Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer information safety storage system

A computer security and information security technology, applied in the field of computer information security protection system, can solve the problems of inconvenient overtime or operation, inconvenience of intranet management, and the necessity of stifling notebook computers, so as to improve security, improve accuracy, and ensure security. sexual effect

Inactive Publication Date: 2018-03-20
王振铎
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the characteristics of portable portable and convenient mobile office, the necessity of its existence in the company is determined, but this also brings great inconvenience to the intranet management: if a management method similar to that of a desktop computer is adopted, there is no The risk of information loss, but it greatly limits the use of laptops and kills the necessity of laptops; if encryption software is installed on laptops for mandatory encryption, and employees can only use them to handle company affairs, then the laptop’s The entertainment function is lost and employees cannot use it to handle private affairs; if encryption software is installed on the laptop and mandatory encryption is performed, if the user’s use time outside exceeds the preset time, the user cannot normally use the encrypted file, and at this time, the encrypted file cannot be used normally. A new authorization can be obtained normally (through third-party tools, etc.); if it is only encrypted within the company and carried out without encryption (realized through authentication with the management center in the intranet environment), it is not convenient for employees to use at this time Encrypted files are not convenient for employees to work overtime or operate outside the company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information safety storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] Such as figure 1 As shown, the embodiment of the present invention provides a computer information security storage system, including

[0040] The human-computer interaction module is used for user registration and input of biometric data for verifying their identity; it is also used for input data and data control and calling commands; the biometric data adopts voiceprint data; the voiceprint data It is the user's voiceprint feature and lip movement interval data obtained from the recorded voice of the user reading the specified verification text.

[0041]Multiple secure storage spaces are used to store data, and the access rights of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer information safety storage system. The system comprises a human-computer interaction module, a plurality of safety storage spaces, an operating state recording module, a computer safety monitoring module, a data transferring module, a network cutting module, a USB interface cutting module, an emergency passage module and a central processor. According to the system, by the combination of biological characteristic data, primary random encryption and secondary ciphertext encryption, the division of encryption storage and operating authorization of the computerinformation is achieved, and therefore the data safety is greatly improved; by the design of the computer monitoring module, the real-time monitoring of the user operating state and the computer safety situation is achieved, a data transferring function is provided, and the information safety is further guaranteed.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a computer information security protection system. Background technique [0002] With the development of information technology, more and more enterprises and institutions use electronic technology to deal with daily affairs, and more and more documents exist in the form of electronic documents. The use of electronic documents to store data has the advantages of high efficiency, low cost, and convenient transfer. But at the same time, the use of electronic documents to store data increases the risk of information being misused, such as employee hopping, commercial espionage, etc. [0003] In the face of such risks, enterprises and institutions can manage desktop machines through technical or institutional means within the intranet, such as closing USB ports, isolating internal and external networks, and using encryption software to enforce encryption. Due to the character...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/32G06F21/56G06F21/62H04L29/06
CPCG06F21/32G06F21/552G06F21/562G06F21/6218H04L63/1425H04L63/1441H04L63/145
Inventor 王振铎王振辉
Owner 王振铎
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products