CN206348799U - Encrypt storage device and safe storage system - Google Patents
Encrypt storage device and safe storage system Download PDFInfo
- Publication number
- CN206348799U CN206348799U CN201621063228.6U CN201621063228U CN206348799U CN 206348799 U CN206348799 U CN 206348799U CN 201621063228 U CN201621063228 U CN 201621063228U CN 206348799 U CN206348799 U CN 206348799U
- Authority
- CN
- China
- Prior art keywords
- module
- data
- authentication
- encryption
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The utility model is related to a kind of encryption storage device and safe storage system, and encryption storage device includes data-interface, the control module being connected with data-interface, the first authentication module being connected respectively with control module and encryption/decryption module and the memory module being connected with encryption/decryption module;Controller is used to send authentication information to the first authentication module;First authentication module is used to send the successful information of authentication to control module when authentication information is matched with the identity information prestored;Control module is additionally operable to when receiving the successful information of authentication, and data are write into memory module by encryption/decryption module and/or the data stored in memory module are read;Encryption/decryption module is used to data to be written are encrypted and/or the data read are decrypted the data read from memory module are sent to before controller.The utility model is a kind of hardware cipher mode, and the security of data can be improved relative to existing software cryptography mode.
Description
Technical field
The utility model is related to technical field of data security, is more particularly, to one kind encryption storage device and safety storage
System.
Background technology
In recent years, problem of data safety is increasingly paid close attention to by people, especially the security of office data.At present,
The read-write data on office computer are encrypted using encryption software mostly.But, this software cryptography mode is not met simultaneously
The requirement that office data or specific industry data are holded in close confidence, for example, the password for the encryption that cracks, or by the data that are stored with
Hardware storage device is removed from office computer, all may result in the loss of data.
Utility model content
For disadvantages described above, the utility model provides a kind of encryption storage device and safe storage system, can improve number
According to security, it is to avoid data degradation.
In a first aspect, the encryption storage device that the utility model is provided includes:Data-interface, it is connected with the data-interface
Control module, the first authentication module for being connected respectively with the control module and encryption/decryption module and with the encryption and decryption mould
The memory module of block connection, wherein:
The authentication information that the controller is used to be inputted the user that the data-interface received is sent is sent out
Deliver to first authentication module;
First authentication module is used to judge whether identity information of the authentication information with prestoring matches,
And send the successful information of authentication to the control module in matching;
The control module is additionally operable to after the successful information of the authentication is received, and passes through the encryption/decryption module
Data are write into the memory module and/or the data stored in the memory module are read;
The encryption/decryption module is used to add data to be written before data are write into the memory module
It is close and/or the data read are solved to before the controller the data read from the memory module are sent
It is close.
Optionally, described device also includes the second authentication module being connected with the control module;It is corresponding,
The control module is additionally operable to writing data and/or reading into the memory module by the encryption/decryption module
Take before the data stored in the memory module, obtain the key information of hardware keys, and the key information is sent to institute
State the second authentication module;
Second authentication module is used to judge whether key information of the key information received with prestoring matches,
And send the successful information of cipher key match to the controller in matching;
The control module is additionally operable to receiving the successful information of the cipher key match and receiving the authentication
After successful information, perform and write data and/or the reading storage into the memory module by the encryption/decryption module
The step of data stored in module.
Optionally, the control module is specifically for after the successful information of the authentication is received, and is passing through
The encryption/decryption module is write into the memory module before the data stored in data and/or the reading memory module,
The key information of the hardware keys is obtained, and the key information is sent to second authentication module.
Optionally, the controller is specifically for after the successful information of the cipher key match is received, and is passing through institute
State encryption/decryption module to write into the memory module before the data stored in data and/or the reading memory module, obtain
The authentication information that family is inputted is taken, and the authentication information is sent to first authentication module.
Optionally, the encryption/decryption module is specifically for by the key informations of the hardware keys and described prestoring
The data to be written are encrypted key information and/or the read data are decrypted.
Optionally, described device also includes the power management module being connected with the control module.
Optionally, the dimensions of the memory module is 2.5 inches of hardboard specification of compatible computer mainboard, and/
Or, 3.5 inches of the hard disk specification that the encryption storage device is compatible computer mainboard.
Optionally, described device also includes the interface modular converter being connected with the data-interface.
Second aspect, the safe storage system that the utility model is provided includes hardware keys and above-mentioned encryption storage device,
Wherein, the hardware keys internal memory contains the key information matched with the second authentication module in the encryption storage device.
Optionally, the hardware keys are flash memories or softdog.
Encryption storage device and safe storage system that the utility model is provided, are sent out or received using data-interface
The data come from outside, carry out identity to the user for wanting progress digital independent or data write-in using the first authentication module and recognize
Card, informs that encryption/decryption module can perform encryption and decryption operation in certification success, specific encryption and decryption operation is using control module
Sent after being stored after data to be written are encrypted to memory module or the data read from memory module being decrypted
Go out, so far complete the read or write operation of data.Due to being carried out in the encryption storage device provided using the utility model
, it is necessary to input the authentication information of user when digital independent or write-in, only validated user could read or write data, from
And ensure the security of data.Simultaneously as the encryption storage device that the utility model is provided is a kind of hardware cipher mode, no
The risk being cracked in software cryptography can be faced, even if moreover, dismantling by the encryption storage device and being transferred to other electronics and set
When standby upper, the loss of data is not resulted in yet, Information Security is improved.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present disclosure or technical scheme of the prior art
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some disclosed embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these figures.
Fig. 1 shows the structural representation that storage device is encrypted in the embodiment of the utility model one;
Fig. 2 shows the connection diagram of safe storage system and computer in the embodiment of the utility model one.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present disclosure, the technical scheme in the embodiment of the present disclosure is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole embodiments.
Based on the embodiment in the disclosure, it is all that those of ordinary skill in the art are obtained under the premise of creative work is not made
Other embodiment, belongs to the scope of disclosure protection.
In a first aspect, the utility model provides a kind of encryption storage device, as shown in figure 1, the encryption storage device includes:
Data-interface, the control module being connected with data-interface, the first authentication module being connected respectively with control module and encryption and decryption mould
Block and the memory module being connected with encryption/decryption module, wherein:
The authentication information that controller is used to be inputted the user that the data-interface received is sent is sent to first
Authentication module;
First authentication module is used to judge whether identity information of the authentication information received with prestoring matches,
And send the successful information of authentication to control module in matching;
Control module is additionally operable to after the successful information of authentication is received, by encryption/decryption module into memory module
The data stored in write-in data and/or reading memory module;
Encryption/decryption module be used for into memory module write data before data to be written are encrypted and/or
The data read from memory module are sent to before controller the data read are decrypted.
The utility model provide encryption storage device, be sent out or received using data-interface from outside come number
According to using the first authentication module to wanting to carry out user's progress authentication that digital independent or data write, using control mould
Block informs that encryption/decryption module can perform encryption and decryption operation in certification success, and specific encryption and decryption operation is that data to be written are entered
Store to memory module or sent after the data read from memory module are decrypted after row encryption, so far complete number
According to read or write operation.Due to carrying out digital independent or write-in in the encryption storage device provided using the utility model
When, it is necessary to input the authentication information of user, only validated user could read or write data, so as to ensure the peace of data
Quan Xing.Simultaneously as the encryption storage device that the utility model is provided is a kind of hardware cipher mode, software cryptography will not be faced
In the risk that is cracked, even if moreover, when the encryption storage device is dismantled and is transferred on other electronic equipments, will not also make
Into the loss of data, Information Security is improved.
As an example it is assumed that the encryption storage device that the utility model is provided is arranged on a certain computer, if user thinks
It will be stored in some data write-in encryption storage device, when user is performing storage operation, display circle of computer
The pop-up for carrying out authentication occurs on face, after user's input is about the information of authentication, the identity of user's input is recognized
Control module can be reached by data-interface by demonstrate,proving information, and control module sends the authentication information received to the first certification
Module, the first authentication module carries out authentication to user according to the authentication information received, and specific verification process is will
The authentication information received is matched with the identity information prestored, if matching, and it is validated user to illustrate user,
Then the successful information of certification is sent to controller.After controller receives certification successful information, encryption and decryption is informed
Module, while will be sent from the data to be written that data-interface is sent into encryption/decryption module, like this, encryption/decryption module
Just data to be written can be encrypted, be ultimately stored in memory module, so far complete the write-in of data.
If likewise, user want read be stored in encryption storage device in data, when user perform read operation when,
The pop-up for carrying out authentication occurs on the display interface of computer, after user's input is about the information of authentication, uses
The authentication information of family input can reach control module by data-interface, and control module is by the authentication information received
Send to the first authentication module, the first authentication module carries out authentication according to the authentication information received to user, if
It is authenticated to learn that user is validated user, then send the successful information of certification to controller.When controller receives certification
After successful information, encryption/decryption module is informed, while the reading instruction sent from data-interface is sent to encryption/decryption module
In, like this, encryption/decryption module will read data and be decrypted from memory module, and the data after decryption are passed through
Controller, data-interface are sent, and are shown on the display interface of computer.
Although it should be noted that multiple modules in the utility model are related to the handling process of data, such as controlling
Module, authentication module, encryption/decryption module etc., but improvements of the present utility model and the improvement for not lying in software, because respectively
Individual module can be realized using the hardware module with corresponding function in the prior art, therefore the encryption that the utility model is provided is deposited
Storage device is not related to the improvement of software.
It will be appreciated that authentication information, the information such as user name, password, certainly also to select other information to make
For authentication information.
In the specific implementation, the specification of memory module can be 2.5 English of compatible computer mainboard in encryption storage device
Very little hardboard specification.Memory module can use magnetic storage medium, SSD storage mediums or flash storage medium.
In the specific implementation, the size and shape of encryption storage device can voluntarily be set as needed, for example, encryption is deposited
The specification of storage device can be 3.5 inches of hard disk specification of compatible computer mainboard, can so be directly compatible with desk-top meter
The mainboard and air interface of calculation machine, and the structure of active computer need not be changed, it can also use certainly and meet other electronics
The interface of the installation requirement of equipment, is not limited for the specific size and shape the utility model for encrypting storage device.
In the specific implementation, data-interface can be one in ide interface, SATA interface, scsi interface and PCI-E interface
It is individual or multiple, the data-interface of other forms can also be used certainly, can voluntarily be set as needed in practical application,
This utility model is not limited.
When installing encryption storage device, the mainboard interface of its data-interface and electronic equipment (for example, computer) is connected
Connect, because the type of the mainboard interface of different types of electronic equipment may be different, therefore in order that the number of encryption storage device
It can be connected on different types of interface according to interface, interface modular converter can also be set in encryption storage device, and will
The interface modular converter is connected with data-interface, and the interface on electronic equipment is connected using the interface modular converter, is easy to make
Data-interface is applicable different interface needs.For example, being not provided with the encryption storage device of interface modular converter can only typically pacify
On computers, if setting interface modular converter in encryption storage device, encryption storage device not only may be mounted at dress
Computer, can also be connected with the electronic equipment such as tablet personal computer, the need for meeting different application scene.
Wherein, interface modular converter can connect for modular converter, USB interface and the SATA between USB interface and ide interface
The modular converter between module, USB interface and the PCI-E interface between modular converter, USB interface and scsi interface between mouthful
The one or more in modular converter between SATA interface and PCI-E interface, certainly can also connecing using other forms
Mouth modular converter, can voluntarily set, this utility model is not limited as needed in practical application.
In the specific implementation, normal operation of the external power source to encrypt storage device can be used to be powered, certainly
Can built-in one is connected with control module in encryption storage device power management module, supplied to encrypt storage device
Electricity, is specifically ensured to encrypt the normal work of storage device with which kind of mode, can voluntarily be selected as needed in practical application
Select, this utility model is not limited.
In the specific implementation, can be with reference picture 1 in encryption storage device in order to further improve the securities of data
Second authentication module is set, and second authentication module is connected with control module.So, control module can be by described
Encryption/decryption module is write into the memory module before the data stored in data and/or the reading memory module, is obtained
The key information of hardware keys, and the key information is sent to second authentication module;Second authentication module is to receiving
Key information judged with whether the key information prestored matches, if by judgement learn both match, to control
Device processed sends the successful information of cipher key match;Receiving the successful information of the cipher key match when controlling the control module and connecing
Receive after the successful information of the authentication, just can perform and be write by the encryption/decryption module into the memory module
The step of data stored in data and/or the reading memory module.
It is understood that the second authentication module to the key information that receives and the key information prestored whether
Whether it is with encrypting the hardware keys that storage device matches actually to hardware keys used in user with being judged
Judged.
Here, the encryption storage device of the second authentication module is added, not only can be by the first authentication module to user
Identity be authenticated, used hardware keys can also be authenticated, the feelings only all passed through in two kinds of verification process
Under condition, just allow to carry out digital independent or write-in.Therefore, even if because computer by virus or assault cause identity information
It is trapped, data write-in or reading could be carried out by coordinating jointly due to also needing to hardware keys, therefore further increase data
Security.It can be seen that, the encryption storage device that the utility model is provided can be widely used in the concerning security matters occasion such as business office
Deng the higher place of security requirement, even and if encryption storage device separated with legitimate user, also can guarantee that the peace of information
Entirely, the leakage of information is prevented.
In the specific implementation, the unique identifier symbol of hardware keys is as key information, and wherein identification marking symbol includes
PID (Process Identifier), VID (VendorID), sequence number, MAC Address of hardware etc. are used as key information.
It is understood that the first authentication module to the verification process and the second authentication module of identity information to hardware keys
Verification process between there is no sequencing, identity information can be authenticated first with the first authentication module, work as controller
Receive after the successful information of authentication, obtain the key information of hardware keys, the key information of acquisition is sent to second
Authentication module, to carry out the certification of hardware keys.It is of course also possible to recognize first with the second authentication module hardware keys
Card, after controller receives key authentication successful information, obtains the authentication information of user's input, by the authentication
Information is sent to the first authentication module, to carry out the certification of identity information.
Below by first carry out after authentication carry out key authentication in the way of exemplified by illustrate:
User will encrypt storage device on a certain computer, and it is close to insert on the interface of computer a hardware
Key.When user is performing storage operation, if now hardware keys are to occur on normal connection, the display interface of computer
The pop-up of authentication is carried out, after user's input is about the information of authentication, the authentication information of user's input can lead to
Cross data-interface and reach control module, control module sends the authentication information received to the first authentication module, first
Authentication module carries out authentication according to the authentication information received to user, if certification success, sends to controller
The one successful information of authentication.After controller receives authentication successful information, obtain and connect on the computer
The key information stored in the hardware keys connect, and the key information is sent to the second authentication module.Second authentication module pair
The key information received is judged with whether the key information prestored matches, if learning that both match by judgement,
Then the successful information of cipher key match is sent to controller.When control module receives the successful information of cipher key match, inform plus
Deciphering module, while will be sent from the data to be written that data-interface is sent into encryption/decryption module, like this, encryption and decryption
Just data to be written can be encrypted for module, be ultimately stored in memory module, so far complete the write-in of data.
Below by first carry out after key authentication carry out authentication in the way of exemplified by illustrate:
If user wants to read the data being stored in encryption storage device, when user performs read operation, it is assumed that this
When hardware keys be normal connection.User obtains and deposited in the hardware keys connected on the computer when being read
The key information of storage, and the key information is sent to the second authentication module.Second authentication module is to the key information that receives
Judged with whether the key information prestored matches, if learning that both match by judgement, send close to controller
The key information that the match is successful.After controller receives cipher key match successful information, user's input is obtained to data-interface
Authentication information, and the authentication information received is sent to the first authentication module, the first authentication module is according to reception
The authentication information arrived carries out authentication to user, if authenticated learn that user is validated user, is sent to controller
The one successful information of authentication.After controller receives authentication successful information, encryption/decryption module is informed, simultaneously
The reading instruction sent from data-interface is sent into encryption/decryption module, like this, encryption/decryption module will be from storage
Data are read in module and are decrypted, and the data after decryption are sent to the computer by controller, data-interface
On processor, then it is shown on the display of computer.
Further, encryption/decryption module data is being encrypted or during decryption oprerations, not only can be individually using advance
The key information of storage carries out encryption and decryption to data, can also be by the key information of hardware keys and the above-mentioned key prestored
Information carries out encryption and decryption collectively as data key.For the latter, even if directly getting data from memory module, and by
In the data read be by cryptographic operation, therefore depart from encryption storage device and hardware keys in the case of, obtained
The data taken are ciphertext, therefore can not correctly know its effective information, further improve Information Security.
Second aspect, the utility model also provides a kind of safe storage system, as shown in Fig. 2 the safe storage system bag
Include that hardware keys and first aspect provide includes the encryption storage device of the second authentication module, and wherein hardware keys internal memory is contained
With encrypting the key information that the key information prestored in storage device matches.
It will be appreciated that cooperating process, explanation, citing, beneficial effect between hardware keys and encryption storage device
The contents such as fruit have explained above, and repeat no more here.
In the specific implementation, hardware keys can use flash memories, it would however also be possible to employ softdog, can also adopt certainly
Other hardware keys are used, hardware keys can be voluntarily set as needed in practical application.
In specification of the present utility model, numerous specific details are set forth.It is to be appreciated, however, that reality of the present utility model
Applying example can put into practice in the case of these no details.In some instances, known method, knot is not been shown in detail
Structure and technology, so as not to obscure the understanding of this description.
Above example is only to illustrate the technical solution of the utility model, rather than its limitations;Although with reference to foregoing reality
Example is applied the utility model is described in detail, it will be understood by those within the art that;It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and model of each embodiment technical scheme of the utility model
Enclose.
Claims (10)
1. one kind encryption storage device, it is characterised in that including:Data-interface, the control module being connected with the data-interface,
The first authentication module and encryption/decryption module that are connected respectively with the control module and the storage being connected with the encryption/decryption module
Module, wherein:
The controller be used for will the authentication information that is inputted of the user that sends of the data-interface that receive send to
First authentication module;
First authentication module is used to judge whether identity information of the authentication information with prestoring matches, and
During matching the successful information of authentication is sent to the control module;
The control module is additionally operable to after the successful information of the authentication is received, by the encryption/decryption module to institute
State the data for writing and being stored in data and/or the reading memory module in memory module;
The encryption/decryption module be used for into the memory module write data before data to be written are encrypted and/
Or the data read are decrypted to before the controller the data read from the memory module are sent.
2. encryption storage device according to claim 1, it is characterised in that also including be connected with the control module
Two authentication modules;It is corresponding,
The control module is additionally operable to writing data into the memory module by the encryption/decryption module and/or reading institute
Before stating the data stored in memory module, the key information of hardware keys is obtained, and the key information is sent to described the
Two authentication modules;
Second authentication module is used to judge whether key information of the key information received with prestoring matches, and
During matching the successful information of cipher key match is sent to the controller;
The control module is additionally operable to receiving the successful information of the cipher key match and receiving the authentication success
Information after, perform and data and/or the reading memory module write into the memory module by the encryption/decryption module
The step of data of middle storage.
3. encryption storage device according to claim 2, it is characterised in that the control module is specifically for receiving
After the successful information of authentication, and write by the encryption/decryption module into the memory module data and/or
Read before the data stored in the memory module, obtain the key information of the hardware keys, and the key information is sent out
Deliver to second authentication module.
4. encryption storage device according to claim 2, it is characterised in that the controller is specifically for receiving
State after the successful information of cipher key match, and data and/or reading are being write into the memory module by the encryption/decryption module
Before taking the data stored in the memory module, the authentication information that user is inputted is obtained, and by the authentication
Information is sent to first authentication module.
5. encryption storage device according to claim 2, it is characterised in that the encryption/decryption module is specifically for by described in
The data to be written are encrypted and/or described for the key information of hardware keys and the key information prestored
The data read are decrypted.
6. encryption storage device according to claim 1, it is characterised in that the also electricity including being connected with the control module
Source control module.
7. encryption storage device according to claim 1, it is characterised in that the dimensions of the memory module is compatibility
2.5 inches of hardboard specification of computer motherboard, and/or, the encryption storage device is 3.5 inches of compatible computer mainboard
Hard disk specification.
8. encryption storage device according to claim 1, it is characterised in that also including with connecing that the data-interface is connected
Mouth modular converter.
9. a kind of safe storage system, it is characterised in that including any described encryption storage of hardware keys and claim 2-8
Device, wherein, the hardware keys internal memory, which contains the key matched with the second authentication module in the encryption storage device, to be believed
Breath.
10. system according to claim 9, it is characterised in that the hardware keys are flash memories or softdog.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621063228.6U CN206348799U (en) | 2016-09-19 | 2016-09-19 | Encrypt storage device and safe storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621063228.6U CN206348799U (en) | 2016-09-19 | 2016-09-19 | Encrypt storage device and safe storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206348799U true CN206348799U (en) | 2017-07-21 |
Family
ID=59316862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621063228.6U Active CN206348799U (en) | 2016-09-19 | 2016-09-19 | Encrypt storage device and safe storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206348799U (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763917A (en) * | 2018-06-05 | 2018-11-06 | 北京华大智宝电子系统有限公司 | A kind of data encryption/decryption method and device |
CN110113147A (en) * | 2019-04-11 | 2019-08-09 | 深圳市致宸信息科技有限公司 | A kind of digital encryption device and method |
CN110727931A (en) * | 2019-10-16 | 2020-01-24 | 青岛海信电子设备股份有限公司 | Data storage device and method |
CN110929302A (en) * | 2019-10-31 | 2020-03-27 | 东南大学 | Data security encryption storage method and storage device |
CN111277582A (en) * | 2020-01-15 | 2020-06-12 | 上海至数企业发展有限公司 | Internal and external network data distribution device for hospital |
CN112115523A (en) * | 2020-09-30 | 2020-12-22 | 海南大学 | Data self-destruction encryption storage device |
WO2021027526A1 (en) * | 2019-08-14 | 2021-02-18 | 江苏芯盛智能科技有限公司 | Data storage method, device, computer apparatus, and storage medium |
CN117216813A (en) * | 2023-11-02 | 2023-12-12 | 紫光同芯微电子有限公司 | Method, device and security chip for reading and writing data |
-
2016
- 2016-09-19 CN CN201621063228.6U patent/CN206348799U/en active Active
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763917A (en) * | 2018-06-05 | 2018-11-06 | 北京华大智宝电子系统有限公司 | A kind of data encryption/decryption method and device |
CN108763917B (en) * | 2018-06-05 | 2021-03-30 | 北京华大智宝电子系统有限公司 | Data encryption and decryption method and device |
CN110113147A (en) * | 2019-04-11 | 2019-08-09 | 深圳市致宸信息科技有限公司 | A kind of digital encryption device and method |
WO2021027526A1 (en) * | 2019-08-14 | 2021-02-18 | 江苏芯盛智能科技有限公司 | Data storage method, device, computer apparatus, and storage medium |
CN110727931A (en) * | 2019-10-16 | 2020-01-24 | 青岛海信电子设备股份有限公司 | Data storage device and method |
CN110727931B (en) * | 2019-10-16 | 2023-08-08 | 青岛海信电子设备股份有限公司 | Data storage device and method |
CN110929302A (en) * | 2019-10-31 | 2020-03-27 | 东南大学 | Data security encryption storage method and storage device |
CN111277582A (en) * | 2020-01-15 | 2020-06-12 | 上海至数企业发展有限公司 | Internal and external network data distribution device for hospital |
CN112115523A (en) * | 2020-09-30 | 2020-12-22 | 海南大学 | Data self-destruction encryption storage device |
CN117216813A (en) * | 2023-11-02 | 2023-12-12 | 紫光同芯微电子有限公司 | Method, device and security chip for reading and writing data |
CN117216813B (en) * | 2023-11-02 | 2024-03-26 | 紫光同芯微电子有限公司 | Method, device and security chip for reading and writing data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206348799U (en) | Encrypt storage device and safe storage system | |
CN106169041B (en) | A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication | |
CN103065102B (en) | Data encryption mobile storage management method based on virtual disk | |
CN107408175B (en) | Challenge response authentication for self-encryption driven | |
CN104573441B (en) | A kind of computer and its data encryption with data security function and hiding method | |
CN100437618C (en) | Portable information safety device | |
US9245130B2 (en) | Multi-user universal serial bus (USB) key with customizable file sharing permissions | |
US11269984B2 (en) | Method and apparatus for securing user operation of and access to a computer system | |
CN107659632A (en) | A kind of file encryption-decryption method, device and computer-readable recording medium | |
CN104205123A (en) | Systems and methods for secure third-party data storage | |
CN109951295B (en) | Key processing and using method, device, equipment and medium | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN105354479A (en) | USB flash disk authentication based solid state disk and data hiding method | |
CN103701977A (en) | Portable electronic device, communication system and information authentication method | |
EP2631833A1 (en) | Method, device and system for verifying binding data card and mobile host | |
EP3449607B1 (en) | Systems and methods for managing encryption keys for single-sign-on applications | |
CN107403109A (en) | Encryption method and encryption system | |
CN109613990A (en) | Soft keyboard secured inputting method, server, client, electronic equipment and medium | |
CN109639424A (en) | A kind of virtual machine image encryption method and device based on different keys | |
EP3403368A1 (en) | 2-factor authentication for network connected storage device | |
CN104182674A (en) | Protective device for solid-state disk | |
WO2015168878A1 (en) | Payment method and device and payment factor processing method and device | |
CN104063333A (en) | Encrypted storage equipment and encrypted storage method | |
JP2014089685A (en) | Data sharing system having safety and execution method | |
CN103049705B (en) | A kind of based on virtualized method for secure storing, terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant |