CN106599689A - Data protection system and optimization method based on computer performance - Google Patents

Data protection system and optimization method based on computer performance Download PDF

Info

Publication number
CN106599689A
CN106599689A CN201611127501.1A CN201611127501A CN106599689A CN 106599689 A CN106599689 A CN 106599689A CN 201611127501 A CN201611127501 A CN 201611127501A CN 106599689 A CN106599689 A CN 106599689A
Authority
CN
China
Prior art keywords
data
application server
decryption
file
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611127501.1A
Other languages
Chinese (zh)
Inventor
魏群
樊秋红
谷建涛
章昊
刘婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China University of Science and Technology
Original Assignee
North China University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China University of Science and Technology filed Critical North China University of Science and Technology
Priority to CN201611127501.1A priority Critical patent/CN106599689A/en
Publication of CN106599689A publication Critical patent/CN106599689A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a data protection system and an optimization method based on computer performance in the field of the computer technology. The data protection system comprises an application server, wherein the application server is independently in electric input connection with a system detection unit, a virus checking system and a data encryption unit; the application server is in electric output connection with a data decryption unit; and the data decryption unit is in electric output connection with data recovery output. By use of the data protection system, the recovery function, the encryption and decryption function and the anti-virus function of computer data are combined into a whole, so that the data protection system has an integral data security protection function, the computer is cleaned and optimized in fixed time, the computer can be under a favorable operation state, the computer performance is improved, the computer data security and the system security of a common personal user can be guaranteed, a phenomenon that the computer is stuck due to a virus problem is solved from the source, and user experience is improved.

Description

A kind of data protection system and optimization method based on computing power
Technical field
The present invention relates to field of computer technology, specially a kind of data protection based on computing power and optimization side Method.
Background technology
In a computer network, data generally have two states:Storage state and transmission state.For a long time, data are passed Integrality when defeated obtains people and more pays close attention to.No matter in storage state or in transmission state, data had both easily suffered people For active attack, unartificial ANOMALOUS VARIATIONS is subject to again.Compared with transmission state, the data under storage state Integrality should more receive publicity, the reason for this mainly has three aspects:One is that the existing user data of data of storage state has and is again System data, and the data of transmission state are substantially then user data;Two is the number that the work of system relies primarily on storage state According to, rather than the data of transmission state;Three is the rare system-level integrity protection of data of storage state, and transmission state Data are then by the transmission mechanism of network there is provided integrity protection to a certain extent.
When computer meets with viral threat, can frequently there is Caton phenomenon, have a strong impact on the experience of user, meanwhile, Computer after middle virus, easily lose by the personal information data of computer-internal, for this purpose, we have proposed a kind of based on calculating The data protection of machine performance is come into operation with optimization method, to solve the above problems.
The content of the invention
It is an object of the invention to provide a kind of data protection and optimization method based on computing power, above-mentioned to solve In background technology propose computer meet with viral threat when, can frequently there is Caton phenomenon, have a strong impact on the body of user Test, meanwhile, computer after middle virus, the problem that the personal information data of computer-internal are easily lost.
For achieving the above object, the present invention provides following technical scheme:A kind of data protection system based on computing power System, including application server, the application server is electrically input into respectively connection system detector unit, virus checking system sum According to ciphering unit, the application server is electrically bi-directionally connected system backup unit, the electrical two-way company of the system backup unit Inquiry port is connect, the application server electrically exports connection data decryption unit, the electrical company of output of the data decryption unit Data recovery output is connect, the application server is also electrically bi-directionally connected mirror image server.
Preferably, the system detectio unit has detection and recovers function and autoimmune function, being capable of detecting system Information and it is former protect stored validity and authenticity, when program finds that system information is abnormal, can report wrong type with Position, and wait user to send recovery, preserve and reboot instruction, by the detection of native codes, to discriminate whether disease Poison infection, performs if necessary self-recovery function.
Preferably, the virus checking system is deposited and the principle propagated according to virus, to depositing in computer system Row virus scan.
Preferably, the DEU data encryption unit utilizes pseudorandom encryption algorithm, and a batch file is combined into encryption, encrypts The tissue and structure of cryptogam afterwards ensure that the convenience of the confidentiality of information and operation, while there is two classes to pass through inside it The location information of encryption, is respectively used to order decryption and part is decrypted.
Preferably, the data decryption unit can be according to the selection of user, executable portion decryption or all decryption, in part During decryption, program is decrypted first using the partial information in key string to the positioning table in file, then examines internal label The correctness of word simultaneously includes table of file name to select for user in screen, realizes that batch is decrypted, when all decryption are performed, journey Sequence completes order decryption according to the structure of file.
Preferably, the data recovery output includes that information checks module and data recovery module, and wherein information checks mould Block is used to check the integrity of each file under current directory, scans and perform under the catalogue all deleted files and by virus sense The restorability of the executable file of dye, data recovery module checks the integrity of each file under current directory, implements if necessary To deleted file and the recovery function of the executable file being infected.
Preferably, the mirror image server is synchronous with application server holding, and mirror image server and application server point It is not arranged on two different remote spots.
A kind of data optimization methods based on computing power, should be based on the concrete of the data optimization methods of computing power Step is as follows:
S1:By the resource parameters on the external client collecting computer of application server, and store to application server In;
S2:Storage resource parameters in the application server are carried out with virus scan using virus checking system, and by counting Pseudorandom encryption algorithm is utilized according to ciphering unit, the file in application server is will be stored in and is combined encryption;
S3:The file after encryption is handed down to into data decryption unit by application server, according to the selection of user, enforcement division Decompose close or all decryption;
S4:File after decryption is issued in the mobile client of association via data recovery output.
Compared with prior art, the invention has the beneficial effects as follows:The present invention is by recovery function, the encryption and decryption of computer data Function and anti-virus function combine together, are allowed to possessed more complete data security protecting function, and it is fixed that computer is carried out The cleaning optimization of phase, can make computer in good running status, and lift the performance of computer, and the present invention is allowed an individual to The initiative of resource for computer system distribution is grasped, it is determined that most rational resource distribution mode, it is ensured that the meter of just-plainfolk Calculation machine data safety and system safety, computer is solved from source because of Caton phenomenon caused by virus problems, improves use The experience at family, at the same it is synchronous with application server holding using mirror image server, the load of main frame being shared, can carry out in real time Backup.
Description of the drawings
Fig. 1 is principle of the invention block diagram.
In figure:1 application server, 2 system detectio units, 3 virus checking systems, 4 DEU data encryption units, 5 system backups Unit, 6 inquiry ports, 7 data decryption units, the output of 8 data recoveries, 9 mirror image servers.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is referred to, the present invention provides a kind of technical scheme:A kind of data protection system based on computing power, bag Application server 1 is included, the application server 1 is electrically input into respectively the connection system detector unit 2, sum of virus checking system 3 According to ciphering unit 4, the application server 1 is electrically bi-directionally connected system backup unit 5, and the system backup unit 5 is electrically double To Connection inquiring port 6, electrically output connects data decryption unit 7 to the application server 1, and the data decryption unit 7 is electric Property output connection data recovery output 8, the application server 1 is also electrically bi-directionally connected mirror image server 9.
Wherein, the system detectio unit 2 has detection and recovers function and autoimmune function, being capable of detecting system letter Breath and the stored validity of former guarantor and authenticity, when program finds that system information is abnormal, can report type and the portion of mistake Position, and wait user to send recovery, preserve and reboot instruction, it is viral to discriminate whether by the detection of native codes Infection, performs if necessary self-recovery function, and the virus checking system 3 is deposited and the principle propagated according to virus, to calculating The internal memory of machine system carries out virus scan, and the DEU data encryption unit 4 utilizes pseudorandom encryption algorithm, a batch file is carried out into group Encryption is closed, the tissue and structure of the cryptogam after encryption ensure that the confidentiality of information and the convenience of operation, while in it There is location information of two classes through encryption in portion, is respectively used to order decryption and part is decrypted, and the data decryption unit 7 can basis The selection of user, executable portion decryption or all decryption, when part is decrypted, program using the partial information in key string first Positioning table in file is decrypted, then examine internal signature correctness and by table of file name include in screen for Family selects, and realizes that batch is decrypted, and when all decryption are performed, program completes order decryption, the data according to the structure of file Recovering output 8 includes that information checks module and data recovery module, and wherein information checks that module is used to check each under current directory The integrity of file, scans and performs recovering for all deleted files under the catalogue and the executable file that is infected Property, data recovery module checks the integrity of each file under current directory, implements if necessary to deleted file and by virus sense The recovery function of the executable file of dye, the mirror image server 9 keeps synchronous with application server 1, and mirror image server 9 with Application server 1 is separately positioned on two different remote spots.
A kind of data optimization methods based on computing power, should be based on the concrete of the data optimization methods of computing power Step is as follows:
S1:By the resource parameters on the external client collecting computer of application server 1, and store to application server In 1;
S2:Virus scan is carried out using 3 pairs of resource parameters being stored in application server 1 of virus checking system, and by DEU data encryption unit 4 utilizes pseudorandom encryption algorithm, will be stored in the file in application server 1 and is combined encryption;
S3:The file after encryption is handed down to into data decryption unit 7 by application server 1, according to the selection of user, is performed Part decryption or all decryption;
S4:File after decryption is issued in the mobile client of association via data recovery output 8.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with Understanding can carry out various changes, modification, replacement to these embodiments without departing from the principles and spirit of the present invention And modification, the scope of the present invention be defined by the appended.

Claims (8)

1. a kind of data protection system based on computing power, including application server (1), it is characterised in that:The application Server (1) is electrically input into respectively connection system detector unit (2), virus checking system (3) and DEU data encryption unit (4), institute State application server (1) and be electrically bi-directionally connected system backup unit (5), the system backup unit (5) is electrically bi-directionally connected looks into Ask port (6), the application server (1) electrically output connection data decryption unit (7), data decryption unit (7) electricity Property output connection data recovery output (8), the application server (1) is also electrically bi-directionally connected mirror image server (9).
2. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The system Detector unit (2) with detection with recover function and autoimmune function, can detecting system information and former guarantor stored have Effect property and authenticity, when program finds that system information is abnormal, can report type and the position of mistake, and it is extensive to wait user to send Again, instruction is preserved and is rebooted, by the detection of native codes, to discriminate whether to be infected, itself is performed if necessary Recover function.
3. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The virus Inspection system (3) carries out virus scan according to virus deposit and the principle propagated to the internal memory of computer system.
4. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data One batch file is combined encryption by ciphering unit (4) using pseudorandom encryption algorithm, the tissue of the cryptogam after encryption and Structure ensure that the convenience of the confidentiality of information and operation, while have location information of two classes through encryption inside it, respectively Decrypt for order decryption and part.
5. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data Decryption unit (7) can be according to the selection of user, all executable portion decryption or decryption, and when part is decrypted, program utilizes key Partial information in string is decrypted first to the positioning table in file, then examines the correctness of internal signature and by filename Table is displayed in screen and is selected for user, realizes that batch is decrypted, and when all decryption are performed, program is completed according to the structure of file Order is decrypted.
6. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data Recover output (8) and check module and data recovery module including information, wherein information checks that module is used to check under current directory The integrity of each file, scan and perform all deleted files under the catalogue and the executable file that is infected can be extensive Renaturation, data recovery module checks the integrity of each file under current directory, implements if necessary to deleted file and viral The recovery function of the executable file of infection.
7. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The mirror image Server (9) is synchronous with application server (1) holding, and mirror image server (9) is separately positioned on two with application server (1) Different remote spots.
8. a kind of data optimization methods based on computing power, it is characterised in that:The data-optimized of computing power should be based on Method is comprised the following steps that:
S1:By the resource parameters on the external client collecting computer of application server (1), and store to application server (1) in;
S2:Using virus checking system (3) to being stored in application server (1) in resource parameters carry out virus scan, and by DEU data encryption unit (4) is combined encryption using pseudorandom encryption algorithm, the file that will be stored in application server (1);
S3:The file after encryption is handed down to into data decryption unit (7) by application server (1), according to the selection of user, is performed Part decryption or all decryption;
S4:During file after decryption is issued to the mobile client of association via data recovery output (8).
CN201611127501.1A 2016-12-09 2016-12-09 Data protection system and optimization method based on computer performance Withdrawn CN106599689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611127501.1A CN106599689A (en) 2016-12-09 2016-12-09 Data protection system and optimization method based on computer performance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611127501.1A CN106599689A (en) 2016-12-09 2016-12-09 Data protection system and optimization method based on computer performance

Publications (1)

Publication Number Publication Date
CN106599689A true CN106599689A (en) 2017-04-26

Family

ID=58598141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611127501.1A Withdrawn CN106599689A (en) 2016-12-09 2016-12-09 Data protection system and optimization method based on computer performance

Country Status (1)

Country Link
CN (1) CN106599689A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103389928A (en) * 2013-08-14 2013-11-13 陈谦 Computer data backup and recovery method
CN104850793A (en) * 2015-05-28 2015-08-19 成都中科创达软件有限公司 Android system intelligent control and management method
CN106529298A (en) * 2016-12-01 2017-03-22 新乡学院 Data protection system and data optimization method based on computer performance

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103389928A (en) * 2013-08-14 2013-11-13 陈谦 Computer data backup and recovery method
CN104850793A (en) * 2015-05-28 2015-08-19 成都中科创达软件有限公司 Android system intelligent control and management method
CN106529298A (en) * 2016-12-01 2017-03-22 新乡学院 Data protection system and data optimization method based on computer performance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨凡: "微型计算机磁盘数据的安全保护系统", 《浙江师范大学学报(自然科学版)》 *

Similar Documents

Publication Publication Date Title
CN109643359B (en) Verification of control key-value store
CN101237353B (en) A method and system for monitoring mobile storage device based on USBKEY
CN103546547B (en) A kind of cloud storage file encryption system
CN102842001B (en) System and method for detecting computer security information based on U disc authentication
CN101626368A (en) Device, method and system for preventing web page from being distorted
CN102088491A (en) Distributed storage oriented cloud storage security architecture and data access method thereof
CN106372499A (en) Systems and methods for securing virtual machine computing environments
CN101593389A (en) A kind of key management method and system that is used for the POS terminal
CN108293044A (en) System and method for detecting malware infection via domain name service flow analysis
CN103326856B (en) Cloud based on two-way digital signature stores data responsibility confirmation structure and method
CN104580061B (en) The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid
CN103577280A (en) Method and system for duplicating data
CN107567616A (en) Operating system management
CN106650422A (en) System and method for using TrustZone technology to prevent leakage of sensitive data of third-party input method
CN105530637A (en) Method for protecting subscriber privacy of intelligent terminal and intelligent terminal
MX2014015685A (en) Network based management of protected data sets.
CN106529298A (en) Data protection system and data optimization method based on computer performance
CN114637743A (en) Database operation method, system, storage medium and computer terminal
CN114039726B (en) Key generation method, key acquisition method, related device and medium
CN108304733A (en) Encryption data searching method and the data-storage system that search can be encrypted
CN101420299B (en) Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
CN105262668A (en) Firewall configuration for cloud computing network
Gupta et al. A light weight centralized file monitoring approach for securing files in cloud environment
CN106844006B (en) Based on the data prevention method and system under virtualized environment
CN106599689A (en) Data protection system and optimization method based on computer performance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170426