CN106599689A - Data protection system and optimization method based on computer performance - Google Patents
Data protection system and optimization method based on computer performance Download PDFInfo
- Publication number
- CN106599689A CN106599689A CN201611127501.1A CN201611127501A CN106599689A CN 106599689 A CN106599689 A CN 106599689A CN 201611127501 A CN201611127501 A CN 201611127501A CN 106599689 A CN106599689 A CN 106599689A
- Authority
- CN
- China
- Prior art keywords
- data
- application server
- decryption
- file
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses a data protection system and an optimization method based on computer performance in the field of the computer technology. The data protection system comprises an application server, wherein the application server is independently in electric input connection with a system detection unit, a virus checking system and a data encryption unit; the application server is in electric output connection with a data decryption unit; and the data decryption unit is in electric output connection with data recovery output. By use of the data protection system, the recovery function, the encryption and decryption function and the anti-virus function of computer data are combined into a whole, so that the data protection system has an integral data security protection function, the computer is cleaned and optimized in fixed time, the computer can be under a favorable operation state, the computer performance is improved, the computer data security and the system security of a common personal user can be guaranteed, a phenomenon that the computer is stuck due to a virus problem is solved from the source, and user experience is improved.
Description
Technical field
The present invention relates to field of computer technology, specially a kind of data protection based on computing power and optimization side
Method.
Background technology
In a computer network, data generally have two states:Storage state and transmission state.For a long time, data are passed
Integrality when defeated obtains people and more pays close attention to.No matter in storage state or in transmission state, data had both easily suffered people
For active attack, unartificial ANOMALOUS VARIATIONS is subject to again.Compared with transmission state, the data under storage state
Integrality should more receive publicity, the reason for this mainly has three aspects:One is that the existing user data of data of storage state has and is again
System data, and the data of transmission state are substantially then user data;Two is the number that the work of system relies primarily on storage state
According to, rather than the data of transmission state;Three is the rare system-level integrity protection of data of storage state, and transmission state
Data are then by the transmission mechanism of network there is provided integrity protection to a certain extent.
When computer meets with viral threat, can frequently there is Caton phenomenon, have a strong impact on the experience of user, meanwhile,
Computer after middle virus, easily lose by the personal information data of computer-internal, for this purpose, we have proposed a kind of based on calculating
The data protection of machine performance is come into operation with optimization method, to solve the above problems.
The content of the invention
It is an object of the invention to provide a kind of data protection and optimization method based on computing power, above-mentioned to solve
In background technology propose computer meet with viral threat when, can frequently there is Caton phenomenon, have a strong impact on the body of user
Test, meanwhile, computer after middle virus, the problem that the personal information data of computer-internal are easily lost.
For achieving the above object, the present invention provides following technical scheme:A kind of data protection system based on computing power
System, including application server, the application server is electrically input into respectively connection system detector unit, virus checking system sum
According to ciphering unit, the application server is electrically bi-directionally connected system backup unit, the electrical two-way company of the system backup unit
Inquiry port is connect, the application server electrically exports connection data decryption unit, the electrical company of output of the data decryption unit
Data recovery output is connect, the application server is also electrically bi-directionally connected mirror image server.
Preferably, the system detectio unit has detection and recovers function and autoimmune function, being capable of detecting system
Information and it is former protect stored validity and authenticity, when program finds that system information is abnormal, can report wrong type with
Position, and wait user to send recovery, preserve and reboot instruction, by the detection of native codes, to discriminate whether disease
Poison infection, performs if necessary self-recovery function.
Preferably, the virus checking system is deposited and the principle propagated according to virus, to depositing in computer system
Row virus scan.
Preferably, the DEU data encryption unit utilizes pseudorandom encryption algorithm, and a batch file is combined into encryption, encrypts
The tissue and structure of cryptogam afterwards ensure that the convenience of the confidentiality of information and operation, while there is two classes to pass through inside it
The location information of encryption, is respectively used to order decryption and part is decrypted.
Preferably, the data decryption unit can be according to the selection of user, executable portion decryption or all decryption, in part
During decryption, program is decrypted first using the partial information in key string to the positioning table in file, then examines internal label
The correctness of word simultaneously includes table of file name to select for user in screen, realizes that batch is decrypted, when all decryption are performed, journey
Sequence completes order decryption according to the structure of file.
Preferably, the data recovery output includes that information checks module and data recovery module, and wherein information checks mould
Block is used to check the integrity of each file under current directory, scans and perform under the catalogue all deleted files and by virus sense
The restorability of the executable file of dye, data recovery module checks the integrity of each file under current directory, implements if necessary
To deleted file and the recovery function of the executable file being infected.
Preferably, the mirror image server is synchronous with application server holding, and mirror image server and application server point
It is not arranged on two different remote spots.
A kind of data optimization methods based on computing power, should be based on the concrete of the data optimization methods of computing power
Step is as follows:
S1:By the resource parameters on the external client collecting computer of application server, and store to application server
In;
S2:Storage resource parameters in the application server are carried out with virus scan using virus checking system, and by counting
Pseudorandom encryption algorithm is utilized according to ciphering unit, the file in application server is will be stored in and is combined encryption;
S3:The file after encryption is handed down to into data decryption unit by application server, according to the selection of user, enforcement division
Decompose close or all decryption;
S4:File after decryption is issued in the mobile client of association via data recovery output.
Compared with prior art, the invention has the beneficial effects as follows:The present invention is by recovery function, the encryption and decryption of computer data
Function and anti-virus function combine together, are allowed to possessed more complete data security protecting function, and it is fixed that computer is carried out
The cleaning optimization of phase, can make computer in good running status, and lift the performance of computer, and the present invention is allowed an individual to
The initiative of resource for computer system distribution is grasped, it is determined that most rational resource distribution mode, it is ensured that the meter of just-plainfolk
Calculation machine data safety and system safety, computer is solved from source because of Caton phenomenon caused by virus problems, improves use
The experience at family, at the same it is synchronous with application server holding using mirror image server, the load of main frame being shared, can carry out in real time
Backup.
Description of the drawings
Fig. 1 is principle of the invention block diagram.
In figure:1 application server, 2 system detectio units, 3 virus checking systems, 4 DEU data encryption units, 5 system backups
Unit, 6 inquiry ports, 7 data decryption units, the output of 8 data recoveries, 9 mirror image servers.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is referred to, the present invention provides a kind of technical scheme:A kind of data protection system based on computing power, bag
Application server 1 is included, the application server 1 is electrically input into respectively the connection system detector unit 2, sum of virus checking system 3
According to ciphering unit 4, the application server 1 is electrically bi-directionally connected system backup unit 5, and the system backup unit 5 is electrically double
To Connection inquiring port 6, electrically output connects data decryption unit 7 to the application server 1, and the data decryption unit 7 is electric
Property output connection data recovery output 8, the application server 1 is also electrically bi-directionally connected mirror image server 9.
Wherein, the system detectio unit 2 has detection and recovers function and autoimmune function, being capable of detecting system letter
Breath and the stored validity of former guarantor and authenticity, when program finds that system information is abnormal, can report type and the portion of mistake
Position, and wait user to send recovery, preserve and reboot instruction, it is viral to discriminate whether by the detection of native codes
Infection, performs if necessary self-recovery function, and the virus checking system 3 is deposited and the principle propagated according to virus, to calculating
The internal memory of machine system carries out virus scan, and the DEU data encryption unit 4 utilizes pseudorandom encryption algorithm, a batch file is carried out into group
Encryption is closed, the tissue and structure of the cryptogam after encryption ensure that the confidentiality of information and the convenience of operation, while in it
There is location information of two classes through encryption in portion, is respectively used to order decryption and part is decrypted, and the data decryption unit 7 can basis
The selection of user, executable portion decryption or all decryption, when part is decrypted, program using the partial information in key string first
Positioning table in file is decrypted, then examine internal signature correctness and by table of file name include in screen for
Family selects, and realizes that batch is decrypted, and when all decryption are performed, program completes order decryption, the data according to the structure of file
Recovering output 8 includes that information checks module and data recovery module, and wherein information checks that module is used to check each under current directory
The integrity of file, scans and performs recovering for all deleted files under the catalogue and the executable file that is infected
Property, data recovery module checks the integrity of each file under current directory, implements if necessary to deleted file and by virus sense
The recovery function of the executable file of dye, the mirror image server 9 keeps synchronous with application server 1, and mirror image server 9 with
Application server 1 is separately positioned on two different remote spots.
A kind of data optimization methods based on computing power, should be based on the concrete of the data optimization methods of computing power
Step is as follows:
S1:By the resource parameters on the external client collecting computer of application server 1, and store to application server
In 1;
S2:Virus scan is carried out using 3 pairs of resource parameters being stored in application server 1 of virus checking system, and by
DEU data encryption unit 4 utilizes pseudorandom encryption algorithm, will be stored in the file in application server 1 and is combined encryption;
S3:The file after encryption is handed down to into data decryption unit 7 by application server 1, according to the selection of user, is performed
Part decryption or all decryption;
S4:File after decryption is issued in the mobile client of association via data recovery output 8.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
Understanding can carry out various changes, modification, replacement to these embodiments without departing from the principles and spirit of the present invention
And modification, the scope of the present invention be defined by the appended.
Claims (8)
1. a kind of data protection system based on computing power, including application server (1), it is characterised in that:The application
Server (1) is electrically input into respectively connection system detector unit (2), virus checking system (3) and DEU data encryption unit (4), institute
State application server (1) and be electrically bi-directionally connected system backup unit (5), the system backup unit (5) is electrically bi-directionally connected looks into
Ask port (6), the application server (1) electrically output connection data decryption unit (7), data decryption unit (7) electricity
Property output connection data recovery output (8), the application server (1) is also electrically bi-directionally connected mirror image server (9).
2. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The system
Detector unit (2) with detection with recover function and autoimmune function, can detecting system information and former guarantor stored have
Effect property and authenticity, when program finds that system information is abnormal, can report type and the position of mistake, and it is extensive to wait user to send
Again, instruction is preserved and is rebooted, by the detection of native codes, to discriminate whether to be infected, itself is performed if necessary
Recover function.
3. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The virus
Inspection system (3) carries out virus scan according to virus deposit and the principle propagated to the internal memory of computer system.
4. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data
One batch file is combined encryption by ciphering unit (4) using pseudorandom encryption algorithm, the tissue of the cryptogam after encryption and
Structure ensure that the convenience of the confidentiality of information and operation, while have location information of two classes through encryption inside it, respectively
Decrypt for order decryption and part.
5. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data
Decryption unit (7) can be according to the selection of user, all executable portion decryption or decryption, and when part is decrypted, program utilizes key
Partial information in string is decrypted first to the positioning table in file, then examines the correctness of internal signature and by filename
Table is displayed in screen and is selected for user, realizes that batch is decrypted, and when all decryption are performed, program is completed according to the structure of file
Order is decrypted.
6. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The data
Recover output (8) and check module and data recovery module including information, wherein information checks that module is used to check under current directory
The integrity of each file, scan and perform all deleted files under the catalogue and the executable file that is infected can be extensive
Renaturation, data recovery module checks the integrity of each file under current directory, implements if necessary to deleted file and viral
The recovery function of the executable file of infection.
7. a kind of data protection system based on computing power according to claim 1, it is characterised in that:The mirror image
Server (9) is synchronous with application server (1) holding, and mirror image server (9) is separately positioned on two with application server (1)
Different remote spots.
8. a kind of data optimization methods based on computing power, it is characterised in that:The data-optimized of computing power should be based on
Method is comprised the following steps that:
S1:By the resource parameters on the external client collecting computer of application server (1), and store to application server
(1) in;
S2:Using virus checking system (3) to being stored in application server (1) in resource parameters carry out virus scan, and by
DEU data encryption unit (4) is combined encryption using pseudorandom encryption algorithm, the file that will be stored in application server (1);
S3:The file after encryption is handed down to into data decryption unit (7) by application server (1), according to the selection of user, is performed
Part decryption or all decryption;
S4:During file after decryption is issued to the mobile client of association via data recovery output (8).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611127501.1A CN106599689A (en) | 2016-12-09 | 2016-12-09 | Data protection system and optimization method based on computer performance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611127501.1A CN106599689A (en) | 2016-12-09 | 2016-12-09 | Data protection system and optimization method based on computer performance |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106599689A true CN106599689A (en) | 2017-04-26 |
Family
ID=58598141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611127501.1A Withdrawn CN106599689A (en) | 2016-12-09 | 2016-12-09 | Data protection system and optimization method based on computer performance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106599689A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103389928A (en) * | 2013-08-14 | 2013-11-13 | 陈谦 | Computer data backup and recovery method |
CN104850793A (en) * | 2015-05-28 | 2015-08-19 | 成都中科创达软件有限公司 | Android system intelligent control and management method |
CN106529298A (en) * | 2016-12-01 | 2017-03-22 | 新乡学院 | Data protection system and data optimization method based on computer performance |
-
2016
- 2016-12-09 CN CN201611127501.1A patent/CN106599689A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103389928A (en) * | 2013-08-14 | 2013-11-13 | 陈谦 | Computer data backup and recovery method |
CN104850793A (en) * | 2015-05-28 | 2015-08-19 | 成都中科创达软件有限公司 | Android system intelligent control and management method |
CN106529298A (en) * | 2016-12-01 | 2017-03-22 | 新乡学院 | Data protection system and data optimization method based on computer performance |
Non-Patent Citations (1)
Title |
---|
杨凡: "微型计算机磁盘数据的安全保护系统", 《浙江师范大学学报(自然科学版)》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109643359B (en) | Verification of control key-value store | |
CN101237353B (en) | A method and system for monitoring mobile storage device based on USBKEY | |
CN103546547B (en) | A kind of cloud storage file encryption system | |
CN102842001B (en) | System and method for detecting computer security information based on U disc authentication | |
CN101626368A (en) | Device, method and system for preventing web page from being distorted | |
CN102088491A (en) | Distributed storage oriented cloud storage security architecture and data access method thereof | |
CN106372499A (en) | Systems and methods for securing virtual machine computing environments | |
CN101593389A (en) | A kind of key management method and system that is used for the POS terminal | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
CN103326856B (en) | Cloud based on two-way digital signature stores data responsibility confirmation structure and method | |
CN104580061B (en) | The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid | |
CN103577280A (en) | Method and system for duplicating data | |
CN107567616A (en) | Operating system management | |
CN106650422A (en) | System and method for using TrustZone technology to prevent leakage of sensitive data of third-party input method | |
CN105530637A (en) | Method for protecting subscriber privacy of intelligent terminal and intelligent terminal | |
MX2014015685A (en) | Network based management of protected data sets. | |
CN106529298A (en) | Data protection system and data optimization method based on computer performance | |
CN114637743A (en) | Database operation method, system, storage medium and computer terminal | |
CN114039726B (en) | Key generation method, key acquisition method, related device and medium | |
CN108304733A (en) | Encryption data searching method and the data-storage system that search can be encrypted | |
CN101420299B (en) | Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment | |
CN105262668A (en) | Firewall configuration for cloud computing network | |
Gupta et al. | A light weight centralized file monitoring approach for securing files in cloud environment | |
CN106844006B (en) | Based on the data prevention method and system under virtualized environment | |
CN106599689A (en) | Data protection system and optimization method based on computer performance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170426 |