Data security protection method of computer

A data security and computer technology, applied in computer security devices, digital data protection, computing, etc., can solve problems such as information being easily stolen and deciphered by hackers, storage space without permission settings, etc., to achieve the effect of convenient use and security.

Inactive Publication Date: 2016-07-27
LISHUI VOCATIONAL HIGH SCHOOL
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the management of the storage space of the important data information of the user, the following problems still exist in the existing technology: the storage space of the important data information of the user does not have permission, so that the information in this part of the space is easily stolen and deciphered by hackers, or, Even if certain permissions are set for the storage space, when accessing this secure storage space and calling important user data information in it, it is still done through normal instructions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.

[0019] A computer data security protection method, the specific steps are as follows:

[0020] (1) Establish a safe storage space for storing user data, and control the access authority of the safe storage space; the safe storage space is a protected partition isolated from the rest of the hard disk, and adopts the method of sector-level read-write interception Combined with the USB-KEY of the USB dongle or software identity authentication to realize the encryption of data in the safe storage space;

[0021] (2) Set encrypted partition and non-encrypted partition in the safe storage space. When setting the unencrypted partition as encrypted partition, the encryption core CORE will read the unencrypted data DATA on the hard disk, and encrypt it according to the universal serial bus. The ID code in the USB-KEY is encrypted to generate encrypted data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security protection method for a computer, which establishes a safe storage space for storing user data and controls the access authority of the safe storage space; the safe storage space is a protected partition isolated from other spaces on a hard disk , it is only allowed to be operated through the underlying unified extensible firmware interface UEFI; the method of sector-level read-write interception combined with the universal serial bus dongle USB‑KEY or software identity authentication is used to realize the encryption of hard disk data. The invention encrypts and decrypts the sent instructions and important user data information in the safe storage space of the hard disk multiple times, and issues a trusted authorization certificate between the sending and receiving parties of the instructions to perform legality authentication, effectively avoiding hacker interception software interception In addition, the present invention is easy to use and can control the reading and writing of data in the designated area, so that users can implement diversified protection schemes for different data according to their own needs.

Description

technical field [0001] The invention relates to the technical field of computer data protection, in particular to a computer data security protection method. Background technique [0002] At present, with the continuous development of computer technology, the accompanying information security issues have attracted more and more attention. As a carrier of information, computers face a variety of information security issues. For example, there are information security threats from network hacker attacks, virus intrusions, denial of service, etc.; there are also loopholes in computer management and computer use authority control. Information loss caused by insufficient strength; there are also potential safety hazards brought about by the management of storage devices for highly confidential information. [0003] With the maturity of trusted computing technology, the popularization of high-intensity biometric technology, the continuous improvement of connecting underlying hard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/33G06F21/34G06F21/56
CPCG06F21/34G06F21/33G06F21/566G06F21/602G06F21/604G06F2221/034G06F2221/2141
Inventor 王琴英
Owner LISHUI VOCATIONAL HIGH SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products