A Computer Data Protection System

A data protection and computer technology, applied in the direction of digital data protection, internal/peripheral computer component protection, computer security devices, etc., can solve the problem of low security of traditional data protection, and achieve the effect of improving security and ensuring security

Inactive Publication Date: 2019-01-04
XIAN AERONAUTICAL POLYTECHNIC INST
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a computer data protection system, which solves the problem of low security of traditional data protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below in combination with specific embodiments.

[0023] A computer data protection system of the present invention includes:

[0024] Set up a secure storage space in the server. The secure storage space is divided into several non-overlapping grid areas. Each grid area is given a unique logical number. Each grid area is mapped to a unique server computing node to realize the network address. Information digitization is used to store data, and there is an emergency data transmission channel between each two safe storage spaces for data transfer operations.

[0025] The man-machine operation module is used to pre-enter the biometric model and verify the access rights of the biometric model to control the secure storage space.

[0026] An encryption module is set in the safe storage space for data encryption, and a data conversion module is also set for decrypting the data stored in the safe storage space according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer data protection system, comprising a security storage space, which is used for storing data; a man-machine operation module, configured to pre-record and verify theaccess authority of the biometric model controlling the secure storage space; an encryption module for encrypting data; a data conversion module, configured to decrypt the data according to the biometric model input by the man-machine operation module; an operation state monitoring module, which is used for recording the operation state of the user, performing real-time evaluation on the operationstate of the current user, and obtaining a monitoring result; a data transfer module used for receiving the monitoring result obtained by the operation state monitoring module and judging whether tocarry out data transfer operation or not. The invention realizes the data encryption transmission, encryption storage and sharing within the authority, and the system has the safety monitoring function of the operation state, which greatly improves the safety of the data, greatly improves the storage of the structural grid and the physical quantity, localizes the accessing storage data, and further ensures the safety of the data.

Description

technical field [0001] The invention belongs to the technical field of computer data management, and in particular relates to a computer data protection system. Background technique [0002] With the continuous development of informatization, data security has become an important issue in today's society. At present, to protect data through hardware, you can use IC card or UKEY and other similar peripheral hardware methods to encrypt and protect data, but the protection method using peripheral hardware is like having an additional key, and you need a "key" every time you use it To decrypt, it is inconvenient to use. On the other hand, because the peripheral hardware cannot be bound to the host system, there are potential safety hazards of loss and theft. Losing the "key" may not only leak user data, but even make the user unable to use the encrypted data. [0003] Data protection through general software is to use pseudo-random numbers or user passwords as keys to encrypt ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/42G06F21/60G06F21/78
CPCG06F21/32G06F21/42G06F21/602G06F21/78G06F2221/2141
Inventor 李欣王玙先梦瑜刘婉莹吴春静
Owner XIAN AERONAUTICAL POLYTECHNIC INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products