CN106372541A - U disk security encryption management method - Google Patents
U disk security encryption management method Download PDFInfo
- Publication number
- CN106372541A CN106372541A CN201610693594.8A CN201610693594A CN106372541A CN 106372541 A CN106372541 A CN 106372541A CN 201610693594 A CN201610693594 A CN 201610693594A CN 106372541 A CN106372541 A CN 106372541A
- Authority
- CN
- China
- Prior art keywords
- disk
- encryption
- file
- encryption section
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a U disk security encryption management method. The method comprises the following steps of 1) establishing a connection; 2) performing login; 3) performing general region operation; 4) performing encrypted region operation; 5) performing transmission file security management; 6) performing storage file security management; and 7) performing hardware environment security management. According to the U disk security encryption management method, a general region is arranged in a U disk, so that the U disk is used as a general U disk; an encrypted region is arranged in the U disk, so that the U disk is used as an encrypted U disk; the encrypted region is hidden when not in use; when the encrypted region needs to be used, the login is performed as an administrator through a login display program set in the encrypted region, so that files of the encrypted region can be displayed; each encrypted file is provided with an encryption end and an independent encryption program, so that the encrypted files are very secure and difficult to decrypt; and the usage efficiency of the U disk is fully improved.
Description
Technical field
The present invention relates to field of information security technology, particularly to a kind of safe encryption management method of u disk.
Background technology
Popular with computer utility, u disk has extensive use in concerning security matters system, and this makes u disk become not
The important object that method molecule is stolen secret information.Particularly mobile storage product, since it is desired that often in multiple computers exchange data
Information, or use through excessive people, the protection of therefore information security is particularly important.Most encryption u disks, simply highlights u
The individual key authentication of disk, can only concerning security matters using it is impossible to general;Meanwhile, the encryption u disk on market, after entering encrypted area, such as
Fruit user is away from keyboard, can only pull up encryption u disk, when reusing, encryption u disk can only be reinserted machine, make
With inconvenient, also dangerous.
Content of the invention
It is an object of the invention to provide a kind of safe encryption management method of u disk, the u disk enterprising style of writing part using in many people adds
Close so that u disk can work as common u disk uses, central be also equipped with hiding encryption section, encryption file can be stored, and
Encryption file is difficult to be found and deciphers.
For achieving the above object, the invention provides a kind of safe encryption management method of u disk, comprise the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will
The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no
When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no
The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is
Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible
The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual
People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption
The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports
When, the input-output file detection module in control chip can detect to the file of each input and output;
6) storage file safety management: can be by the self-inspection in control chip for the file having been stored in memory module
Module carries out self-inspection;
7) hardware environment safety management: the hardware environment for whole u disk can be by the environment monitoring module in control chip
It is monitored, to guarantee the normal operation of u disk.
U disk is made as common u disk by the safe encryption management method of u disk of the present invention by setting normal areas in u disk
With, by setting encryption section in u disk, u disk is used as encryption u disk, and encryption section is hiding when not in use,
When needing to use, program is shown by the login that encryption section is arranged, logged in using manager's identity, encryption can be shown
The file in region, and often a encryption file has encryption end and independent encipheror, thus very safety it is not easy to
Decrypted, and substantially increase the service efficiency of u disk.
Wherein, described u disk includes u disc main body, described u disc main body side is provided with main interface, in described u disc main body
Portion is provided with control chip and memory module, and described memory module, by control chip control, is arranged inside described memory module
There are normal areas and encryption section, encryption section is stealth mode, encryption section is provided with login display program, by management
Member's identity logs could show encryption section, is provided with encryption end on often a encryption file of encryption section, and
The independent encipheror of encryption end setting, is additionally provided with wireless link block, described wireless connection mode inside described u disc main body
Block is used for for u disk being wirelessly connected to main frame, and described wireless link block is provided with login module and wireless attachment security scanning mould
Block, is provided with switching switch in the side of u disc main body, and the interface of switching u disk connects and radio connection.
U disk is internally provided with normal areas and encryption section in memory module, and encryption section is stealth mode, in u
Disk needs special manager's identity logs could show after being connected with main frame, thus the encryption file of encryption section is pacified very much
Entirely, and the encryption file of encryption section is specially provided with encryption end and independent encipheror, more insurance it is not easy to quilt
Crack.When needing in operation to leave, as long as exit manager and logging in and encryption file can be reverted back hidden state, its
Other people can't see the presence of encryption file, more cannot open encryption file.
It is additionally provided with wireless link block inside u disc main body, u disc main body both can be connected with main frame by main interface,
Can also be connected with main frame by wireless connection, and two kinds of connected modes can be with free switching, can when being connected using main interface
Setting login password, is provided with login module during wireless connection, and is also provided with wireless attachment security scan module scanning no
The safety on gauze road.
The safe encryption management method of u disk of the present invention, it is necessary first to common login could enter u disk, shows normal areas,
Can't see hiding encryption section, encryption section is provided with login display program, needs the login of manager's identity just can see,
And often a encryption file of encryption section has independent encryption system, thus u disk can many people use, and does not also interfere with
Its secret and safety, are very effective cipher modes for the public u disk such as company, and can fully using u disk,
Avoid the waste of office appliance.
The safe encryption management method of u disk of the present invention, easy to use, safety is encrypted, and u disk can use as common u disk,
File is stored in normal areas, does not interfere with the content of the encryption section in memory module, and does not have stepping on of manager's identity
The presence of encryption section is even can't see in record, can make full use of u disk, and the file of encryption section is logging in and can see below, also
Every a encryption file is arranged with encryption end and independent encipheror, the different encryption files of different people's storages can be certainly
Row independent encryption, being equivalent to encryption file has two-layer encryption insurance, very safe, and a kind of safety of the present invention encrypts u disk,
The file of u disk itself and input and output u disk is all monitored at any time and is monitored, thus had a safety feature.
Brief description
Fig. 1 is the structural representation of u disk of the present invention;
Wherein, 1-u disc main body, 2- main interface, 3- control chip, 4- memory module, 5- normal areas, 6- encryption section, 7- adds
Close end, link block that 8- is wireless, 9- login module, 10- is wireless attachment security scan module, 11- input-output file detects mould
Block, 12- selftest module, 13- environment monitoring module, 14- switching switch.
Specific embodiment
Describe the preferred technical solution of the present invention below in conjunction with the accompanying drawings in detail.
The safe encryption management method of u disk of the present invention, comprises the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will
The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no
When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no
The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is
Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible
The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual
People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption
The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports
When, the input-output file detection module 11 in control chip 3 can detect to the file of each input and output;
6) storage file safety management: oneself in control chip 3 can be passed through for the file having been stored in memory module 4
Inspection module 12 carries out self-inspection;
7) hardware environment safety management: the hardware environment for whole u disk can be by the environment monitoring module in control chip 3
13 are monitored, to guarantee the normal operation of u disk.
U disk is made as common u disk by the safe encryption management method of u disk of the present invention by setting normal areas in u disk
With, by setting encryption section in u disk, u disk is used as encryption u disk, and encryption section is hiding when not in use,
When needing to use, program is shown by the login that encryption section is arranged, logged in using manager's identity, encryption can be shown
The file in region, and often a encryption file has encryption end and independent encipheror, thus very safety it is not easy to
Decrypted, and substantially increase the service efficiency of u disk.
Wherein, described u disk includes u disc main body 1, and described u disc main body 1 side is provided with main interface 2, in described u disk master
Body 1 is internally provided with control chip 3 and memory module 4, and described memory module 4 is controlled by control chip 3, in described memory module
4 are internally provided with normal areas 5 and encryption section 6, and encryption section 6 is stealth mode, and encryption section 6 is provided with login display
Program, could show encryption section 6 by manager's identity logs, be respectively provided with often a encryption file of encryption section 6
There is encryption end 7, and independent encipheror is set at encryption end 7, be additionally provided with wireless connection inside described u disc main body 1
Module 8, described wireless link block 8 is used for for u disk being wirelessly connected to main frame, and described wireless link block 8 is provided with login mould
Block 9 and wireless attachment security scan module 10, are provided with switching switch 14 in the side of u disc main body 1, the interface of switching u disk is even
Connect and radio connection.
U disk is internally provided with normal areas and encryption section in memory module, and encryption section is stealth mode, in u
Disk needs special manager's identity logs could show after being connected with main frame, thus the encryption file of encryption section is pacified very much
Entirely, and the encryption file of encryption section is specially provided with encryption end and independent encipheror, more insurance it is not easy to quilt
Crack.When needing in operation to leave, as long as exit manager and logging in and encryption file can be reverted back hidden state, its
Other people can't see the presence of encryption file, more cannot open encryption file.
It is additionally provided with wireless link block inside u disc main body, u disc main body both can be connected with main frame by main interface,
Can also be connected with main frame by wireless connection, and two kinds of connected modes can be with free switching, can when being connected using main interface
Setting login password, is provided with login module during wireless connection, and is also provided with wireless attachment security scan module scanning no
The safety on gauze road.
The safe encryption management method of u disk of the present invention, it is necessary first to common login could enter u disk, shows normal areas,
Can't see hiding encryption section, encryption section is provided with login display program, needs the login of manager's identity just can see,
And often a encryption file of encryption section has independent encryption system, thus u disk can many people use, and does not also interfere with
Its secret and safety, are very effective cipher modes for the public u disk such as company, and can fully using u disk,
Avoid the waste of office appliance.
The safe encryption management method of u disk of the present invention, easy to use, safety is encrypted, and u disk can use as common u disk,
File is stored in normal areas, does not interfere with the content of the encryption section in memory module, and does not have stepping on of manager's identity
The presence of encryption section is even can't see in record, can make full use of u disk, and the file of encryption section is logging in and can see below, also
Every a encryption file is arranged with encryption end and independent encipheror, the different encryption files of different people's storages can be certainly
Row independent encryption, being equivalent to encryption file has two-layer encryption insurance, very safe, and a kind of safety of the present invention encrypts u disk,
The file of u disk itself and input and output u disk is all monitored at any time and is monitored, thus had a safety feature.
Claims (4)
1. a kind of safe encryption management method of u disk is it is characterised in that comprise the following steps:
1) connect: the switching switch of u disk is switched to interface connection status, u disk is connected to by main frame by main interface, or will
The switching switch of u disk is switched to wireless connection conditions, by wireless link block, u disk is connected to main frame;
2) log in: when u disk is connected to by main frame by main interface, need to carry out the input program of login password, when by no
When u disk is connected to main frame by line connection, need to be logged in by login module, and by wireless attachment security module to no
The signal that line connects carries out security sweep to guarantee the safety of wireless connectivity environment;
3) normal areas operation: after u disk connects, the storage file of interface display normal areas, the storage file of encryption section is
Hiding, now can carry out input and output to the file of normal areas;
4) encryption section operation: program is shown by the login that encryption section is arranged, is logged in using manager's identity, permissible
The file of display encryption section, often a encryption file of encryption section is provided with encryption end and independent encipheror, individual
People can only open the encryption file oneself storing and encrypting, and now can carry out input and output to the file of encryption section, encryption
The file in region needs first will decipher during output, needs to carry out independent encryption after the file input of encryption section;
5) transmit file security control: when the file to the normal areas in u disk or encryption section is inputted or exports
When, the input-output file detection module in control chip can detect to the file of each input and output.
2. the safe encryption management method of u disk as claimed in claim 1 it is characterised in that: for having been stored in memory module
In the safety management of file self-inspection can be carried out by the selftest module in control chip.
3. u disk as claimed in claim 1 safe encryption management method it is characterised in that: for the hardware environment of whole u disk
Safety management can be monitored by the environment monitoring module in control chip, to guarantee the normal operation of u disk.
4. the safe encryption management method of u disk as described in claim 1 or 2 or 3 it is characterised in that: described u disk includes u disk master
Body, is provided with main interface in described u disc main body side, is internally provided with control chip and memory module, institute in described u disc main body
State memory module by control chip control, be internally provided with normal areas and encryption section, encryption section in described memory module
For stealth mode, encryption section is provided with login display program, encryption section could be shown by manager's identity logs,
It is provided with encryption end on often a encryption file of encryption section, and in the independent encipheror of encryption end setting, in institute
State and inside u disc main body, be additionally provided with wireless link block, described wireless link block is used for for u disk being wirelessly connected to main frame, institute
State wireless link block and be provided with login module and wireless attachment security scan module, the side of u disc main body is provided with switching
Switch, the interface of switching u disk connects and radio connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610693594.8A CN106372541A (en) | 2016-08-22 | 2016-08-22 | U disk security encryption management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610693594.8A CN106372541A (en) | 2016-08-22 | 2016-08-22 | U disk security encryption management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106372541A true CN106372541A (en) | 2017-02-01 |
Family
ID=57879287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610693594.8A Pending CN106372541A (en) | 2016-08-22 | 2016-08-22 | U disk security encryption management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372541A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239681A (en) * | 2017-06-08 | 2017-10-10 | 山东超越数控电子有限公司 | One kind encryption mobile hard disk upper computer software structure |
CN108595987A (en) * | 2018-04-13 | 2018-09-28 | 深圳大普微电子科技有限公司 | Permission access management method and relevant apparatus |
CN109409483A (en) * | 2018-10-08 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of structure and method for protecting privately owned storage Flash |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200953248Y (en) * | 2006-09-20 | 2007-09-26 | 北京中乐华建科技有限公司 | Fingerprint ciphering virus-killing U disc |
CN202443753U (en) * | 2012-02-21 | 2012-09-19 | 杭州在信科技有限公司 | USB flash disk based on Bluetooth device |
EP2528004A1 (en) * | 2011-05-25 | 2012-11-28 | ConDel International Technologies Inc. | Secure removable media and method for managing the same |
CN103678959A (en) * | 2013-11-12 | 2014-03-26 | 杭州晟元芯片技术有限公司 | Data protecting method based on portable storage device |
CN103793334A (en) * | 2014-01-14 | 2014-05-14 | 上海上讯信息技术股份有限公司 | Mobile storage device based data protecting method and mobile storage device |
-
2016
- 2016-08-22 CN CN201610693594.8A patent/CN106372541A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200953248Y (en) * | 2006-09-20 | 2007-09-26 | 北京中乐华建科技有限公司 | Fingerprint ciphering virus-killing U disc |
EP2528004A1 (en) * | 2011-05-25 | 2012-11-28 | ConDel International Technologies Inc. | Secure removable media and method for managing the same |
CN202443753U (en) * | 2012-02-21 | 2012-09-19 | 杭州在信科技有限公司 | USB flash disk based on Bluetooth device |
CN103678959A (en) * | 2013-11-12 | 2014-03-26 | 杭州晟元芯片技术有限公司 | Data protecting method based on portable storage device |
CN103793334A (en) * | 2014-01-14 | 2014-05-14 | 上海上讯信息技术股份有限公司 | Mobile storage device based data protecting method and mobile storage device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239681A (en) * | 2017-06-08 | 2017-10-10 | 山东超越数控电子有限公司 | One kind encryption mobile hard disk upper computer software structure |
CN108595987A (en) * | 2018-04-13 | 2018-09-28 | 深圳大普微电子科技有限公司 | Permission access management method and relevant apparatus |
CN109409483A (en) * | 2018-10-08 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of structure and method for protecting privately owned storage Flash |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101430752B (en) | Sensitive data switching control module and method for computer and movable memory device | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN106250973A (en) | A kind of safety encipherment U disk | |
CN104123769B (en) | The unblanking of a kind of safety intelligent lock, close lock control method | |
WO2014199197A1 (en) | A method, system and product for securely storing data files at a remote location by splitting and reassembling said files | |
CN104392405A (en) | Electronic medical record safety system | |
CN106372541A (en) | U disk security encryption management method | |
CN103413100A (en) | File security protection system | |
CN104282060B (en) | A kind of method for unlocking of safety intelligent lock system | |
CN104581008A (en) | Information security protection system and method for video monitoring system | |
WO2024011812A1 (en) | Blockchain-based supervision system and method, device, and medium | |
CN201199439Y (en) | Mobile storage apparatus | |
CN102694655A (en) | Hardware anti-counterfeiting method for LKJ monitoring device | |
CN101777097A (en) | Monitorable mobile storage device | |
CN114340051B (en) | Portable gateway based on high-speed transmission interface | |
CN109756486A (en) | A kind of safety system of Computer information network | |
CN106027229B (en) | A kind of encryption and decryption method and system based on intelligent terminal compass | |
CN106210240B (en) | A kind of encryption and decryption method and system based on intelligent terminal gyroscope | |
CN101727557B (en) | Secrecy isolation hard disk and secrecy method thereof | |
CN110278127B (en) | Agent deployment method and system based on secure transmission protocol | |
CN102385891A (en) | Bright and dense double-channel anti-leakage security burner | |
CN202502494U (en) | Encryption device of data memory | |
CN101640595B (en) | Method, device and system for controlling switching of isolation card | |
CN110727931A (en) | Data storage device and method | |
CN111343421A (en) | Video sharing method and system based on white-box encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170201 |