CN101877246A - U disk encryption method - Google Patents

U disk encryption method Download PDF

Info

Publication number
CN101877246A
CN101877246A CN 200910135802 CN200910135802A CN101877246A CN 101877246 A CN101877246 A CN 101877246A CN 200910135802 CN200910135802 CN 200910135802 CN 200910135802 A CN200910135802 A CN 200910135802A CN 101877246 A CN101877246 A CN 101877246A
Authority
CN
China
Prior art keywords
disk
hard disk
removable hard
protected
key
Prior art date
Application number
CN 200910135802
Other languages
Chinese (zh)
Inventor
不公告发明人
Original Assignee
许燕
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 许燕 filed Critical 许燕
Priority to CN 200910135802 priority Critical patent/CN101877246A/en
Publication of CN101877246A publication Critical patent/CN101877246A/en

Links

Abstract

The invention provides a U disk (mobile hard disk) encryption method which monitors the USB Hey state in real time, carries out identity verification and obtains a key by authorized USB Key, wherein the protected U disk (mobile hard disk) is divided into a protective area and a non-protective area; the protective area is mapped into a virtual disk when the authorized verification is passed, data wrote into the disk is encrypted and the data read from the disk is decrypted; the non-protective area is still used as a common U disk (mobile hard disk). When the USB Key does not exist, the protective area cannot be accessed. The data stored in the protective area of the U disk (mobile hard disk) is encrypted forever, and is automatically decrypted in a memory when being used by a user. The invention supports the U disks (mobile hard disks) and file systems of all types, does not change the use habit of conventional data and the action of application programs of users, and does not require the users to buy new U disk (mobile hard disk) equipment.

Description

加密U盘实现方法 U disk encryption implementation

所属技术领域 Those of skill

[0001] 本发明涉及一种加密U盘(移动硬盘)的实现方法,主要是实现用户U盘(移动硬盘)数据的自动加解密保护。 [0001] U relates to an encryption disk (removable hard disk) implemented method of the present invention, is to achieve a user U disk (removable hard disk) automatic encryption and decryption of data protection. 使用户在不需要增加新的系统硬件设施、不改变传统数据使用习惯的基础上达到U盘(移动硬盘)数据的自动加解密,提高信息安全,防止信息泄露,同时又保留了U盘(移动硬盘)的数据交换和共享特性,在不增加用户的使用成本和负担的基础上达到“一盘两用”。 So that users do not need to add new hardware system, not to change the traditional habit of using the data base to achieve automatic encryption and decryption of U disk (removable hard disk) data, improve information security, prevent information leakage, while retaining the U disk (mobile hard disk) data exchange and sharing properties, to achieve "a dual" without increasing the cost and the burden on a user basis. 该方法从USB Key中获取密钥并进行身份认证,使用虚拟磁盘技术实现数据实时透明加解密;该方法在U盘(移动硬盘)上划分受保护数据区,这个区对用户不可见,当USB Key存在时,利用虚拟磁盘技术将该空间映射成磁盘给用户使用,写入到这个磁盘内的文件数据被自动加密,从这个磁盘内读出的文件数据被自动解密;U盘(移动硬盘)上的非保护区仍然是一个普通的U盘(移动硬盘),满足普通数据交换和共享的需求;当USB Key不存在时,受保护区对用户不可见,数据也无法访问。 This method gets from the USB Key and the key authentication, using a virtual disk technology to achieve transparent encryption and decryption of data in real time; the method in the U disk (removable hard disk) into the protected data area, this area invisible to the user, when the USB Key is present, the technology using a virtual disk to disk space is mapped to the user, the file data is written to this disk is automatically encrypted file data read from the disk is automatically decrypted; the U-disk (removable hard disk) non-protected areas on the remains of a common U disk (removable hard disk), to meet the general needs of data exchange and sharing; when USB Key is not present, the protected area invisible to the user, the data can not be accessed.

背景技术 Background technique

[0002] 随着计算机技术的快速发展,移动存储设备的应用已经非常普遍。 [0002] With the rapid development of computer technology, the application of removable storage devices has been very common. 这些设备在方便人们使用的同时也给人们带米了巨大的威胁:信息泄露。 These devices are easy for people to use but also to people with rice tremendous threat: information disclosure. 国际国内因为信息泄露导致的产品流产,客户流失,信誉受损,财产流失等事件屡见报端。 International and domestic products because of information leakage caused by miscarriage, loss of customers, damage to reputation, loss of property and other events often found in newspapers. 因此移动存储设备的信息保护已经成为一个客不容缓的话题。 Therefore, information protection removable storage devices has become the topic of a customer without delay.

[0003] 为了应对这个需求,许多设备厂商纷纷推出了多种移动存储设备信息保护产品, 目前比较常见的就是加密U盘(移动硬盘)。 [0003] In response to this demand, many equipment manufacturers have introduced a variety of mobile storage devices information protection products, is currently more common U disk encryption (removable hard disk). 用户存储到U盘(移动硬盘)上的数据被加密,在使用时必须先输入授权密码。 Data stored on the user U disk (removable hard disk) is encrypted, a password must be entered in the authorized use. 这样就可以限制非法用户的信息盗取。 This can restrict unauthorized users to steal information. 但是这种模式目前存在以下几个问题: However, this model currently exists following questions:

[0004] 1 :需要在U盘(移动硬盘)接口控制芯片一级实现加密,因此必须依附于新的硬件设备。 [0004] 1: required Interface Control encryption chip in a U disk (removable hard disk), and therefore must be attached to the new hardware. 用户必须购买新的U盘或者移动硬盘盒子,旧的设备不被支持,用户使用代价过 Users must purchase a new U disk or removable hard disk box, the old equipment had not been used to support the cost, user

尚O Still O

[0005] 2 :U盘(移动硬盘)上的数据全部被加密,没有任何区分。 [0005] 2: the data on the U disk (removable hard disk) are all encrypted, without any distinction. 导致U盘(移动硬盘) 不能够再方便的进行数据的共享,降低了设备的利用率,同时浪费大量资源。 Resulting in U disk (removable hard disk) can no longer be easily shared data, reducing the utilization of equipment, waste a lot of resources simultaneously.

[0006] 3:数据在硬盘芯片级别进行加密,硬盘上所有数据都是加密的,一旦硬盘出现损坏或者故障,无法送交第三方进行数据恢复。 [0006] 3: data on the hard disk chip-level encryption, all data on the hard disk is encrypted, once the hard disk is damaged or fails, can not be sent to third-party data recovery.

发明内容 SUMMARY

[0007] 本发明的主要目的在于提供一种以保护U盘(移动硬盘)的机密信息不被窃取, 同时又不影响U盘(移动硬盘)的数据交换和共享特性以及日常使用,并能完全兼容现有U盘(移动硬盘)设备,大量节省用户使用成本的加密U盘(移动硬盘)实现方法。 [0007] The main object of the present invention is to provide a protective U disk (removable hard disk) confidential information from being stolen, without affecting the U disk (removable hard disk) data exchange and sharing characteristics and everyday use, and completely U is compatible with existing disk (removable hard disk) device, substantial savings in the cost of the user's encryption U disk (removable hard disk) implementation.

[0008] 本发明使用USB Key来实现用户身份认证和密钥保存,密钥在生产时采用硬件随机生成后写到Key中,无需用户记忆;这种Key使用操作系统提供的HID设备来驱动,因此它不需要用户额外安装驱动,降低了用户的驱动安装与维护的开销;本发明使用虚拟磁盘技术来实现加密U盘(移动硬盘),兼容所有U盘(移动硬盘),不必额外采购新的硬件设备;虚拟磁盘完全兼容用户的原有数据使用习惯和方式,极大的方便了用户;本发明将整个U盘(移动硬盘)分为保护区和非保护区,只有保护区的数据受到保护,非保护区仍然是一个普通的U盘(移动硬盘),使用户仍然能正常利用U盘(移动硬盘)的数据交换和共享特性。 [0008] The present invention uses USB Key to implement user authentication and key storage, key randomly generated using the hardware writes Key, the user need not remember in the production; Key using this apparatus HID driver provided by an operating system, so it does not require users to install additional drivers, reducing the user's drive installation and maintenance of overhead; the present invention is the use of virtual disk encryption technology to achieve U disk (removable hard disk), compatible with all U disk (removable hard disk), without having to purchase additional new hardware; virtual disk data is fully compatible with the original user's habits and ways, a great convenience to the user; the invention the entire U disk (removable hard disk) into protected areas and non-protected areas, only the data protected areas are protected , a non-protected area is still generally U disk (removable hard disk), so that users can still use normal data exchange and sharing properties U disk (removable hard disk) is.

[0009] 该方法硬件部分是一个普通的HID接口的USB Key,直接使用HID设备驱动进行驱动,利用核心层的设备间相互通信实现对该设备的控制和认证数据以及密钥的读取。 [0009] The hardware section is a common method of HID USB Key interface, device drivers directly driven HID, devices communicate with each other using the core layer to achieve the reading and control device and the authentication key data. 该方法的硬件部分也可以集成一个普通的U盘,直接使用USB存储设备驱动进行驱动。 The hardware part of the method may also be integrated into a generally U-disk, a USB storage device directly drives drive.

[0010] 软件部分是虚拟磁盘驱动,在Key存在并通过身份认证时,该驱动负责将U盘(移动硬盘)上的保护区映射成磁盘给用户使用,将写入该磁盘的文件数据进行加密,从该磁盘读出的文件数据进行解密;当Key不存在时保护区对用户是不可见的,保证数据不被意外损坏;非保护区无论Key存在与否都是普通的U盘(移动硬盘),不影响数据交换和共享。 [0010] software is part of a virtual disk drive, and when there is through authentication, the driver is responsible for mapping of protected areas on the U disk (removable hard disk) into the disk to users in the Key, the file data is written to the disk is encrypted , the file data read out from the disk to decrypt; Key does not exist when the protected area is not visible to the user, to ensure that data is not accidentally damaged; non-protected area are common regardless of the presence or absence Key U disk (removable hard disk ), does not affect the data exchange and sharing.

[0011] 由于采用了以上技术方案,使本发明具有: [0011] With the above technical solution of the present invention comprises:

[0012] 1 :HID接口的USB Key不需要额外安装驱动,降低用户的设备驱动维护开销; [0012] 1: HID USB Key no additional interfaces for mounting the driver, and reduce maintenance costs of the device driver;

[0013] 2 :虚拟磁盘驱动兼容所有的U盘(移动硬盘)和文件系统,不需要用户额外购买新的设备,可以直接支持原有的U盘(移动硬盘),节省用户的设备使用成本; [0013] 2: virtual disk drive is compatible with all U disk (removable hard disk) and file systems, does not require users to purchase additional new equipment, can directly support the original U disk (removable hard disk), saving the user cost of equipment;

[0014] 3 :虚拟磁盘提供完全透明的加密解密过程,完全兼容用户的使用习惯; [0014] 3: Virtual Disk provides encryption and decryption process is completely transparent, fully compatible with the user's habits;

[0015] 4 :有选择的数据加密,既可以保护重要数据又可以发挥U盘(移动硬盘)的数据共享和交换功能; [0015] 4: the selection data encryption, data may be protected and can play an important U disk (removable hard disk) of data sharing and exchange function;

[0016] 5 :实时设备监控,一旦USB Key不存在,虚拟磁盘就不再存在,保护区数据即被保护,无法使用,方便用户。 [0016] 5: Real-time device monitoring, once the USB Key does not exist, the virtual disk will no longer exist, protected areas The data is protected and can not use, user-friendly.

[0017] 6 :支持多种加密算法,可随意根据需要指定或者升级,灵活方便; [0017] 6: Support multiple encryption algorithms, can be arbitrary or update needed flexibility;

[0018] 7 :密钥由硬件随机生成并存储在Key中,无需用户保存,避免遗失。 [0018] 7: randomly generated by a hardware key and stored in the Key, without requiring the user to avoid losing it.

[0019] 8 :U盘(移动硬盘)的非保护区数据不被加密,仍然是普通的U盘(移动硬盘), 保证U盘(移动硬盘)得数据交换特性不受影响。 [0019] 8: U disk (removable hard disk) of the non-protected area data is not encrypted, remains generally U disk (removable hard disk), to ensure that the U disk (removable hard disk) to obtain data exchange characteristic is not affected.

[0020] 9 :U盘(移动硬盘)的受保护区在Key不存在时对用户不可见,防止数据被意外损坏。 [0020] 9: U disk (removable hard disk) protected area invisible to the user when the Key does not exist, to prevent data from being inadvertently damaged.

[0021] 这些特点优于市场上已有的任何U盘(移动硬盘)加密保护产品。 [0021] These features already on the market any better than the U disk (removable hard disk) encryption to protect the product.

[0022] 本发明的有益效果是:可以使用户在不用购买新的U盘(移动硬盘)、移动硬盘盒的基础上就可以实现加密U盘(移动硬盘),有效利用现有资源降低用户成本;同时完全透明的加解密效果可以完全兼容用户原有的数据使用习惯和方式,用户无需作任何专门的学习就可以使用,减轻用户的使用负担;用户可以随意变更保护区和非保护区的空间大小,既能防止信息泄密又可以充分利用U盘(移动硬盘)的信息交换能力。 [0022] Advantageous effects of the present invention are: allows users without having to purchase a new U disk (removable hard disk), can be achieved on the basis of the encryption removable disk cartridge U disk (removable hard disk), the effective use of available resources to reduce user costs ; at the same time completely transparent encryption and decryption effects can be fully compatible with the original user's data usage habits and way, users do not need to make any special study can be used to reduce the burden on the user to use; the user can freely change the space protected areas and non-protected areas size, both to prevent the leakage of information and can make full use of the U disk (removable hard disk) of the information exchange.

附图说明 BRIEF DESCRIPTION

[0023] 下面结合附图和实施方式对本发明进一步说明。 [0023] The present invention will be further described in conjunction with the accompanying drawings and embodiments.

[0024] 图1是本发明的软件架构图。 [0024] FIG. 1 is a software architecture diagram of the present invention.

[0025] 图2是本发明的硬件架构图。 [0025] FIG. 2 is a hardware schematic diagram of the present invention.

[0026] 图3是本发明的HID设备监控流程图[0027] 图4是本发明的虚拟磁盘驱动工作流程图 [0026] FIG. 3 is a flowchart HID monitoring apparatus according to the invention [0027] FIG. 4 is a virtual disk drive of the present invention is an operation flowchart

[0028] 图中1.应用程序,2.用户操作,3.系统文件操作API,4.核心文件服务接口,5.文件系统驱动,6.磁盘驱动,7.虚拟磁盘驱动,8. HID设备驱动,9. HID接口寄存器,10. HID设备固件。 [0028] FIG 1. applications, 2. the user operation, 3. the system file operation API, 4. Core document service interface 5. file system driver, 6 Disk drives, 7 virtual disk drive, 8. HID device driving, 9. HID interface registers, 10. HID device firmware.

具体实施方式: Detailed ways:

[0029] 为了详细说明本发明的结构及所达到的功效,现举以下较佳实施例并配合附图说明如下: [0029] To illustrate the detailed structure of the present invention and the effect achieved by the preferred embodiment is now described with the accompanying drawings and the following cited as follows:

[0030] 图1中,应用程序和用户操作与系统文件接口交互,系统文件接口把请求转成内核态文件服务请求。 In [0030] FIG. 1, application files and user interfaces to interact with the system, the file system interface to forward requests to the kernel state file service request. 这些请求首先被发送到文件系统驱动,文件系统驱动将请求分发给相应的磁盘设备驱动;虚拟磁盘驱动根据目前HID USB Key的状态来进行操作。 The request is first sent to the file system driver, the file system driver a request to the appropriate disk drive apparatus; a virtual disk drive to operate in accordance with the current state of the HID USB Key. 如果Key不存在,虚拟磁盘驱动就禁止模拟磁盘设备给系统,此时受保护磁盘的保护区不能访问;如果Key存在且通过认证,虚拟磁盘驱动就模拟磁盘给系统,将受保护磁盘的保护区映射成一个磁盘,此时写入该磁盘的文件数据被虚拟磁盘驱动加密,并被重定向到实际磁盘的保护区域;从该磁盘读取数据的请求被虚拟磁盘驱动重定向到实际磁盘的保护区,读出的文件数据被解密,然后交给系统正常处理;非保护区内的数据直接由系统磁盘驱动管理,仍然是普通的U盘(移动硬盘),不受任何影响。 If the Key does not exist, the virtual disk drive to ban simulated disk devices to the system, this time to protect the protected area of ​​the disk can not be accessed; if Key is present and certified, virtual disk drive on the analog disk to the system, the protected area of ​​disk protection mapped into a disk, then the data written to the disk file is a virtual disk drive is encrypted and redirected to the protected area of ​​the actual disk; read data from the disk requests are redirected to the virtual disk drive to protect the actual disk area, read the file data is decrypted, and then to the normal processing system; data unprotected area directly managed by the system disk drive is still common U disk (removable hard disk), are not affected.

[0031 ] 图2中,虚拟磁盘驱动利用HID驱动和设备间通讯技术和HID接口的USB Key进行通讯,符合虚拟磁盘驱动的一系列认证序列的USB Key就是经过授权的Key,虚拟磁盘驱动从这个Key中获取密钥,用户使用口令,受保护磁盘区域的大小和位置等信息。 In [0031] 2, virtual disk drive using the drive between HID and communications technology equipment and HID USB Key communication interfaces, in line with a series of USB Key authentication sequence of virtual disk drive is authorized Key, virtual disk drive from this key acquire keys, the user password, the size and position information of the disk protected area.

[0032] 图3中,虚拟磁盘驱动监控HID USB Key的状态,如果发现HID接口的USB Key存在就进行数据交互,符合特定的数据交互序列的Key就是我们的目的Key,接下来从Key中获取事先存储的密钥和用户使用口令,并通知用户进行口令认证,认证成功后通知虚拟磁盘驱动Key存在并给出密钥。 In [0032] Figure 3, the virtual disk drive status monitoring HID USB Key, if you find USB Key HID interface exists to exchange data in line with Key sequence-specific data exchange is our aim Key, followed by obtaining from the Key previously stored keys and user passwords, and notifies the user password authentication, notification after successful authentication virtual disk drive key presence and gives key. 如果通过身份认证的HID接口USB Key被移除,就通知虚拟磁盘驱动Key不存在并清空密钥,同时取消磁盘空间映射。 If the authentication by HID Interface USB Key is removed, it notifies the virtual disk drive Key does not exist and empty keys, cancellation of disk space mapping.

[0033] 图4中,虚拟磁盘驱动收到系统发来的文件数据请求之后,根据从Key中获得的参数将请求重定向到实际磁盘的受保护区,写入的数据被加密,读取的数据被解密。 After the [0033] FIG. 4, the virtual disk drive system receives a data request sent to the file, in accordance with the parameters obtained from Key redirects the request to a protected area of ​​the actual disk, written data is encrypted, the read data is decrypted.

Claims (10)

  1. 一种加密U盘(移动硬盘)实现方法,在系统中添加了虚拟磁盘驱动和HID接口设备监控器。 An encryption U disk (removable hard disk) implemented method of adding virtual disk drive interface devices HID and monitor the system. 其特征在于:一个普通的系统核心服务程序,当该核心服务程序运行时,如果存在通过身份认证的Key和受保护的U盘(移动硬盘),系统中会添加一个虚拟磁盘,这个磁盘被映射到受保护U盘(移动硬盘)的保护区,写入到该磁盘的文件数据被自动加密,从该磁盘读出的文件数据被自动解密;受保护U盘(移动硬盘)的非保护区的文件数据不受影响,仍然是一个普通U盘(移动硬盘);如果不存在通过身份认证的Key,受保护U盘(移动硬盘)的保护区是不能访问的。 Characterized by: a common system core service program, when the core service is running, if there is through authentication Key and U-Protected (removable hard disk), the system will add a virtual disk, the disk has been mapped to a protected area protected U disk (removable hard disk), and writes data to the disk file is automatically encrypted file data read from the disk is automatically decrypted; protected non-protected area of ​​the U disk (removable hard disk) of file data is not affected, is still a common U disk (removable hard disk); if by Key authentication does not exist, protected areas protected U disk (removable hard disk) is not accessible.
  2. 2.根据权利要求1所述的核心服务程序,其特征是:一个运行在核心层的服务程序,可以向系统中添加虚拟磁盘并实时监控HID接口USB Key的状态。 The core service program according to claim 1, characterized in that: a service program running on the core layer, may be added to a virtual disk system and real-time monitoring of the state of the HID USB Key Interface.
  3. 3.根据权利要求1所述的核心服务程序,其特征是:支持所有类型的U盘(移动硬盘) 和文件系统,需要在U盘(移动硬盘)上指定保护区的大小和位置,保护区在Key不存在时无法访问。 The core service program according to claim 1, wherein: U supports all types of disk (removable hard disk) and the file system, protected regions specified size and location of the U disk (removable hard disk), protected areas It can not be accessed when the Key does not exist.
  4. 4.根据权利要求1所述的核心服务程序,其特征是:支持所有类型的U盘(移动硬盘) 和文件系统,需要在U盘(移动硬盘)上指定保护区的大小和位置,非保护区不受任何影响,仍然可以作为一个普通的U盘(移动硬盘)使用。 Core according to claim 1 of the service program, wherein: U supports all types of disk (removable hard disk) and the file system, protected regions specified size and location of the U disk (removable hard disk), a non-protected area not affected, still can be used as a common U disk (removable hard disk) to use.
  5. 5 .根据权利要求1所述的核心服务程序,其特征是:可以将受保护U盘(移动硬盘)的保护区映射成为虚拟磁盘供用户访问,虚拟磁盘支持所有文件系统。 5. The core service program according to claim 1, wherein: U may be protected disk (removable hard disk) mapped to the protected area for the user to access the virtual disk, the virtual disk support all file systems.
  6. 6.根据权利要求1所述的核心服务程序,其特征是:实时监控USB Key的状态,USB Key 存在时提示用户进行身份认证,不存在时直接取消已有的虚拟磁盘映射。 The core services of the procedure to claim 1, characterized in that: real-time monitoring of the USB Key, prompting the user when USB Key presence authenticate directly to cancel an existing virtual disk mapping does not exist.
  7. 7.根据权利要求1所述的核心服务程序,其特征是:使用的USB Key是HID接口,不需要另外提供驱动,Key用来进行密钥存储和身份认证。 The core service program according to claim 1, wherein: using the interface HID USB Key is no need to provide additional drive, Key used for key storage and authentication.
  8. 8.根据权利要求1所述的核心服务程序,其特征是:以虚拟磁盘的方式提供用户对受保护U盘(移动硬盘)的保护区的存取,不改变应用程序和用户访问数据的任何行为。 The core service program according to claim 1, characterized in that: in a way to provide a user a virtual disk access to protected areas protected U disk (removable hard disk) is, without changing the application data and user access to any behavior.
  9. 9.根据权利要求1所述的核心服务程序,其特征是:不提供额外的任何形式的库函数, 不改变处理过的文件的大小和其他任何属性。 Core according to claim 1 of the service program, characterized in that: does not provide any form of additional library functions does not change the size of the processed file and any other properties.
  10. 10.根据权利要求1所述的核心服务程序,其特征是:可以动态的加载,完全运行在系统核心层。 10. The core services program according to claim 1, wherein: the dynamically loaded, the system runs entirely in the core layer. 所有的数据转换和处理都是在核心层完成,不需要其他的支持程序。 All data conversion and processing are at the core layer is completed, no other support programs.
CN 200910135802 2009-04-28 2009-04-28 U disk encryption method CN101877246A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910135802 CN101877246A (en) 2009-04-28 2009-04-28 U disk encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910135802 CN101877246A (en) 2009-04-28 2009-04-28 U disk encryption method

Publications (1)

Publication Number Publication Date
CN101877246A true CN101877246A (en) 2010-11-03

Family

ID=43019775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910135802 CN101877246A (en) 2009-04-28 2009-04-28 U disk encryption method

Country Status (1)

Country Link
CN (1) CN101877246A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184358A (en) * 2011-04-28 2011-09-14 郑州信大捷安信息技术有限公司 USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
CN102479296A (en) * 2010-11-29 2012-05-30 公安部第一研究所 Virus and Trojan prevention method for USB (Universal Serial Bus) flash disk data
CN102663323A (en) * 2012-03-09 2012-09-12 无锡华御信息技术有限公司 Encryption method supporting mobile media
WO2013040915A1 (en) * 2011-09-22 2013-03-28 腾讯科技(深圳)有限公司 File encryption method and device, file decryption method and device
CN103139366A (en) * 2011-12-05 2013-06-05 希姆通信息技术(上海)有限公司 Mobile terminal and data protection method thereof
CN103745170A (en) * 2014-01-02 2014-04-23 浙江云巢科技有限公司 Processing method and device for disk data
CN104571950A (en) * 2014-12-24 2015-04-29 中国科学院信息工程研究所 Command identifying method for external storage medium
CN106682521A (en) * 2016-11-28 2017-05-17 北京计算机技术及应用研究所 File transparent encryption and decryption system and method based on driver layer
CN106911467A (en) * 2015-12-23 2017-06-30 北京握奇智能科技有限公司 A kind of data confidentiality storage and the method for transmission

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN1866224A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Mobile memory device and method for accessing encrypted data in mobile memory device
EP1836640A2 (en) * 2004-12-21 2007-09-26 SanDisk Corporation Memory system with versatile content control
CN101350723A (en) * 2008-06-20 2009-01-21 北京天威诚信电子商务服务有限公司 USB Key equipment and method for implementing verification thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1836640A2 (en) * 2004-12-21 2007-09-26 SanDisk Corporation Memory system with versatile content control
CN1866224A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Mobile memory device and method for accessing encrypted data in mobile memory device
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN101350723A (en) * 2008-06-20 2009-01-21 北京天威诚信电子商务服务有限公司 USB Key equipment and method for implementing verification thereof

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479296A (en) * 2010-11-29 2012-05-30 公安部第一研究所 Virus and Trojan prevention method for USB (Universal Serial Bus) flash disk data
CN102184358A (en) * 2011-04-28 2011-09-14 郑州信大捷安信息技术有限公司 USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
US9224002B2 (en) 2011-09-22 2015-12-29 Tencent Technology (Shenzhen) Company Limited Method and apparatus for file encryption/decryption
WO2013040915A1 (en) * 2011-09-22 2013-03-28 腾讯科技(深圳)有限公司 File encryption method and device, file decryption method and device
CN103020537A (en) * 2011-09-22 2013-04-03 腾讯科技(深圳)有限公司 Data encrypting method, data encrypting device, data deciphering method and data deciphering device
CN103139366A (en) * 2011-12-05 2013-06-05 希姆通信息技术(上海)有限公司 Mobile terminal and data protection method thereof
CN103139366B (en) 2011-12-05 2014-09-24 希姆通信息技术(上海)有限公司 Mobile terminal and data protection method thereof
CN102663323A (en) * 2012-03-09 2012-09-12 无锡华御信息技术有限公司 Encryption method supporting mobile media
CN103745170A (en) * 2014-01-02 2014-04-23 浙江云巢科技有限公司 Processing method and device for disk data
CN103745170B (en) * 2014-01-02 2017-01-04 浙江云巢科技有限公司 The processing method and processing device of data in magnetic disk
CN104571950A (en) * 2014-12-24 2015-04-29 中国科学院信息工程研究所 Command identifying method for external storage medium
CN104571950B (en) * 2014-12-24 2018-03-23 中国科学院信息工程研究所 A kind of password authentication method of peripheral hardware storage medium
CN106911467A (en) * 2015-12-23 2017-06-30 北京握奇智能科技有限公司 A kind of data confidentiality storage and the method for transmission
CN106682521A (en) * 2016-11-28 2017-05-17 北京计算机技术及应用研究所 File transparent encryption and decryption system and method based on driver layer

Similar Documents

Publication Publication Date Title
RU2295834C2 (en) Initialization, maintenance, renewal and restoration of protected mode of operation of integrated system, using device for controlling access to data
US7849510B2 (en) System and method for transparent disk encryption
KR100375158B1 (en) Tamper resistant microprocessor
US5835594A (en) Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage
US7200747B2 (en) System for ensuring data privacy and user differentiation in a distributed file system
US7627756B2 (en) Storage system for data encryption
US20080022134A1 (en) Secure Data Storage for Protecting Digital Content
US20070098152A1 (en) Encryption/decryption of stored data using non-accessible, unique encryption key
JP5724118B2 (en) Protection device management
CN1197014C (en) Internal memory type anti-falsification processor and security method
JP4660188B2 (en) Protection from attacks in sleep
JP2007507788A (en) Method and system for data synchronization with personal portable terminal through network
US20030133574A1 (en) Secure CPU and memory management unit with cryptographic extensions
CN1535411B (en) Method and system for promoting security in computer system employing attached storage devices
US20030210790A1 (en) Optimizing costs associated with managing encrypted data
CN100580682C (en) System and method for securely saving and restoring context of secure program loader
CN100386707C (en) Generating key hierarchy for use in isolated execution environment
CN101661544B (en) Method and apparatus for providing a secure display window inside the primary display
US20050246778A1 (en) Transparent encryption and access control for mass-storage devices
CN101853363B (en) File protection method and system
US7293173B2 (en) Methods and systems for protecting information in paging operating systems
US20100153749A1 (en) Device-access control program, device-access control process, and information processing apparatus for controlling access to device
Borders et al. Protecting Confidential Data on Personal Computers with Storage Capsules.
US8745386B2 (en) Single-use authentication methods for accessing encrypted data
CN1410876A (en) microprocessor

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)