Data security protection method and data security protection device
A technology of data security and protection device, applied in the computer field, can solve the problems of low security, reduced computer system performance, easy access to data encryption keys illegally, etc., to achieve the effects of ensuring security, improving data security, and reducing performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0043] The data security protection method of the present invention comprises the following steps:
[0044] Step A: The security module authenticates the user identity, if the authentication fails, execute step B, otherwise execute step C;
[0045] Step B: The security module judges the number of times of user identity authentication, if the number of times does not reach the limit value, then execute step A, otherwise execute step Z;
[0046] Step C: the security module authenticates the encryption module, and if the authentication fails, execute step D; otherwise, execute step E;
[0047] Step D: The security module judges the number of authentications to the encryption module, if the number of times does not rea...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com