Computer encryption method and system

A computer and password technology, applied in the field of information security, can solve problems such as user passwords are easily destroyed, security systems are not particularly reliable, and user losses

Inactive Publication Date: 2017-12-22
中新国际电子有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing security system of Windows is not particularly reliable. The user password set by the user on the computer is easily destroyed, resulting in the disclosure of important information such as business secrets and personal privacy stored on the computer by the user, which will cause serious damage to the user. certain loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer encryption method and system
  • Computer encryption method and system
  • Computer encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0037] See figure 1 , figure 1 Shows the first flow chart of a computer encryption method provided by an embodiment of the present invention. The computer encryption method provided by an embodiment of the present invention may include:

[0038] S11: If the computer senses that the security device is inserted by the outside world, it will match the security device based on the security device's identification.

[0039] When the user inserts ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer encryption method and system. According to the method, a computer is matched with a confidentiality device based on identification of the confidentiality device if the confidentiality device inserted into the computer by the outside is sensed by the computer, passwords inputted by the outside are received by the computer if matching is successful, the received passwords are transmitted to the confidentiality device and verified by the confidentiality device, the confidentiality device informs the computer to verify the passed information if verification is passed, and the computer is unlocked under triggering of the information, so that the computer is used by the outside. By the aid of the technical scheme, the computer can be unlocked and used by the outside after the computer is successfully matched with the identification of the confidentiality device and the passwords inputted by the outer side on the computer is verified in the confidentiality device, encryption of the computer can be improved, and security of information in the computer is ensured.

Description

Technical field [0001] The present invention relates to the technical field of information confidentiality, and more specifically, to a computer encryption method and system. Background technique [0002] With the rapid development of information technology today, information confidentiality has become more and more important. [0003] At present, users generally save important information such as commercial secrets and personal privacy in the computer, and protect the security of this information by setting a user password on the computer. When the user needs to use the computer, enter the password on the computer. When the password of is consistent with the password preset on the computer, it indicates that the entered password is correct and the user can access the files saved on the computer. However, Window’s existing security system is not particularly reliable. The user password set by the user on the computer is easily destroyed, leading to the disclosure of important info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/34G06F21/45
CPCG06F21/31G06F21/34G06F21/45
Inventor 周舟张习俊
Owner 中新国际电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products