Computer information security protection method and device, storage medium and electronic equipment

A security protection and computer technology, applied in the field of information security, can solve problems such as difficulty in protecting computer information security and easy leakage of information in the computer, and achieve the effect of ensuring no leakage and protecting information security

Pending Publication Date: 2022-04-05
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a computer information security protection method and device, storage media and electronic equipment to solve the problem that it is difficult to protect computer information security in related technologies, which leads to the problem that the information in the computer is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security protection method and device, storage medium and electronic equipment
  • Computer information security protection method and device, storage medium and electronic equipment
  • Computer information security protection method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0035] It should be noted that the terms "first" and "second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security protection method and device, a storage medium and electronic equipment, and relates to the technical field of information security. The method comprises the steps that target information input into a computer is obtained, and the target information is information of an object having operation authority for the computer; information in a target space range is monitored, and the target space range is a space range which can be scanned by a camera on a display of the computer; and locking a display of the computer according to the information in the target space range and the target information so as to protect the information security of the computer. Through the method and the device, the problem that information in a computer is easy to leak due to the fact that computer information security is difficult to protect in related technologies is solved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a computer information security protection method and device, storage medium and electronic equipment. Background technique [0002] With the continuous development of global informatization and information technology, as well as the continuous advancement of informatization applications, information security is becoming more and more important, and the situation of information security is becoming increasingly severe, which is manifested in the following two aspects: On the one hand, the occurrence of information security incidents The frequency has increased on a large scale, and on the other hand, the losses caused by information security incidents are increasing. In addition, due to the increasingly diversified information security issues, the information security issues that users need to solve are constantly increasing, and the information security m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/32G06F21/84G06V40/16
Inventor 李阿雄付春力杨延民郭玉伟
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products