Data security method and system applied to server
A data security and server technology, applied in transmission systems, electrical components, etc., can solve data loss and other problems, achieve the effect of reducing storage space and reducing virus data intrusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] The data security system applied to the server provided by the preferred embodiment of the present invention includes a network inspection module, a data source identification module, a data disassembly module, a data packaging and encryption module, a data unpacking and decryption module, a server storage module, a server and a power supply system The power supply system is a network inspection module, an identity verification module, a user mobile phone verification module, a data source identification module, a data disassembly module, a data packaging and encryption module, a data unpacking and decryption module, a server storage module and a server power supply.
Embodiment 2
[0028] In this embodiment, on the basis of Embodiment 1, preferably, the network checking module includes checking the network type of the access network. If the access network is detected as an external network, then automatically enter the data source identification module, the data source verification module includes identity verification, and identity verification includes verification user identification, password and verification code; the verification code is passed by the user input The mobile phone number is sent to the server, the server receives the mobile phone number and sends the mobile phone number to the server storage module, detects whether the mobile phone number exists in the server memory module and feeds back the result to the server; if the mobile phone number exists in the server memory module, randomly generates a verification code feedback To the user’s mobile phone, the user enters the verification code to access the server; otherwise, if the mobile p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

