CN106372541A - U disk security encryption management method - Google Patents

U disk security encryption management method Download PDF

Info

Publication number
CN106372541A
CN106372541A CN201610693594.8A CN201610693594A CN106372541A CN 106372541 A CN106372541 A CN 106372541A CN 201610693594 A CN201610693594 A CN 201610693594A CN 106372541 A CN106372541 A CN 106372541A
Authority
CN
China
Prior art keywords
disk
encryption
file
encryption section
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610693594.8A
Other languages
Chinese (zh)
Inventor
徐超
谭守标
李正平
黄林生
许耀华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Original Assignee
Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhu Zhenhua Rongke Intelligent Technology Co Ltd filed Critical Wuhu Zhenhua Rongke Intelligent Technology Co Ltd
Priority to CN201610693594.8A priority Critical patent/CN106372541A/en
Publication of CN106372541A publication Critical patent/CN106372541A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a U disk security encryption management method. The method comprises the following steps of 1) establishing a connection; 2) performing login; 3) performing general region operation; 4) performing encrypted region operation; 5) performing transmission file security management; 6) performing storage file security management; and 7) performing hardware environment security management. According to the U disk security encryption management method, a general region is arranged in a U disk, so that the U disk is used as a general U disk; an encrypted region is arranged in the U disk, so that the U disk is used as an encrypted U disk; the encrypted region is hidden when not in use; when the encrypted region needs to be used, the login is performed as an administrator through a login display program set in the encrypted region, so that files of the encrypted region can be displayed; each encrypted file is provided with an encryption end and an independent encryption program, so that the encrypted files are very secure and difficult to decrypt; and the usage efficiency of the U disk is fully improved.

Description

The safe encryption management method of u disk
Technical field
The present invention relates to field of information security technology, particularly to a kind of safe encryption management method of u disk.
Background technology
Popular with computer utility, u disk has extensive use in concerning security matters system, and this makes u disk become not The important object that method molecule is stolen secret information.Particularly mobile storage product, since it is desired that often in multiple computers exchange data Information, or use through excessive people, the protection of therefore information security is particularly important.Most encryption u disks, simply highlights u The individual key authentication of disk, can only concerning security matters using it is impossible to general;Meanwhile, the encryption u disk on market, after entering encrypted area, such as Fruit user is away from keyboard, can only pull up encryption u disk, when reusing, encryption u disk can only be reinserted machine, make With inconvenient, also dangerous.
Content of the invention
It is an object of the invention to provide a kind of safe encryption management method of u disk, the u disk enterprising style of writing part using in many people adds Close so that u disk can work as common u disk uses, central be also equipped with hiding encryption section, encryption file can be stored, and Encryption file is difficult to be found and deciphers.
For achieving the above object, the invention provides a kind of safe encryption management method of u disk, comprise the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports When, the input-output file detection module in control chip can detect to the file of each input and output;
6) storage file safety management: can be by the self-inspection in control chip for the file having been stored in memory module Module carries out self-inspection;
7) hardware environment safety management: the hardware environment for whole u disk can be by the environment monitoring module in control chip It is monitored, to guarantee the normal operation of u disk.
U disk is made as common u disk by the safe encryption management method of u disk of the present invention by setting normal areas in u disk With, by setting encryption section in u disk, u disk is used as encryption u disk, and encryption section is hiding when not in use, When needing to use, program is shown by the login that encryption section is arranged, logged in using manager's identity, encryption can be shown The file in region, and often a encryption file has encryption end and independent encipheror, thus very safety it is not easy to Decrypted, and substantially increase the service efficiency of u disk.
Wherein, described u disk includes u disc main body, described u disc main body side is provided with main interface, in described u disc main body Portion is provided with control chip and memory module, and described memory module, by control chip control, is arranged inside described memory module There are normal areas and encryption section, encryption section is stealth mode, encryption section is provided with login display program, by management Member's identity logs could show encryption section, is provided with encryption end on often a encryption file of encryption section, and The independent encipheror of encryption end setting, is additionally provided with wireless link block, described wireless connection mode inside described u disc main body Block is used for for u disk being wirelessly connected to main frame, and described wireless link block is provided with login module and wireless attachment security scanning mould Block, is provided with switching switch in the side of u disc main body, and the interface of switching u disk connects and radio connection.
U disk is internally provided with normal areas and encryption section in memory module, and encryption section is stealth mode, in u Disk needs special manager's identity logs could show after being connected with main frame, thus the encryption file of encryption section is pacified very much Entirely, and the encryption file of encryption section is specially provided with encryption end and independent encipheror, more insurance it is not easy to quilt Crack.When needing in operation to leave, as long as exit manager and logging in and encryption file can be reverted back hidden state, its Other people can't see the presence of encryption file, more cannot open encryption file.
It is additionally provided with wireless link block inside u disc main body, u disc main body both can be connected with main frame by main interface, Can also be connected with main frame by wireless connection, and two kinds of connected modes can be with free switching, can when being connected using main interface Setting login password, is provided with login module during wireless connection, and is also provided with wireless attachment security scan module scanning no The safety on gauze road.
The safe encryption management method of u disk of the present invention, it is necessary first to common login could enter u disk, shows normal areas, Can't see hiding encryption section, encryption section is provided with login display program, needs the login of manager's identity just can see, And often a encryption file of encryption section has independent encryption system, thus u disk can many people use, and does not also interfere with Its secret and safety, are very effective cipher modes for the public u disk such as company, and can fully using u disk, Avoid the waste of office appliance.
The safe encryption management method of u disk of the present invention, easy to use, safety is encrypted, and u disk can use as common u disk, File is stored in normal areas, does not interfere with the content of the encryption section in memory module, and does not have stepping on of manager's identity The presence of encryption section is even can't see in record, can make full use of u disk, and the file of encryption section is logging in and can see below, also Every a encryption file is arranged with encryption end and independent encipheror, the different encryption files of different people's storages can be certainly Row independent encryption, being equivalent to encryption file has two-layer encryption insurance, very safe, and a kind of safety of the present invention encrypts u disk, The file of u disk itself and input and output u disk is all monitored at any time and is monitored, thus had a safety feature.
Brief description
Fig. 1 is the structural representation of u disk of the present invention;
Wherein, 1-u disc main body, 2- main interface, 3- control chip, 4- memory module, 5- normal areas, 6- encryption section, 7- adds Close end, link block that 8- is wireless, 9- login module, 10- is wireless attachment security scan module, 11- input-output file detects mould Block, 12- selftest module, 13- environment monitoring module, 14- switching switch.
Specific embodiment
Describe the preferred technical solution of the present invention below in conjunction with the accompanying drawings in detail.
The safe encryption management method of u disk of the present invention, comprises the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports When, the input-output file detection module 11 in control chip 3 can detect to the file of each input and output;
6) storage file safety management: oneself in control chip 3 can be passed through for the file having been stored in memory module 4 Inspection module 12 carries out self-inspection;
7) hardware environment safety management: the hardware environment for whole u disk can be by the environment monitoring module in control chip 3 13 are monitored, to guarantee the normal operation of u disk.
U disk is made as common u disk by the safe encryption management method of u disk of the present invention by setting normal areas in u disk With, by setting encryption section in u disk, u disk is used as encryption u disk, and encryption section is hiding when not in use, When needing to use, program is shown by the login that encryption section is arranged, logged in using manager's identity, encryption can be shown The file in region, and often a encryption file has encryption end and independent encipheror, thus very safety it is not easy to Decrypted, and substantially increase the service efficiency of u disk.
Wherein, described u disk includes u disc main body 1, and described u disc main body 1 side is provided with main interface 2, in described u disk master Body 1 is internally provided with control chip 3 and memory module 4, and described memory module 4 is controlled by control chip 3, in described memory module 4 are internally provided with normal areas 5 and encryption section 6, and encryption section 6 is stealth mode, and encryption section 6 is provided with login display Program, could show encryption section 6 by manager's identity logs, be respectively provided with often a encryption file of encryption section 6 There is encryption end 7, and independent encipheror is set at encryption end 7, be additionally provided with wireless connection inside described u disc main body 1 Module 8, described wireless link block 8 is used for for u disk being wirelessly connected to main frame, and described wireless link block 8 is provided with login mould Block 9 and wireless attachment security scan module 10, are provided with switching switch 14 in the side of u disc main body 1, the interface of switching u disk is even Connect and radio connection.
U disk is internally provided with normal areas and encryption section in memory module, and encryption section is stealth mode, in u Disk needs special manager's identity logs could show after being connected with main frame, thus the encryption file of encryption section is pacified very much Entirely, and the encryption file of encryption section is specially provided with encryption end and independent encipheror, more insurance it is not easy to quilt Crack.When needing in operation to leave, as long as exit manager and logging in and encryption file can be reverted back hidden state, its Other people can't see the presence of encryption file, more cannot open encryption file.
It is additionally provided with wireless link block inside u disc main body, u disc main body both can be connected with main frame by main interface, Can also be connected with main frame by wireless connection, and two kinds of connected modes can be with free switching, can when being connected using main interface Setting login password, is provided with login module during wireless connection, and is also provided with wireless attachment security scan module scanning no The safety on gauze road.
The safe encryption management method of u disk of the present invention, it is necessary first to common login could enter u disk, shows normal areas, Can't see hiding encryption section, encryption section is provided with login display program, needs the login of manager's identity just can see, And often a encryption file of encryption section has independent encryption system, thus u disk can many people use, and does not also interfere with Its secret and safety, are very effective cipher modes for the public u disk such as company, and can fully using u disk, Avoid the waste of office appliance.
The safe encryption management method of u disk of the present invention, easy to use, safety is encrypted, and u disk can use as common u disk, File is stored in normal areas, does not interfere with the content of the encryption section in memory module, and does not have stepping on of manager's identity The presence of encryption section is even can't see in record, can make full use of u disk, and the file of encryption section is logging in and can see below, also Every a encryption file is arranged with encryption end and independent encipheror, the different encryption files of different people's storages can be certainly Row independent encryption, being equivalent to encryption file has two-layer encryption insurance, very safe, and a kind of safety of the present invention encrypts u disk, The file of u disk itself and input and output u disk is all monitored at any time and is monitored, thus had a safety feature.

Claims (4)

1. a kind of safe encryption management method of u disk is it is characterised in that comprise the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports When, the input-output file detection module in control chip can detect to the file of each input and output.
2. the safe encryption management method of u disk as claimed in claim 1 it is characterised in that: for having been stored in memory module In the safety management of file self-inspection can be carried out by the selftest module in control chip.
3. u disk as claimed in claim 1 safe encryption management method it is characterised in that: for the hardware environment of whole u disk Safety management can be monitored by the environment monitoring module in control chip, to guarantee the normal operation of u disk.
4. the safe encryption management method of u disk as described in claim 1 or 2 or 3 it is characterised in that: described u disk includes u disk master Body, is provided with main interface in described u disc main body side, is internally provided with control chip and memory module, institute in described u disc main body State memory module by control chip control, be internally provided with normal areas and encryption section, encryption section in described memory module For stealth mode, encryption section is provided with login display program, encryption section could be shown by manager's identity logs, It is provided with encryption end on often a encryption file of encryption section, and in the independent encipheror of encryption end setting, in institute State and inside u disc main body, be additionally provided with wireless link block, described wireless link block is used for for u disk being wirelessly connected to main frame, institute State wireless link block and be provided with login module and wireless attachment security scan module, the side of u disc main body is provided with switching Switch, the interface of switching u disk connects and radio connection.
CN201610693594.8A 2016-08-22 2016-08-22 U disk security encryption management method Pending CN106372541A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610693594.8A CN106372541A (en) 2016-08-22 2016-08-22 U disk security encryption management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610693594.8A CN106372541A (en) 2016-08-22 2016-08-22 U disk security encryption management method

Publications (1)

Publication Number Publication Date
CN106372541A true CN106372541A (en) 2017-02-01

Family

ID=57879287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610693594.8A Pending CN106372541A (en) 2016-08-22 2016-08-22 U disk security encryption management method

Country Status (1)

Country Link
CN (1) CN106372541A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239681A (en) * 2017-06-08 2017-10-10 山东超越数控电子有限公司 One kind encryption mobile hard disk upper computer software structure
CN108595987A (en) * 2018-04-13 2018-09-28 深圳大普微电子科技有限公司 Permission access management method and relevant apparatus
CN109409483A (en) * 2018-10-08 2019-03-01 郑州云海信息技术有限公司 A kind of structure and method for protecting privately owned storage Flash

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200953248Y (en) * 2006-09-20 2007-09-26 北京中乐华建科技有限公司 Fingerprint ciphering virus-killing U disc
CN202443753U (en) * 2012-02-21 2012-09-19 杭州在信科技有限公司 USB flash disk based on Bluetooth device
EP2528004A1 (en) * 2011-05-25 2012-11-28 ConDel International Technologies Inc. Secure removable media and method for managing the same
CN103678959A (en) * 2013-11-12 2014-03-26 杭州晟元芯片技术有限公司 Data protecting method based on portable storage device
CN103793334A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Mobile storage device based data protecting method and mobile storage device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200953248Y (en) * 2006-09-20 2007-09-26 北京中乐华建科技有限公司 Fingerprint ciphering virus-killing U disc
EP2528004A1 (en) * 2011-05-25 2012-11-28 ConDel International Technologies Inc. Secure removable media and method for managing the same
CN202443753U (en) * 2012-02-21 2012-09-19 杭州在信科技有限公司 USB flash disk based on Bluetooth device
CN103678959A (en) * 2013-11-12 2014-03-26 杭州晟元芯片技术有限公司 Data protecting method based on portable storage device
CN103793334A (en) * 2014-01-14 2014-05-14 上海上讯信息技术股份有限公司 Mobile storage device based data protecting method and mobile storage device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239681A (en) * 2017-06-08 2017-10-10 山东超越数控电子有限公司 One kind encryption mobile hard disk upper computer software structure
CN108595987A (en) * 2018-04-13 2018-09-28 深圳大普微电子科技有限公司 Permission access management method and relevant apparatus
CN109409483A (en) * 2018-10-08 2019-03-01 郑州云海信息技术有限公司 A kind of structure and method for protecting privately owned storage Flash

Similar Documents

Publication Publication Date Title
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN106250973A (en) A kind of safety encipherment U disk
CN104123769B (en) The unblanking of a kind of safety intelligent lock, close lock control method
WO2014199197A1 (en) A method, system and product for securely storing data files at a remote location by splitting and reassembling said files
CN104392405A (en) Electronic medical record safety system
CN106372541A (en) U disk security encryption management method
CN103413100A (en) File security protection system
CN104282060B (en) A kind of method for unlocking of safety intelligent lock system
CN104581008A (en) Information security protection system and method for video monitoring system
WO2024011812A1 (en) Blockchain-based supervision system and method, device, and medium
CN201199439Y (en) Mobile storage apparatus
CN102694655A (en) Hardware anti-counterfeiting method for LKJ monitoring device
CN101777097A (en) Monitorable mobile storage device
CN114340051B (en) Portable gateway based on high-speed transmission interface
CN109756486A (en) A kind of safety system of Computer information network
CN106027229B (en) A kind of encryption and decryption method and system based on intelligent terminal compass
CN106210240B (en) A kind of encryption and decryption method and system based on intelligent terminal gyroscope
CN101727557B (en) Secrecy isolation hard disk and secrecy method thereof
CN110278127B (en) Agent deployment method and system based on secure transmission protocol
CN102385891A (en) Bright and dense double-channel anti-leakage security burner
CN202502494U (en) Encryption device of data memory
CN101640595B (en) Method, device and system for controlling switching of isolation card
CN110727931A (en) Data storage device and method
CN111343421A (en) Video sharing method and system based on white-box encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170201