CN113239412A - Storage device based on data encryption - Google Patents

Storage device based on data encryption Download PDF

Info

Publication number
CN113239412A
CN113239412A CN202110642555.6A CN202110642555A CN113239412A CN 113239412 A CN113239412 A CN 113239412A CN 202110642555 A CN202110642555 A CN 202110642555A CN 113239412 A CN113239412 A CN 113239412A
Authority
CN
China
Prior art keywords
module
storage device
encryption
information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110642555.6A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Kechao Technology Co ltd
Original Assignee
Shanxi Kechao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Kechao Technology Co ltd filed Critical Shanxi Kechao Technology Co ltd
Priority to CN202110642555.6A priority Critical patent/CN113239412A/en
Publication of CN113239412A publication Critical patent/CN113239412A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a storage device based on data encryption, which comprises: the interface module is used for establishing a data transmission channel with the encryption computer; the detection module is used for detecting the connection state of the storage equipment and the encryption computer and acquiring the address information of the encryption computer after the connection is successful; the matching module is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module, and displaying an authentication operation interface on the encryption computer after successful matching; the login module is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer; the preset module is used for setting authorization information; a storage module on which a plurality of storage spaces are provided; the data encryption and decryption module is used for encrypting and decrypting the data file written into or read out of the storage space; the method has the beneficial effect of preventing cross divulgence risk, and is suitable for the field of data encryption.

Description

Storage device based on data encryption
Technical Field
The invention relates to the technical field of data encryption, in particular to a storage device based on data encryption.
Background
The mobile storage device has a large capacity, is convenient to carry, has a low cost, and is rapidly popularized and developed, and when the mobile storage device is used, the mobile storage device is generally plugged in a computer or other electronic products to obtain a power supply for use, for example, data transmission and storage are performed through operation on the computer, and file information and the like stored in the mobile storage device are displayed through the computer;
the common method for transferring files among the confidential terminals of the confidential enterprise is to copy the files from one terminal to the mobile storage device through encrypting the mobile storage device, and then copy the files in the mobile storage device to other terminals, thereby completing the transfer of the files among the terminals of the internal network.
However, the file transmission method has the following disadvantages: on one hand, in the process of the target file from the terminal A to the terminal B, due to artificial reasons, other files may be copied from the terminal B to the mobile storage device or other terminals; the risk of cross-leakage caused by the extra copied files is not preventable and controllable, and unexpected security risk is brought to a manager.
Disclosure of Invention
Aiming at the defects in the related technology, the technical problem to be solved by the invention is as follows: the storage device based on data encryption can effectively solve the cross-disclosure risk caused by extra copied files in the data interaction process of the traditional storage device and an encryption computer.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: … … are provided.
A storage device based on data encryption for use with an encryption computer, the storage device comprising:
the interface module is used for establishing a data transmission channel with the encryption computer;
the detection module is used for detecting the connection state of the storage equipment and the encryption computer and acquiring the address information of the encryption computer after the connection is successful;
the matching module is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module, displaying an authentication operation interface on the encryption computer after successful matching, and otherwise, disconnecting the connection with the encryption computer;
the login module is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module is used for setting authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module on which a plurality of storage spaces are provided;
and the data encryption and decryption module is used for encrypting and decrypting the data file written into or read out of the storage space.
Preferably, the method further comprises the following steps: the initialization module is used for initializing the storage equipment and writing the authorization information into the storage equipment; and unlocking the storage device when the storage device is locked.
Preferably, the method further comprises the following steps: the recording module is used for recording operation log information of a user;
the data encryption and decryption module further comprises: used for encrypting and decrypting the operation log information.
Preferably, the method further comprises the following steps: and the protection module is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
Preferably, the protection module further comprises: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
Preferably, the login module includes:
the receiving module is used for receiving login authentication information of a user;
the authentication module is used for comparing the login authentication information with preset login information and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module receives the login authentication information of the user again;
and the output module is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result so as to enable a user to read and write the file in the storage space.
Preferably, in the recording module, the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
The invention has the beneficial technical effects that:
1. the storage device based on data encryption is matched with an encryption computer for use, and authorization information of the storage device is set in the storage device through a preset module so that the storage device and workers perform corresponding operations according to the authorization information;
when the storage device is used, after the storage device is inserted into a corresponding interface of the encryption computer, the storage device establishes a data transmission channel with the encryption computer through an interface module, then a detection module arranged on the storage device detects the connection state with the encryption computer, and after the connection is successful, the address information of the encryption computer is obtained; matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module through a matching module, displaying an authentication operation interface on the encryption computer after successful matching, or disconnecting the connection with the encryption computer; then, after login authentication information of a user is input through a login module, a storage space corresponding to the verification result is displayed on the encryption computer;
in the process, the address information of the encryption computer with the storage device capable of data interaction is stored through the preset module, so that after the storage device establishes a data transmission channel with the encryption computer through the interface module, whether the encryption computer has an access right can be identified through the detection module and the matching module, when the matching is successful, the next operation is carried out, otherwise, the connection is disconnected, and the process can effectively avoid the access of the storage device without the right to the encryption computer; the process is combined with the authentication process of the login module, so that the security access mechanism of the encryption computer is improved; meanwhile, in the invention, the authorization information on the preset module comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; after the authentication is passed, the login module displays the storage space corresponding to the verification result on the encryption computer, so that when the device is used, the data files needing interaction can be stored in the accessible storage space, a user can only process the files in the storage space after logging in, the risk of cross leakage caused by extra copied files in the data interaction process of the traditional storage device and the encryption computer can be effectively solved, and the practicability is strong.
2. According to the invention, by setting the maximum login times, data leakage caused by embezzlement of the storage equipment by others can be effectively prevented, and the safety is high; when the storage device is locked due to the fact that the password is forgotten, the storage device can be connected with the management background, and the storage device is unlocked through the initialization module.
3. In the invention, the operation log of the user can be recorded and encrypted through the recording module and the data encryption and decryption module, so that a manager can identify the operation information of the user through the access to the operation record at the later stage, the management of the encrypted information is facilitated, and the illegal operation of the user is effectively prevented.
Drawings
Fig. 1 is a schematic structural diagram of a storage device based on data encryption according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a storage device based on data encryption according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a storage device based on data encryption according to a third embodiment of the present invention;
in the figure: 1 is an interface module, 2 is a detection module, 3 is a matching module, 4 is a login module, 5 is a preset module, 6 is a storage module, 7 is a data encryption and decryption module, 8 is an initialization module, 9 is a recording module, and 10 is a protection module; reference numeral 41 denotes a receiving module, 42 denotes an authenticating module, and 43 denotes an outputting module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments, but not all embodiments, of the present invention; all other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Next, the present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially according to the general scale for convenience of illustration when describing the embodiments of the present invention, and the drawings are only examples, which should not limit the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
An embodiment of the storage device based on data encryption is described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a schematic structural diagram of a storage device based on data encryption according to an embodiment of the present invention; as shown in fig. 1, a storage device based on data encryption for use with an encryption computer, the storage device comprising:
the interface module 1 is used for establishing a data transmission channel with the encryption computer;
the detection module 2 is used for detecting the connection state of the storage device and the encryption computer, and acquiring the address information of the encryption computer after the connection is successful;
the matching module 3 is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the presetting module 5, displaying an authentication operation interface on the encryption computer after the matching is successful, or disconnecting the connection with the encryption computer;
the login module 4 is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module 5 is provided with authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module 6 on which a plurality of storage spaces are provided;
and the data encryption and decryption module 7 is used for encrypting and decrypting the data file written into or read out of the storage space.
In this embodiment, the login information of the user may include: a user name, a password corresponding to the user name, a fingerprint, and the like.
The storage device based on data encryption provided by the embodiment is used in cooperation with an encryption computer, and authorization information of the storage device is set in the storage device through a preset module, so that the storage device and a worker perform corresponding operations according to the authorization information;
when the storage device is used, after the storage device is inserted into a corresponding interface of the encryption computer, the storage device establishes a data transmission channel with the encryption computer through an interface module, then a detection module arranged on the storage device detects the connection state with the encryption computer, and after the connection is successful, the address information of the encryption computer is obtained; matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module through a matching module, displaying an authentication operation interface on the encryption computer after successful matching, or disconnecting the connection with the encryption computer; then, after login authentication information of a user is input through a login module, a storage space corresponding to the verification result is displayed on the encryption computer;
in the process, the address information of the encryption computer with the storage device capable of data interaction is stored through the preset module, so that after the storage device establishes a data transmission channel with the encryption computer through the interface module, whether the encryption computer has an access right can be identified through the detection module and the matching module, when the matching is successful, the next operation is carried out, otherwise, the connection is disconnected, and the process can effectively avoid the access of the storage device without the right to the encryption computer; the process is combined with the authentication process of the login module, so that the security access mechanism of the encryption computer is improved; meanwhile, in the invention, the authorization information on the preset module comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; after the authentication is passed, the login module displays the storage space corresponding to the verification result on the encryption computer, so that when the device is used, the data files needing interaction can be stored in the accessible storage space, a user can only process the files in the storage space after logging in, the risk of cross leakage caused by extra copied files in the data interaction process of the traditional storage device and the encryption computer can be effectively solved, and the practicability is strong.
Specifically, the login module 4 includes:
a receiving module 41, configured to receive login authentication information of a user;
the authentication module 42 is used for comparing the login authentication information with preset login information, and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module 41 receives the login authentication information of the user again;
and the output module 43 is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result, so that the user can read and write the file in the storage space.
Further, in this embodiment, a storage device based on data encryption further includes: the initialization module 8 is used for initializing the storage device and writing the authorization information into the storage device; and unlocking the storage device when the storage device is locked.
In the embodiment, by setting the maximum login times, data leakage caused by embezzlement of the storage equipment by others can be effectively prevented, and the safety is high; when the storage device is locked due to the fact that the password is forgotten, the storage device can be connected with the management background, and the storage device is unlocked through the initialization module.
Example two
On the basis of the first embodiment, a storage device based on data encryption further comprises: the recording module 9 is used for recording operation log information of a user;
the data encryption and decryption module 7 further comprises: used for encrypting and decrypting the operation log information.
Specifically, in the recording module 9, the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
In the embodiment, the operation log of the user can be recorded and encrypted through the recording module and the data encryption and decryption module, so that a manager can identify the operation information of the user through the access to the operation record at the later stage, the management of the encrypted information is facilitated, and the illegal operation of the user is effectively prevented.
EXAMPLE III
On the basis of the first embodiment, a storage device based on data encryption further comprises: and the protection module 10 is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
Specifically, the protection module 10 further includes: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
In this embodiment, in order to improve the security of data transmission, the protection module may identify a network connection state of the encryption computer, and disconnect a communication connection between the storage device and the encryption computer when the encryption computer accesses the internet, so as to prevent encrypted data from flowing into the internet under the clamping of other illegal software.
According to the invention, through managing the encryption computer with the storage device capable of interacting and managing the operable storage space of the storage device, cross leakage caused by the connection of the storage device and the encryption computer in the process can be effectively prevented, and the safety is high.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. For book
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A data encryption based storage device for use with an encryption computer, comprising: the storage device includes:
the interface module (1) is used for establishing a data transmission channel with the encryption computer;
the detection module (2) is used for detecting the connection state of the storage equipment and the encryption computer, and acquiring the address information of the encryption computer after the connection is successful;
the matching module (3) is used for matching the acquired address information of the encryption computer with the address information of the encryption computer in the preset module (5), and displaying an authentication operation interface on the encryption computer after the matching is successful, or disconnecting the connection with the encryption computer;
the login module (4) is used for receiving login authentication information of a user, and after the authentication is passed, a storage space corresponding to the verification result is displayed on the encryption computer;
the preset module (5) is provided with authorization information, and the authorization information comprises: address information, user login information, operation authority information and storage space information of the encryption computer which are interacted with the data of the storage device; wherein the address information of the encryption computer comprises: a physical address and a network address;
a storage module (6) on which a plurality of storage spaces are provided;
and the data encryption and decryption module (7) is used for encrypting and decrypting the data file written into or read out of the storage space.
2. A data encryption based storage device according to claim 1, wherein: further comprising: the initialization module (8) is used for initializing the storage equipment and writing the authorization information into the storage equipment; and unlocking the storage device when the storage device is locked.
3. A data encryption based storage device according to claim 1, wherein: further comprising: the recording module (9) is used for recording operation log information of a user;
the data encryption and decryption module (7) further comprises: used for encrypting and decrypting the operation log information.
4. A data encryption based storage device according to claim 1, wherein: further comprising: and the protection module (10) is used for identifying the operation authority information of the user so as to enable the user to modify the parameters of the storage device within the operation authority range.
5. A data encryption based storage device according to claim 1, wherein: the protection module (10) further comprises: the system comprises a storage device, a network connection module, a local area network and a network connection module, wherein the storage device is used for storing the network connection state of the encryption computer; otherwise, the communication connection between the storage device and the encryption computer is disconnected.
6. A data encryption based storage device according to claim 1, wherein: the login module (4) comprises:
a receiving module (41) for receiving login authentication information of a user;
the authentication module (42) is used for comparing the login authentication information with preset login information and outputting an authentication result after the authentication is passed; when the authentication is not passed, judging whether the maximum login times are reached, if so, quitting displaying the authentication operation interface, and locking the storage equipment; when the maximum login times are not reached, the authentication operation interface is displayed on the encryption computer again so that the receiving module (41) receives login authentication information of the user again;
and the output module (43) is used for displaying the storage space corresponding to the authentication result on the encryption computer according to the authentication result so as to enable a user to read and write the file in the storage space.
7. A data encryption based storage device according to claim 3, wherein: in the recording module (9), the operation log information includes: and recording modification of the original files stored in the storage setting and recording access to the files in the encryption computer.
CN202110642555.6A 2021-06-09 2021-06-09 Storage device based on data encryption Pending CN113239412A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110642555.6A CN113239412A (en) 2021-06-09 2021-06-09 Storage device based on data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110642555.6A CN113239412A (en) 2021-06-09 2021-06-09 Storage device based on data encryption

Publications (1)

Publication Number Publication Date
CN113239412A true CN113239412A (en) 2021-08-10

Family

ID=77137393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110642555.6A Pending CN113239412A (en) 2021-06-09 2021-06-09 Storage device based on data encryption

Country Status (1)

Country Link
CN (1) CN113239412A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632081A (en) * 2013-11-15 2014-03-12 深圳市江波龙电子有限公司 Encrypted storage device and authentication system and authentication method thereof
CN105956496A (en) * 2016-06-21 2016-09-21 新昌县七星街道明盛模具厂 Security and secrecy method for sharing storage files
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632081A (en) * 2013-11-15 2014-03-12 深圳市江波龙电子有限公司 Encrypted storage device and authentication system and authentication method thereof
CN105956496A (en) * 2016-06-21 2016-09-21 新昌县七星街道明盛模具厂 Security and secrecy method for sharing storage files
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment

Similar Documents

Publication Publication Date Title
US8918633B2 (en) Information processing device, information processing system, and program
EP1860590B1 (en) Posture-based data protection
US20190050598A1 (en) Secure data storage
US20040228487A1 (en) Content reading apparatus
US8694799B2 (en) System and method for protection of content stored in a storage device
US20080195750A1 (en) Secure cross platform auditing
CN111464561B (en) Data ferry management system
CN110443047B (en) Data exchange group system and method
CN116318685B (en) Data security exchange system of mobile storage equipment
KR20050053569A (en) Document preservation authority endowment method
CN111539042B (en) Safe operation method based on trusted storage of core data files
KR100819382B1 (en) Digital Information Storage System, Digital Information Security System, Method for Storing Digital Information and Method for Service Digital Information
CN101777097A (en) Monitorable mobile storage device
US20090024844A1 (en) Terminal And Method For Receiving Data In A Network
KR100750697B1 (en) Digital document preservation system having a share memory for user access function and document transaction method used the system
CN201805447U (en) Electronic information management platform system of Intranet
CN113239412A (en) Storage device based on data encryption
CN101778094B (en) Mobile storage system used for monitoring
CN101424898B (en) Image forming apparatus and image forming system
US8621231B2 (en) Method and server for accessing an electronic safe via a plurality of entities
CN113221139A (en) Electronic information encryption method
CN113342896A (en) Scientific research data security protection system based on cloud fusion and working method thereof
CN111737722B (en) Method and device for safely ferrying data between intranet terminals
CN118965332A (en) File transfer method and system for medical detection data
CN115438358B (en) Controlled file encryption method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210810