CN108052843A - A kind of safe mobile memory apparatus and its implementation - Google Patents

A kind of safe mobile memory apparatus and its implementation Download PDF

Info

Publication number
CN108052843A
CN108052843A CN201711391068.7A CN201711391068A CN108052843A CN 108052843 A CN108052843 A CN 108052843A CN 201711391068 A CN201711391068 A CN 201711391068A CN 108052843 A CN108052843 A CN 108052843A
Authority
CN
China
Prior art keywords
disk
data
ukey
key
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711391068.7A
Other languages
Chinese (zh)
Other versions
CN108052843B (en
Inventor
王芷玲
郑应强
阎威
霍文阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing Hill Times Technology Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hill Times Technology Co filed Critical Beijing Hill Times Technology Co
Priority to CN201711391068.7A priority Critical patent/CN108052843B/en
Publication of CN108052843A publication Critical patent/CN108052843A/en
Application granted granted Critical
Publication of CN108052843B publication Critical patent/CN108052843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention discloses a kind of designing scheme of sensitive data safety storage apparatus, the storage device includes close disk and UKEY, and close disk includes disk 1 and disk 2, and which disk 2 is pluggable.Sensitive information is split into two parts and is stored encrypted in respectively in disk 1, disk 2, and the storage device only has three parts to exist simultaneously and completes just work normally after being mutually authenticated of UKEY and close disk.UKEY and hard disk share symmetric key in advance, are known as key 1, deposit in the secure storage areas of 512 bytes of UKEY and disk 1 respectively.An encryption key for 2 data of encryption disc 1 and disk is also stored in UKEY secure storage areas, is known as key 2.Beneficial effects of the present invention:It by the way that storage device is designed to separable structure, when storing data, is stored respectively again after data are split, while UKEY and hard disk bidirectional authentication mechanism is set, it is ensured that the safety and stablization of data storage.

Description

A kind of safe mobile memory apparatus and its implementation
Technical field
The present invention relates to data storage and information security field, it particularly relates to a kind of safe mobile memory apparatus and Its implementation.
Background technology
Movable storage device, such as USB flash disk, mobile hard disk, because its is portable the characteristics of due to, are widely used.Therefore mobile storage The security of data storage inside equipment increasingly attracts attention, and current movable storage device does not have perfect data peace Full memory module, however it remains the risk of data storage.
The problem of in correlation technique, currently no effective solution has been proposed.
The content of the invention
For the above-mentioned technical problem in correlation technique, the present invention proposes a kind of data access method of cluster, energy Enough in colonization process is used, external data is convenient to use.
To realize above-mentioned technical purpose, the technical proposal of the invention is realized in this way:
On the one hand, the present invention provides a kind of safe mobile memory apparatus, including hard disk and UKEY, the hard disk includes 1 He of disk Disk 2, one of them in the disk 1 and disk 2 is pluggable;The hard disk and the UKEY share symmetric key 1 in advance, simultaneously UKEY secure storage areas also stores an encryption key 2 for 2 data of stiffened disk 1 and disk.
Further, the disk 2 is pluggable that the key 1 is stored in the safety of 512 bytes in UKEY and disk 1 respectively Memory block.
On the other hand, the present invention also provides a kind of implementation method of safe mobile memory apparatus, comprise the following steps:
For S1 after hard disk is powered, whether 512 bytes that hard disk first checks for the secure storage areas of 512 bytes are legal, if not conforming to Method then first asks 512 legal byte keys to UKEY;If legal, S2 is carried out;
S2 disks 1 generate a random number using True Random Number Generator, after random number is encrypted using key 1, then In addition head 2 sends UKEY to;
After S3 UKEY receive data, data are decrypted using key 1, the legitimacy of data packet are checked, if legal The data that disk 1 transmits then extract the value of random number, hereafter by the key 2 in memory and the random number of extraction again by key 1 Disk 1 is sent to after being encrypted;Illegally, then authentication failed;
After S4 disks 1 receive data, its content is decrypted, the random number for checking the legitimacy of data and sending before this, such as Fruit can pass through detection, then it is assumed that UKEY authentications are by then extracting the key 2 in packet;
After S5 certifications are completed and obtain data encryption key, hard disk operates data according to instruction, if write instruction, Then the data to be write are carried out burst encryption deposit disk 1 and disk 2 by hard disk according to data processing rule;It is instructed if reading, then Data are carried out decryption combination again according to digital independent rule and recover reset condition by hard disk;
When S6 hard disks are in running order, hard disk periodically carries out breathing detection with UKEY, checks whether UKEY's is in normal shape State;If there is exception, hard disk is stopped, and returns to original state.
Further, 512 byte storage region of hard disk has following two states in S1:Illegal state, full 0 state or non-zero But invalid state;Legal state has the state of effective 512 byte data.
Further, after UKEY receives the data comprising head 2 in S3, data are decrypted using key 1, and Head 1 is checked whether there is, if so, random number and key 2 are then added into head 1 together, after being encrypted with key 1 plus head 2;If not yet Have, return to original state.
Further, in S4 after hard disk decryption, check whether head 1 and random number are correct, if correctly, extracting key 2, If incorrect, original state is returned.
Further, the implementation procedure of write instruction includes in S5:
S11 hard disks obtain data;
Data are divided into odd even two parts by S12 by byte;
S13 is encrypted two parts with key 2 respectively;
The encrypted two parts of S14 are respectively stored into disk 1 and disk 2;
Above two-part index information is added in S15 indexed files.
Further, the implementation procedure of instruction is read in S5 to be included:
S21 hard disks obtain the filename to be read;
Locating file name .A and filename .B in S22 indexed files;
S23 reads filename .A and filename .B from disk 1 and disk 2 respectively, and is decrypted with key 2;
S24 file A is decrypted after data as new file even byte, file B decryption after data as strange word The even byte and the odd byte are reassembled into file by section;
S25 hard disk output files.
Further, filename 1.A marks are stored in the filename after the even bytes data encryption of disk 1, filename 1.B Mark is stored in the filename after the odd bytes data encryption of disk 1, and filename 2.A identifies the even bytes number for being stored in disk 2 According to encrypted filename, filename 2.B marks are stored in the filename after the odd bytes data encryption of disk 2.
Further, the breathing detection comprises the following steps:
S31 hard disks generate 32 random number Rs, and UKEY is sent to after encrypting ALIVECHK+R;
R is extracted after S32 UKEY decryption, encryption REQCCHECK+R returns to hard disk;
Whether the random number that the inspection of S33 hard disks returns is correct, if correctly, working on;Otherwise, original state is returned.
Beneficial effects of the present invention:By the way that storage device is designed to separable structure, when storing data, by data Stored respectively again after being split, while UKEY and hard disk bidirectional authentication mechanism be set, it is ensured that data storage safety with Stablize.
Description of the drawings
It in order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is that a kind of flow of the date storage method of the safe mobile memory apparatus described according to embodiments of the present invention is shown It is intended to;
Fig. 2 is a kind of flow signal of the method for reading data of the safe mobile memory apparatus described according to embodiments of the present invention Figure;
Fig. 3 is a kind of workflow schematic diagram of the safe mobile memory apparatus described according to embodiments of the present invention;
Fig. 4 is that the hard disk described according to embodiments of the present invention carries out authentication with UKEY and transmits the flow diagram of key;
Fig. 5 is the flow diagram of the breathing detection described according to embodiments of the present invention;
Fig. 6 is the schematic diagram of the complete information format described according to embodiments of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art's all other embodiments obtained belong to what the present invention protected Scope.
As shown in Figures 1 to 6, on the one hand, the present invention provides a kind of safe mobile memory apparatus, including hard disk and UKEY, The hard disk includes disk 1 and disk 2, one of them in the disk 1 and disk 2 is pluggable;The hard disk and the UKEY are advance Shared symmetric key 1, while UKEY secure storage areas also stores an encryption key 2 for 2 data of stiffened disk 1 and disk.
Further, the disk 2 is pluggable that the key 1 is stored in the safety of 512 bytes in UKEY and disk 1 respectively Memory block.
On the other hand, the present invention also provides a kind of implementation method of safe mobile memory apparatus, comprise the following steps:
For S1 after hard disk is powered, whether 512 bytes that hard disk first checks for the secure storage areas of 512 bytes are legal, if not conforming to Method then first asks 512 legal byte keys to UKEY;If legal, S2 is carried out;
S2 disks 1 generate a random number using True Random Number Generator, after random number is encrypted using key 1, then In addition head 2 sends UKEY to;
After S3 UKEY receive data, data are decrypted using key 1, the legitimacy of data packet are checked, if legal The data that disk 1 transmits then extract the value of random number, hereafter by the key 2 in memory and the random number of extraction again by key 1 Disk 1 is sent to after being encrypted;Illegally, then authentication failed;
After S4 disks 1 receive data, its content is decrypted, the random number for checking the legitimacy of data and sending before this, such as Fruit can pass through detection, then it is assumed that UKEY authentications are by then extracting the key 2 in packet;
After S5 certifications are completed and obtain data encryption key, hard disk operates data according to instruction, if write instruction, Then the data to be write are carried out burst encryption deposit disk 1 and disk 2 by hard disk according to data processing rule;It is instructed if reading, then Data are carried out decryption combination again according to digital independent rule and recover reset condition by hard disk;
When S6 hard disks are in running order, hard disk periodically carries out breathing detection with UKEY, checks whether UKEY's is in normal shape State;If there is exception, hard disk is stopped, and returns to original state.
Further, 512 byte storage region of hard disk has following two states in S1:Illegal state, full 0 state or non-zero But invalid state;Legal state has the state of effective 512 byte data.
Further, after UKEY receives the data comprising head 2 in S3, data are decrypted using key 1, and Head 1 is checked whether there is, if so, random number and key 2 are then added into head 1 together, after being encrypted with key 1 plus head 2;If not yet Have, return to original state.
Further, in S4 after hard disk decryption, check whether head 1 and random number are correct, if correctly, extracting key 2, If incorrect, original state is returned.
Further, the implementation procedure of write instruction includes in S5:
S11 hard disks obtain data;
Data are divided into odd even two parts by S12 by byte;
S13 is encrypted two parts with key 2 respectively;
The encrypted two parts of S14 are respectively stored into disk 1 and disk 2;
Above two-part index information is added in S15 indexed files.
Further, the implementation procedure of instruction is read in S5 to be included:
S21 hard disks obtain the filename to be read;
Locating file name .A and filename .B in S22 indexed files;
S23 reads filename .A and filename .B from disk 1 and disk 2 respectively, and is decrypted with key 2;
S24 file A is decrypted after data as new file even byte, file B decryption after data as strange word The even byte and the odd byte are reassembled into file by section;
S25 hard disk output files.
Further, filename 1.A marks are stored in the filename after the even bytes data encryption of disk 1, filename 1.B Mark is stored in the filename after the odd bytes data encryption of disk 1, and filename 2.A identifies the even bytes number for being stored in disk 2 According to encrypted filename, filename 2.B marks are stored in the filename after the odd bytes data encryption of disk 2.
Further, the breathing detection comprises the following steps:
S31 hard disks generate 32 random number Rs, and UKEY is sent to after encrypting ALIVECHK+R;
R is extracted after S32 UKEY decryption, encryption REQCCHECK+R returns to hard disk;
Whether the random number that the inspection of S33 hard disks returns is correct, if correctly, working on;Otherwise, original state is returned.
Further, enciphering and deciphering algorithm mentioned in the present invention includes various known enciphering and deciphering algorithms.
In order to facilitate understand the present invention above-mentioned technical proposal, below by way of in specifically used mode to the present invention it is above-mentioned Technical solution is described in detail.
The present invention provides a kind of designing scheme of sensitive data safety storage apparatus, the storage device include hard disk and UKEY, hard disk include disk 1 and disk 2, and which disk 2 is pluggable.Sensitive information is split into two parts and is stored encrypted in respectively In disk 1, disk 2, the storage device of the conceptual design only has three parts to exist simultaneously and completes mutually recognizing each other for UKEY and hard disk It can just be worked normally after card.UKEY and hard disk share symmetric key in advance, are known as key 1, deposit in UKEY and disk 1 respectively 512 bytes secure storage areas.It is close that an encryption for being used for 2 data of stiffened disk 1 and disk is also stored in UKEY secure storage areas Key is known as key 2.
As shown in Figures 1 to 6, when specifically used, a kind of safe mobile memory apparatus according to the present invention, workflow Journey is as follows:
For S1 after hard disk is powered, whether 512 bytes that hard disk first checks for the secure storage areas of 512 bytes are legal, if not conforming to Method then first asks 512 legal byte keys to UKEY;If legal, S2 is carried out.Wherein, 512 byte storage region two of hard disk The definition of kind of state is:Illegal state, full 0 state or non-zero but invalid state;Legal state has effective 512 byte The state of data.
S2 disks 1 generate a random number using True Random Number Generator, and random number is encrypted using key 1 Afterwards, along with head 2 sends UKEY to;
After S3 UKEY receive data, data are decrypted using key 1, check the legitimacy of data packet, if there is head 1, The data then transmitted for legal disk 1 extract the value of random number at this time, hereafter by the key 2 in memory and the random number of extraction Together plus behind head 1, after being encrypted again by key 1 plus head is sent to disk 1;If without head 1, to be illegal, return Return original state.
After S4 disks 1 receive data, its content is decrypted, check the legitimacy of data and is sent before this random Whether number is correct, if can pass through detection, then it is assumed that UKEY authentications are by then extracting the key 2 in packet Come;Otherwise, original state is returned.
After S5 certifications are completed and obtain data encryption key, hard disk operates data according to instruction.
If write instruction, then the data to be write are carried out burst encryption deposit disk 1 by hard disk according to data processing rule With disk 2, specifically include:S11 hard disks obtain data;Data are divided into odd even two parts by S12 by byte;S13 is right with key 2 Two parts are encrypted respectively;The encrypted two parts of S14 are respectively stored into disk 1 and disk 2;Add in S15 indexed files It is subject to two-part index information.
It is instructed if reading, then data are carried out decryption combination again according to digital independent rule and recover original shape by hard disk State specifically includes:S21 hard disks obtain the filename to be read;Locating file name .A and filename in S22 indexed files .B;S23 reads filename .A and filename .B from disk 1 and disk 2 respectively, and is decrypted with key 2;S24 by file A into Data after row decryption are as the even byte of new file, and the data after file B decryption are as odd byte, by the even byte and institute It states odd byte and is reassembled into file;S25 hard disk output files.
When S6 hard disks are in running order, hard disk periodically carries out breathing detection with UKEY, checks whether being in just for UKEY Normal state;If there is exception, hard disk is stopped, and returns to original state.The breathing detection includes:Hard disk generates 32 at random Number R, UKEY is sent to after encrypting ALIVECHK+R;R is extracted after UKEY decryption, encryption REQCCHECK+R returns to hard disk;Firmly Whether the random number that disk inspection returns is correct, if correctly, working on;Otherwise, original state is returned.
Further, filename 1.A marks are stored in the filename after the even bytes data encryption of disk 1, filename 1.B Mark is stored in the filename after the odd bytes data encryption of disk 1, and filename 2.A identifies the even bytes number for being stored in disk 2 According to encrypted filename, filename 2.B marks are stored in the filename after the odd bytes data encryption of disk 2.
Wherein, 512 byte storage region of hard disk has following two states:
Illegal state:Full 0 state or non-zero but invalid state
Legal state:State with effective 512 byte data
Such as:The 10-20 byte is device id, and last 4 byte is the CRC check value of entire block, the position of 100+4*n+n For key(N=1,2 ... .16), rest part is random number.If the CRC check value of preceding 508 bytes and last 4 byte phases Together, then it is legal state, is otherwise illegal state.
In conclusion by means of the present invention above-mentioned technical proposal, by the way that storage device is designed to separable structure, It when storing data, is stored respectively again after data are split, while UKEY and hard disk bidirectional authentication mechanism is set, really Protect the safety and stablization of data storage.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modifications, equivalent replacements and improvements are made should all be included in the protection scope of the present invention god.

Claims (10)

1. a kind of safe mobile memory apparatus, which is characterized in that including hard disk and UKEY, the hard disk includes disk 1 and disk 2, institute One of them stated in disk 1 and disk 2 is pluggable;The hard disk and the UKEY share symmetric key 1 in advance, while UKEY pacifies Full memory block also stores an encryption key 2 for 2 data of stiffened disk 1 and disk.
2. safe mobile memory apparatus according to claim 1, which is characterized in that the disk 2 is pluggable, the key 1 is stored in the secure storage areas of 512 bytes in UKEY and disk 1 respectively.
3. the implementation method of the safe mobile memory apparatus according to claim 1, which is characterized in that comprise the following steps:
For S1 after hard disk is powered, whether 512 bytes that hard disk first checks for the secure storage areas of 512 bytes are legal, if not conforming to Method then first asks 512 legal byte keys to UKEY;If legal, S2 is carried out;
S2 disks 1 generate a random number using True Random Number Generator, after random number is encrypted using key 1, then In addition head 2 sends UKEY to;
After S3 UKEY receive data, data are decrypted using key 1, the legitimacy of data packet are checked, if legal The data that disk 1 transmits then extract the value of random number, hereafter by the key 2 in memory and the random number of extraction again by key 1 Disk 1 is sent to after being encrypted;Illegally, then authentication failed;
After S4 disks 1 receive data, its content is decrypted, the random number for checking the legitimacy of data and sending before this, such as Fruit can pass through detection, then it is assumed that UKEY authentications are by then extracting the key 2 in packet;
After S5 certifications are completed and obtain data encryption key, hard disk operates data according to instruction, if write instruction, Then the data to be write are carried out burst encryption deposit disk 1 and disk 2 by hard disk according to data processing rule;It is instructed if reading, then Data are carried out decryption combination again according to digital independent rule and recover reset condition by hard disk;
When S6 hard disks are in running order, hard disk periodically carries out breathing detection with UKEY, checks whether UKEY's is in normal shape State;If there is exception, hard disk is stopped, and returns to original state.
A kind of 4. implementation method of safe mobile memory apparatus according to claim 3, which is characterized in that hard disk in S1 512 byte storage regions have following two states:Illegal state, full 0 state or non-zero but invalid state;Legal state, State with effective 512 byte data.
A kind of 5. implementation method of safe mobile memory apparatus according to claim 3, which is characterized in that UKEY in S3 After receiving the data comprising head 2, data are decrypted using key 1, and check whether there is head 1, if so, then will be with Machine number and key 2 add head 1 together, after being encrypted with key 1 plus head 2;If no, return to original state.
A kind of 6. implementation method of safe mobile memory apparatus according to claim 3, which is characterized in that hard disk solution in S4 After close, check whether head 1 and random number are correct, if correctly, extracting key 2, if incorrect, return to original state.
7. a kind of implementation method of safe mobile memory apparatus according to claim 3, which is characterized in that write-in refers in S5 The implementation procedure of order includes:
S11 hard disks obtain data;
Data are divided into odd even two parts by S12 by byte;
S13 is encrypted two parts with key 2 respectively;
The encrypted two parts of S14 are respectively stored into disk 1 and disk 2;
Above two-part index information is added in S15 indexed files.
8. the method for reading data of the safe mobile memory apparatus according to claim 3, which is characterized in that read and refer in S5 The implementation procedure of order includes:
S21 hard disks obtain the filename to be read;
Locating file name .A and filename .B in S22 indexed files;
S23 reads filename .A and filename .B from disk 1 and disk 2 respectively, and is decrypted with key 2;
S24 file A is decrypted after data as new file even byte, file B decryption after data as strange word The even byte and the odd byte are reassembled into file by section;
S25 hard disk output files.
A kind of 9. date storage method of safe mobile memory apparatus according to claim 7 or 8, which is characterized in that text Part name 1.A marks are stored in the filename after the even bytes data encryption of disk 1, and filename 1.B identifies the odd number for being stored in disk 1 The encrypted filename of byte data, filename 2.A marks are stored in the filename after the even bytes data encryption of disk 2, text Part name 2.B marks are stored in the filename after the odd bytes data encryption of disk 2.
10. the method for reading data of the safe mobile memory apparatus according to claim 3, which is characterized in that the breathing Detection comprises the following steps:
S31 hard disks generate 32 random number Rs, and UKEY is sent to after encrypting ALIVECHK+R;
R is extracted after S32 UKEY decryption, encryption REQCCHECK+R returns to hard disk;
Whether the random number that the inspection of S33 hard disks returns is correct, if correctly, working on;Otherwise, original state is returned.
CN201711391068.7A 2017-12-21 2017-12-21 Safe mobile storage device and implementation method thereof Active CN108052843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711391068.7A CN108052843B (en) 2017-12-21 2017-12-21 Safe mobile storage device and implementation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711391068.7A CN108052843B (en) 2017-12-21 2017-12-21 Safe mobile storage device and implementation method thereof

Publications (2)

Publication Number Publication Date
CN108052843A true CN108052843A (en) 2018-05-18
CN108052843B CN108052843B (en) 2020-10-09

Family

ID=62130947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711391068.7A Active CN108052843B (en) 2017-12-21 2017-12-21 Safe mobile storage device and implementation method thereof

Country Status (1)

Country Link
CN (1) CN108052843B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241606A (en) * 2020-01-21 2020-06-05 北京连山科技股份有限公司 One drags three mobile storage device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1389792A (en) * 1995-06-30 2003-01-08 索尼公司 Method and device for recording data, data recording medium and method and device for reproducing data
CN1942880A (en) * 2005-02-18 2007-04-04 株式会社东芝 Content reproduction apparatus, and content reproduction method
US20080313473A1 (en) * 2007-06-12 2008-12-18 Les Technologies Deltacrypt Method and surveillance tool for managing security of mass storage devices
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105279453A (en) * 2015-09-25 2016-01-27 南京伍安信息科技有限公司 Separate storage management-supporting file partition hiding system and method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1389792A (en) * 1995-06-30 2003-01-08 索尼公司 Method and device for recording data, data recording medium and method and device for reproducing data
CN1942880A (en) * 2005-02-18 2007-04-04 株式会社东芝 Content reproduction apparatus, and content reproduction method
US20080313473A1 (en) * 2007-06-12 2008-12-18 Les Technologies Deltacrypt Method and surveillance tool for managing security of mass storage devices
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105279453A (en) * 2015-09-25 2016-01-27 南京伍安信息科技有限公司 Separate storage management-supporting file partition hiding system and method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241606A (en) * 2020-01-21 2020-06-05 北京连山科技股份有限公司 One drags three mobile storage device

Also Published As

Publication number Publication date
CN108052843B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
CN103931137B (en) Method and storage device for protecting content
US20180241559A1 (en) Semiconductor device and information processing system for encrypted communication
EP1855281B1 (en) Apparatus for writing data to a medium
CN103246842B (en) For verifying the method and apparatus with data encryption
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN103279693B (en) A kind of file encrypting method
CN103597496B (en) Method and apparatus for certification non-volatile memory devices
CN105229965B (en) Equipment identification system and equipment authenticating method
CN104993923B (en) The radar data guard method that a kind of Information hiding is combined with encryption technology
KR101105205B1 (en) An apparatus and a method of processing data for guaranteeing data integrity and confidentiality in real time, and black box system using thereof
US10630474B2 (en) Method and system for encrypted data synchronization for secure data management
JPWO2011152065A1 (en) Controller, control method, computer program, program recording medium, recording apparatus, and manufacturing method of recording apparatus
CN109067706A (en) Lightweight RFID method for secret protection, wireless communication system under scenes of internet of things
CN105432092A (en) Method to watermark a compressed content encrypted by at least one content key
KR20110067417A (en) Method and apparatus for data encrypting and method and apparatus for data deciphering
JP2019513460A (en) Enabling Device for Playing Card and Handling Shoe
CN108229216A (en) A kind of safe mobile memory apparatus and its data deposit, withdraw method
CN108052843A (en) A kind of safe mobile memory apparatus and its implementation
KR101687492B1 (en) Storing method of data dispersively and credential processing unit
CN110008724A (en) Solid-state hard disk controller method for secure loading, device and storage medium
KR101590351B1 (en) Distributed network protocol based data transmission apparatus and data encryption method thereof
JP2013092812A (en) Portable device, information server device and information management system
US9705853B2 (en) Method to detect an OTA (over the air) standard message affected by an error
WO2007128418A1 (en) Apparatus for writing data to a medium
JP2009015471A (en) Usb storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210423

Address after: 101300 2nd floor, building 3, 19 Dongying Road, zhaoquanying Town, Shunyi District, Beijing

Patentee after: Beijing Lianshan Science and Technology Co.,Ltd.

Address before: No. 1, building No. 1, courtyard No. 2, Yongcheng North Road, Haidian District, Beijing, Beijing 402

Patentee before: BEIJING LIANSHAN TIMES TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right