Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security method and system applied to server

A data security and server technology, applied in transmission systems, electrical components, etc., can solve data loss and other problems, achieve the effect of reducing storage space and reducing virus data intrusion

Active Publication Date: 2019-07-05
河南管软信息技术有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Information security has always been a very important issue in network construction and maintenance. More than 60% of the companies in the world are worried about the security of servers, especially the security of cloud data. data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security method and system applied to server
  • Data security method and system applied to server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The data security system applied to the server provided by the preferred embodiment of the present invention includes a network inspection module, a data source identification module, a data disassembly module, a data packaging and encryption module, a data unpacking and decryption module, a server storage module, a server and a power supply system The power supply system is a network inspection module, an identity verification module, a user mobile phone verification module, a data source identification module, a data disassembly module, a data packaging and encryption module, a data unpacking and decryption module, a server storage module and a server power supply.

Embodiment 2

[0028] In this embodiment, on the basis of Embodiment 1, preferably, the network checking module includes checking the network type of the access network. If the access network is detected as an external network, then automatically enter the data source identification module, the data source verification module includes identity verification, and identity verification includes verification user identification, password and verification code; the verification code is passed by the user input The mobile phone number is sent to the server, the server receives the mobile phone number and sends the mobile phone number to the server storage module, detects whether the mobile phone number exists in the server memory module and feeds back the result to the server; if the mobile phone number exists in the server memory module, randomly generates a verification code feedback To the user’s mobile phone, the user enters the verification code to access the server; otherwise, if the mobile p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security method and system applied to a server, and belongs to the field of server data security systems. The system comprises a network inspection module, a data sourceidentification module, a data disassembly module, a data packing and encryption module, a data unpacking and decryption module, a server storage module, a server and a power supply system. The powersupply system supplies power to the network inspection module, the identity verification module, the user mobile phone verification module, the data source identification module, the data disassembling module, the data packaging and encryption module, the data unpackaging and decryption module, the server storage module and the server. The data source is sequentially split, packaged, encrypted andunpacked, the data is stored in the server storage module and is independently identified through the server, and the situation that external virus data enters the server, and consequently data crisis is caused is avoided.

Description

technical field [0001] The invention belongs to the field of server data security systems, and relates to a data security method and system applied to servers. Background technique [0002] With the rapid development of social economy and science and technology and the improvement of people's living standards, people are paying more and more attention to issues such as personal safety and property safety. Information security has always been a very important issue in network construction and maintenance. More than 60% of the companies in the world are worried about the security of servers, especially the security of cloud data. data loss. Therefore, security protection is required at each data access point of the server. Contents of the invention [0003] The purpose of the present invention is to provide a data security method and system applied to the server, which can effectively reduce the probability of external virus data sources invading the server through all asp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/083H04L63/0876H04L63/126
Inventor 赵新
Owner 河南管软信息技术有限公司