Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security system and method thereof

A computer security, computer technology, applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve problems such as computer data storage leakage, achieve reliable use of computer information security, protect information security requirements, and facilitate Internet search Effect

Inactive Publication Date: 2010-04-28
SHENZHEN UTEPO TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The present invention solves the security problem of computer equipment, computer data storage leakage problem and computer network communication problem to achieve the purpose that users can not only use computer and network conveniently, but also ensure the security of computer equipment and information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security system and method thereof
  • Computer security system and method thereof
  • Computer security system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] figure 1 computer information security system, including: computer interface signal transmission management system host device, computer interface signal transmission management system client device, computer data isolation transmission management system device, computer security monitoring server, computer environment monitoring equipment, external network computer, Intranet computer. Among them, the host device of the computer interface signal transmission management system is bidirectionally connected with the client device of the computer interface signal transmission management system, the computer data isolation transmission management system device, the external network computer, the internal network computer, and the computer security monitoring server;

[0044] The computer data isolation transmission management system device is bidirectionally connected with the external network computer, the internal network computer, and the computer security monitoring serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer security system and a method thereof. The system comprises a host device of a computer interface signal transmission and management system, a client device of the computer interface signal transmission and management system, a computer data isolation transmission and management system device, a computer security monitoring server, a computer environment monitoring device, an outer network computer and an inner network computer. The method comprises the following steps: the computer interface signal transmission and management system isolates the host computer from a display device, a mouse keyboard inputting device, a computer interface signal, a reset interface signal and an on / off interface signal. The user surfs the internet to communicate with the outside world by the outer network computer and performs secure and confidential work by the inner network computer; the computer data isolation transmission and management system is connected with the outer network computer and the inner network computer, so that the data which needs to be transmitted is transmitted under the monitoring condition of computer security monitor and management software.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a computer security system and its method. Background technique [0002] The wide application of computers and networks has brought great convenience to people's life and work. Enterprises and institutions and all walks of life have adopted computers in large numbers. At the same time, most of these computers have been connected to the network, and the data communication between computers has also become It is easy to obtain, and the degree of informatization is getting higher and higher, which brings convenience to production and management. In many economically developed regions, computers and networks are indispensable tools, and their applications are extensive and in-depth. Computer information is an important resource for enterprises and institutions. The wide application of computer USB storage devices and computer networks brings great convenience to people...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/22G06F21/75
Inventor θ‚ζ€€ε†›θ‚ζ€€δΈœθ‚ζ€€ζ˜₯
Owner SHENZHEN UTEPO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products