Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security protection method and data security protection device

A technology of data security and protection device, applied in the computer field, can solve the problems of data encryption key being easily obtained illegally, reducing the performance of computer system, low security, etc., so as to improve data security, reduce performance and ensure security Effect

Active Publication Date: 2011-11-09
NATIONZ TECH INC
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Others such as the BitLocker (disk encryption bit lock) function that Microsoft has launched since the Vista operating system have realized user identity authentication and data encryption, but the data encryption method it adopts is completed by CPU execution instructions, and its data encryption key Exposed in computer memory, in the current year when computer viruses and Trojan horses are prevalent, the data encryption key is extremely easy to be obtained illegally, and the security of this function is low
Moreover, encrypting and decrypting data by executing instructions through the CPU will greatly reduce the performance of the computer system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and data security protection device
  • Data security protection method and data security protection device
  • Data security protection method and data security protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0039] The data security protection method of the present invention comprises the following steps:

[0040] Step A: The security module authenticates the user identity, if the authentication fails, execute step B, otherwise execute step C;

[0041] Step B: The security module judges the number of times of user identity authentication, if the number of times does not reach the limit value, then execute step A, otherwise execute step Z;

[0042] Step C: the security module authenticates the encryption module, and if the authentication fails, execute step D; otherwise, execute step E;

[0043] Step D: The security module judges the number of authentications to the encryption module, if the number of times does not rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data security protection method and a data security protection device for protecting data security in a computer memory. The method comprises the following steps that: while starting computer equipment, a security module respectively distinguishes and authenticates a user identity and an encryption module, after passing through the distinguishing and the authentication, the security module transmits a data key to the encryption module, in the following use, the encryption module encrypts the memory data for protection, and if the distinguishing and the authentication are not passed, the computer cannot be started. The device comprises the security module and the encryption module, which are arranged in computer equipment, such as a PC host, a PDA, a mobile phone, a PMP or a digital photo frame and the like, and are connected with each other. The method and the device implement the transparent encryption for the memory data of computer equipment and the distinguishing of user identity, and simultaneously, separately store a key and an encryption algorithm, thereby implementing higher security.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a data security protection method and a data security protection device for protecting computer memory data security. Background technique [0002] With the advent of the information age, data has become more and more important. Most important data and information of companies, industries, and individuals are basically stored in modern storage media, and some important data may be stored in system terminals. For example, in a memory module of a personal computer, a PDA (Personal Digital Assistant, personal digital assistant), a server or other removable memory modules. At present, the memory modules in personal computers, PDAs, servers, and removable memory modules do not have encryption features. Once the memory module is lost, the original data on the memory module may be obtained by illegal users, which seriously threatens personal privacy, business secrets, and even financi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F21/00G06F21/31G06F21/79
Inventor 陈官学杨硕邹浩
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products