Supercharge Your Innovation With Domain-Expert AI Agents!

Data encryption storage method

A data encryption and data storage technology, which is applied in electronic digital data processing, digital data processing components, preventing unauthorized use of memory, etc., and can solve problems such as user loss, low ease of use, and easy loss of authentication hardware. , to achieve the effect of improving uniqueness, solving easy loss, and improving security

Inactive Publication Date: 2008-10-22
LENOVO (BEIJING) LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this existing technology also has defects, that is, the corresponding identity verification hardware is easy to lose, and users who use hardware as identity verification must carry the hardware with them, which is troublesome and not easy to use
[0005] Moreover, the above two methods have a common defect, that is, since the data is stored in the ordinary storage space, once the system crashes, the data files may not be recovered, thus causing irreparable losses to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption storage method
  • Data encryption storage method
  • Data encryption storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] see figure 1 , is a flowchart of the data encryption storage method of the present invention.

[0038] Step S110, acquiring biometric information of the user.

[0039] Step S120, receiving a request from a user to create a data storage safe.

[0040] Step S130, generating user identity verification information based on the aforementioned biometric information.

[0041] Step S140, creating an HPA in the storage unit as a space for creating a data safe.

[0042] Wherein, the HPA (Host Protected Area, hard disk host protected area) is created on the hard disk, and the HPA is an open standard.

[0043] Step S150, receiving the user's request to access the safe, collecting the user's biometric information for identity verification; if the verification is passed, proceed to step S160; otherwise, proceed to step S170, denying the user's access to the safe.

[0044] Step S160, receiving the user's operation information on the safe and the data stored in the safe, and perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for enciphering and storing data includes receiving request to set up data storage proof box from user, generating user status verification information based on user biological character information, setting up HPA on storage unit and using it as space to set up said proof box as well as storing user status verification information in proof box by enciphering mode, receiving request to make access on proof box from user and collecting user biological character information as well as carrying out status verification, receiving and processing operation information from user on data stored in proof box if verification is passed or otherwise refusing access request from user on proof box.

Description

technical field [0001] The invention relates to electronic data storage technology, in particular to a data encryption storage method applied to an electronic data processing system. Background technique [0002] With the development of information technology, various electronic data processing systems, including computers and servers, are widely used, and people are exposed to and processed more and more data on a daily basis. At the same time, data security has gradually become a subject of concern. [0003] In the prior art, there are many methods for encrypting and storing data. For example, the user uses personally selected numbers, letters, letters or other symbols or a combination thereof as a password to protect the file. When the user needs to open the file, the user needs to submit the password to the system for identity verification. If the verification passes, then Allow the user to open the file, otherwise prohibit the user from operating the file. However, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F12/14
Inventor 孟智明
Owner LENOVO (BEIJING) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More