CN102646076B - Data anti-leakage method of mobile medium and mobile medium - Google Patents
Data anti-leakage method of mobile medium and mobile medium Download PDFInfo
- Publication number
- CN102646076B CN102646076B CN201210063459.7A CN201210063459A CN102646076B CN 102646076 B CN102646076 B CN 102646076B CN 201210063459 A CN201210063459 A CN 201210063459A CN 102646076 B CN102646076 B CN 102646076B
- Authority
- CN
- China
- Prior art keywords
- area
- move media
- operating system
- secret
- rom
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000003860 storage Methods 0.000 claims abstract description 64
- 230000003993 interaction Effects 0.000 claims abstract description 24
- 238000013507 mapping Methods 0.000 claims abstract description 7
- 238000004088 simulation Methods 0.000 claims description 10
- 230000008859 change Effects 0.000 claims description 5
- 239000013078 crystal Substances 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000007711 solidification Methods 0.000 description 1
- 230000008023 solidification Effects 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
Landscapes
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data anti-leakage method of a mobile medium and the mobile medium. The data anti-leakage method of the mobile medium comprises the following steps: the step of configuring a firmware program: configuring the firmware program of a master control chip of the mobile medium to form a virtual drive interface and a data interaction interface in the master control chip through the firmware program, wherein the virtual drive interface can enable the mobile medium to be identified as a drive device by an operating system of a host machine when the mobile medium is connected with the host machine, and the data interaction interface is used by being loaded through a control program stored in a virtual drive; and the step of dividing a storage chip: dividing the storage chip of the mobile medium into a first region as a mapping region for simulating a CD-ROM (compact disc read-only memory) and a second region as a storage region.
Description
Technical field
The present invention relates to a kind of move media data anti-divulge a secret method and move media.
Background technology
Along with the fast development of computer technology, the application of movable storage device is very general, and these equipment also can exist the such danger of information leakage while being convenient for people to use.
Also some move medias are had to take anti-measure of divulging a secret at present on the market, but these anti-measure all Shortcomings of divulging a secret.
1, hardware level encryption method, in process of production by cryptographic algorithm solidification in a flash memory, there is the single not modifiable shortcoming of cryptographic algorithm in this hardware level encryption method, and affects the transmission speed of data, also cannot meet the diversified demand that user prevents data divulging a secret.
2, move media is divided into encrypted area, hidden area etc., and adopt specific format to format to encrypted area, operating system cannot directly be accessed, and needs to be conducted interviews to move media by specific connection interface, therefore there is user and uses unused problem.
3, hardware binding, only allows move media to use in specific scope, greatly reduces the convenience of move media like this.
4, prevent the leakage of data in the mode of soft encryption, Single document is encrypted, and file itself is uncontrolled, can be copied illegally and crack.
5, hardware switch controls, and move media arranges hardware switch, by the access limit of hardware controls USB flash disk, to forget and dials switch, be easy to cause leaking data once user in data interaction.
6, when not taking any anti-virus means, when move media arbitrarily can use on arbitrary computing machine, easily causing the propagation of virus and spreading unchecked.
Summary of the invention
In view of above-mentioned technical matters, the invention provides a kind of general, do not change existing equipment, do not change the move media data of user's use habit anti-divulge a secret method and move media.
The anti-method of divulging a secret of move media data involved by first aspect present invention, comprise the following steps: firmware program configuration step, configure the firmware program of the main control chip of described move media, to make to be formed with virtual drive interface and data interaction interface by described firmware program in described main control chip, described virtual drive interface makes described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, and described data interaction interface is used after being loaded by the control program stored in virtual drive; And storage chip partiting step, the storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area, in described storage chip partiting step, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
Prevent divulging a secret in method in above-mentioned move media data, in described storage chip partiting step, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
Prevent divulging a secret in method in above-mentioned move media data, when described move media is connected with described main frame, only use the described first area of described storage chip, the described second area conductively-closed of described storage chip.
Prevent divulging a secret in method in above-mentioned move media data, when described move media is connected with described main frame, after described move media is identified as CD-ROM drive, passing through to run the driving that control program activates the data interaction interface of described main control chip, the operating system of described main frame loads described second area stored in described virtual drive, when described move media is exposed as multiplex roles pattern, described move media is identified as the equipment complex with described virtual drive and disk unit.
Prevent divulging a secret in method in above-mentioned move media data, the pattern of enabling of described second area comprises normal mode and transparent encryption and decryption pattern.
Prevent divulging a secret in method in above-mentioned move media data, after described move media is identified as described equipment complex, when be judged as YES enable described second area by normal mode time, the operating system of described main frame directly manages described second area, do not change the read-write mode of the data of described second area, the firmware program of described main control chip no longer intercepts and captures driver instruction, directly various for the device description of the start address comprising described second area mark is informed driver, the described second area of conventional use.
Prevent divulging a secret in method in above-mentioned move media data, after described move media is identified as described equipment complex, when be judged as YES enable described second area by transparent encryption and decryption pattern time, the firmware of described main control chip continues to intercept and capture driver instruction, and starts data interaction interface.
Prevent divulging a secret in method in above-mentioned move media data, utilize the disk management interface of the described operating system of described main frame itself, the Logical Disk becoming the disk management interface of described operating system to identify the actual physics spatial simulation of described second area, and have disk management interface for this Logical Disk distribution drive.
Prevent divulging a secret in method in above-mentioned move media data, described control program realizes at described second area multiple Logical Disk that size regulates arbitrarily, described control program can create the control documents as encrypt file in the actual physics space of described second area, described control documents records actual physics spatial information and Logical Disk information in described second area, the described disk management interface of described operating system calls described control documents by described control program, provides described Logical Disk to described operating system, distributes drive; When described operating system conducts interviews to described Logical Disk time, logical address is translated as physical address by described control program automatically, namely, by the reference address of described operating system to described Logical Disk be automatically converted to physical address, and submit to standard driver; And described control program is automatically to the data transparency encryption and decryption of read-write.
Prevent divulging a secret in method in above-mentioned move media data, when described operating system conducts interviews to described Logical Disk time, first described control program intercepts and captures access instruction, and judges user right, carries out the operation read or write according to user right.
Move media involved by second aspect present invention, comprise main control chip, storage chip, crystal oscillator, the interface that is connected with main frame, wherein, in described main control chip, pass through stored firmware program be formed with virtual drive interface and data interaction interface, make described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, described data interaction interface is used after being loaded by the control program stored in virtual drive; The storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area, wherein, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
In above-mentioned move media, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
According to move media data leakage prevention method of the present invention and move media, following technique effect can be realized:
1, move media is once lose, and the information stored in media as well also can not be revealed.
2, mobile memory medium arbitrarily can use on arbitrary computing machine, and can not cause the propagation of virus.
3, the use cost and the burden that increase new system hardware facility, not adding users is not being needed, and the anti-process of divulging a secret of data without the need to the basis that additionally drives making user realize on move media, ensure that the information security on move media.
Accompanying drawing explanation
When considered in conjunction with the accompanying drawings, by referring to detailed description below, more completely can understand the present invention better and easily learn wherein many adjoint advantages, but accompanying drawing described herein is used to provide a further understanding of the present invention, form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention, wherein:
Fig. 1 shows the main control chip of existing move media and the schematic diagram of storage chip.
Fig. 2 is the schematic diagram that move media data of the present invention prevent an embodiment of the method for divulging a secret.
The storage chip that Fig. 3 shows move media of the present invention is divided into the schematic diagram in two regions.
Fig. 4 shows the process flow diagram of the identifying of move media.
Fig. 5 shows the schematic diagram enabling storage area (2.2 region).
Fig. 6 shows the realization flow of Logical Disk under transparent encryption and decryption pattern.
Fig. 7 shows the schematic flow diagram of data interaction.
Embodiment
Existing move media, from composition structure, primarily of four parts: main control chip, storage chip, crystal oscillator (clock circuit), the interface be connected with main frame.Fig. 1 shows the main control chip of existing move media and the schematic diagram of storage chip.As shown in Figure 1, what can store information is main control chip 1 and storage chip 2, and wherein main control chip 1 is generally used for depositing firmware (control program of move media and device descriptor information, capacity is very little), storage chip 2 is mainly used to store user data, and capacity is generally very large.
Fig. 2 is the schematic diagram that move media data of the present invention prevent the embodiment of the method for divulging a secret, and as shown in Figure 2, the anti-method of divulging a secret of move media data comprises:
Firmware program configuration step S10, the firmware program of the main control chip of configuration move media, to make to be formed with virtual drive interface and data interaction interface by firmware program in main control chip, virtual drive interface makes move media be identified as CD-ROM equipment when being connected with main frame by the operating system of main frame, and data interaction interface is used after being loaded by the control program stored in virtual drive.
Storage chip partiting step S20, the storage chip of move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area.
In order to realize this invention, the present invention has reconfigured the form of firmware program in main control chip and storage chip.Configuration virtual CD-ROM driver interface in main control chip firmware, makes operating system move media can be identified as CD-ROM equipment.Firmware provides two virtual interfaces, and one is virtual drive interface, and one is data interaction interface, and data interaction interface, not directly in the face of the disk management of system, is used after must being loaded by the program in CD-ROM drive.By device descriptor field in amendment main control chip firmware, make the reference position of the actual storage address of storage chip mobile one section of space backward.
The storage chip that Fig. 3 shows move media of the present invention is divided into the schematic diagram in two regions.As shown in Figure 3, storage chip is divided into as simulation 2.1 regions of mapping domain of CD-ROM and 2.2 regions as storage area.In 2.1 regions, use CD-ROM ISO 9660 file system format to format this region, this regional simulation is generated image file, the file of this image file CD-ROM that is virtually reality like reality and bibliographic structure.2.2 regions are the storage space of amended reality.
As shown in Figure 3,1 is the control chip storing firmware, is wherein formed with two logic interfacings by firmware program: CD-ROM equipment logic interfacing and data interaction interface.
When move media inserts computing machine, when being connected with main frame, move media is identified as CD-ROM equipment, now move media only uses 2.1 regions, as 2.2 region conductively-closeds of storage area.
Fig. 4 shows the process flow diagram of the identifying of move media, as shown in Figure 4, comprises the following steps:
S410: move media is connected with main frame;
S420: the operating system of main frame loads standard driver, for identification equipment and primary controller;
S430: driver instruction intercepted and captured by the firmware of main control chip, starts CD-ROM equipment logic interfacing, now, shields 2.2 regions as storage area;
S440: the file system in carry 2.1 region, recognition of devices is CD-ROM drive by operating system.
Storing control program in virtual drive, after move media is identified as CD-ROM drive by host computer, when user wants to enable 2.2 region, this control program must be run, by the real data interactive interface in this control program deactivation firmware district, the driving in system loads 2.2 region, when now mobile memory medium is exposed as multiplex roles pattern, host computer can think that mobile memory medium is now equipment complex, namely, has the equipment complex of virtual drive and disk unit.
After enabling 2.2 regions, there are two kinds of patterns to the use-pattern in 2.2 regions: normal mode and transparent encryption and decryption pattern.
Fig. 5 shows the schematic diagram enabling storage area (2.2 region).As shown in Figure 5, comprise the following steps:
S510: user runs the control program in virtual drive;
Whether S520: control program judges the operational order of user, drive storage area;
S530: when operational order instruction does not start storage area, operation terminates;
S540: when operational order instruction starts storage area, judge start-up mode;
S550: when start-up mode is normal mode, the direct managing storage area of operating system, identification storage area is mobile memory medium, does not change the read-write mode of data;
S560: driver instruction no longer intercepted and captured by the firmware of main control chip, directly informs driver by device description mark (comprising the start address of storage area), conventional use storage area;
S570: when start-up mode is transparent encryption and decryption pattern, the firmware of main control chip continues to intercept and capture driver instruction, and starts data interaction interface;
S580: start storage area, the operation of operating system to storage area has to pass through control program process and judges.
Wherein, transparent encryption and decryption pattern also can be applied to the disk that computing machine itself carries, and realizes the safety management of the disk of computing machine own.
Utilize the disk management interface of operating system itself, by the Logical Disk that the actual physics spatial simulation of storage area becomes operating system disk management interface to identify, and have disk management interface for this Logical Disk distribution drive.
Fig. 6 shows the realization flow of Logical Disk under transparent encryption and decryption pattern.As shown in Figure 6, comprise the following steps:
S610: control program creates Logical Disk, control program realizes at second area multiple Logical Disk that size regulates arbitrarily, when creating, control program can create a file (hereafter by this file referred to as control documents) in the actual physics space in B region, control documents have recorded actual physics spatial information in B region and (comprises B region physical capacity, how many bunches, every bunch of sector number, every sector byte number, start address, link table information etc.), and the information of mimic panel (comprises the space size of Logical Disk, how many bunches, every bunch of sector number, every sector byte number, the start address of Logical Disk in B region, end address, link table information etc.).The disk management interface of operating system calls control documents by control program, provides Logical Disk to operating system, distributes drive.
S620: when operating system conducts interviews to Logical Disk time, logical address is translated as physical address by control program automatically, namely, by the reference address of operating system to Logical Disk is automatically converted to physical address, and information is submitted to standard driver.
S630: control program is automatically to the data transparency encryption and decryption of read-write.
Wherein, this control documents is encrypt file, and control program is automatically to the data transparency encryption and decryption of turnover, and operating system cannot directly conduct interviews to this file, must be transmitted through control program, control program can judge the operational order of Logical Disk by automatic interception system.
In addition, system writes this file to the data that Logical Disk writes after control program is encrypted automatically.
Fig. 7 shows the schematic flow diagram of data interaction, as shown in Figure 7, comprises the following steps:
S710: system access Logical Disk;
S720: control program intercepts and captures access instruction;
S730: judge user right;
S740: the restriction of prompting authority, and cycle criterion;
S750: judgement is read or write?
S760: in time indicating reading, carry out address translation;
S770: data are read in the transparent deciphering of control program;
S780: when being write command, carries out address translation;
S790: control program transparent encryption, carries out write operation in actual physics space.
According to anti-method and the move media of divulging a secret of move media data of the present invention, move media is divided into multiple region, during move media access computing machine, be just CD-ROM equipment by media recognition, the shielding physical memory space, avoids virus to propagate.Firmware in main control chip comprises two virtual interfaces, wherein data interaction interface is used for enabling storage space, the file capturing operation system that control program can pass through to create in disk is to the access action of disk, the reading and writing data address translation of virtual disk is become the space address in real medium, system access Virtual Space is the same with actual space, middle link is transparent to user, control program cannot depart from move media and directly run, move media not only serves as storage space, and can key be served as, wherein key key can be kept at this locality, also other media can be backuped to, control program not only can make mock disc on move media, and mock disc can be created on hard disk, wherein the size in the space of mock disc is by customization, space is encryption, even if move media is lost can not cause divulging a secret of data.
As mentioned above, embodiments of the invention are explained, but as long as do not depart from inventive point of the present invention in fact and effect can have a lot of distortion, this will be readily apparent to persons skilled in the art.Therefore, such variation is also all included within protection scope of the present invention.
Claims (12)
1. the anti-method of divulging a secret of move media data, comprises the following steps:
Firmware program configuration step, configure the firmware program of the main control chip of described move media, to make to be formed with virtual drive interface and data interaction interface by described firmware program in described main control chip, described virtual drive interface makes described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, and described data interaction interface is used after being loaded by the control program stored in virtual drive; And
Storage chip partiting step, the storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area,
Wherein, in described storage chip partiting step, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip.
2. the anti-method of divulging a secret of move media data according to claim 1, wherein,
In described storage chip partiting step, described first area uses the format of CD-ROMISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
3. the anti-method of divulging a secret of move media data according to claim 2, wherein,
When described move media is connected with described main frame, only use the described first area of described storage chip, the described second area conductively-closed of described storage chip.
4. the anti-method of divulging a secret of move media data according to claim 2, wherein,
When described move media is connected with described main frame, after described move media is identified as CD-ROM drive, passing through to run the driving that control program activates the data interaction interface of described main control chip, the operating system of described main frame loads described second area stored in described virtual drive, when described move media is exposed as multiplex roles pattern, described move media is identified as the equipment complex with described virtual drive and disk unit.
5. the anti-method of divulging a secret of move media data according to claim 4, wherein,
The pattern of enabling of described second area comprises normal mode and transparent encryption and decryption pattern.
6. the anti-method of divulging a secret of move media data according to claim 5, wherein,
After described move media is identified as described equipment complex, when be judged as YES enable described second area by described normal mode time, the operating system of described main frame directly manages described second area, do not change the read-write mode of the data of described second area, the firmware program of described main control chip no longer intercepts and captures driver instruction, directly various for the device description of the start address comprising described second area mark is informed driver, the described second area of conventional use.
7. the anti-method of divulging a secret of move media data according to claim 5, wherein,
After described move media is identified as described equipment complex, when be judged as YES enable described second area by described transparent encryption and decryption pattern time, the firmware program of described main control chip continues to intercept and capture driver instruction, and starts data interaction interface.
8. the anti-method of divulging a secret of move media data according to claim 7, wherein,
Utilize the disk management interface of the described operating system of described main frame itself, the Logical Disk becoming the disk management interface of described operating system to identify the actual physics spatial simulation of described second area, and have disk management interface for this Logical Disk distribution drive.
9. the anti-method of divulging a secret of move media data according to claim 8, wherein, the realization of Logical Disk comprises the following steps:
Described control program realizes at described second area multiple Logical Disk that size regulates arbitrarily, described control program can create the control documents as encrypt file in the actual physics space of described second area, described control documents records actual physics spatial information and Logical Disk information in described second area, the described disk management interface of described operating system calls described control documents by described control program, provides described Logical Disk to described operating system, distributes drive;
When described operating system conducts interviews to described Logical Disk time, logical address is translated as physical address by described control program automatically, namely, by the reference address of described operating system to described Logical Disk be automatically converted to physical address, and submit to standard driver; And
Described control program is automatically to the data transparency encryption and decryption of read-write.
10. the anti-method of divulging a secret of move media data according to claim 9, wherein,
When described operating system conducts interviews to described Logical Disk time, first described control program intercepts and captures access instruction, and judges user right, carries out the operation read or write according to user right.
11. 1 kinds of move medias, comprise main control chip, storage chip, crystal oscillator, the interface that is connected with main frame, wherein,
In described main control chip, pass through stored firmware program be formed with virtual drive interface and data interaction interface, make described move media be identified as CD-ROM equipment when being connected with main frame by the operating system of described main frame, described data interaction interface is used after being loaded by the control program stored in virtual drive;
The storage chip of described move media is divided into as the simulation first area of mapping domain of CD-ROM and the second area as storage area,
Wherein, by revising the device descriptor field in described firmware program that described main control chip stores, make mobile one section of space backward, the actual storage address of described storage chip, described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
12. move medias according to claim 11, wherein,
Described first area uses the format of CD-ROM ISO9660 file system format, described first area is simulated and generates image file, the file of described image file CD-ROM that is virtually reality like reality and bibliographic structure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210063459.7A CN102646076B (en) | 2012-02-21 | 2012-03-12 | Data anti-leakage method of mobile medium and mobile medium |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210040468 | 2012-02-21 | ||
CN201210040468.4 | 2012-02-21 | ||
CN201210063459.7A CN102646076B (en) | 2012-02-21 | 2012-03-12 | Data anti-leakage method of mobile medium and mobile medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102646076A CN102646076A (en) | 2012-08-22 |
CN102646076B true CN102646076B (en) | 2015-04-29 |
Family
ID=46658904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210063459.7A Active CN102646076B (en) | 2012-02-21 | 2012-03-12 | Data anti-leakage method of mobile medium and mobile medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102646076B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104992129B (en) * | 2015-05-28 | 2017-12-22 | 山东华芯半导体有限公司 | A kind of OSX systems encrypted U disk and its implementation |
CN105809047B (en) * | 2016-04-05 | 2018-09-14 | 武汉烽火众智数字技术有限责任公司 | Data safety exchange system and its method between a kind of heterogeneous networks |
CN106951790B (en) * | 2016-12-15 | 2019-12-13 | 中国电子科技集团公司第三十研究所 | USB storage medium transparent encryption method |
CN111177783B (en) * | 2019-12-31 | 2022-05-27 | 北京明朝万达科技股份有限公司 | Method and device for preventing mobile storage medium from being divulged |
CN112291206B (en) * | 2020-10-14 | 2023-08-15 | 北京安石科技有限公司 | Method for improving operating system safety through main control chip |
CN113127896B (en) * | 2021-03-29 | 2022-02-22 | 深圳市安存数据技术有限公司 | Data processing method and device based on independent encryption chip |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040042706A (en) * | 2002-11-15 | 2004-05-20 | 스페이스 인터내셔널 주식회사 | System, Method and Recording Medium For Achieving Virtual CD ROM Drive |
CN102043928A (en) * | 2009-10-13 | 2011-05-04 | 创易科技股份有限公司 | External CD driver with data encryption and decryption functions and encryption and decryption methods utilized by same |
CN102053798A (en) * | 2009-10-27 | 2011-05-11 | 鸿富锦精密工业(深圳)有限公司 | Virtual drive firmware and image document reading method thereof |
CN102109965A (en) * | 2009-12-23 | 2011-06-29 | 群联电子股份有限公司 | Flash memory storage system, flash memory controller, computer system and simulation method |
-
2012
- 2012-03-12 CN CN201210063459.7A patent/CN102646076B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040042706A (en) * | 2002-11-15 | 2004-05-20 | 스페이스 인터내셔널 주식회사 | System, Method and Recording Medium For Achieving Virtual CD ROM Drive |
CN102043928A (en) * | 2009-10-13 | 2011-05-04 | 创易科技股份有限公司 | External CD driver with data encryption and decryption functions and encryption and decryption methods utilized by same |
CN102053798A (en) * | 2009-10-27 | 2011-05-11 | 鸿富锦精密工业(深圳)有限公司 | Virtual drive firmware and image document reading method thereof |
CN102109965A (en) * | 2009-12-23 | 2011-06-29 | 群联电子股份有限公司 | Flash memory storage system, flash memory controller, computer system and simulation method |
Also Published As
Publication number | Publication date |
---|---|
CN102646076A (en) | 2012-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102646076B (en) | Data anti-leakage method of mobile medium and mobile medium | |
US8856521B2 (en) | Methods and systems for performing secure operations on an encrypted file | |
US8296585B2 (en) | Method of encrypting/decrypting the document and a safety management storage device and system method of its safety management | |
KR101506578B1 (en) | File system configuration method and apparatus for data security, method and apparatus for accessing data security area formed by the same, and data storage device thereby | |
JP5981984B2 (en) | Virtual computer system, confidential information protection method, and confidential information protection program | |
CN100552690C (en) | Data managing method | |
CN102656550B (en) | Storage device and method for accessing multiple protected files in a private memory area using a virtual file in a public memory area | |
CN102053925A (en) | Realization method of data encryption in hard disk | |
CN101877246A (en) | U disk encryption method | |
JP2012248178A (en) | Secure removable media and method for managing the same | |
CN102955745A (en) | Mobile storage terminal and data management method thereof | |
CN101911023B (en) | Delivering secured media using a portable memory device | |
CN102955746A (en) | Read-only mode mobile storage device and data access method thereof | |
CN103678959A (en) | Data protecting method based on portable storage device | |
JP2010533910A (en) | Digital information memory card encryption structure and method | |
CN102254119A (en) | Safe mobile data storage method based on fingerprint U disk and virtual machine | |
CN103488919A (en) | Protection method and device for executable programs | |
CN101578608A (en) | Methods and apparatuses for accessing content based on a session ticket | |
KR102166430B1 (en) | Ssd based storage media with data protection | |
CN100595739C (en) | Method and system for accessing finance data | |
CN102012874B (en) | USB (universal serial bus) storage device provided with resource manager | |
CN101350034A (en) | Mobile memory apparatus and method for visiting file | |
CN104751080A (en) | USB (Universal Serial Bus) flash disk encryption-based data access method and system | |
CN111241498A (en) | Multifunctional USB storage device | |
CN210691364U (en) | Encrypted USB flash disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right |
Effective date of registration: 20220816 Granted publication date: 20150429 |
|
PP01 | Preservation of patent right | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20240816 Granted publication date: 20150429 |