Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting data realized by microprocessor

A microprocessor and data protection technology, applied in digital data protection, electrical digital data processing, internal/peripheral computer component protection, etc., can solve problems such as encrypted data security threats, and achieve the effect of not easy to trace

Pending Publication Date: 2021-09-28
北京卫达信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The bearer needs to be careful when handling the private key as there may be attempts to attack the private key, thus posing a security threat to the encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting data realized by microprocessor
  • Method and system for protecting data realized by microprocessor
  • Method and system for protecting data realized by microprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] figure 1 Illustrated is a network environment 100 implementing a data security system 102 in accordance with an embodiment of the inventive subject matter. In network environment 100 , data security system 102 is connected to network 104 . In addition, a server 106 and one or more communication devices 108 - 1 , 108 - 2 , . In one example, data security system 102 may be implemented as a mainframe computer, workstation, personal computer, multi-processor system, laptop computer, network computer, minicomputer, server, or the like. Additionally, the data security system 102 may include multiple servers to perform mirroring tasks for users to alleviate congestion or minimize traffic. Additionally, data security system 102 may be connected to communication device 108 via network 104 . Examples of client devices 108 include, but are not limited to, personal computers, smartphones, PDAs, and laptop computers. The communication link between the communication device 108 an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method implemented by a microprocessor for securing data, receiving an authentication string from a user as input for authenticating the user to access an application; obtaining the data from the user during authentication for protecting the data, wherein the protection comprises encrypting the data, encrypting to generate encrypted data and a private key; associating the authentication string with the private key to generate a first safety key; storing the encrypted data in a data file, wherein the first safety key is stored in the data file together with the encrypted data; and transmitting, by the microprocessor, the data file to an application server associated with the application for encrypting the data file, the encryption of the data file generating a second safety key.

Description

technical field [0001] The invention relates to a data security method and system. Background technique [0002] In today's digital world, large amounts of data are generated, stored and transmitted on communication networks every day. Data can include confidential information such as credit card numbers, contact numbers, financial details, personal information, commercial information, and technical information. Therefore, various data security methods are used to reduce the possibility of unauthorized data access and use. Encryption or cryptography is one such method that helps to protect data stored in a system or in transit. The use of encryption enables the transformation of data, such as plaintext, in a form called ciphertext, which cannot be easily read by unauthorized users. When needed, the ciphertext can be converted to the original plaintext by decryption. [0003] Typically, encryption is achieved through the use of cryptographic algorithms, which are essentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/72G06F21/60
CPCG06F21/72G06F21/602
Inventor 张长河
Owner 北京卫达信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products