CN102236611B - Data deletion method for computer memory device - Google Patents

Data deletion method for computer memory device Download PDF

Info

Publication number
CN102236611B
CN102236611B CN 201010165771 CN201010165771A CN102236611B CN 102236611 B CN102236611 B CN 102236611B CN 201010165771 CN201010165771 CN 201010165771 CN 201010165771 A CN201010165771 A CN 201010165771A CN 102236611 B CN102236611 B CN 102236611B
Authority
CN
China
Prior art keywords
data
record file
control module
deletion record
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 201010165771
Other languages
Chinese (zh)
Other versions
CN102236611A (en
Inventor
詹逸信
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nexcom International Co Ltd
Original Assignee
XINHAN COMPUTER CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XINHAN COMPUTER CO Ltd filed Critical XINHAN COMPUTER CO Ltd
Priority to CN 201010165771 priority Critical patent/CN102236611B/en
Publication of CN102236611A publication Critical patent/CN102236611A/en
Application granted granted Critical
Publication of CN102236611B publication Critical patent/CN102236611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data deletion method for a computer memory device, in which a default value of a deletion record file in a memory device is preset when the memory device is electrified and started, if the deletion record file is started, and the deletion record file of the memory device is not closed before the memory device is power off, the memory device automatically deletes internal data after detecting the deletion record file while being electrified and started again, so that the data can be safely protected from being stolen.

Description

The data-erasure method of Computer Memory Unit
Technical field
The present invention is relevant for Computer Memory Unit, the data-erasure method that especially uses relevant for Computer Memory Unit.
Background technology
Computing machine is undoubtedly one of greatest invention of twentieth century, develops really very universally, little of house hold affairs so far, greatly to national affairs, all can process by computing machine.
The most convenient part of computing machine can be come with memory storages such as hard disk, CD-ROM drive and storeies the data of the required preservation of persistence user, such as file, mail, photograph, film and recording file etc. no more than it.Moreover along with the progress of semiconductor industry, the capacity of these memory storages also rises year by year, thus, no matter is important or unessential data, and has value for preservation or there is no the file of value for preservation, and the user all can preserve totally.
The demand of wanting to carry for satisfying the user, notebook (Notebook in recent years, or be called laptop computer Laptop) the output sustainable growth, moreover, various portable memory storages for carrying, for example mobile memory (UFD, USB Flash Drive), memory card and external connected hand disk etc., also become computing machine periphery commodity most favored by customers.Yet, in case these products are available for users to carry, namely represent the user can be away from home in and walk out the open air, the problem of its security needs to double to consider, if for example the user out of doors coffee shop use notebook or mobile memory, can't get rid of the experience notebook and be grabbed, steal, what perhaps mobile memory was pulled out in use by force may.Thus, the data that namely can make the user be stored in mobile memory or notebook are exposed among danger, therefore, how to make it to have concurrently convenience and security, namely become the problem of quite paying attention in this technical field.
Although on the market notebook or the portable memory storage such as mobile memory, memory card now all has the set-up function of golden key password, need just can read and write data wherein after the input password, thereby the defencive function of user's data is provided.But network is held sway now, and various password cracking softwares are fled everywhere, moreover the hacker who is skilled in technique is also without cease in the city, this mode that golden key cryptoguard is provided, real intentionally personage's the malicious act of can't having taken precautions against.
As mentioned above, based on the consideration of convenience, even the confidential data of Guoan's grade also is difficult to get rid of and carries with notebook or portable memory storage.Therefore, how effectively to protect the wherein safety of data, also paid close attention to by the relevant personage of Guoan.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of data-erasure method of Computer Memory Unit, can be when the memory storage energising start, and the data deletion that it is inner, reach the purpose that protected data is not stolen automatically.
For achieving the above object, the invention provides a kind of data-erasure method of Computer Memory Unit, apply between computing machine and memory storage, this memory storage has control module and data-carrier store, also comprise working storage in this control module, this data-erasure method comprises:
A) this memory storage energising starts;
B) whether the deletion record file that detects in this working storage of this control module starts;
C) accept step b, if this control module is controlled the data in this memory storage of deletion.
As mentioned above, wherein, also comprise starting up's file in described working storage, also comprise before described step b:
B01) described control module is carried out this starting up's file;
B02) this starting up's file reads described deletion record file.
As mentioned above, wherein, in described step c, be all data in the described data-carrier store of deletion.
As mentioned above, wherein, described memory storage is mobile memory, memory card or external connected hand disk, in described step a, and the startup of switching on when being connected to this computing machine of this memory storage.
As mentioned above, wherein, before described step a, also comprise:
A01) described memory storage energising starts;
A02) CPU (central processing unit) of described computing machine is sent steering order to this memory storage;
A03) described control module according to this steering order, is set the default value of described deletion record file;
A04) after step a03, check the state of this deletion record file;
A05) this control module according to this steering order, switches the state of this deletion record file;
A06) this memory storage outage is stopped using.
As mentioned above, wherein, described CPU (central processing unit) is sent this steering order by controlling software, and this control software is stored in the hard disk of this computing machine.
As mentioned above, wherein, described CPU (central processing unit) is sent this steering order by controlling software, and this control software is stored in this working storage.
As mentioned above, wherein, also comprise step a021 before described step a02): authentication password gold key.
As mentioned above, wherein, described deletion record file is the flag in described working storage.
For achieving the above object, the present invention also provides the data-erasure method of another kind of Computer Memory Unit, apply between computing machine and hard disk, this hard disk is arranged at this computer-internal, have the second control module and the second data-carrier store, also comprise working storage in this second control module, this data-erasure method comprises:
A) this computer booting starts so as to this hard disk energising;
B) whether the deletion record file that detects in this working storage of this second control module starts;
C) accept step b, if this second control module is controlled the data in this hard disk of deletion.
As mentioned above, wherein, described hard disk is traditional mechanical type hard disk or solid state hard disc.
As mentioned above, wherein, described computing machine is notebook.
As mentioned above, wherein, also comprise starting up's file in described working storage, also comprise before this step b:
B01) described the second control module is carried out this starting up's file;
B02) this starting up's file reads described deletion record file.
As mentioned above, wherein, in described step c, be all data in described the second data-carrier store of deletion.
As mentioned above, wherein, before described step a, also comprise:
A01) described computer booting starts so as to described hard disk energising;
A02) CPU (central processing unit) of this computing machine is sent steering order to this hard disk;
A03) described the second control module according to this steering order, is set the default value of described deletion record file;
A04) after step a03, check the state of this deletion record file;
A05) this second control module according to this steering order, switches the state of this deletion record file;
A06) this computer shutdown is stopped using so as to this hard disk outage.
As mentioned above, wherein, described CPU (central processing unit) is sent described steering order by controlling software, and this control software is stored in described the second working storage.
As mentioned above, wherein, also comprise step a021 before described step a02): authentication password gold key.
As mentioned above, wherein, described deletion record file is the flag in described the second working storage.
The contrast prior art, the effect that the present invention reaches is, the user can be when using notebook or portable memory storage, by controlling software with the deletion record file start of portable memory storage.So as to, if computing machine or memory storage are grabbed or are stolen, and intentionally the personage in the situation that the deletion record file start is pulled out with computer shutdown or with memory storage, switches on when starting in next time again, the data deletion that hard disc of computer or memory storage are can be automatically inner with it.Thus, the user does not need to be careful at any time the data that whether will manually delete in hard disc of computer or memory storage, can protect more like a cork the privacy of oneself.
Description of drawings
Fig. 1 is the schematic diagram of preferred embodiment of the present invention;
Fig. 2 is the calcspar of preferred embodiment of the present invention;
Fig. 3 A is the working storage schematic diagram of preferred embodiment of the present invention;
Fig. 3 B is the data-carrier store schematic diagram of preferred embodiment of the present invention;
Fig. 4 is the process flow diagram of preferred embodiment of the present invention;
Fig. 5 is the block scheme of another preferred embodiment of the present invention;
Fig. 6 is the process flow diagram of another preferred embodiment of the present invention.
Description of reference numerals
1 computing machine 11 CPU (central processing unit)
12 hard disk 13 first IO interface
2 memory storage 21 control modules
211 working storage 22 data-carrier stores
23 second IO interface 121 second control modules
1,211 second working storage 122 second data-carrier stores
D1 starting up file D2 deletion record file
D3 controls software D4 data
S10~S26, S262~S266, S40~S56, S562~S568... step
Embodiment
With regard to preferred embodiment of the present invention, coordinate accompanying drawing, be described in detail as follows.
At first see also Fig. 1, be the schematic diagram of preferred embodiment of the present invention.As shown in Figure 1, method of the present invention mainly applies between computing machine 1 and portable memory storage 2 (below will referred to as this memory storage 2).In Fig. 1, this computing machine 1 is take notebook as example, and this memory storage 2 is take mobile memory as example, but this computing machine 1 also can be desk-top computer or Barebone, and this memory storage 2 also can be memory card, internal hard disk or external connected hand disk, but not as limit.
Please continue to consult Fig. 2, be the block scheme of preferred embodiment of the present invention.This computing machine 1 mainly has CPU (central processing unit) 11, hard disk 12 and the first IO interface 13, this memory storage 2 mainly has control module 21, data-carrier store 22 and the second IO interface 23, wherein, also comprise working storage 211 in this control module 21.This working storage 211 is the low capacity memory module in this control module 21, mainly operate required objects in order to store this control module 21, and this data-carrier store 22 is jumbo memory module, and is main in order to store user's data.This computing machine 1 is electric connection with this memory storage 2 by this first IO interface 13 and this second IO interface 23, when this computing machine 1 is open state, namely provide electric power to this memory storage 2 by this first IO interface 13, so as to the startup of being switched on of this memory storage 2.This first IO interface 13 and this second IO interface 23 are mainly transmission interface that should memory storage 2, for example can be USB (universal serial bus) (USB, Universal Serial Bus) or external series hi-tech configuration (eSATA, but do not limited External Serial AdvancedTechnology Attachment) etc..
This control module 21 is electrically connected this data-carrier store 22 and this second IO interface 23, receives by this second IO interface 23 instruction that this computing machine 1 sends, so as to this data-carrier store 22 is operated.
Fig. 3 A is the working storage schematic diagram of preferred embodiment of the present invention, mainly store starting up's file D1, deletion record file D2 in this working storage 211 and control software D3, and Fig. 3 B is the data-carrier store schematic diagram of preferred embodiment of the present invention, and is main in order to store user's data D4 in this data-carrier store 22.After these memory storage 2 energisings start, this control module 21 can automatically perform the starting up's file D1 in this working storage 211, after this starting up's file D1 is performed, can read this deletion record file D2, this deletion record file D2 is in order to represent whether these data D4 in this data-carrier store 22 allows deleted.
It is worth mentioning that, this deletion record file D2 is except can be file, also can be the flag (Flag) in this working storage 211, whether allow deleted embodiment so long as can be used for recording these data D4, all should be encompassed in the scope of the claims of the present invention.
This control software D3 is performed on this computing machine 1, sends steering order so as to this CPU (central processing unit) 11 by this control software D3, starts (Enable) this deletion record file D2 or closes (Disable) this deletion record file D2.Wherein, this control software D3 can be stored in this working storage 211, and when this memory storage 2 is connected with this computing machine 1, automatically is uploaded on this computing machine 1 and carries out; Moreover this control software D3 also can directly be stored in this hard disk 12 of this computing machine 1, and directly is performed on this computing machine 1, is not limited.
Fig. 4 is the process flow diagram of preferred embodiment of the present invention.At first, this memory storage 2 is connected to this computing machine 1 (step S10), for example, mobile memory is plugged on the slot of notebook.Then, under the state of this computing machine 1 start, these memory storage 2 energisings start (step S12), and, this starting up's file D1 (step S14) that this control module 21 is carried out in this working storage 211, so as to, this starting up's file D1 reads this deletion record file D2.At last, this control module 21 is read this deletion record file D2, and further detects this deletion record file D2 and whether start (step S16).
After this step S16, D2 is activated if this control module 21 detects this deletion record file, namely being illustrated in these memory storage 2 outages last time (for example stops using, mobile memory is pulled out from this computing machine 1) front, do not make this CPU (central processing unit) 11 send this steering order by this control software D3, so that this deletion record file D2 is closed, so this control module 21 is controlled deletion (step S18) with the data D4 in this memory storage 2.Further, this step S18 mainly deletes these data D4 in this data-carrier store 22 of this memory storage 2, and the file in this working storage 211 is kept.So as to, after this step S18, this memory storage 2 still can be controlled software D3 by this starting up's file D1, this deletion record file D2 and this when energising startup next time, use data-erasure method of the present invention.Yet it is worth mentioning that, after these data D4 in this data-carrier store 22 is deleted, store data D4 if want to reuse this data-carrier store 22, after just must first this data-carrier store 22 being formatd, can be for it.And the file in this working storage 211 can't be deleted in the method for the invention, therefore, do not have the problem that just can again use after format.
After this step S16, D2 is closed if this control module 21 detects this deletion record file, when representing to use last time, before these memory storage 2 outages are stopped using, this CPU (central processing unit) 11 is closed this deletion record file D2 by this control software D3.Therefore, this memory storage 2 is after this switches on startup again, and these data D4 in this data-carrier store 22 can be not deleted.
Under the normal state that uses, if want to enable data-erasure method of the present invention, after these memory storage 2 energisings start, open this control software D3 (step S20), then, authentication password gold key (step S22).After this password gold key checking is errorless, this CPU (central processing unit) 11 is sent this steering order to this control module 21 by this control software D3, so as to this control module 21 namely according to this steering order, set the default value (Default) (step S24) of this deletion record file D2, then, the user can normally use this memory storage 2 (step S26).
As mentioned above, wherein this default value of this deletion record file D2 can be set as startup, also can be set as and close, and is decided by user's demand.For example, if the user is before upper once these memory storage 2 outages are inactive, this deletion record file D2 is closed, but this default value is set to startup, when this memory storage 2 energising startup next time, can be closed by this deletion record file of judgement D2 in this step S16, therefore can not carry out this step S18.But after this step S20 and S22 were finished, this deletion record file D2 will be activated because of the setting of this default value.At last, when the user finishes in the use of this memory storage 2, with these memory storage 2 outages inactive (step S262).
It is worth mentioning that, after this step S26 and before this step S262, the user is repeatedly opened this control software D3, and after this password gold key of checking, the state that checks this deletion record file D2 is (step S264) why, and decision according to this will keep or switch the state (step S266) of this deletion record file D2.Why the main inspection set condition of this deletion record file D2 at present (starts or closes), this control module 21 is according to this steering order, further, and namely according to the result that checks, decision will keep the state of this deletion record file D2, or switches the state of this deletion record file D2.So as to, before this step S262, the user can control software D3 by this and set this deletion record file D2 for oneself want state.
For example, if after this step S24, this deletion record file D2 is predetermined to be startup, the user can check this deletion record file D2 in this step S264, and in this step S266, the state of this deletion record file D2 is switched to and close, thus, next time this memory storage 2 again switch on when startup, these data D4 in this data-carrier store 22 will can be not deleted.Again for example, if this deletion record file D2 is predetermined to be startup, the user can check this deletion record file D2 in this step S264, and keeps the state (that is, this deletion record file D2 is still for starting) of this deletion record file D2 in this step S266.Thus, this memory storage 2 is when next time, energising started, and these data D4 will be deleted in this step S18.
Except the above-mentioned embodiment that realizes with this memory storage 2, data-erasure method of the present invention also can directly apply in this hard disk 12 of this computing machine 1 inside, wherein this hard disk 12 can be traditional mechanical type hard disk or solid state hard disc (SSD, Solid State Disk) etc., be described in detail as follows.As shown in Figure 5, be the block scheme of another preferred embodiment of the present invention, replace this memory storage 2 with this hard disk 12.This hard disk 12 is electrically connected with this CPU (central processing unit) 11, and has the second control module 121 and the second data-carrier store 122.Wherein, also comprise the second working storage 1211 in this second control module 121, this second working storage 1211 has the configuration identical with this working storage 211 (namely, as shown in Fig. 3 A), this second data-carrier store 122 has the configuration identical with this data-carrier store 22 (that is, as shown in Fig. 3 B).Wherein, if this hard disk 12 is traditional mechanical type hard disk, this second data-carrier store 122 is realized (not shown) by memory sector.
See also Fig. 6, be the process flow diagram of another preferred embodiment of the present invention.If method of the present invention is applied to this computing machine 1 inside, need first this computing machine 1 start (step S40), be able to because of this computing machine 1 start startup (step S42) of switching on so as to, this hard disk 12.After this hard disk 12 starts, this starting up's file D1 (step S44) that this second control module 121 is carried out in this second working storage 1211, this starting up's file D1 reads this deletion record file D2, detects this deletion record file D2 so as to this second control module 121 and whether starts (step S46).
After this step S46, start if this second control module 121 detects this deletion record file D2, control immediately the data D4 (step S48) in this hard disk 12 of deletion.Further, be these data D4 that deletes in this second data-carrier store 122.
After this step S46, D2 is closed if this second control module 121 detects this deletion record file, this hard disk 12 this again switch on start after, these data D4 in this second data-carrier store 122 will can be not deleted.
Then, if will be in the situation that normal this hard disk 12 that uses is enabled data-erasure method of the present invention, this hard disk 12 be opened this and is controlled software D3 (step S50) after energising starts, and verifies this password gold key (step S52).In this embodiment, this control software D3 is stored in this second working storage 1211, and carries out on this computing machine 1 when being unlocked.So as to, after this password gold key checking is errorless, this CPU (central processing unit) 11 is sent this steering order to this hard disk 12 by this control software D3, further, to this second control module 121, this second control module 121 is set this default value (step S54) of this deletion record file D2 according to this steering order.At last, the user can normally use this hard disk 12 (step S56), and when using end, this computing machine 1 is shut down (step S562), so as to these hard disk 12 outages inactive (step S564).
After this step S56 and before this step S562, the user can be according to this default value, the state (step S566) of this deletion record file of rechecking D2, and, this second control module 121 is according to this steering order, further, namely according to check result, determine to keep or switch the state (step S568) of this deletion record file D2.Before this step S562, check that present being set as of this deletion record file D2 starts or close, and according to this this deletion record file D2 is set as required state, so as to, determined this hard disk 12 when next time, energising started, whether these data D4 in this second data-carrier store 122 can be deleted.
The above is only preferred embodiments of the present invention, is not be used to limiting the scope of the claims of the present invention, and therefore the equivalence done of all utilizations content of the present invention changes, and all in like manner is included in protection scope of the present invention.

Claims (14)

1. the data-erasure method of a Computer Memory Unit, apply between computing machine and memory storage, and this memory storage has control module and data-carrier store, also comprises in this control module it is characterized in that working storage, and this data-erasure method comprises:
A01) this memory storage energising starts;
A02) CPU (central processing unit) of this computing machine is sent steering order to this memory storage;
A03) this control module according to this steering order, is set the default value of the deletion record file in this working storage;
A04) after step a03, check the state of this deletion record file;
A05) this control module according to this steering order, keeps the state of this deletion record file, maybe this deletion record file is switched to the state of wanting;
A06) this memory storage outage is stopped using;
A) after step a06, this memory storage energising starts;
B) whether the deletion record file that detects in this working storage of this control module starts;
C) accept step b, if this control module is controlled all data in this data-carrier store of deleting in this memory storage.
2. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, also comprises starting up's file in described working storage, also comprises before described step b:
B01) described control module is carried out this starting up's file;
B02) this starting up's file reads described deletion record file.
3. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, described memory storage is mobile memory, in described step a, and the startup of switching on when being connected to this computing machine of this memory storage.
4. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, described CPU (central processing unit) is sent this steering order by controlling software, and this control software is stored in the hard disk of this computing machine.
5. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, described CPU (central processing unit) is sent this steering order by controlling software, and this control software is stored in this working storage.
6. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, also comprises step a021 before described step a02): authentication password gold key.
7. the data-erasure method of Computer Memory Unit as claimed in claim 1, is characterized in that, described deletion record file is the flag in described working storage.
8. the data-erasure method of a Computer Memory Unit, apply between computing machine and hard disk, this hard disk is arranged at this computer-internal, have the second control module and the second data-carrier store, also comprise working storage in this second control module, it is characterized in that, this data-erasure method comprises:
A01) this computer booting starts so as to this hard disk energising;
A02) CPU (central processing unit) of this computing machine is sent steering order to this hard disk;
A03) this second control module according to this steering order, is set the default value of the deletion record file in this working storage;
A04) after step a03, check the state of this deletion record file;
A05) this second control module according to this steering order, keeps the state of this deletion record file, maybe this deletion record file is switched to the state of wanting;
A06) this computer shutdown is stopped using so as to this hard disk outage;
A) after step a06, this computer booting starts so as to this hard disk energising;
B) whether the deletion record file that detects in this working storage of this second control module starts;
C) accept step b, if this second control module is controlled all data in this second data-carrier store of deleting in this hard disk.
9. the data-erasure method of Computer Memory Unit as claimed in claim 8, is characterized in that, described hard disk is traditional mechanical type hard disk or solid state hard disc.
10. the data-erasure method of Computer Memory Unit as claimed in claim 8, is characterized in that, described computing machine is notebook.
11. the data-erasure method of Computer Memory Unit as claimed in claim 8 is characterized in that, also comprises starting up's file in described working storage, also comprises before this step b:
B01) described the second control module is carried out this starting up's file;
B02) this starting up's file reads described deletion record file.
12. the data-erasure method of Computer Memory Unit as claimed in claim 8 is characterized in that, described CPU (central processing unit) is sent described steering order by controlling software, and this control software is stored in described working storage.
13. the data-erasure method of Computer Memory Unit as claimed in claim 8 is characterized in that, also comprises step a021 before described step a02): authentication password gold key.
14. the data-erasure method of Computer Memory Unit as claimed in claim 8 is characterized in that, described deletion record file is the flag in described working storage.
CN 201010165771 2010-05-06 2010-05-06 Data deletion method for computer memory device Active CN102236611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010165771 CN102236611B (en) 2010-05-06 2010-05-06 Data deletion method for computer memory device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010165771 CN102236611B (en) 2010-05-06 2010-05-06 Data deletion method for computer memory device

Publications (2)

Publication Number Publication Date
CN102236611A CN102236611A (en) 2011-11-09
CN102236611B true CN102236611B (en) 2013-11-06

Family

ID=44887276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010165771 Active CN102236611B (en) 2010-05-06 2010-05-06 Data deletion method for computer memory device

Country Status (1)

Country Link
CN (1) CN102236611B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7361551B2 (en) 2019-09-20 2023-10-16 キヤノン株式会社 Devices, control methods, and programs

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102031661B1 (en) * 2012-10-23 2019-10-14 삼성전자주식회사 Data storage device and controller, and operation method of data storage device
CN111447424B (en) * 2020-04-10 2022-04-22 中航国画(上海)激光显示科技有限公司 Projection system with safety enhancement function

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111020A (en) * 2006-07-17 2008-01-23 英华达股份有限公司 Portable electronic communication device system
CN201378432Y (en) * 2009-03-25 2010-01-06 西南石油大学 Anti-virus USB flash drive capable of supporting update of virus characteristic database

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7363510B2 (en) * 2004-05-26 2008-04-22 Mount Sinai School Of Medicine Of New York University System and method for presenting copy protected content to a user

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111020A (en) * 2006-07-17 2008-01-23 英华达股份有限公司 Portable electronic communication device system
CN201378432Y (en) * 2009-03-25 2010-01-06 西南石油大学 Anti-virus USB flash drive capable of supporting update of virus characteristic database

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7361551B2 (en) 2019-09-20 2023-10-16 キヤノン株式会社 Devices, control methods, and programs

Also Published As

Publication number Publication date
CN102236611A (en) 2011-11-09

Similar Documents

Publication Publication Date Title
US10061928B2 (en) Security-enhanced computer systems and methods
US8230207B2 (en) System and method of providing security to an external attachment device
EP2135186B1 (en) System and method for providing a secure computing environment
US10992747B2 (en) Data storage system with removable device and method of operation thereof
US10182048B1 (en) Systems and methods for automatically populating one-time-password input fields
US20100011427A1 (en) Information Storage Device Having Auto-Lock Feature
WO2011146857A2 (en) Method and apparatus for secure scan of data storage device from remote server
US8539246B2 (en) Secure resume for encrypted drives
US8924700B1 (en) Techniques for booting from an encrypted virtual hard disk
Müller et al. A systematic assessment of the security of full disk encryption
JP6669929B2 (en) System and method for managing encryption keys for single sign-on applications
CN102236611B (en) Data deletion method for computer memory device
TW201019113A (en) Authenticable USB storage device and method thereof
CN110673863B (en) Intelligent lock system supporting pluggable external storage and intelligent upgrading method
US20150135335A1 (en) Computer system and method for protecting data from external threats
KR20110023685A (en) Solid state disk with authentication function and driving method thereof
US20120047582A1 (en) Data deleting method for computer storage device
TW201137659A (en) Data deleting method for computer storage device
US10257202B1 (en) Systems and methods for logging users out of online accounts
US10972497B1 (en) Systems and methods for recovering an infected endpoint
KR20190078198A (en) Secure memory device based on cloud storage and Method for controlling verifying the same
JP2007115103A (en) Portable storage device
KR101161686B1 (en) Memory device with security function and security method thereof
US11132442B1 (en) Systems and methods for enforcing secure shared access on computing devices by context pinning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: XINHAN CO., LTD.

Free format text: FORMER NAME: XINHAN COMPUTER CO., LTD.

CP03 Change of name, title or address

Address after: The way and Chinese Taiwan District in New Taipei City No. 920 9 floor

Patentee after: NEXCOM INTERNATIONAL CO., LTD

Address before: Taiwan City, Taipei county and Chinese Road No. 716 18 floor

Patentee before: Xinhan Computer Co., Ltd.