CN109460648A - A kind of computer data defence method - Google Patents
A kind of computer data defence method Download PDFInfo
- Publication number
- CN109460648A CN109460648A CN201811344548.2A CN201811344548A CN109460648A CN 109460648 A CN109460648 A CN 109460648A CN 201811344548 A CN201811344548 A CN 201811344548A CN 109460648 A CN109460648 A CN 109460648A
- Authority
- CN
- China
- Prior art keywords
- computer
- module
- information
- central processing
- processing unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of computer data defence methods, it needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, after matching result is correct, computer use can be normally opened, while communication module short message prompt mobile terminal normal use can be passed through;When two kinds of passwords have it is one or two kinds of all incorrect when; central processing unit can be to the chance that user re-enters three times; when chance three times is finished two kinds of passwords and can't match; central processing unit issues order by communication module short message prompt mobile terminal computer by non-normal use; original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when computer break down or it is captured and can not be with communication of mobile terminal when, for central processing unit by automatic startup information protective module, information and data on destroying computer realize information protection.
Description
Technical field
The present invention relates to computerized information protection technique field, specially a kind of computer data defence method.
Background technique
With the continuous development of computer technology, information security has become the focus of computer user's common concern.Especially
It is in the special industries such as business, military affairs, the protection of computerized information is especially important, enemy will not be left for by preferring to destroy.
The prior art provide it is a kind of identified by identity of the password personal identification method to computer user, sketch
As follows: in computer starting and after completing BIOS self-test, and after having read os starting file, output password inputs boundary
The startup password of user's input is verified, and after being proved to be successful, start-up operation so that user inputs startup password in face
System terminates computer starting process, to guarantee the safety of computer system when verifying unsuccessful.But password identity is known
Other method requires user to remember that preset startup password, too long startup password are not easy to user's memory, too short startup password
It is easy to be cracked, and the password personal identification method usually stores pre-set startup password in a hard disk, thus
It needs after having read os starting file, it can after accessing to hard disc of computer, be just able to achieve to user's body
The identification of part, therefore, simple password personal identification method is difficult to meet the security requirement of computer system, is easy to make to calculate
Machine information is stolen by criminal.
But still further aspect, cause when faulty operation occurring or errors validity occurs for password fingerprint input equipment
When computer is by error lock and destroying information, this necessarily causes the information of user to be lost, and causes damages to user.Moreover, if
When computer is unable to wirelessly communicate, it is unable to control the useful information of computer auto-destruct, this can not effective protection letter
Breath.For this reason, it may be necessary to provide a kind of computer data defence method, this method can safer protection information automatically, will not
The locking of mistake occurs, and even if locking, elimination error lock can also be carried out by other approach, also, even if needing
When wanting destroying information, information protection and transfer can also be carried out, to provide information security and stability.
Summary of the invention
Present invention solves the technical problem that being to overcome the computerized information of the prior art to protect unsafe defect, provide
A kind of computer data defence method.It is special that the computer data defence method there is double verification and information will not be stolen etc.
Point.
To achieve the above object, the invention provides the following technical scheme: a kind of computer data defence method, the computer
Including central processing unit and information protection module, the central processing unit is bi-directionally connected with information protection module, the centre
Managing device, electrically input connects keyboard PIN PAD and fingerprint collecting unit respectively, and the central processing unit is bi-directionally connected respectively to be deposited
Module one and memory module two are stored up, the central processing unit connects mobile terminal by communication module signal;Background server mould
Block, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can
To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould
Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every
From to prevent the storage information virus infection of background server module;
The method are as follows: need to input a string of universal codes and finger-print cipher when user needs to log in while verifying solution
Lock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, and after matching result is correct, can normally open meter
Calculation machine uses, while can pass through communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user
Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message
Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits
The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time
The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module
Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer
It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically
Unlock instruction is sent to carry out computer unlock;
Meanwhile original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when calculating
Machine break down or it is captured and can not be with communication of mobile terminal when, central processing unit is by automatic startup information protective module
Encryption information is carried out, and in encryption certain time, if communication connection is carried out with background server module, by the letter of preservation
Breath be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
Preferably, the fingerprint collecting unit includes fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module, institute
Fingerprint acquisition device electrically output connection fingerprint line processing module is stated, the fingerprint line processing module electrically know by output connection fingerprint
Other module.
Preferably, the storage module one is used to store the code data information of secured user's system, the memory module two
For storing the data information of custom system.
Preferably, electrically input connection video encoding module, the video encoding module are electrically defeated for the central processing unit
Enter and connect pattern process module, electrically input connects image collecting device to described image processing module.
Preferably, described image acquisition device is infrared camera.
Preferably, the background server module has temporary storage module, and it is locked to be used to temporarily store computer
When computer upload information and data.
Preferably, information that the verification link information and computer that the information security module sends computer upload and
Data is killed virus, and virus infection background server is prevented.
Preferably, the temporary storage module information of the background server module can only pass through physical connection mode on backstage
It is attached and reads.
Still further aspect, the application also provide a kind of information protection system for realizing computer data defence method, are used for
Realize computer data defence method above-mentioned, including the computer includes central processing unit and information protection module, it is described in
Central processor is bi-directionally connected with information protection module, the central processing unit respectively electrically input connection keyboard PIN PAD and
Fingerprint collecting unit, the central processing unit are bi-directionally connected memory module one and memory module two, the central processing unit respectively
Mobile terminal is connected by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can
To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould
Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every
From to prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verifying letters
Breath is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer use, simultaneously
Communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user
Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message
Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits
The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time
The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module
Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer
It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically
Unlock instruction is sent to carry out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will open automatically
Dynamic information protection module carries out encryption information, and in encryption certain time, if carrying out communication company with background server module
It connects, then carries out the information of preservation after being uploaded to background server module, immediately the information and data on destroying computer, it is real
Existing information protection.
Compared with prior art, the beneficial effects of the present invention are: need to input when user needs to log in a string it is general close
Code and finger-print cipher verify unlock simultaneously, and two kinds of verification informations are sent into memory module one by central processing unit and are matched, matching knot
After fruit is correct, computer use can be normally opened, while can normally make by communication module short message prompt mobile terminal
With improving security effectiveness;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user
Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message
For prompting mobile terminal computer by non-normal use, original person can start information protection module immediately by mobile terminal, pin
Ruin information;Alternatively, central processing unit will be certainly when computer breaks down or is captured and can not be with communication of mobile terminal
Dynamic to start information protection module, information and data on destroying computer realize information protection.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is invention's principle block diagram;
Fig. 2 is fingerprint collecting unit functional block diagram of the present invention;
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The present invention provides a kind of technical solution referring to FIG. 1-2: a kind of computer data defence method, it is characterised in that:
The computer includes central processing unit and information protection module, and the central processing unit is bi-directionally connected with information protection module, institute
Stating central processing unit, electrically input connection keyboard PIN PAD and fingerprint collecting unit, the fingerprint collecting unit include respectively
Fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module, the fingerprint acquisition device is electrically at output connection fingerprint line
Module is managed, electrically output connection fingerprint identification module, fingerprint acquisition device are mounted on computer sheet to the fingerprint line processing module
Body, record is had the finger of fingerprint to be put into fingerprint acquisition device by user when use, Fingerprint Processing Module to its fingerprint at
Reason allows it to be more clear to be sent to fingerprint identification module, and fingerprint identification module identifies fingerprint, during the data of identification pass through
Strength is sent out into memory module one at centre: electrically input connects video encoding module, the Video coding mould to the central processing unit
Electrically input connection pattern process module, described image processing module electrically input connection image collecting device, described image to block
Acquisition device is infrared camera, if destroying computer by the ready-made illegal login of people, image collecting device can be recorded as
It arrests convict and evidence is provided, the central processing unit is bi-directionally connected memory module one and memory module two, the storage module respectively
One for storing the code data information of secured user's system, and the memory module two is used to store the data letter of custom system
Breath, the central processing unit connect mobile terminal by communication module signal;It further include background server module, information security mould
Block;The background server module stores the check password of computer, for communicating to connect with computer, and can unlock
Computer realizes the use of computer, and checking command and unlock instruction can occurs in it;The information security module communication
It is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated, from
And prevent the storage information virus infection of background server module;
The method are as follows: need to input a string of universal codes and finger-print cipher when user needs to log in while verifying solution
Lock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, and after matching result is correct, can normally open meter
Calculation machine uses, while can pass through communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user
Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message
Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits
The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time
The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module
Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer
It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically
Unlock instruction is sent to carry out computer unlock;
Meanwhile original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when calculating
Machine break down or it is captured and can not be with communication of mobile terminal when, central processing unit is by automatic startup information protective module
Encryption information is carried out, and in encryption certain time, if communication connection is carried out with background server module, by the letter of preservation
Breath be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
In addition one side aspect, the application also provide a kind of information protection system for realizing computer data defence method, use
In realizing computer data defence method above-mentioned, including the computer includes central processing unit and information protection module, described
Central processing unit is bi-directionally connected with information protection module, and electrically input connects keyboard PIN PAD to the central processing unit respectively
And fingerprint collecting unit, the central processing unit are bi-directionally connected memory module one and memory module two, the central processing respectively
Device connects mobile terminal by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can
To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould
Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every
From to prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verifying letters
Breath is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer use, simultaneously
Communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user
Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message
Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits
The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time
The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module
Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer
It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically
Unlock instruction is sent to carry out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will open automatically
Dynamic information protection module carries out encryption information, and in encryption certain time, if carrying out communication company with background server module
It connects, then carries out the information of preservation after being uploaded to background server module, immediately the information and data on destroying computer, it is real
Existing information protection.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of computer data defence method, it is characterised in that: the computer includes central processing unit and information protection module,
The central processing unit is bi-directionally connected with information protection module, and electrically input connection keyboard password is defeated respectively for the central processing unit
Enter device and fingerprint collecting unit, the central processing unit is bi-directionally connected memory module one and memory module two, the center respectively
Processor connects mobile terminal by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for communicating to connect with computer, and can solve
The use that computer realizes computer is locked, and checking command and unlock instruction can occurs in it;The information security module is logical
Letter is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated,
To prevent the storage information virus infection of background server module;
The method are as follows: it needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two
Kind verification information is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer
It uses, while communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can be to the machine that user re-enters three times
Meeting, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message prompt
Mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, is stored in
The information of computer is all encrypted;Meanwhile user being reminded to need computer and background server mould at the appointed time
Block communication connection carries out background server verification, and otherwise the information for being stored in computer is uploaded to by computer by communication module
Background server storage, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer with after
When the connection of platform server is verified, original person is needed actively to agree to unlock in server, then background server sends solution automatically
Lock instruction carries out computer unlock;
Meanwhile original person can also start information protection module, destroying information immediately by mobile terminal;Alternatively, working as computer
Break down or it is captured and can not be with communication of mobile terminal when, central processing unit by automatic startup information protective module into
Row encryption information, and in encryption certain time, if communication connection is carried out with background server module, by the information of preservation
Be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
2. a kind of computer data defence method according to claim 1, it is characterised in that: the fingerprint collecting unit packet
Fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module are included, electrically output connects fingerprint line to the fingerprint acquisition device
Processing module, electrically output connects fingerprint identification module to the fingerprint line processing module.
3. a kind of computer data defence method according to claim 1, it is characterised in that: the storage module one is for depositing
The code data information of secured user's system is stored up, the memory module two is used to store the data information of custom system.
4. a kind of computer data defence method according to claim 1, it is characterised in that: the central processing unit is electrical
Input connection video encoding module, electrically input connection pattern process module, described image handle mould to the video encoding module
Electrically input connects image collecting device to block.
5. a kind of computer data defence method according to claim 4, it is characterised in that: described image acquisition device is
Infrared camera.
6. a kind of computer data defence method according to claim 1, it is characterised in that: the background server module
Have temporary storage module, is used to temporarily store the information and data that computer uploads when computer is locked.
7. a kind of computer data defence method according to claim 1, it is characterised in that: the information security module pair
The information and data that the verification link information and computer that computer is sent upload are killed virus, and virus infection background service is prevented
Device.
8. a kind of computer data defence method according to claim 6, it is characterised in that: the background server module
Temporary storage module information can only be attached and read by physical connection mode on backstage.
9. a kind of computer data defence method according to claim 6, it is characterised in that: the background server module
Can exist in the form of with single-chip microcontroller and USB flash disk combination.
10. a kind of information protection system for realizing computer data defence method, for realizing any one in such as claim 1-9
The computer data defence method of item, including the computer includes central processing unit and information protection module, the central processing
Device is bi-directionally connected with information protection module, and the central processing unit respectively electrically adopt by input connection keyboard PIN PAD and fingerprint
Collect unit, the central processing unit is bi-directionally connected memory module one and memory module two respectively, and the central processing unit passes through logical
It interrogates module by signal and connects mobile terminal;Background server module, information security module;
The background server module stores the check password of computer, for communicating to connect with computer, and can solve
The use that computer realizes computer is locked, and checking command and unlock instruction can occurs in it;The information security module is logical
Letter is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated,
To prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verification information quilts
Central processing unit is sent into memory module one and is matched, and after matching result is correct, can normally open computer use, while can lead to
Cross communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can be to the machine that user re-enters three times
Meeting, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message prompt
Mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, is stored in
The information of computer is all encrypted;Meanwhile user being reminded to need computer and background server mould at the appointed time
Block communication connection carries out background server verification, and otherwise the information for being stored in computer is uploaded to by computer by communication module
Background server storage, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer with after
When the connection of platform server is verified, original person is needed actively to agree to unlock in server, then background server sends solution automatically
Lock instruction carries out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will start letter automatically
It ceases protective module and carries out encryption information, and in encryption certain time, if carrying out communication connection with background server module,
The information of preservation is carried out after being uploaded to background server module, immediately the information and data on destroying computer, realizes letter
Breath protection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811344548.2A CN109460648B (en) | 2018-11-13 | 2018-11-13 | Computer data defense method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811344548.2A CN109460648B (en) | 2018-11-13 | 2018-11-13 | Computer data defense method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109460648A true CN109460648A (en) | 2019-03-12 |
CN109460648B CN109460648B (en) | 2021-06-22 |
Family
ID=65610188
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811344548.2A Expired - Fee Related CN109460648B (en) | 2018-11-13 | 2018-11-13 | Computer data defense method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109460648B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795773A (en) * | 2019-09-03 | 2020-02-14 | 淮阴师范学院 | Notebook computer one-key start-stop system with high security |
CN111414593A (en) * | 2020-03-17 | 2020-07-14 | 林家豪 | Computer information protection method based on mobile internet |
CN111737768A (en) * | 2019-09-02 | 2020-10-02 | 集美大学 | Computer encryption and decryption method |
CN112309522A (en) * | 2020-11-02 | 2021-02-02 | 陕西医链区块链集团有限公司 | Medical data tamper-proof system based on block chain technology |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
US20140337635A1 (en) * | 2013-05-13 | 2014-11-13 | Ira Konvalinka | Biometric verification with improved privacy and network performance in client-server networks |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
CN105808994A (en) * | 2016-04-04 | 2016-07-27 | 合肥博雷电子信息技术有限公司 | Computer software encryption protection device |
CN206021272U (en) * | 2016-08-04 | 2017-03-15 | 曾嵘娟 | A kind of computer encryption device |
US20170111168A1 (en) * | 2015-09-02 | 2017-04-20 | International Business Machines Corporation | Bluesalt security |
CN206147636U (en) * | 2016-10-17 | 2017-05-03 | 高辉 | Computer encryption device |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
CN107195039A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher |
CN108694313A (en) * | 2018-05-07 | 2018-10-23 | 襄阳市尚贤信息科技有限公司 | A kind of computer user's identification system |
-
2018
- 2018-11-13 CN CN201811344548.2A patent/CN109460648B/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
US20140337635A1 (en) * | 2013-05-13 | 2014-11-13 | Ira Konvalinka | Biometric verification with improved privacy and network performance in client-server networks |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
US20170111168A1 (en) * | 2015-09-02 | 2017-04-20 | International Business Machines Corporation | Bluesalt security |
CN105808994A (en) * | 2016-04-04 | 2016-07-27 | 合肥博雷电子信息技术有限公司 | Computer software encryption protection device |
CN206021272U (en) * | 2016-08-04 | 2017-03-15 | 曾嵘娟 | A kind of computer encryption device |
CN206147636U (en) * | 2016-10-17 | 2017-05-03 | 高辉 | Computer encryption device |
CN107195039A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
CN108694313A (en) * | 2018-05-07 | 2018-10-23 | 襄阳市尚贤信息科技有限公司 | A kind of computer user's identification system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111737768A (en) * | 2019-09-02 | 2020-10-02 | 集美大学 | Computer encryption and decryption method |
CN110795773A (en) * | 2019-09-03 | 2020-02-14 | 淮阴师范学院 | Notebook computer one-key start-stop system with high security |
CN111414593A (en) * | 2020-03-17 | 2020-07-14 | 林家豪 | Computer information protection method based on mobile internet |
CN112309522A (en) * | 2020-11-02 | 2021-02-02 | 陕西医链区块链集团有限公司 | Medical data tamper-proof system based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN109460648B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109460648A (en) | A kind of computer data defence method | |
US10957136B1 (en) | Information-based, biometric, asynchronous access control system | |
CN105530356B (en) | Mobile communication terminal and data protection method and device thereof | |
CN108694313A (en) | A kind of computer user's identification system | |
WO2018106432A1 (en) | Systems and methods for decentralized biometric enrollment | |
CN103646200B (en) | The coding encrypting of a kind of face information and application process | |
CN103580872A (en) | System and method for generating and managing secret key | |
CN106710032B (en) | Entrance guard opening method and device | |
US10990776B2 (en) | Methods and devices for biometric verification | |
CN109711126A (en) | A kind of computer information safe management system and method | |
CN104834853B (en) | A kind of personal identification method, device and information security type duplicator | |
CN105809005A (en) | Method for locking or unlocking computer screen based on fingerprints | |
CN106790243B (en) | A kind of password remapping method of safe U disc | |
CN114360114B (en) | User authority management method and system | |
CN106161442A (en) | A kind of system control user login method | |
BR102014022465A2 (en) | electronic payment system and method of use | |
CN110032851A (en) | A kind of login system being used to encrypt file polling platform based on recognition of face | |
CN105389497A (en) | Security verification method and system for operation interface of fingerprint recognition | |
US7272245B1 (en) | Method of biometric authentication | |
CN104735085A (en) | Terminal two-factor secure login protection method | |
KR101052936B1 (en) | A network-based biometric authentication system using a biometric authentication medium having a biometric information storage unit and a method for preventing forgery of biometric information | |
JP6502083B2 (en) | Authentication device, information terminal device, program, and authentication method | |
CN112671700B (en) | Enterprise economic management information security system | |
CN106452845B (en) | A kind of implementation method unlocked online and device | |
CN107918730A (en) | A kind of application program login method based on iris recognition identification certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210622 Termination date: 20211113 |
|
CF01 | Termination of patent right due to non-payment of annual fee |