CN111737768A - Computer encryption and decryption method - Google Patents
Computer encryption and decryption method Download PDFInfo
- Publication number
- CN111737768A CN111737768A CN201910822935.0A CN201910822935A CN111737768A CN 111737768 A CN111737768 A CN 111737768A CN 201910822935 A CN201910822935 A CN 201910822935A CN 111737768 A CN111737768 A CN 111737768A
- Authority
- CN
- China
- Prior art keywords
- computer
- terminal
- encryption
- input
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption and decryption method of a computer, which comprises a user end and a password unlocking end, wherein the output end of the user end is the password unlocking end, the output end of the password unlocking end is a computer end, the output end of the computer end is provided with an expanded interface end, a USB interface end, a power end, a cloud end and an alarm end, the computer end and the password unlocking end are mutually input and output ends, the computer end and the expanded interface end are mutually input and output ends, the computer end and the USB interface end are mutually input and output ends, the computer end and the power end are mutually input and output ends, the computer end and the password unlocking end are mutually input and output ends, the computer end and the cloud end are mutually input and output ends, a file is destroyed after being transferred, meanwhile, the cloud end unlocking can be carried out, and the use of a real owner can be conveniently granted with rights, the password is convenient and does not need to be informed to other people, so that the safety is improved.
Description
Technical Field
The invention belongs to the technical field related to computer systems, and particularly relates to an encryption and decryption method for a computer.
Background
Computer systems refer to computer hardware and software and network systems used for database management, which require a large main memory to store and run operating systems, database management system programs, application programs, and databases, directories, system buffers, etc., while auxiliary memory requires a large direct access device.
The prior computer encryption and decryption method technology has the following problems: at present, a computer encryption and decryption method still stays in a single module for encryption and decryption, namely, interaction with an actual computer owner cannot be carried out through a cloud in the encryption and decryption process, the encryption and decryption mode is single, the anti-theft attribute is low, and increasingly severe anti-theft requirements cannot be met.
Disclosure of Invention
The invention aims to provide a computer encryption and decryption method, which aims to solve the problems that the existing computer encryption and decryption method proposed in the background technology still stays in a single module for encryption and decryption, namely, interaction with an actual computer owner cannot be carried out through a cloud end in the encryption and decryption process, the encryption and decryption mode is single, the anti-theft property is low, and increasingly severe anti-theft requirements cannot be met.
In order to achieve the purpose, the invention provides the following technical scheme:
an encryption and decryption method for a computer comprises a user side and a password unlocking end, wherein the output end of the user side is the password unlocking end, the output end of the password unlocking end is a computer end, the output end of the computer end is provided with an expanded interface end, a USB interface end, a power end, a cloud end and an alarm end, the computer end and the password unlocking end are input and output ends with each other, the computer end and the expanded interface end are input and output ends with each other, the computer end and the USB interface end are input and output ends with each other, the computer end and the power end are input and output ends with each other, the computer end and the password unlocking end are input and output ends with each other, the computer end and the cloud end are input and output ends with each other, the other output end of the cloud end is a handheld terminal, the handheld terminal and the cloud end are input and output ends with each other, and the output end of, the handheld terminal and the alarm end are input and output ends of each other, and the output end of the other end of the handheld terminal is a password unlocking end.
Preferably, the operation flow formed by the expanded interface end, the USB interface end, the power supply end, the computer end, the password unlocking end and the user end is an encryption and decryption flow when no network connection exists.
Preferably, the operation flow formed by the cloud end, the handheld terminal, the alarm end, the computer end, the password unlocking end and the user end is an encryption and decryption flow when network connection exists.
Preferably, when the number of password input errors of the user side reaches three times and the computer side is in a network-free state, the expansion interface side, the USB interface side and the power supply side can be triggered to perform power-off processing.
Preferably, when the number of password input errors of the user side reaches three times and the computer side is in a network state, the cloud side and the alarm side can be triggered to alarm and give an alarm for cloud side information.
Preferably, the user side is an appointed user of the handheld terminal, and the password unlocking end can be unlocked directly through the handheld terminal when the password is input for three times in error.
Preferably, the user side is not a designated user of the handheld terminal, and when the password is input for three times in error, important contents in the computer side can be directly deleted through the handheld terminal and the cloud side.
Compared with the prior art, the invention provides an encryption and decryption method of a computer, which has the following beneficial effects:
two kinds of mode of operation have been adopted, traditional mode carries out the outage to the computer end promptly and handles, and then the inside file of protection computer end is not influenced by stealing, the high in the clouds mode of having adopted simultaneously is handled, the actual owner of actual computer end promptly, can carry out actual high in the clouds management and control to the computer end, can have the file to steal when the risk to carry out the safe transfer of file to the computer end in the computer end, and destroy the file after shifting, also can carry out the high in the clouds unblock simultaneously, can make things convenient for actual owner to give other people's rights to use, also need not to inform other people's password in the convenient while, more safety.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention without limiting the invention in which:
FIG. 1 is a schematic structural diagram of an operation flow in an encryption and decryption method of a computer according to the present invention;
FIG. 2 is a schematic diagram of a flow chart of the computer encryption and decryption method according to the present invention when there is no network connection;
FIG. 3 is a schematic structural diagram of an operation flow when a network connection exists in an encryption and decryption method of a computer according to the present invention;
in the figure: 1. expanding an interface end; 2. a USB interface end; 3. a power supply terminal; 4. a cloud end; 5. a handheld terminal; 6. an alarm end; 7. a user side; 8. a password unlocking end; 9. and a computer terminal.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution:
an encryption and decryption method for a computer comprises a user terminal 7 and a password unlocking terminal 8, wherein the output terminal of the user terminal 7 is the password unlocking terminal 8, the output terminal of the password unlocking terminal 8 is a computer terminal 9, the output terminal of the computer terminal 9 is provided with an expanded interface terminal 1, a USB interface terminal 2, a power terminal 3, a cloud terminal 4 and an alarm terminal 6, the computer terminal 9 and the password unlocking terminal 8 are input and output terminals with each other, the computer terminal 9 and the expanded interface terminal 1 are input and output terminals with each other, the computer terminal 9 and the USB interface terminal 2 are input and output terminals with each other, the computer terminal 9 and the power terminal 3 are input and output terminals with each other, the computer terminal 9 and the password unlocking terminal 8 are input and output terminals with each other, the computer terminal 9 and the cloud terminal 4 are input and output terminals with each other, the other output terminal of the cloud terminal 4 is input and output terminals with each other with the handheld terminal 5, the alarm terminal 6, the hand-held terminal 5 and the alarm terminal 6 are also input and output ends, and the output end at the other end of the hand-held terminal 5 is a password unlocking end 8.
An encryption and decryption method of a computer comprises an expanded interface end 1, a USB interface end 2, a power end 3, a computer end 9, a password unlocking end 8 and a user end 7, wherein the operation flow is an encryption and decryption flow when no network connection exists, and when the password input error number of the user end 7 reaches three times and the computer end 9 is in a network-free state, the expanded interface end 1, the USB interface end 2 and the power end 3 can be triggered to perform power-off processing.
An encryption and decryption method of a computer comprises a cloud end 4, a handheld terminal 5, an alarm end 6, a computer end 9, a password unlocking end 8 and a user end 7, wherein an operation flow is an encryption and decryption flow when a network is connected, when the password input error number of the user end 7 reaches three times and the computer end 9 is in a network state, the cloud end 4 and the alarm end 6 can be triggered to alarm and give an alarm for cloud information, the user end 7 is an appointed user of the handheld terminal 5, the password unlocking end 8 can be unlocked directly through the handheld terminal 5 when the password input error number of the user end 7 is three times, and important contents in the computer end 9 can be deleted directly through the handheld terminal 5 and the cloud end 4 when the password input error number of the user end 7 is not the handheld terminal 5.
The working principle and the using process of the invention are as follows: after the invention is installed, in the running process, the computer end 9 is divided into two running modes, namely a network mode and a non-network mode, when the computer end 9 is in the network mode, the user end 7 can use the computer end 9 after being successfully unlocked through the password unlocking end 8, when the user end 7 inputs a password error through the password unlocking end 8 for three times, the computer end 9 is triggered to transmit alarm information to the handheld terminal 5 through the cloud end 4 and the alarm end 6, when the handheld terminal 5 knows a user of the actual user end 7, the password unlocking end 8 can be directly unlocked through issuing a command, when the handheld terminal 5 does not know the actual user end 7, important files in the computer end 9 can be transmitted through the cloud end 4, and original files in the computer end 9 are transmitted, so that the safety of important information is ensured, when the computer end 9 is in the non-network mode, the user end 7 can use the computer end 9 after successfully unlocking through the password unlocking end 8, when the user end 7 inputs a password error through the password unlocking end 8 for three times, the interface end 1, the USB interface end 2 and the power end 3 are expanded to directly perform power-off processing, namely the computer end 9 cannot be used continuously (the validity period is three hours, and the original unlocking interface is automatically recovered after three hours), and by the arrangement, the computer end 9 can be effectively protected, and a safe encryption and decryption process can be further performed.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. An encryption and decryption method for a computer, comprising a user terminal (7) and a password unlocking terminal (8), characterized in that: the output end of the user end (7) is a password unlocking end (8), the output end of the password unlocking end (8) is a computer end (9), the output end of the computer end (9) is provided with an expanded interface end (1), a USB interface end (2), a power end (3), a cloud end (4) and an alarm end (6), the computer end (9) and the password unlocking end (8) are mutually input and output ends, the computer end (9) and the expanded interface end (1) are mutually input and output ends, the computer end (9) and the USB interface end (2) are mutually input and output ends, the computer end (9) and the power end (3) are mutually input and output ends, the computer end (9) and the password unlocking end (8) are mutually input and output ends, the computer end (9) and the cloud end (4) are mutually input and output end, the other output end of the cloud end (4) is a handheld terminal (5), the intelligent alarm system is characterized in that an input end and an output end are arranged between the handheld terminal (5) and the cloud end (4), the output end of the alarm end (6) is the handheld terminal (5), the input end and the output end are arranged between the handheld terminal (5) and the alarm end (6) and are also arranged between the handheld terminal (5) and the alarm end (6), and the output end of the other end of the handheld terminal (5) is a password unlocking end (8).
2. The encryption and decryption method of a computer according to claim 1, wherein: the operation flow composed of the expanded interface end (1), the USB interface end (2), the power end (3), the computer end (9), the password unlocking end (8) and the user end (7) is an encryption and decryption flow without network connection.
3. The encryption and decryption method of a computer according to claim 1, wherein: the cloud terminal (4), the handheld terminal (5), the alarm terminal (6), the computer terminal (9), the password unlocking terminal (8) and the user terminal (7) form an encryption and decryption process when the network connection exists.
4. The encryption and decryption method of a computer according to claim 1, wherein: when the password input error number of the user side (7) reaches three times and the computer side (9) is in a network-free state, the expansion interface side (1), the USB interface side (2) and the power supply side (3) can be triggered to perform power-off processing.
5. The encryption and decryption method of a computer according to claim 1, wherein: when the password input error number of the user side (7) reaches three times and the computer side (9) is in a network state, the cloud side (4) and the alarm side (6) can be triggered to alarm and give an alarm of cloud side information.
6. The encryption and decryption method of a computer according to claim 1, wherein: the user side (7) is an appointed user of the handheld terminal (5), and the password unlocking end (8) can be unlocked directly through the handheld terminal (5) when the password is input for three times in error.
7. The encryption and decryption method of a computer according to claim 1, wherein: the user side (7) is not a designated user of the handheld terminal (5) and can directly delete important contents in the computer side (9) through the handheld terminal (5) and the cloud side (4) when the password is input for three times of errors.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910822935.0A CN111737768A (en) | 2019-09-02 | 2019-09-02 | Computer encryption and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910822935.0A CN111737768A (en) | 2019-09-02 | 2019-09-02 | Computer encryption and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111737768A true CN111737768A (en) | 2020-10-02 |
Family
ID=72646043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910822935.0A Withdrawn CN111737768A (en) | 2019-09-02 | 2019-09-02 | Computer encryption and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111737768A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201302718Y (en) * | 2008-11-12 | 2009-09-02 | 王昊冉 | Anti-theft copy system of computer USB hole |
CN101556635A (en) * | 2009-05-15 | 2009-10-14 | 西安擎天软件科技有限公司 | Antitheft tracing method for ensuring computer security based on Internet |
CN203490700U (en) * | 2013-10-09 | 2014-03-19 | 李思卓 | Computer security boot-up protection system |
CN103745143A (en) * | 2013-12-23 | 2014-04-23 | 李彦锋 | Computer protection method |
CN105046120A (en) * | 2015-06-30 | 2015-11-11 | 刘晓亮 | Information security computer |
KR20160103891A (en) * | 2015-02-25 | 2016-09-02 | 동명대학교산학협력단 | Laptop locking control method |
CN206147636U (en) * | 2016-10-17 | 2017-05-03 | 高辉 | Computer encryption device |
CN108959868A (en) * | 2018-06-28 | 2018-12-07 | 南昌华勤电子科技有限公司 | A kind of booting computer method, apparatus and computer |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN109543388A (en) * | 2018-11-30 | 2019-03-29 | 沈阳师范大学 | A kind of computer system to ensure information security |
-
2019
- 2019-09-02 CN CN201910822935.0A patent/CN111737768A/en not_active Withdrawn
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201302718Y (en) * | 2008-11-12 | 2009-09-02 | 王昊冉 | Anti-theft copy system of computer USB hole |
CN101556635A (en) * | 2009-05-15 | 2009-10-14 | 西安擎天软件科技有限公司 | Antitheft tracing method for ensuring computer security based on Internet |
CN203490700U (en) * | 2013-10-09 | 2014-03-19 | 李思卓 | Computer security boot-up protection system |
CN103745143A (en) * | 2013-12-23 | 2014-04-23 | 李彦锋 | Computer protection method |
KR20160103891A (en) * | 2015-02-25 | 2016-09-02 | 동명대학교산학협력단 | Laptop locking control method |
CN105046120A (en) * | 2015-06-30 | 2015-11-11 | 刘晓亮 | Information security computer |
CN206147636U (en) * | 2016-10-17 | 2017-05-03 | 高辉 | Computer encryption device |
CN108959868A (en) * | 2018-06-28 | 2018-12-07 | 南昌华勤电子科技有限公司 | A kind of booting computer method, apparatus and computer |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN109543388A (en) * | 2018-11-30 | 2019-03-29 | 沈阳师范大学 | A kind of computer system to ensure information security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108460142A (en) | A kind of Database Systems based on block chain technology | |
CN107169322A (en) | A kind of security of computer software encryption handling system | |
CN105095496A (en) | Method for monitoring MYSQL table space through ZABBIX | |
Chang et al. | Cloud computing storage backup and recovery strategy based on secure IoT and spark | |
CN103530538A (en) | XML safety view querying method based on Schema | |
CN109240855A (en) | A kind of method and device for realizing dual-active disaster tolerance for server virtualization system | |
CN116150242A (en) | Transparent encryption and access control method, device and equipment for database | |
CN112487439A (en) | Computer encryption and decryption method | |
CN111737768A (en) | Computer encryption and decryption method | |
CN202979014U (en) | Network isolation device | |
CN115248799A (en) | Large data warehouse multi-tenant management system and method | |
Wu et al. | Overview of real-time database management system design for power system scada system | |
CN103559461A (en) | Disassembly-proof solid state disk capable of being controlled remotely and data security keeping method thereof | |
CN205792704U (en) | A kind of network security controller of computer | |
CN104573107A (en) | Network security application NoSQL database and relational database fusion interface method | |
CN209845006U (en) | Cloud computing data security encryption monitoring platform | |
CN210402052U (en) | Serial communication controller based on safe CPU chip | |
CN202512605U (en) | Multifunctional secure digital (SD) card | |
Deng et al. | [Retracted] Security Risk and Preventive Measures of Multimedia Database System under Remote Control of Network Robot | |
CN201681398U (en) | Computer data comparison system | |
CN215642694U (en) | Server cluster operation and maintenance management and control system | |
CN213423944U (en) | Cipher card for safety control system of domestic autonomous computer | |
CN204759422U (en) | Safe encryption device of electric wire netting year method of operation establishment | |
CN203386215U (en) | Computer data information safety anti-theft device | |
CN214474997U (en) | Hard implementation equipment for SM4 encryption algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20201002 |