CN110135173A - A kind of data destruction method of data storage device and data storage device - Google Patents

A kind of data destruction method of data storage device and data storage device Download PDF

Info

Publication number
CN110135173A
CN110135173A CN201910318317.2A CN201910318317A CN110135173A CN 110135173 A CN110135173 A CN 110135173A CN 201910318317 A CN201910318317 A CN 201910318317A CN 110135173 A CN110135173 A CN 110135173A
Authority
CN
China
Prior art keywords
data
module
storage device
processor
volatile storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910318317.2A
Other languages
Chinese (zh)
Inventor
王祥
丁锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Haiqi Semiconductor Co Ltd
Original Assignee
Zhuhai Haiqi Semiconductor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Haiqi Semiconductor Co Ltd filed Critical Zhuhai Haiqi Semiconductor Co Ltd
Priority to CN201910318317.2A priority Critical patent/CN110135173A/en
Publication of CN110135173A publication Critical patent/CN110135173A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses the data destruction methods of a kind of data storage device and data storage device.Including interface module, volatile storage module, trigger module, processor and power module, the trigger signal wherein issued by receiving trigger module, processor controls power supply of the built-in power modules interrupts to volatile storage module, safe the data saved in volatile storage module can be destroyed, and the data destroyed can not be resumed.The comparison data storage device using nonvolatile memory existing at present or the data destruction method using manual mode format data storage equipment, the non-thorough cleaning of data caused by avoiding because of human error, and lead to the problem of illegally being stolen, further enhance the safety that data use, and data can timed destroying, also strengthen destroy data convenience.

Description

A kind of data destruction method of data storage device and data storage device
Technical field
The present invention relates to data storage security fields, more particularly to a kind of data storage device and data storage device Data destruction method.
Background technique
In the society of high speed information development, it has been born as the data storage devices such as USB flash disk and mobile hard disk, the storage of these data Equipment can be connected by special interface as external equipments such as computer and plates, and user can download significant data from external equipment It stored, backed up or is shifted to data storage device, but the data in these data storage devices are easy to be stolen by other people It takes and replicates, to cause damages to user.
Preventing the traditional method that data are stolen in data storage device is read by specific resource manager software Data in data storage device, but this method needs to match specific software in computer end, therefore is not suitable for common User.And currently used method is will to be destroyed using the data after finishing, most users are by manually side Formula is formatted data storage device, destroy in data, if but during destruction misoperation, can There are data without thoroughly formatting completely, stealing there are third party and carrying out the risk that cracks of malice, thus occur it is unnecessary Loss.Therefore how to ensure that the data in data storage device are effectively destroyed, guarantee the safety of data, be still a needs It solves the problems, such as.
Summary of the invention
It is an object of the invention at least solve one of the technical problems existing in the prior art, a kind of data storage is provided The data destruction method of equipment and data storage device, can data after timed destroying use, guarantee that data are not non- Method is stolen.
In a first aspect, the present invention provides a kind of data storage device, including interface module, volatile storage module, triggering Module, processor and power module, in which:
The interface module, is used for transmission data, and the interface module is connected to the processor;
The volatile storage module, for storing data, the volatile storage module and the interface module and The processor connection;
The trigger module is connected to the processor;
The power module is connect with the processor and the volatile storage module.
Further, further include encrypting module, the encrypting module respectively with the interface module, the volatile storage mould Block and processor connection.
Further, the trigger module includes timer.
Further, the trigger module further includes power knob module.
Further, the volatile storage module includes the first volatile memory and the second volatile memory, institute The first volatile memory is stated for storing the data sent from external equipment;Second volatile memory is for storing The control instruction sent from external equipment, includes time data memory in the control instruction.
Second aspect, the present invention provide a kind of data destruction method of data storage device, comprising the following steps:
Processor receives the data sent from external equipment by interface module, and the data are stored to volatibility and are deposited It stores up in module;
The processor detects that trigger module is triggered, and control power module is interrupted to the volatile storage module Power supply, the data are destroyed.
Further, it includes: that timer timing time reaches that the trigger module, which is triggered,.
Further, the trigger module is triggered further include: power knob module is activated.
Further, it is described the data are stored into volatile storage module before, further comprise the steps of:
Processor receives the data sent from external equipment by interface module;
The processor detects whether the data encrypt, if unencryption, encrypting module encrypts the data.
The third aspect, the present invention provide a kind of data-storage system, it is characterised in that: including external equipment and above-mentioned number According to storage equipment, the external equipment and the data storage device transmit data.
The one or more technical solutions provided in the embodiment of the present invention, at least have the following beneficial effects:
The present invention uses the data destruction method of a kind of data storage device and data storage device, including interface mould Block, volatile storage module, trigger module, processor and power module, wherein the triggering issued by receiving trigger module Signal, processor control power supply of the built-in power modules interrupts to volatile storage module, can safety by volatile storage The data saved in module are destroyed, and the data destroyed can not be resumed.Comparison is existing at present to be deposited using non-volatile The data storage device of reservoir or the data destruction method that equipment is stored using manual mode format data, are avoided because of people Data non-thorough cleaning caused by make mistakes, and lead to the problem of illegally being stolen, further enhance data using safe, And data can timed destroying, also strengthen destroy data convenience.
Detailed description of the invention
The invention will be further described with example with reference to the accompanying drawing.
Fig. 1 is a kind of structural schematic diagram of data storage device provided by one embodiment of the invention;
Fig. 2 is a kind of data storage device structural representation with encrypting module provided by one embodiment of the invention Figure;
Fig. 3 is a kind of data storage device and external equipment connection schematic diagram provided by one embodiment of the invention;
Fig. 4 is a kind of data storage device structural schematic diagram with timer provided by one embodiment of the invention;
Fig. 5 is that a kind of data storage device structure with power knob module provided by one embodiment of the invention is shown It is intended to;
Fig. 6 is a kind of data storage device structural representation with power interruptions device provided by one embodiment of the invention Figure;
Fig. 7 is a kind of data storage device data destroying method flow diagram provided by one embodiment of the invention.
Specific embodiment
In the society of high speed information development, it has been born as the data storage devices such as USB flash disk and mobile hard disk, the storage of these data Equipment can be connected by special interface as external equipments such as computer and plates, and significant data can be downloaded to data storage by user Equipment stored, is backed up and is perhaps shifted but the data in these data storage devices are easy to be stolen by others or replicate, To cause damages.
The traditional method for avoiding leaking data in data storage device is to read number by specific resource manager software According to the data in storage equipment, but this method needs to match specific software in computer end and is not suitable for ordinary user.And Current method is will to be destroyed using the data after finishing, and most users are to be stored data by manually mode Data in equipment are formatted, destroy in data, if but during destruction misoperation, will appear Data steal there are third party without thoroughly formatting completely and carry out malice and crack, lead to that unnecessary loss occurs.Therefore How to ensure that data in data storage device are destroyed the safety that guarantees data, to be still to need to solve by effective Problem.
The present invention uses the data destruction method of a kind of data storage device and data storage device, including interface mould Block, volatile storage module, trigger module, processor and power module, wherein the triggering issued by receiving trigger module Signal, processor control power supply of the built-in power modules interrupts to volatile storage module, can safety by volatile storage The data saved in module are destroyed, and the data destroyed can not be resumed.Comparison is existing at present to be deposited using non-volatile The data storage device of reservoir or the data destruction method that equipment is stored using manual mode format data, are avoided because of people The non-thorough cleaning of data caused by make mistakes, and lead to the problem of illegally being stolen, the safety that data use is further enhanced, And data can timed destroying, also strengthen destroy data convenience.
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
It should be noted that each feature in the embodiment of the present invention can be combined with each other, in this hair if do not conflicted Within bright protection scope.In addition, though logical order is shown in flow charts, but in some cases, it can be with not Sequence in the module division being same as in device or flow chart executes shown or described step.
Referring to Fig.1, one embodiment of the present of invention, provides a kind of data storage device, including interface module 1, volatile Property memory module 2, trigger module 3, processor 4 and power module 5, in which:
The interface module 1, is used for transmission data, and the interface module 1 is connect with the processor 4;
The volatile storage module 2, for storing data, the volatile storage module 2 and the interface module 1 with And the processor 4 connects;
The trigger module 3 is connect with the processor 4;
The power module 5 is connect with the processor 4 and the volatile storage module 2.
Wherein, in the present embodiment, processor 4 respectively with interface module 1, volatile storage module 2, trigger module 3 with And power module 5 connects;Interface module 1 is mainly used to connect external equipment, such as connection computer and tablet computer etc., can make It is communicated between processor 4 and the host of external equipment;Volatile storage module 2 is mainly used to storing data, and volatibility is deposited Storing up used in module 2 is volatile storage medium, and those skilled in the art will be seen that, volatile storage medium is can be with It is used as storing and saving the carrier of data, when providing power supply to volatile storage medium, volatile storage medium It is middle can interim storing data, and when power supply disappears, the data temporarily stored in volatile storage medium will disappear and It cannot restore again.Trigger module 3 can be only timer 31 in the present embodiment, may also be only power knob module 32, also It may include timer 31 and power knob module 32, mainly for generation of trigger signal, processor 4 will be according to trigger signal control Power module 5 processed interrupts the power supply to volatile storage module 2.Power module 5 is used to be powered modules other in equipment, Also can guarantee volatile storage module 2 can normal storing data, when power module 5 it is continual give volatile storage mould When block 2 is powered, then the data in volatile storage module 2 can store down always, and when power module 5 stops to easy When the property lost memory module 2 is powered, then the data in volatile storage module 2 will be destroyed, and it cannot be resumed;? In the present embodiment, processor 4 can assign instruction control power module 5 and interrupt the electric power for being supplied to volatile storage module 2.
Referring to Fig. 2, another embodiment of the invention may also include an encrypting module 6 in equipment, and encrypting module 6 divides It is not connect with interface module 1, volatile storage module 2 and processor 4.It is understood that the number that external equipment transmission comes According to being likely to be the data being encrypted, it is also possible to be the data not being encrypted, therefore, encrypt mould Block 6 is mainly used to that the data not being encrypted that external equipment transmits are encrypted, and is further ensured that data Safety.Encryption can be des encryption algorithm by the way of, be also possible to AES encryption algorithm, the preferred AES encryption of the present embodiment Algorithm, because the data that the data ratio DES algorithm encrypted using AES encryption algorithm is encrypted are more difficult to be cracked, It more can guarantee data safety using AES encryption algorithm.When equipment is received from the data that external equipment is sent, first by data It is put into encrypting module 6, processor 4 controls encrypting module 6 and encrypts to data, and data are then directly placed into volatile storage It is stored in module 2.
Referring to Fig. 4, another embodiment of the invention, trigger module 3 is timer 31.Wherein, timer 31 mainly into Row timework, processor 4 can receive the control instruction sent from external equipment in advance, be deposited according to the data in control instruction The storage time sets the timing time of timer 31, skips to always from the timing time of setting to zero when the time of timer 31 When, processor 4 is just able to carry out instruction, power supply of the power module 5 by interruption to volatile storage module 2.
Referring to Fig. 5, another embodiment of the invention, trigger module 3 is power knob module 32.Wherein, in this implementation In, usually use timer 31 be used as trigger module 3, benefit be user forget destroy data when, also can auto-destruct number According to.But when certain emergency occurs, need quickly to destroy data, it may appear that data cannot be eliminated in time asks Topic.Therefore, trigger module 3 can be power knob module 32, provide the function of destroying data in time, and user can manually boot Or press, then processor 4 receives the trigger signal of the generation of power knob module 32, and control power module 5 is interrupted to easy The power supply of the property lost memory module 2, to achieve the purpose that destroy data in time.
Referring to Fig. 3, another embodiment of the invention, volatile storage module 2 include the first volatile memory 21 with And second volatile memory 22;Wherein, first volatile memory 21 is mainly used for storage from external equipment transmission The data that store of needs;Second volatile memory 22 is mainly used for storing the control instruction sent from external equipment, institute Stating includes time data memory in control instruction.Those skilled in the art understand, as computer or tablet computer etc. When external equipment to the data storage devices such as USB flash disk and mobile hard disk with being communicated, control instruction needs with specific file to be to carry Body, therefore in the present embodiment, a Virtual File System, the Virtual File System are established in the second volatile memory 22 For store it is various include control instruction specific file, processor 4 can call control instruction, read the number in control instruction According to storage time, starts timer 31 according to the time data memory being previously set and start timing, processor 4 will wait timing Terminate, executes control.
Referring to Fig. 6, another embodiment of the invention may also include power interruptions device 7.Wherein, in the present embodiment, can add Enter a power interruptions device 7, for interrupting power supply of the power module 5 to volatile storage module 2, when time data memory reaches Either power knob module 32 starts or presses, and processor 4 controls the disconnection power module 5 of power interruptions device 7 and deposits with volatibility The circuit between module 2 is stored up, volatile storage module 2 loses power supply, data, that is, destroyed.It is understood that power supply mould Block 5 can directly stop the power supply to volatile storage module 2, can also be interrupted by power interruptions device 7.
Referring to Fig. 7, another embodiment of the invention provides a kind of data destruction method of data storage device, wraps Include following steps:
S1, processor receive the data sent from external equipment by interface module, the data are stored to volatile In property memory module;
S2, the processor detect whether the data encrypt, if unencryption, encrypting module adds the data It is close;
S3 starts timer, the timing time of the timer is waited to reach;
S5, control power module interrupt the power supply to the volatile storage module, and the data are destroyed.
Wherein, in step sl, interface module 1 can by the communication protocols such as USB, bluetooth, SDIO or SPI mode with External equipment connection, the present embodiment are connect by usb protocol with external equipment by preferred USB interface.And the number that will be received According in the first volatile memory 21 stored into volatile storage module 2.In the present embodiment, the control that external equipment is sent In the second volatile memory 22 that system instruction is stored in a file format in volatile storage module 2, it is to be understood that External equipment can send control instruction before transmitting the data, can also send control instruction while transmitting data.In step In rapid S2, processor 4 will test the state of the data of external equipment transmission, and whether detection data has been encrypted, when It when detecting that data had carried out encryption, then does not need to encrypt again, when detecting that data are not encrypted When, then data being encrypted by encrypting module 6, the preferred AES encryption algorithm of the present embodiment encrypts data, into The safety for the data that one step is reinforced.In step s3, processor 4 will test whether trigger module 3 is triggered, in the present embodiment In, trigger module 3 can be only timer 31, also can be only power knob module 32, can also simultaneously include timer 31 and Power knob module 32 selects timer 31 to be used as trigger module 3 in the present embodiment.In step s 5, volatile storage mould Storage medium in block 2 is volatile storage medium, and after power is turned off, the data of the inside will be by pin for volatile storage medium It ruins, and can not restore.Therefore, when processor 4 receives the data from external equipment, first by data temporary storage to easy In the property lost memory module 2, when the timing time that timer 31 is arranged reaches, processor 4 then controls power module 5 and interrupts to easy The power supply of the property lost memory module 2, the data in volatile storage module 2 are permanently destroyed.
Referring to Fig. 7, another embodiment of the invention provides a kind of data destruction method of data storage device, wraps Include following steps:
S1, processor receive the data sent from external equipment by interface module, the data are stored to volatile In property memory module;
S2, the processor detect whether the data encrypt, if unencryption, encrypting module adds the data It is close;
S4 detects that power knob module is activated;
S5, control power module interrupt the power supply to the volatile storage module, and the data are destroyed.
Wherein, in step s 4, power knob module 32 is to provide for the function of promptly being destroyed to user, when with Family starts or presses power knob module 32, and processor 4 will test the triggering that power knob module 32 is activated or presses Signal, then control power supply of the stopping of power module 5 to volatile storage module 2, and data will be destroyed promptly.
Further, another embodiment of the invention, provides a kind of data-storage system, including external equipment and above-mentioned Embodiment data storage device, the external equipment and the data storage device transmit data.
It is to be illustrated to preferable implementation of the invention, but the invention is not limited to above-mentioned embodiment party above Formula, those skilled in the art can also make various equivalent variations on the premise of without prejudice to spirit of the invention or replace It changes, these equivalent deformations or replacement are all included in the scope defined by the claims of the present application.

Claims (10)

1. a kind of data storage device, which is characterized in that including interface module, volatile storage module, trigger module, processor And power module, in which:
The interface module, is used for transmission data, and the interface module is connected to the processor;
The volatile storage module, for storing data, the volatile storage module and the interface module and described Processor connection;
The trigger module is connected to the processor;
The power module is connect with the processor and the volatile storage module.
2. a kind of data storage device according to claim 1, it is characterised in that: it further include encrypting module, the encryption Module is connect with the interface module, the volatile storage module and the processor respectively.
3. a kind of data storage device according to claim 1, it is characterised in that: the trigger module includes timer.
4. a kind of data storage device according to claim 1, it is characterised in that: the trigger module further include power supply by Button module.
5. a kind of data storage device according to claim 1, it is characterised in that: the volatile storage module includes the One volatile memory and the second volatile memory, first volatile memory are sent out for storing from external equipment The data sent;Second volatile memory is used to store the control instruction sent from external equipment, the control instruction In include time data memory.
6. a kind of data destruction method of data storage device, which comprises the following steps:
Processor receives the data sent from external equipment by interface module, and the data are stored to volatile storage mould In block;
The processor detects that trigger module is triggered, and control power module interrupts the confession to the volatile storage module Electricity, the data are destroyed.
7. a kind of data destruction method of data storage device according to claim 6, which is characterized in that the trigger mode It includes: that timer time reaches that block, which is triggered,.
8. a kind of data destruction method of data storage device according to claim 6, which is characterized in that the trigger mode Block is triggered further include: power knob module is activated.
9. a kind of data destruction method of data storage device according to claim 6, which is characterized in that it is described will be described Before data are stored into volatile storage module, further comprise the steps of:
Processor receives the data sent from external equipment by interface module;
The processor detects whether the data encrypt, if unencryption, encrypting module encrypts the data.
10. a kind of data-storage system, it is characterised in that: including external equipment and the described in any item data of claim 1-5 Equipment is stored, the external equipment and the data storage device transmit data.
CN201910318317.2A 2019-04-19 2019-04-19 A kind of data destruction method of data storage device and data storage device Pending CN110135173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910318317.2A CN110135173A (en) 2019-04-19 2019-04-19 A kind of data destruction method of data storage device and data storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910318317.2A CN110135173A (en) 2019-04-19 2019-04-19 A kind of data destruction method of data storage device and data storage device

Publications (1)

Publication Number Publication Date
CN110135173A true CN110135173A (en) 2019-08-16

Family

ID=67570603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910318317.2A Pending CN110135173A (en) 2019-04-19 2019-04-19 A kind of data destruction method of data storage device and data storage device

Country Status (1)

Country Link
CN (1) CN110135173A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291390A (en) * 2020-01-20 2020-06-16 中国人民解放军海军工程大学 Key data safety destruction triggering system and triggering method
CN117407929A (en) * 2023-12-14 2024-01-16 山东万里红信息技术有限公司 Method and device for destroying data of nonvolatile storage device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007287121A (en) * 2006-04-12 2007-11-01 Giga-Byte Technology Co Ltd Volatile storage device and serial mixed storage system having the same
CN101706853A (en) * 2009-11-10 2010-05-12 徐欣 Solid state disk (SSD)-based anti-leakage self-destruction system
CN102521167A (en) * 2011-12-18 2012-06-27 西安安智科技有限公司 USB (universal serial bus) electronic information anti-disclosure memory device and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007287121A (en) * 2006-04-12 2007-11-01 Giga-Byte Technology Co Ltd Volatile storage device and serial mixed storage system having the same
CN101706853A (en) * 2009-11-10 2010-05-12 徐欣 Solid state disk (SSD)-based anti-leakage self-destruction system
CN102521167A (en) * 2011-12-18 2012-06-27 西安安智科技有限公司 USB (universal serial bus) electronic information anti-disclosure memory device and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291390A (en) * 2020-01-20 2020-06-16 中国人民解放军海军工程大学 Key data safety destruction triggering system and triggering method
CN111291390B (en) * 2020-01-20 2022-05-20 中国人民解放军海军工程大学 Triggering system and triggering method for safe destruction of critical data
CN117407929A (en) * 2023-12-14 2024-01-16 山东万里红信息技术有限公司 Method and device for destroying data of nonvolatile storage device
CN117407929B (en) * 2023-12-14 2024-03-22 山东万里红信息技术有限公司 Method and device for destroying data of nonvolatile storage device

Similar Documents

Publication Publication Date Title
KR101939078B1 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
JP4394455B2 (en) Method and apparatus for wireless data communication in a data processing system
CN105184179B (en) Embedded encrypted mobile storage device and operation method thereof
KR100881938B1 (en) System and method for managing multiple smart card sessions
KR102195788B1 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
CN110135173A (en) A kind of data destruction method of data storage device and data storage device
KR20080006929A (en) Method and apparatus for preventing data outflow in portable terminal
JP2009245020A (en) Encrypting device by usb connection
US20050131996A1 (en) Autonomous storage for backup, restore, and file access
CN110135203A (en) A kind of Mass Data Storage Facility and its data destruction method
US20150319147A1 (en) System and method for file encrypting and decrypting
CN204719761U (en) A kind of intelligence destroys solid state hard disc
WO2014206172A1 (en) Switching between untrusted environment and trusted environment in mobile device
WO2019042260A1 (en) Power-on control method, ap chip and mobile terminal
CN202085191U (en) Data safe storage and transmission system
CN104503869A (en) Data processing method and data processing system
CN112149167B (en) Data storage encryption method and device based on master-slave system
WO2015131585A1 (en) Method and device for ensuring sd card security
WO2002088955A2 (en) Apparatus and method for realizing statetransition of computing device
CN111669426B (en) Method and system for sharing security carrier by cross-platform terminals
CN207780788U (en) A kind of USB safe storage devices of remote control
WO2020144961A1 (en) Electronic data management device, electronic data management system, program therefor, and recording medium
CN112257092A (en) Data transmission control method, key management method, configuration method and related device
WO2019100693A1 (en) System for controlling se, method, and chip
CN204480667U (en) wireless encrypted U disk

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination