CN110135173A - A kind of data destruction method of data storage device and data storage device - Google Patents
A kind of data destruction method of data storage device and data storage device Download PDFInfo
- Publication number
- CN110135173A CN110135173A CN201910318317.2A CN201910318317A CN110135173A CN 110135173 A CN110135173 A CN 110135173A CN 201910318317 A CN201910318317 A CN 201910318317A CN 110135173 A CN110135173 A CN 110135173A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- storage device
- processor
- volatile storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses the data destruction methods of a kind of data storage device and data storage device.Including interface module, volatile storage module, trigger module, processor and power module, the trigger signal wherein issued by receiving trigger module, processor controls power supply of the built-in power modules interrupts to volatile storage module, safe the data saved in volatile storage module can be destroyed, and the data destroyed can not be resumed.The comparison data storage device using nonvolatile memory existing at present or the data destruction method using manual mode format data storage equipment, the non-thorough cleaning of data caused by avoiding because of human error, and lead to the problem of illegally being stolen, further enhance the safety that data use, and data can timed destroying, also strengthen destroy data convenience.
Description
Technical field
The present invention relates to data storage security fields, more particularly to a kind of data storage device and data storage device
Data destruction method.
Background technique
In the society of high speed information development, it has been born as the data storage devices such as USB flash disk and mobile hard disk, the storage of these data
Equipment can be connected by special interface as external equipments such as computer and plates, and user can download significant data from external equipment
It stored, backed up or is shifted to data storage device, but the data in these data storage devices are easy to be stolen by other people
It takes and replicates, to cause damages to user.
Preventing the traditional method that data are stolen in data storage device is read by specific resource manager software
Data in data storage device, but this method needs to match specific software in computer end, therefore is not suitable for common
User.And currently used method is will to be destroyed using the data after finishing, most users are by manually side
Formula is formatted data storage device, destroy in data, if but during destruction misoperation, can
There are data without thoroughly formatting completely, stealing there are third party and carrying out the risk that cracks of malice, thus occur it is unnecessary
Loss.Therefore how to ensure that the data in data storage device are effectively destroyed, guarantee the safety of data, be still a needs
It solves the problems, such as.
Summary of the invention
It is an object of the invention at least solve one of the technical problems existing in the prior art, a kind of data storage is provided
The data destruction method of equipment and data storage device, can data after timed destroying use, guarantee that data are not non-
Method is stolen.
In a first aspect, the present invention provides a kind of data storage device, including interface module, volatile storage module, triggering
Module, processor and power module, in which:
The interface module, is used for transmission data, and the interface module is connected to the processor;
The volatile storage module, for storing data, the volatile storage module and the interface module and
The processor connection;
The trigger module is connected to the processor;
The power module is connect with the processor and the volatile storage module.
Further, further include encrypting module, the encrypting module respectively with the interface module, the volatile storage mould
Block and processor connection.
Further, the trigger module includes timer.
Further, the trigger module further includes power knob module.
Further, the volatile storage module includes the first volatile memory and the second volatile memory, institute
The first volatile memory is stated for storing the data sent from external equipment;Second volatile memory is for storing
The control instruction sent from external equipment, includes time data memory in the control instruction.
Second aspect, the present invention provide a kind of data destruction method of data storage device, comprising the following steps:
Processor receives the data sent from external equipment by interface module, and the data are stored to volatibility and are deposited
It stores up in module;
The processor detects that trigger module is triggered, and control power module is interrupted to the volatile storage module
Power supply, the data are destroyed.
Further, it includes: that timer timing time reaches that the trigger module, which is triggered,.
Further, the trigger module is triggered further include: power knob module is activated.
Further, it is described the data are stored into volatile storage module before, further comprise the steps of:
Processor receives the data sent from external equipment by interface module;
The processor detects whether the data encrypt, if unencryption, encrypting module encrypts the data.
The third aspect, the present invention provide a kind of data-storage system, it is characterised in that: including external equipment and above-mentioned number
According to storage equipment, the external equipment and the data storage device transmit data.
The one or more technical solutions provided in the embodiment of the present invention, at least have the following beneficial effects:
The present invention uses the data destruction method of a kind of data storage device and data storage device, including interface mould
Block, volatile storage module, trigger module, processor and power module, wherein the triggering issued by receiving trigger module
Signal, processor control power supply of the built-in power modules interrupts to volatile storage module, can safety by volatile storage
The data saved in module are destroyed, and the data destroyed can not be resumed.Comparison is existing at present to be deposited using non-volatile
The data storage device of reservoir or the data destruction method that equipment is stored using manual mode format data, are avoided because of people
Data non-thorough cleaning caused by make mistakes, and lead to the problem of illegally being stolen, further enhance data using safe,
And data can timed destroying, also strengthen destroy data convenience.
Detailed description of the invention
The invention will be further described with example with reference to the accompanying drawing.
Fig. 1 is a kind of structural schematic diagram of data storage device provided by one embodiment of the invention;
Fig. 2 is a kind of data storage device structural representation with encrypting module provided by one embodiment of the invention
Figure;
Fig. 3 is a kind of data storage device and external equipment connection schematic diagram provided by one embodiment of the invention;
Fig. 4 is a kind of data storage device structural schematic diagram with timer provided by one embodiment of the invention;
Fig. 5 is that a kind of data storage device structure with power knob module provided by one embodiment of the invention is shown
It is intended to;
Fig. 6 is a kind of data storage device structural representation with power interruptions device provided by one embodiment of the invention
Figure;
Fig. 7 is a kind of data storage device data destroying method flow diagram provided by one embodiment of the invention.
Specific embodiment
In the society of high speed information development, it has been born as the data storage devices such as USB flash disk and mobile hard disk, the storage of these data
Equipment can be connected by special interface as external equipments such as computer and plates, and significant data can be downloaded to data storage by user
Equipment stored, is backed up and is perhaps shifted but the data in these data storage devices are easy to be stolen by others or replicate,
To cause damages.
The traditional method for avoiding leaking data in data storage device is to read number by specific resource manager software
According to the data in storage equipment, but this method needs to match specific software in computer end and is not suitable for ordinary user.And
Current method is will to be destroyed using the data after finishing, and most users are to be stored data by manually mode
Data in equipment are formatted, destroy in data, if but during destruction misoperation, will appear
Data steal there are third party without thoroughly formatting completely and carry out malice and crack, lead to that unnecessary loss occurs.Therefore
How to ensure that data in data storage device are destroyed the safety that guarantees data, to be still to need to solve by effective
Problem.
The present invention uses the data destruction method of a kind of data storage device and data storage device, including interface mould
Block, volatile storage module, trigger module, processor and power module, wherein the triggering issued by receiving trigger module
Signal, processor control power supply of the built-in power modules interrupts to volatile storage module, can safety by volatile storage
The data saved in module are destroyed, and the data destroyed can not be resumed.Comparison is existing at present to be deposited using non-volatile
The data storage device of reservoir or the data destruction method that equipment is stored using manual mode format data, are avoided because of people
The non-thorough cleaning of data caused by make mistakes, and lead to the problem of illegally being stolen, the safety that data use is further enhanced,
And data can timed destroying, also strengthen destroy data convenience.
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.
It should be noted that each feature in the embodiment of the present invention can be combined with each other, in this hair if do not conflicted
Within bright protection scope.In addition, though logical order is shown in flow charts, but in some cases, it can be with not
Sequence in the module division being same as in device or flow chart executes shown or described step.
Referring to Fig.1, one embodiment of the present of invention, provides a kind of data storage device, including interface module 1, volatile
Property memory module 2, trigger module 3, processor 4 and power module 5, in which:
The interface module 1, is used for transmission data, and the interface module 1 is connect with the processor 4;
The volatile storage module 2, for storing data, the volatile storage module 2 and the interface module 1 with
And the processor 4 connects;
The trigger module 3 is connect with the processor 4;
The power module 5 is connect with the processor 4 and the volatile storage module 2.
Wherein, in the present embodiment, processor 4 respectively with interface module 1, volatile storage module 2, trigger module 3 with
And power module 5 connects;Interface module 1 is mainly used to connect external equipment, such as connection computer and tablet computer etc., can make
It is communicated between processor 4 and the host of external equipment;Volatile storage module 2 is mainly used to storing data, and volatibility is deposited
Storing up used in module 2 is volatile storage medium, and those skilled in the art will be seen that, volatile storage medium is can be with
It is used as storing and saving the carrier of data, when providing power supply to volatile storage medium, volatile storage medium
It is middle can interim storing data, and when power supply disappears, the data temporarily stored in volatile storage medium will disappear and
It cannot restore again.Trigger module 3 can be only timer 31 in the present embodiment, may also be only power knob module 32, also
It may include timer 31 and power knob module 32, mainly for generation of trigger signal, processor 4 will be according to trigger signal control
Power module 5 processed interrupts the power supply to volatile storage module 2.Power module 5 is used to be powered modules other in equipment,
Also can guarantee volatile storage module 2 can normal storing data, when power module 5 it is continual give volatile storage mould
When block 2 is powered, then the data in volatile storage module 2 can store down always, and when power module 5 stops to easy
When the property lost memory module 2 is powered, then the data in volatile storage module 2 will be destroyed, and it cannot be resumed;?
In the present embodiment, processor 4 can assign instruction control power module 5 and interrupt the electric power for being supplied to volatile storage module 2.
Referring to Fig. 2, another embodiment of the invention may also include an encrypting module 6 in equipment, and encrypting module 6 divides
It is not connect with interface module 1, volatile storage module 2 and processor 4.It is understood that the number that external equipment transmission comes
According to being likely to be the data being encrypted, it is also possible to be the data not being encrypted, therefore, encrypt mould
Block 6 is mainly used to that the data not being encrypted that external equipment transmits are encrypted, and is further ensured that data
Safety.Encryption can be des encryption algorithm by the way of, be also possible to AES encryption algorithm, the preferred AES encryption of the present embodiment
Algorithm, because the data that the data ratio DES algorithm encrypted using AES encryption algorithm is encrypted are more difficult to be cracked,
It more can guarantee data safety using AES encryption algorithm.When equipment is received from the data that external equipment is sent, first by data
It is put into encrypting module 6, processor 4 controls encrypting module 6 and encrypts to data, and data are then directly placed into volatile storage
It is stored in module 2.
Referring to Fig. 4, another embodiment of the invention, trigger module 3 is timer 31.Wherein, timer 31 mainly into
Row timework, processor 4 can receive the control instruction sent from external equipment in advance, be deposited according to the data in control instruction
The storage time sets the timing time of timer 31, skips to always from the timing time of setting to zero when the time of timer 31
When, processor 4 is just able to carry out instruction, power supply of the power module 5 by interruption to volatile storage module 2.
Referring to Fig. 5, another embodiment of the invention, trigger module 3 is power knob module 32.Wherein, in this implementation
In, usually use timer 31 be used as trigger module 3, benefit be user forget destroy data when, also can auto-destruct number
According to.But when certain emergency occurs, need quickly to destroy data, it may appear that data cannot be eliminated in time asks
Topic.Therefore, trigger module 3 can be power knob module 32, provide the function of destroying data in time, and user can manually boot
Or press, then processor 4 receives the trigger signal of the generation of power knob module 32, and control power module 5 is interrupted to easy
The power supply of the property lost memory module 2, to achieve the purpose that destroy data in time.
Referring to Fig. 3, another embodiment of the invention, volatile storage module 2 include the first volatile memory 21 with
And second volatile memory 22;Wherein, first volatile memory 21 is mainly used for storage from external equipment transmission
The data that store of needs;Second volatile memory 22 is mainly used for storing the control instruction sent from external equipment, institute
Stating includes time data memory in control instruction.Those skilled in the art understand, as computer or tablet computer etc.
When external equipment to the data storage devices such as USB flash disk and mobile hard disk with being communicated, control instruction needs with specific file to be to carry
Body, therefore in the present embodiment, a Virtual File System, the Virtual File System are established in the second volatile memory 22
For store it is various include control instruction specific file, processor 4 can call control instruction, read the number in control instruction
According to storage time, starts timer 31 according to the time data memory being previously set and start timing, processor 4 will wait timing
Terminate, executes control.
Referring to Fig. 6, another embodiment of the invention may also include power interruptions device 7.Wherein, in the present embodiment, can add
Enter a power interruptions device 7, for interrupting power supply of the power module 5 to volatile storage module 2, when time data memory reaches
Either power knob module 32 starts or presses, and processor 4 controls the disconnection power module 5 of power interruptions device 7 and deposits with volatibility
The circuit between module 2 is stored up, volatile storage module 2 loses power supply, data, that is, destroyed.It is understood that power supply mould
Block 5 can directly stop the power supply to volatile storage module 2, can also be interrupted by power interruptions device 7.
Referring to Fig. 7, another embodiment of the invention provides a kind of data destruction method of data storage device, wraps
Include following steps:
S1, processor receive the data sent from external equipment by interface module, the data are stored to volatile
In property memory module;
S2, the processor detect whether the data encrypt, if unencryption, encrypting module adds the data
It is close;
S3 starts timer, the timing time of the timer is waited to reach;
S5, control power module interrupt the power supply to the volatile storage module, and the data are destroyed.
Wherein, in step sl, interface module 1 can by the communication protocols such as USB, bluetooth, SDIO or SPI mode with
External equipment connection, the present embodiment are connect by usb protocol with external equipment by preferred USB interface.And the number that will be received
According in the first volatile memory 21 stored into volatile storage module 2.In the present embodiment, the control that external equipment is sent
In the second volatile memory 22 that system instruction is stored in a file format in volatile storage module 2, it is to be understood that
External equipment can send control instruction before transmitting the data, can also send control instruction while transmitting data.In step
In rapid S2, processor 4 will test the state of the data of external equipment transmission, and whether detection data has been encrypted, when
It when detecting that data had carried out encryption, then does not need to encrypt again, when detecting that data are not encrypted
When, then data being encrypted by encrypting module 6, the preferred AES encryption algorithm of the present embodiment encrypts data, into
The safety for the data that one step is reinforced.In step s3, processor 4 will test whether trigger module 3 is triggered, in the present embodiment
In, trigger module 3 can be only timer 31, also can be only power knob module 32, can also simultaneously include timer 31 and
Power knob module 32 selects timer 31 to be used as trigger module 3 in the present embodiment.In step s 5, volatile storage mould
Storage medium in block 2 is volatile storage medium, and after power is turned off, the data of the inside will be by pin for volatile storage medium
It ruins, and can not restore.Therefore, when processor 4 receives the data from external equipment, first by data temporary storage to easy
In the property lost memory module 2, when the timing time that timer 31 is arranged reaches, processor 4 then controls power module 5 and interrupts to easy
The power supply of the property lost memory module 2, the data in volatile storage module 2 are permanently destroyed.
Referring to Fig. 7, another embodiment of the invention provides a kind of data destruction method of data storage device, wraps
Include following steps:
S1, processor receive the data sent from external equipment by interface module, the data are stored to volatile
In property memory module;
S2, the processor detect whether the data encrypt, if unencryption, encrypting module adds the data
It is close;
S4 detects that power knob module is activated;
S5, control power module interrupt the power supply to the volatile storage module, and the data are destroyed.
Wherein, in step s 4, power knob module 32 is to provide for the function of promptly being destroyed to user, when with
Family starts or presses power knob module 32, and processor 4 will test the triggering that power knob module 32 is activated or presses
Signal, then control power supply of the stopping of power module 5 to volatile storage module 2, and data will be destroyed promptly.
Further, another embodiment of the invention, provides a kind of data-storage system, including external equipment and above-mentioned
Embodiment data storage device, the external equipment and the data storage device transmit data.
It is to be illustrated to preferable implementation of the invention, but the invention is not limited to above-mentioned embodiment party above
Formula, those skilled in the art can also make various equivalent variations on the premise of without prejudice to spirit of the invention or replace
It changes, these equivalent deformations or replacement are all included in the scope defined by the claims of the present application.
Claims (10)
1. a kind of data storage device, which is characterized in that including interface module, volatile storage module, trigger module, processor
And power module, in which:
The interface module, is used for transmission data, and the interface module is connected to the processor;
The volatile storage module, for storing data, the volatile storage module and the interface module and described
Processor connection;
The trigger module is connected to the processor;
The power module is connect with the processor and the volatile storage module.
2. a kind of data storage device according to claim 1, it is characterised in that: it further include encrypting module, the encryption
Module is connect with the interface module, the volatile storage module and the processor respectively.
3. a kind of data storage device according to claim 1, it is characterised in that: the trigger module includes timer.
4. a kind of data storage device according to claim 1, it is characterised in that: the trigger module further include power supply by
Button module.
5. a kind of data storage device according to claim 1, it is characterised in that: the volatile storage module includes the
One volatile memory and the second volatile memory, first volatile memory are sent out for storing from external equipment
The data sent;Second volatile memory is used to store the control instruction sent from external equipment, the control instruction
In include time data memory.
6. a kind of data destruction method of data storage device, which comprises the following steps:
Processor receives the data sent from external equipment by interface module, and the data are stored to volatile storage mould
In block;
The processor detects that trigger module is triggered, and control power module interrupts the confession to the volatile storage module
Electricity, the data are destroyed.
7. a kind of data destruction method of data storage device according to claim 6, which is characterized in that the trigger mode
It includes: that timer time reaches that block, which is triggered,.
8. a kind of data destruction method of data storage device according to claim 6, which is characterized in that the trigger mode
Block is triggered further include: power knob module is activated.
9. a kind of data destruction method of data storage device according to claim 6, which is characterized in that it is described will be described
Before data are stored into volatile storage module, further comprise the steps of:
Processor receives the data sent from external equipment by interface module;
The processor detects whether the data encrypt, if unencryption, encrypting module encrypts the data.
10. a kind of data-storage system, it is characterised in that: including external equipment and the described in any item data of claim 1-5
Equipment is stored, the external equipment and the data storage device transmit data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318317.2A CN110135173A (en) | 2019-04-19 | 2019-04-19 | A kind of data destruction method of data storage device and data storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910318317.2A CN110135173A (en) | 2019-04-19 | 2019-04-19 | A kind of data destruction method of data storage device and data storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110135173A true CN110135173A (en) | 2019-08-16 |
Family
ID=67570603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910318317.2A Pending CN110135173A (en) | 2019-04-19 | 2019-04-19 | A kind of data destruction method of data storage device and data storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135173A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291390A (en) * | 2020-01-20 | 2020-06-16 | 中国人民解放军海军工程大学 | Key data safety destruction triggering system and triggering method |
CN117407929A (en) * | 2023-12-14 | 2024-01-16 | 山东万里红信息技术有限公司 | Method and device for destroying data of nonvolatile storage device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007287121A (en) * | 2006-04-12 | 2007-11-01 | Giga-Byte Technology Co Ltd | Volatile storage device and serial mixed storage system having the same |
CN101706853A (en) * | 2009-11-10 | 2010-05-12 | 徐欣 | Solid state disk (SSD)-based anti-leakage self-destruction system |
CN102521167A (en) * | 2011-12-18 | 2012-06-27 | 西安安智科技有限公司 | USB (universal serial bus) electronic information anti-disclosure memory device and method |
-
2019
- 2019-04-19 CN CN201910318317.2A patent/CN110135173A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007287121A (en) * | 2006-04-12 | 2007-11-01 | Giga-Byte Technology Co Ltd | Volatile storage device and serial mixed storage system having the same |
CN101706853A (en) * | 2009-11-10 | 2010-05-12 | 徐欣 | Solid state disk (SSD)-based anti-leakage self-destruction system |
CN102521167A (en) * | 2011-12-18 | 2012-06-27 | 西安安智科技有限公司 | USB (universal serial bus) electronic information anti-disclosure memory device and method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291390A (en) * | 2020-01-20 | 2020-06-16 | 中国人民解放军海军工程大学 | Key data safety destruction triggering system and triggering method |
CN111291390B (en) * | 2020-01-20 | 2022-05-20 | 中国人民解放军海军工程大学 | Triggering system and triggering method for safe destruction of critical data |
CN117407929A (en) * | 2023-12-14 | 2024-01-16 | 山东万里红信息技术有限公司 | Method and device for destroying data of nonvolatile storage device |
CN117407929B (en) * | 2023-12-14 | 2024-03-22 | 山东万里红信息技术有限公司 | Method and device for destroying data of nonvolatile storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101939078B1 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
JP4394455B2 (en) | Method and apparatus for wireless data communication in a data processing system | |
CN105184179B (en) | Embedded encrypted mobile storage device and operation method thereof | |
KR100881938B1 (en) | System and method for managing multiple smart card sessions | |
KR102195788B1 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
CN110135173A (en) | A kind of data destruction method of data storage device and data storage device | |
KR20080006929A (en) | Method and apparatus for preventing data outflow in portable terminal | |
JP2009245020A (en) | Encrypting device by usb connection | |
US20050131996A1 (en) | Autonomous storage for backup, restore, and file access | |
CN110135203A (en) | A kind of Mass Data Storage Facility and its data destruction method | |
US20150319147A1 (en) | System and method for file encrypting and decrypting | |
CN204719761U (en) | A kind of intelligence destroys solid state hard disc | |
WO2014206172A1 (en) | Switching between untrusted environment and trusted environment in mobile device | |
WO2019042260A1 (en) | Power-on control method, ap chip and mobile terminal | |
CN202085191U (en) | Data safe storage and transmission system | |
CN104503869A (en) | Data processing method and data processing system | |
CN112149167B (en) | Data storage encryption method and device based on master-slave system | |
WO2015131585A1 (en) | Method and device for ensuring sd card security | |
WO2002088955A2 (en) | Apparatus and method for realizing statetransition of computing device | |
CN111669426B (en) | Method and system for sharing security carrier by cross-platform terminals | |
CN207780788U (en) | A kind of USB safe storage devices of remote control | |
WO2020144961A1 (en) | Electronic data management device, electronic data management system, program therefor, and recording medium | |
CN112257092A (en) | Data transmission control method, key management method, configuration method and related device | |
WO2019100693A1 (en) | System for controlling se, method, and chip | |
CN204480667U (en) | wireless encrypted U disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |