Data security access method and system thereof

A technology of data security and access method, applied in the field of access method and its system, can solve problems such as low price of information security equipment

Inactive Publication Date: 2018-01-09
周宏建
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the price of information security equipment is not low, ranging from hundreds of thousands to millions, and its cost is a heavy burden for ordinary small and medium-sized enterprises in Taiwan, China

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access method and system thereof
  • Data security access method and system thereof
  • Data security access method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0026] see figure 1 , The secure data access system of the present invention may be a desktop computer, a notebook computer, a tablet computer, or a smart phone. In an embodiment of the data security access system of the present invention, it includes a computer host 1 including a control unit 11, a transmission interface unit 12 and a master processing unit 13, and a slave processing unit electrically connected to the computer host 1. unit 2, and a storage unit 3.

[0027] Wherein, the control unit 11 is used for a user to execute or access the file program or data stored in the storage unit 3 through the host processing unit 13 . In this embodiment, the master processing unit 13 is implemented as a processor; and the control unit 11 can be a keyboard, a mouse or a touch panel, however, other types of current devices can also be used in practical a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data security access method and system thereof, comprising: when executing an authenticated program file stored in a trust zone of a storage unit, calculating the digital fingerprint value of the authenticated program file to generate a corresponding current Digital fingerprint; load an original digital fingerprint corresponding to the certified program file stored in the hidden area of ​​the storage unit in advance, and compare whether the current digital fingerprint matches the original digital fingerprint; if so, the certified program file for The file data stored in the trusted zone or the observed zone is accessed; if not, the access record related to the certified program file is traced from the trusted zone, and the related program file in the access record Move to observation area for storage for subsequent quarantine actions or recertification.

Description

technical field [0001] The invention relates to an access method and system thereof, in particular to a data security access method and system thereof. Background technique [0002] With the popularization of computer use and the vigorous development of the Internet, it has brought a rapid and huge impact on human beings, and has also changed the mode of human life. However, with the convenience of information comes the worrying information security issue; for the enterprise part, the enterprise company organization is deeply afraid that the personal data in the company's control will be leaked and cause high compensation or the company's core technology data will be leaked. The competitiveness of enterprises has declined, so they have adopted information security equipment to deal with it, such as: web application firewall (WAF), database monitoring and auditing (DAM), data leakage prevention (DLP), network behavior control and recording equipment, etc. However, the price ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/78
CPCG06F21/53G06F21/6218G06F21/64G06F21/85G06F21/52G06F21/60G06F2221/033
Inventor 周宏建
Owner 周宏建
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products