Unlock instant, AI-driven research and patent intelligence for your innovation.

Personal data protection system based on hardware cryptographic equipment

A technology of data protection and hardware encryption, which is applied in the field of information security and can solve problems such as troublesome and easy-to-lose data

Active Publication Date: 2021-10-01
中易通科技股份有限公司
View PDF13 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above method mainly relies on software to protect personal privacy data, or simply stores data in hardware devices, which is not only cumbersome to operate but also easy to lose data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal data protection system based on hardware cryptographic equipment
  • Personal data protection system based on hardware cryptographic equipment
  • Personal data protection system based on hardware cryptographic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention can be implemented in many different ways defined and covered by the claims.

[0024] Such as figure 1 It is a frame diagram of a personal data protection system based on a hardware cryptographic device. The personal data protection system is mainly composed of seven modules. It is divided into a communication module, a backup and recovery module, an authentication module, a key reset module, a data hiding module, a security password key binding module and a file saving module.

[0025] The communication module is mainly based on secure cryptographic equipment to realize end-to-end encrypted calls and instant messaging.

[0026] The backup and recovery module is mainly used for the backup and recovery of keys and data in smart terminals. The backup of keys includes cloud backup and local backup. Cloud backup mainly depends o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a personal data protection system based on hardware cryptographic equipment. The personal data protection system is mainly composed of a communication module, a backup and recovery module, an authentication module, a one-key reset module, a data hiding module, a binding module of a security password key and a file storage module. The personal data protection system disclosed by the invention has the beneficial effects that the personal data protection system provides a safer environment for encryption, decryption and verification processes such as files, conversation and authentication by utilizing an independent physical space provided by a security encryption chip.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a personal data protection system based on a hardware cryptographic device. Background technique [0002] At present, the data protection of personal privacy mainly depends on the software function of the mobile phone itself, mainly through setting permissions on the data, most of which adopt different levels of authorization to view personal private data, such as Huawei's hidden space, mobile phone application lock, etc., or Save personal data information directly to external hardware devices, however, hardware is easy to lose and the storage capacity is limited. [0003] The existing technology is generally based on the software and operating system of the smart terminal itself for data protection, but because the security software and operating system of the smart terminal itself may also be attacked, it is easy to cause data leakage. During the process, data inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M1/72403H04W12/03H04W12/06
CPCH04L63/0428H04L63/083H04L63/0869H04M1/72403H04W12/03H04W12/068H04L63/0442H04L63/0435H04L63/0807H04W12/06
Inventor 刘俊
Owner 中易通科技股份有限公司