Computer storage system capable of ensuring information security

A technology of computer storage and information security, applied in internal/peripheral computer component protection, digital data authentication, instruments, etc., can solve problems such as unreasonable information security, concealment of real memory, and no comprehensive consideration of customary input methods, etc.

Inactive Publication Date: 2020-05-15
SHAOXING UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it is unreasonable for information security. It does not comprehensively consider the user's customary entry method when logging in, and verifies the user's identity information according to the combination of user habits and keys, and allows users to access different One of the key storage units can store the key information of the target user, and some unnecessary idle information and information that is expected to be deleted are stored in other storage units. With the help of authentication results, different Users access different storages to avoid user key leaks, and other people can find that they have not successfully logged into the user's real storage, which plays a role in concealing the real storage; and the storage can be used as a temporary storage; in order to realize this technical idea , a solution is now provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer storage system capable of ensuring information security
  • Computer storage system capable of ensuring information security
  • Computer storage system capable of ensuring information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Such as figure 1 As shown, a computer storage system for ensuring information security includes a data request unit, an inertia following unit, a controller, a display unit, an identity verification unit, a verification library, an information gating unit, a first memory, an information conversion unit and a waste transfer unit memory;

[0066] Wherein, the data request unit is used for the user to enter request information, and the request information includes the requester and the corresponding request password; the data request unit is used for transmitting the request information to the controller;

[0067] The inertia following unit is used to monitor the inertial time difference of the user requesting the secret order according to the time difference analysis step, and the time difference analysis step is specifically:

[0068] Step 1: first obtain the number of times the user inputs request information, and mark it as the number of requests Qq;

[0069] Step 2:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer storage system capable of ensuring information security. The computer storage system comprises a data request unit, an inertia following unit, a controller, a display unit, an identity verification unit, a verification library, an information gating unit, a first memory, an information conversion unit and a dump memory. The method comprises the following steps: initiating request information through the data request unit, wherein the request information comprises a requester and a corresponding request secret order; transmitting the request information to thecontroller; enabling an inertia following unit to monitor the inertia time difference of the secret order requested by the user according to the time difference analysis step; judging whether the user is a correct user or not according to the time condition when the user inputs the secret key, an initial doubt signal, an undoubted signal and a doubt signal are generated corresponding to differentconditions, and enabling the inertia following unit to transmit the initial doubt signal, the undoubted signal and the doubt signal to the controller when the initial doubt signal, the undoubtedly signal and the doubt signal are generated.

Description

technical field [0001] The invention belongs to the field of computer storage, relates to information security technology, in particular to a computer storage system for ensuring information security. Background technique [0002] The patent with publication number CN103392166A discloses an information storage system, which includes a plurality of storage systems connected so as to be able to communicate. Each storage system in the plurality of storage systems includes: default storage system identification information, the default storage system identification information is the same for the plurality of storage systems; public volume identification information, used in the plurality of storage systems uniquely identifying volumes presented to the host computer by the plurality of storage systems; and a controller configured to return default storage system identification information to the host computer in response to a request from the host computer, and to process reques...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/71G06F21/31
CPCG06F21/31G06F21/71G06F21/78G06F2221/2141
Inventor 李虎雄李琪李哲陈新
Owner SHAOXING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products