Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer system for ensuring information security and control method thereof

A computer system and information security technology, applied in computer components, computer security devices, computing, etc., can solve problems such as low computer security, loss of tangible assets, and inability to protect against viruses, so as to prevent network virus intrusion, improve efficiency, The effect of protecting security

Active Publication Date: 2021-03-12
CHONGQING UNIV OF EDUCATION
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for most users, the loss caused by the loss of the hard disk is far more serious than other components
When the hard disk is lost, users are not only worried about the loss of tangible assets, but also that the private emails, photos, work contents, diaries, etc. stored in the hard disk may be stolen by someone who wants to steal it. In addition to endangering personal privacy, it is even more important. possible property damage
[0004] However, the existing computer security protection method is mainly to realize the overall technical computer security through simple encryption technology, which not only has poor encryption effect, but also has low computer security. Low, and cannot protect against viruses, etc.
[0005] Through the above analysis, the problems and defects of the existing technology are: the existing technology not only has poor encryption effect, low computer security, cumbersome operation, low efficiency, and cannot protect against viruses, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system for ensuring information security and control method thereof
  • Computer system for ensuring information security and control method thereof
  • Computer system for ensuring information security and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] The control method of the computer system for ensuring information security provided by the embodiment of the present invention is as follows: figure 1 shown, as a preferred embodiment, as image 3 As shown, the method for performing identity verification on a computer system login user through a login verification module using face recognition technology provided by the embodiment of the present invention includes:

[0096] S201, verify the input user account, and determine whether the user account exists; if not, the login verification fails, and the user is prohibited from accessing; if it exists, turn to step S202;

[0097] S202, prompting the user to perform a random action, and collecting the current image information of the user;

[0098] S203, according to the collected current image information, determine whether the user performs the random action, if so, go to step S204; if not, go to step S202;

[0099]S204, search for the backup picture pre-stored in the ...

Embodiment 2

[0103] The control method of the computer system for ensuring information security provided by the embodiment of the present invention is as follows: figure 1 shown, as a preferred embodiment, as Figure 4 As shown, the method for virus scanning and identification based on the collected network data by the virus scanning module provided by the embodiment of the present invention includes:

[0104] S301, using big data mining technology to obtain relevant virus feature data of each network virus database, and creating a network virus feature database based on the obtained virus feature data;

[0105] S302, after the collected network data packets are reassembled and parsed, a multi-pattern matching algorithm is used to match the virus features in the virus feature database;

[0106] S303, when a virus signature is matched, it is determined whether one or more complete virus information pieces can be formed by combining the matched virus signatures. If yes, the virus informatio...

Embodiment 3

[0110] The control method of the computer system for ensuring information security provided by the embodiment of the present invention is as follows: figure 1 shown, as a preferred embodiment, as Figure 5 As shown, the method for encrypting the hard disk by using the hard disk encryption module provided by the embodiment of the present invention, and controlling the reading behavior of the hard disk includes:

[0111] S401, obtain the service serial number of the computer system and the serial number of the hard disk; according to the self-defined coding rule, obtain the first hard disk password for the obtained service serial number and hard disk number;

[0112] S402, when the computer system is powered on, obtain the service serial number of the computer system and the serial number of the currently running hard disk;

[0113] S403, according to the same coding rule as S401, encode the serial number of the computer system service obtained in S402 and the serial number of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer security, and discloses a computer system for ensuring information security and a control method thereof. The computer system capable of ensuring information security comprises a login verification module, an equipment encryption module, a data acquisition module, an information processing module, a central control module, a security monitoring module, a program verification module, a virus scanning module, a virus processing module, a hard disk encryption module, an alarm module, a data storage module and an update display module. According to the invention, the use security of the computer can be effectively ensured, data leakage and network virus invasion are prevented, and the information security of a user is effectively ensured. The computer system capable of ensuring the information security can protect the computer data security, effectively protect viruses and ensure the hard disk data security; by performing autonomousencryption verification on the hard disk, the tedious operation of manual password input is avoided, the encryption verification efficiency is improved, and the data security of the hard disk can alsobe ensured.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a computer system for ensuring information security and a control method thereof. Background technique [0002] At present, the popularization of computer systems has realized a fast and convenient information society, allowing people to process a large amount of data more efficiently, and enterprises have also changed to use computer systems to realize electronicization. Therefore, information security is paid more and more attention. [0003] A hard disk is one of the most important storage devices in a computer system. All kinds of data such as operating systems, applications, and multimedia files are stored in the hard disk. Therefore, for most users, the loss caused by the loss of the hard disk is far more serious than other components. When the hard disk is lost, what users worry about is not only the loss of tangible assets, but also that the privat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/31G06F21/56G06F21/60G06K9/00
CPCG06F21/32G06F21/602G06F21/568G06F21/562G06F21/31G06V40/172Y02P90/02
Inventor 韦鹏程黄思行彭亚飞
Owner CHONGQING UNIV OF EDUCATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products