Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer data protection system based on identity authentication

An identity authentication and protection system technology, applied in the field of computer data protection system based on identity authentication, can solve the problems of data leakage, single access verification method, etc., achieve good data security, solve data leakage, and improve the effect of security protection strength

Pending Publication Date: 2021-11-26
DASHIZHI BEIJING SOFTWARE ENG
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a computer data protection system based on identity authentication, which solves the problem of the single access verification method in the prior art. Users can extract data from the computer as long as they log in to the computer, resulting in data leakage in the computer. The use of the data security protection system has brought some technical problems that have a certain impact, achieved the purpose of improving the effect of data security protection and ensuring data security, and provided a computer data protection system based on identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer data protection system based on identity authentication
  • Computer data protection system based on identity authentication
  • Computer data protection system based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0041] The embodiment of the present application solves the technical problem of poor data protection effect in the prior art by providing a computer data protection system based on identity authentication, and achieves the technical effect of improving data security protection effect and ensuring data security.

[0042] Such as Figure 1~3 As shown, this embodiment provides a technical solution: a computer data protection system based on identity authentication, including a user login module, an information collection module, a user verification module, a preset verification library, a data receiving module, a dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data security protection, and discloses a computer data protection system based on identity authentication. The system comprises a user login module, an information acquisition module, a user verification module, a preset verification library, a data receiving module, a data processing module, an identity information library, a master control module, an information sending module, an alarm sending module, a preset receiving terminal, a file destroying module, an automatic backup module, a file storage module and a file storage cloud. The user login module is used for a user extracting data to log in, the user obtains corresponding user identity information after inputting an account number and a password, and the information acquisition module is used for performing real-time user information acquisition after successful login. By setting multiple verification modes and formulating more detailed verification rules, the data security is ensured, and the system is more worthy of popularization and use.

Description

technical field [0001] The invention relates to the field of data security protection, in particular to a computer data protection system based on identity authentication. Background technique [0002] The data security protection system is a security protection of technology and management established and adopted for the data processing system, which is used to protect computer hardware, software and data from being damaged, changed and leaked due to accidental and malicious reasons. Therefore, the security protection of computer data can be understood as: through the use of various technical and management measures to make the network system operate normally, so as to ensure the availability, integrity and confidentiality of data. Therefore, the purpose of establishing network security protection measures is to ensure that the data transmitted and exchanged through the network will not be added, modified, lost or leaked; [0003] Computers need to use data security protec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06F21/62G06F21/78G06F11/14G06K9/00G10L17/22H04L29/06H04L29/08
CPCG06F21/31G06F21/32G06F11/1448G06F11/1464G06F21/6209G06F21/78H04L63/0861H04L63/083G10L17/22H04L67/1097
Inventor 陈世杰
Owner DASHIZHI BEIJING SOFTWARE ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products