CN106407775A - Leak-proof software protection system with upgraded CPU for data - Google Patents

Leak-proof software protection system with upgraded CPU for data Download PDF

Info

Publication number
CN106407775A
CN106407775A CN201610746616.2A CN201610746616A CN106407775A CN 106407775 A CN106407775 A CN 106407775A CN 201610746616 A CN201610746616 A CN 201610746616A CN 106407775 A CN106407775 A CN 106407775A
Authority
CN
China
Prior art keywords
module
software
unlocking
cpu
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610746616.2A
Other languages
Chinese (zh)
Inventor
余国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Gerui Dry Drawing Technology Co Ltd
Original Assignee
Sichuan Gerui Dry Drawing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Gerui Dry Drawing Technology Co Ltd filed Critical Sichuan Gerui Dry Drawing Technology Co Ltd
Priority to CN201610746616.2A priority Critical patent/CN106407775A/en
Publication of CN106407775A publication Critical patent/CN106407775A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a leak-proof software protection system with an upgraded CPU for data. The leak-proof software protection system comprises a user operation module, an unlocking module, a main page, a retina module, a hiding module, a CPU module, an upgrade module, a timing module and N software modules, wherein N is a natural number; the user operation module is used for giving an unlocking instruction to a locking module or giving an operation instruction to the software modules through input of a user through a keyboard or a mouse; the unlocking module is used for receiving the instruction of the user operation module to unlock a computer and entering the main page; the main page is used for receiving information of the unlocking module, opening the unlocking module and clicking a trigger key L to trigger the retina module; the retina module is used for receiving the information of the trigger key to trigger secondary unlocking; a camera works to carry out pupil identification on an operator and further judges whether secondary unlocking can be carried out; if the judgment result is that unlocking cannot be carried out, the process stays on the main page; if the judgment result is that unlocking can be carried out, the information is transmitted to the hiding module; and the hiding module is used for receiving the information of the retina module.

Description

A kind of data anti-security system for software of divulging a secret of CPU upgrading
Technical field
The present invention relates to a kind of anti-security system for software of divulging a secret and in particular to a kind of data of CPU upgrading prevents divulging a secret software Protection system.
Background technology
Computer is commonly called as computer, is a kind of electronic computer device for supercomputing, can carry out numerical computations, may be used again To carry out logical calculated, also there is store-memory function.It is can to run according to program, automatic, high speed processing mass data Modernization intelligent electronic device.It is made up of hardware system and software system, the computer being fitted without any software is referred to as naked Machine.Supercomputer, industrial control computer, network computer, personal computer, embedded computer five class can be divided into, relatively Advanced computer has biocomputer, photonic computer, quantum computer etc..The arithmetic speed of computer nowadays system reaches To TFlops per second, microcomputer, also up to more than several hundred million times per second, makes the scientific algorithm problem of large amount of complex be addressed.Computer Network is to be made up of some computer interconnections that are independent and possessing information exchange capacity, to realize the system of resource-sharing.Meter Calculation machine makes the exchange between the mankind span time and spatial obstacle in the application of network facet.Computer network has become the mankind Set up the material base of information-intensive society, it brings to our work and greatly facilitates and quick, as silver in China Use of the use of the row credit card, train and aircraft bill system etc..Now, can be in the maximum internet in the whole world Carry out on Internet browsing, retrieval information, send and receive e-mail, book or newspaper reading, play online game, the free choice of goods, participate in many The discussion of many problems, realize Telemedicine etc..
But the software using gets more and more, response speed is also increasingly slower, and privacy also more and more bad protection especially exists After personal computer's locking, someone will open, easily steal data, so how to prevent computer from divulging a secret is asking of a worth research Topic.
Content of the invention
The technical problem to be solved is to prevent computer from divulging a secret and solve software response speed also more and more slowly, mesh Be provide a kind of data of CPU upgrading to prevent divulging a secret security system for software, solve to prevent computer from divulging a secret and solve software reaction The also increasingly slower problem of speed.
The present invention is achieved through the following technical solutions:
A kind of anti-security system for software of divulging a secret of data of CPU upgrading, including user operation module, unlocking module, homepage, view Film module, hidden module, CPU module, upgraded module, timing module, N number of software module, N is natural number, wherein said user Operation module:User passes through the input of keyboard or mouse, sends unlocking instruction and to locking module or sends operating instruction and arrive Software module;Described unlocking module:The WEEE & RoHS in Junction for Computer of receive user operation module is unlocked, and enters homepage;Described Homepage:Receive unlocking module information and open, clicking trigger key L, trigger view film module;Described view film module:Receive Triggering key information triggering secondary unlocking, photographic head work carries out pupil identification to operator, further determines whether secondary solution Lock, if judged result is to unlock, rests on homepage, if judged result is to unlock, sends information to hide Module;Described hidden module:Receive the information of view film module, and open hiding interface;Described software module:Receive user is grasped Make instructing and operating of module;Described CPU module:The speed of service of all softwares in one stage of record, mail message is to liter Level module automatic clear continue the speed of service in drastically next stage;Described upgraded module:The information receiving CPU module is gone forward side by side Row judges, the speed of service is less than the software AutoBackground upgrading of setting speed value, and the speed of service is higher than the software of setting speed value Constant;Described timing module:Calculated with computer running time, setting 100 hours is a stage.Privacy is but more and more bad Protection, especially after personal computer's locking, someone will open, easily steals data, so it is individual for how preventing computer from divulging a secret Good problem to study.Traditional file is all to file encryption in computer, but for wanting steal information, one sees Encryption file be equal to have told little where scrounge, present invention design is a dual system, can be cracked by keyboard Computer opened by ground floor password, and electric energy shows and normally can also meet any operation, only the owner of computer just can know that Two layers of password, are triggered by triggering key, and photographic head carries out pupil identification unblock to operator, and the projecting point of this design has Two places, first be pupil identification more advanced be difficult to crack, second be open ground floor lock after computer show Be homepage, give people a kind of psychology indication be exactly to open computer, not will recognize that also one layer of lock continues to try every possible means brokenly Solution.Carry out on Internet browsing, retrieval information, send and receive e-mail, book or newspaper reading, play online game, the free choice of goods, participation The discussion of great number of issues, realize Telemedicine etc..But the software using gets more and more, response speed is also increasingly slower, Due to common home computer limited storage space it is impossible to thus software all update last state, and right Also need not wasting space in the software being of little use.Present invention design is a kind of software being updated according to the Automatic Frequency using System, the speed of service of CPU logging software, and a stage will reset and send data to upgraded module, and this has one Benefit is automatic upgrading, and the judgement of hommization.
The triggering key of described view film module can freely set, and is any key.This key can be set as single or The multiple combination of person, and set by several this number of times lower also moment oneself.
The number of the number of described setting speed value and software corresponds, and a setting speed value fixed by each software. Set different velocity amplitudes also for the preferably man-to-man judgement being made whether for different software to upgrade.
Described upgraded module includes cleaning modul, and cleaning modul can be automatically deleted the installation kit after software upgrading is installed. So also for preferably utilizing memory space, traditional artificial deletion installation kit, can be due to forgeing or file not found Folder leads to wasting space.
The present invention compared with prior art, has such advantages as and beneficial effect:
1st, the anti-security system for software of divulging a secret of the data of a kind of CPU of present invention upgrading, design is a dual system, can pass through key Disk cracks ground floor password and opens computer, and electric energy shows and normally can also meet any operation, only owner's ability of computer Know second layer password, triggered by triggering key, photographic head carries out pupil identification unblock to operator, and it is prominent that this designs Go out a little to have two places, first to be that pupil identification is more advanced be difficult to crack, and second is to open electricity after ground floor lock Brain is shown that homepage, and giving people a kind of indication of psychology is exactly to open computer, not will recognize that also one layer of lock, continues to think Method cracks;
2nd, a kind of anti-security system for software of divulging a secret of the data of CPU of present invention upgrading, sets upgraded module, and this has a benefit is certainly Dynamic upgrading, and the judgement of hommization, this moon because job demand daily use WPS is so be always held at last state, but It is all less to handle official business at home below, will not be recorded according to the next stage and abandon the renewal to WPS.Such design Teacher's maximized utilization memory space;
3rd, the anti-security system for software of divulging a secret of the data of a kind of CPU of present invention upgrading, this key can be set as single or many Individual combination, and setting by several this number of times lower also moment oneself, the custom according to oneself setting, more hommization.
Brief description
Accompanying drawing described herein is used for providing the embodiment of the present invention is further understood, and constitutes of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is schematic flow sheet of the present invention.
Specific embodiment
For making the object, technical solutions and advantages of the present invention become more apparent, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and the exemplary embodiment of the present invention and its explanation are only used for explaining the present invention, do not make For limitation of the invention.
Embodiment
As shown in figure 1, a kind of data of CPU of present invention upgrading prevents divulging a secret security system for software, including user operation module, Unlocking module, homepage, view film module, hidden module, CPU module, upgraded module, timing module, 5 software modules, its Described in user operation module:User passes through the input of keyboard or mouse, sends unlocking instruction and to locking module or sends Operating instruction is to software module;Described unlocking module:The WEEE & RoHS in Junction for Computer of receive user operation module is unlocked, and enters to become owner of The page;Described homepage:Receive unlocking module information and open, clicking trigger key L, trigger view film module;Described retina Module:Receive triggering key information triggering secondary unlocking, photographic head work pupil identification is carried out to operator, determine whether be No secondary unlocking, if judged result is to unlock, rests on homepage, if judged result is to unlock, transmission letter Cease hidden module;Described hidden module:Receive the information of view film module, and open hiding interface;Described software module:Connect Receive instructing and operating of user operation module;Described CPU module:The speed of service of all softwares in one stage of record, conveying To upgraded module and automatic clear continues the speed of service in drastically next stage to information;Described upgraded module:Receive CPU module Information is simultaneously judged, the speed of service is less than the software AutoBackground upgrading of setting speed value, and the speed of service is higher than setting speed The software of value is constant;Described timing module:Calculated with computer running time, setting 100 hours is a stage.The present invention sets Meter is the software system that a double joint updates according to the Automatic Frequency using, and can crack ground floor password by keyboard and open electricity Brain, electric energy shows and normally can also meet any operation, the only owner of computer just can know that second layer password, by triggering Triggering, photographic head carries out pupil identification unblock to key to operator, and the projecting point of this design has two places, and first is Pupil identification is more advanced to be difficult to crack, and second is to open computer after ground floor is locked to be shown that homepage, gives people one The indication planting psychology is exactly to open computer, not will recognize that also one layer of lock continues to try every possible means to crack.The fortune of CPU logging software Scanning frequency degree, and a stage will reset and send data to upgraded module, this has benefit is automatic upgrading, and people The judgement of property, during work:This moon because job demand daily use WPS is so be always held at last state, but below All less handle official business at home, will not be recorded according to the next stage and abandon the renewal to WPS.Such designer is maximum The utilization memory space changed.Thief enters theft data, opens computer and has cracked ground floor password, enters homepage, computer No live data leaves immediately.
Above-described specific embodiment, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further Describe in detail, be should be understood that the specific embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, all any modification, equivalent substitution and improvement within the spirit and principles in the present invention, done etc., all should comprise Within protection scope of the present invention.

Claims (4)

1. a kind of data of CPU upgrading is prevented divulging a secret security system for software, including user operation module it is characterised in that:Also include Unlocking module, homepage, view film module, hidden module, CPU module, upgraded module, timing module, N number of software module, N is Natural number, wherein;
Described user operation module:User passes through the input of keyboard or mouse, sends unlocking instruction and to locking module or sends out Go out operating instruction to software module;
Described unlocking module:The WEEE & RoHS in Junction for Computer of receive user operation module is unlocked, and enters homepage;
Described homepage:Receive unlocking module information and open, clicking trigger key L, trigger view film module;
Described view film module:Receive triggering key information triggering secondary unlocking, photographic head work carries out pupil knowledge to operator Not, further determine whether secondary unlocking, if judged result is to unlock, rest on homepage, if judged result is energy Enough unblocks, then send information to hidden module;
Described hidden module:Receive the information of view film module, and open hiding interface;
Described software module:The instructing and operating of receive user operation module;
Described CPU module:The speed of service of all softwares in one stage of record, mail message is to upgraded module and automatic clear Continue the speed of service in drastically next stage;
Described upgraded module:Receive the information of CPU module and judged, the software that the speed of service is less than setting speed value is automatic Upgrade in backstage, the speed of service is higher than that the software of setting speed value is constant;
Described timing module:Calculated with computer running time, setting 100 hours is a stage.
2. a kind of data of CPU upgrading according to claim 1 prevent divulging a secret security system for software it is characterised in that:Described The triggering key of view film module can freely set, and is any key.
3. a kind of data of CPU upgrading according to claim 1 prevent divulging a secret security system for software it is characterised in that:Described The number of the number of setting speed value and software corresponds, and a setting speed value fixed by each software.
4. a kind of data of CPU upgrading according to claim 1 prevent divulging a secret security system for software it is characterised in that:Described Upgraded module includes cleaning modul, and cleaning modul can be automatically deleted the installation kit after software upgrading is installed.
CN201610746616.2A 2016-08-29 2016-08-29 Leak-proof software protection system with upgraded CPU for data Pending CN106407775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610746616.2A CN106407775A (en) 2016-08-29 2016-08-29 Leak-proof software protection system with upgraded CPU for data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610746616.2A CN106407775A (en) 2016-08-29 2016-08-29 Leak-proof software protection system with upgraded CPU for data

Publications (1)

Publication Number Publication Date
CN106407775A true CN106407775A (en) 2017-02-15

Family

ID=58004111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610746616.2A Pending CN106407775A (en) 2016-08-29 2016-08-29 Leak-proof software protection system with upgraded CPU for data

Country Status (1)

Country Link
CN (1) CN106407775A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103823715A (en) * 2014-02-11 2014-05-28 亿赞普(北京)科技有限公司 Mobile terminal, method and device for one-key calling of application programs on mobile terminal
US20140359790A1 (en) * 2013-06-03 2014-12-04 Tencent Technology (Shenzhen) Company Limited Method and apparatus for visiting privacy content
CN104850767A (en) * 2014-02-18 2015-08-19 宇龙计算机通信科技(深圳)有限公司 Unlocking method and system for mobile terminal
CN105320578A (en) * 2015-11-09 2016-02-10 青岛海信移动通信技术股份有限公司 Method and apparatus for backing up and recovering APP

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
US20140359790A1 (en) * 2013-06-03 2014-12-04 Tencent Technology (Shenzhen) Company Limited Method and apparatus for visiting privacy content
CN103823715A (en) * 2014-02-11 2014-05-28 亿赞普(北京)科技有限公司 Mobile terminal, method and device for one-key calling of application programs on mobile terminal
CN104850767A (en) * 2014-02-18 2015-08-19 宇龙计算机通信科技(深圳)有限公司 Unlocking method and system for mobile terminal
CN105320578A (en) * 2015-11-09 2016-02-10 青岛海信移动通信技术股份有限公司 Method and apparatus for backing up and recovering APP

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LUCKY金牛V587: ""360软件管家如何设置安装后自动删除安装包"", 《百度经验在线公开:HTTPS://JINGYAN.BAIDU.COM/ARTICLE/E4511CF353CFE22B845EAFD5.HTML》 *

Similar Documents

Publication Publication Date Title
CN103441986B (en) Data resource security control method in thin client mode
EP1189128A2 (en) Secure system and method for accessing files in computers using fingerprints
CN100446021C (en) Method of realizing intelligence cryptographic key set of fingerprint for multiple users to use
CN1587616A (en) Instant clearing electronic lock system after key cipher use and realizing method
CN107609369A (en) Computing device is signed in based on face recognition
CN104573430B (en) A kind of data access authority control method and device
US20070061272A1 (en) Access administration system and method for a currency compartment
EP1908207A2 (en) Biometric authentication system
CN201194117Y (en) Article storing cabinet using finger print as lock
CN109859361A (en) Enable the access control reader of remote application
CN107317682A (en) A kind of identity identifying method and system
CN103500304A (en) Virtual machine personalized security monitoring system and method based on Xen
CN107255941B (en) The control method and medicine box of medicine box
CN103348316B (en) Access rights management system and method
CN103218860A (en) Authentication system
CN104866774B (en) The method and system of account rights management
CN106407775A (en) Leak-proof software protection system with upgraded CPU for data
CN106934300A (en) The safety control and method of a kind of data handling system
CN101329751A (en) Intelligent card lift management system and method for terminal user to be provided with card automatically
JP2011080279A (en) Room entrance authentication system
CN106559381A (en) Intelligent organization management system and its authentication authority method
CN106326729A (en) Intelligently-locked computer software secret leakage prevention system
Spender Identifying computer users with authentication devices (tokens)
CN106339640A (en) Anti-leakage double-system computer capable of effectively testing safety performance
JP2007304785A (en) Building security system, user information generation apparatus and access control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215

RJ01 Rejection of invention patent application after publication