CN206348799U - Encrypt storage device and safe storage system - Google Patents

Encrypt storage device and safe storage system Download PDF

Info

Publication number
CN206348799U
CN206348799U CN201621063228.6U CN201621063228U CN206348799U CN 206348799 U CN206348799 U CN 206348799U CN 201621063228 U CN201621063228 U CN 201621063228U CN 206348799 U CN206348799 U CN 206348799U
Authority
CN
China
Prior art keywords
module
data
authentication
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201621063228.6U
Other languages
Chinese (zh)
Inventor
郭宏志
赵挺
卿高山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Patriot Safety Technology (beijing) Co Ltd
Original Assignee
Patriot Safety Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Patriot Safety Technology (beijing) Co Ltd filed Critical Patriot Safety Technology (beijing) Co Ltd
Priority to CN201621063228.6U priority Critical patent/CN206348799U/en
Application granted granted Critical
Publication of CN206348799U publication Critical patent/CN206348799U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model is related to a kind of encryption storage device and safe storage system, and encryption storage device includes data-interface, the control module being connected with data-interface, the first authentication module being connected respectively with control module and encryption/decryption module and the memory module being connected with encryption/decryption module;Controller is used to send authentication information to the first authentication module;First authentication module is used to send the successful information of authentication to control module when authentication information is matched with the identity information prestored;Control module is additionally operable to when receiving the successful information of authentication, and data are write into memory module by encryption/decryption module and/or the data stored in memory module are read;Encryption/decryption module is used to data to be written are encrypted and/or the data read are decrypted the data read from memory module are sent to before controller.The utility model is a kind of hardware cipher mode, and the security of data can be improved relative to existing software cryptography mode.

Description

Encrypt storage device and safe storage system
Technical field
The utility model is related to technical field of data security, is more particularly, to one kind encryption storage device and safety storage System.
Background technology
In recent years, problem of data safety is increasingly paid close attention to by people, especially the security of office data.At present, The read-write data on office computer are encrypted using encryption software mostly.But, this software cryptography mode is not met simultaneously The requirement that office data or specific industry data are holded in close confidence, for example, the password for the encryption that cracks, or by the data that are stored with Hardware storage device is removed from office computer, all may result in the loss of data.
Utility model content
For disadvantages described above, the utility model provides a kind of encryption storage device and safe storage system, can improve number According to security, it is to avoid data degradation.
In a first aspect, the encryption storage device that the utility model is provided includes:Data-interface, it is connected with the data-interface Control module, the first authentication module for being connected respectively with the control module and encryption/decryption module and with the encryption and decryption mould The memory module of block connection, wherein:
The authentication information that the controller is used to be inputted the user that the data-interface received is sent is sent out Deliver to first authentication module;
First authentication module is used to judge whether identity information of the authentication information with prestoring matches, And send the successful information of authentication to the control module in matching;
The control module is additionally operable to after the successful information of the authentication is received, and passes through the encryption/decryption module Data are write into the memory module and/or the data stored in the memory module are read;
The encryption/decryption module is used to add data to be written before data are write into the memory module It is close and/or the data read are solved to before the controller the data read from the memory module are sent It is close.
Optionally, described device also includes the second authentication module being connected with the control module;It is corresponding,
The control module is additionally operable to writing data and/or reading into the memory module by the encryption/decryption module Take before the data stored in the memory module, obtain the key information of hardware keys, and the key information is sent to institute State the second authentication module;
Second authentication module is used to judge whether key information of the key information received with prestoring matches, And send the successful information of cipher key match to the controller in matching;
The control module is additionally operable to receiving the successful information of the cipher key match and receiving the authentication After successful information, perform and write data and/or the reading storage into the memory module by the encryption/decryption module The step of data stored in module.
Optionally, the control module is specifically for after the successful information of the authentication is received, and is passing through The encryption/decryption module is write into the memory module before the data stored in data and/or the reading memory module, The key information of the hardware keys is obtained, and the key information is sent to second authentication module.
Optionally, the controller is specifically for after the successful information of the cipher key match is received, and is passing through institute State encryption/decryption module to write into the memory module before the data stored in data and/or the reading memory module, obtain The authentication information that family is inputted is taken, and the authentication information is sent to first authentication module.
Optionally, the encryption/decryption module is specifically for by the key informations of the hardware keys and described prestoring The data to be written are encrypted key information and/or the read data are decrypted.
Optionally, described device also includes the power management module being connected with the control module.
Optionally, the dimensions of the memory module is 2.5 inches of hardboard specification of compatible computer mainboard, and/ Or, 3.5 inches of the hard disk specification that the encryption storage device is compatible computer mainboard.
Optionally, described device also includes the interface modular converter being connected with the data-interface.
Second aspect, the safe storage system that the utility model is provided includes hardware keys and above-mentioned encryption storage device, Wherein, the hardware keys internal memory contains the key information matched with the second authentication module in the encryption storage device.
Optionally, the hardware keys are flash memories or softdog.
Encryption storage device and safe storage system that the utility model is provided, are sent out or received using data-interface The data come from outside, carry out identity to the user for wanting progress digital independent or data write-in using the first authentication module and recognize Card, informs that encryption/decryption module can perform encryption and decryption operation in certification success, specific encryption and decryption operation is using control module Sent after being stored after data to be written are encrypted to memory module or the data read from memory module being decrypted Go out, so far complete the read or write operation of data.Due to being carried out in the encryption storage device provided using the utility model , it is necessary to input the authentication information of user when digital independent or write-in, only validated user could read or write data, from And ensure the security of data.Simultaneously as the encryption storage device that the utility model is provided is a kind of hardware cipher mode, no The risk being cracked in software cryptography can be faced, even if moreover, dismantling by the encryption storage device and being transferred to other electronics and set When standby upper, the loss of data is not resulted in yet, Information Security is improved.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present disclosure or technical scheme of the prior art There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some disclosed embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these figures.
Fig. 1 shows the structural representation that storage device is encrypted in the embodiment of the utility model one;
Fig. 2 shows the connection diagram of safe storage system and computer in the embodiment of the utility model one.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present disclosure, the technical scheme in the embodiment of the present disclosure is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole embodiments. Based on the embodiment in the disclosure, it is all that those of ordinary skill in the art are obtained under the premise of creative work is not made Other embodiment, belongs to the scope of disclosure protection.
In a first aspect, the utility model provides a kind of encryption storage device, as shown in figure 1, the encryption storage device includes: Data-interface, the control module being connected with data-interface, the first authentication module being connected respectively with control module and encryption and decryption mould Block and the memory module being connected with encryption/decryption module, wherein:
The authentication information that controller is used to be inputted the user that the data-interface received is sent is sent to first Authentication module;
First authentication module is used to judge whether identity information of the authentication information received with prestoring matches, And send the successful information of authentication to control module in matching;
Control module is additionally operable to after the successful information of authentication is received, by encryption/decryption module into memory module The data stored in write-in data and/or reading memory module;
Encryption/decryption module be used for into memory module write data before data to be written are encrypted and/or The data read from memory module are sent to before controller the data read are decrypted.
The utility model provide encryption storage device, be sent out or received using data-interface from outside come number According to using the first authentication module to wanting to carry out user's progress authentication that digital independent or data write, using control mould Block informs that encryption/decryption module can perform encryption and decryption operation in certification success, and specific encryption and decryption operation is that data to be written are entered Store to memory module or sent after the data read from memory module are decrypted after row encryption, so far complete number According to read or write operation.Due to carrying out digital independent or write-in in the encryption storage device provided using the utility model When, it is necessary to input the authentication information of user, only validated user could read or write data, so as to ensure the peace of data Quan Xing.Simultaneously as the encryption storage device that the utility model is provided is a kind of hardware cipher mode, software cryptography will not be faced In the risk that is cracked, even if moreover, when the encryption storage device is dismantled and is transferred on other electronic equipments, will not also make Into the loss of data, Information Security is improved.
As an example it is assumed that the encryption storage device that the utility model is provided is arranged on a certain computer, if user thinks It will be stored in some data write-in encryption storage device, when user is performing storage operation, display circle of computer The pop-up for carrying out authentication occurs on face, after user's input is about the information of authentication, the identity of user's input is recognized Control module can be reached by data-interface by demonstrate,proving information, and control module sends the authentication information received to the first certification Module, the first authentication module carries out authentication to user according to the authentication information received, and specific verification process is will The authentication information received is matched with the identity information prestored, if matching, and it is validated user to illustrate user, Then the successful information of certification is sent to controller.After controller receives certification successful information, encryption and decryption is informed Module, while will be sent from the data to be written that data-interface is sent into encryption/decryption module, like this, encryption/decryption module Just data to be written can be encrypted, be ultimately stored in memory module, so far complete the write-in of data.
If likewise, user want read be stored in encryption storage device in data, when user perform read operation when, The pop-up for carrying out authentication occurs on the display interface of computer, after user's input is about the information of authentication, uses The authentication information of family input can reach control module by data-interface, and control module is by the authentication information received Send to the first authentication module, the first authentication module carries out authentication according to the authentication information received to user, if It is authenticated to learn that user is validated user, then send the successful information of certification to controller.When controller receives certification After successful information, encryption/decryption module is informed, while the reading instruction sent from data-interface is sent to encryption/decryption module In, like this, encryption/decryption module will read data and be decrypted from memory module, and the data after decryption are passed through Controller, data-interface are sent, and are shown on the display interface of computer.
Although it should be noted that multiple modules in the utility model are related to the handling process of data, such as controlling Module, authentication module, encryption/decryption module etc., but improvements of the present utility model and the improvement for not lying in software, because respectively Individual module can be realized using the hardware module with corresponding function in the prior art, therefore the encryption that the utility model is provided is deposited Storage device is not related to the improvement of software.
It will be appreciated that authentication information, the information such as user name, password, certainly also to select other information to make For authentication information.
In the specific implementation, the specification of memory module can be 2.5 English of compatible computer mainboard in encryption storage device Very little hardboard specification.Memory module can use magnetic storage medium, SSD storage mediums or flash storage medium.
In the specific implementation, the size and shape of encryption storage device can voluntarily be set as needed, for example, encryption is deposited The specification of storage device can be 3.5 inches of hard disk specification of compatible computer mainboard, can so be directly compatible with desk-top meter The mainboard and air interface of calculation machine, and the structure of active computer need not be changed, it can also use certainly and meet other electronics The interface of the installation requirement of equipment, is not limited for the specific size and shape the utility model for encrypting storage device.
In the specific implementation, data-interface can be one in ide interface, SATA interface, scsi interface and PCI-E interface It is individual or multiple, the data-interface of other forms can also be used certainly, can voluntarily be set as needed in practical application, This utility model is not limited.
When installing encryption storage device, the mainboard interface of its data-interface and electronic equipment (for example, computer) is connected Connect, because the type of the mainboard interface of different types of electronic equipment may be different, therefore in order that the number of encryption storage device It can be connected on different types of interface according to interface, interface modular converter can also be set in encryption storage device, and will The interface modular converter is connected with data-interface, and the interface on electronic equipment is connected using the interface modular converter, is easy to make Data-interface is applicable different interface needs.For example, being not provided with the encryption storage device of interface modular converter can only typically pacify On computers, if setting interface modular converter in encryption storage device, encryption storage device not only may be mounted at dress Computer, can also be connected with the electronic equipment such as tablet personal computer, the need for meeting different application scene.
Wherein, interface modular converter can connect for modular converter, USB interface and the SATA between USB interface and ide interface The modular converter between module, USB interface and the PCI-E interface between modular converter, USB interface and scsi interface between mouthful The one or more in modular converter between SATA interface and PCI-E interface, certainly can also connecing using other forms Mouth modular converter, can voluntarily set, this utility model is not limited as needed in practical application.
In the specific implementation, normal operation of the external power source to encrypt storage device can be used to be powered, certainly Can built-in one is connected with control module in encryption storage device power management module, supplied to encrypt storage device Electricity, is specifically ensured to encrypt the normal work of storage device with which kind of mode, can voluntarily be selected as needed in practical application Select, this utility model is not limited.
In the specific implementation, can be with reference picture 1 in encryption storage device in order to further improve the securities of data Second authentication module is set, and second authentication module is connected with control module.So, control module can be by described Encryption/decryption module is write into the memory module before the data stored in data and/or the reading memory module, is obtained The key information of hardware keys, and the key information is sent to second authentication module;Second authentication module is to receiving Key information judged with whether the key information prestored matches, if by judgement learn both match, to control Device processed sends the successful information of cipher key match;Receiving the successful information of the cipher key match when controlling the control module and connecing Receive after the successful information of the authentication, just can perform and be write by the encryption/decryption module into the memory module The step of data stored in data and/or the reading memory module.
It is understood that the second authentication module to the key information that receives and the key information prestored whether Whether it is with encrypting the hardware keys that storage device matches actually to hardware keys used in user with being judged Judged.
Here, the encryption storage device of the second authentication module is added, not only can be by the first authentication module to user Identity be authenticated, used hardware keys can also be authenticated, the feelings only all passed through in two kinds of verification process Under condition, just allow to carry out digital independent or write-in.Therefore, even if because computer by virus or assault cause identity information It is trapped, data write-in or reading could be carried out by coordinating jointly due to also needing to hardware keys, therefore further increase data Security.It can be seen that, the encryption storage device that the utility model is provided can be widely used in the concerning security matters occasion such as business office Deng the higher place of security requirement, even and if encryption storage device separated with legitimate user, also can guarantee that the peace of information Entirely, the leakage of information is prevented.
In the specific implementation, the unique identifier symbol of hardware keys is as key information, and wherein identification marking symbol includes PID (Process Identifier), VID (VendorID), sequence number, MAC Address of hardware etc. are used as key information.
It is understood that the first authentication module to the verification process and the second authentication module of identity information to hardware keys Verification process between there is no sequencing, identity information can be authenticated first with the first authentication module, work as controller Receive after the successful information of authentication, obtain the key information of hardware keys, the key information of acquisition is sent to second Authentication module, to carry out the certification of hardware keys.It is of course also possible to recognize first with the second authentication module hardware keys Card, after controller receives key authentication successful information, obtains the authentication information of user's input, by the authentication Information is sent to the first authentication module, to carry out the certification of identity information.
Below by first carry out after authentication carry out key authentication in the way of exemplified by illustrate:
User will encrypt storage device on a certain computer, and it is close to insert on the interface of computer a hardware Key.When user is performing storage operation, if now hardware keys are to occur on normal connection, the display interface of computer The pop-up of authentication is carried out, after user's input is about the information of authentication, the authentication information of user's input can lead to Cross data-interface and reach control module, control module sends the authentication information received to the first authentication module, first Authentication module carries out authentication according to the authentication information received to user, if certification success, sends to controller The one successful information of authentication.After controller receives authentication successful information, obtain and connect on the computer The key information stored in the hardware keys connect, and the key information is sent to the second authentication module.Second authentication module pair The key information received is judged with whether the key information prestored matches, if learning that both match by judgement, Then the successful information of cipher key match is sent to controller.When control module receives the successful information of cipher key match, inform plus Deciphering module, while will be sent from the data to be written that data-interface is sent into encryption/decryption module, like this, encryption and decryption Just data to be written can be encrypted for module, be ultimately stored in memory module, so far complete the write-in of data.
Below by first carry out after key authentication carry out authentication in the way of exemplified by illustrate:
If user wants to read the data being stored in encryption storage device, when user performs read operation, it is assumed that this When hardware keys be normal connection.User obtains and deposited in the hardware keys connected on the computer when being read The key information of storage, and the key information is sent to the second authentication module.Second authentication module is to the key information that receives Judged with whether the key information prestored matches, if learning that both match by judgement, send close to controller The key information that the match is successful.After controller receives cipher key match successful information, user's input is obtained to data-interface Authentication information, and the authentication information received is sent to the first authentication module, the first authentication module is according to reception The authentication information arrived carries out authentication to user, if authenticated learn that user is validated user, is sent to controller The one successful information of authentication.After controller receives authentication successful information, encryption/decryption module is informed, simultaneously The reading instruction sent from data-interface is sent into encryption/decryption module, like this, encryption/decryption module will be from storage Data are read in module and are decrypted, and the data after decryption are sent to the computer by controller, data-interface On processor, then it is shown on the display of computer.
Further, encryption/decryption module data is being encrypted or during decryption oprerations, not only can be individually using advance The key information of storage carries out encryption and decryption to data, can also be by the key information of hardware keys and the above-mentioned key prestored Information carries out encryption and decryption collectively as data key.For the latter, even if directly getting data from memory module, and by In the data read be by cryptographic operation, therefore depart from encryption storage device and hardware keys in the case of, obtained The data taken are ciphertext, therefore can not correctly know its effective information, further improve Information Security.
Second aspect, the utility model also provides a kind of safe storage system, as shown in Fig. 2 the safe storage system bag Include that hardware keys and first aspect provide includes the encryption storage device of the second authentication module, and wherein hardware keys internal memory is contained With encrypting the key information that the key information prestored in storage device matches.
It will be appreciated that cooperating process, explanation, citing, beneficial effect between hardware keys and encryption storage device The contents such as fruit have explained above, and repeat no more here.
In the specific implementation, hardware keys can use flash memories, it would however also be possible to employ softdog, can also adopt certainly Other hardware keys are used, hardware keys can be voluntarily set as needed in practical application.
In specification of the present utility model, numerous specific details are set forth.It is to be appreciated, however, that reality of the present utility model Applying example can put into practice in the case of these no details.In some instances, known method, knot is not been shown in detail Structure and technology, so as not to obscure the understanding of this description.
Above example is only to illustrate the technical solution of the utility model, rather than its limitations;Although with reference to foregoing reality Example is applied the utility model is described in detail, it will be understood by those within the art that;It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and model of each embodiment technical scheme of the utility model Enclose.

Claims (10)

1. one kind encryption storage device, it is characterised in that including:Data-interface, the control module being connected with the data-interface, The first authentication module and encryption/decryption module that are connected respectively with the control module and the storage being connected with the encryption/decryption module Module, wherein:
The controller be used for will the authentication information that is inputted of the user that sends of the data-interface that receive send to First authentication module;
First authentication module is used to judge whether identity information of the authentication information with prestoring matches, and During matching the successful information of authentication is sent to the control module;
The control module is additionally operable to after the successful information of the authentication is received, by the encryption/decryption module to institute State the data for writing and being stored in data and/or the reading memory module in memory module;
The encryption/decryption module be used for into the memory module write data before data to be written are encrypted and/ Or the data read are decrypted to before the controller the data read from the memory module are sent.
2. encryption storage device according to claim 1, it is characterised in that also including be connected with the control module Two authentication modules;It is corresponding,
The control module is additionally operable to writing data into the memory module by the encryption/decryption module and/or reading institute Before stating the data stored in memory module, the key information of hardware keys is obtained, and the key information is sent to described the Two authentication modules;
Second authentication module is used to judge whether key information of the key information received with prestoring matches, and During matching the successful information of cipher key match is sent to the controller;
The control module is additionally operable to receiving the successful information of the cipher key match and receiving the authentication success Information after, perform and data and/or the reading memory module write into the memory module by the encryption/decryption module The step of data of middle storage.
3. encryption storage device according to claim 2, it is characterised in that the control module is specifically for receiving After the successful information of authentication, and write by the encryption/decryption module into the memory module data and/or Read before the data stored in the memory module, obtain the key information of the hardware keys, and the key information is sent out Deliver to second authentication module.
4. encryption storage device according to claim 2, it is characterised in that the controller is specifically for receiving State after the successful information of cipher key match, and data and/or reading are being write into the memory module by the encryption/decryption module Before taking the data stored in the memory module, the authentication information that user is inputted is obtained, and by the authentication Information is sent to first authentication module.
5. encryption storage device according to claim 2, it is characterised in that the encryption/decryption module is specifically for by described in The data to be written are encrypted and/or described for the key information of hardware keys and the key information prestored The data read are decrypted.
6. encryption storage device according to claim 1, it is characterised in that the also electricity including being connected with the control module Source control module.
7. encryption storage device according to claim 1, it is characterised in that the dimensions of the memory module is compatibility 2.5 inches of hardboard specification of computer motherboard, and/or, the encryption storage device is 3.5 inches of compatible computer mainboard Hard disk specification.
8. encryption storage device according to claim 1, it is characterised in that also including with connecing that the data-interface is connected Mouth modular converter.
9. a kind of safe storage system, it is characterised in that including any described encryption storage of hardware keys and claim 2-8 Device, wherein, the hardware keys internal memory, which contains the key matched with the second authentication module in the encryption storage device, to be believed Breath.
10. system according to claim 9, it is characterised in that the hardware keys are flash memories or softdog.
CN201621063228.6U 2016-09-19 2016-09-19 Encrypt storage device and safe storage system Active CN206348799U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621063228.6U CN206348799U (en) 2016-09-19 2016-09-19 Encrypt storage device and safe storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621063228.6U CN206348799U (en) 2016-09-19 2016-09-19 Encrypt storage device and safe storage system

Publications (1)

Publication Number Publication Date
CN206348799U true CN206348799U (en) 2017-07-21

Family

ID=59316862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621063228.6U Active CN206348799U (en) 2016-09-19 2016-09-19 Encrypt storage device and safe storage system

Country Status (1)

Country Link
CN (1) CN206348799U (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763917A (en) * 2018-06-05 2018-11-06 北京华大智宝电子系统有限公司 A kind of data encryption/decryption method and device
CN110113147A (en) * 2019-04-11 2019-08-09 深圳市致宸信息科技有限公司 A kind of digital encryption device and method
CN110727931A (en) * 2019-10-16 2020-01-24 青岛海信电子设备股份有限公司 Data storage device and method
CN110929302A (en) * 2019-10-31 2020-03-27 东南大学 Data security encryption storage method and storage device
CN111277582A (en) * 2020-01-15 2020-06-12 上海至数企业发展有限公司 Internal and external network data distribution device for hospital
CN112115523A (en) * 2020-09-30 2020-12-22 海南大学 Data self-destruction encryption storage device
WO2021027526A1 (en) * 2019-08-14 2021-02-18 江苏芯盛智能科技有限公司 Data storage method, device, computer apparatus, and storage medium
CN117216813A (en) * 2023-11-02 2023-12-12 紫光同芯微电子有限公司 Method, device and security chip for reading and writing data

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763917A (en) * 2018-06-05 2018-11-06 北京华大智宝电子系统有限公司 A kind of data encryption/decryption method and device
CN108763917B (en) * 2018-06-05 2021-03-30 北京华大智宝电子系统有限公司 Data encryption and decryption method and device
CN110113147A (en) * 2019-04-11 2019-08-09 深圳市致宸信息科技有限公司 A kind of digital encryption device and method
WO2021027526A1 (en) * 2019-08-14 2021-02-18 江苏芯盛智能科技有限公司 Data storage method, device, computer apparatus, and storage medium
CN110727931A (en) * 2019-10-16 2020-01-24 青岛海信电子设备股份有限公司 Data storage device and method
CN110727931B (en) * 2019-10-16 2023-08-08 青岛海信电子设备股份有限公司 Data storage device and method
CN110929302A (en) * 2019-10-31 2020-03-27 东南大学 Data security encryption storage method and storage device
CN111277582A (en) * 2020-01-15 2020-06-12 上海至数企业发展有限公司 Internal and external network data distribution device for hospital
CN112115523A (en) * 2020-09-30 2020-12-22 海南大学 Data self-destruction encryption storage device
CN117216813A (en) * 2023-11-02 2023-12-12 紫光同芯微电子有限公司 Method, device and security chip for reading and writing data
CN117216813B (en) * 2023-11-02 2024-03-26 紫光同芯微电子有限公司 Method, device and security chip for reading and writing data

Similar Documents

Publication Publication Date Title
CN206348799U (en) Encrypt storage device and safe storage system
CN106169041B (en) A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN107408175B (en) Challenge response authentication for self-encryption driven
CN104573441B (en) A kind of computer and its data encryption with data security function and hiding method
CN100437618C (en) Portable information safety device
US9245130B2 (en) Multi-user universal serial bus (USB) key with customizable file sharing permissions
US11269984B2 (en) Method and apparatus for securing user operation of and access to a computer system
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
CN104205123A (en) Systems and methods for secure third-party data storage
CN109951295B (en) Key processing and using method, device, equipment and medium
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN105354479A (en) USB flash disk authentication based solid state disk and data hiding method
CN103701977A (en) Portable electronic device, communication system and information authentication method
EP2631833A1 (en) Method, device and system for verifying binding data card and mobile host
EP3449607B1 (en) Systems and methods for managing encryption keys for single-sign-on applications
CN107403109A (en) Encryption method and encryption system
CN109613990A (en) Soft keyboard secured inputting method, server, client, electronic equipment and medium
CN109639424A (en) A kind of virtual machine image encryption method and device based on different keys
EP3403368A1 (en) 2-factor authentication for network connected storage device
CN104182674A (en) Protective device for solid-state disk
WO2015168878A1 (en) Payment method and device and payment factor processing method and device
CN104063333A (en) Encrypted storage equipment and encrypted storage method
JP2014089685A (en) Data sharing system having safety and execution method
CN103049705B (en) A kind of based on virtualized method for secure storing, terminal and system

Legal Events

Date Code Title Description
GR01 Patent grant