Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection method of for secure computers

A secure computer and data protection technology, applied to the usage of multiple keys/algorithms, secure communication devices, and key distribution, can solve problems such as software data security cannot be guaranteed, and achieve the effect of ensuring security

Inactive Publication Date: 2016-12-07
郑州财经学院
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the computer, even if the data is encrypted and stored using the set encryption algorithm, when the computer performs calculations on the stored encrypted data, it also needs to use the decryption algorithm corresponding to the encryption algorithm, and then decrypt the stored encrypted data. Therefore, in the process of computer processing, there will be plaintext data, so the security of software data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] The embodiment of the present invention provides a data protection method for a secure computer, which establishes a secure storage space, and controls the access authority of the secure storage space through biometric data and a specific encryption algorithm; the specific encryption algorithm is encrypted through the following steps :

[0022] S1. From the stored multiple non-binary source operands, each source operand selects a digit in turn, and uses a random operation instruction to perform current bit operations on the selected digits until the digits of the multiple source operands All are selected respectively, and the destination...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data protection method for secure computers. A designed encryption algorithm is used for carrying out encryption through the following steps of: in a plurality of stored non-binary source operands, selecting a number by each source operand in sequence, and carrying out current bit operation on the selected numbers by adopting a random operation instruction until all the numbers of the plurality of source operands are selected to obtain a target operand; selecting a specific plaintext segment from each input biological characteristic by using an extraction operation rule in a private key, and carrying out encryption operation on the obtained specific plaintext segment and the obtained target operand through randomly selecting an encryption algorithm so as to obtain a specific ciphertext segment; and extracting a specific random number by taking the specific ciphertext segment as a specific private key, carrying out operation by using the specific random number so as to generate a redundant segment, and carrying out encryption operation on the specific ciphertext segment, the rest plaintext segment and the redundant segment through randomly selecting an encryption algorithm so as to obtain a final ciphertext.

Description

technical field [0001] The invention relates to computer data processing technology, in particular to a data protection method for a safe computer. Background technique [0002] In the computer software protection technology, unless a special encryption algorithm is used, the plaintext data of the software will inevitably appear in the computer memory and registers. In the computer, even if the data is encrypted and stored using the set encryption algorithm, when the computer performs calculations on the stored encrypted data, it also needs to use the decryption algorithm corresponding to the encryption algorithm, and then decrypt the stored encrypted data. Therefore, in the process of computer processing, plaintext data will appear, so the security of software data cannot be guaranteed. [0003] Usually, software crackers can analyze the encryption algorithm by tracking and comparing the plaintext data that appears during computer processing, and decrypt the stored encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08H04L9/06
CPCH04L9/0656H04L9/0866H04L9/14
Inventor 尹新富袁雪霞赵建超孙育刘卫兵王水萍张帆马孝贺
Owner 郑州财经学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products