User data protection method for safety computer

A technology for securing computers and user data, applied in the field of information security, it can solve the problem that instructions are easily intercepted by hacker software, and achieve the effect of ensuring security

Active Publication Date: 2009-06-10
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a user data protection method for a secure computer, which aims to solve the problem that the instructions used to access the secure st...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data protection method for safety computer
  • User data protection method for safety computer
  • User data protection method for safety computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0021] The invention encrypts and decrypts the sent instructions and the important user data information in the safe storage space of the hard disk multiple times, and authenticates the legality by issuing a trusted authorization certificate between the sender and the recipient of the instruction, effectively avoiding hackers from intercepting software interception. The instructions sent to ensure the safety of the user’s important data and information.

[0022] figure 1 The implementation process of the method for protecting important user data information of a secure computer provided by an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of information security, and provides a user data protection method for a secure computer. The method comprises the following steps: establishing a secure storage space, and controlling the access right of the secure storage space; and enciphering instructions related to the secure storage space, and performing certification processing and decipherment on the instructions on the receiving end of the instruments. The method effectively prevents hacker interception software from intercepting transmitted instructions by enciphering and deciphering user data information of the secure storage space and the transmitted instructions for various times and performing validity certification by issuing credible authorization certificates between a transmitting part and a receiving part of the instructions, so as to guarantee the security of the user data information.

Description

Technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for protecting user data of a secure computer. Background technique [0002] At present, with the continuous development of computer technology, the ensuing information security issues have attracted more and more attention. As the carrier of information, computers face various information security issues. For example, hacker attacks, virus intrusions, denial of service, etc. from the network bring information security threats; there are also vulnerabilities in computer management and computer access control. Information loss caused by insufficient strength; and security risks caused by the management of storage devices for high-confidential information. [0003] With the maturity of trusted computing technology, the popularization of high-strength biometric technology, the connection of underlying hardware devices, the continuous improvement of Unified Extensi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F12/14G06F21/60
Inventor 贾兵林诗达石明张拥军姚文泽宋靖
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products