Method, device and equipment for protecting data

A technology for protecting data and equipment, applied in the computer field, can solve the problem of high cost and achieve the effect of low cost and high security

Active Publication Date: 2013-03-06
LENOVO (BEIJING) CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The current hardware encryption technology nee...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for protecting data
  • Method, device and equipment for protecting data
  • Method, device and equipment for protecting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0041] see figure 1 , which is a flow chart of a method for protecting data according to an embodiment of the present invention, the process is applied to a second device; the method specifically includes:

[0042] Step 101, when the first device and the second device are connected, the second device obtains the first identification and the second identification; wherein, the first identification is the unique identification of the first device, and the second iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and equipment for protecting data. The method is applied to second equipment, and specifically comprises the following steps that: in the case that first equipment is connected with the second equipment, the second equipment obtains a first identification and a second identification, wherein the first identification is the unique identification of the first equipment, and the second identification is the unique identification of the second equipment; and whether the first identification is matched with the second identification is judged, if the first identification is not matched with the second identification, then specified data in the first equipment and/or the second equipment are set to be in a protected state. Special hardware peripherals have no need to be added during an application for the method, the device and the equipment for protecting data disclosed by the invention, and the specified data in the first equipment and the second equipment are protected via hardware authentication according to the identifications (ID) of the equipment; and therefore, the method, the device and the equipment for protecting data are low in cost and high in safety.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and equipment for protecting data. Background technique [0002] At present, electronic devices, such as mobile phones, computers, and tablet computers (PADs), have been widely used. When two devices are connected, how to ensure the security of data in each device is a problem that must be considered. The current workaround is: [0003] 1. Protect the data in the two devices through a pure software method. [0004] This method has poor security performance and is easy to be cracked. [0005] 2. Protect the data in the two devices through hardware. [0006] The current hardware encryption technology needs to add special hardware peripherals; therefore, the cost is high. Contents of the invention [0007] Embodiments of the present invention provide a data protection method, device, and equipment, which realize data protection at low cost and high s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 董小平陈实徐练
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products