[go: up one dir, main page]

CN100570592C - A kind of soft computer and implementation method - Google Patents

A kind of soft computer and implementation method Download PDF

Info

Publication number
CN100570592C
CN100570592C CNB2008101186708A CN200810118670A CN100570592C CN 100570592 C CN100570592 C CN 100570592C CN B2008101186708 A CNB2008101186708 A CN B2008101186708A CN 200810118670 A CN200810118670 A CN 200810118670A CN 100570592 C CN100570592 C CN 100570592C
Authority
CN
China
Prior art keywords
intelligent terminal
data
computer
environment
virus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2008101186708A
Other languages
Chinese (zh)
Other versions
CN101382928A (en
Inventor
陆建华
裴玉奎
葛宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yao Chinese Mdt Infotech Ltd
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CNB2008101186708A priority Critical patent/CN100570592C/en
Publication of CN101382928A publication Critical patent/CN101382928A/en
Application granted granted Critical
Publication of CN100570592C publication Critical patent/CN100570592C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

一种软计算机及实现方法属于计算机技术领域,所述软计算机包含有:智能终端、接入环境及备份机,所述智能终端包括作为数据和软件的存储载体的存储体及外接体,该存储体在存储空间上依次划分为数据区、病毒隔离区及软件区,在软件区中存储有:应用软件、操作系统和驱动程序,在所述外接体中,至少包含有:CPU及硬件防病毒模块、用户鉴权模块,该CPU提供高速接口与所述存储体的数据接口相连,至少包括数据输入、输出两种接口,所述接入环境包括:输入输出用的外部设备、显示设备以及具有计算并处理数据能力的计算平台构成,所述备份机为一台经网络访问的计算机。本发明具有便携性好,个性化强,数据自动备份以及防病毒、安全性好的优点。

Figure 200810118670

A soft computer and an implementation method belong to the field of computer technology. The soft computer includes: an intelligent terminal, an access environment and a backup machine. The intelligent terminal includes a storage body and an external body as storage carriers for data and software. The storage body The storage space of the body is divided into data area, virus isolation area and software area in sequence. In the software area, application software, operating system and driver are stored. In the external body, at least the CPU and hardware anti-virus are included. module and user authentication module. The CPU provides a high-speed interface connected to the data interface of the storage body, including at least two interfaces for data input and output. The access environment includes: external devices for input and output, display devices, and It is composed of a computing platform capable of calculating and processing data, and the backup machine is a computer accessed through a network. The invention has the advantages of good portability, strong personalization, automatic data backup, anti-virus and good security.

Figure 200810118670

Description

A kind of soft computer and implementation method
Technical field
The present invention relates to a kind of soft computer and implementation method, particularly a kind of soft computer of being made up of intelligent terminal, access environment and backup machine belongs to field of computer technology.
Background technology
Along with constantly popularizing of computing machine, a lot of users have not only one computer, all dispose different computers in different places such as office, family, laboratories, and different computers all has own different operating system, application software and data.In order to use consistent data in different places, utilize USB flash disk to copy mutually usually at present at the computer in different places, so be difficult to guarantee the synchronism of each computer data, the risk that has also brought virus between each computer, to propagate simultaneously.In case and existing computing machine infective virus, the lighter causes the collapse of system, weight person can cause the losing of data or the damage of computer hardware, brings serious loss to the user.Another aspect, existing computing machine generally adopts the structure of soft or hard one, the execution command of operating system software is based on carry out concrete instruction as the computer hardware of carrying out body, and application software is based on concrete operating system execution command, promptly from the application software to the operating system software up to computer hardware, execute instruction and execution body close-coupled, this makes transplanting of carrying out body become very difficult, and carrying out body and execution command has to be separated.In order to guarantee can to work smoothly on each computer, all computers all must be installed all application software, have brought the waste of resource and the lifting of cost.。
Existing personal computer user is more and more pursued the personalization of use and the protection of privacy, comprises the personalized requirement to operating system, application software and personal data.And existing personal computer need have the hardware of independent completions such as mainboard, central processing unit, internal memory, hard disk, application software must be moved based on the hardware of above-mentioned personal computer independent completion simultaneously, software closely relies on hardware, make the application software on the personal computer can not be transplanted to easily in other the computer environment, application software lacks universality; And on the other hand, because the operating system software of personal computer is based on its concrete hardware operation, and its application software is based on its operating system software operation, this makes the application software of personal computer carry out the body hard disk and can not conveniently be transplanted in other the computer environment that the hard disk of personal computer can't be carried and be transplanted to other computing machine and use.For personalization and the privacy that guarantees the user, can only be the computer that each one disposes a platform independent, the wasting phenomenon of a computer of staff in the one family has so just appearred.
In order to realize the personalized application and the unification of application software and data, the previous general solution of order be the user at the conversion working environment or when going on business, carry thick and heavy notebook computer to use own personalized operating system and corresponding application.But notebook computer is difficult on high-performance and the high convenience and obtains doulbe-sides' victory, the often volume and weight of superior performance is big, the dirigibility that influence is gone on business and taken action, small and exquisite often arithmetic capability has been subjected to very big constraint, and the size of input-output device also has been subjected to very big constraint and can't have used easily simultaneously.Make that like this user who carries notebook can't enjoy high convenience and high-performance simultaneously, satisfactory to both parties because present notebook computer is difficult to accomplish.Simultaneously, notebook computer has also brought potential safety hazard, and the carrier is owing to target obviously needs to strengthen the dynamics of keeping, even simultaneously in case lose that will to cause losing of significant data be serious consequence such as divulge a secret.
To sum up, conclude the not enough as follows of existing computing machine:
1) can't realize the synchronous of each computer data simply;
2) can't realize effective protection of virus with protected data farthest from hardware point of view;
3) can't realize the integrated of application software, operating system conveniently to be transplanted to different computers;
4) the no portable function of carrying;
5) can't economy satisfy user's individual demand and protection user's privacy easily;
6) can't take care of and lose warning easily.
Summary of the invention
Fundamental purpose of the present invention is the deficiency at active computer, and a kind of soft computer and implementation method are provided.This soft computer is inserted environment and backup machine and is constituted by intelligent terminal.This soft computer has data automatically synchronously and the function of backup, has the hardware protection function, has user's authentication and loses warning function, has hardware firewall to realize that the function of the hardware isolated of virus is had portable function of carrying.The intelligent terminal of this soft computer has been realized driver, operating system, application software and data integrated framework, has realized viral isolation features in data field and software district, is a kind of novel structure and implementation method.
The present invention is achieved by the following technical solutions:
A kind of soft computer and implementation method, its feature comprises:
This soft computer is made of intelligent terminal, access environment and backup machine.
Wherein intelligent terminal is made of memory bank and outer junctor two parts: memory bank comprises the data field, viral isolated area, application software, operating system and driver; Outer junctor comprises that CPU reaches and the hardware protection module of its interconnection, and authentication module is lost alarm module and hardware anti-virus module.
Wherein insert environment by input/output peripheral and show that peripheral hardware, computing platform constitute.
Wherein backup machine is that an access environment can have the function of data backup by the computing machine of access to netwoks.
The memory bank of intelligent terminal, it has the carrier of memory function for certain, can be based on the high capacity memory carrier of flash memory, also can be based on the high capacity memory carrier of magnetic disc, is used for storage data and software.Memory bank is characterised in that: memory bank is divided into data field and software district according to the difference of memory contents.
Wherein the data field is in order to preserve user's data.
Wherein viral isolated area is carried out soft isolation, virus-isolating at software area and data area.
Wherein application software is the application software that is installed in the personalization on the memory bank, in order to working and learning at ordinary times.
Wherein operating system is the individual operation system that is installed on the memory bank, and it both can be the operating system software of industrywide standard, and as form Windows, Linux etc. also can be other self-defining or independently developed operating system softwares.
Wherein driver is the general driver that is installed on the memory bank, inserts in other environment automatically more newer driver to adapt to the access environment to adapt to intelligent terminal.
The outer junctor of intelligent terminal is characterized in that:
CPU, be used for control and management hardware protection module, authentication, lose and report to the police and hardware firewall module and with memory bank and insert environment and link to each other.
The hardware protection module is not subjected to the influence of abnormal voltage or electric current in order to the memory bank of protection intelligent terminal.
Authentication is meant that intelligent terminal utilizes biometric sensor to carry out biological information identification and carries out identification authentication, and this biological information can be a hand information, comprises fingerprint, palmmprint and hand-type, can be eye information, comprise iris and retina, can be head, comprise face, ear-lobe and lip can be biochemical informations, comprise DNA and body odour, can be behavioural information, comprise sound, signature, gait etc.
Losing reports to the police be meant intelligent terminal detect its with the user between whether satisfy the condition of losing and send alerting signal to related alarm, whether exceed the threshold value that sets as the distance that detects between intelligent terminal and the user.
Hardware firewall can be from hardware view interception virus, with the safety of protection memory bank.
A kind of structure of soft computer and implementation method, access environment wherein comprise input/output peripheral and show peripheral hardware and computing platform two parts.
Wherein input/output peripheral and demonstration peripheral hardware comprise input peripherals such as keyboard, mouse, and display etc. show peripheral hardware, input/output peripherals such as network interface card, sound card, USB interface.Various input/output peripherals and demonstration peripheral hardware insert with the user in order to the intelligent terminal of giving soft computer and carry out alternately.
Wherein computing platform is meant and inserts the platform that environment has the computing data, it can be the computing power that inserts the independently computing machine that environment this locality had, promptly inserting environment is the complete computing machine of a platform independent, computer environment has the hardware of independent completion, also can be the computing platform that remote server provides.
A kind of structure of soft computer and implementation method, backup machine wherein be for inserting the backup computer that environment can long-range connection, insert that environment can long-rangely be connected to backup machine and with the data field backed up in synchronization of intelligent terminal to backup machine.
A kind of soft computer and implementation method is characterized in that: intelligent terminal realizes that intelligent terminal inserts and the backup machine backed up in synchronization.
Intelligent terminal is realized may further comprise the steps:
Step 101: on memory bank, mark off data field, viral isolated area, application software, operating system and 5 subregions of driver,
Step 102: the partly integrated CPU of junctor outside, CPU be used for control and management hardware protection module, authentication, lose and report to the police and hardware firewall module and with memory bank and insert environment and link to each other,
Step 103: memory bank and outer junctor are coupled together the formation intelligent terminal.
Intelligent terminal inserts and may further comprise the steps:
Step 201: the interface that the high-speed interface that intelligent terminal provides by described CPU is corresponding with inserting environment connects,
Step 202: whether the electrical specification that intelligent terminal hardware protection module detect to insert in safe range, as in safe range, and execution in step 203, as not in safe range, the hardware protection module is reported to the police,
Step 203: intelligent terminal carries out authentication to the user and judges its whether validated user, as is validated user, execution in step 204, otherwise report to the police,
Step 204: intelligent terminal obtains its control that inserts the computing machine of environment automatically,
Step 205: the intelligent terminal kernel that starts the operating system, initialization system also loads initiating task, and detect the hardware device that inserts computer environment and install driver automatically automatically, and dispose automatically,
Step 206: the intelligent terminal os starting finishes, and waits for authentication user use corresponding application,
Step 207: in the use, intelligent terminal carries out the hardware anti-virus to all data stream that enter and detects, as finds that virus then carries out hardware isolated outside memory bank,
Step 208: in the use, the application software of intelligent terminal is put into viral isolated area with doubtful virus, with the further diffusion that prevents that it is possible,
Step 209: after finishing using, intelligent terminal with the data field backed up in synchronization to backup machine.
The backup machine backed up in synchronization may further comprise the steps:
Step 301: insert environment after intelligent terminal inserts, send inquiry to backup machine,
Step 302: backup machine is replied, and allows backup,
Step 303: the intelligent terminal that has inserted backups to the data of data field on the backup machine by inserting environment.
A kind of soft computer and implementation method, its authentication module and lose alarm module is characterised in that:
Authentication may further comprise the steps:
The input of subscriber identity information:
Step 401: carry out user's corresponding biological characteristic extraction according to the biometric information sensor of soft computer,
Step 402: the biological characteristic according to extracting, generate corresponding Wave data or view data,
Step 403: the Wave data of corresponding generation or view data are carried out filtering, smoothly reached pre-service such as noise reduction,
Step 404: pretreated data are carried out binaryzation and thinning processing,
Step 405: data after the refinement are carried out feature point extraction,
Step 406: the unique point of extracting is stored to database.
The affirmation of subscriber identity information:
Step 501: carry out user's corresponding biological characteristic extraction according to the biometric information sensor of soft computer,
Step 502: the biological characteristic according to extracting, generate corresponding Wave data or view data,
Step 503: the Wave data of corresponding generation or view data are carried out filtering, smoothly reached pre-service such as noise reduction,
Step 504: pretreated data are carried out binaryzation and thinning processing,
Step 505: data after the refinement are carried out feature point extraction,
Step 506: the unique point extracted and step 406 are stored to data of database compare and export comparison result.
Soft computer is lost to report to the police and be may further comprise the steps:
Step 601: the user is provided with the warning attribute and the alarm threshold value of soft computer, as leaves user's distance, or the variation of certain biological characteristic of user,
Step 602: soft computer reported to the police to be associated with on the other-end that the user carries, as mobile phone,
Step 603: the warning attribute that detects soft computer as the alarm terminal of soft computer association exceeds alarm threshold value, then sends alerting signal, and whether the user checks soft computer and lose.
A kind of soft computer and implementation method, the hardware protection module of its intelligent terminal is characterized in that:
Step 701: detect the electrical specification of interface, as voltage and electric current,
Step 702: whether the electrical specification that judgement is detected as in safe range, then opens circuit interface and memory bank between in safe range, otherwise, send warning message,
Step 703: receive warning message, disconnect connection.
A kind of soft computer and implementation method, the hardware anti-virus of its intelligent terminal is characterized in that, utilizes the hardware chip that has processing power to finish following step:
Step 801: hold back the data stream that inserts environment,
Step 802: whether analysis detecting data stream contains virus,
Step 803: killing virus,
Step 804: the data stream after the killing virus is passed to memory bank.
Soft computer of the present invention and implementation method have following advantage, and be as shown in table 1.
Table 1 soft computer and active computer are relatively
Soft computer Active computer
Portable degree Volume is little, in light weight Volume is big, Heavy Weight
Data sync and backup Automatically Manually
Personalized Well Generally
The hardware protection measure Well Generally
The antivirus protection measure Hardware safety, software is isolated Single software protecting
Safe and secret measure Subscription authentication and lose warning Do not have
Description of drawings
A kind of soft computer structure of Fig. 1;
Fig. 2 soft computer using method and step;
Fig. 3 soft computer hardware anti-virus method;
The user identity of Fig. 4 soft computer (fingerprint) input flow process;
The user identity of Fig. 5 soft computer (fingerprint) authorizing procedure;
Fig. 6 soft computer is lost alarm flow.
Embodiment
Describe the structure and the implementation method of soft computer in detail below in conjunction with accompanying drawing.
As shown in Figure 1, soft computer of the present invention is a kind of novel computer organization, no longer is the active computer structure of traditional software and hardware one, but a kind of " flexibility " computing machine.Soft computer is made up of 3 parts, is respectively 1 intelligent terminal, and 2 insert environment, 3 backup machines.。In soft computer, 1 portable equipment that can carry at any time for the user, 2 for the user provides 1 environment that inserts, and 3 provide the remote backup machine of backed up in synchronization for 110 in 1.Wherein 1 comprises memory bank 11 and 12 two parts of outer junctor, and 11 are used for storing the data and the software of user individual, specifically comprise data field 110, viral isolated area 111, application software 112, operating system 113, driver 114.Outer junctor 12 provides necessary peripheral interface and other subsidiary function for 11; its core is CPU 120; also comprise hardware anti-virus 122; lose alarm module 124; authentication module 123; hardware protection module 121; wherein 122 adopt the method for hardware to carry out the isolation and the killing of virus, it has the function that virus base upgrades, and 124 can inform in time whether validated user 1 is lost; 123 in order to differentiate that whether the user is 1 the legal owner; 110 provide and insert 2 high speed IO interface for 1, as USB2.0, and IEEE1394; Ethernet interfaces etc., 121 are 11 protections that the electrical specification aspect is provided.2 comprise input/output peripheral and show peripheral hardware 21 and computing platform 22,21 inserts the back and provides necessary input-output device and display device to the user for 1, and 22 provide the computing platform for 1, have independently calculation process ability after inserting 2 with box lunch 1.
As shown in Figure 2, the using method of soft computer comprises following flow process:
Flow process 201: intelligent terminal 1 provides the high-speed interface interface corresponding with inserting environment 2 to connect by CPU 120,
Flow process 202: whether intelligent terminal hardware protection module 121 detects the electrical specification that inserts in safe range, as in safe range, carries out flow process 203, and as not in safe range, the hardware protection module is reported to the police,
Flow process 203: intelligent terminal carries out authentication to the user and judges its whether validated user, and wherein subscription authentication comprises subscriber identity information input and user identity identification, sees Fig. 4 and Fig. 5 in detail, as be validated user, carry out flow process 204, lose warning otherwise enter flow process 210, see Fig. 6 for details
Flow process 204: intelligent terminal obtains its control that inserts the computing machine of environment automatically,
Flow process 205: the intelligent terminal kernel that starts the operating system, initialization system also loads initiating task, detects the hardware device that inserts computer environment and install driver automatically automatically, and disposes automatically; The intelligent terminal os starting finishes, and waits for authentication user use corresponding application,
Flow process 206: in the use, intelligent terminal carries out the hardware anti-virus to all data stream that enter and detects, as finds that virus then carries out hardware isolated outside memory bank, sees Fig. 3 for details,
Flow process 207: in the use, the application software of intelligent terminal is put into viral isolated area with doubtful virus, with the further diffusion that prevents that it is possible,
Flow process 208: after finishing using, 1 carries out 110 backed up in synchronization by 23,
Flow process 209: disconnect 1 and be connected with 2.
As shown in Figure 3, the detailed operation flow process of 122 among Fig. 1 and flow process 207 is as follows, its all flow processs all are based on the hardware chip that has processing power and finish, and do not need computer based operating system and application software, wherein a kind of hardware from the Yoggie Security Systems of Israel company is killed virus, and product---Yoggie Pico is the hardware with this hardware anti-virus ability:
Flow process 301: hold back the data stream that inserts environment,
Flow process 302: whether analysis detecting data stream contains virus,
Flow process 303: killing virus,
Flow process 304: the data stream after the killing virus is passed to memory bank.
In Fig. 4, will be input as the subscriber identity information input flow process that example explanation plastic flow journey 203 is comprised with fingerprint.The fingerprint input comprises following detailed process:
Flow process 401: utilize fingerprint sensor such as chip AES2510 to carry out fingerprint collecting,
Flow process 402: the fingerprint of sensor acquisition is changed into fingerprint image,
Flow process 403: the fingerprint image that generates is carried out a series of pre-service, comprise preprocess methods such as extreme value filtering, a filtering, sharpening, secondary is level and smooth,
Flow process 404: pretreated fingerprint image data is carried out binaryzation,
Flow process 405: the fingerprint image data after the binaryzation is carried out refinement,
Flow process 406: to the fingerprint image data extract minutiae after the refinement, with convenient storage and identification,
Flow process 407: the fingerprint feature point that extracts is stored, be stored in the usefulness of fingerprint base 408 in order to identification, wherein fingerprint base 408 is positioned at memory bank 103.
As shown in Figure 5, the user identity identification detailed process in the flow process 203 among Fig. 2 is as follows, will be example with the fingerprint equally, describes its authorizing procedure in detail, comprises fingerprint collecting and compares two parts:
At first, comprise flow process 501 ~ flow process 506 with flow process 401 ~ flow process 406 the same fingerprint collectings that carry out.
Flow process 501: utilize fingerprint sensor such as AES2510 to carry out fingerprint collecting,
Flow process 502: the fingerprint of sensor acquisition is changed into fingerprint image,
Flow process 503: the fingerprint image that generates is carried out a series of pre-service, comprise preprocess methods such as extreme value filtering, a filtering, sharpening, secondary is level and smooth,
Flow process 504: pretreated fingerprint image data is carried out binaryzation,
Flow process 505: the fingerprint image data after the binaryzation is carried out refinement,
Flow process 506: to the fingerprint image data extract minutiae after the refinement, with convenient comparison identification,
Flow process 507: the fingerprint feature point of extraction and the finger print data of fingerprint 408 storages are compared,
Flow process 508: the result that will compare exports to 203, whether has the right that starts this soft computer to determine the user who holds soft computer.
As shown in Figure 6, the detailed operation flow process of losing alarm module 124 and flow process 210 in Fig. 1 soft computer is as follows, and this sentences the distance that detects soft computer and user is the example explanation:
Flow process 601: the warning attribute that soft computer is set is a distance of leaving the user, and its alarm threshold value is set is 5 meters, promptly when soft computer and user's distance less than 5 meters, soft computer is in normal condition; When soft computer and user's distance more than or equal to 5 meters, soft computer is in lost condition;
Flow process 602: the mobile phone terminal that related soft calculating and user carry promptly is provided with mobile phone terminal and can knows distance between soft computer and the user at any time;
Flow process 603: mobile phone detects the distance of itself and soft computer, can utilize simple technological means such as infrared distance measurement to know the distance of mobile phone and soft computer;
Flow process 604: whether judging distance does not change flow process 603 over to and continues to detect distance greater than 5 meters, in this way, then changes flow process 605 over to;
Flow process 605: mobile phone sends soft computer and loses alerting signal.

Claims (5)

1, a kind of soft computer is characterized in that, contains: intelligent terminal, access environment and backup machine, and wherein intelligent terminal links to each other with the access environment by CPU, inserts environment and links to each other with backup machine by computing platform:
Described intelligent terminal is made of memory bank and outer junctor, and memory bank links to each other by CPU with outer junctor, wherein
Memory bank is memory carrier, contains data field, software district and the viral isolated area between described data field and software district and forms, the software in the described software district, contain at least: application software, operating system and driver,
Outer junctor includes at least: hardware anti-virus module, subscription authentication module and CPU, and wherein CPU links to each other with hardware protection module, authentication module respectively;
Insert environment, the external unit of using by input and output, show with external unit and have and calculate also that the computing platform of deal with data constitutes;
Backup machine, be one insert environment can be by the computing machine of access to netwoks, an or computing platform providing of remote server.
2, a kind of soft computer according to claim 1 is characterized in that, also contains the hardware protection module that this memory bank of protection is not influenced by external physical power in described memory bank.
3, a kind of soft computer according to claim 2 is characterized in that described hardware protection module is a kind of module that prevents voltage or current anomaly.
4, a kind of soft computer according to claim 1 is characterized in that, also contains an alarm module of losing that prevents that this intelligent terminal from losing in described memory bank.
5, a kind of soft computer implementation method is characterized in that, contains intelligent terminal realization, intelligent terminal access and backup machine each step synchronously successively:
Step (1), intelligent terminal is realized:
Step (1.1) marks off data field, viral isolated area and software district successively on as the memory bank of memory carrier, this software district comprises application software subregion, operating system partition and driver subregion,
Step (1.2); the following module that is integrated with CPU outside on the junctor and interconnects: be used to protect this memory bank to avoid the hardware protection module of external physical power influence with described CPU; subscription authentication module, described intelligent terminal are lost alarm module and hardware anti-virus module
Step (1.3) couples together the CPU in memory bank in the step (1.1) and the step (1.2) and constitutes described intelligent terminal;
Step (2), intelligent terminal inserts:
Step (2.1) is constructed one and is inserted environment, and the external unit that described access environment is used by input and output, show the external unit of usefulness and have and calculate and the computing platform of deal with data ability constitutes,
Step (2.2), described intelligent terminal links to each other with input, the output interface of external unit described in this access environment by described CPU,
Whether step (2.3), the hardware protection module of described intelligent terminal detect the electrical specification that inserts in safe range, if in safe range, and execution in step (2.4) then, otherwise, report to the police,
Step (2.4), automatically obtain the control of computing machine of this access environment at described intelligent terminal after, kernel, initialization system and load initiating task, automatically detect the hardware device that inserts computer environment and install driver and disposing automatically automatically start the operating system
Step (2.5), after system start-up finished, described intelligent terminal wait authentication user was used corresponding access authentication program,
Step (2.6), after authenticating user identification was errorless, described intelligent terminal carried out anti-virus to all data stream that enter and detects, in a single day finds then virus to be isolated in virus outside the described memory bank, and described intelligent terminal is put into viral isolated area to doubtful virus,
Step (2.7) is finished using, and described intelligent terminal is pressed following step (3) backed up in synchronization to described data stream to described backup machine;
Step (3), the backup machine backed up in synchronization:
Step (3.1), the calculating in the described access environment and the computing platform of deal with data are sent inquiry to described backup machine,
Step (3.2), after receiving that the permission backup is replied, described intelligent terminal backups to this backup machine to the data of data field by this access environment.
CNB2008101186708A 2008-10-29 2008-10-29 A kind of soft computer and implementation method Expired - Fee Related CN100570592C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2008101186708A CN100570592C (en) 2008-10-29 2008-10-29 A kind of soft computer and implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2008101186708A CN100570592C (en) 2008-10-29 2008-10-29 A kind of soft computer and implementation method

Publications (2)

Publication Number Publication Date
CN101382928A CN101382928A (en) 2009-03-11
CN100570592C true CN100570592C (en) 2009-12-16

Family

ID=40462773

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2008101186708A Expired - Fee Related CN100570592C (en) 2008-10-29 2008-10-29 A kind of soft computer and implementation method

Country Status (1)

Country Link
CN (1) CN100570592C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819694B (en) * 2011-06-09 2015-12-02 国民技术股份有限公司 The equipment of a kind of TCM chip, virus investigation method and operation TCM chip
CN103136518A (en) * 2013-03-06 2013-06-05 安徽云盛信息科技有限公司 Preprocessing algorithm of fingerprint image automatic identification system
WO2014147633A1 (en) * 2013-03-19 2014-09-25 Trans - Innovation Technologies Pvt. Ltd Standalone portable device for detecting and removing virus or malware or spyware
CN105629746A (en) * 2015-07-30 2016-06-01 宇龙计算机通信科技(深圳)有限公司 User information identification-based device control method and mobile terminal
CN106488454B (en) * 2015-08-28 2020-03-17 宇龙计算机通信科技(深圳)有限公司 Method and device for connecting external equipment and mobile terminal
US10819418B2 (en) * 2016-04-29 2020-10-27 Honeywell International Inc. Systems and methods for secure communications over broadband datalinks
CN107463846A (en) * 2017-07-31 2017-12-12 苏州巴吉特信息咨询有限公司 A kind of hard disk with self-protection function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101025702A (en) * 2006-02-17 2007-08-29 深圳奇峰创智科技有限公司 Method for automatic backup using computer network
CN101183324A (en) * 2007-12-10 2008-05-21 上海北大方正科技电脑系统有限公司 Recovery method of computer system
US20080126786A1 (en) 2002-03-22 2008-05-29 Kabushiki Kaisha Toshiba Information device, storage medium and initial state restoration method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080126786A1 (en) 2002-03-22 2008-05-29 Kabushiki Kaisha Toshiba Information device, storage medium and initial state restoration method
CN101025702A (en) * 2006-02-17 2007-08-29 深圳奇峰创智科技有限公司 Method for automatic backup using computer network
CN101183324A (en) * 2007-12-10 2008-05-21 上海北大方正科技电脑系统有限公司 Recovery method of computer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
计算机网络系统的安全性和备份系统的解决方案. 梁国汀.供用电,第18卷第1期. 2001 *

Also Published As

Publication number Publication date
CN101382928A (en) 2009-03-11

Similar Documents

Publication Publication Date Title
CN100570592C (en) A kind of soft computer and implementation method
EP2763048B1 (en) Security-enhanced cloud system and security management method thereby
CN101436247B (en) Biological personal identification method and system based on UEFI
CN103425921A (en) Device, system and method for code management
CN105631292A (en) Identity authentication and financial payment all-in-one machine terminal
CN101697187B (en) Anti-vibration type alarm fingerprint encryption anti-theft notebook computer
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN105184135A (en) Fingerprint recognition method and fingerprint recognition system
CN107395881A (en) Unlock control method and related products
CN102819700A (en) Device and method for identifying a plurality of biological characteristics in isolation environment
CN207198851U (en) Intelligent identity identification system based on Raspberry Pi
CN107808086A (en) Unlocking method, device and equipment of intelligent terminal
CN101697184B (en) Card-inserting fingerprint identification anti-theft notebook computer
CN203224925U (en) Palm vein-based centralized entrance guard authentication system
CN102955956A (en) Mobile communication system, mobile communication method and mobile terminal device based on RFID-SIM card (radio frequency identification device-subscriber identity module card)
CN101673331B (en) Anti-theft notebook computer
CN201622627U (en) Fingerprint doorcontrol device
CN109873747A (en) Electronic device and unlocking method thereof
CN203324988U (en) Dual fingerprint and vein identification verification system
CN206322182U (en) A kind of fingerprint identification device
CN202548973U (en) Bank card security certification system for replacing password authentication mode
CN202533961U (en) Fingerprint collecting device
CN108491712B (en) Method and device for safely reading and writing hospital confidential documents
CN107451456A (en) Mode control method and related product
CN200986707Y (en) PDA for realizing user identification using fingerprint identification technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENZHEN INSTITUTE OF STINGHUA UNIVERSITY

Free format text: FORMER OWNER: TSINGHUA UNIVERSITY

Effective date: 20121024

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100084 HAIDIAN, BEIJING TO: 518057 SHENZHEN, GUANGDONG PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20121024

Address after: 518057 Nanshan District science and Technology Park, Guangdong, Shenzhen, Tsinghua University, Shenzhen, A301

Patentee after: Shenzhen Institute of Stinghua University

Address before: 100084 Beijing 100084-82 mailbox

Patentee before: Tsinghua University

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160707

Address after: 518000 Guangdong province high tech Industrial Development Zone of Guangzhou Science City Science Innovation Building Road No. 182 building 903 unit C1 (topon a public record office space Card No. 64)

Patentee after: Guangzhou Yao Chinese Mdt InfoTech Ltd

Address before: 518057 Nanshan District science and Technology Park, Guangdong, Shenzhen, Tsinghua University, Shenzhen, A301

Patentee before: Shenzhen Institute of Stinghua University

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091216

Termination date: 20201029

CF01 Termination of patent right due to non-payment of annual fee