computer system, poor temperature control effect, and inability to completely eliminate hacker intrusion, so as to achieve the effect of not being easy to illegally intrude and improving system security

Inactive Publication Date: 2019-12-31
成都康元多商贸有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this authentication method cannot completely prevent the intrusion of hackers because the hosts are already powered on.
[0004] At the same time, with the continuous upgrading of computer equipment, its capacity and execution speed are getting faster and faster, which also brings about the problem of high temperature inside the computer system.
Once the computer is started, the power fan will continue to run to dissipate heat; however, when the power of the computer system is high, only increasing the speed of the power fan to enhance the system's heat dissipation has little effect on controlling the temperature of the overall system. control effect is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Constant-temperature computer safe to start

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0015] The technical solutions of the embodiments of the present invention will be described below with reference to the accompanying drawings.

[0016] Such as figure 1 As shown, the present invention provides a constant temperature computer with safe booting, including: a data processing center, a data encryption module, a communication module, a cloud system, a comparison module, a computer power supply, a backup power supply, an encrypted hard disk, a keyboard, a password input module, a fingerprint identification module a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a constant-temperature computer safe to start. The constant-temperature computer comprises a data processing center, a data encryption module, a communication module, a cloudsystem, a comparison module, a computer power supply, a standby power supply, an encryption hard disk, a keyboard, a password input module, a fingerprint identification module and a heat dissipation constant-temperature circuit; the data processing center is respectively connected with the fingerprint identification module, the password output system, the data encryption module and the computer power supply; the cloud system is in signal connection with the output end of the administrator terminal; and the heat dissipation constant-temperature circuit is connected with a computer power supply.The system provided by the invention can realize encrypted information acquisition, transmission and forced authentication of startup user identity through an independent system, so that the system safety is improved, and the system is not easy to invade illegally; and meanwhile, the problem that the effect of controlling the temperature of the whole system is poor due to the fact that the rotating speed of the power supply fan is only increased in an existing heat dissipation technology of the computer system is solved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a constant temperature computer with safe booting. Background technique [0002] In today's society, computers are widely used and popular. With the development of technology and the needs of financial systems and personal privacy, especially with the development of network identification and payment systems, people are more and more worried about the security of computers. , once the host computer is illegally invaded, all the data stored in the host computer will be stolen or tampered with. [0003] The existing identity authentication process for protecting the security of the computer host usually uses the operating system for authentication after booting. However, this authentication method cannot completely prevent hackers' intrusions because the hosts are powered on. [0004] At the same time, with the continuous upgrading of computer equipment, its capacity and execut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/20G06F21/32G06F21/34
CPCG06F1/20G06F21/32G06F21/34
Inventor 王强
Owner 成都康元多商贸有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products