CN201185082Y - Mobile memory with high safety - Google Patents

Mobile memory with high safety Download PDF

Info

Publication number
CN201185082Y
CN201185082Y CNU2008200799442U CN200820079944U CN201185082Y CN 201185082 Y CN201185082 Y CN 201185082Y CN U2008200799442 U CNU2008200799442 U CN U2008200799442U CN 200820079944 U CN200820079944 U CN 200820079944U CN 201185082 Y CN201185082 Y CN 201185082Y
Authority
CN
China
Prior art keywords
mobile memory
security mobile
data
key
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNU2008200799442U
Other languages
Chinese (zh)
Inventor
陈懿
孟凡涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CNU2008200799442U priority Critical patent/CN201185082Y/en
Application granted granted Critical
Publication of CN201185082Y publication Critical patent/CN201185082Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model relates to a high-safety mobile memory, which comprises a high-safety mobile memory main body and a safety key carrier, wherein, the safety key carrier is memorized with identification certification information of the user and partial protection key; the safety mobile memory main body comprises a data interface that is used for realizing the input and the output of the data, a memory circuit that is used for memorizing the cryptograph of the inputted data, a central processor, an encryption chip that is connected with the central processor and is used for encrypting the data, and an identification certification chip that is memorized with the other partial protection key corresponding to the partial protection key, and is respectively connected with the central processor and the keyboard, and is used for combining with the safety key carrier to perform the certification of the identification certification information of the user during the application.

Description

High-security mobile memory
Technical field
The utility model relates to a kind of data storage device, particularly be a kind of mobile memory of high security.
Background technology
In recent years, adopt movable storage device all to obtain using widely in all trades and professions as Mass Data Storage Facility, particularly as movable storage device with USB interface, characteristics such as it has highly versatile, portable, easy use, capacity is big, the life-span is long have been substituted early stage 3.5 inches and 5.25 inches flexible plastic disc.But these high capacity movable storage devices have also brought great potential safety hazard when bringing convenience to the user, these safety problems such as for example user's identity can't authenticate, the easy leakage of data stored in clear.In case user's movable storage device is lost or by illegal possessor's visit, will cause the leakage of inner confidential data, causes immeasurable loss can for user and even country.
In order to improve the security performance of movable storage device, some manufacturers have released one after another and have had the movable storage device of certain security function.
Some manufacturer has installed mechanical gear additional and has locked the visit that limits equipment on movable storage device, this means have no security concerning the professional person.
Some safe mobile memory apparatus adopts the way of input password or fingerprint to realize the affirmation of user identity.But password is easily stolen, and in these equipment, depositing and transmitting of password lacks reliable security means, easily is cracked simultaneously.The fingerprint recognition system that has is to environment temperature and humidity sensitive, and the user fingerprints feature that has is not obvious, causes equipment also to exist certain refusing to declare rate and False Rate in actual applications.Existing fingerprint identification technology is just stored the fingerprint characteristic data after encrypting that obtains from fingerprint, there is the possibility that is replicated in the fingerprint trace that the user stays on fingerprint sensor.And the fingerprint recognition chip that these equipment adopted at present and cryptographic algorithm do not possess independent intellectual property right, according to " national Business Code Regulations ", these products do not meet the relevant requirements of national Password Management office, security is not enough, has limited the application in some special industries at home.
What the safe mobile memory apparatus that has used is simple data guard technology, for example adopts hidden partition, does not adopt data encryption technology, and data easily are cracked, and security is lower.
The safe mobile memory apparatus that has is to realize data encrypting and deciphering by client software, needs to install earlier client software during use, and inconvenient operation the more important thing is that software cryptography makes key and encipheror easily be cracked, and security is very low.
The safe mobile memory apparatus that has adopts chip to realize data encryption, but the anti-physical attacks performance of its chip that adopts is lower, make cryptographic algorithm and key in the chip easily be cracked, also some safe mobile memory apparatus has adopted disclosed in the world cryptographic algorithm, these algorithms all do not possess independent intellectual property right, according to " national Business Code Regulations ", these algorithms are not approved by national Password Management office, have limited the application in some special industries at home.
This shows, these products or be that security, the reliability of authentication is not enough, be the insufficient strength of data encryption, simultaneously they do not satisfy the requirement of national Password Management office to commercial encryption product yet, not have the thoroughly solution safety issue that ordinary mobile storage faced.
In order to address the above problem, the utility model creator is through investigation and research for a long time, according to the relevant regulations of national Password Management office to commercial encryption product, createed a kind of high-security mobile memory finally.
Summary of the invention
The purpose of this utility model is, a kind of high-security mobile memory is provided, in order to overcome above-mentioned defective.
For achieving the above object, the technical solution adopted in the utility model is, a kind of high-security mobile memory is provided, it comprises: a high-security mobile memory body and a safe key carrier, wherein, described safe key carrier, it stores user's ID authentication information and part protection key; Described security mobile memory body comprises:
One central processing unit;
One data-interface is in order to realize the input and output of data;
One memory circuit is in order to store the ciphertext of the data of importing;
One encryption chip, it is connected with described central processing unit, in order to data are carried out encryption and decryption;
One identity trusted authentication chip; it stores and the corresponding another part protection of described part protection key key; and be connected with keyboard with described central processing unit respectively; in order to combine with described safe key carrier in use, described user's ID authentication information is authenticated.
Preferable, also comprise: a keyboard, it is connected with described authentication chip, in order to the input user cipher.
Preferable, also comprise: a box body, described memory circuit, central processing unit, encryption chip and authentication chip are arranged in the described box body, and described keyboard and described data-interface are arranged on the surface of described box body.
Preferable, also comprise: a LCD display curtain, be arranged on described box surface, the operation information of described high-security mobile memory state and execution is shown.
Preferable, described safe key carrier is an IC-card or a radio-frequency identification card.
Preferable, described authentication chip comprises: a true Random Number Generator, it is in order to produce working key and protection key.
Preferable, described data-interface is a USB interface.
Preferable, described memory circuit be the re-reading non-voltile memory of writing (Non-Volatile Memory), flash memory (Flash Memory) but, electric program read-only memory (Electric Programmable Read OnlyMemory; EPROM) and micro hard disk (Micro-HD) one of them.
The beneficial effects of the utility model are compared with the prior art, safe, the good reliability of authentication, the intensity height of data encryption satisfies the requirement of national Password Management office to commercial encryption product simultaneously, the safety issue that thoroughly solves ordinary mobile storage and faced; The highly versatile that also keeps movable storage device simultaneously and had, need not to drive, be easy to carry, advantage such as easy to use, reliable.
Description of drawings
Fig. 1 is the structural representation of the utility model high-security mobile memory;
Fig. 2 is the functional block diagram of the utility model high-security mobile memory;
Fig. 3 is the process flow diagram of the data processing method of the utility model high-security mobile memory;
Fig. 4 is the process flow diagram of authentication in the data processing method of the utility model high-security mobile memory;
Fig. 5 is at the process flow diagram of internal authentication in the flow process of authentication in the data processing method of the utility model high-security mobile memory;
Fig. 6 is at the process flow diagram of external authentication in the flow process of authentication in the data processing method of the utility model high-security mobile memory;
Fig. 7 is for using the process flow diagram of authentication at the user in the flow process of authentication in the data processing method of the utility model high-security mobile memory;
Fig. 8 is the process flow diagram of handling at deadlock state in the flow process of authentication in the data processing method of the utility model high-security mobile memory.
Embodiment
Below in conjunction with accompanying drawing, be described in more detail with other technical characterictic and advantage the utility model is above-mentioned.
See also shown in Figure 1, it is for the structural representation of high-security mobile memory of the present invention, its embodiment be the structural relation that macroscopic view goes up product, it comprises: high-security mobile memory of the present invention and the terminal device that concerns with its generation data interaction, and this terminal device can be a computing machine 3; User mode from high-security mobile memory of the present invention self, it can be divided into a high-security mobile memory body 2 and a safe key carrier 1, described safe key carrier 1 a similar key, its final purpose be legal, reasonably open described high-security mobile memory body 2 these locks, thereby realize and terminal device such as aforementioned calculation machine 3 between data interaction.
See also shown in Figure 2, it is for the functional block diagram of high-security mobile memory of the present invention, described high-security mobile memory comprises: a high-security mobile memory body 2 and a safe key carrier 1, wherein, described safe key carrier 1 stores user's ID authentication information and part protection key, it has certain information storage capability, therefore can be by the use that combines with described high-security mobile memory body 2, classify according to both relations of combination, can be divided into contact and contactless, wherein said contact as IC-card, by peg graft realizing combination; Described contactless as radio-frequency identification card, realize combination by radiofrequency signal (wireless mode), certainly the both needs card reader, and, embody this combination from structure and can think to combine with an identity trusted authentication chip 22 the described high-security mobile memory body 2 accordingly in conjunction with object;
Described high-security mobile memory body 2 is arranged in the box body 21, and it comprises:
One central processing unit 25, it is the center of data processing of the present invention and control command scheduling;
One data-interface 28, in order to realize the input and output of data, it can be existing data-interface such as USB, or other serial ports;
One memory circuit 27, data in order to the storage input, it is the storage core of high-security mobile memory of the present invention, data are after an encryption chip 26 is encrypted, with ciphertext form storage thereon, described memory circuit 27 for the re-reading non-voltile memory of writing (Non-Volatile Memory), flash memory (Flash Memory) but, electric program read-only memory (Electric Programmable Read Only Memory; EPROM) and micro hard disk (Micro-HD) one of them;
Described encryption chip 26, it is connected with described central processing unit 25, and in order to data are carried out encryption and decryption, it adopts the data encryption chip with domestic independent intellectual property right to realize data in real time, transparent encryption and decryption computing;
Described authentication chip 22; it is connected with keyboard 24 with described central processing unit 25 respectively; in order to combine with described safe key carrier 1 in use; described user's ID authentication information is authenticated; it stores and the corresponding another part protection of described part protection key key; and working key ciphertext; one of characteristics of the present invention are exactly to adopt the two-stage key management mechanism: described authentication chip 22 comprises a true Random Number Generator (not shown), and it is in order to produce working key and protection key.Wherein, working key is the key that described encryption chip 26 uses when carrying out the encryption and decryption computing.The protection key is used for working key is encrypted, and what really preserve is the ciphertext of protection key and working key.The way that the present invention adopts key to cut apart will protect key to be divided into two parts, be stored in the described authentication chip 22 thereby formed an above-mentioned part of mentioning, and another part is stored in the safe key carrier 1.Have only the described safe key carrier 1 of use to finish authentication; equipment could be from described safe key carrier 1 acquisition unit divide the protection key, again with described authentication chip 22 in the part protection key of storage be combined together to form complete protection key.Can use described complete protection key then, described working key ciphertext is decrypted computing, finally obtain working key expressly, described encryption chip 26 uses this working key to carry out encryption and decryption and calculates.These all are the not available features of existing safe mobile memory apparatus.
For the keyboard in the high-security mobile memory body of the present invention, it is connected with described authentication chip 22 simultaneously, in order to the input user cipher.Described keyboard 22 and described data-interface 28 (form of slot) are arranged on the surface of described box body 21.Also comprise: a display screen 23, be arranged on described box body 21 surfaces, it can be a LCD, and the operation information of described high-security mobile memory state and execution is shown output.Described LCD can show Chinese character, be used to point out the user to carry out various operations, on this high-security mobile memory body, can input password, unlocking pin, the change password, reissue operations such as standby safe key carrier, thereby do not need extra card reader, these all are the not available features of existing safe mobile memory apparatus.
Its creationary characteristics of high-security mobile memory of the present invention show that also it has a cover originality data processing method, in order to strengthen its security and reliability; See also shown in Figure 3ly, it is the process flow diagram of the data processing method of high-security mobile memory of the present invention; Each functional structure by above-mentioned high-security mobile memory realizes that it step that comprises is:
Step a: described safe key carrier 1 is combined with described authentication chip 22;
Step b: judge whether the user uses described high-security mobile memory legal, if the following step c of legal execution, otherwise would carry out following step f;
Step c: protect key to combine with the another part in the described authentication chip 22 part protection key in the described safe key carrier 1, form complete protection key;
Steps d: described working key ciphertext is decrypted the acquisition working key expressly by described protection key;
Step e: described encryption chip 26 obtains described working key and expressly the data of input is encrypted, and the data of exporting are decrypted, and carries out following step g;
Step f: handle failure, carry out following step g;
Step g: finish dealing with;
See also shown in Figure 4ly, it is the process flow diagram of authentication in the data processing method of high-security mobile memory of the present invention; It step that comprises is:
Step b1: carry out internal authentication, confirm whether described safe key carrier 1 has legitimacy with respect to described authentication chip 22,, otherwise carry out following step b5 if the following step b2 of execution is passed through in authentication;
Step b2: carry out external authentication, confirm whether described authentication chip 22 has legitimacy with respect to described safe key carrier 1,, otherwise carry out following step b5 if the following step b3 of execution is passed through in authentication;
Step b3: the user imports user cipher, confirms whether the user has legitimacy to the use of described safe key carrier 1, if the following step b4 of legal execution, otherwise would carry out following step b5;
Step b4: authentication is passed through, and allows the user that the data in the described high-security mobile memory are conducted interviews, and carries out following step b6;
Step b5: authentification failure does not allow the user that the data in the described high-security mobile memory are conducted interviews and carries out following step b6;
Step b6: authentication finishes;
See also shown in Figure 5, its in the flow process of authentication in the data processing method of high-security mobile memory of the present invention at the process flow diagram of internal authentication; Promptly at first carry out external authentication, confirm whether described safe key carrier 1 has legitimacy with respect to described high-security mobile memory body 2, and its step that comprises in the specific implementation is:
Step b11: described authentication chip 22 sends a string random number str1 to described safe key carrier 1;
Step b12: described safe key carrier 1 uses internal authentication key and block encryption algorithm that described this string random number str1 is carried out cryptographic calculation, and encrypted result is returned to described authentication chip 22;
Step b13: described authentication chip 22 is decrypted computing by same key and algorithm;
Step b14: judge whether the result who decrypts is identical with described this string random number str1, if identical, then carries out following step b2, otherwise carries out following step b5.
See also shown in 6, its in the flow process of authentication in the data processing method of high-security mobile memory of the present invention at the process flow diagram of external authentication; Promptly carry out external authentication, confirm whether described high-security mobile memory body 2 has legitimacy with respect to described safe key carrier 1, its concrete step of implementing to comprise is:
Step b21: described safe key carrier 1 sends a string random number str2 to described authentication chip 22;
Step b22: described part of trusted authentication chip 22 uses described external authentication key and block encryption algorithm that described this string random number str2 is carried out cryptographic calculation, and encrypted result is returned to described safe key carrier 1;
Step b23: described safe key carrier 1 is decrypted computing by same key and algorithm;
Step b24: judge whether the result who decrypts is identical with described this string random number str2, if identical, then carries out following step b3, otherwise carries out following step b5.
In fact for the safety certifying method that is applied in above the present invention on the movable storage device, what described internal authentication and external authentication solved is the authentication of equipment (safe key carrier 1) to equipment (high-security mobile memory body 2), can prevent effectively that by above-mentioned internal authentication and external authentication IC-card is by bootlegging simultaneously.
Security for the high-security mobile memory body, not only between equipment, authenticate, also to whether test on the legitimacy to the use of equipment simultaneously the user, just the above-mentioned steps c user that will carry out imports user cipher, confirm whether the user has legitimacy to the use of described safe key carrier 1, have only this three step all to pass through, could realize read operation to the data of storing in the described movable storage device, even otherwise the memory circuit in the high-security mobile memory body 2 27 is pulled down, owing to there is not key, and cryptographic algorithm is unexposed, also can't decode the ciphertext on the memory circuit 27.
See also shown in Figure 7ly, it is for using the process flow diagram of authentication at the user in the flow process of authentication in the data processing method of high-security mobile memory of the present invention; The user cipher of storage is domestic consumer's password in the described safe key carrier 1, and described step b3 confirms that the user comprises the concrete implementation step of the legitimacy of described safe key carrier 1 use:
Step b31: the user inputs domestic consumer's password to described safe key carrier 1;
Step b32: described safe key carrier 1 judges whether domestic consumer's password is correct, if correct, carry out following step b4, otherwise carries out following step b33;
Step b33: domestic consumer's password input error is added up;
Step b34: judge whether accumulative frequency reaches default n1 time, carry out following step b35, otherwise carry out above-mentioned steps b31 if reach;
Step b35: described safe key carrier is in deadlock state.
For the safe key carrier 1 that is in deadlock state, still need to realize replying use by release, the user cipher of storing in the described for this reason safe key carrier is except domestic consumer's password, also comprise a kind of supervisor password, in order to remove deadlock state, see also shown in Figure 8, its process flow diagram for handling at deadlock state in the flow process of authentication in the data processing method of high-security mobile memory of the present invention; It step that comprises is:
Step b36: to the described safe key carrier 1 input supervisor password that is in deadlock state;
Step b37: described safe key carrier 1 judges whether supervisor password is correct, the following step b38 of correct execution, otherwise carry out following step b39;
Step b38: remove deadlock state, described domestic consumer password is reset to initial value carry out above-mentioned steps b31;
Step b39: input error adds up to supervisor password;
Step b310: judge whether cumulative number reaches default n2 time,, carry out following step b311, otherwise carry out above-mentioned steps b36 if reach;
Step b312: described safe key carrier 1 is in permanent deadlock state, and makes described safe key carrier 1 scrap, and carries out following step b5.
Described safe key carrier 1 is lost or is scrapped, the user is after the authentication of described backup safe key carrier and described movable storage device is passed through, reissue blank safe key carrier as new backup safe key carrier, and upgrade internal authentication key and external authentication key.
If permanent deadlock state, at this moment, be in the state of scrapping as the IC-card of safe key carrier 1.In order to prevent scrapping or lose and causing that high-security mobile memory body 2 can not normally use of IC-card, described high-security mobile memory body 2 should just be furnished with two IC-cards at first, be backup safe key carrier above-mentioned, these two IC-card identity are identical, backup each other.When IC-card is wherein lost or is damaged, can use another IC-card, the user needs to reissue a new blank card simultaneously and gives over to new backup after described backup safe key carrier and 2 authentications of described high-security mobile memory body are passed through.After the distribution, because all internal keys and external key all pass through renewal, original IC-card of losing will cancel automatically.Just needn't worry and to stay hidden danger to the data security of high-security mobile memory body 2, the user can also change user cipher and super code at described safe key carrier 1 with after high-security mobile memory body 2 combines unlimitedly on described high-security mobile memory body 2.These modes of operation all are the not available features of existing movable storage device.
The above only is preferred embodiment of the present utility model, only is illustrative for the utility model, and nonrestrictive.Those skilled in the art is understood, and can carry out many changes to it in the spirit and scope that the utility model claim is limited, revise, even equivalence, but all will fall in the protection domain of the present utility model.

Claims (8)

1, a kind of high-security mobile memory is characterized in that, it comprises: a high-security mobile memory body and a safe key carrier, wherein, and described safe key carrier, it stores user's ID authentication information and part protection key; Described security mobile memory body comprises:
One central processing unit;
One data-interface is in order to realize the input and output of data;
One memory circuit is in order to store the ciphertext of the data of importing;
One encryption chip, it is connected with described central processing unit, in order to data are carried out encryption and decryption;
One identity trusted authentication chip; it stores and the corresponding another part protection of described part protection key key; and be connected with keyboard with described central processing unit respectively; in order to combine with described safe key carrier in use, described user's ID authentication information is authenticated.
2, high-security mobile memory according to claim 1 is characterized in that, also comprises: a keyboard, it is connected with described authentication chip, in order to the input user cipher.
3, high-security mobile memory according to claim 2, it is characterized in that, described high-security mobile memory body also comprises: a box body, described memory circuit, central processing unit, encryption chip and authentication chip are arranged in the described box body, and described keyboard and described data-interface are arranged on the surface of described box body.
4, high-security mobile memory according to claim 3 is characterized in that, also comprises: a LCD display curtain, be arranged on described box surface, and the operation information of described high-security mobile memory state and execution is shown.
According to claim 3 or 4 described high-security mobile memories, it is characterized in that 5, described safe key carrier is an IC-card or a radio-frequency identification card.
6, high-security mobile memory according to claim 5 is characterized in that, described authentication chip comprises: a true Random Number Generator, it is in order to produce working key and protection key.
7, high-security mobile memory according to claim 1 is characterized in that, described data-interface is a USB interface.
8, high-security mobile memory according to claim 1 is characterized in that, but described memory circuit be the re-reading non-voltile memory of writing, flash memory, electric program read-only memory and micro hard disk one of them.
CNU2008200799442U 2008-04-15 2008-04-15 Mobile memory with high safety Expired - Lifetime CN201185082Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU2008200799442U CN201185082Y (en) 2008-04-15 2008-04-15 Mobile memory with high safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2008200799442U CN201185082Y (en) 2008-04-15 2008-04-15 Mobile memory with high safety

Publications (1)

Publication Number Publication Date
CN201185082Y true CN201185082Y (en) 2009-01-21

Family

ID=40272819

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2008200799442U Expired - Lifetime CN201185082Y (en) 2008-04-15 2008-04-15 Mobile memory with high safety

Country Status (1)

Country Link
CN (1) CN201185082Y (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562040B (en) * 2008-04-15 2012-01-04 航天信息股份有限公司 Data processing method of high-security mobile memory
CN102543121A (en) * 2010-12-29 2012-07-04 尹亮 Compact disc (CD) reading method, computer and CD driver
CN103297399A (en) * 2012-03-01 2013-09-11 董建飞 Method and system for improving safety of intelligent secret key equipment
WO2013182050A1 (en) * 2012-06-05 2013-12-12 中国银联股份有限公司 Security information interaction device and method, and ic card for security information interaction
CN107169382A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of mobile hard disk and its secure storage method of data based on NFC technique
CN108809634A (en) * 2017-05-02 2018-11-13 青岛博文广成信息安全技术有限公司 Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method
CN110378137A (en) * 2019-07-19 2019-10-25 广东浪潮大数据研究有限公司 A kind of hardware bottom layer encryption storage method, system and readable storage medium storing program for executing

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562040B (en) * 2008-04-15 2012-01-04 航天信息股份有限公司 Data processing method of high-security mobile memory
CN102543121A (en) * 2010-12-29 2012-07-04 尹亮 Compact disc (CD) reading method, computer and CD driver
CN102543121B (en) * 2010-12-29 2015-01-07 尹亮 Compact disc (CD) reading method, computer and CD driver
CN103297399A (en) * 2012-03-01 2013-09-11 董建飞 Method and system for improving safety of intelligent secret key equipment
WO2013182050A1 (en) * 2012-06-05 2013-12-12 中国银联股份有限公司 Security information interaction device and method, and ic card for security information interaction
CN107169382A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of mobile hard disk and its secure storage method of data based on NFC technique
CN108809634A (en) * 2017-05-02 2018-11-13 青岛博文广成信息安全技术有限公司 Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method
CN110378137A (en) * 2019-07-19 2019-10-25 广东浪潮大数据研究有限公司 A kind of hardware bottom layer encryption storage method, system and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
CN101562040B (en) Data processing method of high-security mobile memory
CN105391840B (en) Automatically create destination application
CN201185082Y (en) Mobile memory with high safety
CN100533459C (en) Data safety reading method and safety storage apparatus thereof
CN105957276A (en) Android system-based intelligent POS security system, starting method and data management control method
CN104217327A (en) Financial IC (integrated circuit) card Internet terminal and trading method thereof
CN101923660A (en) Dynamic password identity authorization system and method based on RFID
CN102867366A (en) Portable bank card data processing device, system and method
CN201518127U (en) Encrypted mobile memory based on password authentication
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN103684786A (en) Method and system for storing digital certificate and binding digital certificate to hardware carrier
CN201590091U (en) Encryption type memory card read/write device based on password authentication
CN103198247A (en) Computer safety protection method and computer safety protection system
CN104022886A (en) Safety authentication method applied to parking lot as well as related device and system
CN102662874B (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
CN103617127A (en) Memory device with subareas and memorizer area dividing method
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN101562523B (en) Security certification method applied on mobile storage device
CN114241631A (en) Control method and registration method of intelligent door lock and related devices
CN103838997A (en) Single-chip microcomputer password verification method and device
CN103455768B (en) A kind of USB method for secure storing and system
CN105095780B (en) The access method and device of test port in a kind of chip
CN106855923A (en) A kind of electronic installation based on biological identification technology
KR20110030515A (en) Security token device and method of authentication usable in smartphone
KR20120100342A (en) Security token device and rf module and method of authentication usable in smartphone and pc

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20090121