CN111966986A - Computer management system based on artificial intelligence - Google Patents

Computer management system based on artificial intelligence Download PDF

Info

Publication number
CN111966986A
CN111966986A CN202010880556.XA CN202010880556A CN111966986A CN 111966986 A CN111966986 A CN 111966986A CN 202010880556 A CN202010880556 A CN 202010880556A CN 111966986 A CN111966986 A CN 111966986A
Authority
CN
China
Prior art keywords
computer
module
artificial intelligence
control box
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010880556.XA
Other languages
Chinese (zh)
Inventor
吴华芹
吕颍颍
孙勇
雷惠芳
柳静
邵华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Vocational College of Applied Technology
Original Assignee
Henan Vocational College of Applied Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Vocational College of Applied Technology filed Critical Henan Vocational College of Applied Technology
Priority to CN202010880556.XA priority Critical patent/CN111966986A/en
Publication of CN111966986A publication Critical patent/CN111966986A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention discloses a computer housekeeping system based on artificial intelligence, which belongs to the technical field of computers, and comprises a workbench, a computer display screen and a control box, wherein four corners of the bottom of the workbench are provided with support foot frames, the middle of the top of the workbench is provided with the computer display screen, the right side of the top of the workbench is provided with a computer host, the left side of the top of the workbench is provided with the control box, the front surface of the control box is provided with a high-definition camera and a buzzer, the inner cavity of the control box is provided with a central processing unit, an identity verification unit, a leak detection unit, an access recording unit, an electronic start button, an electromagnetic valve lock, a data encryption module, a leak repairing module, an automatic recording module, an alarm module and a communication module, the structure is reasonable, and the data encryption module is used for detecting that the user authority is too low when the identity verification unit detects that, important data in a computer is automatically encrypted.

Description

Computer management system based on artificial intelligence
Technical Field
The invention relates to the technical field of computers, in particular to a computer housekeeper system based on artificial intelligence.
Background
The most important of computer security is the security of stored data, and the main threats facing the security include: computer viruses, illegal access, computer electromagnetic radiation, hardware damage, etc. Computer viruses are covert applets attached to computer software that are the same as other working programs of a computer, but can corrupt normal programs and data files. The malignant virus can cause the whole computer software system to crash and the data to be completely destroyed. The main aim of preventing virus attack is to strengthen management, not to access unsafe data, use antivirus software and upgrade and update in time. Illegal access means that a pirate embezzles or forges a legal identity, enters a computer system, privately extracts data in the computer or modifies, transfers, copies and the like. The prevention method is to add a software system security mechanism to prevent a thief from entering the system with a legal identity. For example, the identification of the mark of a legal user is added, a password is added, different authorities are stipulated for the user, and the user cannot freely access a data area which is not accessed. And secondly, data are encrypted, so that even if a thief enters the system and does not have a secret key, the thief cannot read the data. Setting operation log in computer to record the read, write and modify of important data automatically. However, the existing computer security system often interacts with an external device, and the external device can directly access the computer after being connected to the computer through a computer interface, so that the security of some important information in the computer cannot be ensured, and a great potential safety hazard exists; meanwhile, the traditional method for reinforcing the security of the host configuration is to check the configuration items one by hand and modify the non-conforming configuration items to a proper security value by hand; the operation needs a large amount of manpower and material resources, wastes time and labor and has high required cost.
To this end we propose to solve the above problem with an artificial intelligence based computer housekeeping system.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
Therefore, the invention aims to provide a computer housekeeper system based on artificial intelligence, which can prevent other people from embezzling or forging legal identities, enter a computer system, privately extract data in a computer or modify, transfer and copy the data, and improve the use safety and privacy of the computer.
To solve the above technical problem, according to an aspect of the present invention, the present invention provides the following technical solutions:
the utility model provides a computer butler system based on artificial intelligence, it includes workstation, computer display screen and control box, the bottom four corners of workstation is provided with the supporting legs, the bottom of supporting legs is provided with the universal wheel, be provided with the computer display screen in the middle of the top of workstation, the top right side of workstation is provided with the main frame, be provided with the fingerprint lock on the electron start button of main frame, be provided with the solenoid valve lock on the data interface of main frame, the top left side of workstation is provided with the control box, the front surface of control box is provided with high definition digtal camera and bee calling organ, the inner chamber of control box is provided with central processing unit, authentication unit, leak detecting element, access recording unit, electron start button, solenoid valve lock, data encryption module, leak repair module, automatic recording module, Alarm module and communication module, central processing unit electrical property input connection authentication unit, leak detection unit and access recording unit, authentication unit electrical property input connection fingerprint identification ware and high definition digtal camera, central processing unit electrical output connects electron start button, solenoid valve lock, data encryption module, leak repair module, automatic recording module, alarm module and communication module, communication module wireless connection remote terminal.
As a preferable embodiment of the computer housekeeping system based on artificial intelligence of the present invention, wherein: the computer mainframe inner chamber is provided with temperature sensor, and temperature sensor and central processing unit electric connection.
As a preferable embodiment of the computer housekeeping system based on artificial intelligence of the present invention, wherein: the electronic power-on button is used for automatically powering on when the identity verification passes.
As a preferable embodiment of the computer housekeeping system based on artificial intelligence of the present invention, wherein: the data encryption module is used for automatically encrypting important data in the computer when the identity verification unit detects that the authority of the user is too low.
As a preferable embodiment of the computer housekeeping system based on artificial intelligence of the present invention, wherein: the electromagnetic valve lock is used for performing authority authentication when an external data device is accessed.
As a preferable embodiment of the computer housekeeping system based on artificial intelligence of the present invention, wherein: the high-definition camera is used for facial recognition and recording for computer users.
Compared with the prior art, the invention has the beneficial effects that: 1. preventing others from embezzling or forging legal identity, entering a computer system, and privately extracting data in the computer or modifying, transferring and copying; 2. automatically recording computer operation logs, and automatically recording the reading, writing and modification of important data; 3. the working efficiency is improved by automatic encryption and locking through artificial intelligence; 4. when a leak or external invasion is detected, remote alarm is carried out, and the data security is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the present invention will be described in detail with reference to the accompanying drawings and detailed embodiments, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise. Wherein:
FIG. 1 is a schematic structural view of the present invention;
FIG. 2 is a block diagram of the system of the present invention;
fig. 3 is a schematic structural diagram of an authentication module according to the present invention.
In the figure; 100 work tables, 110 supporting foot frames, 120 universal wheels, 200 computer display screens, 210 computer hosts, 220 fingerprint identifiers, 230 electromagnetic valve locks, 300 control boxes, 310 buzzers and 320 high-definition cameras.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described herein, and it will be apparent to those of ordinary skill in the art that the present invention may be practiced without departing from the spirit and scope of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Next, the present invention will be described in detail with reference to the drawings, wherein for convenience of illustration, the cross-sectional view of the device structure is not enlarged partially according to the general scale, and the drawings are only examples, which should not limit the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides the following technical scheme: a computer housekeeping system based on artificial intelligence comprises a workbench 100, a computer display screen 200 and a control box 300, wherein four corners of the bottom of the workbench 100 are provided with supporting foot frames 110, the bottom of each supporting foot frame 110 is provided with universal wheels 120, specifically, the workbench 100 is used for bearing the computer display screen 200 and a computer host 210, the supporting foot frames 110 are used for supporting the workbench 100 and adjusting the height, and the universal wheels 120 are used for facilitating movement;
the middle of the top of the workbench 100 is provided with a computer display screen 200, the right side of the top of the workbench 100 is provided with a computer host 210, an electronic start button of the computer host 210 is provided with a fingerprint lock, a data interface of the computer host 210 is provided with an electromagnetic valve lock 230, the left side of the top of the workbench 100 is provided with a control box 300, the front surface of the control box 300 is provided with a high-definition camera 320 and a buzzer 310, the inner cavity of the control box 300 is provided with a central processor, an identity verification unit, a leak detection unit, an access recording unit, an electronic start button, an electromagnetic valve lock 230, a data encryption module, a leak repair module, an automatic recording module, an alarm module and a communication module, the central processor is electrically connected with an identity verification unit, a leak detection unit and an access recording unit, and the identity verification unit is electrically connected with a fingerprint identifier 220, the central processing unit is electrically connected with an electronic starting button, an electromagnetic valve lock 230, a data encryption module, a bug fixing module, an automatic recording module, an alarm module and a communication module in an output way, the communication module is wirelessly connected with a remote terminal, concretely, a computer display screen 200 is arranged in the middle of the top of the workbench 100, the computer display screen 200 is used for displaying computer data, a computer host 210 is arranged on the right side of the top of the workbench 100, the computer host 210 is used for operating and exchanging data storage, a fingerprint lock is arranged on the electronic starting button of the computer host 210 and used for verifying the identity of a computer user, an electromagnetic valve lock 230 is arranged on a data interface of the computer host 210, the electromagnetic valve lock 230 is used for verifying the identity before other data ends are accessed, a control box 300 is arranged on the left side of the top of the workbench 100, and the control box 300 is used for bearing electronic elements, the front surface of the control box 300 is provided with a high-definition camera 320 and a buzzer 310, the high-definition camera 320 is used for facial recognition and recording for computer users, the buzzer 310 is used for giving an alarm when a leak is detected, the inner cavity of the control box 300 is provided with a central processing unit, an identity verification unit, a leak detection unit, an access recording unit, an electronic starting button, a solenoid valve lock 230, a data encryption module, a leak repairing module, an automatic recording module, an alarm module and a communication module, the central processing unit is electrically connected with the identity verification unit, the leak detection unit and the access recording unit in an input mode, the identity verification unit is electrically connected with the fingerprint recognizer 220 and the high-definition camera 320 in an input mode, and the central processing unit is electrically connected with the electronic starting button, the solenoid valve lock 230, the data encryption module, the leak repairing module, the automatic recording module, the, the communication module is wirelessly connected with the remote terminal, the central processing unit is used for receiving and sending circuit signals, the identity verification unit comprises a fingerprint recognizer 220 and a high-definition camera 320 and is used for facial recognition and fingerprint recognition and verifying the identity of a user, the vulnerability detection unit is used for detecting the vulnerability of the computer, the access recording unit is used for recording the use log of the computer and the user, the electronic starting button is used for automatically starting up the computer, the data encryption module is used for automatically encrypting important data in the computer when the identity verification unit detects that the authority of the user is too low, the vulnerability repair module is used for automatically repairing the vulnerability of the computer, the automatic recording module is used for recording the operation log of the computer and recording the user of the computer, the alarm module is used for controlling the buzzer 310 to give an alarm when the vulnerability or the anomaly is detected, and the communication module is used for wirelessly connecting the remote terminal, the remote terminal is used for remotely monitoring the computer, and the safety is improved.
While the invention has been described above with reference to an embodiment, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In particular, the various features of the disclosed embodiments of the invention may be used in any combination, provided that no structural conflict exists, and the combinations are not exhaustively described in this specification merely for the sake of brevity and resource conservation. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.

Claims (6)

1. A computer housekeeping system based on artificial intelligence, characterized in that: including workstation (100), computer display screen (200) and control box (300), the bottom four corners of workstation (100) is provided with supporting leg (110), the bottom of supporting leg (110) is provided with universal wheel (120), be provided with computer display screen (200) in the middle of the top of workstation (100), the top right side of workstation (100) is provided with main frame (210), be provided with the fingerprint lock on the electronic start button of main frame (210), be provided with solenoid valve lock (230) on the data interface of main frame (210), the top left side of workstation (100) is provided with control box (300), the front surface of control box (300) is provided with high definition digtal camera (320) and bee calling organ (310), the inner chamber of control box (300) is provided with central processing unit, authentication unit, leak detection unit, Visit record unit, electron start button, solenoid valve lock (230), data encryption module, leak repair module, automatic recording module, alarm module and communication module, central processing unit electrical property input connection authentication unit, leak detection unit and visit record unit, authentication unit electrical property input connection fingerprint identification ware (220) and high definition digtal camera (320), central processing unit electrical output connects electron start button, solenoid valve lock (230), data encryption module, leak repair module, automatic recording module, alarm module and communication module, communication module wireless connection remote terminal.
2. The artificial intelligence based computer housekeeping system of claim 1, wherein: the inner cavity of the computer host (210) is provided with a temperature sensor which is electrically connected with the central processing unit.
3. The artificial intelligence based computer housekeeping system of claim 1, wherein: the electronic power-on button is used for automatically powering on when the identity verification passes.
4. The artificial intelligence based computer housekeeping system of claim 1, wherein: the data encryption module is used for automatically encrypting important data in the computer when the identity verification unit detects that the authority of the user is too low.
5. The artificial intelligence based computer housekeeping system of claim 1, wherein: the solenoid valve lock (230) is used for authority authentication when an external data device is accessed.
6. The artificial intelligence based computer housekeeping system of claim 1, wherein: the high-definition camera (320) is used for facial recognition and recording for computer users.
CN202010880556.XA 2020-08-27 2020-08-27 Computer management system based on artificial intelligence Pending CN111966986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010880556.XA CN111966986A (en) 2020-08-27 2020-08-27 Computer management system based on artificial intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010880556.XA CN111966986A (en) 2020-08-27 2020-08-27 Computer management system based on artificial intelligence

Publications (1)

Publication Number Publication Date
CN111966986A true CN111966986A (en) 2020-11-20

Family

ID=73399704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010880556.XA Pending CN111966986A (en) 2020-08-27 2020-08-27 Computer management system based on artificial intelligence

Country Status (1)

Country Link
CN (1) CN111966986A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107247895A (en) * 2017-05-24 2017-10-13 河海大学常州校区 A kind of computer opening identity authentication system
CN207302062U (en) * 2017-10-25 2018-05-01 四川云玦科技有限公司 A kind of USB interface of computer protective device
CN208092727U (en) * 2018-04-26 2018-11-13 重庆友诚办公设备有限公司 A kind of safe Special office table
CN109363352A (en) * 2018-12-21 2019-02-22 四川变体科技有限公司 A kind of artificial intelligence dais
CN209281402U (en) * 2019-01-08 2019-08-20 深圳市安盾网络技术有限公司 A kind of network data encryption device
CN110909396A (en) * 2019-10-14 2020-03-24 成都信息工程大学 Computer information safety arrangement
US20200162455A1 (en) * 2018-11-19 2020-05-21 Authentrend Technology Inc. Multi-functional authentication apparatus and operating method for the same
CN111259405A (en) * 2020-01-10 2020-06-09 江西理工大学 Computer safety coefficient based on artificial intelligence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107247895A (en) * 2017-05-24 2017-10-13 河海大学常州校区 A kind of computer opening identity authentication system
CN207302062U (en) * 2017-10-25 2018-05-01 四川云玦科技有限公司 A kind of USB interface of computer protective device
CN208092727U (en) * 2018-04-26 2018-11-13 重庆友诚办公设备有限公司 A kind of safe Special office table
US20200162455A1 (en) * 2018-11-19 2020-05-21 Authentrend Technology Inc. Multi-functional authentication apparatus and operating method for the same
CN109363352A (en) * 2018-12-21 2019-02-22 四川变体科技有限公司 A kind of artificial intelligence dais
CN209281402U (en) * 2019-01-08 2019-08-20 深圳市安盾网络技术有限公司 A kind of network data encryption device
CN110909396A (en) * 2019-10-14 2020-03-24 成都信息工程大学 Computer information safety arrangement
CN111259405A (en) * 2020-01-10 2020-06-09 江西理工大学 Computer safety coefficient based on artificial intelligence

Similar Documents

Publication Publication Date Title
US10171239B2 (en) Single use recovery key
US10146706B2 (en) Data security system
CN100489728C (en) Method for establishing trustable operational environment in a computer
US20190050598A1 (en) Secure data storage
US8959350B2 (en) Token for securing communication
US8561209B2 (en) Volume encryption lifecycle management
US7840795B2 (en) Method and apparatus for limiting access to sensitive data
JP2005505026A (en) Portable device with biometrics-based authentication function
JP2005050328A (en) Portable device having authentication function of biometry base
CN101127069A (en) System, apparatus and method for providing data security using USB device
US8695085B2 (en) Self-protecting storage
JP2007034875A (en) Use management method for peripheral, electronic system and constituent device therefor
CN104834840B (en) Cipher code protection method based on mapping drift technology
CN112083879B (en) Physical partition isolation and hiding method for storage space of solid state disk
JP2010020751A (en) Content protection method, computer system, and storage medium
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
US20070226515A1 (en) Secure biometric processing system and method of use
CN101539972B (en) Method for protecting electronic document information and system thereof
CN101308700A (en) Divulging secret prevention U disk
CN104361298B (en) The method and apparatus of Information Security
CN111539042B (en) Safe operation method based on trusted storage of core data files
CN111966986A (en) Computer management system based on artificial intelligence
CN111259405A (en) Computer safety coefficient based on artificial intelligence
US11256824B2 (en) Securing database backups with unique global identifier
US10601592B2 (en) System and method trusted workspace in commercial mobile devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination