CN108073833A - Solid state disk secrecy system and method based on PCIE interfaces - Google Patents
Solid state disk secrecy system and method based on PCIE interfaces Download PDFInfo
- Publication number
- CN108073833A CN108073833A CN201610988062.7A CN201610988062A CN108073833A CN 108073833 A CN108073833 A CN 108073833A CN 201610988062 A CN201610988062 A CN 201610988062A CN 108073833 A CN108073833 A CN 108073833A
- Authority
- CN
- China
- Prior art keywords
- user
- module
- signal
- solid state
- sata
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 239000007787 solid Substances 0.000 title claims abstract description 29
- 238000000034 method Methods 0.000 title claims abstract description 11
- 238000003491 array Methods 0.000 claims abstract description 31
- 238000012545 processing Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 18
- 230000004913 activation Effects 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 9
- 238000012790 confirmation Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 208000027534 Emotional disease Diseases 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of solid state disk secrecy system and method based on PCIE interfaces, after the solid state disk for being stored with significant data is lost, GSM network can be passed through, the data stored in solid state disk are locked, wiped, wipe lock operation, the security that user is stored in confidential data on solid state disk is effectively ensured.It prevents the significant data on solid state disk from divulging a secret, causes damages to user.The present invention provides solid state disk secrecy system and method based on PCIE interfaces, and the system is by antenna, gsm module, MCU module, PCIE/SATA protocol converters, PCIE interfaces, power module, SATA controller, Flash arrays.
Description
Technical field
The present invention relates to solid state disk data security arts, more particularly to a kind of solid state disk secrecy based on PCIE interfaces
System and method.
Background technology
Solid state disk(SSD, Solid State Disk), it is by control unit and solid state storage elements(FLASH chip)
The hard disk of composition.SSD has readwrite performance height, the advantages such as shock resistance is strong, and power supply expense is small.It is upper due to solid-state hard disk SSD
Characteristic is stated, is widely used in the fields such as military, vehicle-mounted, industry control, video monitoring, network monitoring, electric power, medical treatment, aviation.At these
Special dimension, data safety are an important measurement indexs.
At present, the data effectively taken precautions against in solid state disk leak, while computer hardware anti-theft measure is strengthened, mainly
By preventing sensitive data from leaking the encrypted mode of data.But any Encryption Algorithm has its relativity, in energy
In enough complete acquirement hard disks on the basis of all data, as cracking trajectory and technology develop, there are sensitive data leakages always
Hidden danger.
To improve the security of solid state disk store data inside, in the prior art, Chinese Patent Application No.
200910221798.1 disclose a kind of hard disc remote erasing burglary-resisting system and method.The system has customer platform and control to hold
Row platform forms, and the client terminal platform is made of the customization USB flash disk of system support with user mobile phone;Control perform platform by
Gsm module is formed with FPGA module.By the client terminal of SMS and computer platform hard disk is set to prevent function of giving away secrets
Opening and closing and various parameters;The client terminal of computer platform is stored in the customization USB flash disk mating with hard disk;Each seed ginseng
Number is saved in the memory of FPGA module.System facilitates user's initialization system using the remote anti-theft design based on GSM network
It is wiped with implementation, flexibility is higher.The invention implement, it is necessary to have matched customization USB flash disk that could realize, make its use by
To certain limitation.
The above-mentioned prior art relates only to the data erasing of single-deck, is lost solid state disk occurs, only wipe data
A kind of this mode guarantees data security.Even when solid state disk is lost and found again, user can not also give the data of erasing for change.This
Invention is by for the selection of user, and to select erasing solid state disk data or open hard disk spare part, fascination is stolen
Person or above two mode perform simultaneously, it is ensured that the safety of data.
The content of the invention
The present invention provides a kind of solid state disk secrecy system and method based on PCIE interfaces, when being stored with significant data
After solid state disk is lost, the data stored in solid state disk can be locked, wiped, wipe locking behaviour by GSM network
Make, the security that user is stored in confidential data on solid state disk is effectively ensured.Prevent the significant data on solid state disk from divulging a secret,
It causes damages to user.
The present invention provides solid state disk secrecy system and method based on PCIE interfaces, and the system is by antenna 101, GSM moulds
Block 102, MCU module 103, PCIE/SATA protocol converters 104, PCIE interfaces 105, power module A106, SATA controller
A107, Flash array A108, power module B109, SATA controller B110 and Flash array B111.
The function of 101 module of antenna is to receive user mobile phone to be sent to short message signal and hair by wireless base station
It penetrates gsm module 102 and is sent to short message signal.
Gsm module 102 is responsible for sending and receiving short message.It is well known that CDMA2000 modules, TD-CDMA modules,
WCDMA modules are equally applicable to the present invention, and can equally complete information sends and receivees function;
MCU module 103 is the nucleus module of the present invention, is responsible for the various operational orders of processing user, and is sent out according to user instruction
Erasing signal and locking signal are sent, to realize the lock function of the present invention, erasing function, first erasing relocks function.
Specifically, when user sends lock instruction, MCU module 103 reads the lock of user's transmission from gsm module 102
Fixed instruction, locking signal A is set to enabled state by MCU module 103, while locking signal B is set to enabled state, at this point,
Off-position is in by the power module A106 SATA controllers 107 powered and Flash arrays 108, for the user,
The data stored on Flash arrays 108 are sightless, on the contrary, 110 He of SATA controller powered by power module A109
Flash arrays 111 are in power supply state, and for the user, the data being pre-stored on Flash arrays 111 are visible
, this ensure that the security of confidential data;When user sends erasing instruction, MCU module 103 is read from gsm module 102
Locking signal A is maintained former enabled state constant by the erasing instruction sent to user, MCU module 103, and erasing signal A has been set to
Effect, the erasing function of triggering SATA controller A107, SATA controller A107 will perform irrecoverable arrive to Flash arrays 108
Erasing operation ensures the security of data with this, certainly it is this erasing be it is irrecoverable arrive, even if user fetches this again
Disk can not also recover data;When user, which sends erasing, relocks instruction, MCU module 103 reads user from gsm module 102
The erasing of transmission relocks instruction, and locking signal A is maintained former enabled state constant by MCU module 103, and erasing signal A has been set to
Effect, the erasing function of triggering SATA controller A107, SATA controller A107 will perform irrecoverable arrive to Flash arrays 108
Erasing operation, then locking signal A is set to enabled state by MCU module 103, while locking signal B is set to enabled state,
At this point, being in off-position by the power module A106 SATA controllers 107 powered and Flash arrays 108, come for user
It says, the data stored on Flash arrays 108 are sightless, on the contrary, the SATA controller 110 powered by power module A109
Power supply state is in Flash arrays 111, for the user, the data being pre-stored on Flash arrays 111 are can
See, dual operation can preferably ensure the security of user data.Preferably, SATA controller of the invention is
The Barefoot ECO controllers of INDILINX companies.
The security solid-state hard disc that PCIE interfaces 104 are responsible for the present invention is connected with various types of other computer motherboard, to realize
The connection of each signal wire.
PCIE/SATA protocol converters 105 are responsible for the PCIE signal of mainboard being converted into SATA controller A and SATA control
The SATA signals that device B can be identified and can handled, while coordinate the selection of power module, realize the bridge joint of signal.
By means of the above-mentioned technical proposal of the present invention, the data stored in solid state disk are locked, wiped, wiping lock
Fixed operation, is effectively ensured the security that user is stored in confidential data on solid state disk.
Invention attached drawing
Fig. 1 is the system architecture diagram of the present invention;
Fig. 2 is invention activation flow diagram;
Fig. 3 is present invention erasing and then locking flow schematic diagram.
Specific embodiment
It is right below in conjunction with attached drawing the present invention provides a kind of solid state disk secrecy system and method based on PCIE interfaces
Technical scheme is further elaborated.It should be appreciated that specific embodiment described herein is only explaining
The present invention does not limit the present invention.
Fig. 1 is the system architecture diagram of the present invention.It is a kind of solid state disk secrecy system and method based on PCIE interfaces.
In view of the defects existing in the prior art, a kind of technical solution is provided:The system is by antenna 101, gsm module 102, MCU module
103rd, PCIE interfaces 104, PCIE/SATA protocol converters 105, power module A106, SATA controller A107, Flash array
A108, power module B109, SATA controller B110 and Flash array B111.
The function of 101 module of antenna is to receive user mobile phone to be sent to short message signal and hair by wireless base station
It penetrates gsm module 102 and is sent to short message signal.
Gsm module 102 is responsible for sending and receiving short message.It is well known that CDMA2000 modules, TD-CDMA modules,
WCDMA modules are equally applicable to the present invention, and can equally complete information sends and receivees function;
MCU module 103 is the nucleus module of the present invention, is responsible for the various operational orders of processing user, and is sent out according to user instruction
Erasing signal and locking signal are sent, to realize the lock function of the present invention, erasing function, first erasing relocks function.
Specifically, when user sends lock instruction, MCU module 103 reads the lock of user's transmission from gsm module 102
Fixed instruction, locking signal A is set to enabled state by MCU module 103, while locking signal B is set to enabled state, at this point,
Off-position is in by the power module A106 SATA controllers 107 powered and Flash arrays 108, for the user,
The data stored on Flash arrays 108 are sightless, on the contrary, 110 He of SATA controller powered by power module A109
Flash arrays 111 are in power supply state, and for the user, the data being pre-stored on Flash arrays 111 are visible
, this ensure that the security of user data;When user sends erasing instruction, MCU module 103 is read from gsm module 102
Locking signal A is maintained former enabled state constant by the erasing instruction sent to user, MCU module 103, and erasing signal A has been set to
Effect, the erasing function of triggering SATA controller A107, SATA controller A107 will perform irrecoverable arrive to Flash arrays 108
Erasing operation ensures the security of data with this, and after SATA controller completes erasing operation, erasure completion signal A is put
To be effective, MCU detects that erasure completion signal A is effective, represents that SATA controller A107 completes erasing operation, certain this wiping
Except being expendable, even if user fetches the disk again, it can not also recover data;Instruction is relocked when user sends erasing
When, the erasing that MCU module 103 reads user's transmission from gsm module 102 relocks instruction, and MCU module 103 is by locking signal A
Maintain former enabled state constant, erasing signal A is set to effectively, the erasing function of triggering SATA controller A107, SATA controller
A107 will perform Flash arrays 108 irrecoverable to erasing operation, and then locking signal A is set to and makes by MCU module 103
Energy state, while locking signal B is set to enabled state, at this point, 107 He of SATA controller powered by power module A106
Flash arrays 108 are in off-position, and for the user, the data stored on Flash arrays 108 are sightless, phases
Instead, power supply state is in by the power module A109 SATA controllers 110 powered and Flash arrays 111, come for user
It says, the data being pre-stored on Flash arrays 111 are visible, and dual operation can preferably ensure the peace of user data
Quan Xing.Preferably, SATA controller of the invention is the Barefoot ECO controllers of INDILINX companies.
The security solid-state hard disc that PCIE interfaces 104 are responsible for the present invention is connected with various types of other computer motherboard, to realize
The connection of each signal wire.
PCIE/SATA protocol converters 105 are responsible for the PCIE signal of mainboard being converted into SATA controller A and SATA control
The SATA signals that device B can be identified and can handled, while coordinate the selection of power module, realize the bridge joint of signal.
Fig. 2 is present invention registered user or replacement SIM card flow diagram for the first time.Step 201, wait user's registration or
Person replaces the execution of SIM card program and starts, and enters step 202;
Step 202, whether detection currently has that SIM card is in place, if it is not, 203 are entered step, if so, entering step 204;
Step 203, without waiting for user instruction, lock command is directly performed;
Step 204, the IMSI information of reading SIM card.IMSI(International Mobile Subscriber
Identity, international mobile subscriber identity)For the number distributed in the world by one mobile subscriber of unique identification.I.e.:Often
A SIM card has unique IMSI information, enters step 205;
Step 205, the IMSI information pair in the flash that MCU carries the IMSI information for reading bottom SIM card with being stored in MCU
Than entering step 206;
Step 206, MCU reads IMSI information in flash, if this partial information is sky, is judged as plug-in card for the first time, into step
Rapid 211, if IMSI information non-empty in flash, and IMSI information mismatches, then is judged as changing card, enters step 207;
Step 207, MCU is to card verification informations to be changed such as the user mobile phone transmissions being stored in flash, and informs user's hand simultaneously
Machine will change the card number of card, so that user carries out Information Authentication, enter step 208;
Step 208, user sends information to card card number is changed, and is verified, if correctly, entering step 210, if not just
Really, 209 are entered step;
Step 209, whether MCU statistical testing of business cycles number reaches 3 times, if so, 203 are entered step, if it is not, then entering step 207;
Step 210, MCU binds this SIM card by the flash inside the IMSI information update write-in of this SIM card;
Step 211, user is waited to send Information Authentication and binds this SIM card, enters step 212;
Step 212, MCU verifies that user is sent to whether information matches with the information content being stored in inside internal flash, if
It is to enter step 214, if it is not, entering step 213;
Step 213, whether MCU statistical testing of business cycles number reaches 3 times, if so, 203 are entered step, if it is not, then reentering step
211;
Step 214, MCU realizes the binding of this SIM card and system by the internal flash of IMSI information write-in of this SIM card, into
Enter step 215;
Step 215, the user's SIM card card number and user password of information wait binding are sent to user, enters step 216;
Step 216, the SIM card card number of user and specific user password are sent to binding SIM card by user in a manner of short message;
Enter step 217;
Step 217, MCU judges whether user's user password and the password preserved in flash are consistent, if it is, entering step
218, if it is not, then reentering step 215;
Step 218, MCU binds this user's SIM card card number, its SIM card card number is write in internal flash, enters step 219;
Step 219, complete plug-in card for the first time or change card flow.
Fig. 3 is locking flow schematic diagram of the present invention.
Step 301, gsm module receives the lock command that user sends on PCIe card, and MCU reads lock command, enters
Step 302;
Step 302, MCU carries out the user's SIM card card number for sending lock command and the card number that is stored in internal flash pair
Than entering step 303;
Step 303, MCU judges whether user's SIM card card number has the permission for sending lock command, if so, 305 are entered step,
If it is not, then enter step 304;
Step 304, the SIM card of product binding of the present invention sends a warning message to the user's SIM card having permission;
Step 305, lock function is performed.I.e. MCU module 103 reads the lock instruction of user's transmission, MCU from gsm module 102
Locking signal A is set to enabled state by module 103, while locking signal B is set to enabled state, at this point, by power module
The SATA controller 107 and Flash arrays 108 of A106 power supplies are in off-position, for the user, Flash arrays 108
The data of upper storage are sightless, on the contrary, by the power module A109 SATA controllers 110 powered and Flash arrays 111
In power supply state, for the user, the data being pre-stored on Flash arrays 111 are visible, and enter step 306;
Step 306, after MCU completes locking, confirmation message is sent to user's SIM card card number, informs that user has completed locking work(
Energy.
Fig. 1 is invention activation flow diagram.
Step 401, gsm module receives the activation command that user sends on product of the present invention, and MCU reads activation command,
Enter step 402;
Step 402, MCU carries out the user's SIM card card number for sending activation command and the card number that is stored in internal flash pair
Than entering step 403;
Step 403, MCU judges whether user's SIM card card number has the permission for sending activation command, if so, 405 are entered step,
If it is not, then enter step 404;
Step 404, the SIM card of product binding of the present invention sends a warning message to the user's SIM card having permission;
Step 405, lock function is performed.I.e. MCU module 103 reads the activation instruction of user's transmission, MCU from gsm module 102
Locking signal A is set to enabled state by module 103, while locking signal B is set to enabled state, at this point, by power module
The SATA controller 107 and Flash arrays 108 of A106 power supplies are in power supply state, the SATA controls of power module A109 power supplies
Device 110 and Flash arrays 111 are in off-position for the user, and the data stored on Flash arrays 108 are visible
, on the contrary, the data on Flash arrays 111 are sightless, enter step 406;
Step 406, after MCU completes activation command, confirmation message is sent to user's SIM card card number, informs that user has completed to swash
Life makes.
Fig. 2 is present invention erasing flow diagram.
Step 501, gsm module receives user and is sent to erasing order on product of the present invention, and MCU reads erasing order
Afterwards, 502 are entered step;
Step 502, MCU carries out the user's SIM card card number for sending activation command and the card number that is stored in internal flash pair
Than, while user's SIM card is sent to password compared with being stored in the secret in flash, enter step 503;
Step 503, MCU judges whether user's SIM card card number has the permission for sending activation command, if so, 505 are entered step,
If it is not, then enter step 504;
Step 504, the SIM card of product binding of the present invention sends a warning message to the user's SIM card having permission, and enters step 514;
Step 505, judge whether data disks are in the lock state, if so, 506 are entered step, if it is not, then entering step 509;
Step 506, the SIM card with product of the present invention binding sends a warning message to user's SIM card, informs that user data disk is in
Lock-out state can not complete erasing operation, it is necessary to which user's transmission activation command, enters step 507;
Step 507, user is waited to send the order of activation data disks, enters step 508;
Step 508, judge in defined time T1, whether data disks are activated, if so, 509 are entered step, if it is not, then
Enter step 513;
Step 509, the SIM card of product binding of the present invention sends confirmation message to the user's SIM card having permission, and whether confirms user
It determines to wipe data of data discs, enters step 510;
Step 510, whether user's SIM card confirms in stipulated time T2, if it is not, 513 are then entered step, if so, entering step
Rapid 511;
Step 511, erasing order is performed, i.e. MCU module 103 reads the erasing instruction of user's transmission, MCU from gsm module 102
Locking signal A is maintained former enabled state constant by module 103, and erasing signal A is set to effectively, the wiping of triggering SATA controller A107
Except function, SATA controller A107 will perform Flash arrays 108 irrecoverable to erasing operation, ensure data with this
After SATA controller completes erasing operation, erasure completion signal A is set to effectively for security, and MCU detects that erasure completion is believed
Number A is effective, represents that SATA controller A107 completes erasing operation, enters step 512;
Step 512, after MCU detects that SATA controller completion erasing signal is effective, erasing life is sent completely to user's SIM card
Information is made, informs that user has completed erasing order;
Step 513, erasing order is completed.
Fig. 3 is present invention erasing locking flow schematic diagram.
Step 601, gsm module receives the erasing lock command that user sends on product of the present invention, and MCU reads erasing lock
Fixed order, enters step 602;
Step 602, MCU carries out the user's SIM card card number for sending erasing order and the card number that is stored in internal flash pair
Than entering step 603;
Step 603, MCU judges whether user's SIM card card number has the permission for sending erasing lock command, if so, entering step
605, if it is not, then entering step 604;
Step 604, the SIM card of product binding of the present invention sends a warning message to the user's SIM card having permission;
Step 605, erasing order shown in Fig. 2 is performed, enters step 606;
Step 606, lock command shown in Fig. 3 is performed, enters step 607;
Step 607, after MCU completes erasing lock command, confirmation message is sent to user's SIM card card number, informs that user is complete
Into erasing lock command.
Particular embodiments described above has carried out the purpose of the present invention, technical solution and advantageous effect in more detail
Illustrate, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention
Scope, within the spirit and principles of the invention, any modification, equivalent substitution, improvement and etc. done should be included in this hair
Within bright protection domain.
Claims (5)
1. the present invention provides solid state disk secrecy system and method based on PCIE interfaces, the system includes antenna, GSM moulds
Block, MCU module, PCIE/SATA protocol converters, PCIE interfaces, power module, SATA controller, Flash arrays composition.
2. the function of 101 module of antenna described in is to receive user mobile phone to be sent to short message signal and transmitting by wireless base station
Gsm module 102 is sent to short message signal.
3. gsm module described in is responsible for sending and receiving short message.MCU module is nucleus module, is responsible for the various of processing user
Operational order, and erasing signal and locking signal are sent according to user instruction, to realize the lock function of the present invention, erasing work(
It can, first wipe and relock function.
4. the security solid-state hard disc that PCIE interfaces described in are responsible for the present invention is connected with various types of other computer motherboard, to realize
The connection of each signal wire.
5. PCIE/SATA protocol converters described in are responsible for the PCIE signal of mainboard being converted into SATA controller A and SATA control
The SATA signals that device B processed can be identified and can handled, while coordinate the selection of power module, realize the bridge joint of signal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610988062.7A CN108073833A (en) | 2016-11-10 | 2016-11-10 | Solid state disk secrecy system and method based on PCIE interfaces |
PCT/CN2016/108179 WO2018086171A1 (en) | 2016-11-10 | 2016-12-01 | Pcie interface-based solid-state hard disk security system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610988062.7A CN108073833A (en) | 2016-11-10 | 2016-11-10 | Solid state disk secrecy system and method based on PCIE interfaces |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108073833A true CN108073833A (en) | 2018-05-25 |
Family
ID=62109058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610988062.7A Pending CN108073833A (en) | 2016-11-10 | 2016-11-10 | Solid state disk secrecy system and method based on PCIE interfaces |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108073833A (en) |
WO (1) | WO2018086171A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108776765A (en) * | 2018-06-11 | 2018-11-09 | 山东超越数控电子股份有限公司 | A kind of hard disk data protection method and device |
TWI791880B (en) * | 2018-10-12 | 2023-02-11 | 南韓商三星電子股份有限公司 | Computuer system |
CN113111397A (en) * | 2021-05-11 | 2021-07-13 | 上海爱武信息科技有限公司 | Hard disk data logic and physical destruction control system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101706853A (en) * | 2009-11-10 | 2010-05-12 | 徐欣 | Solid state disk (SSD)-based anti-leakage self-destruction system |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
CN202189354U (en) * | 2011-07-29 | 2012-04-11 | 苏州捷泰科信息技术有限公司 | Safe solid hard disc system based on universal serial bus (USB) interface |
CN102902633A (en) * | 2011-07-29 | 2013-01-30 | 苏州捷泰科信息技术有限公司 | Remote encryption system and remote encryption method for solid-state disk |
-
2016
- 2016-11-10 CN CN201610988062.7A patent/CN108073833A/en active Pending
- 2016-12-01 WO PCT/CN2016/108179 patent/WO2018086171A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101706853A (en) * | 2009-11-10 | 2010-05-12 | 徐欣 | Solid state disk (SSD)-based anti-leakage self-destruction system |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
CN202189354U (en) * | 2011-07-29 | 2012-04-11 | 苏州捷泰科信息技术有限公司 | Safe solid hard disc system based on universal serial bus (USB) interface |
CN102902633A (en) * | 2011-07-29 | 2013-01-30 | 苏州捷泰科信息技术有限公司 | Remote encryption system and remote encryption method for solid-state disk |
Also Published As
Publication number | Publication date |
---|---|
WO2018086171A1 (en) | 2018-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11971967B2 (en) | Secure access device with multiple authentication mechanisms | |
US9560693B2 (en) | Methods and apparatus for access data recovery from a malfunctioning device | |
CN205029877U (en) | Nfc near field communication equipment | |
EP3099090B1 (en) | Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media | |
EP3949333A1 (en) | Verifying identity of a vehicle entering a trust zone | |
TW201246822A (en) | Communications device providing near field communication (NFC) secure element disabling features related methods | |
CN102291717B (en) | Data protection method and terminal | |
CN105656945B (en) | A kind of industrial control host secure storage verification method and system | |
CN102131190A (en) | Method for encrypting mobile terminal, hardware encryption device and mobile terminal | |
CN103069384A (en) | Host device and method for securely booting the host device with operating system code loaded from a storage device | |
CN108541324A (en) | A kind of unlocking method of electronic lock device, client and its electronic lock device | |
CN105933886B (en) | ESIM number writing method, security system, ESIM number server and terminal | |
GB2580549A (en) | Data security system with encryption | |
CN108073833A (en) | Solid state disk secrecy system and method based on PCIE interfaces | |
CN104766206A (en) | NFC payment method and device based on mobile terminal | |
CN205230158U (en) | Access control system based on two -dimensional code | |
EP3788538A1 (en) | Self-encrypting module with embedded wireless user authentication | |
CN105282117A (en) | Access control method and device | |
CN102902633B (en) | Remote encryption system and remote encryption method for solid-state disk | |
CN113748698A (en) | Secure communication while accessing a network | |
CN105790949A (en) | Subscriber identity module card unlocking method and subscriber identity module card unlocking device | |
CN108154053A (en) | USB interface-based solid state disk secrecy system and method | |
CN106330950B (en) | Encrypted information access method, system and adapter | |
KR20080099117A (en) | Method for removable element authentication in an embedded system | |
CN108154052A (en) | Use the solid state disk secrecy system and method for 315M agreements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180525 |
|
WD01 | Invention patent application deemed withdrawn after publication |