CN101308475A - Safe mobile storage system and method of use thereof - Google Patents

Safe mobile storage system and method of use thereof Download PDF

Info

Publication number
CN101308475A
CN101308475A CNA2008101324286A CN200810132428A CN101308475A CN 101308475 A CN101308475 A CN 101308475A CN A2008101324286 A CNA2008101324286 A CN A2008101324286A CN 200810132428 A CN200810132428 A CN 200810132428A CN 101308475 A CN101308475 A CN 101308475A
Authority
CN
China
Prior art keywords
module
data
place
transmission drive
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101324286A
Other languages
Chinese (zh)
Inventor
吴俊�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNA2008101324286A priority Critical patent/CN101308475A/en
Publication of CN101308475A publication Critical patent/CN101308475A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a secure mobile storage system, wherein, a security policy setting module is used to a security zone for saving encrypted data and the access policies; a data transmission drive module is used to access the operation of the security zone, load a file system conversion module based on the setting information in the security zone, and transmit the obtained decrypted data to a computer interface or a processor of a smart phone; a security authentication module is used to receive the operation, authenticate the operation based on security policies and return the authenticated results and the setting information in the security zone to the data transmission drive module; the file system conversion module transmits the read encrypted data to a data encryption and decryption module based on the operation and transmits the returned decrypted data to the data transmission drive module; the data encryption and decryption module is used to encrypt or decrypt the encrypted data. The invention also discloses a using method of the secure mobile storage system and can intercept all the operations accessing to the security zone.

Description

Safe mobile storage system and using method thereof
Technical field
The present invention relates to the information equipment technical field, specifically, relate to a kind of safe mobile storage system and using method thereof.
Background technology
Day crescent benefit along with the hyundai electronics infotech, computing machine and mobile phone are given people's life, work brings great convenience, PC that function is become stronger day by day and smart mobile phone more and more become the data information center in people's life, yet, along with Internet development, leak in computer and the mobile phone, virus, hacker and the data security incident that takes place frequently, computer and mobile phone, the equipment of network-connectable particularly, no longer allowed the people feel safe with relieved, the security of personal data storage is also more and more important, more particularly be related to individual privacy, though the memory device of the such class of portable hard drive of band encryption function has appearred in the market in recent years, also there is the price height in important data such as company's secret, carry inconvenience, encryption device itself lacks the shortcoming of man machine operation interface.
Existing portable hard drive or USB flash disk encryption device all do not have screen display on mobile phone, input password and to the function that is provided with of burst disk, partly or entirely rely on software on the PC and finish and encrypt and setting operation.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of safe mobile storage system, can tackle the operation of all-access place of safety.
In order to address the above problem, the invention provides a kind of safe mobile storage system, comprising: storer, security strategy are provided with module, data transmission drive module, secure verification module, filesystem conversion module and data encrypting and deciphering module, wherein,
Security strategy is provided with module, is used for setting at described storer the place of safety of storing encrypt data, and at the access strategy of described place of safety, place of safety configuration information and described access strategy are kept in the described storer;
Data transmission drive module is used to obtain the operation of visiting described place of safety, when visiting the operation of described place of safety, described operation is sent to described secure verification module; After described operation is by checking, load described filesystem conversion module according to the place of safety configuration information, described operation is sent to described filesystem conversion module, and the data decryption that obtains is sent to the processor of computer interface or smart mobile phone;
Secure verification module, be used to receive the operation that described data transmission drive module is sent, read described security strategy and place of safety configuration information, described operation is verified, and will verify that result and place of safety configuration information return to described data transmission drive module according to described security strategy;
The filesystem conversion module, be used to receive the operation that described data transmission drive module is sent, and read the enciphered data of described place of safety according to described operation, described enciphered data is sent to described data encrypting and deciphering module, the data decryption that returns is sent to described data transmission drive module;
The data encrypting and deciphering module is used for described enciphered data is decrypted, and returns data decryption and give described filesystem conversion module.
Preferably, when described being operating as to described place of safety writes enciphered data, and after described data transmission drive module receives the input data of described computer interface, if described operation is by checking, described data transmission drive module sends to described filesystem conversion module together with described input data and operation; Described filesystem conversion module sends to described data encrypting and deciphering module with described input data, and the enciphered data of returning is write described place of safety; Described data encrypting and deciphering module is used for described input data are encrypted, and returns enciphered data and give described filesystem conversion module.
Preferably, described security strategy comprises security password, and described secure verification module is verified described operation according to described security password.
Preferably, further comprise the transmitting, monitoring module, described transmitting, monitoring module is used to monitor the general-purpose serial bus USB incident, insert incident when receiving USB, described transmitting, monitoring module is used for described USB insertion incident is sent to described secure verification module, and checking result and the place of safety configuration information that described secure verification module is returned sent to described data transmission drive module; If described transmitting, monitoring module receives USB and extracts incident, notify described data transmission drive module unloading of file system modular converter; Described secure verification module is used for described USB insertion incident is verified, if the verification passes, returns checking result and place of safety configuration information and gives described transmitting, monitoring module.
Preferably, when the encryption function not enabled, described data transmission drive module is used for described USB incident of transparent transmission and operation.
Preferably, described filesystem conversion module is used for described data decryption is carried out format conversion, and described data decryption is converted to the form of computing machine or smart mobile phone identification, and the data decryption after the format conversion is sent to described data transmission drive module.
Another technical matters solved by the invention provides a kind of using method of safe mobile storage system, can tackle the operation of all-access place of safety.
In order to address the above problem, the invention provides a kind of using method of safe mobile storage system, comprising:
By security strategy the place of safety of module settings storing encrypt data is set, and at the access strategy of described place of safety;
When data transmission drive module gets access to the operation in access security district, described operation is sent to secure verification module;
Described secure verification module receives described operation, reads described security strategy and place of safety configuration information, according to described security strategy described operation is verified, and will be verified that result and place of safety configuration information return to described data transmission drive module;
After described operation was by checking, described data transmission drive module sent to described filesystem conversion module according to described place of safety configuration information load document system modular converter with described operation;
Described filesystem conversion module reads the enciphered data of described place of safety according to the described operation that receives, and described enciphered data is sent to the data encrypting and deciphering module;
Described data encrypting and deciphering module is decrypted described enciphered data, and returns data decryption and give described filesystem conversion module;
Described filesystem conversion module sends to described data decryption by described data transmission drive module the processor of computer interface or smart mobile phone.
Further, when described behaviour is the data that write to described place of safety, and after described data transmission drive module receives the input data of described computer interface, if described operation is by checking, described data transmission drive module sends to described filesystem conversion module together with described input data and operation; Described filesystem conversion module sends to described data encrypting and deciphering module with described input data, and described data encrypting and deciphering module is encrypted described input data, and returns to described filesystem conversion module; Described filesystem conversion module writes described place of safety with described enciphered data.
Further, described filesystem conversion module is further carried out format conversion to described data decryption, described data decryption is converted to the form of computing machine or smart mobile phone identification, and the data decryption after the format conversion is sent to described data transmission drive module.
Further, after receiving general-purpose serial bus USB insertion incident, described USB insertion incident is sent to secure verification module; Described secure verification module is verified described USB insertion incident, if the verification passes, returns checking result and place of safety configuration information to described data transmission drive module; Extract incident when receiving USB, notify described data transmission drive module unloading of file system modular converter.
Technique effect:
The present invention has realized the encipherment protection to data on the basis of outer handset memory technology, can tackle the packet of all-access place of safety, further, and can be fully in setting and the encryption function of mobile phone side realization to burst disk.
Description of drawings
Fig. 1 is the application scenarios synoptic diagram of safe mobile storage system among the present invention;
Fig. 2 is the structural representation of safe mobile storage system among the present invention;
Fig. 3 is the workflow diagram of transmitting, monitoring module among the present invention;
Fig. 4 is the workflow diagram of secure verification module among the present invention;
Fig. 5 is the workflow diagram of data transmission drive module among the present invention;
Fig. 6 is the workflow diagram of file system conversion layer module among the present invention.
Embodiment
Safe mobile storage system among the present invention can be applied to equipment such as smart mobile phone, notebook and desktop computer.The present invention can not be used in the computer side install software and just can realize, and promptly safe mobile storage system can allow the computer Direct Recognition, and is certain, the man-machine interface and the function of the further enhanced system of software that also can be by the PC side is provided.
With preferred embodiment technical solution of the present invention is elaborated with reference to the accompanying drawings.
As shown in Figure 1, be the application scenarios synoptic diagram of safe mobile storage system among the present invention, safe mobile storage system is arranged between storer and the computer interface, safe mobile storage system can with storer and computer interface interaction data and operation information.
Now, equipment such as smart mobile phone, notebook or desktop computer all are provided with computer interface and storer, and (Universal Serial Bus, USB) interface and wave point are two kinds of computer interfaces commonly used to USB (universal serial bus).Among the present invention, safe mobile storage system utilizes the file system of the said equipment, generates a secret storage area in storer, needs ciphered data to store or read at this storage area by safe mobile storage system.
With the smart mobile phone is example, and safe mobile storage system is based on the file encryption storage system on the mobile storage basis that has smart mobile phone now.Along with becoming stronger day by day of smart mobile phone memory function, increasing people selects the carrier of smart mobile phone as data on file, utilize the existing file system of smart mobile phone, by transforming the storage system of smart mobile phone, the storage area that generates an enciphered data in smart mobile phone is as burst disk, and the security strategy of the position of this storage area, space and visit can will be provided with parameter and be kept on the storer by the software interface of smart mobile phone.Like this, when the user utilizes the computer interface of smart mobile phone to store/read the enciphered data of storage area, just can in computer or smart mobile phone, show a burst disk, when this burst disk of visit, need earlier calling party to be verified, such as, the prompting user inputs password on PC or smart mobile phone, just allow the user to carry out read or write if be proved to be successful in this burst disk, the enciphered data of reading in or writing is encrypted or decryption processing by the safe mobile storage system on the smart mobile phone, and the enciphered data after the processing can leave on the storer of smart mobile phone.The user at this moment, needs safe mobile storage system earlier calling party to be carried out authentication also with direct storage/read the enciphered data of smart mobile phone storage area.
As shown in Figure 2, be the structural representation of safe mobile storage system among the present invention, the mobile security storage system comprises: security strategy is provided with module, data transmission drive module, transmitting, monitoring module, secure verification module, filesystem conversion module, data encrypting and deciphering module and security strategy storer.
Security strategy is provided with module, is used to set the place of safety of storing encrypt data, and the access strategy that this storage security district is set, and access strategy can leave in the security strategy storer of opening up in addition.With the smart mobile phone is example, and the content of access strategy can comprise: the mobile phone burst disk is contents such as password open or that encrypt, that encrypt; Security strategy storer and burst disk can be arranged in the erasable internal memory or in the external memory card storage.
Data transmission drive module, the operation that is used to obtain the access security district when the operation in access security district, activates secure verification module; After this operation demonstration passed through, carry out alternately with the filesystem conversion module, to send to the filesystem conversion module at the operation of place of safety, and receive the data decryption that returns from the filesystem conversion module, data decryption be sent to the processor of computer interface or smart mobile phone; Perhaps, input data and the operation that needs is write the place of safety sends to the filesystem conversion module together.No matter be by computer interface or by the mobile phone access place of safety, all can the deactivation secure verification module.Data transmission drive module is to operate in the USB driving of operating system and the data transmission driving on the file driving, can tackle the packet of all-access place of safety; When the user passed through PC or smart mobile phone access security district, if this operation demonstration is passed through, data transmission drive module was delivered to the filesystem conversion module with operation and data that two kinds of approach obtain, and realization and filesystem conversion module is mutual.Simultaneously, this data transmission drive module also is responsible for monitoring USB incident (comprising insertion incident and dial-out incident), if receive the USB incident, the notification transmission monitoring module is handled accordingly.When the encryption function not enabled, this data transmission drive module only plays the function of transparent transmission USB bag and file access; When encryption function is enabled, can tackle all file operations to the place of safety visit.
The transmitting, monitoring module, responsible insertion or the dial-out incident of handling USB interface; When USB inserts incident, can call secure verification module visit is verified, and return and verify that result and place of safety configuration information are to data transmission drive module, with load document system modular converter; If when having USB to transfer to incident, the filesystem conversion module can be unloaded.
Secure verification module after being activated, reads security strategy, according to security strategy the operation in access security district is verified, and will be verified that result and place of safety configuration information return to data transmission drive module, and the checking content comprises that the user inputs the coupling of password etc.Under the situation that safety verification passes through, secure verification module can directly send to data transmission drive module with the place of safety configuration information.
The filesystem conversion module, receive the operation that data transmission drive module is sent, convert operation to operation to the place of safety, data after the deciphering are converted to one can be supplied the file layout of PC or mobile phone access and return to data transmission drive module, perhaps, the input data that needs are write the place of safety are delivered to the data encrypting and deciphering module and are encrypted, and the enciphered data of returning is write the place of safety.Enciphered data both can be the address area that is stored in one section reservation of smart mobile phone internal memory, but also can leave in the plug card storage of smart mobile phone with the form of file; The filesystem conversion module is converted to an addressable file system with the enciphered data in above-mentioned internal memory or the file, such as FAT32.
The data encrypting and deciphering module, the data that are used to finish transmission driving input are encrypted, and enciphered data is returned to the filesystem conversion module; Perhaps, be used for enciphered data is decrypted, and data decryption is returned to the filesystem conversion module, the encryption and decryption conversion can be selected symmetry or asymmetrical cryptographic algorithm.
Being applied in smart mobile phone with safe mobile storage system below is example, and the using method of safe mobile storage system is elaborated.
1, at first, by security strategy space size, deposit position, the authentication password that module is provided with the place of safety is set, and configuration information is kept on the storer of mobile phone, according to the place of safety that is provided with storer is carried out initialization, one section space of reserve storage or produce a file and be used to deposit enciphered data.
2, the transmitting, monitoring module is responsible for detecting the USB interface incident that data transmission drive module is reported up, if the operation in access security district is arranged, then notifies secure verification module.
As shown in Figure 3, be the workflow diagram of transmitting, monitoring module among the present invention, the course of work to the transmitting, monitoring module elaborates below.
(1) the USB incident of monitored data transmission drive module.
(2) if the transmitting, monitoring module receives the USB incident of data transmission drive module, further judge the type of USB incident.
If USB transfers to incident, the direct notification data transmission drive module of transmitting, monitoring module unloads other module chain; If USB inserts incident, then load secure verification module, USB dial-out incident is sent to secure verification module.
(3) the checking result who returns according to secure verification module returns different operational orders to data transmission drive module.If operational order is to be proved to be successful, data transmission drive module initialization files system modular converter then, data transmission drive module is passed to the filesystem conversion module with the place of safety configuration information; If operational order is an authentication failed, notification data transmission drive module then allows all usb data bags of the direct transparent transmission of data transmission drive module.
When authentication failed, because the filesystem conversion module does not load security set district information, this moment, the user can't the access security district.
3, secure verification module is verified the operation in access security district according to security strategy, and the checking content comprises the coupling of user, input password etc.
As shown in Figure 4, be the workflow diagram of secure verification module among the present invention, the process that the authentication-access place of safety of secure verification module is operated elaborates below.
Secure verification module is called, if the access security district needs password, can the prompting user input password on smart mobile phone or PC, and password is verified, then returns the place of safety configuration information if the verification passes and gives the transmitting, monitoring module; If authentication failed then the notification data transmission drive module is not wanted load document system modular converter that is to say and has only that the file system modular converter just can be loaded under the situation that checking passes through.
If the user also can activate secure verification module by the direct access security of smart mobile phone district.
4, data transmission drive module operates on the USB driving and file driving of operating system, when the operation in access security district, needing that secure verification module is delivered in this operation verifies, if the verification passes, then data transmission drive module realizes the data interaction of data transmission drive module and filesystem conversion module according to place of safety configuration information load document system modular converter.
When data transmission drive module when USB drives the USB bag (including the USB incident) get access to the access security district, notification transmission monitoring module and secure verification module are handled accordingly; When data transmission drive module when the file of smart mobile phone self drives the operation in intercepting and capturing access security district, the notice secure verification module is verified this operation, if the verification passes, the operation of obtaining under above-mentioned two kinds of situations is sent to the filesystem conversion module, realize visit the place of safety.When including usb data in the USB bag, file access command and usb data are sent to the filesystem conversion module together, usb data is saved to the place of safety after file system modular converter format conversion.
When the encryption function not enabled, this data transmission drive module transparent transmission USB incident and file access command.
5, the filesystem conversion module converts read-write operation (file access command) to the place of safety read-write operation; If the enciphered data that needs is read in read operation from the place of safety, and be decrypted, the data stream after the deciphering is passed to data transmission drive module by the data decryption module; If write operation is encrypted the data stream (promptly importing data) that data transmission drive module need write, and data stream encrypted is write encrypted area by data encryption module.
The read-write format converting module mainly plays the enciphered data that will leave in the place of safety and invents the effect that can supply PC or mobile phone file system access.Such as the file system that adopts on the PC is FAT32, the virtual security logic drive letter that comes out is E on PC, data transmission drive module can be address A (head number+cylinder number of driver E+sector number) for the reference address form of filesystem conversion module, further be mapped as access stencil to the address B (file path+offset address) in the mobile phone file system by the filesystem conversion layer, concrete mapping details is similar but be not limited to this.

Claims (10)

1, a kind of safe mobile storage system comprises storer, it is characterized in that, further comprises: security strategy is provided with module, data transmission drive module, secure verification module, filesystem conversion module and data encrypting and deciphering module, wherein,
Security strategy is provided with module, is used for setting at described storer the place of safety of storing encrypt data, and at the access strategy of described place of safety, place of safety configuration information and described access strategy are kept in the described storer;
Data transmission drive module is used to obtain the operation of visiting described place of safety, when visiting the operation of described place of safety, described operation is sent to described secure verification module; After described operation is by checking, load described filesystem conversion module according to the place of safety configuration information, described operation is sent to described filesystem conversion module, and the data decryption that obtains is sent to the processor of computer interface or smart mobile phone;
Secure verification module, be used to receive the operation that described data transmission drive module is sent, read described security strategy and place of safety configuration information, described operation is verified, and will verify that result and place of safety configuration information return to described data transmission drive module according to described security strategy;
The filesystem conversion module, be used to receive the operation that described data transmission drive module is sent, and read the enciphered data of described place of safety according to described operation, described enciphered data is sent to described data encrypting and deciphering module, the data decryption that returns is sent to described data transmission drive module;
The data encrypting and deciphering module is used for described enciphered data is decrypted, and returns data decryption and give described filesystem conversion module.
2, safe mobile storage system as claimed in claim 1, it is characterized in that, when described being operating as to described place of safety writes enciphered data, and after described data transmission drive module receives the input data of described computer interface, if described operation is by checking, described data transmission drive module sends to described filesystem conversion module together with described input data and operation; Described filesystem conversion module sends to described data encrypting and deciphering module with described input data, and the enciphered data of returning is write described place of safety; Described data encrypting and deciphering module is used for described input data are encrypted, and returns enciphered data and give described filesystem conversion module.
3, safe mobile storage system as claimed in claim 1 is characterized in that, described security strategy comprises security password, and described secure verification module is verified described operation according to described security password.
4, safe mobile storage system as claimed in claim 1, it is characterized in that, further comprise the transmitting, monitoring module, described transmitting, monitoring module is used to monitor the general-purpose serial bus USB incident, insert incident when receiving USB, described transmitting, monitoring module is used for described USB insertion incident is sent to described secure verification module, and checking result and the place of safety configuration information that described secure verification module is returned sent to described data transmission drive module; If described transmitting, monitoring module receives USB and extracts incident, notify described data transmission drive module unloading of file system modular converter; Described secure verification module is used for described USB insertion incident is verified, if the verification passes, returns checking result and place of safety configuration information and gives described transmitting, monitoring module.
5, safe mobile storage system as claimed in claim 1 is characterized in that, when the encryption function not enabled, described data transmission drive module is used for described USB incident of transparent transmission and operation.
6, safe mobile storage system as claimed in claim 1, it is characterized in that, described filesystem conversion module is used for described data decryption is carried out format conversion, described data decryption is converted to the form of computing machine or smart mobile phone identification, and the data decryption after the format conversion is sent to described data transmission drive module.
7, a kind of using method of safe mobile storage system is characterized in that, comprising:
By security strategy the place of safety of module settings storing encrypt data is set, and at the access strategy of described place of safety;
When data transmission drive module gets access to the operation in access security district, described operation is sent to secure verification module;
Described secure verification module receives described operation, reads described security strategy and place of safety configuration information, according to described security strategy described operation is verified, and will be verified that result and place of safety configuration information return to described data transmission drive module;
After described operation was by checking, described data transmission drive module sent to described filesystem conversion module according to described place of safety configuration information load document system modular converter with described operation;
Described filesystem conversion module reads the enciphered data of described place of safety according to the described operation that receives, and described enciphered data is sent to the data encrypting and deciphering module;
Described data encrypting and deciphering module is decrypted described enciphered data, and returns data decryption and give described filesystem conversion module;
Described filesystem conversion module sends to described data decryption by described data transmission drive module the processor of computer interface or smart mobile phone.
8, the using method of safe mobile storage system according to claim 7, it is characterized in that, when described behaviour is the data that write to described place of safety, and after described data transmission drive module receives the input data of described computer interface, if described operation is by checking, described data transmission drive module sends to described filesystem conversion module together with described input data and operation; Described filesystem conversion module sends to described data encrypting and deciphering module with described input data, and described data encrypting and deciphering module is encrypted described input data, and returns to described filesystem conversion module; Described filesystem conversion module writes described place of safety with described enciphered data.
9, the using method of safe mobile storage system according to claim 7, it is characterized in that, described filesystem conversion module is further carried out format conversion to described data decryption, described data decryption is converted to the form of computing machine or smart mobile phone identification, and the data decryption after the format conversion is sent to described data transmission drive module.
10, the using method of safe mobile storage system according to claim 7 is characterized in that, after receiving general-purpose serial bus USB insertion incident, described USB insertion incident is sent to secure verification module; Described secure verification module is verified described USB insertion incident, if the verification passes, returns checking result and place of safety configuration information to described data transmission drive module; Extract incident when receiving USB, notify described data transmission drive module unloading of file system modular converter.
CNA2008101324286A 2008-07-15 2008-07-15 Safe mobile storage system and method of use thereof Pending CN101308475A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101324286A CN101308475A (en) 2008-07-15 2008-07-15 Safe mobile storage system and method of use thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101324286A CN101308475A (en) 2008-07-15 2008-07-15 Safe mobile storage system and method of use thereof

Publications (1)

Publication Number Publication Date
CN101308475A true CN101308475A (en) 2008-11-19

Family

ID=40124939

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101324286A Pending CN101308475A (en) 2008-07-15 2008-07-15 Safe mobile storage system and method of use thereof

Country Status (1)

Country Link
CN (1) CN101308475A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567688A (en) * 2011-11-30 2012-07-11 中标软件有限公司 File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN102667792A (en) * 2009-11-20 2012-09-12 宝马股份公司 Method and device for accessing files of a secure fileserver
CN102663323A (en) * 2012-03-09 2012-09-12 无锡华御信息技术有限公司 Encryption method supporting mobile media
CN102799541A (en) * 2012-07-09 2012-11-28 江南大学 Combination control method of movable medium data protection
CN102831080A (en) * 2012-08-28 2012-12-19 广东欧珀移动通信有限公司 Data security protection method for mobile storage equipment
WO2013131363A1 (en) * 2012-03-09 2013-09-12 Shao Tong Apparatus and method for implementing secure storage area
CN104079414A (en) * 2014-07-18 2014-10-01 成都卫士通信息产业股份有限公司 Encryptor authentication method and device with identity authentication mechanism
CN104239820A (en) * 2013-06-13 2014-12-24 普天信息技术研究院有限公司 Secure storage device
CN104951408A (en) * 2015-05-25 2015-09-30 小米科技有限责任公司 Data protection method, storage device and terminal device
WO2016127829A1 (en) * 2015-02-11 2016-08-18 深圳市美贝壳科技有限公司 Loading control method and system for storage device
CN104063672B (en) * 2013-03-23 2016-12-28 北京万协通信息技术有限公司 Secure storage method of data
CN106933578A (en) * 2017-02-28 2017-07-07 惠州华阳通用电子有限公司 A kind of USB drive load methods of QNX systems
CN107633178A (en) * 2017-09-29 2018-01-26 厦门天锐科技股份有限公司 A kind of file protecting system and method based on Android device
CN109840411A (en) * 2018-02-27 2019-06-04 中国科学院计算技术研究所 A kind of guard method and system of application
CN112100600A (en) * 2020-08-24 2020-12-18 中国电子科技集团公司第三十八研究所 Safe access method for sensitive data
CN113536345A (en) * 2021-07-15 2021-10-22 深圳市高德信通信股份有限公司 Computer data security protection method

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102667792A (en) * 2009-11-20 2012-09-12 宝马股份公司 Method and device for accessing files of a secure fileserver
CN102667792B (en) * 2009-11-20 2015-11-25 宝马股份公司 For the method and apparatus of the file of the file server of access security
CN102567688A (en) * 2011-11-30 2012-07-11 中标软件有限公司 File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN102567688B (en) * 2011-11-30 2015-05-20 中标软件有限公司 File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN102663323A (en) * 2012-03-09 2012-09-12 无锡华御信息技术有限公司 Encryption method supporting mobile media
WO2013131363A1 (en) * 2012-03-09 2013-09-12 Shao Tong Apparatus and method for implementing secure storage area
CN102799541A (en) * 2012-07-09 2012-11-28 江南大学 Combination control method of movable medium data protection
CN102831080A (en) * 2012-08-28 2012-12-19 广东欧珀移动通信有限公司 Data security protection method for mobile storage equipment
CN104063672B (en) * 2013-03-23 2016-12-28 北京万协通信息技术有限公司 Secure storage method of data
CN104239820A (en) * 2013-06-13 2014-12-24 普天信息技术研究院有限公司 Secure storage device
CN104239820B (en) * 2013-06-13 2017-11-03 普天信息技术研究院有限公司 A kind of safety storage apparatus
CN104079414A (en) * 2014-07-18 2014-10-01 成都卫士通信息产业股份有限公司 Encryptor authentication method and device with identity authentication mechanism
WO2016127829A1 (en) * 2015-02-11 2016-08-18 深圳市美贝壳科技有限公司 Loading control method and system for storage device
US10437741B2 (en) 2015-02-11 2019-10-08 Meibeike (Shenzhen) Technollogy Co., Ltd Loading control method and system storage device
CN104951408A (en) * 2015-05-25 2015-09-30 小米科技有限责任公司 Data protection method, storage device and terminal device
CN104951408B (en) * 2015-05-25 2018-02-06 小米科技有限责任公司 Data guard method, storage device and terminal device
CN106933578A (en) * 2017-02-28 2017-07-07 惠州华阳通用电子有限公司 A kind of USB drive load methods of QNX systems
CN106933578B (en) * 2017-02-28 2020-05-22 惠州华阳通用电子有限公司 USB drive loading method of QNX system
CN107633178A (en) * 2017-09-29 2018-01-26 厦门天锐科技股份有限公司 A kind of file protecting system and method based on Android device
CN107633178B (en) * 2017-09-29 2020-12-04 厦门天锐科技股份有限公司 File protection system and method based on Android device
CN109840411A (en) * 2018-02-27 2019-06-04 中国科学院计算技术研究所 A kind of guard method and system of application
CN109840411B (en) * 2018-02-27 2021-01-08 中国科学院计算技术研究所 Application protection method and system
CN112100600A (en) * 2020-08-24 2020-12-18 中国电子科技集团公司第三十八研究所 Safe access method for sensitive data
CN113536345A (en) * 2021-07-15 2021-10-22 深圳市高德信通信股份有限公司 Computer data security protection method

Similar Documents

Publication Publication Date Title
CN101308475A (en) Safe mobile storage system and method of use thereof
US7861015B2 (en) USB apparatus and control method therein
CN101241569B (en) Electronic signature method and device and system
US10204240B2 (en) Encrypting portable media system and method of operation thereof
CN101470783B (en) Identity recognition method and device based on trusted platform module
CN101551784B (en) Method and device for encrypting data in ATA memory device with USB interface
CN1889419B (en) Method and apparatus for realizing encrypting
CN101986597A (en) Identity authentication system with biological characteristic recognition function and authentication method thereof
US7136995B1 (en) Cryptographic device
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
EP2361416A1 (en) Secure storage device
CN101364187A (en) Double operating system computer against worms
CN102831081A (en) Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof
CN100462993C (en) Outer placed mobile storage in use for alete information processing
CN105389526A (en) Mobile hard disk integrating encrypted area and non-encrypted area and data storage method for mobile hard disk
CN101901320A (en) Data leakage prevention method for electronic book reader
CN102768646A (en) Serial port hard disk encryption and decryption device
CN114340051B (en) Portable gateway based on high-speed transmission interface
CN103324970B (en) The receiving/transmission method of a kind of RFID of highly effective and safe and system thereof
TWI514834B (en) Encrypted storage device for personal information
CN101079090B (en) Apparatus for reproducing personal application environment
CN102831080A (en) Data security protection method for mobile storage equipment
KR100574234B1 (en) External memory card insertable secure data storage apparatus with usb interface, and storing method thereof
JP2006221259A (en) Method for recording data in external storage medium and data transfer control interface software for use therewith
JP2006227679A (en) Usb memory key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20081119