CN105389526B - Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration - Google Patents
Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration Download PDFInfo
- Publication number
- CN105389526B CN105389526B CN201510888562.9A CN201510888562A CN105389526B CN 105389526 B CN105389526 B CN 105389526B CN 201510888562 A CN201510888562 A CN 201510888562A CN 105389526 B CN105389526 B CN 105389526B
- Authority
- CN
- China
- Prior art keywords
- memory block
- login authentication
- memory
- encrypted area
- hard disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
Abstract
The invention discloses encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration;Including:Common interface, entering device, memory, encryption interface and the second memory block, second memory block being sequentially connected also are connected by switching device with the first memory block;First memory block is connected with common interface, and first memory block is used to store non-encrypted data;Second memory block is used to store encryption data;The switching device reads login authentication as needed from memory and successfully identified, and the data interchange for realizing the first memory block and the second memory block is successfully identified with login authentication.The present invention has the advantages of encrypted area and non-encrypted area being integrated on a mobile hard disk, easy to carry, and the data of encrypted area and the data of non-encrypted area can need conversion according to user.
Description
Technical field
The present invention relates to encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration.
Background technology
There are two kinds of mobile hard disks in the market, a kind of is common mobile hard disk, i.e., real by the USB interface of computer
The data exchange of existing mobile hard disk and computer, such mobile hard disk security be not high;Another kind is encryption mobile hard disk, i.e.,
Certification realizes data exchange by rear.Both the above product, first by inconvenience, otherwise need to carry common movement simultaneously
Hard disk and encryption mobile hard disk, otherwise need to store non-encrypted file, but what is carried is encryption mobile hard disk, then calculating
When the enterprising style of writing part of machine transmits, other side can be appreciated that the information of encryption file, now encrypts mobile hard disk and is in logging status,
If party is away from keyboard, other side has an opportunity and stolen, and will also result in file and divulges a secret.
The content of the invention
The purpose of the present invention is exactly to solve the above problems, there is provided a kind of movement of encrypted area and non-encrypted area integration
Hard disk and its date storage method, it, which has, is integrated into encrypted area and non-encrypted area on one mobile hard disk, easy to carry, and
The data of encrypted area and the data of non-encrypted area can need the advantages of conversion according to user.
To achieve these goals, the present invention adopts the following technical scheme that:
Encrypted area and the mobile hard disk of non-encrypted area integration, including:
Common interface, entering device, memory, encryption interface and the second memory block being sequentially connected, second storage
Area is also connected by switching device with the first memory block;First memory block is connected with common interface, first memory block
For storing non-encrypted data;Second memory block is used to store encryption data;The switching device is as needed from storage
Login authentication is read in device successfully to identify, and the number for realizing the first memory block and the second memory block is successfully identified with login authentication
According to exchange.
The entering device includes Password Input module and password authentication module, and Password Input module receives user's input
Password, after reception, password transmission is subjected to password authentification to password authentication module, if being verified, produces login authentication success
Mark, login authentication successfully identifies and passes to memory by entering device;If authentication failed, login authentication failure is produced
Mark, the mark of entering device login authentication failure will be passed to common interface, the memory block of denied access second.
The switching device includes switching command processing module and login authentication identity reading module, switching command processing mould
After block receives the memory block switching command of the first memory block/second, send login authentication mark to checking identity reading module and read
Instruction, checking identity reading module obtain login authentication from memory and successfully identified, the login authentication of acquisition is successfully marked
Know and the switching command that receives enters row information contrast, contrast is successful, and login authentication identity reading module is at switching command
Reason module Transfer Contrast successfully identifies, so as to realize the data exchange between the first memory block and the second memory block;Contrast is lost
Lose, login authentication identity reading module to the transmission of switching command processing module failure mark, and refuse the first memory block and
Data exchange between second memory block.
The common interface is used to be connected with external computer.
The memory is used to store the login authentication success flag that entering device transmits.
The encryption interface is used to connect memory and the second memory block, and the mark being proved to be successful in memory is passed through
Encryption interface passes to the second memory block.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, comprises the following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter
Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two
Change.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, also includes before step (201)
Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not
(102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not
(104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface
Second memory block.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, also includes after step (205)
Following steps:
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing
Exchange terminates.
The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration,
Comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not
(102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not
(104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface
Second memory block;
Also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing
Exchange terminates.
First memory block is non-encrypted area, and the second memory block is encrypted area.
Beneficial effects of the present invention:Realize that a mobile hard disk data can be encrypted respectively according to the needs of user
Storage is not encrypted in storage, and can realize switching between the data of encryption storage and the data of non-encrypted storage.
Brief description of the drawings
Fig. 1 is the mobile hard disk internal structure schematic diagram of the present invention;
Module diagram inside Fig. 2 entering devices;
Module diagram inside Fig. 3 switching devices;
Fig. 4 is the date storage method flow chart embodiment one of the present invention;
Fig. 5 is the date storage method flow chart embodiment two of the present invention;
Fig. 6 is the date storage method flow chart embodiment three of the present invention;
Fig. 7 is the date storage method flow chart embodiment four of the present invention;.
Wherein, 101, computer, 102, common interface, 103, entering device, 104, memory, 105, encryption interface,
106th, the second memory block, 107, switching device, the 108, first memory block.
Embodiment
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
As shown in Figure 1:A kind of safety mobile hard disc, including common interface 102, the first memory block 108, entering device 103,
Memory 104, encryption interface 105, the second memory block 106, switching device 107, and the first memory block 108 and the second memory block
106 realize physical isolation by switching device 107.
Computer 101 is connected by the common interface 102 of mobile hard disk with the first memory block 108 and entering device 103, can
To carry out the first memory block 108 and the data interaction of computer 101;Entering device 103 can carry out cryptographic check, cryptographic check
After success, will verification successfully mark preserves in memory 104, and memory 104 is by encrypting the photos and sending messages of interface 105 to the
Two memory blocks 106, realize the second memory block 106 and the data exchange of computer 101.
Switching device 107, for reading the password stored in memory 104, realize the first memory block 108 and the second storage
Data switching between area 106.
As shown in Fig. 2 the entering device 103 includes Password Input module and password authentication module, Password Input module
The password of user's input is received, after reception, password transmission is subjected to password authentification to password authentication module, if being verified, production
Raw login authentication is successfully identified, and login authentication is successfully identified and passes to memory by entering device;If authentication failed, produce
The mark of login authentication failure, the mark of entering device login authentication failure will be passed to common interface, and denied access second is deposited
Storage area.
As shown in figure 3, the switching device 107 includes switching command processing module and login authentication identity reading module,
After switching command processing module receives the memory block switching command of the first memory block/second, send and step on to checking identity reading module
Record checking mark reads instruction, and checking identity reading module obtains login authentication from memory and successfully identified, by stepping on for acquisition
Record the mark being proved to be successful and enter row information contrast with the switching command received, contrast is successful, and login authentication mark reads mould
Block successfully identifies to switching command processing module Transfer Contrast, so as to realize the number between the first memory block and the second memory block
According to exchange;Contrast failure, the mark that login authentication identity reading module fails to the transmission of switching command processing module, and refuse
Data exchange between first memory block and the second memory block.
As shown in figure 4, embodiment 1:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including
Following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter
Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two
Change.
As shown in figure 5, embodiment 2:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including
Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not
(102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not
(104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface
Second memory block;Into step (201);
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter
Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two
Change.
As shown in fig. 6, embodiment 3:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including
Following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter
Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two
Change;Into step (301);
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
Suddenly (301);
Step (302):Close switching device, the data of the first memory block, the second memory block and computer tripartite after closing
Exchange terminates.
As shown in fig. 7, embodiment 4:The date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, including
Following steps:
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step if not
(102);
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step if not
(104);Step (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed to by encrypting interface
Second memory block;Into step (201);
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If just enter
Enter step (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
Suddenly (203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data friendship between the two
Change;Into step (301);
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
Suddenly (301);
Step (302):Close switching device, the first memory block after closing, the second memory block and computer it is any both it
Between data exchanging completed.
Although above-mentioned the embodiment of the present invention is described with reference to accompanying drawing, model not is protected to the present invention
The limitation enclosed, one of ordinary skill in the art should be understood that on the basis of technical scheme those skilled in the art are not
Need to pay various modifications or deformation that creative work can make still within protection scope of the present invention.
Claims (8)
1. encrypted area and the mobile hard disk of non-encrypted area integration, it is characterized in that, including:
Common interface, entering device, memory, encryption interface and the second memory block being sequentially connected, second memory block is also
It is connected by switching device with the first memory block;First memory block is connected with common interface, and first memory block is used for
Store non-encrypted data;Second memory block is used to store encryption data;The switching device is as needed from memory
Read login authentication successfully to identify, successfully identified with login authentication and realize that the data of the first memory block and the second memory block are mutual
Change;
The switching device includes switching command processing module and login authentication identity reading module, and switching command processing module connects
After receiving the memory block switching command of the first memory block/second, send login authentication mark to login authentication identity reading module and read
Instruction, login authentication identity reading module obtain login authentication from memory and successfully identified, by the login authentication success of acquisition
Mark enter row information contrast with the switching command that receives, contrast is successful, and login authentication identity reading module refers to switching
Processing module Transfer Contrast is made successfully to identify, so as to realize the data exchange between the first memory block and the second memory block;It is right
The mark to fail than failure, login authentication identity reading module to switching command processing module Transfer Contrast, and refuse first
Data exchange between memory block and the second memory block.
2. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the entering device
Including Password Input module and password authentication module, Password Input module receives the password of user's input, after reception, password is passed
Pass password authentication module and carry out password authentification, if being verified, produce login authentication and successfully identify, entering device will log in
The mark being proved to be successful passes to memory;If authentication failed, the mark of login authentication failure, entering device login authentication are produced
The mark of failure will be passed to common interface, the memory block of denied access second.
3. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the common interface
For being connected with external computer.
4. encrypted area as claimed in claim 1 and the mobile hard disk of non-encrypted area integration, it is characterized in that, the memory is used
Mark is proved to be successful in what storage entering device transmitted.
5. the date storage method of the mobile hard disk of encrypted area and non-encrypted area integration, it is characterized in that, comprise the following steps:
Step (201):Computer and the second memory block carry out data exchange;
Step (202):Judge whether need to carry out data exchange between the second memory block and the first memory block;If it is put into step
Suddenly (203);Step (202) is returned to if not;
Step (203):Judge whether switching device opens, be put into step (204) if opening, step is returned to if not opening
(203);
Step (204):Success flag in memory is read into switching device;
Step (205):Computer, the first memory block and the second memory block arbitrarily can carry out data exchange between the two.
6. date storage method as claimed in claim 5, it is characterized in that, also comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step (102) if not;
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step (104) if not;Step
Suddenly (105):Login authentication is successfully identified to deposit memory;The mark being proved to be successful is passed to second by encrypting interface
Memory block.
7. date storage method as claimed in claim 5, it is characterized in that, also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
(301);
Step (302):Close switching device, the data exchange of the first memory block, the second memory block and computer tripartite after closing
Terminate.
8. date storage method as claimed in claim 5, it is characterized in that,
Comprise the following steps before step (201):
Step (101):Computer accesses the common interface of mobile hard disk;
Step (102):Data exchange is carried out between computer and the first memory block;
Step (103):Judge whether to access the second memory block, if being put into step (104), be returned to step (102) if not;
Step (104):Judge whether login authentication succeeds, if being put into step (105), be returned to step (104) if not;Step
Suddenly (105):The mark being proved to be successful is stored in memory;The mark being proved to be successful is passed into the second storage by encrypting interface
Area;
Also comprise the following steps after step (205):
Step (301):Judge whether to need to close switching device, if so, being put into step (302);If otherwise return to step
(301);
Step (302):Close switching device, the data exchange of the first memory block, the second memory block and computer tripartite after closing
Terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510888562.9A CN105389526B (en) | 2015-12-03 | 2015-12-03 | Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510888562.9A CN105389526B (en) | 2015-12-03 | 2015-12-03 | Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105389526A CN105389526A (en) | 2016-03-09 |
CN105389526B true CN105389526B (en) | 2018-02-23 |
Family
ID=55421802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510888562.9A Active CN105389526B (en) | 2015-12-03 | 2015-12-03 | Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105389526B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529348A (en) * | 2016-10-31 | 2017-03-22 | 余必亚 | Computer storage system with double storage modules |
CN108960391A (en) * | 2017-12-08 | 2018-12-07 | 翟红鹰 | A kind of device for supporting more storing datas to read |
CN111399770B (en) * | 2020-02-26 | 2023-07-11 | 平安科技(深圳)有限公司 | Data storage mode conversion method, device and storage medium |
CN117707414A (en) * | 2022-09-06 | 2024-03-15 | 成都华为技术有限公司 | Data processing method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009026038A (en) * | 2007-07-19 | 2009-02-05 | Ricoh Co Ltd | Information processor, program, and recording medium |
CN202258356U (en) * | 2011-10-10 | 2012-05-30 | 尚徐伟 | Multifunctional wireless mobile hard disk |
CN102945339A (en) * | 2012-12-06 | 2013-02-27 | 大连奥林匹克电子城腾飞办公设备商行 | Data protection system for computer |
CN103793334A (en) * | 2014-01-14 | 2014-05-14 | 上海上讯信息技术股份有限公司 | Mobile storage device based data protecting method and mobile storage device |
CN104573441A (en) * | 2014-08-12 | 2015-04-29 | 杭州华澜微科技有限公司 | Computer with data privacy function and data encryption and hiding method thereof |
-
2015
- 2015-12-03 CN CN201510888562.9A patent/CN105389526B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009026038A (en) * | 2007-07-19 | 2009-02-05 | Ricoh Co Ltd | Information processor, program, and recording medium |
CN202258356U (en) * | 2011-10-10 | 2012-05-30 | 尚徐伟 | Multifunctional wireless mobile hard disk |
CN102945339A (en) * | 2012-12-06 | 2013-02-27 | 大连奥林匹克电子城腾飞办公设备商行 | Data protection system for computer |
CN103793334A (en) * | 2014-01-14 | 2014-05-14 | 上海上讯信息技术股份有限公司 | Mobile storage device based data protecting method and mobile storage device |
CN104573441A (en) * | 2014-08-12 | 2015-04-29 | 杭州华澜微科技有限公司 | Computer with data privacy function and data encryption and hiding method thereof |
Non-Patent Citations (1)
Title |
---|
"面向内部威胁的数据泄漏防护关键技术研究";马俊;《中国博士学位论文全文数据库信息科技辑》;20120315;第4.3-4.4节、第6.3节,附图4.6-4.7、6.4-6.5 * |
Also Published As
Publication number | Publication date |
---|---|
CN105389526A (en) | 2016-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106169041B (en) | A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication | |
CN101345619B (en) | Electronic data protection method and device based on biological characteristic and mobile cryptographic key | |
CN110291754A (en) | It is accessed using the system of mobile device | |
CN101881997B (en) | Trusted safe mobile storage device | |
CN105099711B (en) | A kind of small cipher machine and data ciphering method based on ZYNQ | |
CN107222303A (en) | Digital publishing rights traceability system building method based on block chain and cloud platform | |
CN105389526B (en) | Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration | |
CN108011716B (en) | Cipher device and implementation method | |
CN107332671A (en) | A kind of safety mobile terminal system and method for secure transactions based on safety chip | |
CN103336746A (en) | Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof | |
CN201590091U (en) | Encryption type memory card read/write device based on password authentication | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
CN206515828U (en) | The data storage device of safety encryption | |
CN105303093A (en) | Token verification method for cryptographic smart token | |
CN103606223A (en) | Card authentication method and device | |
CN106295373A (en) | A kind of data transmission encryption device realized based on M PHY interface | |
CN107911221A (en) | The key management method of solid-state disk data safety storage | |
CN107239681A (en) | One kind encryption mobile hard disk upper computer software structure | |
CN105205416A (en) | Mobile hard disk password module | |
CN201549223U (en) | Trusted secure portable storage device | |
CN201917912U (en) | Monitoring and management system of USB (Universal Serial Bus) storage device | |
CN109784104A (en) | SATA hard disc crypto module and its working method, system and its working method | |
CN101882114A (en) | Mobile storage device with gradual identity authentication and log record | |
CN101127013A (en) | Enciphered mobile storage apparatus and its data access method | |
CN105871866A (en) | System and method for password management based on computer hardware information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Yuan Hui Inventor after: Pu Jinpei Inventor after: Zhang Xiaobo Inventor after: Ma Shuhao Inventor after: Ma Shujie Inventor before: Yuan Hui Inventor before: Pu Jinpei Inventor before: Ma Shuhao Inventor before: Ma Shujie |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |