Data protection method and system

A data protection and data technology, applied in the direction of protecting storage content from loss, preventing unauthorized use of memory, etc., can solve problems such as illegal deletion of files, attacks, application software threats, etc., achieve a high level of security, prevent information loss, and prevent The effect of illegal theft

Inactive Publication Date: 2005-04-20
LENOVO (BEIJING) LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As security software and the operating system itself can also be attacked, all applications on the endpoint are compromised
Therefore, security software cannot guarantee the security of the terminal application software platform
Since the pure software has the possibility of being tracked and debugged by the memory, and the files stored on the hard disk are also in danger of being illegally deleted, these solutions are not safe, making it difficult to promote and use them on a large scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and system
  • Data protection method and system
  • Data protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Please refer to figure 1 As shown, the data protection system of the present invention realizes data protection based on the security chip 2 and the hardware token 3 located on the motherboard of the computer 1 .

[0026] Therefore, the data protection system of the present invention includes a computer 1, a security chip 2 and a hardware token 3 connected to the computer 1, which are respectively described below:

[0027] Computer 1 is used to establish data interaction between security chip 2 and hardware token 3. When encrypting, send the data to be encrypted to security chip 2, and send the encrypted message key and encrypted data to hardware token 3 for storage ; Send the encrypted message key and encrypted data to the security chip 2 for decryption during decryption. The operating system 10 in the computer 1 is provided with a security service module (TSS, Trusted Software Stack) 12 and an intermediate service module 13 for data interaction with the security chip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a data protection method and a protection system. The method includes a cipher flow and a decipher flow, in which, the cipher flow includes the following steps: a safety chip generates a report cryptographic key and ciphers it to store it in hardware token. The data is ciphered with the report cryptographic key to be stored in the hardware token. The deciphering flow includes the following steps: The safety chip gets the ciphered report cryptographic key from the token and deciphers it to get the report key, the safety chip gets ciphered data from a hardware token and deciphers the data with the report cryptographic key. The data protection system includes a safety chip, a hardware token and a computer.

Description

technical field [0001] The invention relates to the technical field of computer information security, and mainly relates to a data protection method and a protection system for a personal computer to realize encryption and protection of static data. Background technique [0002] Data encryption is an important way to protect computer data protection, but the data protection schemes used on common personal computers completely rely on software implementation on the one hand, and encrypted files are stored on the hard disk on the other hand. The use of security software, such as: using anti-virus software to prevent virus attacks, using file encryption software to protect files, using secure browser software and digital certificates for e-commerce, etc. Since security software and the operating system itself may also be attacked, all application software on the terminal is threatened. Therefore, security software cannot guarantee the security of the terminal application softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F12/16
Inventor 李亚辉李明柱王晚丁王一平
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products