CN101937404B - Control method for accessing computer memory and computer thereof - Google Patents

Control method for accessing computer memory and computer thereof Download PDF

Info

Publication number
CN101937404B
CN101937404B CN201010274012.5A CN201010274012A CN101937404B CN 101937404 B CN101937404 B CN 101937404B CN 201010274012 A CN201010274012 A CN 201010274012A CN 101937404 B CN101937404 B CN 101937404B
Authority
CN
China
Prior art keywords
computing machine
computer
data
wireless network
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010274012.5A
Other languages
Chinese (zh)
Other versions
CN101937404A (en
Inventor
于红旗
徐欣
吴佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Runcore Innovation Technology Co., Ltd.
Original Assignee
HUNAN YUANKE HIGH-TECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUNAN YUANKE HIGH-TECH Co Ltd filed Critical HUNAN YUANKE HIGH-TECH Co Ltd
Priority to CN201010274012.5A priority Critical patent/CN101937404B/en
Publication of CN101937404A publication Critical patent/CN101937404A/en
Priority to HK11106394.6A priority patent/HK1152398A1/en
Priority to PCT/CN2011/077454 priority patent/WO2012031508A1/en
Application granted granted Critical
Publication of CN101937404B publication Critical patent/CN101937404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a control method for accessing a computer memory and a computer thereof. The control method comprises the following steps: the computer receives a request for accessing the memory; the computer sends out an authentication signal via a wireless network and receives authentication response; if judging to be an authorized user through the authentication response, the request for accessing the memory is allowed; the computer receives a command for clearing data via the wireless network or the computer induces that a command for clearing the data due to being disassembled is generated; and the computer executes the command for clearing the data for clearing the data of the memory. In the invention, the computer memory can be accessed after authenticating the command from the wireless network; the authentication process for computer power-up and login is increased, thus enhancing computer security; and the problem of lower data safety can be avoided while freely accessing the memory after logging into a computer system, thus improving confidentiality and security of user data.

Description

Control method and the computing machine of computer memory access
Technical field
The present invention relates to field of computer technology, more specifically, relate to a kind of control method and computing machine of computer memory access.
Background technology
The importance of computing machine in our life and poly-increasing of day, facility when its uses is with efficient, and there's a growing conviction that, more and more dependence to it to make us.Tend to all to give it most important data and carry out keeping.
Also can there be data security hidden danger in the data of Computer Storage, and data security hidden danger probably is divided into two classes: storer is out of order and illegally reads.
The former can be by top quality hard disk as accessory, adopt the protective device of shatter-resistant antidetonation to prevent storage failure etc.
For illegally reading, a lot of computer users, no matter be individual or enterprise, due to the awareness of safety that there is no the data aspect, do not protected data, and the notebook at the related data place of company is stolen, causes the expensive energy of relevant departments to be made up.
For illegally reading, all password can be set on computers, but current password all is based on the startup password of operating system, than being easier to, crack, thus reference-to storage, and storer does not have restrict access, causes user's data easily to be lost.
Summary of the invention
The present invention aims to provide a kind of control method and computing machine of computer memory access, and the storer that can solve computing machine does not have restrict access, causes user's the easy problem of losing of data.
According to an aspect of the present invention, provide a kind of control method of computer memory access, comprising: described computing machine is received the request of reference-to storage; Described computing machine sends the authentication signal by wireless network, receives Authentication Response; Judge that by described Authentication Response whether authentication is successful, if so, allows the request of described reference-to storage.
Preferably, also comprise: described computing machine receives by wireless network the order cleared data or senses to be disassembled and generates the described order cleared data; Described computing machine is carried out the described order cleared data, and removes the data of described storer.
Preferably, described computing machine also comprises before receiving request of access: described computing machine sends the prompting that requires the input password by wireless network, and whether the password that coupling receives is correct; If so, enter operating system; If not, described computer shutdown.
Preferably, before described computer export prompting, also comprise: described computing machine receives and adds electric signal, and sends the request whether powered up by described wireless network; Described computing machine judges whether in the given time to receive and powers up order, if so, carries out and powers up order, starts computing machine; If not, powered-down.
Preferably, described storer is solid state hard disc or mechanical type hard disk.
Preferably, described computing machine is by note or the described request of access of mail reception or the order that clears data.
According to another aspect of the present invention, also provide a kind of computing machine, comprise storer, wireless module also comprises: microprocessor, and after the request receiving the described storer of access, control described wireless module and send the authentication signal by wireless network; Judge that by the Authentication Response received whether authentication is successful, if so, allows the request of described reference-to storage.
Preferably, described computing machine also comprises sensor and power supply; Described storer, wireless module, microprocessor, sensor and power package are in described computer-internal; Described sensor, for after sensing described computing machine and being disassembled, generate the order cleared data; Described microprocessor comprises: authentication module, and after the request receiving the described storer of access, control described wireless module and receive and send the authentication signal by wireless network; Judge that by the Authentication Response received whether authentication is successful, if so, allows the request of described reference-to storage; Described microprocessor also comprises: module for reading and writing, for by described wireless module or sensor, receiving the order cleared data, remove the data in described storer.
Preferably, in described microprocessor, also comprise: the password matching module, for before described authentication module executable operations, send the prompting that requires the input password by wireless network by described wireless module, and, according to the match condition of described password, control described computing machine and enter operating system or shut down computer.
Preferably, in described microprocessor, also comprise: energy supply control module, after in described computing machine reception, adding electric signal, described password matching module sends the order whether powered up before sending requirement input password prompt by wireless network by described wireless module; According to the order that powers up received, select to carry out powering up order or powered-down in the given time.
Preferably, described storer is solid state hard disc or mechanical type hard disk.
Preferably, described wireless module is for adopting the communication module of GSM, CDMA, wifi or the 3G communication technology.
Preferably, described computing machine is desktop computer or notebook computer.
The present invention, by the order from wireless network, through after authentication, the storer of ability access computer; Increase the authentication process that computing machine powered up, entered system, thereby increased the security of computing machine.After having avoided entering system for computer, free access storer, the problem that the security of data is lower, and then the confidentiality and the security that have improved user data.
The accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, forms the application's a part, and schematic description and description of the present invention the present invention does not form inappropriate limitation of the present invention for explaining.In the accompanying drawings:
Fig. 1 shows the computer-internal structural drawing in embodiment mono-;
Fig. 2 shows the process flow diagram of embodiment bis-;
Fig. 3 shows the process flow diagram of embodiment tri-;
Fig. 4 shows the process flow diagram of embodiment tetra-;
Fig. 5 shows the computer-internal structural drawing in embodiment six.
Embodiment
Below with reference to the accompanying drawings and in conjunction with the embodiments, describe the present invention in detail.Scheme in the embodiment of the present invention can be removed the data in notebook computer in time.
Referring to Fig. 1, Fig. 1 is the computer structure composition in the embodiment of the present invention one, comprising: microprocessor 10, wireless module 12, storer 14, sensor 16 and power supply 18.
Wherein, microprocessor 10 can, according in computing machine, be connected with wireless module 12, storer 14, sensor 16 and power supply 18 by corresponding data line.Wireless module 12 can adopt the communication technologys such as GSM, CDMA, Wifi or 3G; Storer 14 can adopt solid-state hard disk SSD or mechanical hard disk etc., and power supply 18 also can adopt accumulator; These parts are encapsulated in computing machine, if computing machine is in the situation that with no authorized is disassembled, sensor 16 can send the trigger pip cleared data to microprocessor 10.
The computing machine described in detail based in embodiment mono-below by embodiment bis-carries out clearly process of data.Referring to Fig. 1 and Fig. 2, comprise the following steps:
S20: microprocessor 10 is received the request of reference-to storage.
S22: microprocessor 10 sends the authentication signal by wireless module 12, receives Authentication Response.
The authentication signal can be inputted the information such as password, user name for requiring the other side, and Authentication Response is user name or password.The authentication signal can also be identifying code, by the take over party, adopts the algorithm process identifying code, after generating new identifying code, as Authentication Response, replys computing machine.
S24: by described Authentication Response, judge that whether authentication is successful, allows described request of access.
Microprocessor 10 in computing machine adopts identical algorithms to generate new identifying code, with the identifying code received, compares, if identical, is defined as authorizing successfully.If user name or the password that can also be microprocessor 10 receptions are correct, be defined as authorized user.
By above-mentioned scheme, the storer of computing machine is when accepting the interview, after need to receiving authorization by wireless network, could allow access, thereby avoid in the situation that do not have authorizedly, the storer of access computer, improved user's data security.
The above describes by embodiment bis-process that the storer of computing machine is accepted the interview in detail.Preferably, particularly work as computing machine and go out the situation of active, after computer starting, the user also can send the order cleared data by wireless network, or, when sending the authentication signal, sends the order cleared data; Also storer 14, wireless module 12, microprocessor 10, sensor 16 and power supply 18 can be encapsulated in to computer-internal, prevent that the disabled user from directly dismantling storer 14, if or do not pass through authorization, dismounting storer 14, after sensing and be disassembled by sensor 16, send the order cleared data to microprocessor 10, the data that microprocessor 10 is removed in storer 14.Below by embodiment tri-explanations, in embodiment tri-, storer 14, wireless module 12, microprocessor 10, sensor 16 and power supply 18 are encapsulated in computer-internal, and embodiment tri-comprises:
S30: described computing machine receives by wireless network the order cleared data or senses to be disassembled and generates the described order cleared data.
The user can send the order cleared data by Wi-Fi, and computing machine can be received the order cleared data after startup; Also can, when sending the authentication signal, send the order cleared data.
Storer 14, wireless module 12, microprocessor 10, sensor 16 and power supply 18 can be encapsulated in computer-internal, prevent that the disabled user from directly dismantling storer 14, if or do not pass through authorization, dismounting storer 14, after sensing and be disassembled by sensor 16, send the order cleared data to microprocessor 10.
S32: described computing machine is carried out the described order cleared data, and removes the data of described storer 14.
In the step of this embodiment tri-, computing machine can be before subscription authentication, in authentication or receive by wireless network the order cleared data after authentication, also but receiving sensor 16 is sensed and is disassembled the order cleared data of sending, thereby avoid user's storer in the situation that with no authorized, force access, the loss of data caused.
In the above-described embodiment, except the authentication to user's reference-to storage, the authority that authority or startup enter system that powers up of computing machine also can be set, received the checking of authorizing by wireless network by computing machine, and, after being verified, powering up and start computing machine or enter system.For this class scheme, by embodiment tetra-, describe, referring to Fig. 1 and Fig. 4, comprise the following steps:
S402: computing machine powers up startup, and wireless module 12 sends the authentication request started;
After computing machine powers up, microprocessor 10 is controlled wireless modules 12 can send message to network, as authentication request such as the order of note, integrated data or mails.
S404: wireless module 12 judges whether to receive user's startup command in the given time; If so, carry out S406, start computing machine; If not, wait for again and triggering, return to step S402.
S406: computing machine judges that whether authentication is successful, after wireless module 12 receives user's startup command, by startup command, carries out authentication, and startup command can adopt the modes such as login password, if so, carries out S408, and computing machine powers up startup; If not, carry out S414.
S408: computing machine powers up startup, but does not enter operating system.Microprocessor 10 sends the request of authentication again by wireless module 12 to the user.
S410: whether microprocessor 10 receives the order of the system of entering by wireless module 12, by the command determination authentication, pass through, and authentication process can adopt the form of login password etc.; If so, carry out S412; If not, carry out S414.
S412: microprocessor 10 is controlled computing machine and is entered system.
S414: microprocessor 10 is controlled computer shutdown and/or powered-down.
Through in above-mentioned authentication process, the user just can enter computer system, and carries out various operations, before access computer storer 14, also can select whether to carry out the authentication process in embodiment mono-.
Adopt above-mentioned step, can, before the storer 14 of computing machine is being accessed, increase computing machine and power up, enter the licensing process of system, thereby increase the security of computing machine.
The above describes each embodiment of the inventive method in detail, and method of the present invention can be integrated as in all parts in embodiment mono-, and these parts can be arranged in small server, desk-top computer or mobile notebook computer.Describe a kind of structure of notebook computer below by embodiment six in detail, referring to Fig. 6, comprising: storer 14, wireless module 12, microprocessor 10, sensor 16 and power supply 18;
Microprocessor 10, after the request receiving the described storer 14 of access, control described wireless module 12 and send the authentication signal by wireless network; Be judged as authorized user by the Authentication Response received, allow the request of described reference-to storage 14.
Further, described computing machine also comprises sensor and power supply;
Described storer 14, wireless module 12, microprocessor 10, sensor 16 and power supply 18 are encapsulated in described computer-internal;
Described sensor 16, for after sensing described computing machine and being disassembled, generate the order cleared data;
Described microprocessor 10 comprises:
Authentication module 100, after the request receiving the described storer 14 of access, control described wireless module 12 and receive and send the authentication signal by wireless network; Be judged as authorized user by the Authentication Response received, allow the request of described reference-to storage 14;
Described microprocessor 10 also comprises:
Module for reading and writing 102, for by described wireless module 12 or sensor 16, receiving the order cleared data, remove the data in described storer 14.
Further, in described microprocessor 10, also comprise:
Password matching module 104, for before described authentication module 100 executable operations, send the prompting that requires the input password by described wireless module 12 by wireless network, and, according to the match condition of described password, control described computing machine and enter operating system or shut down computer.
Further, in described microprocessor 10, also comprise:
Energy supply control module 106, after in described computing machine reception, adding electric signal, described password matching module 104 sends by described wireless module 12 order whether powered up before sending requirement input password prompt by wireless network; According to the order that powers up received, select to carry out powering up order or powered-down in the given time.
Further, described storer 14 is solid state hard disc or mechanical type hard disk.
Further, described wireless module 12 is for adopting the communication module of GSM, CDMA, wifi or the 3G communication technology.
Further, described computing machine is desktop computer or notebook computer.
In the above-described embodiment, by the modules in microprocessor, in the situation that, to user's authentication repeatedly, improved the data security in user memory.Lose when user's computing machine, also can clear data in the front and back of reference-to storage, thereby improved user's data security, make user's data in confidential state, prevent from divulging a secret.Microprocessor in each embodiment, can adopt 51 single-chip microcomputers, by the direct control store of single-chip microcomputer.Adopt solid state hard disc and dispose hard disk controller for some storer, microprocessor also can pass through hard disk controller, controls the read-write of data.If wireless module adopts gsm module, microprocessor can adopt the AT order by the serial port setting parameter.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby they can be stored in memory storage and be carried out by calculation element, perhaps they are made into respectively to each integrated circuit modules, perhaps a plurality of modules in them or step being made into to the single integrated circuit module realizes.Like this, the present invention is not restricted to any specific hardware and software combination.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (5)

1. the control method of a computer memory access, is characterized in that, comprising:
Computing machine receives and adds electric signal, and sends the request whether started by wireless network;
Described computing machine judges whether to receive startup command in the given time, if so, carries out startup command, starts computing machine, but does not enter operating system; If not, powered-down;
Described computing machine sends the prompting that requires the input password by wireless network, and whether the password that checking receives is correct; If so, enter described operating system; If not, described computer shutdown;
Described computing machine is received the request of reference-to storage;
Described computing machine sends the authentication signal by wireless network, and receives Authentication Response;
Judge that by described Authentication Response whether authentication is successful, if so, allows the request of described reference-to storage.
2. method according to claim 1, is characterized in that, also comprises:
Described computing machine receives by wireless network the order cleared data or senses described storer and is disassembled and generates the described order cleared data;
Described computing machine is carried out the described order cleared data, and removes the data of described storer.
3. method according to claim 1, is characterized in that, described storer is solid state hard disc or mechanical type hard disk.
4. method according to claim 2, is characterized in that, described computing machine is by note or the described request of access of mail reception or the order that clears data.
5. the control device of a computer memory access, is characterized in that, comprising:
After reception adds electric signal, send the device of the request whether started by wireless network;
Judge whether in the given time to receive the device of startup command, this device is used for, and if so, carries out startup command, starts computing machine, but does not enter operating system; If not, powered-down;
Send the prompting that requires the input password and verify the whether correct device of password received by wireless network; This device, for carrying out, if so, enters described operating system; If not, described computer shutdown;
Receive the device of the request of reference-to storage;
The device that sends the authentication signal and receive Authentication Response by wireless network;
Judge by described Authentication Response the device whether authentication is successful, this device is used for, and if so, allows the request of described reference-to storage.
CN201010274012.5A 2010-09-07 2010-09-07 Control method for accessing computer memory and computer thereof Active CN101937404B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201010274012.5A CN101937404B (en) 2010-09-07 2010-09-07 Control method for accessing computer memory and computer thereof
HK11106394.6A HK1152398A1 (en) 2010-09-07 2011-06-21 Control method for access to a computer memory in a computer and computer
PCT/CN2011/077454 WO2012031508A1 (en) 2010-09-07 2011-07-21 Method and computer for controlling access to computer storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010274012.5A CN101937404B (en) 2010-09-07 2010-09-07 Control method for accessing computer memory and computer thereof

Publications (2)

Publication Number Publication Date
CN101937404A CN101937404A (en) 2011-01-05
CN101937404B true CN101937404B (en) 2014-01-08

Family

ID=43390741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010274012.5A Active CN101937404B (en) 2010-09-07 2010-09-07 Control method for accessing computer memory and computer thereof

Country Status (3)

Country Link
CN (1) CN101937404B (en)
HK (1) HK1152398A1 (en)
WO (1) WO2012031508A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937404B (en) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN101916233B (en) * 2010-09-14 2013-04-10 湖南源科高新技术有限公司 Computer and data elimination method thereof
CN102521169B (en) * 2011-12-30 2014-10-22 郑州信大捷安信息技术股份有限公司 Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN102568555A (en) * 2012-01-31 2012-07-11 郑州信大捷安信息技术股份有限公司 USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof
CN104182674A (en) * 2014-08-12 2014-12-03 清华大学深圳研究生院 Protective device for solid-state disk
CN106919863A (en) * 2017-02-21 2017-07-04 联想长风科技(北京)有限公司 A kind of self-destruction hard disk unit

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1387638A (en) * 1999-11-08 2002-12-25 国际商业机器公司 Wireless security access management for portable data storage cartridge
CN1892598A (en) * 2005-06-29 2007-01-10 联想(新加坡)私人有限公司 System and method for secure o.s. boot from password-protected hdd
CN1947447A (en) * 2004-02-20 2007-04-11 诺基亚公司 System and method for limiting mobile device functionality

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1548601A1 (en) * 2003-12-23 2005-06-29 Stmicroelectronics SA Memory access control in an electronic apparatus
CN101221606B (en) * 2007-01-12 2011-01-05 迈世亚(北京)科技有限公司 Mobile memory device and its authentication method
US8112807B2 (en) * 2007-11-07 2012-02-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN101403996A (en) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 Data security protection method and device
CN101504630A (en) * 2009-03-02 2009-08-12 成都市华为赛门铁克科技有限公司 Data destroying method of memory device and memory device
CN101706853B (en) * 2009-11-10 2011-05-18 徐欣 Solid state disk (SSD)-based anti-leakage self-destruction system
CN101782951A (en) * 2009-11-10 2010-07-21 徐欣 Hard disc remote destroying antitheft system and method
CN101937404B (en) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN101916233B (en) * 2010-09-14 2013-04-10 湖南源科高新技术有限公司 Computer and data elimination method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1387638A (en) * 1999-11-08 2002-12-25 国际商业机器公司 Wireless security access management for portable data storage cartridge
CN1947447A (en) * 2004-02-20 2007-04-11 诺基亚公司 System and method for limiting mobile device functionality
CN1892598A (en) * 2005-06-29 2007-01-10 联想(新加坡)私人有限公司 System and method for secure o.s. boot from password-protected hdd

Also Published As

Publication number Publication date
CN101937404A (en) 2011-01-05
HK1152398A1 (en) 2012-02-24
WO2012031508A1 (en) 2012-03-15

Similar Documents

Publication Publication Date Title
US10985909B2 (en) Door lock control with wireless user authentication
CN101937404B (en) Control method for accessing computer memory and computer thereof
KR101607042B1 (en) System and method for storing a password recovery secret
US11190936B2 (en) Wireless authentication system
EP3706019B1 (en) Hardware-enforced access protection
US20070174906A1 (en) System and Method for the Secure, Transparent and Continuous Synchronization of Access Credentials in an Arbitrary Third Party System
US20080307409A1 (en) Method for virtualizing a personal working environment and device for the same
CN101072100B (en) Authenticating system and method utilizing reliable platform module
CN101916233B (en) Computer and data elimination method thereof
JP2008028940A (en) Information processing system, information processor, mobile terminal, and access control method
JP2009510808A (en) Intelligence-based security systems and methods
CN104011728A (en) Providing access to encrypted data
CN101122942A (en) Data safe reading method and its safe storage device
US20160048465A1 (en) Wireless authentication system and method for universal serial bus storage device
CN102646075A (en) Storage card locking method and system
TW202009717A (en) Storage device and program
CN101770559A (en) Data protecting device and data protecting method
CN104850796A (en) Storage equipment and access method thereof
US20150156195A1 (en) Method for protecting data on a mass storage device and a device for the same
CN103838997A (en) Single-chip microcomputer password verification method and device
CN102982290B (en) Memory storage and terminal device
KR101318668B1 (en) Portable memory card having information security function
KR20110030515A (en) Security token device and method of authentication usable in smartphone
CN101727557B (en) Secrecy isolation hard disk and secrecy method thereof
CN102568555A (en) USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1152398

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1152398

Country of ref document: HK

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Control method for accessing computer memory and computer thereof

Effective date of registration: 20140723

Granted publication date: 20140108

Pledgee: Qianhai Shenzhen Fuhai factoring Co., Ltd.

Pledgor: Hunan Yuanke High-Tech Co., Ltd.

Registration number: 2014440000013

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20160115

Granted publication date: 20140108

Pledgee: Qianhai Shenzhen Fuhai factoring Co., Ltd.

Pledgor: Hunan Yuanke High-Tech Co., Ltd.

Registration number: 2014440000013

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20161122

Address after: 410013 Hunan province Changsha Wenxuan High-tech Development Zone, Road No. 27 Lu Valley Yuyuan workshop B-7303/7304

Patentee after: Hunan Runcore Innovation Technology Co., Ltd.

Address before: Yuelu District City, Hunan province 410205 Changsha Lugu Road No. 662 six floor

Patentee before: Hunan Yuanke High-Tech Co., Ltd.