A method of protecting computer data security

A data security and computer technology, applied in the computer field, can solve problems such as hidden dangers of computer information security, easy intrusion by hackers, and loss of people, and achieve the effect of solving information security protection problems, easy to popularize, and low cost

Inactive Publication Date: 2016-06-22
NANYANG INST OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similarly, the development of computer networks has also brought security risks to users' computer information. Network information theft, information attacks, and virus transmission all exist and develop all the time.
At present, in order to solve the data information security problem of the user's computer, people have adopted many measures and methods, one is to adopt isolation card technology; There are problems. Some hackers are easy to invade the computer system and steal the data information inside the computer, causing certain losses to people. At present, changes in the system software or hardware environment that the existing security control system relies on will also affect the security of the system. Constitute a direct threat, resulting in the possibility of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of protecting computer data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.

[0016] Please refer to Figure 1, a method for protecting computer data security, including a microprocessor, a relay drive part, a computer power control relay, a computer network control relay, a computer power supply, a double-pole double-throw switch, a computer hard disk, an interface conversion part, and a network card and a computer network hub, the relay driving part includes a first relay driving part and a second relay driving part, the computer hard disk includes a security hard disk and an ordinary computer hard disk, and the interface conversion part includes a first interface conversion part and a second interface conversion part , the output end of the microprocessor is respectively connected to the input end of the first relay driving part, the input end of the second relay driving part and the input end of the first interface convers...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer data security control device. The computer data security control device comprises a microprocessor, relay drive parts, a computer power source control relay, a computer network control relay, a computer power source, a double-pole-double-throw switch, computer hard disks, interface conversion parts, a network card and a computer network hub. The relay drive parts comprise a first relay drive part and a second relay drive part. The computer hard disks comprise a secrecy hard disk and a common computer hard disk. The interface conversion parts comprise a first interface conversion part and a second interface conversion part. As the microprocessor is adopted for controlling a relay driver, information safety protection of the hard disks of a computer and safety protection after the computer is networked are effectively achieved, the optimal control combination is achieved, the computer data security control device is simple in structure, low in cost and easy to popularize, the control method is high in sensitivity, and once an alien invader enters, the computer data security control device immediately stops the alien invader from entering.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for protecting computer data security. Background technique [0002] With the rapid development of computer technology and network, computer has become an indispensable tool in people's work, life and study. Similarly, the development of computer networks has also brought security risks to users' computer information. Network information theft, information attacks, and virus transmission all exist and develop all the time. At present, in order to solve the data information security problem of the user's computer, people have adopted many measures and methods, one is to adopt isolation card technology; There are problems. Some hackers are easy to invade the computer system and steal the data information inside the computer, causing certain losses to people. At present, changes in the system software or hardware environment that the existing security control system reli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/31
CPCG06F21/31G06F21/554
Inventor 陈绍东宋亮袁林
Owner NANYANG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products