Unlock instant, AI-driven research and patent intelligence for your innovation.

User data protection method for safety computer

A technology for securing computers and user data, applied in the field of information security, it can solve the problem that instructions are easily intercepted by hacker software, and achieve the effect of ensuring security

Active Publication Date: 2011-06-29
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a user data protection method for a secure computer, which aims to solve the problem that the instructions used to access the secure storage space and call the user data information in the prior art are easily intercepted by hacker software, thereby controlling the security of the computer. Storage space, the problem of obtaining user data information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data protection method for safety computer
  • User data protection method for safety computer
  • User data protection method for safety computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0022] The present invention effectively avoids the interception of hacker interception software by encrypting and decrypting the important data information of the user in the transmitted instruction and the hard disk safe storage space for many times, and issuing a trusted authorization certificate between the instruction sender and the receiver for legality authentication. The instructions sent to ensure the security of important user data.

[0023] FIG. 1 shows an implementation process of a method for protecting important user data information of a secure computer provided by an embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the field of information security, and provides a user data protection method for a secure computer. The method comprises the following steps: establishing a secure storage space, and controlling the access right of the secure storage space; and enciphering instructions related to the secure storage space, and performing certification processing and decipherment on the instructions on the receiving end of the instruments. The method effectively prevents hacker interception software from intercepting transmitted instructions by enciphering and deciphering user data information of the secure storage space and the transmitted instructions for various times and performing validity certification by issuing credible authorization certificates between a transmittingpart and a receiving part of the instructions, so as to guarantee the security of the user data information.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a user data protection method for a secure computer. Background technique [0002] At present, with the continuous development of computer technology, the accompanying information security issues have attracted more and more widespread attention. As a carrier of information, computers face a variety of information security problems. For example, there are information security threats from network hacking, virus intrusion, denial of service, etc.; there are also computer management vulnerabilities and computer access control. Information loss caused by insufficient strength; and security risks caused by the management of storage devices for high-confidential information. [0003] With the maturity of trusted computing technology, the popularization of high-strength biometric technology, the connection of underlying hardware devices, the continuous improvement of Un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/24G06F21/60
Inventor 贾兵林诗达石明张拥军姚文泽宋靖
Owner CHINA GREATWALL TECH GRP CO LTD