Supercharge Your Innovation With Domain-Expert AI Agents!

Computer security system

A computer security and security platform technology, applied in the field of computer security systems, can solve the problems of illegal external monitoring, illegal access monitoring, and inability to use traditional security technology computer peripheral monitoring, etc., to improve security, reasonable structure, and design. novel effect

Inactive Publication Date: 2021-12-10
河套学院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most of the guarantee systems for computer security login use simple password login, fingerprint login and other single means to log in to the computer. At the same time, traditional security technologies cannot be used to monitor computer peripherals, illegal access Network resource usage monitoring, etc., therefore, it is very necessary to provide a computer security system for the above-mentioned defects in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0016] Specific embodiment 1, a kind of computer safety system, this computer safety system comprises central processing module, safety platform, monitoring module, wireless transmission module and data interface module;

[0017] Two-way connection between the central processing module and the security platform;

[0018] The security platform includes a login module, the output of the login module is respectively connected to the input of the identity authentication module, the password input module and the image acquisition module, the identity authentication module is connected to the face recognition device, the password input module is connected to the password checker, and the image acquisition module is connected to the There is an image processing module;

[0019] The output end of the monitoring module and the output end of the wireless transmission module are connected to the input end of the central processing module, wherein the monitoring module includes a mobile s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer security system. The computer security system comprises a central processing module, a security platform, a monitoring module, a wireless transmission module and a data interface module; the central processing module is in bidirectional connection with the security platform; the security platform comprises a login module; the output end of the login module is connected with the input ends of an identity authentication module, a password input module and an image acquisition module; the output end of the monitoring module and the output end of the wireless transmission module are connected with the input end of the central processing module; the wireless transmission module is also connected with a client terminal; the output end of the data interface module is connected with the input end of the security platform; the data interface module is connected with an encryption module. The system has the advantages that the network environment and the hardware state of a computer can be monitored in real time, problems can be found in time, reminding can be conducted, the network use security is improved, a security platform is involved from login to data transmission, and dual protection is achieved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a computer security system. Background technique [0002] The development of computer technology has greatly promoted the progress of human society. With its unique functions and powerful working ability, computer has become an essential tool for people's life and work. Computer security issues are not only related to everyone's privacy and the interests of enterprises, but also an important aspect of national security. Virus attacks, information leaks, network resources and other issues threaten the security of computers at all times. [0003] At present, most of the guarantee systems for computer security login use simple password login, fingerprint login and other single means to log in to the computer. At the same time, traditional security technologies cannot be used to monitor computer peripherals, illegal access Network resource usage monitoring, etc. Therefore, it is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/554G06F21/602G06F21/6218G06F21/64G06F21/85H04L63/101G06F11/3055
Inventor 唐永军
Owner 河套学院
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More