CN107392039A - Computer hard disk data encrypting method and its device - Google Patents

Computer hard disk data encrypting method and its device Download PDF

Info

Publication number
CN107392039A
CN107392039A CN201710864520.0A CN201710864520A CN107392039A CN 107392039 A CN107392039 A CN 107392039A CN 201710864520 A CN201710864520 A CN 201710864520A CN 107392039 A CN107392039 A CN 107392039A
Authority
CN
China
Prior art keywords
computer
identity information
user
level
encryption device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710864520.0A
Other languages
Chinese (zh)
Other versions
CN107392039B (en
Inventor
李欢
贾成会
秦江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China University of Science and Technology
Original Assignee
North China University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China University of Science and Technology filed Critical North China University of Science and Technology
Priority to CN201710864520.0A priority Critical patent/CN107392039B/en
Publication of CN107392039A publication Critical patent/CN107392039A/en
Application granted granted Critical
Publication of CN107392039B publication Critical patent/CN107392039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Abstract

The invention discloses computer hard disk data encrypting method and its device, it is related to data encryption technology field, hard disc of computer is divided into concealed space and headspace, storage encryption file in concealed space, ordinary file is deposited in headspace, enter concealed space using with the encryption device control computer of the pluggable connection of computer, the license of encryption device is also required to the operation that file is encrypted in concealed space, concealed space is cannot be introduced into when not holding encryption device or without correct identity information, hard disc of computer is common hard disk for commonly used person, it can run conventional operating system and storage ordinary file, increase the identification difficulty of attacker, pluggable encryption device has very high crypticity simultaneously, increase attacker cracks difficulty.

Description

Computer hard disk data encrypting method and its device
Technical field
The present invention relates to data encryption technology field, more particularly to computer hard disk data encrypting method and its device.
Background technology
In current information-intensive society, information security has become a urgent problem to be solved, and information security is for each row Industry has important meaning, in order to solve information security issue, occurs numerous security products in the market.It is most common Surely belong to HD encryption product, and use following two cipher modes more in most of HD encryption product:Carried out in implantation hard disk Soft encryption, or hardware encryption is carried out between computer motherboard and hard disk.Although the former cost is low but cipher round results are bad Easily it is cracked, although the latter carries out hardware encryption using encryption chip improves secret grade, needs in main frame Portion is transformed, and the place transformed is easy to be found by attacker and then finds crack method.Therefore above two encryption Product not can solve the problem of encryption safe.
The content of the invention
The embodiments of the invention provide computer hard disk data encrypting method and its device, can solve to deposit in the prior art The problem of.
A kind of computer hard disk data encrypting method, this method comprise the following steps:
Encryption device connection is detected whether during computer booting self-test, if so, then sending body to the encryption device Part checking message;If it is not, the computer is by self-test and enters security system set in advance, security system peace In the headspace of hard disc of computer, the capacity of the hard disc of computer is made up of two parts:Concealed space and leave blank in advance Between, the concealed space internal memory is placed with operating system and encryption file, the headspace internal memory are placed with the security system And ordinary file;
The encryption device shows text prompt message corresponding with the certificate message, and is adopted by identity information The one-level identity information of acquisition means collection user's input;
The encryption device judges that the one-level identity information that user inputs is according to the reserved identity information prestored No correct, the computer by self-test and enters in the concealed space if if user, input is correct in restriction number Operating system, be otherwise directly entered the security system;
If user is operated by the external input equipment of the computer to the encryption file, the meter Calculation machine sends certificate message to the encryption device;
The encryption device shows text prompt message corresponding with the certificate message, and is believed by the identity Cease the two level identity information of harvester collection user's input;
The encryption device judges that the two level identity information that user inputs is according to the reserved identity information prestored No correct, if user have input correct two level identity information in restriction number, the computer responds user Operation to the encryption file carries out respective handling;Otherwise the computer refusal performs the operation of user;
When the computer is in the security system, the encryption device is connected to main frame by user After upper, the operation of the encryption device response user deposits the file encryption in the security system to the concealed space In;
When the computer is in the operating system of the concealed space, the operation of the encryption device response user By encryption file decryption and it is stored in the headspace.
Present invention also offers a kind of computer hard disk data encryption device, the encryption device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering the one-level identity information, two level identity information, three-level body of user's input Part information and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four body Part information, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
The reserved one-level identity information stored according to the storage device judges the one-level identity information that user inputs Whether correct, after user have input correct one-level identity information in restriction number, the computer, which enters, hides sky Between in operating system;
The reserved two level identity information stored according to the storage device judges the two level identity information that user inputs Whether correct, after user have input correct two level identity information in restriction number, the computer responds user Respective handling is carried out to the operation for encrypting file;
The reserved three-level identity information stored according to the storage device judges the three-level identity information that user inputs Whether correct, after user have input correct three-level identity information in restriction number, the data processing equipment passes through Built-in AES is back to the computer after file is encrypted, be stored in by computer in concealed space;
The reserved level Four identity information stored according to the storage device judges the level Four identity information that user inputs Whether correct, after user have input correct level Four identity information in restriction number, the data processing equipment uses File after decryption is stored in pre- by built-in decipherment algorithm to being back to the computer after encryption file decryption by computer In spacing.
Computer hard disk data encrypting method and its device in the embodiment of the present invention, hard disc of computer is divided into and hides sky Between and headspace, storage encryption file in concealed space, ordinary file is deposited in headspace, using pluggable with computer The encryption device control computer of connection enters concealed space, and encryption device is also required to the operation that file is encrypted in concealed space License, do not hold encryption device or without correct identity information when cannot be introduced into concealed space, to commonly used person Say that hard disc of computer is common hard disk, it can run conventional operating system and storage ordinary file, increase and attack The identification difficulty for the person of hitting, while pluggable encryption device has very high crypticity, increase attacker cracks difficulty.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is that a kind of Chinese literature teaching of flow chart of Computer fixed disk data enciphering method of the embodiment of the present invention is used The functional block diagram of accessory system.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Reference picture 1, the embodiments of the invention provide a kind of computer hard disk data encrypting method, this method includes following step Suddenly:
Step 100, detected whether that encryption device is connected by external interface during computer booting self-test, if so, then Certificate message is sent to the encryption device;If it is not, the computer is by self-test and enters set in advance Security system, the security system are arranged in the headspace of hard disc of computer, and the size of the headspace is common on the market Hard-disk capacity, such as 500GB, 1TB etc., it is the big of headspace to run the hard-disk capacity shown during the security system It is small.And the capacity of actually described hard disc of computer is made up of two parts, i.e. concealed space and headspace, i.e., described computer The actual capacity of hard disk is more than the size of headspace, and the concealed space internal memory is placed with encryption file, is filled without the encryption The encryption file can not be checked by the security system in the case of putting connection.
Display screen, type identity information collecting device, data processing equipment and storage device are installed on the encryption device.Its The pattern of common U disk is can be designed as, is connected by USB interface with the computer.
Step 110, the encryption device shows that text prompt corresponding with the certificate message disappears on a display screen Breath, and the one-level identity information inputted by type identity information collecting device collection user.The identity letter in the present embodiment It can be mechanical keyboard, touch keyboard, finger print input device, even vocal print input unit, iris scan device to cease harvester Deng.
Step 120, the encryption device judges the one-level body of user's input according to the reserved identity information prestored Whether part information is correct, and the computer by self-test and enters described hidden if if user, input is correct in restriction number The operating system in space is hidden, is otherwise directly entered the security system.The operating system can be identical with the security system, Different operating system can also be used, such as the SOS can be Windows operating system, and it is described hiding Operating system in space can be the operating systems such as Windows, DOS, LINUX, UNIX.In the operating system, user The encryption file being stored in concealed space can be checked.
In actual use, that more people use same computer often be present, more personal encryption files are common It is stored in the concealed space.If computer shows that the encryption file of whole is clearly improper after entering concealed space , the encryption partitions of file domain that can now deposit different users is deposited, and the encryption device is according to the one-level body of input It is that part information judges by which user, into the concealed space after the computer show encrypt corresponding with the user Document storage area domain, therefore a user is only capable of checking the encryption file of oneself storage, and the encryption of other users storage File is in sightless state to the user.
Step 130, into after the operating system in the concealed space, encryption device described in the computer real-time monitoring Connection status, if detecting that the encryption device disconnects the connection with the computer, the computer is immediately finished The process that is currently running simultaneously is shut down computer;If the encryption device is in normal connection status, the computer With the operation of normal condition response user.
Step 140, if user passes through the external input equipment of the computer, such as keyboard and mouse etc., to described Encryption file is operated, then the computer sends certificate message to the encryption device.To the encryption file Operation includes opening, movement, duplication, renaming, deletion etc..
Step 150, the encryption device shows that text prompt corresponding with the certificate message disappears on a display screen Breath, and the two level identity information inputted by type identity information collecting device collection user.The two level identity information can be with institute State and identity information is identical or different, such as set different passwords to be respectively used to the computer booting and enter hiding sky Between operating system and open encryption file, or one-level identity information and two level identity information are used as using the fingerprint of different fingers.
Step 160, the encryption device judges the two level body of user's input according to the reserved identity information prestored Whether part information is correct, if user have input correct two level identity information in restriction number, the computer rings Operation of the user to the encryption file is answered to carry out respective handling;Otherwise the computer refusal performs the operation of user simultaneously Show a prompt message.
Step 170, when the computer is in the security system, the encryption device can be connected to calculating On machine host, the file encryption in the security system can be now deposited into the concealed space.Certainly, in user During request storage file, the computer sends a certificate message to the encryption device, the encryption device and shown Text prompt message corresponding with the checking message, and gather the three-level that user is inputted by the type identity information collecting device Identity information, the encryption device judge whether the three-level identity information is correct, if user have input in restriction number Correct three-level identity information, then the file for needing to deposit is sent to the encryption device by the computer, filled by encryption Put and the computer is back to after file is encrypted by built-in AES, then described hide is stored in by computer In space.Otherwise the computer refusal performs the operation of user and shows a prompt message.It is described in the present embodiment Three-level identity information can be identical with the one-level identity information or two level identity information, or believes with the one-level identity The breath information different with two level identity information.
After completing file encryption and storage, the file in the security system system is unchanged, has good Crypticity.
Step 180, can be by encryption file decryption simultaneously when the computer is in the operating system of the concealed space It is stored in headspace.Certainly now need to input level Four identity information on the encryption device, by the encryption device Verify whether the level Four identity information of input is correct, added if correct as the decipherment algorithm pair built in the encryption device use Close file decryption, then the file after decryption is stored in the headspace by the computer.Institute in the present embodiment Stating level Four identity information can be identical with the one-level identity information, two level identity information or three-level identity information, or The information different from the one-level identity information, two level identity information and three-level identity information.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of computer hard disk data encryption device, should The implementation of device is referred to the implementation of the above method, repeats part and repeats no more.Described device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering the one-level identity information, two level identity information, three-level body of user's input Part information and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four body Part information, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
The reserved one-level identity information stored according to the storage device judges the one-level identity information that user inputs Whether correct, after user have input correct one-level identity information in restriction number, the computer, which enters, hides sky Between in operating system;
The reserved two level identity information stored according to the storage device judges the two level identity information that user inputs Whether correct, after user have input correct two level identity information in restriction number, the computer responds user Respective handling is carried out to the operation for encrypting file;
The reserved three-level identity information stored according to the storage device judges the three-level identity information that user inputs Whether correct, after user have input correct three-level identity information in restriction number, the data processing equipment passes through Built-in AES is back to the computer after file is encrypted, be stored in by computer in concealed space;
The reserved level Four identity information stored according to the storage device judges the level Four identity information that user inputs Whether correct, after user have input correct level Four identity information in restriction number, the data processing equipment uses File after decryption is stored in pre- by built-in decipherment algorithm to being back to the computer after encryption file decryption by computer In spacing.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (8)

1. a kind of computer hard disk data encrypting method, it is characterised in that this method comprises the following steps:
Encryption device connection has been detected whether during computer booting self-test, has been tested if so, then sending identity to the encryption device Demonstrate,prove message;If it is not, the computer is by self-test and enters security system set in advance, the security system is arranged on In the headspace of hard disc of computer, the capacity of the hard disc of computer is made up of two parts:Concealed space and headspace, institute State that concealed space internal memory is placed with operating system and encryption file, the headspace internal memory are placed with the security system and general Logical file;
The encryption device shows text prompt message corresponding with the certificate message, and is filled by identity information acquisition Put the one-level identity information of collection user's input;
Whether just the encryption device judges the one-level identity information of user's input according to the reserved identity information prestored Really, the computer passes through the behaviour in self-test and the entrance concealed space if if user, input is correct in restriction number Make system, be otherwise directly entered the security system;
If user is operated by the external input equipment of the computer to the encryption file, the computer Certificate message is sent to the encryption device;
The encryption device shows text prompt message corresponding with the certificate message, and is adopted by the identity information The two level identity information of acquisition means collection user's input;
Whether just the encryption device judges the two level identity information of user's input according to the reserved identity information prestored Really, if user have input correct two level identity information in restriction number, the computer responds user to institute The operation for stating encryption file carries out respective handling;Otherwise the computer refusal performs the operation of user;
When the computer is in the security system, the encryption device is connected on main frame by user Afterwards, the operation of the encryption device response user deposits the file encryption in the security system to the concealed space In;
When the computer is in the operating system of the concealed space, the operation of the encryption device response user will add Close file decryption is simultaneously stored in the headspace.
2. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that methods described also includes:
Into after the operating system in the concealed space, the connection status of encryption device described in the computer real-time monitoring, If detecting that the encryption device disconnects the connection with the computer, the computer, which is immediately finished, to be currently running Process and shut down computer.
3. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the encryption device is USB flash disk shape Formula, it is connected by USB interface with the computer.
4. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the type identity information collecting device For mechanical keyboard, touch keyboard, finger print input device, even vocal print input unit, iris scan device.
5. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the computer is according to Before encryption device enters the operating system of the concealed space to the judged result of one-level identity information, the encryption device according to It is that the one-level identity information of input judges by which user, into the concealed space after the Computer display and the user Corresponding encryption document storage area domain.
6. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that encryption device described in step responds File encryption in the security system is deposited into the concealed space and specifically included by the operation of user:
When user asks storage file, the computer sends a certificate message to the encryption device, described Encryption device shows text prompt message corresponding with the checking message, and gathers user and filled by the identity information acquisition The three-level identity information of input is put, the encryption device judges whether the three-level identity information is correct, if user is limiting Correct three-level identity information is have input in number, then the file for needing to deposit is sent to the encryption by the computer and filled Put, the computer is back to after file is encrypted by built-in AES by encryption device, then deposited by computer It is placed in the concealed space;Otherwise the computer refusal performs the operation of user and shows a prompt message.
7. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that encryption device described in step responds The operation of user will be encrypted file decryption and be stored in the headspace and specifically includes:
Now user is needed to input level Four identity information on the encryption device, and the four of input are verified by the encryption device Whether level identity information is correct, as the decipherment algorithm built in the encryption device use to encrypting file decryption if correct, Then the file after decryption is stored in the headspace by the computer.
8. a kind of computer hard disk data encryption device, it is characterised in that the encryption device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering one-level identity information, two level identity information, three-level the identity letter of user's input Breath and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four identity letter Breath, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
According to the storage device store reserved one-level identity information judge user input one-level identity information whether Correctly, after user have input correct one-level identity information in restriction number, the computer enters in concealed space Operating system;
According to the storage device store reserved two level identity information judge user input two level identity information whether Correctly, after user have input correct two level identity information in restriction number, the computer response user couple adds The operation of ciphertext part carries out respective handling;
According to the storage device store reserved three-level identity information judge user input three-level identity information whether Correctly, after user have input correct three-level identity information in restriction number, the data processing equipment passes through built-in AES file is encrypted after be back to the computer, be stored in by computer in concealed space;
According to the storage device store reserved level Four identity information judge user input level Four identity information whether Correctly, after user have input correct level Four identity information in restriction number, built in the data processing equipment use Decipherment algorithm to encryption file decryption after be back to the computer, the file after decryption is stored in pre- leave blank by computer Between in.
CN201710864520.0A 2017-09-22 2017-09-22 Computer hard disk data encryption method and device Active CN107392039B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710864520.0A CN107392039B (en) 2017-09-22 2017-09-22 Computer hard disk data encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710864520.0A CN107392039B (en) 2017-09-22 2017-09-22 Computer hard disk data encryption method and device

Publications (2)

Publication Number Publication Date
CN107392039A true CN107392039A (en) 2017-11-24
CN107392039B CN107392039B (en) 2020-06-30

Family

ID=60351072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710864520.0A Active CN107392039B (en) 2017-09-22 2017-09-22 Computer hard disk data encryption method and device

Country Status (1)

Country Link
CN (1) CN107392039B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038568A (en) * 2007-04-16 2007-09-19 丁万年 Method and device for encrypting date of external computer hard disk.
CN101986325A (en) * 2010-11-01 2011-03-16 山东超越数控电子有限公司 Computer security access control system and method
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN106156562A (en) * 2016-06-28 2016-11-23 努比亚技术有限公司 A kind of private space protection device, mobile terminal and method
CN107066868A (en) * 2017-03-28 2017-08-18 北京洋浦伟业科技发展有限公司 A kind of data guard method and device of identity-based certification
CN107092836A (en) * 2017-03-29 2017-08-25 北京洋浦伟业科技发展有限公司 A kind of data guard method and device based on system encryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038568A (en) * 2007-04-16 2007-09-19 丁万年 Method and device for encrypting date of external computer hard disk.
CN101986325A (en) * 2010-11-01 2011-03-16 山东超越数控电子有限公司 Computer security access control system and method
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN106156562A (en) * 2016-06-28 2016-11-23 努比亚技术有限公司 A kind of private space protection device, mobile terminal and method
CN107066868A (en) * 2017-03-28 2017-08-18 北京洋浦伟业科技发展有限公司 A kind of data guard method and device of identity-based certification
CN107092836A (en) * 2017-03-29 2017-08-25 北京洋浦伟业科技发展有限公司 A kind of data guard method and device based on system encryption

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security

Also Published As

Publication number Publication date
CN107392039B (en) 2020-06-30

Similar Documents

Publication Publication Date Title
Barkadehi et al. Authentication systems: A literature review and classification
US10992659B2 (en) Multi-factor authentication devices
Bulling et al. Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
Gao et al. A survey on the use of graphical passwords in security.
CN106713241B (en) A kind of auth method, device and system
Bartłomiejczyk et al. Multifactor authentication protocol in a mobile environment
Por et al. Graphical password: prevent shoulder-surfing attack using digraph substitution rules
CN101529366A (en) Identification and visualization of trusted user interface objects
US9477823B1 (en) Systems and methods for performing security authentication based on responses to observed stimuli
EP2981922A1 (en) Method and system for distinguishing humans from machines and for controlling access to network services
CN108229220B (en) System and method for trusted presentation of information on untrusted user devices
Kuber et al. Feasibility study of tactile-based authentication
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
Furnell Securing information and communications systems: Principles, technologies, and applications
KR101363668B1 (en) Apparatus and method for authentication user using captcha
CN111143812A (en) Login authentication method based on graph
CN106778326A (en) A kind of method and system for realizing movable storage device protection
US20180159686A1 (en) Method and a system for generating a multi-factor authentication code
CN107392039A (en) Computer hard disk data encrypting method and its device
KR101600474B1 (en) Authentication method by salted password
Alsaiari Graphical one-time password authentication
Farmand et al. Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4)
CN106656495B (en) A kind of method and device of user password storage
CN105354462B (en) A kind of guard method of mobile memory and mobile memory
Cain et al. A rapid serial visual presentation method for graphical authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant