CN106355067A - Software-based leak-proof communication system effectively preventing data loss - Google Patents

Software-based leak-proof communication system effectively preventing data loss Download PDF

Info

Publication number
CN106355067A
CN106355067A CN201610745646.1A CN201610745646A CN106355067A CN 106355067 A CN106355067 A CN 106355067A CN 201610745646 A CN201610745646 A CN 201610745646A CN 106355067 A CN106355067 A CN 106355067A
Authority
CN
China
Prior art keywords
module
computer
information
timing
user operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610745646.1A
Other languages
Chinese (zh)
Inventor
李文平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Gerui Dry Drawing Technology Co Ltd
Original Assignee
Sichuan Gerui Dry Drawing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Gerui Dry Drawing Technology Co Ltd filed Critical Sichuan Gerui Dry Drawing Technology Co Ltd
Priority to CN201610745646.1A priority Critical patent/CN106355067A/en
Publication of CN106355067A publication Critical patent/CN106355067A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a software-based leak-proof communication system effectively preventing data loss, comprising a user operation module, an unlock module, a main page, a retina module, a hidden module and a processor module, wherein the user operation module allows users send unlock instructions by a keyboard or mice to the lock module. The instructions from the user operation module are received to unlock the computer, which opens the main page. The system is unlocked after receiving the information from the unlock module. The retina module is triggered by the click of trigger key L. Information from the key further unlocks the system. Then the camera is started up to scan the operator's pupil for identification. If the scan result is negative, the system cannot be unlocked. If positive, information is transmitted to the hide module which then opens the hidden interface. The interface consists of timing module, data storage module, cloud backup module and emergency battery module, which receive the data from the user operation module and convert such data into codes.

Description

A kind of anti-communication system of divulging a secret of software of effective prevention data loss
Technical field
The present invention relates to a kind of software is prevented divulging a secret communication system and in particular to a kind of software of effective prevention data loss is prevented Divulge a secret communication system.
Background technology
Computer is commonly called as computer, is a kind of electronic computer device for supercomputing, can carry out numerical computations, may be used again To carry out logical calculated, also there is store-memory function.It is can to run according to program, automatic, high speed processing mass data Modernization intelligent electronic device.It is made up of hardware system and software system, the computer being fitted without any software is referred to as naked Machine.Supercomputer, industrial control computer, network computer, personal computer, embedded computer five class can be divided into, relatively Advanced computer has biocomputer, photonic computer, quantum computer etc..The arithmetic speed of computer nowadays system reaches To TFlops per second, microcomputer, also up to more than several hundred million times per second, makes the scientific algorithm problem of large amount of complex be addressed.Nanometer meter Calculation machine is the novel high-performance computer with nanotechnology research and development.Nanotube components size is in a few to tens of nanometer range, quality Firm, there is extremely strong electric conductivity, silicon can be replaced to manufacture computer." nanometer " is a measurement unit, a nanometer Equal to 10-9 rice, about the 10 of hydrogen atom diameter times.Nanotechnology be from early 1980s develop rapidly new Forward position scientific research field, final goal is the mankind directly manipulates single atom according to the will of oneself, produces and has specific work( The product of energy.Nanotechnology now just starts to walk from microelectromechanical systems, and sensor, motor and various processor are all placed on A system is constituted on one silicon.The calculator memory chip that application nanotechnology is developed, its volume only has hundreds of Atom size, is equivalent to the one thousandth of the hairline diameter of people.Nanocomputer not only with little need for expend any energy, And its performance than the computer of today powerful manyfold.
With the continuous increase of computer storage capacity, can the information of store-memory get more and more.Computer can not only enter Row calculates, and data, program and the intermediate result and end product of participating in computing can be saved, for user at any time Call;Arithmetical operation and logical operationss can also be carried out by coding techniques to various information, or even make inferences and prove, but It is privacy but more and more bad protection, especially after personal computer's locking, someone will open, easily steal data.
So how to avoid contents lost inside computer and to prevent computer from divulging a secret be a problem needing research.
Content of the invention
The technical problem to be solved is to avoid contents lost inside computer and prevent computer from divulging a secret, purpose It is to provide a kind of anti-communication system of divulging a secret of software of effective prevention data loss, solve to avoid the contents lost inside computer With the problem preventing computer from divulging a secret.
The present invention is achieved through the following technical solutions:
A kind of anti-communication system of divulging a secret of software of effective prevention data loss, including user operation module, unlocking module, homepage Face, view film module, hidden module, processor module, wherein said user operation module: user passes through keyboard or mouse Input, sends unlocking instruction to locking module;Described unlocking module: the WEEE & RoHS in Junction for Computer of receive user operation module is opened Lock, enters homepage;Described homepage: receive unlocking module information and open, clicking trigger key l, trigger view film module;Institute State view film module: receive triggering key information triggering secondary unlocking, photographic head work carries out pupil identification to operator, enters one Step judges whether secondary unlocking, if judged result is to unlock, rests on homepage, if judged result is to unlock, Then send information to hidden module;Described hidden module: receive the information of view film module, and open hiding interface;Described place Reason device module: by timing module, data storage module, high in the clouds backup module and emergent power storage module form, and receive user operates Information is simultaneously carried out process and is converted into encoding by the information of module transfer, and timing module starts timing with the computer booting time, and Automatically issue instructions to data storage module every 1 hour, and automatically issue instructions to high in the clouds backup mould every 24 hours Block, high in the clouds backup module receives the instruction of timing module and this coding is carried out with high in the clouds backup, and emergent power storage module may be supported on Power-cut time is computer power supply 3 seconds, and issues instructions to data storage module in the very first time, and data storage module receives meter When the module and instruction of emergent power storage module this coding is stored.Traditional file be all in computer to file plus Close, but for wanting steal information, one see encryption file be equal to have told little where scrounge, the present invention designs Be a dual system, ground floor password can be cracked by keyboard and open computer, electric energy show normally can also meet any Operation, the only owner of computer just can know that second layer password, triggers by triggering key, photographic head is carried out to operator Pupil identification unblock, the projecting point of this design has two places, and first to be that pupil identification is more advanced be difficult to crack, the Two kinds is to open computer after ground floor is locked to be shown that homepage, and giving people a kind of indication of psychology is exactly to open computer, no Will recognize that also one layer of lock continues to try every possible means to crack.The continuous increase of computer storage capacity, can store-memory information More and more.Computer can not only be calculated, and can be data, program and the intermediate result participating in computing and last knot Fruit saves, so that user calls at any time;Arithmetical operation and logic fortune can also be carried out by coding techniques to various information Calculate, or even make inferences and prove.So how to avoid the contents lost inside computer to be a problem needing research.This Invention design is a kind of system preventing contents lost inside computer, send loss come in preventing, first is in terms of 3 Automatic storage, second is high in the clouds backup, the 3rd when being unexpected power-off, by emergent power storage module electric power storage 3 seconds, and at 3 seconds Interior automatic storage data prevents situation about losing.
Described homepage is identical with the page after normal booting computer, can normal operating computer.This homepage is just It is the page of normal computer, if opened and can also use by people by mistake, if thief opens, also will be considered that this computer does not have Valuable information material.
Described timing module starts timing with the computer booting time, is continuous timing, and start for the first time is closed for 30 minutes, When starting shooting 30 minutes for second, data storage module will be sent instructions to.This timing is continuous, each available machine time meter Calculation machine has record.
Described high in the clouds backup module, is that all information are sent to specified mailbox by timing, when backup time does not have network, Pop-up dialogue box will remind operator, this is further effectively to store data, prevents the emergency case of all.
The present invention compared with prior art, has such advantages as and beneficial effect:
1st, a kind of anti-communication system of divulging a secret of software of effective prevention data loss of the present invention, send loss come in preventing in terms of 3, First is automatic storage, and second is high in the clouds backup, the 3rd when being unexpected power-off, by emergent power storage module electric power storage 3 seconds, And automatic storage data prevents situation about losing in 3 seconds;
2nd, a kind of anti-communication system of divulging a secret of software of effective prevention data loss of the present invention, design is a dual system, permissible Ground floor password is cracked by keyboard and opens computer, electric energy shows and normally can also meet any operation, the only master of computer The talent can know that second layer password, is triggered by triggering key, and photographic head carries out pupil identification unblock to operator, and this sets The projecting point of meter has two places, and first to be that pupil identification is more advanced be difficult to crack, and second is to open ground floor lock Computer is shown that homepage afterwards, and giving people a kind of indication of psychology is exactly to open computer, not will recognize that also one layer of lock, continues Continue and go to try every possible means to crack;
3rd, a kind of anti-communication system of divulging a secret of software of effective prevention data loss of the present invention, timing module is with the computer booting time Start timing, this timing is continuous, and each available machine time computer has record.
Brief description
Accompanying drawing described herein is used for providing the embodiment of the present invention is further understood, and constitutes of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is schematic flow sheet of the present invention.
Specific embodiment
For making the object, technical solutions and advantages of the present invention become more apparent, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and the exemplary embodiment of the present invention and its explanation are only used for explaining the present invention, do not make For limitation of the invention.
Embodiment
The communication system as shown in figure 1, a kind of software of effective prevention data loss of the present invention is prevented divulging a secret, including user operation Module, unlocking module, homepage, view film module, hidden module, processor module, wherein said user operation module: user By the input of keyboard or mouse, send unlocking instruction to locking module;Described unlocking module: receive user operation module WEEE & RoHS in Junction for Computer is unlocked, and enters homepage;Described homepage: receive unlocking module information and open, clicking trigger key L, triggers view film module;Described view film module: receive triggering key information triggering secondary unlocking, photographic head works to operator Member carries out pupil identification, further determines whether secondary unlocking, if judged result is to unlock, rests on homepage, if Judged result is to unlock, then send information to hidden module;Described hidden module: receive the information of view film module, and Open hiding interface;Described processor module: by timing module, data storage module, high in the clouds backup module and emergent electric power storage mould Block form, receive user operation module transmission information and by information carry out process be converted into encode, timing module is with computer Available machine time starts timing, and automatically issues instructions to data storage module every 1 hour, and automatically sends out every 24 hours Go out instruction to high in the clouds backup module, high in the clouds backup module receives the instruction of timing module and carries out high in the clouds backup to this coding, should Anxious power storage module may be supported on power-cut time and is computer power supply 3 seconds, and issues instructions to data storage module in the very first time, Data storage module receives the instruction of timing module and emergent power storage module and this coding is stored, and what the present invention designed is One dual system, can crack ground floor password by keyboard and open computer, and electric energy shows and normally can also meet any behaviour Make, only the owner of computer just can know that second layer password, is triggered by triggering key, and photographic head carries out pupil to operator Identification unblock, the projecting point of this design has two places, and first to be that pupil identification is more advanced be difficult to crack, second It is to open computer after ground floor is locked to be shown that homepage, giving people a kind of indication of psychology is exactly to open computer, will not think Continue to try every possible means to crack to also one layer of lock.Send loss come in preventing in terms of 3, first is automatic storage, second It is high in the clouds backup, the 3rd when being unexpected power-off, by emergent power storage module electric power storage 3 seconds, and automatic storage data was prevented in 3 seconds Situation about only losing, during work: thief enters theft data, opens computer and has cracked ground floor password, enter homepage, electricity Brain no live data leaves immediately, the unexpected power-off of computer, emergent power storage module work, and electric power storage 3 seconds simultaneously issues instructions to data Storage module, data storage module work does storage data.The file leading to due to power-off is prevented to lose.
Above-described specific embodiment, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further Describe in detail, be should be understood that the specific embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, all any modification, equivalent substitution and improvement within the spirit and principles in the present invention, done etc., all should comprise Within protection scope of the present invention.

Claims (4)

1. a kind of software of effective prevention data loss is prevented divulging a secret communication system, includings user operation module it is characterised in that: and also Including unlocking module, homepage, view film module, hidden module, processor module, wherein;
Described user operation module: user passes through the input of keyboard or mouse, sends unlocking instruction to locking module;
Described unlocking module: the WEEE & RoHS in Junction for Computer of receive user operation module is unlocked, enters homepage;
Described homepage: receive unlocking module information and open, clicking trigger key l, trigger view film module;
Described view film module: receive triggering key information triggering secondary unlocking, photographic head work carries out pupil knowledge to operator Not, further determine whether secondary unlocking, if judged result is to unlock, rest on homepage, if judged result is energy Enough unblocks, then send information to hidden module;
Described hidden module: receive the information of view film module, and open hiding interface;
Described processor module: by timing module, data storage module, high in the clouds backup module and emergent power storage module form, and connect Receive the information of user operation module transfer and information is carried out process be converted into encoding, timing module opened with the computer booting time Beginning timing, and automatically issue instructions to data storage module every 1 hour, and automatically issue instructions to cloud every 24 hours End backup module, high in the clouds backup module receives the instruction of timing module and this coding is carried out with high in the clouds backup, emergent power storage module May be supported on power-cut time and be computer power supply 3 seconds, and issue instructions to data storage module, data storage mould in the very first time Block receives the instruction of timing module and emergent power storage module and this coding is stored.
2. according to claim 1 a kind of effective prevention data loss software prevent divulge a secret communication system it is characterised in that: Described homepage is identical with the page after normal booting computer, can normal operating computer.
3. according to claim 1 a kind of effective prevention data loss software prevent divulge a secret communication system it is characterised in that: Described timing module starts timing with the computer booting time, is continuous timing, and start for the first time is closed for 30 minutes, opens for the second time During machine 30 minutes, data storage module will be sent instructions to.
4. according to claim 1 a kind of effective prevention data loss software prevent divulge a secret communication system it is characterised in that: Described high in the clouds backup module, is that all information are sent to specified mailbox by timing, when backup time does not have network, will eject Dialog box reminds operator.
CN201610745646.1A 2016-08-29 2016-08-29 Software-based leak-proof communication system effectively preventing data loss Pending CN106355067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610745646.1A CN106355067A (en) 2016-08-29 2016-08-29 Software-based leak-proof communication system effectively preventing data loss

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610745646.1A CN106355067A (en) 2016-08-29 2016-08-29 Software-based leak-proof communication system effectively preventing data loss

Publications (1)

Publication Number Publication Date
CN106355067A true CN106355067A (en) 2017-01-25

Family

ID=57855404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610745646.1A Pending CN106355067A (en) 2016-08-29 2016-08-29 Software-based leak-proof communication system effectively preventing data loss

Country Status (1)

Country Link
CN (1) CN106355067A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504883A (en) * 1993-02-01 1996-04-02 Lsc, Inc. Method and apparatus for insuring recovery of file control information for secondary storage systems
CN102546654A (en) * 2012-02-07 2012-07-04 苏州工业园区飞酷电子科技有限公司 Security management system for server
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103546555A (en) * 2013-10-21 2014-01-29 张力军 Method and system for data management of mobile terminal
CN103823715A (en) * 2014-02-11 2014-05-28 亿赞普(北京)科技有限公司 Mobile terminal, method and device for one-key calling of application programs on mobile terminal
CN205080495U (en) * 2015-11-11 2016-03-09 刘冰洁 Computer outage data automatic safety device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504883A (en) * 1993-02-01 1996-04-02 Lsc, Inc. Method and apparatus for insuring recovery of file control information for secondary storage systems
CN102546654A (en) * 2012-02-07 2012-07-04 苏州工业园区飞酷电子科技有限公司 Security management system for server
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103546555A (en) * 2013-10-21 2014-01-29 张力军 Method and system for data management of mobile terminal
CN103823715A (en) * 2014-02-11 2014-05-28 亿赞普(北京)科技有限公司 Mobile terminal, method and device for one-key calling of application programs on mobile terminal
CN205080495U (en) * 2015-11-11 2016-03-09 刘冰洁 Computer outage data automatic safety device

Similar Documents

Publication Publication Date Title
US9578037B2 (en) Allowing varied device access based on different levels of unlocking mechanisms
CN101197665B (en) Dynamic password generation method and device thereof
TW201516732A (en) A continuous identity authentication method for computer users
CN202990697U (en) Intelligent safety device with face identification function
CN103500302A (en) System and method of safety lock hidden programs
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN204856680U (en) Multi -functional lock and control system thereof
CN203149691U (en) Bag storage device based on face recognition technology
CN201641038U (en) Face recognition electronic bag storage cabinet
CN105469024B (en) Wearable device and control method thereof
CN106548554A (en) A kind of bluetooth door opening method and door lock based on mobile terminal APP
CN112215996A (en) Lock opening and closing authority control method, electric bicycle and readable storage medium
CN103236104A (en) Using method of multi-password key as well as corresponding lockset
CN106355067A (en) Software-based leak-proof communication system effectively preventing data loss
CN106951326A (en) A kind of file unlocking method and electronic equipment
CN102938031A (en) Electrical equipment
CN206043931U (en) A kind of smart profile manages cabinet
CN106897600A (en) A kind of external connection of computer USB key safe verification method
CN103942483A (en) Encryption machine with biological feature detecting function and working method thereof
CN110321683A (en) The software communication system for preventing data loss
TWI273881B (en) Temperature detecting system and method
Xu et al. Event ambiguity fuels the effective spread of rumors
CN106326729A (en) Intelligently-locked computer software secret leakage prevention system
CN207017804U (en) Wireless charging smart lock
Phalak et al. An Iot based smart locker using BLE technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125

RJ01 Rejection of invention patent application after publication