Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for encrypting and decrypting computer, computer, server and mobile device

A technology of computer systems and mobile devices, applied in the field of data encryption and decryption, can solve the problems of easy passwords to be conquered, forgotten passwords, and inconvenient to use, and achieve the effect of avoiding copying, improving security, and ensuring security.

Active Publication Date: 2021-04-16
四川微巨芯科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many disadvantages in the above-mentioned encryption measures: the way of setting a password to log in requires the user to keep the password in mind, and there are many softwares for cracking the password at present, and the password is easy to be overcome; the use of a hardware electronic key requires the user to carry the key with him, which is inconvenient to use. Easy to lose; specific file data encryption has the risk of forgetting the password and not encrypting the file in time
The above-mentioned deficiencies have all brought a lot of inconvenience to individual users and enterprise users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for encrypting and decrypting computer, computer, server and mobile device
  • Method and system for encrypting and decrypting computer, computer, server and mobile device
  • Method and system for encrypting and decrypting computer, computer, server and mobile device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be described in detail below. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in the present application, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0049] This embodiment provides a method for encrypting and decrypting a computer, which can be applied to an encryption and decryption computer system. The encryption and decryption computer system can include a computer, a mobile device, and a server. The device is connected wirelessly, and the mobile device communicates with the server.

[0050] Wherein, the server may be a cloud server. The following embodiments all take the cloud server as an example for i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for encrypting and decrypting a computer, the computer, a server and mobile equipment. The method for encrypting and decrypting the computer comprises the following steps: receiving an encryption request sent by the mobile equipment; sending the identity information of the computer system to the mobile device; receiving the identity information of the mobile device and the identity information of the server sent by the mobile device; receiving an encryption and decryption instruction sent by the server through the mobile device; responding to the encryption instruction and storing a decryption key to complete encryption; or receiving a decryption request sent by the mobile device; verifying the identity information of the mobile device; if the mobile device is legal, sending identity information of the computer system to the mobile device; detecting whether the decryption key and the identity information of the server are received or not, if the decryption key and the identity information of the server are received and the server is legal, performing corresponding decryption operation on the encryption partition of the hard disk by utilizing the decryption key. The data security of a computer system can be effectively ensured, a user does not need to provide a key, and the security is higher.

Description

technical field [0001] The present application relates to the technical field of data encryption and decryption, and in particular to a method and system for encrypting and decrypting a computer, a computer, a server, and a mobile device. Background technique [0002] With the aggravation of the concept of personal privacy and the need to protect commercial secrets, both individual users and enterprise users have consciously implemented encryption measures for the data stored in the computer. [0003] In related technologies, existing encryption measures may include: setting an operating system login password, setting a BIOS login password, encrypting specific file data, and encrypting hardware electronic keys. However, there are many disadvantages in the above-mentioned encryption measures: the way of setting a password to log in requires the user to keep the password in mind, and there are many softwares for cracking the password at present, and the password is easy to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/30G06F21/31G06F21/78
Inventor 黄尉易小洪朱琳琳
Owner 四川微巨芯科技有限公司