CN105389526B - Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration - Google Patents

Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration Download PDF

Info

Publication number
CN105389526B
CN105389526B CN201510888562.9A CN201510888562A CN105389526B CN 105389526 B CN105389526 B CN 105389526B CN 201510888562 A CN201510888562 A CN 201510888562A CN 105389526 B CN105389526 B CN 105389526B
Authority
CN
China
Prior art keywords
memory block
login authentication
memory
encrypted area
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510888562.9A
Other languages
Chinese (zh)
Other versions
CN105389526A (en
Inventor
袁慧
蒲金培
张小波
马述浩
马述杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taihua Wisdom Industry Group Co Ltd
Original Assignee
Taihua Wisdom Industry Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taihua Wisdom Industry Group Co Ltd filed Critical Taihua Wisdom Industry Group Co Ltd
Priority to CN201510888562.9A priority Critical patent/CN105389526B/en
Publication of CN105389526A publication Critical patent/CN105389526A/en
Application granted granted Critical
Publication of CN105389526B publication Critical patent/CN105389526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access

Abstract

The invention discloses encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration;Including:Common interface, entering device, memory, encryption interface and the second memory block, second memory block being sequentially connected also are connected by switching device with the first memory block;First memory block is connected with common interface, and first memory block is used to store non-encrypted data;Second memory block is used to store encryption data;The switching device reads login authentication as needed from memory and successfully identified, and the data interchange for realizing the first memory block and the second memory block is successfully identified with login authentication.The present invention has the advantages of encrypted area and non-encrypted area being integrated on a mobile hard disk, easy to carry, and the data of encrypted area and the data of non-encrypted area can need conversion according to user.

Description

Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration
Technical field
The present invention relates to encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration.
Background technology
There are two kinds of mobile hard disks in the market, a kind of is common mobile hard disk, i.e., real by the USB interface of computer The data exchange of existing mobile hard disk and computer, such mobile hard disk security be not high;Another kind is encryption mobile hard disk, i.e., Certification realizes data exchange by rear.Both the above product, first by inconvenience, otherwise need to carry common movement simultaneously Hard disk and encryption mobile hard disk, otherwise need to store non-encrypted file, but what is carried is encryption mobile hard disk, then calculating When the enterprising style of writing part of machine transmits, other side can be appreciated that the information of encryption file, now encrypts mobile hard disk and is in logging status, If party is away from keyboard, other side has an opportunity and stolen, and will also result in file and divulges a secret.
The content of the invention
The purpose of the present invention is exactly to solve the above problems, there is provided a kind of movement of encrypted area and non-encrypted area integration Hard disk and its date storage method, it, which has, is integrated into encrypted area and non-encrypted area on one mobile hard disk, easy to carry, and The data of encrypted area and the data of non-encrypted area can need the advantages of conversion according to user.
To achieve these goals, the present invention adopts the following technical scheme that:
Encrypted area and the mobile hard disk of non-encrypted area integration, including:
Common interface, entering device, memory, encryption interface and the second memory block being sequentially connected, second storage Area is also connected by switching device with the first memory block;First memory block is connected with common interface, first memory block For storing non-encrypted data;Second memory block is used to store encryption data;The switching device is as needed from storage Login authentication is read in device successfully to identify, and the number for realizing the first memory block and the second memory block is successfully identified with login authentication According to exchange.
The entering device includes Password Input module and password authentication module, and Password Input module receives user's input Password, after reception, password transmission is subjected to password authentification to password authentication module, if being verified, produces login authentication success Mark, login authentication successfully identifies and passes to memory by entering device;If authentication failed, login authentication failure is produced Mark, the mark of entering device login authentication failure will be passed to common interface, the memory block of denied access second.
The switching device includes switching command processing module and login authentication identity reading module, switching command processing mould After block receives the memory block switching command of the first memory block/second, send login authentication mark to checking identity reading module and read Instruction, checking identity reading module obtain login authentication from memory and successfully identified, the login authentication of acquisition is successfully marked Know and the switching command that receives enters row information contrast, contrast is successful, and login authentication identity reading module is at switching command Reason module Transfer Contrast successfully identifies, so as to realize the data exchange between the first memory block and the second memory block;Contrast is lost Lose, login authentication identity reading module to the transmission of switching command processing module failure mark, and refuse the first memory block and Data exchange between second memory block.
The common interface is used to be connected with external computer.
The memory is used to store the login authentication success flag that entering device transmits.
The encryption interface is used to connect memory and the second memory block, and the mark being proved to be successful in memory is passed through Encryption interface passes to the second memory block.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, comprises the following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two Change.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, also includes before step (201) Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not (102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not (104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface Second memory block.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, also includes after step (205) Following steps:
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing Exchange terminates.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration,
Comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not (102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not (104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface Second memory block;
Also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing Exchange terminates.
First memory block is non-encrypted area, and the second memory block is encrypted area.
Beneficial effects of the present invention:Realize that a mobile hard disk data can be encrypted respectively according to the needs of user Storage is not encrypted in storage, and can realize switching between the data of encryption storage and the data of non-encrypted storage.
Brief description of the drawings
Fig. 1 is the mobile hard disk internal structure schematic diagram of the present invention;
Module diagram inside Fig. 2 entering devices;
Module diagram inside Fig. 3 switching devices;
Fig. 4 is the date storage method flow chart embodiment one of the present invention;
Fig. 5 is the date storage method flow chart embodiment two of the present invention;
Fig. 6 is the date storage method flow chart embodiment three of the present invention;
Fig. 7 is the date storage method flow chart embodiment four of the present invention;.
Wherein, 101, computer, 102, common interface, 103, entering device, 104, memory, 105, encryption interface, 106th, the second memory block, 107, switching device, the 108, first memory block.
Embodiment
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
As shown in Figure 1:A kind of safety mobile hard disc, including common interface 102, the first memory block 108, entering device 103, Memory 104, encryption interface 105, the second memory block 106, switching device 107, and the first memory block 108 and the second memory block 106 realize physical isolation by switching device 107.
Computer 101 is connected by the common interface 102 of mobile hard disk with the first memory block 108 and entering device 103, can To carry out the first memory block 108 and the data interaction of computer 101;Entering device 103 can carry out cryptographic check, cryptographic check After success, will verification successfully mark preserves in memory 104, and memory 104 is by encrypting the photos and sending messages of interface 105 to the Two memory blocks 106, realize the second memory block 106 and the data exchange of computer 101.
Switching device 107, for reading the password stored in memory 104, realize the first memory block 108 and the second storage Data switching between area 106.
As shown in Fig. 2 the entering device 103 includes Password Input module and password authentication module, Password Input module The password of user's input is received, after reception, password transmission is subjected to password authentification to password authentication module, if being verified, production Raw login authentication is successfully identified, and login authentication is successfully identified and passes to memory by entering device;If authentication failed, produce The mark of login authentication failure, the mark of entering device login authentication failure will be passed to common interface, and denied access second is deposited Storage area.
As shown in figure 3, the switching device 107 includes switching command processing module and login authentication identity reading module, After switching command processing module receives the memory block switching command of the first memory block/second, send and step on to checking identity reading module Record checking mark reads instruction, and checking identity reading module obtains login authentication from memory and successfully identified, by stepping on for acquisition Record the mark being proved to be successful and enter row information contrast with the switching command received, contrast is successful, and login authentication mark reads mould Block successfully identifies to switching command processing module Transfer Contrast, so as to realize the number between the first memory block and the second memory block According to exchange;Contrast failure, the mark that login authentication identity reading module fails to the transmission of switching command processing module, and refuse Data exchange between first memory block and the second memory block.
As shown in figure 4, embodiment 1:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including Following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two Change.
As shown in figure 5, embodiment 2:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not (102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not (104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface Second memory block;Into step (201);
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two Change.
As shown in fig. 6, embodiment 3:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including Following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two Change;Into step (301);
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing Exchange terminates.
As shown in fig. 7, embodiment 4:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not (102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not (104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface Second memory block;Into step (201);
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two Change;Into step (301);
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step Suddenly (301);
Step (302):Close switching device, the first memory block after closing, the second memory block and computer it is any both it Between data exchanging completed.
Although above-mentioned the embodiment of the present invention is described with reference to accompanying drawing, model not is protected to the present invention The limitation enclosed, one of ordinary skill in the art should be understood that on the basis of technical scheme those skilled in the art are not Need to pay various modifications or deformation that creative work can make still within protection scope of the present invention.

Claims (8)

1. encrypted area and the mobile hard disk of non-encrypted area integration, it is characterized in that, including:
Common interface, entering device, memory, encryption interface and the second memory block being sequentially connected, second memory block is also It is connected by switching device with the first memory block;First memory block is connected with common interface, and first memory block is used for Store non-encrypted data;Second memory block is used to store encryption data;The switching device is as needed from memory Read login authentication successfully to identify, successfully identified with login authentication and realize that the data of the first memory block and the second memory block are mutual Change;
The switching device includes switching command processing module and login authentication identity reading module, and switching command processing module connects After receiving the memory block switching command of the first memory block/second, send login authentication mark to login authentication identity reading module and read Instruction, login authentication identity reading module obtain login authentication from memory and successfully identified, by the login authentication success of acquisition Mark enter row information contrast with the switching command that receives, contrast is successful, and login authentication identity reading module refers to switching Processing module Transfer Contrast is made successfully to identify, so as to realize the data exchange between the first memory block and the second memory block;It is right The mark to fail than failure, login authentication identity reading module to switching command processing module Transfer Contrast, and refuse first Data exchange between memory block and the second memory block.
2. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the entering device Including Password Input module and password authentication module, Password Input module receives the password of user's input, after reception, password is passed Pass password authentication module and carry out password authentification, if being verified, produce login authentication and successfully identify, entering device will log in The mark being proved to be successful passes to memory;If authentication failed, the mark of login authentication failure, entering device login authentication are produced The mark of failure will be passed to common interface, the memory block of denied access second.
3. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the common interface For being connected with external computer.
4. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the memory is used Mark is proved to be successful in what storage entering device transmitted.
5. the date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, it is characterized in that, comprise the following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If it is put into step Suddenly (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data exchange between the two.
6. date storage method as claimed in claim 5, it is characterized in that, also comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step (102) if not;
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step (104) if not;Step Suddenly (105):Login authentication is successfully identified to deposit memory;The mark being proved to be successful is passed to second by encrypting interface Memory block.
7. date storage method as claimed in claim 5, it is characterized in that, also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step (301);
Step (302):Close switching device, the data exchange of the first memory block, the second memory block and computer tripartite after closing Terminate.
8. date storage method as claimed in claim 5, it is characterized in that,
Comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step (102) if not;
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step (104) if not;Step Suddenly (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed into the second storage by encrypting interface Area;
Also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step (301);
Step (302):Close switching device, the data exchange of the first memory block, the second memory block and computer tripartite after closing Terminate.
CN201510888562.9A 2015-12-03 2015-12-03 Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration Active CN105389526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510888562.9A CN105389526B (en) 2015-12-03 2015-12-03 Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510888562.9A CN105389526B (en) 2015-12-03 2015-12-03 Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration

Publications (2)

Publication Number Publication Date
CN105389526A CN105389526A (en) 2016-03-09
CN105389526B true CN105389526B (en) 2018-02-23

Family

ID=55421802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510888562.9A Active CN105389526B (en) 2015-12-03 2015-12-03 Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration

Country Status (1)

Country Link
CN (1) CN105389526B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529348A (en) * 2016-10-31 2017-03-22 余必亚 Computer storage system with double storage modules
CN108960391A (en) * 2017-12-08 2018-12-07 翟红鹰 A kind of device for supporting more storing datas to read
CN111399770B (en) * 2020-02-26 2023-07-11 平安科技(深圳)有限公司 Data storage mode conversion method, device and storage medium
CN117707414A (en) * 2022-09-06 2024-03-15 成都华为技术有限公司 Data processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026038A (en) * 2007-07-19 2009-02-05 Ricoh Co Ltd Information processor, program, and recording medium
CN202258356U (en) * 2011-10-10 2012-05-30 尚徐伟 Multifunctional wireless mobile hard disk
CN102945339A (en) * 2012-12-06 2013-02-27 大连奥林匹克电子城腾飞办公设备商行 Data protection system for computer
CN103793334A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Mobile storage device based data protecting method and mobile storage device
CN104573441A (en) * 2014-08-12 2015-04-29 杭州华澜微科技有限公司 Computer with data privacy function and data encryption and hiding method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026038A (en) * 2007-07-19 2009-02-05 Ricoh Co Ltd Information processor, program, and recording medium
CN202258356U (en) * 2011-10-10 2012-05-30 尚徐伟 Multifunctional wireless mobile hard disk
CN102945339A (en) * 2012-12-06 2013-02-27 大连奥林匹克电子城腾飞办公设备商行 Data protection system for computer
CN103793334A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Mobile storage device based data protecting method and mobile storage device
CN104573441A (en) * 2014-08-12 2015-04-29 杭州华澜微科技有限公司 Computer with data privacy function and data encryption and hiding method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"面向内部威胁的数据泄漏防护关键技术研究";马俊;《中国博士学位论文全文数据库信息科技辑》;20120315;第4.3-4.4节、第6.3节,附图4.6-4.7、6.4-6.5 *

Also Published As

Publication number Publication date
CN105389526A (en) 2016-03-09

Similar Documents

Publication Publication Date Title
CN106169041B (en) A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication
CN101345619B (en) Electronic data protection method and device based on biological characteristic and mobile cryptographic key
CN110291754A (en) It is accessed using the system of mobile device
CN101881997B (en) Trusted safe mobile storage device
CN105099711B (en) A kind of small cipher machine and data ciphering method based on ZYNQ
CN107222303A (en) Digital publishing rights traceability system building method based on block chain and cloud platform
CN105389526B (en) Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration
CN108011716B (en) Cipher device and implementation method
CN107332671A (en) A kind of safety mobile terminal system and method for secure transactions based on safety chip
CN103336746A (en) Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof
CN201590091U (en) Encryption type memory card read/write device based on password authentication
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN206515828U (en) The data storage device of safety encryption
CN105303093A (en) Token verification method for cryptographic smart token
CN103606223A (en) Card authentication method and device
CN106295373A (en) A kind of data transmission encryption device realized based on M PHY interface
CN107911221A (en) The key management method of solid-state disk data safety storage
CN107239681A (en) One kind encryption mobile hard disk upper computer software structure
CN105205416A (en) Mobile hard disk password module
CN201549223U (en) Trusted secure portable storage device
CN201917912U (en) Monitoring and management system of USB (Universal Serial Bus) storage device
CN109784104A (en) SATA hard disc crypto module and its working method, system and its working method
CN101882114A (en) Mobile storage device with gradual identity authentication and log record
CN101127013A (en) Enciphered mobile storage apparatus and its data access method
CN105871866A (en) System and method for password management based on computer hardware information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Yuan Hui

Inventor after: Pu Jinpei

Inventor after: Zhang Xiaobo

Inventor after: Ma Shuhao

Inventor after: Ma Shujie

Inventor before: Yuan Hui

Inventor before: Pu Jinpei

Inventor before: Ma Shuhao

Inventor before: Ma Shujie

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant