CN113239412A - Storage device based on data encryption - Google Patents
Storage device based on data encryption Download PDFInfo
- Publication number
- CN113239412A CN113239412A CN202110642555.6A CN202110642555A CN113239412A CN 113239412 A CN113239412 A CN 113239412A CN 202110642555 A CN202110642555 A CN 202110642555A CN 113239412 A CN113239412 A CN 113239412A
- Authority
- CN
- China
- Prior art keywords
- module
- storage device
- encryption
- information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 claims abstract description 16
- 230000005540 biological transmission Effects 0.000 claims abstract description 11
- 238000001514 detection method Methods 0.000 claims abstract description 9
- 238000012795 verification Methods 0.000 claims abstract description 8
- 238000004891 communication Methods 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 238000000034 method Methods 0.000 abstract description 24
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 17
- 230000003993 interaction Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a storage device based on data encryption, which comprises: the interface module is used for establishing a data transmission channel with the encryption computer; the detection module is used for detecting the connection state of the storage equipment and the encryption computer and acquiring the address information of the encryption computer after the connection is successful; the matching module is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module, and displaying an authentication operation interface on the encryption computer after successful matching; the login module is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer; the preset module is used for setting authorization information; a storage module on which a plurality of storage spaces are provided; the data encryption and decryption module is used for encrypting and decrypting the data file written into or read out of the storage space; the method has the beneficial effect of preventing cross divulgence risk, and is suitable for the field of data encryption.
Description
Technical Field
The invention relates to the technical field of data encryption, in particular to a storage device based on data encryption.
Background
The mobile storage device has a large capacity, is convenient to carry, has a low cost, and is rapidly popularized and developed, and when the mobile storage device is used, the mobile storage device is generally plugged in a computer or other electronic products to obtain a power supply for use, for example, data transmission and storage are performed through operation on the computer, and file information and the like stored in the mobile storage device are displayed through the computer;
the common method for transferring files among the confidential terminals of the confidential enterprise is to copy the files from one terminal to the mobile storage device through encrypting the mobile storage device, and then copy the files in the mobile storage device to other terminals, thereby completing the transfer of the files among the terminals of the internal network.
However, the file transmission method has the following disadvantages: on one hand, in the process of the target file from the terminal A to the terminal B, due to artificial reasons, other files may be copied from the terminal B to the mobile storage device or other terminals; the risk of cross-leakage caused by the extra copied files is not preventable and controllable, and unexpected security risk is brought to a manager.
Disclosure of Invention
Aiming at the defects in the related technology, the technical problem to be solved by the invention is as follows: the storage device based on data encryption can effectively solve the cross-disclosure risk caused by extra copied files in the data interaction process of the traditional storage device and an encryption computer.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: … … are provided.
A storage device based on data encryption for use with an encryption computer, the storage device comprising:
the interface module is used for establishing a data transmission channel with the encryption computer;
the detection module is used for detecting the connection state of the storage equipment and the encryption computer and acquiring the address information of the encryption computer after the connection is successful;
the matching module is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module, displaying an authentication operation interface on the encryption computer after successful matching, and otherwise, disconnecting the connection with the encryption computer;
the login module is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module is used for setting authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module on which a plurality of storage spaces are provided;
and the data encryption and decryption module is used for encrypting and decrypting the data file written into or read out of the storage space.
Preferably, the method further comprises the following steps: the initialization module is used for initializing the storage equipment and writing the authorization information into the storage equipment; and unlocking the storage device when the storage device is locked.
Preferably, the method further comprises the following steps: the recording module is used for recording operation log information of a user;
the data encryption and decryption module further comprises: used for encrypting and decrypting the operation log information.
Preferably, the method further comprises the following steps: and the protection module is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
Preferably, the protection module further comprises: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
Preferably, the login module includes:
the receiving module is used for receiving login authentication information of a user;
the authentication module is used for comparing the login authentication information with preset login information and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module receives the login authentication information of the user again;
and the output module is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result so as to enable a user to read and write the file in the storage space.
Preferably, in the recording module, the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
The invention has the beneficial technical effects that:
1. the storage device based on data encryption is matched with an encryption computer for use, and authorization information of the storage device is set in the storage device through a preset module so that the storage device and workers perform corresponding operations according to the authorization information;
when the storage device is used, after the storage device is inserted into a corresponding interface of the encryption computer, the storage device establishes a data transmission channel with the encryption computer through an interface module, then a detection module arranged on the storage device detects the connection state with the encryption computer, and after the connection is successful, the address information of the encryption computer is obtained; matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module through a matching module, displaying an authentication operation interface on the encryption computer after successful matching, or disconnecting the connection with the encryption computer; then, after login authentication information of a user is input through a login module, a storage space corresponding to the verification result is displayed on the encryption computer;
in the process, the address information of the encryption computer with the storage device capable of data interaction is stored through the preset module, so that after the storage device establishes a data transmission channel with the encryption computer through the interface module, whether the encryption computer has an access right can be identified through the detection module and the matching module, when the matching is successful, the next operation is carried out, otherwise, the connection is disconnected, and the process can effectively avoid the access of the storage device without the right to the encryption computer; the process is combined with the authentication process of the login module, so that the security access mechanism of the encryption computer is improved; meanwhile, in the invention, the authorization information on the preset module comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; after the authentication is passed, the login module displays the storage space corresponding to the verification result on the encryption computer, so that when the device is used, the data files needing interaction can be stored in the accessible storage space, a user can only process the files in the storage space after logging in, the risk of cross leakage caused by extra copied files in the data interaction process of the traditional storage device and the encryption computer can be effectively solved, and the practicability is strong.
2. According to the invention, by setting the maximum login times, data leakage caused by embezzlement of the storage equipment by others can be effectively prevented, and the safety is high; when the storage device is locked due to the fact that the password is forgotten, the storage device can be connected with the management background, and the storage device is unlocked through the initialization module.
3. In the invention, the operation log of the user can be recorded and encrypted through the recording module and the data encryption and decryption module, so that a manager can identify the operation information of the user through the access to the operation record at the later stage, the management of the encrypted information is facilitated, and the illegal operation of the user is effectively prevented.
Drawings
Fig. 1 is a schematic structural diagram of a storage device based on data encryption according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a storage device based on data encryption according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a storage device based on data encryption according to a third embodiment of the present invention;
in the figure: 1 is an interface module, 2 is a detection module, 3 is a matching module, 4 is a login module, 5 is a preset module, 6 is a storage module, 7 is a data encryption and decryption module, 8 is an initialization module, 9 is a recording module, and 10 is a protection module; reference numeral 41 denotes a receiving module, 42 denotes an authenticating module, and 43 denotes an outputting module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments, but not all embodiments, of the present invention; all other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Next, the present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially according to the general scale for convenience of illustration when describing the embodiments of the present invention, and the drawings are only examples, which should not limit the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
An embodiment of the storage device based on data encryption is described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a schematic structural diagram of a storage device based on data encryption according to an embodiment of the present invention; as shown in fig. 1, a storage device based on data encryption for use with an encryption computer, the storage device comprising:
the interface module 1 is used for establishing a data transmission channel with the encryption computer;
the detection module 2 is used for detecting the connection state of the storage device and the encryption computer, and acquiring the address information of the encryption computer after the connection is successful;
the matching module 3 is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the presetting module 5, displaying an authentication operation interface on the encryption computer after the matching is successful, or disconnecting the connection with the encryption computer;
the login module 4 is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module 5 is provided with authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module 6 on which a plurality of storage spaces are provided;
and the data encryption and decryption module 7 is used for encrypting and decrypting the data file written into or read out of the storage space.
In this embodiment, the login information of the user may include: a user name, a password corresponding to the user name, a fingerprint, and the like.
The storage device based on data encryption provided by the embodiment is used in cooperation with an encryption computer, and authorization information of the storage device is set in the storage device through a preset module, so that the storage device and a worker perform corresponding operations according to the authorization information;
when the storage device is used, after the storage device is inserted into a corresponding interface of the encryption computer, the storage device establishes a data transmission channel with the encryption computer through an interface module, then a detection module arranged on the storage device detects the connection state with the encryption computer, and after the connection is successful, the address information of the encryption computer is obtained; matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module through a matching module, displaying an authentication operation interface on the encryption computer after successful matching, or disconnecting the connection with the encryption computer; then, after login authentication information of a user is input through a login module, a storage space corresponding to the verification result is displayed on the encryption computer;
in the process, the address information of the encryption computer with the storage device capable of data interaction is stored through the preset module, so that after the storage device establishes a data transmission channel with the encryption computer through the interface module, whether the encryption computer has an access right can be identified through the detection module and the matching module, when the matching is successful, the next operation is carried out, otherwise, the connection is disconnected, and the process can effectively avoid the access of the storage device without the right to the encryption computer; the process is combined with the authentication process of the login module, so that the security access mechanism of the encryption computer is improved; meanwhile, in the invention, the authorization information on the preset module comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; after the authentication is passed, the login module displays the storage space corresponding to the verification result on the encryption computer, so that when the device is used, the data files needing interaction can be stored in the accessible storage space, a user can only process the files in the storage space after logging in, the risk of cross leakage caused by extra copied files in the data interaction process of the traditional storage device and the encryption computer can be effectively solved, and the practicability is strong.
Specifically, the login module 4 includes:
a receiving module 41, configured to receive login authentication information of a user;
the authentication module 42 is used for comparing the login authentication information with preset login information, and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module 41 receives the login authentication information of the user again;
and the output module 43 is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result, so that the user can read and write the file in the storage space.
Further, in this embodiment, a storage device based on data encryption further includes: the initialization module 8 is used for initializing the storage device and writing the authorization information into the storage device; and unlocking the storage device when the storage device is locked.
In the embodiment, by setting the maximum login times, data leakage caused by embezzlement of the storage equipment by others can be effectively prevented, and the safety is high; when the storage device is locked due to the fact that the password is forgotten, the storage device can be connected with the management background, and the storage device is unlocked through the initialization module.
Example two
On the basis of the first embodiment, a storage device based on data encryption further comprises: the recording module 9 is used for recording operation log information of a user;
the data encryption and decryption module 7 further comprises: used for encrypting and decrypting the operation log information.
Specifically, in the recording module 9, the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
In the embodiment, the operation log of the user can be recorded and encrypted through the recording module and the data encryption and decryption module, so that a manager can identify the operation information of the user through the access to the operation record at the later stage, the management of the encrypted information is facilitated, and the illegal operation of the user is effectively prevented.
EXAMPLE III
On the basis of the first embodiment, a storage device based on data encryption further comprises: and the protection module 10 is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
Specifically, the protection module 10 further includes: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
In this embodiment, in order to improve the security of data transmission, the protection module may identify a network connection state of the encryption computer, and disconnect a communication connection between the storage device and the encryption computer when the encryption computer accesses the internet, so as to prevent encrypted data from flowing into the internet under the clamping of other illegal software.
According to the invention, through managing the encryption computer with the storage device capable of interacting and managing the operable storage space of the storage device, cross leakage caused by the connection of the storage device and the encryption computer in the process can be effectively prevented, and the safety is high.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. For book
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (7)
1. A data encryption based storage device for use with an encryption computer, comprising: the storage device includes:
the interface module (1) is used for establishing a data transmission channel with the encryption computer;
the detection module (2) is used for detecting the connection state of the storage equipment and the encryption computer, and acquiring the address information of the encryption computer after the connection is successful;
the matching module (3) is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module (5), and displaying an authentication operation interface on the encryption computer after the matching is successful, or disconnecting the connection with the encryption computer;
the login module (4) is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module (5) is provided with authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module (6) on which a plurality of storage spaces are provided;
and the data encryption and decryption module (7) is used for encrypting and decrypting the data file written into or read out of the storage space.
2. A data encryption based storage device according to claim 1, wherein: further comprising: the initialization module (8) is used for initializing the storage equipment and writing the authorization information into the storage equipment; and unlocking the storage device when the storage device is locked.
3. A data encryption based storage device according to claim 1, wherein: further comprising: the recording module (9) is used for recording operation log information of a user;
the data encryption and decryption module (7) further comprises: used for encrypting and decrypting the operation log information.
4. A data encryption based storage device according to claim 1, wherein: further comprising: and the protection module (10) is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
5. A data encryption based storage device according to claim 1, wherein: the protection module (10) further comprises: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
6. A data encryption based storage device according to claim 1, wherein: the login module (4) comprises:
a receiving module (41) for receiving login authentication information of a user;
the authentication module (42) is used for comparing the login authentication information with preset login information and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module (41) receives login authentication information of the user again;
and the output module (43) is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result so as to enable a user to read and write the file in the storage space.
7. A data encryption based storage device according to claim 3, wherein: in the recording module (9), the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110642555.6A CN113239412A (en) | 2021-06-09 | 2021-06-09 | Storage device based on data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110642555.6A CN113239412A (en) | 2021-06-09 | 2021-06-09 | Storage device based on data encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113239412A true CN113239412A (en) | 2021-08-10 |
Family
ID=77137393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110642555.6A Pending CN113239412A (en) | 2021-06-09 | 2021-06-09 | Storage device based on data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113239412A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632081A (en) * | 2013-11-15 | 2014-03-12 | 深圳市江波龙电子有限公司 | Encrypted storage device and authentication system and authentication method thereof |
CN105956496A (en) * | 2016-06-21 | 2016-09-21 | 新昌县七星街道明盛模具厂 | Security and secrecy method for sharing storage files |
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
-
2021
- 2021-06-09 CN CN202110642555.6A patent/CN113239412A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632081A (en) * | 2013-11-15 | 2014-03-12 | 深圳市江波龙电子有限公司 | Encrypted storage device and authentication system and authentication method thereof |
CN105956496A (en) * | 2016-06-21 | 2016-09-21 | 新昌县七星街道明盛模具厂 | Security and secrecy method for sharing storage files |
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8918633B2 (en) | Information processing device, information processing system, and program | |
EP1860590B1 (en) | Posture-based data protection | |
US20190050598A1 (en) | Secure data storage | |
US20040228487A1 (en) | Content reading apparatus | |
US8694799B2 (en) | System and method for protection of content stored in a storage device | |
US20080195750A1 (en) | Secure cross platform auditing | |
CN111464561B (en) | Data ferry management system | |
CN110443047B (en) | Data exchange group system and method | |
CN116318685B (en) | Data security exchange system of mobile storage equipment | |
KR20050053569A (en) | Document preservation authority endowment method | |
CN111539042B (en) | Safe operation method based on trusted storage of core data files | |
KR100819382B1 (en) | Digital Information Storage System, Digital Information Security System, Method for Storing Digital Information and Method for Service Digital Information | |
CN101777097A (en) | Monitorable mobile storage device | |
US20090024844A1 (en) | Terminal And Method For Receiving Data In A Network | |
KR100750697B1 (en) | Digital document preservation system having a share memory for user access function and document transaction method used the system | |
CN201805447U (en) | Electronic information management platform system of Intranet | |
CN113239412A (en) | Storage device based on data encryption | |
CN101778094B (en) | Mobile storage system used for monitoring | |
CN101424898B (en) | Image forming apparatus and image forming system | |
US8621231B2 (en) | Method and server for accessing an electronic safe via a plurality of entities | |
CN113221139A (en) | Electronic information encryption method | |
CN113342896A (en) | Scientific research data security protection system based on cloud fusion and working method thereof | |
CN111737722B (en) | Method and device for safely ferrying data between intranet terminals | |
CN118965332A (en) | File transfer method and system for medical detection data | |
CN115438358B (en) | Controlled file encryption method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210810 |