Data protection method and system based on computer intelligent algorithm

A data protection and intelligent algorithm technology, applied in digital data protection, computer security devices, computing, etc., can solve problems such as threats to personal privacy or business secrets, illegal operations, cumbersome operation processes, etc., to achieve real-time protection of data security and avoid theft Take and tamper, the effect of simple operation process

Pending Publication Date: 2021-11-19
袭荣才
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] After retrieval, Chinese Patent No. CN106096433A discloses a user data protection method for a secure computer. This invention realizes the security protection of computer data by setting corresponding file access permissions for each application program set. Although this invention has certain feasibility, However, the actual operation process is cumbersome, and the usability is low. If the computer operator has browsed a bad website or clicked on a link or file with a virus, it will make the criminals bypass the computer operator to perform illegal operations; With continuous development, the subsequent information security issues have attracted more and more attention. As the carrier of information, computers play an increasingly important role in our work and life. More and more enterprises and businesses Government agencies and individuals use computers to obtain information and process information, and at the same time store their most important information in the form of data files in the computer. Due to the great influence of the operator's subjective consciousness during the operation process, there are some dangerous behaviors, and because most computing operators lack professional computer security knowledge, it is easy to cause computer data leakage or tampering; in addition, if computing operators browse Going through a bad website or clicking on a link or file with a virus will give criminals an opportunity to bypass computer operators to conduct illegal operations, steal or tamper with important files or data stored in the computer; Immeasurable losses, a serious threat to personal privacy or business secrets; therefore, it is particularly important to invent data protection methods and systems based on computer intelligent algorithms;
[0003] Most of the existing computer data protection methods realize the security protection of computer data by setting corresponding file access permissions for each application program set. Although this type of method is feasible, the actual operation process is cumbersome and the usability is low. If computer operators have browsed bad websites or clicked on links or files with viruses, criminals will bypass computer operators to conduct illegal operations, seriously threatening personal privacy or business secrets; for this reason, we propose Algorithmic data protection method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and system based on computer intelligent algorithm
  • Data protection method and system based on computer intelligent algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] refer to figure 1 , the present embodiment discloses a data protection method based on a computer intelligent algorithm, and the specific steps of the data protection method are as follows:

[0051] First: data encryption, which encrypts the uploaded computer data through the data encryption method, obtains the encrypted computer data, and stores it in the computer for preservation;

[0052]Specifically, the data encryption method is implemented based on the joint use of symmetric encryption algorithms and asymmetric encryption algorithms. It performs symmetric encryption on the uploaded computer data through the DES algorithm and a private key to form symmetric encrypted data, and then passes the ECC algorithm and Combined with the public key for asymmetric encryption to obtain encrypted computer data.

[0053] Then: security authentication and monitoring, perform security login authentication on the user through the security authentication method, if the user authent...

Embodiment 2

[0064] refer to figure 2 , the present embodiment discloses a data protection system based on computer intelligent algorithms, including a data upload module, a data encryption module, a computer storage module, a security authentication module, a processing interface module, a security monitoring subsystem and a backup database;

[0065] The data upload module is used for computer owners to upload computer data to be stored; the data encryption module is used for encrypting computer data to generate encrypted computer data; the computer storage module is used for storing encrypted computer data;

[0066] The security authentication module is used to perform security login authentication on the user through the security authentication method;

[0067] The processing interface module is specifically a computing operation interface, which includes a computer log unit for recording user and computer background behaviors in real time;

[0068] The safety monitoring subsystem inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data protection method based on a computer intelligent algorithm, and belongs to the technical field of computer data security. The data protection method comprises the following specific steps: (1) data encryption; (2) security authentication and monitoring; (3) behavior monitoring and recognition; (4) danger level judgment; (5) alarm feedback and danger processing. Computer data is protected by adopting encryption and security authentication technologies, a computer log process is detected in real time through a security monitoring subsystem, meanwhile, recognition and judgment are performed through an intelligent learning algorithm, the actual operation process is simple, and the usability is high; even if a computing operator browses a bad website or clicks a link or a file with viruses and lawbreakers bypass the computing operator to carry out illegal operations, the system can also carry out operations such as self-recognition, alarm and behavior prohibition in real time, so that the data security is protected in real time, and therefore, the computing data can be prevented from being stolen and tampered.

Description

technical field [0001] The invention relates to the technical field of computer data security, in particular to a data protection method and system based on computer intelligent algorithms. Background technique [0002] After retrieval, Chinese Patent No. CN106096433A discloses a user data protection method for a secure computer. This invention realizes the security protection of computer data by setting corresponding file access permissions for each application program set. Although this invention has certain feasibility, However, the actual operation process is cumbersome, and the usability is low. If the computer operator has browsed a bad website or clicked on a link or file with a virus, it will make the criminals bypass the computer operator to perform illegal operations; With continuous development, the subsequent information security issues have attracted more and more attention. As the carrier of information, computers play an increasingly important role in our work...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/60
CPCG06F21/566G06F21/602
Inventor 袭荣才
Owner 袭荣才
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products