CN104573570A - File storage and access method allowing card reader to generate random check codes - Google Patents

File storage and access method allowing card reader to generate random check codes Download PDF

Info

Publication number
CN104573570A
CN104573570A CN201510036494.3A CN201510036494A CN104573570A CN 104573570 A CN104573570 A CN 104573570A CN 201510036494 A CN201510036494 A CN 201510036494A CN 104573570 A CN104573570 A CN 104573570A
Authority
CN
China
Prior art keywords
file
control module
transmitting software
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510036494.3A
Other languages
Chinese (zh)
Other versions
CN104573570B (en
Inventor
傅如毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yuanwang Software Co Ltd
Original Assignee
Zhejiang Yuanwang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yuanwang Software Co Ltd filed Critical Zhejiang Yuanwang Software Co Ltd
Priority to CN201510036494.3A priority Critical patent/CN104573570B/en
Publication of CN104573570A publication Critical patent/CN104573570A/en
Application granted granted Critical
Publication of CN104573570B publication Critical patent/CN104573570B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an information safety protecting method and discloses a file storage and access method allowing a card reader to generate random check codes. The method is based on the card reader comprising a control chip inside, a storage disk connected to the card reader in a communicating manner, special file transfer software managing the storage disk and a hardware platform used for interacting with a user and operating the special file transfer software. According to the method, the card reader has the encryption and decryption functions on data of the storage disk in a manner of being separated from the hardware platform, data of a storage region is prevented from being acquired by a third party, the storage region access authority of the hardware platform is controlled in the operation range for each time, authorization is operated with the participation of a user for each time, and ordinary storage equipment has the data confidentiality function as special safety storage equipment.

Description

A kind of file storage and inquire method being generated random check code by card reader
[technical field]
The present invention relates to a kind of method of protection information safety, particularly a kind of file storage and inquire method being generated random check code by card reader.
[background technology]
Ordinary mobile storage or storage card low price, use amount is wide, but during this equipment access computing machine, internal data directly opens to computing machine so that user's access with the form of data block, therefore, is easy to be stolen data by the 3rd people or virus.The memory device adding data encryption or password authorization function still can not solve the problem of data theft, reason is once user have passed password authentication, computing machine just obtains the access rights of all data in memory device, thus virus can obtain all data in equipment.
Therefore, in order to solve ordinary mobile storage or the not strong problem of storing card data confidentiality, applicant thinks that can connect computing machine and ordinary mobile storage or storage card by a kind of card reader solves problem.In this reader device, realize data encryption and authorization control, and the mechanism of this mandate can solve the data theft problem still existed above by common password authorization, it needs to authorize separately by each file operation behavior on the one hand; Need the realization of the control of authority of key and computing machine to depart from the other hand, namely transfer to reader device to bear; Require that user must participate in file access licensing process on the one hand again.
In prior art, reader device just uses as interconnecting device, be used for connecting storage medium and computing machine, and do not realize above-mentioned authorization control, by the independent authorization function of each file operation behavior, can not solve the problem that above-mentioned virus steals data, and authorized certificate is easily stolen, bring unnecessary loss to user.
[summary of the invention]
The object of the invention is to overcome above-mentioned the deficiencies in the prior art, there is provided a kind of file storage and inquire method being generated random check code by card reader, it is intended to solve the technical matters that mechanism exists leak, authorized certificate is easily stolen of strong, the access authorization of confidentiality that card reader of the prior art cannot carry out data encryption, memory device internal data.
For achieving the above object, the present invention proposes a kind of file storage and inquire method being generated random check code by card reader, it contains the card reader of control chip based on a kind of inside, the memory disc communicated to connect with card reader, manage this memory disc private file transmitting software and for running the hardware platform of this private file transmitting software with user interactions, described memory disc is provided with the encryption of memory block with the use of this memory disc and the configuration information of access of storage purpose file, the routine package that described control chip runs is containing control module and the file system module to storage area data encryption and decryption process, described card reader is also provided with for the interactive component with user interactions, described control module communicates with interactive component with private file transmitting software respectively, and by calling file system module access storage areas, its concrete steps are as follows:
A) original state: card reader and hardware platform are communicated to connect, control module is run, and private file transmitting software runs on a hardware platform, waits for the operational order of user;
B) password authentication: user opens private file transmitting software, private file transmitting software ejects password authentication frame, waits for the input of user, and password transmission user inputted is to control module, password information predetermined with it for password is compared by control module, if be consistent, then go to step E), if do not met, then by the information feed back of password mistake to private file transmitting software, go to step C), if incongruent number of times reaches three times, then go to step D);
C) authentication failed: private file transmitting software ejects the password authentication frame with user interactions again, waits for the input of user, returns back to step B);
D) access unsuccessfully: control module checks the configuration information of memory disc, if configuration information is format, then password information and check information all reset to defaults by control module, and by information feed back too much for errors number to private file transmitting software, file system module removes the inner All Files in memory block, private file transmitting software is closed after ejecting the too much caution frame of errors number automatically, disconnect the communication connection between card reader and hardware platform, return back to steps A), if configuration information is not for format, then control module by information feed back too much for errors number to private file transmitting software, private file transmitting software ejects the too much caution frame of errors number, return back to step B),
E) send operational order: according to the operation of user, private file transmitting software sends the operational order to memory block internal file, and operational order is transferred to control module, waits for the feedback of control module;
F) access control: control module parse operation order, judge whether this order belongs to special command, if, then the control command that this order needs user to verify is fed back to private file transmitting software, generate random check information, and this check information is transferred to interactive component, go to step G), if not, then go to step J);
G) user's verification: private file transmitting software ejects the operation demonstration frame with user interactions, wait for the input of user, if do not receive the authorization information of user within the T1 time, then be judged to be invalid operation, again E is gone to step), if have received the authorization information of user within the T1 time, then this authorization information is sent to control module, goes to step H);
H) verification operation: the check information of the authorization information that user inputs by control module and generation is checked, fruit authorization information meets, then go to step J), if do not met, then by the information feedback of check errors to private file transmitting software, go to step I), if incongruent number of times reaches three times, then go to step D);
I) verify unsuccessfully: private file transmitting software ejects the operation demonstration frame with user interactions again, wait for the input of user, return back to step G);
J) operational processes: operational order is sent to file system module by control module, file system module makes different responses according to operational order, and by the information feedback of response to control module, carry out access or the transmission of file, return back to step e immediately).
As preferably, in step G) in, the T1 time is 5s ~ 10s.
As preferably, in step F) in, the check information that control module generates is random check code, in step G) in, user's input be the identifying code be consistent with check code, in step D) in control module change predetermined password information, and regenerate new check code.
As preferably, in step F) in, the check information that control module generates is random check problem, in step G) in, what user inputted is the Validation Answer Key be consistent with check problem.
As preferably, in step J) in, if what private file transmitting software sent is directory access order, then file system module is according to the fileinfo of inside, memory block, directory information needed for extraction, and directory information is back to control module, control module is fed back to private file transmitting software, checks for user.
As preferably, in step J) in, if what private file transmitting software sent is delete command, then file system module according to delete command for file or catalogue, by the file erase of inside, memory block or directory information corresponding to change, control module by the information feed back deleted to private file transmitting software.
As preferably, in step J) in, if what private file transmitting software sent is rename order, then file system module according to rename order for file or catalogue, the file name of change inside, memory block or directory information corresponding to change, control module by the information feed back changed to private file transmitting software.
As preferably, in step J) in, if what private file transmitting software sent is transmission command, then file system module is according to the fileinfo of inside, memory block, extract transmission command for file or catalogue, file or packed directory information are back to control module, control module transmits it to private file transmitting software, transmit it to hardware platform by private file transmitting software, control module after completing transmission by the information feed back that is transmitted to private file transmitting software.
As preferably, in step J) in, if what private file transmitting software sent is import order, then file system module is according to the file imported in order or directory information, fileinfo write memory block or change corresponding directory information, control module by the information feed back that imported to private file transmitting software.
As preferably, described memory disc is communicated to connect by usb protocol and card reader.
Beneficial effect of the present invention: compared with prior art, a kind of file storage and inquire method being generated random check code by card reader provided by the invention, step is reasonable, independently control chip is adopted to manage memory disc internal data, card reader is not only made to have the encryption and decryption function realizing departing from hardware platform to data in memory disc, prevent data in memory block from being obtained by the 3rd people, and by hardware platform to the access privilege control of memory block in the scope operated each time, make the mandate operated each time that user all must be had to participate in, avoid the virus control hardware platforms such as wooden horse automatically to operate and the data leak caused, thus allow common memory device also possess the similar data security function of Special safety memory device.
Feature of the present invention and advantage will be described in detail by reference to the accompanying drawings by embodiment.
[accompanying drawing explanation]
Fig. 1 is the schematic flow sheet of the embodiment of the present invention;
Fig. 2 is the particular flow sheet of operational processes in the embodiment of the present invention.
[embodiment]
For making the object, technical solutions and advantages of the present invention clearly understand, below by accompanying drawing and embodiment, the present invention is further elaborated.But should be appreciated that, specific embodiment described herein, only in order to explain the present invention, is not limited to scope of the present invention.In addition, in the following description, the description to known features and technology is eliminated, to avoid unnecessarily obscuring concept of the present invention.
Consult Fig. 1, the embodiment of the present invention provides a kind of file storage and inquire method being generated random check code by card reader, it contains the card reader of control chip based on a kind of inside, the memory disc communicated to connect with card reader, manage this memory disc private file transmitting software and for running the hardware platform of this private file transmitting software with user interactions, memory disc is provided with the encryption of memory block with the use of this memory disc and the configuration information of access of storage purpose file, the routine package that control chip runs is containing control module and the file system module to storage area data encryption and decryption process, card reader is also provided with for the interactive component with user interactions, control module communicates with interactive component with private file transmitting software respectively, and by calling file system module access storage areas.
Usually, the file of inside, memory block is resolved by the file system of hardware platform itself, once file system in the interior data file system and the hardware platform that adopt can not compatibility, so user just cannot by the file of hardware platform access storage areas, therefore, in order to avoid above-mentioned situation, the embodiment of the present invention can the file system module of resolution file be located in card reader, hardware platform is passed through and is only communicated to connect by the file system module in control chip and memory block, thus different file system all can be run under identical hardware platform, greatly facilitate the use of user.
In this kind of structure, no matter be control module or file system module, all can depart from hardware platform independent work, namely hardware platform namely can not direct access storage areas, private file transmitting software access storage areas can not be passed through, thus limit the access rights of hardware platform, really realize the isolation of memory block.
Wherein, file system module can also, to data encryption and decryption in memory disc, make the ciphering process of memory disc to depart from hardware platform, thus prevents data in memory block to be obtained by the 3rd people.
Concrete file storage and inquire step is as follows:
A) original state: card reader and hardware platform are communicated to connect, control module is run, and private file transmitting software runs on a hardware platform, waits for the operational order of user.
B) password authentication: user opens private file transmitting software, private file transmitting software ejects password authentication frame, waits for the input of user, and password transmission user inputted is to control module, password information predetermined with it for password is compared by control module, if be consistent, then go to step E), if do not met, then by the information feed back of password mistake to private file transmitting software, go to step C), if incongruent number of times reaches three times, then go to step D).
Wherein, user needs could run private file transmitting software by password authentication, i.e. step B) limit as the first step of file access licensing scheme, disabled user access storage areas can be prevented.
In embodiments of the present invention, with hardware platform independently control module be responsible for the password that comparison password information and user input, avoid hardware platform to control password authorization, private file transmitting software can only receive the result that control module has been handled well, feeds back to private file transmitting software.
C) authentication failed: private file transmitting software ejects the password authentication frame with user interactions again, waits for the input of user, returns back to step B).
D) access unsuccessfully: control module checks the configuration information of memory disc, if configuration information is format, then password information and check information all reset to defaults by control module, and by information feed back too much for errors number to private file transmitting software, file system module removes the inner All Files in memory block, private file transmitting software is closed after ejecting the too much caution frame of errors number automatically, disconnect the communication connection between card reader and hardware platform, return back to steps A), if configuration information is not for format, then control module by information feed back too much for errors number to private file transmitting software, private file transmitting software ejects the too much caution frame of errors number, return back to step B).
Step B) as whole file access first re-authorization operation, it can not only prevent disabled user to the access of memory block, but also on-warning mode can be entered when disabled user steals by force, namely in step D) middle warning of ejecting user, if configuration information is format, then whole memory block will be formatd by control module, thus avoids more data to be stolen, by user's damage control in suitable scope.Certainly, this just can operate at the critical moment, and for general case, such as user forgets Password, and user can make control information be feedback information by change configuration information, and can not format total data.
In embodiments of the present invention, configuration information is located in memory disc, and therefore different memory discs can have different configuration informations.
Wherein, configuration information can be the Default Value information of memory disc, also can be the information that user is arranged in use voluntarily.In embodiments of the present invention, private file transmitting software improves configuration information modify feature, so that user operation.
E) send operational order: according to the operation of user, private file transmitting software sends the operational order to memory block internal file, and operational order is transferred to control module, waits for the feedback of control module.
In the embodiment of the present invention, the operation of user each time all needs the parsing through control module, namely the access of control module to hardware platform each time controls all separately, make the access privilege control of hardware platform in the scope of this operation, thus effectively limit the access rights of hardware platform to memory device internal data.
F) access control: control module parse operation order, judge whether this order belongs to special command, if, then the control command that this order needs user to verify is fed back to private file transmitting software, generate random check information, and this check information is transferred to interactive component, go to step G), if not, then go to step J).
For the operation of user, embodiments of the invention adopt step control, for the operational order that some are special, such as, delete memory block internal data or outwards transmit internal data etc., private file transmitting software this operational order of reminding user can need to carry out user's verification; And for other the operational order that can not affect memory block internal data, control module directly can call file system module, carry out the process of operational order, thus really realize different operating and all have the mandate of different stage to limit, greatly improve the security performance of card reader.
G) user's verification: private file transmitting software ejects the operation demonstration frame with user interactions, wait for the input of user, if do not receive the authorization information of user within the T1 time, then be judged to be invalid operation, again E is gone to step), if have received the authorization information of user within the T1 time, then this authorization information is sent to control module, goes to step H).
In embodiments of the present invention, user needs by checking that the interactive component in card reader just can know correct authorization information, this just makes user's checking procedure need user's manual operation, has stopped the situation that control hardware platform just can skip the direct access storage areas of user.
Interactive component now can be output block, such as display screen, microphone, also can be output block and input block, such as keyboard, button.
Wherein, in order to leave the time that user checks and inputs for, the T1 time is set to 5s ~ 10s, and the embodiment of the present invention adopts 5s.
H) verification operation: the check information of the authorization information that user inputs by control module and generation is checked, fruit authorization information meets, then go to step J), if do not met, then by the information feedback of check errors to private file transmitting software, go to step I).
In embodiments of the present invention, user can check check information by interactive component, and authorization information is inputed to the private file transmitting software run in hardware platform, and check information is the random information generated by the control module independent of hardware platform, i.e. step H) in, control module information is checked and is departed from hardware platform independent operating, not only increases the authorization information confidentiality of user, avoids the 3rd people to control the situation generation of private file transmitting software with regard to energy access storage areas; But also the authorization information of user is not fixed, even if known by other people because of carelessness, the file of inside, memory block is also safe, improves the security of memory disc.
I) verify unsuccessfully: private file transmitting software ejects and operation demonstration frame again, wait for the input of user, return back to step G), if the continuous information receiving the check errors of control module for three times, then eject the too much dialog box of errors number, go to step D).
J) operational processes: operational order is sent to file management system by control module, file management system makes different responses according to operational order, and by the information feedback of response to control module, carry out access or the transmission of file, go to step E immediately).
After user's complete operation, private file transmitting software is closed, and disconnects the communication connection of card reader and hardware platform, terminates all operations.
Particularly, as a kind of embodiment, in step F) in, the check information that control module generates is random check code, in step G) in, what user inputted is the identifying code be consistent with check code.Namely check code now can be numeral also can be word.
As another kind of embodiment, in step F) in, the check information that control module generates is random check problem, in step G) in, what user inputted is the Validation Answer Key be consistent with check problem.Because the generation of random number has certain rule, be just easy to draw correct check code once be cracked, cracking of check problem, acquires a certain degree of difficulty, and therefore, in order to improve the confidentiality of subscriber authorisation voucher further, the producer can adopt this embodiment.
Further, referring again to Fig. 2, in step J) in, if what private file transmitting software sent is directory access order, then file system module is according to the fileinfo of inside, memory block, the directory information needed for extraction, and directory information is back to control module, control module is fed back to private file transmitting software, checks for user.
Further, in step J) in, if what private file transmitting software sent is delete command, then file system module according to delete command for file or catalogue, by the file erase of inside, memory block or directory information corresponding to change, control module by the information feed back deleted to private file transmitting software.
Further, in step J) in, if what private file transmitting software sent is rename order, then file system module according to rename order for file or catalogue, the file name of change inside, memory block or directory information corresponding to change, control module by the information feed back changed to private file transmitting software.
Further, in step J) in, if what private file transmitting software sent is transmission command, then file system module is according to the fileinfo of inside, memory block, extract transmission command for file or catalogue, file or packed directory information are back to control module, control module transmits it to private file transmitting software, transmit it to hardware platform by private file transmitting software, control module after completing transmission by the information feed back that is transmitted to private file transmitting software.
Further, in step J) in, if what private file transmitting software sent is import order, then file system module is according to the file imported in order or directory information, fileinfo write memory block or change corresponding directory information, control module by the information feed back that imported to private file transmitting software.
Wherein, memory disc is communicated to connect by usb protocol and card reader, and interactive component is also communicated with control module by usb protocol, interactive component now both can be connected with control chip by the USB interface in card reader, also can be fixed in card reader.
Certainly, the communication protocol between memory disc and card reader can also be the agreement that production firm independently sets, and is not limited to usb protocol.
In embodiments of the present invention; file storage and inquire method both can be used for by the file transfer between the memory disc of usb protocol and hardware platform; also can be used between fixed equipment and fixed equipment by file transfer that hardware platform carries out; also can be used for the file transfer of Unified Device inside; as long as hardware platform carries out file access by control chip and the documentary memory block of storage, just belong in protection scope of the present invention.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement or improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. one kind is generated the file storage and inquire method of random check code by card reader, it is characterized in that: it contains the card reader of control chip based on a kind of inside, the memory disc communicated to connect with card reader, manage this memory disc private file transmitting software and for running the hardware platform of this private file transmitting software with user interactions, described memory disc is provided with the encryption of memory block with the use of this memory disc and the configuration information of access of storage purpose file, the routine package that described control chip runs is containing control module and the file system module to storage area data encryption and decryption process, described card reader is also provided with for the interactive component with user interactions, described control module communicates with interactive component with private file transmitting software respectively, and by calling file system module access storage areas, its concrete steps are as follows:
A) original state: card reader and hardware platform are communicated to connect, control module is run, and private file transmitting software runs on a hardware platform, waits for the operational order of user;
B) password authentication: user opens private file transmitting software, private file transmitting software ejects password authentication frame, waits for the input of user, and password transmission user inputted is to control module, password information predetermined with it for password is compared by control module, if be consistent, then go to step E), if do not met, then by the information feed back of password mistake to private file transmitting software, go to step C), if incongruent number of times reaches three times, then go to step D);
C) authentication failed: private file transmitting software ejects the password authentication frame with user interactions again, waits for the input of user, returns back to step B);
D) access unsuccessfully: control module checks the configuration information of memory disc, if configuration information is format, then password information and check information all reset to defaults by control module, and by information feed back too much for errors number to private file transmitting software, file system module removes the inner All Files in memory block, private file transmitting software is closed after ejecting the too much caution frame of errors number automatically, disconnect the communication connection between card reader and hardware platform, return back to steps A), if configuration information is not for format, then control module by information feed back too much for errors number to private file transmitting software, private file transmitting software ejects the too much caution frame of errors number, return back to step B),
E) send operational order: according to the operation of user, private file transmitting software sends the operational order to memory block internal file, and operational order is transferred to control module, waits for the feedback of control module;
F) access control: control module parse operation order, judge whether this order belongs to special command, if, then the control command that this order needs user to verify is fed back to private file transmitting software, and generate random check information, this check information is transferred to interactive component, goes to step G), if not, then go to step J);
G) user's verification: private file transmitting software ejects the operation demonstration frame with user interactions, wait for the input of user, if do not receive the authorization information of user within the T1 time, then be judged to be invalid operation, again E is gone to step), if have received the authorization information of user within the T1 time, then this authorization information is sent to control module, goes to step H);
H) verification operation: the check information of the authorization information that user inputs by control module and generation is checked, fruit authorization information meets, then go to step J), if do not met, then by the information feedback of check errors to private file transmitting software, go to step I), if incongruent number of times reaches three times, then go to step D);
I) verify unsuccessfully: private file transmitting software ejects the operation demonstration frame with user interactions again, wait for the input of user, return back to step G);
J) operational processes: operational order is sent to file system module by control module, file system module makes different responses according to operational order, and by the information feedback of response to control module, carry out access or the transmission of file, return back to step e immediately).
2. a kind of file storage and inquire method being generated random check code by card reader as claimed in claim 1, is characterized in that: in step G) in, the T1 time is 5s ~ 10s.
3. a kind of file storage and inquire method being generated random check code by card reader as claimed in claim 1, it is characterized in that: in step F) in, the check information that control module generates is random check code, in step G) in, what user inputted is the identifying code be consistent with check code.
4. a kind of file storage and inquire method being generated random check code by card reader as claimed in claim 1, it is characterized in that: in step F) in, the check information that control module generates is random check problem, in step G) in, what user inputted is the Validation Answer Key be consistent with check problem.
5. a kind of file storage and inquire method being generated random check code by card reader according to any one of Claims 1-4, it is characterized in that: in step J) in, if what private file transmitting software sent is directory access order, then file system module is according to the fileinfo of inside, memory block, directory information needed for extraction, and directory information is back to control module, control module is fed back to private file transmitting software, checks for user.
6. a kind of file storage and inquire method being generated random check code by card reader according to any one of Claims 1-4, it is characterized in that: in step J) in, if what private file transmitting software sent is delete command, then file system module according to delete command for file or catalogue, by the file erase of inside, memory block or directory information corresponding to change, control module by the information feed back deleted to private file transmitting software.
7. a kind of file storage and inquire method being generated random check code by card reader according to any one of Claims 1-4, it is characterized in that: in step J) in, if what private file transmitting software sent is rename order, then file system module according to rename order for file or catalogue, the file name of change inside, memory block or directory information corresponding to change, control module by the information feed back changed to private file transmitting software.
8. a kind of file storage and inquire method being generated random check code by card reader according to any one of Claims 1-4, it is characterized in that: in step J) in, if what private file transmitting software sent is transmission command, then file system module is according to the fileinfo of inside, memory block, extract transmission command for file or catalogue, file or packed directory information are back to control module, control module transmits it to private file transmitting software, hardware platform is transmitted it to by private file transmitting software, control module after completing transmission by the information feed back that is transmitted to private file transmitting software.
9. a kind of file storage and inquire method being generated random check code by card reader according to any one of Claims 1-4, it is characterized in that: in step J) in, if what private file transmitting software sent is import order, then file system module is according to the file imported in order or directory information, fileinfo write memory block or change corresponding directory information, control module by the information feed back that imported to private file transmitting software.
10. a kind of file storage and inquire method being generated random check code by card reader as claimed in claim 1, is characterized in that: described memory disc is communicated to connect by usb protocol and card reader.
CN201510036494.3A 2015-01-24 2015-01-24 File storage and access method allowing card reader to generate random check codes Active CN104573570B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510036494.3A CN104573570B (en) 2015-01-24 2015-01-24 File storage and access method allowing card reader to generate random check codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510036494.3A CN104573570B (en) 2015-01-24 2015-01-24 File storage and access method allowing card reader to generate random check codes

Publications (2)

Publication Number Publication Date
CN104573570A true CN104573570A (en) 2015-04-29
CN104573570B CN104573570B (en) 2017-05-10

Family

ID=53089603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510036494.3A Active CN104573570B (en) 2015-01-24 2015-01-24 File storage and access method allowing card reader to generate random check codes

Country Status (1)

Country Link
CN (1) CN104573570B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116192529A (en) * 2023-03-10 2023-05-30 广东堡塔安全技术有限公司 Third party server safety management system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184358A (en) * 2011-04-28 2011-09-14 郑州信大捷安信息技术有限公司 USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184358A (en) * 2011-04-28 2011-09-14 郑州信大捷安信息技术有限公司 USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116192529A (en) * 2023-03-10 2023-05-30 广东堡塔安全技术有限公司 Third party server safety management system
CN116192529B (en) * 2023-03-10 2023-09-29 广东堡塔安全技术有限公司 Third party server safety management system

Also Published As

Publication number Publication date
CN104573570B (en) 2017-05-10

Similar Documents

Publication Publication Date Title
JP5317629B2 (en) Information management apparatus, information processing system, information management method, and information management program
CN102800141A (en) Entrance guard controlling method and system based on bidirectional authentication
CN102521165A (en) Security U disk and recognition method and device thereof
CN105528556A (en) Hybrid SQLite3 safety access method
CN103561091A (en) Document outgoing control system and method
CN105450658A (en) System login method and device
CN102799831A (en) Information safety protection system of application system based on database and information safety protection method
CN105389526B (en) Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration
CN104469736A (en) Data processing method, server and terminal
CN102427459A (en) Offline authorization method based on Usbkeys
CN104506480A (en) Cross-domain access control method and system based on marking and auditing combination
CN206515828U (en) The data storage device of safety encryption
CN104598838B (en) A kind of random verification and provide trusted operating environment file store and edit methods
CN110309673A (en) A kind of adaptively customized encryption cloud Database Systems and encryption method
CN103824014A (en) Isolation certificating and monitoring method of USB (universal serial bus) port within local area network
CN202171805U (en) Computer confidential management system
CN206878870U (en) A kind of safe single-sign-on accesses system
CN104573559B (en) It is a kind of to support the storage of the file of password authorization and operation log and access method
CN104573570A (en) File storage and access method allowing card reader to generate random check codes
CN203206256U (en) A mobile storage device
CN104598787B (en) The file of a kind of artificial mandate and offer trusted operations environment stores and edit methods
CN104573467B (en) A kind of file storage and inquire method directly being accepted user's confirmation by card reader
CN103501292A (en) Method and system for achieving data safety protection by using standby mobile phone
CN102110218A (en) Mobile-phone-information-encryption-based authentication method
CN104573569A (en) File storage and access method by storage equipment generating random verification information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant