Supercharge Your Innovation With Domain-Expert AI Agents!

Security protection system and method applied in computer system

A computer system and security protection technology, applied in the direction of program loading/starting, program control devices, etc., can solve problems such as inconvenient use, inconvenient working environment, and inability to activate the protection state in real time

Inactive Publication Date: 2004-11-03
YUDONG PLASMA TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is a convenient feature, and there are the following known problems in use: the computer system cannot activate the protection state in real time, resulting in a window period of security protection between the original user leaving the seat and activating the screen protection state, or due to If the set time is too short, the system frequently activates the screen saver state, causing inconvenience to the working environment
[0003] Another commonly used technology is to add a protection lock 11,12 on the computer system 10, and the protection lock uses external devices such as a universal serial bus (USB) 13 or a printer connection port 14 (such as figure 1 As shown), to directly connect to the computer system. When the protection lock is connected to the computer system, the user can operate and use the computer normally. When the protection lock is removed, the system enters the locked protection state. This method also has Vulnerabilities in security protection caused by forgetting to activate when the original user leaves
And when the original user returns to the seat to operate the computer system, he cannot directly operate the computer system, but needs to put the protection lock back on the computer system, which makes it not very convenient to use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection system and method applied in computer system
  • Security protection system and method applied in computer system
  • Security protection system and method applied in computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as Figure 2A , Figure 2B , Figure 2C As shown, it is a functional schematic diagram of a preferred embodiment developed by the safety protection system of the present invention to improve common means. The safety protection system can be applied to a computer system 31, including a wireless sending component 33 and electrically connected to A wireless receiving component 32 of the computer system. The user wears a wireless sending unit 33 on the body, and when the wireless sending unit 33 continuously sends out a specific radio signal 330A and is received by the wireless receiving unit 32, the safety protection system will not execute any action, the user can freely operate the computer system such as Figure 2A shown. Such as Figure 2B , Figure 2C As shown, when the user leaves the computer system for a certain distance, the wireless receiving component 32 will not be able to receive the specific radio signal 330A, and at this time the wireless receivin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to one kind of safety protecting system and method for computer system. The safety protecting system one radio emitter assembly carried by the user to emit one specific radio signal and one radio receiver assembly connected electrically to the computer system for receiving the specific radio signal. The method includes the following steps. When the radio receiver assembly does not receive the specific radio signal, one protecting mechanism in the computer system is activated to make the computer system incapable of being used. The present invention can protect the data safety effectively.

Description

technical field [0001] The invention relates to a safety protection system and method, in particular to a safety protection system and method applied to computer systems. Background technique [0002] The use of the security protection system in the computer system is quite practical, and various methods are used to protect the data in the computer system from being easily obtained by others. In the commonly used method, the screen saver of the system can provide such security protection. After selecting the password protection option of the screen saver, as long as the operator does not use the peripheral input device within the set time, the system will enter the screen. In the protected state, and to release the screen saver state to enter the operation mode, you need to enter the account password of the original user or administrator. This is a convenient feature, and there are the following known problems in use: the computer system cannot activate the protection state...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445
Inventor 简志峰张正旻
Owner YUDONG PLASMA TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More