CN107392039A - Computer hard disk data encrypting method and its device - Google Patents
Computer hard disk data encrypting method and its device Download PDFInfo
- Publication number
- CN107392039A CN107392039A CN201710864520.0A CN201710864520A CN107392039A CN 107392039 A CN107392039 A CN 107392039A CN 201710864520 A CN201710864520 A CN 201710864520A CN 107392039 A CN107392039 A CN 107392039A
- Authority
- CN
- China
- Prior art keywords
- computer
- identity information
- user
- level
- encryption device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
Abstract
The invention discloses computer hard disk data encrypting method and its device, it is related to data encryption technology field, hard disc of computer is divided into concealed space and headspace, storage encryption file in concealed space, ordinary file is deposited in headspace, enter concealed space using with the encryption device control computer of the pluggable connection of computer, the license of encryption device is also required to the operation that file is encrypted in concealed space, concealed space is cannot be introduced into when not holding encryption device or without correct identity information, hard disc of computer is common hard disk for commonly used person, it can run conventional operating system and storage ordinary file, increase the identification difficulty of attacker, pluggable encryption device has very high crypticity simultaneously, increase attacker cracks difficulty.
Description
Technical field
The present invention relates to data encryption technology field, more particularly to computer hard disk data encrypting method and its device.
Background technology
In current information-intensive society, information security has become a urgent problem to be solved, and information security is for each row
Industry has important meaning, in order to solve information security issue, occurs numerous security products in the market.It is most common
Surely belong to HD encryption product, and use following two cipher modes more in most of HD encryption product:Carried out in implantation hard disk
Soft encryption, or hardware encryption is carried out between computer motherboard and hard disk.Although the former cost is low but cipher round results are bad
Easily it is cracked, although the latter carries out hardware encryption using encryption chip improves secret grade, needs in main frame
Portion is transformed, and the place transformed is easy to be found by attacker and then finds crack method.Therefore above two encryption
Product not can solve the problem of encryption safe.
The content of the invention
The embodiments of the invention provide computer hard disk data encrypting method and its device, can solve to deposit in the prior art
The problem of.
A kind of computer hard disk data encrypting method, this method comprise the following steps:
Encryption device connection is detected whether during computer booting self-test, if so, then sending body to the encryption device
Part checking message;If it is not, the computer is by self-test and enters security system set in advance, security system peace
In the headspace of hard disc of computer, the capacity of the hard disc of computer is made up of two parts:Concealed space and leave blank in advance
Between, the concealed space internal memory is placed with operating system and encryption file, the headspace internal memory are placed with the security system
And ordinary file;
The encryption device shows text prompt message corresponding with the certificate message, and is adopted by identity information
The one-level identity information of acquisition means collection user's input;
The encryption device judges that the one-level identity information that user inputs is according to the reserved identity information prestored
No correct, the computer by self-test and enters in the concealed space if if user, input is correct in restriction number
Operating system, be otherwise directly entered the security system;
If user is operated by the external input equipment of the computer to the encryption file, the meter
Calculation machine sends certificate message to the encryption device;
The encryption device shows text prompt message corresponding with the certificate message, and is believed by the identity
Cease the two level identity information of harvester collection user's input;
The encryption device judges that the two level identity information that user inputs is according to the reserved identity information prestored
No correct, if user have input correct two level identity information in restriction number, the computer responds user
Operation to the encryption file carries out respective handling;Otherwise the computer refusal performs the operation of user;
When the computer is in the security system, the encryption device is connected to main frame by user
After upper, the operation of the encryption device response user deposits the file encryption in the security system to the concealed space
In;
When the computer is in the operating system of the concealed space, the operation of the encryption device response user
By encryption file decryption and it is stored in the headspace.
Present invention also offers a kind of computer hard disk data encryption device, the encryption device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering the one-level identity information, two level identity information, three-level body of user's input
Part information and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four body
Part information, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
The reserved one-level identity information stored according to the storage device judges the one-level identity information that user inputs
Whether correct, after user have input correct one-level identity information in restriction number, the computer, which enters, hides sky
Between in operating system;
The reserved two level identity information stored according to the storage device judges the two level identity information that user inputs
Whether correct, after user have input correct two level identity information in restriction number, the computer responds user
Respective handling is carried out to the operation for encrypting file;
The reserved three-level identity information stored according to the storage device judges the three-level identity information that user inputs
Whether correct, after user have input correct three-level identity information in restriction number, the data processing equipment passes through
Built-in AES is back to the computer after file is encrypted, be stored in by computer in concealed space;
The reserved level Four identity information stored according to the storage device judges the level Four identity information that user inputs
Whether correct, after user have input correct level Four identity information in restriction number, the data processing equipment uses
File after decryption is stored in pre- by built-in decipherment algorithm to being back to the computer after encryption file decryption by computer
In spacing.
Computer hard disk data encrypting method and its device in the embodiment of the present invention, hard disc of computer is divided into and hides sky
Between and headspace, storage encryption file in concealed space, ordinary file is deposited in headspace, using pluggable with computer
The encryption device control computer of connection enters concealed space, and encryption device is also required to the operation that file is encrypted in concealed space
License, do not hold encryption device or without correct identity information when cannot be introduced into concealed space, to commonly used person
Say that hard disc of computer is common hard disk, it can run conventional operating system and storage ordinary file, increase and attack
The identification difficulty for the person of hitting, while pluggable encryption device has very high crypticity, increase attacker cracks difficulty.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is that a kind of Chinese literature teaching of flow chart of Computer fixed disk data enciphering method of the embodiment of the present invention is used
The functional block diagram of accessory system.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Reference picture 1, the embodiments of the invention provide a kind of computer hard disk data encrypting method, this method includes following step
Suddenly:
Step 100, detected whether that encryption device is connected by external interface during computer booting self-test, if so, then
Certificate message is sent to the encryption device;If it is not, the computer is by self-test and enters set in advance
Security system, the security system are arranged in the headspace of hard disc of computer, and the size of the headspace is common on the market
Hard-disk capacity, such as 500GB, 1TB etc., it is the big of headspace to run the hard-disk capacity shown during the security system
It is small.And the capacity of actually described hard disc of computer is made up of two parts, i.e. concealed space and headspace, i.e., described computer
The actual capacity of hard disk is more than the size of headspace, and the concealed space internal memory is placed with encryption file, is filled without the encryption
The encryption file can not be checked by the security system in the case of putting connection.
Display screen, type identity information collecting device, data processing equipment and storage device are installed on the encryption device.Its
The pattern of common U disk is can be designed as, is connected by USB interface with the computer.
Step 110, the encryption device shows that text prompt corresponding with the certificate message disappears on a display screen
Breath, and the one-level identity information inputted by type identity information collecting device collection user.The identity letter in the present embodiment
It can be mechanical keyboard, touch keyboard, finger print input device, even vocal print input unit, iris scan device to cease harvester
Deng.
Step 120, the encryption device judges the one-level body of user's input according to the reserved identity information prestored
Whether part information is correct, and the computer by self-test and enters described hidden if if user, input is correct in restriction number
The operating system in space is hidden, is otherwise directly entered the security system.The operating system can be identical with the security system,
Different operating system can also be used, such as the SOS can be Windows operating system, and it is described hiding
Operating system in space can be the operating systems such as Windows, DOS, LINUX, UNIX.In the operating system, user
The encryption file being stored in concealed space can be checked.
In actual use, that more people use same computer often be present, more personal encryption files are common
It is stored in the concealed space.If computer shows that the encryption file of whole is clearly improper after entering concealed space
, the encryption partitions of file domain that can now deposit different users is deposited, and the encryption device is according to the one-level body of input
It is that part information judges by which user, into the concealed space after the computer show encrypt corresponding with the user
Document storage area domain, therefore a user is only capable of checking the encryption file of oneself storage, and the encryption of other users storage
File is in sightless state to the user.
Step 130, into after the operating system in the concealed space, encryption device described in the computer real-time monitoring
Connection status, if detecting that the encryption device disconnects the connection with the computer, the computer is immediately finished
The process that is currently running simultaneously is shut down computer;If the encryption device is in normal connection status, the computer
With the operation of normal condition response user.
Step 140, if user passes through the external input equipment of the computer, such as keyboard and mouse etc., to described
Encryption file is operated, then the computer sends certificate message to the encryption device.To the encryption file
Operation includes opening, movement, duplication, renaming, deletion etc..
Step 150, the encryption device shows that text prompt corresponding with the certificate message disappears on a display screen
Breath, and the two level identity information inputted by type identity information collecting device collection user.The two level identity information can be with institute
State and identity information is identical or different, such as set different passwords to be respectively used to the computer booting and enter hiding sky
Between operating system and open encryption file, or one-level identity information and two level identity information are used as using the fingerprint of different fingers.
Step 160, the encryption device judges the two level body of user's input according to the reserved identity information prestored
Whether part information is correct, if user have input correct two level identity information in restriction number, the computer rings
Operation of the user to the encryption file is answered to carry out respective handling;Otherwise the computer refusal performs the operation of user simultaneously
Show a prompt message.
Step 170, when the computer is in the security system, the encryption device can be connected to calculating
On machine host, the file encryption in the security system can be now deposited into the concealed space.Certainly, in user
During request storage file, the computer sends a certificate message to the encryption device, the encryption device and shown
Text prompt message corresponding with the checking message, and gather the three-level that user is inputted by the type identity information collecting device
Identity information, the encryption device judge whether the three-level identity information is correct, if user have input in restriction number
Correct three-level identity information, then the file for needing to deposit is sent to the encryption device by the computer, filled by encryption
Put and the computer is back to after file is encrypted by built-in AES, then described hide is stored in by computer
In space.Otherwise the computer refusal performs the operation of user and shows a prompt message.It is described in the present embodiment
Three-level identity information can be identical with the one-level identity information or two level identity information, or believes with the one-level identity
The breath information different with two level identity information.
After completing file encryption and storage, the file in the security system system is unchanged, has good
Crypticity.
Step 180, can be by encryption file decryption simultaneously when the computer is in the operating system of the concealed space
It is stored in headspace.Certainly now need to input level Four identity information on the encryption device, by the encryption device
Verify whether the level Four identity information of input is correct, added if correct as the decipherment algorithm pair built in the encryption device use
Close file decryption, then the file after decryption is stored in the headspace by the computer.Institute in the present embodiment
Stating level Four identity information can be identical with the one-level identity information, two level identity information or three-level identity information, or
The information different from the one-level identity information, two level identity information and three-level identity information.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of computer hard disk data encryption device, should
The implementation of device is referred to the implementation of the above method, repeats part and repeats no more.Described device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering the one-level identity information, two level identity information, three-level body of user's input
Part information and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four body
Part information, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
The reserved one-level identity information stored according to the storage device judges the one-level identity information that user inputs
Whether correct, after user have input correct one-level identity information in restriction number, the computer, which enters, hides sky
Between in operating system;
The reserved two level identity information stored according to the storage device judges the two level identity information that user inputs
Whether correct, after user have input correct two level identity information in restriction number, the computer responds user
Respective handling is carried out to the operation for encrypting file;
The reserved three-level identity information stored according to the storage device judges the three-level identity information that user inputs
Whether correct, after user have input correct three-level identity information in restriction number, the data processing equipment passes through
Built-in AES is back to the computer after file is encrypted, be stored in by computer in concealed space;
The reserved level Four identity information stored according to the storage device judges the level Four identity information that user inputs
Whether correct, after user have input correct level Four identity information in restriction number, the data processing equipment uses
File after decryption is stored in pre- by built-in decipherment algorithm to being back to the computer after encryption file decryption by computer
In spacing.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (8)
1. a kind of computer hard disk data encrypting method, it is characterised in that this method comprises the following steps:
Encryption device connection has been detected whether during computer booting self-test, has been tested if so, then sending identity to the encryption device
Demonstrate,prove message;If it is not, the computer is by self-test and enters security system set in advance, the security system is arranged on
In the headspace of hard disc of computer, the capacity of the hard disc of computer is made up of two parts:Concealed space and headspace, institute
State that concealed space internal memory is placed with operating system and encryption file, the headspace internal memory are placed with the security system and general
Logical file;
The encryption device shows text prompt message corresponding with the certificate message, and is filled by identity information acquisition
Put the one-level identity information of collection user's input;
Whether just the encryption device judges the one-level identity information of user's input according to the reserved identity information prestored
Really, the computer passes through the behaviour in self-test and the entrance concealed space if if user, input is correct in restriction number
Make system, be otherwise directly entered the security system;
If user is operated by the external input equipment of the computer to the encryption file, the computer
Certificate message is sent to the encryption device;
The encryption device shows text prompt message corresponding with the certificate message, and is adopted by the identity information
The two level identity information of acquisition means collection user's input;
Whether just the encryption device judges the two level identity information of user's input according to the reserved identity information prestored
Really, if user have input correct two level identity information in restriction number, the computer responds user to institute
The operation for stating encryption file carries out respective handling;Otherwise the computer refusal performs the operation of user;
When the computer is in the security system, the encryption device is connected on main frame by user
Afterwards, the operation of the encryption device response user deposits the file encryption in the security system to the concealed space
In;
When the computer is in the operating system of the concealed space, the operation of the encryption device response user will add
Close file decryption is simultaneously stored in the headspace.
2. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that methods described also includes:
Into after the operating system in the concealed space, the connection status of encryption device described in the computer real-time monitoring,
If detecting that the encryption device disconnects the connection with the computer, the computer, which is immediately finished, to be currently running
Process and shut down computer.
3. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the encryption device is USB flash disk shape
Formula, it is connected by USB interface with the computer.
4. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the type identity information collecting device
For mechanical keyboard, touch keyboard, finger print input device, even vocal print input unit, iris scan device.
5. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that the computer is according to
Before encryption device enters the operating system of the concealed space to the judged result of one-level identity information, the encryption device according to
It is that the one-level identity information of input judges by which user, into the concealed space after the Computer display and the user
Corresponding encryption document storage area domain.
6. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that encryption device described in step responds
File encryption in the security system is deposited into the concealed space and specifically included by the operation of user:
When user asks storage file, the computer sends a certificate message to the encryption device, described
Encryption device shows text prompt message corresponding with the checking message, and gathers user and filled by the identity information acquisition
The three-level identity information of input is put, the encryption device judges whether the three-level identity information is correct, if user is limiting
Correct three-level identity information is have input in number, then the file for needing to deposit is sent to the encryption by the computer and filled
Put, the computer is back to after file is encrypted by built-in AES by encryption device, then deposited by computer
It is placed in the concealed space;Otherwise the computer refusal performs the operation of user and shows a prompt message.
7. computer hard disk data encrypting method as claimed in claim 1, it is characterised in that encryption device described in step responds
The operation of user will be encrypted file decryption and be stored in the headspace and specifically includes:
Now user is needed to input level Four identity information on the encryption device, and the four of input are verified by the encryption device
Whether level identity information is correct, as the decipherment algorithm built in the encryption device use to encrypting file decryption if correct,
Then the file after decryption is stored in the headspace by the computer.
8. a kind of computer hard disk data encryption device, it is characterised in that the encryption device includes:
Display screen, for showing text prompt message corresponding with the certificate message of computer transmission;
Type identity information collecting device, for gathering one-level identity information, two level identity information, three-level the identity letter of user's input
Breath and level Four identity information;
Storage device, for storing reserved one-level identity information, two level identity information, three-level identity information and level Four identity letter
Breath, and storage have a plurality of instruction, and the instruction is loaded and performed by data processing equipment:
According to the storage device store reserved one-level identity information judge user input one-level identity information whether
Correctly, after user have input correct one-level identity information in restriction number, the computer enters in concealed space
Operating system;
According to the storage device store reserved two level identity information judge user input two level identity information whether
Correctly, after user have input correct two level identity information in restriction number, the computer response user couple adds
The operation of ciphertext part carries out respective handling;
According to the storage device store reserved three-level identity information judge user input three-level identity information whether
Correctly, after user have input correct three-level identity information in restriction number, the data processing equipment passes through built-in
AES file is encrypted after be back to the computer, be stored in by computer in concealed space;
According to the storage device store reserved level Four identity information judge user input level Four identity information whether
Correctly, after user have input correct level Four identity information in restriction number, built in the data processing equipment use
Decipherment algorithm to encryption file decryption after be back to the computer, the file after decryption is stored in pre- leave blank by computer
Between in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710864520.0A CN107392039B (en) | 2017-09-22 | 2017-09-22 | Computer hard disk data encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710864520.0A CN107392039B (en) | 2017-09-22 | 2017-09-22 | Computer hard disk data encryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107392039A true CN107392039A (en) | 2017-11-24 |
CN107392039B CN107392039B (en) | 2020-06-30 |
Family
ID=60351072
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710864520.0A Active CN107392039B (en) | 2017-09-22 | 2017-09-22 | Computer hard disk data encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392039B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472390A (en) * | 2019-08-15 | 2019-11-19 | 江苏建筑职业技术学院 | A method of protection computer system security |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101038568A (en) * | 2007-04-16 | 2007-09-19 | 丁万年 | Method and device for encrypting date of external computer hard disk. |
CN101986325A (en) * | 2010-11-01 | 2011-03-16 | 山东超越数控电子有限公司 | Computer security access control system and method |
CN103294941A (en) * | 2012-02-22 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Method for accessing private space and mobile device |
CN103577761A (en) * | 2013-10-25 | 2014-02-12 | 北京奇虎科技有限公司 | Method and device for processing privacy data in mobile equipment |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN107066868A (en) * | 2017-03-28 | 2017-08-18 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device of identity-based certification |
CN107092836A (en) * | 2017-03-29 | 2017-08-25 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device based on system encryption |
-
2017
- 2017-09-22 CN CN201710864520.0A patent/CN107392039B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101038568A (en) * | 2007-04-16 | 2007-09-19 | 丁万年 | Method and device for encrypting date of external computer hard disk. |
CN101986325A (en) * | 2010-11-01 | 2011-03-16 | 山东超越数控电子有限公司 | Computer security access control system and method |
CN103294941A (en) * | 2012-02-22 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Method for accessing private space and mobile device |
CN103577761A (en) * | 2013-10-25 | 2014-02-12 | 北京奇虎科技有限公司 | Method and device for processing privacy data in mobile equipment |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN107066868A (en) * | 2017-03-28 | 2017-08-18 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device of identity-based certification |
CN107092836A (en) * | 2017-03-29 | 2017-08-25 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device based on system encryption |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472390A (en) * | 2019-08-15 | 2019-11-19 | 江苏建筑职业技术学院 | A method of protection computer system security |
Also Published As
Publication number | Publication date |
---|---|
CN107392039B (en) | 2020-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barkadehi et al. | Authentication systems: A literature review and classification | |
US10992659B2 (en) | Multi-factor authentication devices | |
Bulling et al. | Increasing the security of gaze-based cued-recall graphical passwords using saliency masks | |
Gao et al. | A survey on the use of graphical passwords in security. | |
CN106713241B (en) | A kind of auth method, device and system | |
Bartłomiejczyk et al. | Multifactor authentication protocol in a mobile environment | |
Por et al. | Graphical password: prevent shoulder-surfing attack using digraph substitution rules | |
CN101529366A (en) | Identification and visualization of trusted user interface objects | |
US9477823B1 (en) | Systems and methods for performing security authentication based on responses to observed stimuli | |
EP2981922A1 (en) | Method and system for distinguishing humans from machines and for controlling access to network services | |
CN108229220B (en) | System and method for trusted presentation of information on untrusted user devices | |
Kuber et al. | Feasibility study of tactile-based authentication | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
Furnell | Securing information and communications systems: Principles, technologies, and applications | |
KR101363668B1 (en) | Apparatus and method for authentication user using captcha | |
CN111143812A (en) | Login authentication method based on graph | |
CN106778326A (en) | A kind of method and system for realizing movable storage device protection | |
US20180159686A1 (en) | Method and a system for generating a multi-factor authentication code | |
CN107392039A (en) | Computer hard disk data encrypting method and its device | |
KR101600474B1 (en) | Authentication method by salted password | |
Alsaiari | Graphical one-time password authentication | |
Farmand et al. | Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4) | |
CN106656495B (en) | A kind of method and device of user password storage | |
CN105354462B (en) | A kind of guard method of mobile memory and mobile memory | |
Cain et al. | A rapid serial visual presentation method for graphical authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |