Computer platform and storage device mutual binding authentication system and device

A storage device and authentication system technology, applied in computer security devices, computer components, computing, etc., can solve the problem of insufficient security of storage devices, and achieve the effect of preventing abnormal current and preventing tampering

Inactive Publication Date: 2021-01-26
GUILIN UNIV OF ELECTRONIC TECH
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the 1980s, with the development of microcomputer technology, the control system began to adopt computer control. With the rapid development of information technology and network technology in the 1990s, richer multimedia information was transmitted through the network, making the centralized and unified control of computers mature and perfect in function. At present, the increase of some new technologies, such as digital video and audio and broadband network multimedia, has further promoted the widespread use of multi-information remote management technology, and the pace of modern industrial informatization and modern management informatization has been significantly accelerated. However, in some special public security applications fields, etc., compared with the popularity of foreign technologies, the multi-information management system based on computer remote centralized and unified control technology has not been effectively and comprehensively used in China. Some important areas and important equipment and information management control behavior, but the current computer The storage device is not secure enough when in use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer platform and storage device mutual binding authentication system and device
  • Computer platform and storage device mutual binding authentication system and device
  • Computer platform and storage device mutual binding authentication system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] see Figure 1-3 , the present invention provides a technical solution: a computer platform and a storage device are mutually bound authentication system, including a computer center 13, a local storage device 15 and a cloud storage device 12, the local storage device 15 is connected with a data monitoring system for monitoring its data. The high-speed scanning generator 21 of reading and writing situation, described local storage device 15 is connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer platform and storage device mutual binding authentication system and a device thereof. The computer platform and storage device mutual binding authentication systemcomprises a computer center, a local storage device and a cloud storage device, wherein the local storage device is connected with a high-speed scanning generator, and the cloud storage device is connected with a cloud server, the system is provided with the computer center, the local storage device and the cloud storage device and can play a role in collaborative backup and prevent data from being tampered, the local storage device is connected with the processing unit, the processing unit is connected with the face recognition module, the face recognition module is used for identifying whether an operator has rewriting permission or not, and the display module comprises a touch screen; a man-machine interaction system is embedded in the display module and used for inputting permission passwords during special operation, the display module is connected with a result feedback module and can feed back whether permission is qualified or not, the local storage device is connected with a network management server, and the remote control device is connected with a computer center and can finally read and write the computer center.

Description

technical field [0001] The invention relates to the technical field of computer platforms, in particular to a computer platform and storage device binding authentication system and its device. Background technique [0002] In the 1980s, with the development of microcomputer technology, the control system began to adopt computer control. With the rapid development of information technology and network technology in the 1990s, richer multimedia information was transmitted through the network, making the centralized and unified control of computers mature and perfect in function. At present, the increase of some new technologies, such as digital video and audio and broadband network multimedia, has further promoted the widespread use of multi-information remote management technology, and the pace of modern industrial informatization and modern management informatization has been significantly accelerated. However, in some special public security applications fields, etc., compa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/31G06F21/60G06K9/00G08C17/02G10L15/22G10L15/26G10L21/0208H04L29/08
CPCG06F21/32G06F21/31G10L15/22G10L15/26G10L21/0208H04L67/025G06F21/604H04L67/1097H04L67/1095G08C17/02G06F2221/2141G06V40/172
Inventor 赵勤恒钱长娜李旭卜治寒谭惠方
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products