Local data security protection system and method

A technology of local data and data, applied in the field of information security, can solve problems such as data theft

Active Publication Date: 2015-12-02
BEIJING CHERILEAD TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With people's daily life, electronic data such as private information and important documents are mostly stored in the form of data on computer hard drives, and these data are easily stolen by hackers by implanting Trojan horse software into computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Local data security protection system and method
  • Local data security protection system and method
  • Local data security protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0072] Such as figure 1 As shown, according to an aspect of the present invention described in an embodiment of the present invention, a method for securely storing local data is provided, and the method for securely storing local data includes the following steps:

[0073] Write the pre-set file attribute information and filling information of the data file to be protected into the pre-set false file of the computer encrypted disk;

[0074] Call the preset mobile encryption disk to randomly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a local data security protection system and method. The method comprises writing file attribute information and filling information of a to-be-protected file into a virtual file of a computer private disk; using a mobile private disk to randomly generate a data encryption key and a crushing secret key, and encrypting the data encryption key and the crushing secret key by using an encryption public key stored in a USBKey, thus to obtain a data encryption key ciphertext and a crushing secret key ciphertext; calling a password of the mobile private disk to encrypt the to-be-protected data file, crushing and blocking ciphertext data according to a crushing fraction n, thus to obtain n fragmented files, and calculating HASH values for each fragmented file; reading storage proportions of the computer private disk and the mobile private disk in a configuration file, and grouping according to the storage proportions; storing related information of the protected data file into data items of a file key information sheet and a fragment index information sheet of an indexical database; and storing the grouped fragmented files into the pre-set computer private disk and mobile private disk.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a local data security protection system and method. Background technique [0002] Along with people's daily life, most of the electronic data such as personal data and important files are stored on the hard disk of the computer in the form of data, and these data are easily stolen by hackers by implanting Trojan horse software into the computer. In recent years, a large number of personal data leakage incidents have occurred at home and abroad, and personal data information security has become a hot topic today. [0003] In the existing electronic document transparent encryption and decryption system, the common method is to perform transparent encryption and decryption based on file redirection. Although a series of protection measures have been taken for the file, the encrypted file that saves the file data is always deleted from the file creation to the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/62G06F21/64
Inventor 肖龙旭张凯丁凯刘婷
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products