Unlock instant, AI-driven research and patent intelligence for your innovation.

An encryption system for computer information

An encryption system and computer technology, applied in the field of computer information, can solve problems such as low security, imperfect computer architecture, and difficulty in meeting computer security requirements for password identification methods, and achieve the effect of improving security.

Inactive Publication Date: 2019-02-19
WENZHOU POLYTECHNIC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing computer architecture is not perfect, which has caused information security loopholes
At present, the file encryption technology of PC is usually completed through the participation of software and operating system, that is, after the encryption software in the PC encrypts the file with software or encryption card, it is stored in the permanent storage medium through the operating system (software). (such as a hard disk), this encryption method is not very secure, and a hacker program that is easily hidden in the system can compare the files before and after encryption, obtain the key, and decrypt all files
[0004] In order to improve the security of computer information, the prior art provides a password identification method to identify the computer user's identity, but the password identification method is difficult to meet the security requirements of the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption system for computer information
  • An encryption system for computer information
  • An encryption system for computer information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0019] refer to Figure 1-3 , an encryption system for computer information, comprising a computer host and a plurality of mobile encryption and decryption terminals, the number of the mobile encryption and decryption terminals is at least two, the computer host is provided with computer general components, and the plurality of mobile encryption and decryption terminals The encryption and decryption terminal is connected to the host computer through a wireless network, and an encrypted hard disk is also provided in the host computer, and a central processing unit, a memory electrically connected to the central processing unit, and a secret key pre-storage module are a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer information technology, in particular an encryption system for computer information, which includes a computer host and a plurality of mobile encryption / decryption terminals; A computer host is provided with a common compute unit, A plurality of mobile encryption / decryption terminals are connected with a computer host through a wireless network, The computing host is also provided with an encrypted hard disk, and the encrypted hard disk is provided with a central processing unit and a memory electrically connected with the central processing unit,a secret key pre-storage module, a secret key generation module and an encryption / decryption module. The central processing unit in the encrypted hard disk and the microprocessor in the mobile encryption / decryption terminal are electrically connected with an electronic tag chip respectively. The invention encrypts and protects the encrypted hard disk of the computer through a plurality of mobileencryption / decryption terminals, utilizes the cipher uniqueness of the electronic tag chip, improves the encryption security, decrypts the encrypted hard disk through the fingerprint distinction, protects the encrypted hard disk in multiple directions and layers, and effectively passes the security of the important information of the computer.

Description

technical field [0001] The invention relates to the technical field of computer information, in particular to an encryption system for computer information. Background technique [0002] With the rapid development of computer technology, computers have become an indispensable tool in people's work, study and life. Computer networks also allow people to communicate anytime and anywhere, especially the information sharing that has emerged in recent years. It can be sent to any place you specify in the world in a very fast manner within a few seconds, and it can communicate with any place in the world. This information can be in various forms such as text, image, sound, etc. At the same time, users can get a lot of free news, special emails, and realize easy information search. [0003] The existing computer architecture is not perfect, which has caused a loophole in information security. At present, the file encryption technology of PC is usually completed through the partic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/60G06F21/79
CPCG06F21/32G06F21/602G06F21/79
Inventor 林天峰
Owner WENZHOU POLYTECHNIC