Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for improving data security

A security and data technology, applied in the field of data security, can solve problems such as insecure data storage, and achieve the effect of avoiding decryption, avoiding data leakage, and reducing the possibility of being monitored

Inactive Publication Date: 2017-04-19
鄢碧珠
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To this end, it is necessary to provide a method to improve data security and solve the problem of insecure data storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving data security
  • Method for improving data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0023] see Figure 1 to Figure 2 , this embodiment provides a method for improving data security, which is applied to mobile phone 205, server 207, computer 201 and mobile storage device 203, specifically, it can be applied to such as figure 2 The system 200 above. The mobile phone includes a radio frequency module of the mobile phone and a first near-field communication module, and the mobile phone can be connected to the base station through the radio frequency module of the mobile phone, so as to be able to surf the Internet and connect to the server. The mobile storage device includes a second near-field communication module and a fingerprint module. Specifically, the mobile storage device also includes a processing module and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving data security, applied to handsets, servers, computers and mobile storage equipment, wherein the handsets comprise handset radio frequency modules and first near field communication modules, and the mobile storage equipment comprises second ear field communication modules and fingerprint modules. The method comprises the following steps: the computer detects whether the mobile storage equipment is inserted into a USB interface, and judges whether fingerprint data is stored in the mobile storage equipment after insertion is detected; and if no fingerprint data is stored, a fingerprint and equipment password initialization step is executed, and a check step is executed after the initialization step is completed. Being distinguished with existing technologies, the technical scheme of the method provided by the invention can improve data storage security and is convenient for data storage.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method for improving data security. Background technique [0002] There are many ways of existing data storage, but all of them have the problem of information leakage. If a mobile storage device is used to directly store data on the mobile storage device, there will be a problem of loss of the storage device, which will cause information leakage. Or use the network storage method. The network storage needs to log in with the user name and password on the computer every time, so that the software or the camera can easily record the user name and password, causing the user name and password to be leaked, resulting in data leakage. That is, the existing data storage method is still very insecure. Contents of the invention [0003] Therefore, it is necessary to provide a method to improve data security and solve the problem of insecure data storage. [0004] In order to achieve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/31G06F21/32
CPCG06F21/31G06F21/32G06F21/604G06F21/6218G06F2221/2107
Inventor 鄢碧珠
Owner 鄢碧珠