Data security protection method of computer
A data security and computer technology, applied in computer security devices, digital data protection, computing, etc., can solve problems such as information being easily stolen and deciphered by hackers, storage space without permission settings, etc., to achieve the effect of convenient use and security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0018] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.
[0019] A computer data security protection method, the specific steps are as follows:
[0020] (1) Establish a safe storage space for storing user data, and control the access authority of the safe storage space; the safe storage space is a protected partition isolated from the rest of the hard disk, and adopts the method of sector-level read-write interception Combined with the USB-KEY of the USB dongle or software identity authentication to realize the encryption of data in the safe storage space;
[0021] (2) Set encrypted partition and non-encrypted partition in the safe storage space. When setting the unencrypted partition as encrypted partition, the encryption core CORE will read the unencrypted data DATA on the hard disk, and encrypt it according to the universal serial bus. The ID code in the USB-KEY is encrypted to generate encrypted data...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com