CN102646076B - Data anti-leakage method of mobile medium and mobile medium - Google Patents

Data anti-leakage method of mobile medium and mobile medium Download PDF

Info

Publication number
CN102646076B
CN102646076B CN201210063459.7A CN201210063459A CN102646076B CN 102646076 B CN102646076 B CN 102646076B CN 201210063459 A CN201210063459 A CN 201210063459A CN 102646076 B CN102646076 B CN 102646076B
Authority
CN
China
Prior art keywords
area
move media
operating system
secret
rom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210063459.7A
Other languages
Chinese (zh)
Other versions
CN102646076A (en
Inventor
许林锋
杨泉清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Original Assignee
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority to CN201210063459.7A priority Critical patent/CN102646076B/en
Publication of CN102646076A publication Critical patent/CN102646076A/en
Application granted granted Critical
Publication of CN102646076B publication Critical patent/CN102646076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data anti-leakage method of a mobile medium and the mobile medium. The data anti-leakage method of the mobile medium comprises the following steps: the step of configuring a firmware program: configuring the firmware program of a master control chip of the mobile medium to form a virtual drive interface and a data interaction interface in the master control chip through the firmware program, wherein the virtual drive interface can enable the mobile medium to be identified as a drive device by an operating system of a host machine when the mobile medium is connected with the host machine, and the data interaction interface is used by being loaded through a control program stored in a virtual drive; and the step of dividing a storage chip: dividing the storage chip of the mobile medium into a first region as a mapping region for simulating a CD-ROM (compact disc read-only memory) and a second region as a storage region.

Description

Move media data anti-divulge a secret method and move media
Technical field
The present invention relates to a kind of move media data anti-divulge a secret method and move media.
Background technology
Along with the fast development of computer technology, the application of movable storage device is very general, and these equipment also can exist the such danger of information leakage while being convenient for people to use.
Also some move medias are had to take anti-measure of divulging a secret at present on the market, but these anti-measure all Shortcomings of divulging a secret.
1, hardware level encryption method, in process of production by cryptographic algorithm solidification in a flash memory, there is the single not modifiable shortcoming of cryptographic algorithm in this hardware level encryption method, and affects the transmission speed of data, also cannot meet the diversified demand that user prevents data divulging a secret.
2, move media is divided into encrypted area, hidden area etc., and adopt specific format to format to encrypted area, operating system cannot directly be accessed, and needs to be conducted interviews to move media by specific connection interface, therefore there is user and uses unused problem.
3, hardware binding, only allows move media to use in specific scope, greatly reduces the convenience of move media like this.
4, prevent the leakage of data in the mode of soft encryption, Single document is encrypted, and file itself is uncontrolled, can be copied illegally and crack.
5, hardware switch controls, and move media arranges hardware switch, by the access limit of hardware controls USB flash disk, to forget and dials switch, be easy to cause leaking data once user in data interaction.
6, when not taking any anti-virus means, when move media arbitrarily can use on arbitrary computing machine, easily causing the propagation of virus and spreading unchecked.
Summary of the invention
In view of above-mentioned technical matters, the invention provides a kind of general, do not change existing equipment, do not change the move media data of user's use habit anti-divulge a secret method and move media.
The anti-method of divulging a secret of move media data involved by first aspect present invention, comprise the following steps: firmware program configuration step, configure the firmware program of the main control chip of described move media, to make to be formed with virtual drive interface and data interaction interface by described firmware program in described main control chip, described virtual drive interface makes described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, and described data interaction interface is used after being loaded by the control program stored in virtual drive; And storage chip partiting step, the storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area, in described storage chip partiting step, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
Prevent divulging a secret in method in above-mentioned move media data, in described storage chip partiting step, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
Prevent divulging a secret in method in above-mentioned move media data, when described move media is connected with described main frame, only use the described first area of described storage chip, the described second area conductively-closed of described storage chip.
Prevent divulging a secret in method in above-mentioned move media data, when described move media is connected with described main frame, after described move media is identified as CD-ROM drive, passing through to run the driving that control program activates the data interaction interface of described main control chip, the operating system of described main frame loads described second area stored in described virtual drive, when described move media is exposed as multiplex roles pattern, described move media is identified as the equipment complex with described virtual drive and disk unit.
Prevent divulging a secret in method in above-mentioned move media data, the pattern of enabling of described second area comprises normal mode and transparent encryption and decryption pattern.
Prevent divulging a secret in method in above-mentioned move media data, after described move media is identified as described equipment complex, when be judged as YES enable described second area by normal mode time, the operating system of described main frame directly manages described second area, do not change the read-write mode of the data of described second area, the firmware program of described main control chip no longer intercepts and captures driver instruction, directly various for the device description of the start address comprising described second area mark is informed driver, the described second area of conventional use.
Prevent divulging a secret in method in above-mentioned move media data, after described move media is identified as described equipment complex, when be judged as YES enable described second area by transparent encryption and decryption pattern time, the firmware of described main control chip continues to intercept and capture driver instruction, and starts data interaction interface.
Prevent divulging a secret in method in above-mentioned move media data, utilize the disk management interface of the described operating system of described main frame itself, the Logical Disk becoming the disk management interface of described operating system to identify the actual physics spatial simulation of described second area, and have disk management interface for this Logical Disk distribution drive.
Prevent divulging a secret in method in above-mentioned move media data, described control program realizes at described second area multiple Logical Disk that size regulates arbitrarily, described control program can create the control documents as encrypt file in the actual physics space of described second area, described control documents records actual physics spatial information and Logical Disk information in described second area, the described disk management interface of described operating system calls described control documents by described control program, provides described Logical Disk to described operating system, distributes drive; When described operating system conducts interviews to described Logical Disk time, logical address is translated as physical address by described control program automatically, namely, by the reference address of described operating system to described Logical Disk be automatically converted to physical address, and submit to standard driver; And described control program is automatically to the data transparency encryption and decryption of read-write.
Prevent divulging a secret in method in above-mentioned move media data, when described operating system conducts interviews to described Logical Disk time, first described control program intercepts and captures access instruction, and judges user right, carries out the operation read or write according to user right.
Move media involved by second aspect present invention, comprise main control chip, storage chip, crystal oscillator, the interface that is connected with main frame, wherein, in described main control chip, pass through stored firmware program be formed with virtual drive interface and data interaction interface, make described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, described data interaction interface is used after being loaded by the control program stored in virtual drive; The storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area, wherein, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
In above-mentioned move media, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
According to move media data leakage prevention method of the present invention and move media, following technique effect can be realized:
1, move media is once lose, and the information stored in media as well also can not be revealed.
2, mobile memory medium arbitrarily can use on arbitrary computing machine, and can not cause the propagation of virus.
3, the use cost and the burden that increase new system hardware facility, not adding users is not being needed, and the anti-process of divulging a secret of data without the need to the basis that additionally drives making user realize on move media, ensure that the information security on move media.
Accompanying drawing explanation
When considered in conjunction with the accompanying drawings, by referring to detailed description below, more completely can understand the present invention better and easily learn wherein many adjoint advantages, but accompanying drawing described herein is used to provide a further understanding of the present invention, form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention, wherein:
Fig. 1 shows the main control chip of existing move media and the schematic diagram of storage chip.
Fig. 2 is the schematic diagram that move media data of the present invention prevent an embodiment of the method for divulging a secret.
The storage chip that Fig. 3 shows move media of the present invention is divided into the schematic diagram in two regions.
Fig. 4 shows the process flow diagram of the identifying of move media.
Fig. 5 shows the schematic diagram enabling storage area (2.2 region).
Fig. 6 shows the realization flow of Logical Disk under transparent encryption and decryption pattern.
Fig. 7 shows the schematic flow diagram of data interaction.
Embodiment
Existing move media, from composition structure, primarily of four parts: main control chip, storage chip, crystal oscillator (clock circuit), the interface be connected with main frame.Fig. 1 shows the main control chip of existing move media and the schematic diagram of storage chip.As shown in Figure 1, what can store information is main control chip 1 and storage chip 2, and wherein main control chip 1 is generally used for depositing firmware (control program of move media and device descriptor information, capacity is very little), storage chip 2 is mainly used to store user data, and capacity is generally very large.
Fig. 2 is the schematic diagram that move media data of the present invention prevent the embodiment of the method for divulging a secret, and as shown in Figure 2, the anti-method of divulging a secret of move media data comprises:
Firmware program configuration step S10, the firmware program of the main control chip of configuration move media, to make to be formed with virtual drive interface and data interaction interface by firmware program in main control chip, virtual drive interface makes move media be identified as CD-ROM equipment when being connected with main frame by the operating system of main frame, and data interaction interface is used after being loaded by the control program stored in virtual drive.
Storage chip partiting step S20, the storage chip of move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area.
In order to realize this invention, the present invention has reconfigured the form of firmware program in main control chip and storage chip.Configuration virtual CD-ROM driver interface in main control chip firmware, makes operating system move media can be identified as CD-ROM equipment.Firmware provides two virtual interfaces, and one is virtual drive interface, and one is data interaction interface, and data interaction interface, not directly in the face of the disk management of system, is used after must being loaded by the program in CD-ROM drive.By device descriptor field in amendment main control chip firmware, make the reference position of the actual storage address of storage chip mobile one section of space backward.
The storage chip that Fig. 3 shows move media of the present invention is divided into the schematic diagram in two regions.As shown in Figure 3, storage chip is divided into as simulation 2.1 regions of mapping domain of CD-ROM and 2.2 regions as storage area.In 2.1 regions, use CD-ROM ISO 9660 file system format to format this region, this regional simulation is generated image file, the file of this image file CD-ROM that is virtually reality like reality and bibliographic structure.2.2 regions are the storage space of amended reality.
As shown in Figure 3,1 is the control chip storing firmware, is wherein formed with two logic interfacings by firmware program: CD-ROM equipment logic interfacing and data interaction interface.
When move media inserts computing machine, when being connected with main frame, move media is identified as CD-ROM equipment, now move media only uses 2.1 regions, as 2.2 region conductively-closeds of storage area.
Fig. 4 shows the process flow diagram of the identifying of move media, as shown in Figure 4, comprises the following steps:
S410: move media is connected with main frame;
S420: the operating system of main frame loads standard driver, for identification equipment and primary controller;
S430: driver instruction intercepted and captured by the firmware of main control chip, starts CD-ROM equipment logic interfacing, now, shields 2.2 regions as storage area;
S440: the file system in carry 2.1 region, recognition of devices is CD-ROM drive by operating system.
Storing control program in virtual drive, after move media is identified as CD-ROM drive by host computer, when user wants to enable 2.2 region, this control program must be run, by the real data interactive interface in this control program deactivation firmware district, the driving in system loads 2.2 region, when now mobile memory medium is exposed as multiplex roles pattern, host computer can think that mobile memory medium is now equipment complex, namely, has the equipment complex of virtual drive and disk unit.
After enabling 2.2 regions, there are two kinds of patterns to the use-pattern in 2.2 regions: normal mode and transparent encryption and decryption pattern.
Fig. 5 shows the schematic diagram enabling storage area (2.2 region).As shown in Figure 5, comprise the following steps:
S510: user runs the control program in virtual drive;
Whether S520: control program judges the operational order of user, drive storage area;
S530: when operational order instruction does not start storage area, operation terminates;
S540: when operational order instruction starts storage area, judge start-up mode;
S550: when start-up mode is normal mode, the direct managing storage area of operating system, identification storage area is mobile memory medium, does not change the read-write mode of data;
S560: driver instruction no longer intercepted and captured by the firmware of main control chip, directly informs driver by device description mark (comprising the start address of storage area), conventional use storage area;
S570: when start-up mode is transparent encryption and decryption pattern, the firmware of main control chip continues to intercept and capture driver instruction, and starts data interaction interface;
S580: start storage area, the operation of operating system to storage area has to pass through control program process and judges.
Wherein, transparent encryption and decryption pattern also can be applied to the disk that computing machine itself carries, and realizes the safety management of the disk of computing machine own.
Utilize the disk management interface of operating system itself, by the Logical Disk that the actual physics spatial simulation of storage area becomes operating system disk management interface to identify, and have disk management interface for this Logical Disk distribution drive.
Fig. 6 shows the realization flow of Logical Disk under transparent encryption and decryption pattern.As shown in Figure 6, comprise the following steps:
S610: control program creates Logical Disk, control program realizes at second area multiple Logical Disk that size regulates arbitrarily, when creating, control program can create a file (hereafter by this file referred to as control documents) in the actual physics space in B region, control documents have recorded actual physics spatial information in B region and (comprises B region physical capacity, how many bunches, every bunch of sector number, every sector byte number, start address, link table information etc.), and the information of mimic panel (comprises the space size of Logical Disk, how many bunches, every bunch of sector number, every sector byte number, the start address of Logical Disk in B region, end address, link table information etc.).The disk management interface of operating system calls control documents by control program, provides Logical Disk to operating system, distributes drive.
S620: when operating system conducts interviews to Logical Disk time, logical address is translated as physical address by control program automatically, namely, by the reference address of operating system to Logical Disk is automatically converted to physical address, and information is submitted to standard driver.
S630: control program is automatically to the data transparency encryption and decryption of read-write.
Wherein, this control documents is encrypt file, and control program is automatically to the data transparency encryption and decryption of turnover, and operating system cannot directly conduct interviews to this file, must be transmitted through control program, control program can judge the operational order of Logical Disk by automatic interception system.
In addition, system writes this file to the data that Logical Disk writes after control program is encrypted automatically.
Fig. 7 shows the schematic flow diagram of data interaction, as shown in Figure 7, comprises the following steps:
S710: system access Logical Disk;
S720: control program intercepts and captures access instruction;
S730: judge user right;
S740: the restriction of prompting authority, and cycle criterion;
S750: judgement is read or write?
S760: in time indicating reading, carry out address translation;
S770: data are read in the transparent deciphering of control program;
S780: when being write command, carries out address translation;
S790: control program transparent encryption, carries out write operation in actual physics space.
According to anti-method and the move media of divulging a secret of move media data of the present invention, move media is divided into multiple region, during move media access computing machine, be just CD-ROM equipment by media recognition, the shielding physical memory space, avoids virus to propagate.Firmware in main control chip comprises two virtual interfaces, wherein data interaction interface is used for enabling storage space, the file capturing operation system that control program can pass through to create in disk is to the access action of disk, the reading and writing data address translation of virtual disk is become the space address in real medium, system access Virtual Space is the same with actual space, middle link is transparent to user, control program cannot depart from move media and directly run, move media not only serves as storage space, and can key be served as, wherein key key can be kept at this locality, also other media can be backuped to, control program not only can make mock disc on move media, and mock disc can be created on hard disk, wherein the size in the space of mock disc is by customization, space is encryption, even if move media is lost can not cause divulging a secret of data.
As mentioned above, embodiments of the invention are explained, but as long as do not depart from inventive point of the present invention in fact and effect can have a lot of distortion, this will be readily apparent to persons skilled in the art.Therefore, such variation is also all included within protection scope of the present invention.

Claims (12)

1. the anti-method of divulging a secret of move media data, comprises the following steps:
Firmware program configuration step, configure the firmware program of the main control chip of described move media, to make to be formed with virtual drive interface and data interaction interface by described firmware program in described main control chip, described virtual drive interface makes described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, and described data interaction interface is used after being loaded by the control program stored in virtual drive; And
Storage chip partiting step, the storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area,
Wherein, in described storage chip partiting step, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
2. the anti-method of divulging a secret of move media data according to claim 1, wherein,
In described storage chip partiting step, described first area uses the format of CD-ROMISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
3. the anti-method of divulging a secret of move media data according to claim 2, wherein,
When described move media is connected with described main frame, only use the described first area of described storage chip, the described second area conductively-closed of described storage chip.
4. the anti-method of divulging a secret of move media data according to claim 2, wherein,
When described move media is connected with described main frame, after described move media is identified as CD-ROM drive, passing through to run the driving that control program activates the data interaction interface of described main control chip, the operating system of described main frame loads described second area stored in described virtual drive, when described move media is exposed as multiplex roles pattern, described move media is identified as the equipment complex with described virtual drive and disk unit.
5. the anti-method of divulging a secret of move media data according to claim 4, wherein,
The pattern of enabling of described second area comprises normal mode and transparent encryption and decryption pattern.
6. the anti-method of divulging a secret of move media data according to claim 5, wherein,
After described move media is identified as described equipment complex, when be judged as YES enable described second area by described normal mode time, the operating system of described main frame directly manages described second area, do not change the read-write mode of the data of described second area, the firmware program of described main control chip no longer intercepts and captures driver instruction, directly various for the device description of the start address comprising described second area mark is informed driver, the described second area of conventional use.
7. the anti-method of divulging a secret of move media data according to claim 5, wherein,
After described move media is identified as described equipment complex, when be judged as YES enable described second area by described transparent encryption and decryption pattern time, the firmware program of described main control chip continues to intercept and capture driver instruction, and starts data interaction interface.
8. the anti-method of divulging a secret of move media data according to claim 7, wherein,
Utilize the disk management interface of the described operating system of described main frame itself, the Logical Disk becoming the disk management interface of described operating system to identify the actual physics spatial simulation of described second area, and have disk management interface for this Logical Disk distribution drive.
9. the anti-method of divulging a secret of move media data according to claim 8, wherein, the realization of Logical Disk comprises the following steps:
Described control program realizes at described second area multiple Logical Disk that size regulates arbitrarily, described control program can create the control documents as encrypt file in the actual physics space of described second area, described control documents records actual physics spatial information and Logical Disk information in described second area, the described disk management interface of described operating system calls described control documents by described control program, provides described Logical Disk to described operating system, distributes drive;
When described operating system conducts interviews to described Logical Disk time, logical address is translated as physical address by described control program automatically, namely, by the reference address of described operating system to described Logical Disk be automatically converted to physical address, and submit to standard driver; And
Described control program is automatically to the data transparency encryption and decryption of read-write.
10. the anti-method of divulging a secret of move media data according to claim 9, wherein,
When described operating system conducts interviews to described Logical Disk time, first described control program intercepts and captures access instruction, and judges user right, carries out the operation read or write according to user right.
11. 1 kinds of move medias, comprise main control chip, storage chip, crystal oscillator, the interface that is connected with main frame, wherein,
In described main control chip, pass through stored firmware program be formed with virtual drive interface and data interaction interface, make described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, described data interaction interface is used after being loaded by the control program stored in virtual drive;
The storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area,
Wherein, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
12. move medias according to claim 11, wherein,
Described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
CN201210063459.7A 2012-02-21 2012-03-12 Data anti-leakage method of mobile medium and mobile medium Active CN102646076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210063459.7A CN102646076B (en) 2012-02-21 2012-03-12 Data anti-leakage method of mobile medium and mobile medium

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201210040468 2012-02-21
CN201210040468.4 2012-02-21
CN201210063459.7A CN102646076B (en) 2012-02-21 2012-03-12 Data anti-leakage method of mobile medium and mobile medium

Publications (2)

Publication Number Publication Date
CN102646076A CN102646076A (en) 2012-08-22
CN102646076B true CN102646076B (en) 2015-04-29

Family

ID=46658904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210063459.7A Active CN102646076B (en) 2012-02-21 2012-03-12 Data anti-leakage method of mobile medium and mobile medium

Country Status (1)

Country Link
CN (1) CN102646076B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104992129B (en) * 2015-05-28 2017-12-22 山东华芯半导体有限公司 A kind of OSX systems encrypted U disk and its implementation
CN105809047B (en) * 2016-04-05 2018-09-14 武汉烽火众智数字技术有限责任公司 Data safety exchange system and its method between a kind of heterogeneous networks
CN106951790B (en) * 2016-12-15 2019-12-13 中国电子科技集团公司第三十研究所 USB storage medium transparent encryption method
CN111177783B (en) * 2019-12-31 2022-05-27 北京明朝万达科技股份有限公司 Method and device for preventing mobile storage medium from being divulged
CN112291206B (en) * 2020-10-14 2023-08-15 北京安石科技有限公司 Method for improving operating system safety through main control chip
CN113127896B (en) * 2021-03-29 2022-02-22 深圳市安存数据技术有限公司 Data processing method and device based on independent encryption chip

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040042706A (en) * 2002-11-15 2004-05-20 스페이스 인터내셔널 주식회사 System, Method and Recording Medium For Achieving Virtual CD ROM Drive
CN102043928A (en) * 2009-10-13 2011-05-04 创易科技股份有限公司 External CD driver with data encryption and decryption functions and encryption and decryption methods utilized by same
CN102053798A (en) * 2009-10-27 2011-05-11 鸿富锦精密工业(深圳)有限公司 Virtual drive firmware and image document reading method thereof
CN102109965A (en) * 2009-12-23 2011-06-29 群联电子股份有限公司 Flash memory storage system, flash memory controller, computer system and simulation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040042706A (en) * 2002-11-15 2004-05-20 스페이스 인터내셔널 주식회사 System, Method and Recording Medium For Achieving Virtual CD ROM Drive
CN102043928A (en) * 2009-10-13 2011-05-04 创易科技股份有限公司 External CD driver with data encryption and decryption functions and encryption and decryption methods utilized by same
CN102053798A (en) * 2009-10-27 2011-05-11 鸿富锦精密工业(深圳)有限公司 Virtual drive firmware and image document reading method thereof
CN102109965A (en) * 2009-12-23 2011-06-29 群联电子股份有限公司 Flash memory storage system, flash memory controller, computer system and simulation method

Also Published As

Publication number Publication date
CN102646076A (en) 2012-08-22

Similar Documents

Publication Publication Date Title
CN102646076B (en) Data anti-leakage method of mobile medium and mobile medium
US8856521B2 (en) Methods and systems for performing secure operations on an encrypted file
US8296585B2 (en) Method of encrypting/decrypting the document and a safety management storage device and system method of its safety management
KR101506578B1 (en) File system configuration method and apparatus for data security, method and apparatus for accessing data security area formed by the same, and data storage device thereby
JP5981984B2 (en) Virtual computer system, confidential information protection method, and confidential information protection program
CN100552690C (en) Data managing method
CN102656550B (en) Storage device and method for accessing multiple protected files in a private memory area using a virtual file in a public memory area
CN102053925A (en) Realization method of data encryption in hard disk
CN101877246A (en) U disk encryption method
JP2012248178A (en) Secure removable media and method for managing the same
CN102955745A (en) Mobile storage terminal and data management method thereof
CN101911023B (en) Delivering secured media using a portable memory device
CN102955746A (en) Read-only mode mobile storage device and data access method thereof
CN103678959A (en) Data protecting method based on portable storage device
JP2010533910A (en) Digital information memory card encryption structure and method
CN102254119A (en) Safe mobile data storage method based on fingerprint U disk and virtual machine
CN103488919A (en) Protection method and device for executable programs
CN101578608A (en) Methods and apparatuses for accessing content based on a session ticket
KR102166430B1 (en) Ssd based storage media with data protection
CN100595739C (en) Method and system for accessing finance data
CN102012874B (en) USB (universal serial bus) storage device provided with resource manager
CN101350034A (en) Mobile memory apparatus and method for visiting file
CN104751080A (en) USB (Universal Serial Bus) flash disk encryption-based data access method and system
CN111241498A (en) Multifunctional USB storage device
CN210691364U (en) Encrypted USB flash disk

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20220816

Granted publication date: 20150429

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20240816

Granted publication date: 20150429