System for protecting information security of computer software or network

A network information and software technology, applied in the field of computer and communication, can solve the problems of third-party eavesdropping, tampering or counterfeiting, insecure transmission of computer software or network information, etc., and achieve the effect of protecting transmission security.

Inactive Publication Date: 2007-12-26
盛年
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the transmission of computer software or network information is very insecure, and it is easy to be eavesdropped, tampered with or counterfeited by a third party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for protecting information security of computer software or network
  • System for protecting information security of computer software or network
  • System for protecting information security of computer software or network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0007] Embodiment 1. The system of the present invention involves identity verification agencies, information publishers and information users. The identity verification agencies have agreed with multiple information publishers or information users on an identity key based on a certain encryption method and based on this identity An official or unofficial (such as an enterprise) organization that verifies the identity of the information issuer or information user with the key. An information publisher or information user may have an information storage and processing device set on a ring for keeping the identity key. The ring includes but is not limited to watches, bracelets, bracelets, bracelets and the like. At the request of the information publisher or information user, the identity verification agency can use a certain identity key agreed with the information publisher or information user to transmit to the information publisher and information user respectively. The same...

Embodiment 2

[0009] Embodiment 2, the ring and its information storage and processing device in this example have a device based on wrist biometric recognition, such as wrist pulse biometric recognition or near-infrared sensing of veins, and recognition based on the criss-crossing characteristics of the vein network legitimate users. Or a device based on wrist biometric identification and other detection methods, such as simultaneous detection of alcohol concentration to determine whether the owner is conscious, to control the working status of the information storage and processing device. For example, if there is no pulse or abnormality outside the body, it can be closed. system. Control the working status of its information storage and processing device to be on or off. The information storage and processing device of the ring can directly exchange identity key information with the external information identification system through contact or non-contact, or indirectly exchange identit...

Embodiment 3

[0010] Embodiment 3, the ring and its information storage and processing device in this example have a device based on biometric identification or non-biological identification including but not limited to password identification, and control its information storage and processing device to be on or off working status. The information storage and processing device of the ring can directly exchange identity key information with the external information identification system through contact or non-contact, or indirectly exchange identity key information with the external information identification system through a supporting mobile phone.

[0011] The identity key or exchange key kept by the information storage and processing device in the above three embodiments is a digital library [4] in a digital library encryption method. Please refer to Figure 1 for the principle. The encryption method of the digital database is to pre-agree on one or more digital databases [4] between th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system used for protecting safety of computer software or network information is prepared for enabling status verification mechanism to provide one and the same interflow cipher key to one of information publisher or information user by responding request from information publisher or information user to use appointed certain status cipher key, enabling information publisher to use interflow cipher key to carry out enciphering protection on said software and said information and enabling information user to use interflow cipher key to obtain relevant authorization to decipher said protection in order to use protected information.

Description

(1) Technical field [0001] The invention relates to the technical field of computer and communication. (2) Background technology [0002] At present, the transmission of computer software or network information is very insecure and vulnerable to eavesdropping, tampering or counterfeiting by third parties. (3) Contents of the invention [0003] The purpose of the present invention is to provide a system that can effectively protect the safe transmission of computer software or network information. [0004] The technical solution adopted by the present invention to solve its technical problems is: this kind of system involves identity verification agencies, information publishers and information users, and identity verification agencies have agreed with multiple information publishers or information users based on a certain encryption method An official or unofficial institution that verifies the identity of the information issuer or information user based on the identity k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/00G06F21/32
Inventor 盛年
Owner 盛年
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products