System encryption-based data protection method and device

An encryption and decryption, operating system technology, applied in the field of data protection methods and devices based on system encryption, can solve problems such as poor security

Inactive Publication Date: 2017-08-25
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a data protection method and device based on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System encryption-based data protection method and device
  • System encryption-based data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0036] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0037] In order to solve the problem of poor security in the data protection method in the prior art, the embodiment of the application provides a data protection method based on s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system encryption-based data protection method and device, and aims at solving the problem that data protection method in the prior art is relatively bad in safety. The method comprises the following steps of: receiving an access password input by a user; judging whether the access password corresponds to a first operation system or not; if the access password does not correspond to the first operation system, judging whether terminal equipment is connected with preset hardware authentication equipment or not; if the terminal equipment is connected with the preset hardware authentication equipment, carrying out identity authentication on the preset hardware authentication equipment according to authentication information; if the authentication passes, decrypting a disk driving file corresponding to an encrypted hidden virtual disk space in the terminal equipment according to file encryption/decryption information, so as to obtain the encrypted hidden virtual disk space; and decrypting the encrypted hidden virtual disk space according to the file encryption information, and logging in a second operation system, wherein the second operation system is installed in the encrypted hidden virtual disk space, and local data needing protection is stored in the second operation system.

Description

technical field [0001] The present application relates to the field of information security, in particular to a data protection method and device based on system encryption. Background technique [0002] With the advent of the information age, data security issues have received more and more attention. [0003] In practical applications, users generally encrypt local data to protect local data and prevent local data from being stolen by others, such as providing password authentication to protect data in compressed packages through compression tool software, or using encryption software to encrypt encryption protection, etc. [0004] However, the above-mentioned data protection methods are less secure. For example, when criminals invade the terminal equipment where the local data is located, the criminals may use decryption software to track and decompile the encrypted data, and the encrypted data may be deciphered, or After criminals invade the terminal device where the l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/44
CPCG06F21/6209G06F21/44G06F2221/2107
Inventor 阚志刚陈彪方宁卢佐华彭建芬
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products