[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109460648A - A kind of computer data defence method - Google Patents

A kind of computer data defence method Download PDF

Info

Publication number
CN109460648A
CN109460648A CN201811344548.2A CN201811344548A CN109460648A CN 109460648 A CN109460648 A CN 109460648A CN 201811344548 A CN201811344548 A CN 201811344548A CN 109460648 A CN109460648 A CN 109460648A
Authority
CN
China
Prior art keywords
computer
module
information
central processing
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811344548.2A
Other languages
Chinese (zh)
Other versions
CN109460648B (en
Inventor
林韩辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Business Studies
Original Assignee
Guangdong University of Business Studies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Business Studies filed Critical Guangdong University of Business Studies
Priority to CN201811344548.2A priority Critical patent/CN109460648B/en
Publication of CN109460648A publication Critical patent/CN109460648A/en
Application granted granted Critical
Publication of CN109460648B publication Critical patent/CN109460648B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of computer data defence methods, it needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, after matching result is correct, computer use can be normally opened, while communication module short message prompt mobile terminal normal use can be passed through;When two kinds of passwords have it is one or two kinds of all incorrect when; central processing unit can be to the chance that user re-enters three times; when chance three times is finished two kinds of passwords and can't match; central processing unit issues order by communication module short message prompt mobile terminal computer by non-normal use; original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when computer break down or it is captured and can not be with communication of mobile terminal when, for central processing unit by automatic startup information protective module, information and data on destroying computer realize information protection.

Description

A kind of computer data defence method
Technical field
The present invention relates to computerized information protection technique field, specially a kind of computer data defence method.
Background technique
With the continuous development of computer technology, information security has become the focus of computer user's common concern.Especially It is in the special industries such as business, military affairs, the protection of computerized information is especially important, enemy will not be left for by preferring to destroy.
The prior art provide it is a kind of identified by identity of the password personal identification method to computer user, sketch As follows: in computer starting and after completing BIOS self-test, and after having read os starting file, output password inputs boundary The startup password of user's input is verified, and after being proved to be successful, start-up operation so that user inputs startup password in face System terminates computer starting process, to guarantee the safety of computer system when verifying unsuccessful.But password identity is known Other method requires user to remember that preset startup password, too long startup password are not easy to user's memory, too short startup password It is easy to be cracked, and the password personal identification method usually stores pre-set startup password in a hard disk, thus It needs after having read os starting file, it can after accessing to hard disc of computer, be just able to achieve to user's body The identification of part, therefore, simple password personal identification method is difficult to meet the security requirement of computer system, is easy to make to calculate Machine information is stolen by criminal.
But still further aspect, cause when faulty operation occurring or errors validity occurs for password fingerprint input equipment When computer is by error lock and destroying information, this necessarily causes the information of user to be lost, and causes damages to user.Moreover, if When computer is unable to wirelessly communicate, it is unable to control the useful information of computer auto-destruct, this can not effective protection letter Breath.For this reason, it may be necessary to provide a kind of computer data defence method, this method can safer protection information automatically, will not The locking of mistake occurs, and even if locking, elimination error lock can also be carried out by other approach, also, even if needing When wanting destroying information, information protection and transfer can also be carried out, to provide information security and stability.
Summary of the invention
Present invention solves the technical problem that being to overcome the computerized information of the prior art to protect unsafe defect, provide A kind of computer data defence method.It is special that the computer data defence method there is double verification and information will not be stolen etc. Point.
To achieve the above object, the invention provides the following technical scheme: a kind of computer data defence method, the computer Including central processing unit and information protection module, the central processing unit is bi-directionally connected with information protection module, the centre Managing device, electrically input connects keyboard PIN PAD and fingerprint collecting unit respectively, and the central processing unit is bi-directionally connected respectively to be deposited Module one and memory module two are stored up, the central processing unit connects mobile terminal by communication module signal;Background server mould Block, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every From to prevent the storage information virus infection of background server module;
The method are as follows: need to input a string of universal codes and finger-print cipher when user needs to log in while verifying solution Lock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, and after matching result is correct, can normally open meter Calculation machine uses, while can pass through communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically Unlock instruction is sent to carry out computer unlock;
Meanwhile original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when calculating Machine break down or it is captured and can not be with communication of mobile terminal when, central processing unit is by automatic startup information protective module Encryption information is carried out, and in encryption certain time, if communication connection is carried out with background server module, by the letter of preservation Breath be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
Preferably, the fingerprint collecting unit includes fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module, institute Fingerprint acquisition device electrically output connection fingerprint line processing module is stated, the fingerprint line processing module electrically know by output connection fingerprint Other module.
Preferably, the storage module one is used to store the code data information of secured user's system, the memory module two For storing the data information of custom system.
Preferably, electrically input connection video encoding module, the video encoding module are electrically defeated for the central processing unit Enter and connect pattern process module, electrically input connects image collecting device to described image processing module.
Preferably, described image acquisition device is infrared camera.
Preferably, the background server module has temporary storage module, and it is locked to be used to temporarily store computer When computer upload information and data.
Preferably, information that the verification link information and computer that the information security module sends computer upload and Data is killed virus, and virus infection background server is prevented.
Preferably, the temporary storage module information of the background server module can only pass through physical connection mode on backstage It is attached and reads.
Still further aspect, the application also provide a kind of information protection system for realizing computer data defence method, are used for Realize computer data defence method above-mentioned, including the computer includes central processing unit and information protection module, it is described in Central processor is bi-directionally connected with information protection module, the central processing unit respectively electrically input connection keyboard PIN PAD and Fingerprint collecting unit, the central processing unit are bi-directionally connected memory module one and memory module two, the central processing unit respectively Mobile terminal is connected by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every From to prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verifying letters Breath is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer use, simultaneously Communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically Unlock instruction is sent to carry out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will open automatically Dynamic information protection module carries out encryption information, and in encryption certain time, if carrying out communication company with background server module It connects, then carries out the information of preservation after being uploaded to background server module, immediately the information and data on destroying computer, it is real Existing information protection.
Compared with prior art, the beneficial effects of the present invention are: need to input when user needs to log in a string it is general close Code and finger-print cipher verify unlock simultaneously, and two kinds of verification informations are sent into memory module one by central processing unit and are matched, matching knot After fruit is correct, computer use can be normally opened, while can normally make by communication module short message prompt mobile terminal With improving security effectiveness;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message For prompting mobile terminal computer by non-normal use, original person can start information protection module immediately by mobile terminal, pin Ruin information;Alternatively, central processing unit will be certainly when computer breaks down or is captured and can not be with communication of mobile terminal Dynamic to start information protection module, information and data on destroying computer realize information protection.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is invention's principle block diagram;
Fig. 2 is fingerprint collecting unit functional block diagram of the present invention;
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The present invention provides a kind of technical solution referring to FIG. 1-2: a kind of computer data defence method, it is characterised in that: The computer includes central processing unit and information protection module, and the central processing unit is bi-directionally connected with information protection module, institute Stating central processing unit, electrically input connection keyboard PIN PAD and fingerprint collecting unit, the fingerprint collecting unit include respectively Fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module, the fingerprint acquisition device is electrically at output connection fingerprint line Module is managed, electrically output connection fingerprint identification module, fingerprint acquisition device are mounted on computer sheet to the fingerprint line processing module Body, record is had the finger of fingerprint to be put into fingerprint acquisition device by user when use, Fingerprint Processing Module to its fingerprint at Reason allows it to be more clear to be sent to fingerprint identification module, and fingerprint identification module identifies fingerprint, during the data of identification pass through Strength is sent out into memory module one at centre: electrically input connects video encoding module, the Video coding mould to the central processing unit Electrically input connection pattern process module, described image processing module electrically input connection image collecting device, described image to block Acquisition device is infrared camera, if destroying computer by the ready-made illegal login of people, image collecting device can be recorded as It arrests convict and evidence is provided, the central processing unit is bi-directionally connected memory module one and memory module two, the storage module respectively One for storing the code data information of secured user's system, and the memory module two is used to store the data letter of custom system Breath, the central processing unit connect mobile terminal by communication module signal;It further include background server module, information security mould Block;The background server module stores the check password of computer, for communicating to connect with computer, and can unlock Computer realizes the use of computer, and checking command and unlock instruction can occurs in it;The information security module communication It is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated, from And prevent the storage information virus infection of background server module;
The method are as follows: need to input a string of universal codes and finger-print cipher when user needs to log in while verifying solution Lock, two kinds of verification informations are sent into memory module one by central processing unit and are matched, and after matching result is correct, can normally open meter Calculation machine uses, while can pass through communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically Unlock instruction is sent to carry out computer unlock;
Meanwhile original person can start information protection module, destroying information immediately by mobile terminal;Alternatively, when calculating Machine break down or it is captured and can not be with communication of mobile terminal when, central processing unit is by automatic startup information protective module Encryption information is carried out, and in encryption certain time, if communication connection is carried out with background server module, by the letter of preservation Breath be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
In addition one side aspect, the application also provide a kind of information protection system for realizing computer data defence method, use In realizing computer data defence method above-mentioned, including the computer includes central processing unit and information protection module, described Central processing unit is bi-directionally connected with information protection module, and electrically input connects keyboard PIN PAD to the central processing unit respectively And fingerprint collecting unit, the central processing unit are bi-directionally connected memory module one and memory module two, the central processing respectively Device connects mobile terminal by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for being communicated to connect with computer, and can To unlock the use that computer realizes computer, and checking command and unlock instruction can occurs in it;The information security mould Block is communicatively coupled between computer and background server module, so as to the communication between the two carry out antivirus and physics every From to prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verifying letters Breath is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer use, simultaneously Communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can re-enter three times to user Chance, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message Prompting mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, deposits The information stored up in computer is all encrypted;Meanwhile user being reminded to need computer and background service at the appointed time The connection of device module communication carries out background server verification, and otherwise computer will be stored in the information of computer by communication module Background server storage is reached, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer It is connected with background server when being verified, needs original person actively to agree to unlock in server, then background server is sent out automatically Unlock instruction is sent to carry out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will open automatically Dynamic information protection module carries out encryption information, and in encryption certain time, if carrying out communication company with background server module It connects, then carries out the information of preservation after being uploaded to background server module, immediately the information and data on destroying computer, it is real Existing information protection.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of computer data defence method, it is characterised in that: the computer includes central processing unit and information protection module, The central processing unit is bi-directionally connected with information protection module, and electrically input connection keyboard password is defeated respectively for the central processing unit Enter device and fingerprint collecting unit, the central processing unit is bi-directionally connected memory module one and memory module two, the center respectively Processor connects mobile terminal by communication module signal;Background server module, information security module;
The background server module stores the check password of computer, for communicating to connect with computer, and can solve The use that computer realizes computer is locked, and checking command and unlock instruction can occurs in it;The information security module is logical Letter is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated, To prevent the storage information virus infection of background server module;
The method are as follows: it needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two Kind verification information is sent into memory module one by central processing unit and is matched, and after matching result is correct, can normally open computer It uses, while communication module short message prompt mobile terminal normal use can be passed through;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can be to the machine that user re-enters three times Meeting, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message prompt Mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, is stored in The information of computer is all encrypted;Meanwhile user being reminded to need computer and background server mould at the appointed time Block communication connection carries out background server verification, and otherwise the information for being stored in computer is uploaded to by computer by communication module Background server storage, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer with after When the connection of platform server is verified, original person is needed actively to agree to unlock in server, then background server sends solution automatically Lock instruction carries out computer unlock;
Meanwhile original person can also start information protection module, destroying information immediately by mobile terminal;Alternatively, working as computer Break down or it is captured and can not be with communication of mobile terminal when, central processing unit by automatic startup information protective module into Row encryption information, and in encryption certain time, if communication connection is carried out with background server module, by the information of preservation Be uploaded to after background server module, immediately the information and data on destroying computer, realizes information protection.
2. a kind of computer data defence method according to claim 1, it is characterised in that: the fingerprint collecting unit packet Fingerprint acquisition device, fingerprint identification module and Fingerprint Processing Module are included, electrically output connects fingerprint line to the fingerprint acquisition device Processing module, electrically output connects fingerprint identification module to the fingerprint line processing module.
3. a kind of computer data defence method according to claim 1, it is characterised in that: the storage module one is for depositing The code data information of secured user's system is stored up, the memory module two is used to store the data information of custom system.
4. a kind of computer data defence method according to claim 1, it is characterised in that: the central processing unit is electrical Input connection video encoding module, electrically input connection pattern process module, described image handle mould to the video encoding module Electrically input connects image collecting device to block.
5. a kind of computer data defence method according to claim 4, it is characterised in that: described image acquisition device is Infrared camera.
6. a kind of computer data defence method according to claim 1, it is characterised in that: the background server module Have temporary storage module, is used to temporarily store the information and data that computer uploads when computer is locked.
7. a kind of computer data defence method according to claim 1, it is characterised in that: the information security module pair The information and data that the verification link information and computer that computer is sent upload are killed virus, and virus infection background service is prevented Device.
8. a kind of computer data defence method according to claim 6, it is characterised in that: the background server module Temporary storage module information can only be attached and read by physical connection mode on backstage.
9. a kind of computer data defence method according to claim 6, it is characterised in that: the background server module Can exist in the form of with single-chip microcontroller and USB flash disk combination.
10. a kind of information protection system for realizing computer data defence method, for realizing any one in such as claim 1-9 The computer data defence method of item, including the computer includes central processing unit and information protection module, the central processing Device is bi-directionally connected with information protection module, and the central processing unit respectively electrically adopt by input connection keyboard PIN PAD and fingerprint Collect unit, the central processing unit is bi-directionally connected memory module one and memory module two respectively, and the central processing unit passes through logical It interrogates module by signal and connects mobile terminal;Background server module, information security module;
The background server module stores the check password of computer, for communicating to connect with computer, and can solve The use that computer realizes computer is locked, and checking command and unlock instruction can occurs in it;The information security module is logical Letter is connected between computer and background server module, so that the communication between the two is killed virus and is physically isolated, To prevent the storage information virus infection of background server module;
It needs to input a string of universal codes and finger-print cipher when user needs to log in while verifying unlock, two kinds of verification information quilts Central processing unit is sent into memory module one and is matched, and after matching result is correct, can normally open computer use, while can lead to Cross communication module short message prompt mobile terminal normal use;
When two kinds of passwords have it is one or two kinds of all incorrect when, central processing unit can be to the machine that user re-enters three times Meeting, when chance three times is finished two kinds of passwords and can't match, central processing unit issues order and passes through communication module short message prompt Mobile terminal computer is by non-normal use or there are check errors, meanwhile, the hard disk information of computer is locked, is stored in The information of computer is all encrypted;Meanwhile user being reminded to need computer and background server mould at the appointed time Block communication connection carries out background server verification, and otherwise the information for being stored in computer is uploaded to by computer by communication module Background server storage, while the information encrypted uploaded or after a certain period of time by auto-destruct;In computer with after When the connection of platform server is verified, original person is needed actively to agree to unlock in server, then background server sends solution automatically Lock instruction carries out computer unlock;
When computer breaks down or is captured and can not be with communication of mobile terminal, central processing unit will start letter automatically It ceases protective module and carries out encryption information, and in encryption certain time, if carrying out communication connection with background server module, The information of preservation is carried out after being uploaded to background server module, immediately the information and data on destroying computer, realizes letter Breath protection.
CN201811344548.2A 2018-11-13 2018-11-13 Computer data defense method Expired - Fee Related CN109460648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811344548.2A CN109460648B (en) 2018-11-13 2018-11-13 Computer data defense method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811344548.2A CN109460648B (en) 2018-11-13 2018-11-13 Computer data defense method

Publications (2)

Publication Number Publication Date
CN109460648A true CN109460648A (en) 2019-03-12
CN109460648B CN109460648B (en) 2021-06-22

Family

ID=65610188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811344548.2A Expired - Fee Related CN109460648B (en) 2018-11-13 2018-11-13 Computer data defense method

Country Status (1)

Country Link
CN (1) CN109460648B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795773A (en) * 2019-09-03 2020-02-14 淮阴师范学院 Notebook computer one-key start-stop system with high security
CN111414593A (en) * 2020-03-17 2020-07-14 林家豪 Computer information protection method based on mobile internet
CN111737768A (en) * 2019-09-02 2020-10-02 集美大学 Computer encryption and decryption method
CN112309522A (en) * 2020-11-02 2021-02-02 陕西医链区块链集团有限公司 Medical data tamper-proof system based on block chain technology

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
US20140337635A1 (en) * 2013-05-13 2014-11-13 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal
CN105808994A (en) * 2016-04-04 2016-07-27 合肥博雷电子信息技术有限公司 Computer software encryption protection device
CN206021272U (en) * 2016-08-04 2017-03-15 曾嵘娟 A kind of computer encryption device
US20170111168A1 (en) * 2015-09-02 2017-04-20 International Business Machines Corporation Bluesalt security
CN206147636U (en) * 2016-10-17 2017-05-03 高辉 Computer encryption device
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
US20140337635A1 (en) * 2013-05-13 2014-11-13 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal
US20170111168A1 (en) * 2015-09-02 2017-04-20 International Business Machines Corporation Bluesalt security
CN105808994A (en) * 2016-04-04 2016-07-27 合肥博雷电子信息技术有限公司 Computer software encryption protection device
CN206021272U (en) * 2016-08-04 2017-03-15 曾嵘娟 A kind of computer encryption device
CN206147636U (en) * 2016-10-17 2017-05-03 高辉 Computer encryption device
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737768A (en) * 2019-09-02 2020-10-02 集美大学 Computer encryption and decryption method
CN110795773A (en) * 2019-09-03 2020-02-14 淮阴师范学院 Notebook computer one-key start-stop system with high security
CN111414593A (en) * 2020-03-17 2020-07-14 林家豪 Computer information protection method based on mobile internet
CN112309522A (en) * 2020-11-02 2021-02-02 陕西医链区块链集团有限公司 Medical data tamper-proof system based on block chain technology

Also Published As

Publication number Publication date
CN109460648B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN109460648A (en) A kind of computer data defence method
US10957136B1 (en) Information-based, biometric, asynchronous access control system
CN105530356B (en) Mobile communication terminal and data protection method and device thereof
CN108694313A (en) A kind of computer user's identification system
WO2018106432A1 (en) Systems and methods for decentralized biometric enrollment
CN103646200B (en) The coding encrypting of a kind of face information and application process
CN103580872A (en) System and method for generating and managing secret key
CN106710032B (en) Entrance guard opening method and device
US10990776B2 (en) Methods and devices for biometric verification
CN109711126A (en) A kind of computer information safe management system and method
CN104834853B (en) A kind of personal identification method, device and information security type duplicator
CN105809005A (en) Method for locking or unlocking computer screen based on fingerprints
CN106790243B (en) A kind of password remapping method of safe U disc
CN114360114B (en) User authority management method and system
CN106161442A (en) A kind of system control user login method
BR102014022465A2 (en) electronic payment system and method of use
CN110032851A (en) A kind of login system being used to encrypt file polling platform based on recognition of face
CN105389497A (en) Security verification method and system for operation interface of fingerprint recognition
US7272245B1 (en) Method of biometric authentication
CN104735085A (en) Terminal two-factor secure login protection method
KR101052936B1 (en) A network-based biometric authentication system using a biometric authentication medium having a biometric information storage unit and a method for preventing forgery of biometric information
JP6502083B2 (en) Authentication device, information terminal device, program, and authentication method
CN112671700B (en) Enterprise economic management information security system
CN106452845B (en) A kind of implementation method unlocked online and device
CN107918730A (en) A kind of application program login method based on iris recognition identification certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210622

Termination date: 20211113

CF01 Termination of patent right due to non-payment of annual fee