CN116662225A - Data storage device, data interaction system and data interaction method - Google Patents

Data storage device, data interaction system and data interaction method Download PDF

Info

Publication number
CN116662225A
CN116662225A CN202310453058.0A CN202310453058A CN116662225A CN 116662225 A CN116662225 A CN 116662225A CN 202310453058 A CN202310453058 A CN 202310453058A CN 116662225 A CN116662225 A CN 116662225A
Authority
CN
China
Prior art keywords
data storage
storage device
data
electronic device
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310453058.0A
Other languages
Chinese (zh)
Inventor
吕志恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202310453058.0A priority Critical patent/CN116662225A/en
Publication of CN116662225A publication Critical patent/CN116662225A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography

Abstract

The application discloses a data storage device, a data interaction system and a data interaction method. The data storage device comprises a body, a storage module arranged on the body, a communication module arranged on the body and a processor arranged on the body. The storage module is used for storing data. The communication module is used for establishing communication between the data storage device and external electronic equipment, and sends an authentication notification to the electronic equipment when the communication module receives a connection request of the electronic equipment. In the event that the authentication passes, the processor is configured to control the electronic device to be permitted to access the data storage device; in case the authentication is not passed, the processor is configured to control not to allow the electronic device to access the data storage. In the application, the electronic equipment can not access the data storage device under the condition that the authentication is not passed, so that the data stored in the data storage device can be prevented from being leaked when the data storage device is lost, and the confidentiality of the data storage device is improved.

Description

Data storage device, data interaction system and data interaction method
Technical Field
The present application relates to the field of data storage technologies, and in particular, to a data storage device, a data interaction system, and a data interaction method.
Background
In recent years, with the continuous development of electronic devices such as mobile phones, tablet computers, notebook computers, etc., the demand of users for storage space of electronic devices has also increased. Currently, the existing electronic devices on the market can backup the data in the electronic device by adding a data storage device, and restore the data backed up in the data storage device to the electronic device when needed, so as to solve the problem of insufficient storage space of the electronic device. However, the conventional data storage device is generally not provided with an encryption function, and if the data storage device is lost, data stored in the data storage device is easily leaked, resulting in poor confidentiality of the data storage device.
Disclosure of Invention
The embodiment of the application provides a data storage device, a data interaction system and a data interaction method.
The data storage device of the embodiment of the application comprises a body, a storage module arranged on the body, a communication module arranged on the body and a processor arranged on the body. The storage module is used for storing data; the communication module is used for establishing communication between the data storage device and external electronic equipment, and sending an authentication notification to the electronic equipment under the condition that the communication module receives a connection request of the electronic equipment; in the event that authentication is passed, the processor is configured to control the electronic device to be permitted to access the data storage device; in case the authentication is not passed, the processor is configured to control not to allow the electronic device to access the data storage.
In some embodiments, the communication module comprises a bluetooth module, a short-range wireless communication technology module, or a data interface.
In some embodiments, the communication module is further configured to receive verification information fed back by the electronic device, and the processor is configured to analyze whether the verification information matches preset authentication information; the processor confirms that authentication passes under the condition that the verification information is matched with the authentication information; in the event that the verification information does not match the authentication information, the processor confirms that authentication is not passed.
In some embodiments, the storage module is further configured to store the authentication information.
In some embodiments, the authentication information is a cryptographic template and the verification information is cryptographic information.
In some embodiments, the authentication information is a fingerprint template and the verification information is fingerprint information.
In some embodiments, the processor is further configured to allow the electronic device to backup data in the storage module and restore data in the storage module to the electronic device, in the event that the processor controls allowing the electronic device to access the data storage.
In some embodiments, the data storage device further comprises an indicator light disposed on the body, the indicator light being configured to reflect a current state of the data storage device; or to reflect the connection status and/or authentication result of the data storage device.
The data interaction system of the embodiment of the application comprises the data storage device and the electronic equipment of any one of the embodiments. Communication can be established between the electronic device and the data storage means.
In some embodiments, the electronic device is further configured to backup the data backed up in the storage module to the cloud.
In some embodiments, an application program is provided in the electronic device, where the application program is configured to issue a control instruction to the data storage device, and the data storage device performs a corresponding operation according to the control instruction.
The data interaction method of the embodiment of the application comprises the steps that the electronic equipment sends a connection request to the data storage device; the data storage device sends an authentication notice to the electronic equipment according to the connection request; the data storage device acquires verification information of the electronic equipment; the data storage device analyzes the verification information and preset authentication information; in case the authentication information matches the authentication information, the data storage means allows the electronic device to access; in the event that the authentication information does not match the authentication information, the data storage device does not allow access to the electronic device.
In the data storage device, the data interaction system and the data interaction method of the embodiment of the application, when the communication module of the data storage device receives a connection request of the electronic equipment, the communication module sends an authentication notification to the electronic equipment, and when the authentication is passed, the electronic equipment can access the data storage device; under the condition that the authentication is not passed, the electronic equipment cannot access the data storage device, so that leakage of data stored in the data storage device when the data storage device is lost can be avoided, and confidentiality of the data storage device is improved.
Additional aspects and advantages of embodiments of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of embodiments of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic diagram of a data interaction system in accordance with certain embodiments of the present application;
FIG. 2 is a schematic diagram of a communication module of the data storage device in the data interaction system shown in FIG. 1;
FIG. 3 is a schematic view of an application scenario of a data interaction method according to some embodiments of the present application;
FIG. 4 is a schematic view of a scenario of an application of the electronic device in the data interaction system shown in FIG. 1;
FIG. 5 is a flow chart of a data interaction method according to some embodiments of the application.
Description of main reference numerals:
1000. a data interaction system;
100. a data storage device; 200. an electronic device; 300. and (3) cloud end.
10. A body; 20. a storage module; 30. a communication module; 31. a Bluetooth module; 33. a short-distance wireless communication technology module; 35. a data interface; 40. a processor; 50. an indicator light.
Detailed Description
Embodiments of the present application are further described below with reference to the accompanying drawings. The same or similar reference numbers in the drawings refer to the same or similar elements or elements having the same or similar functions throughout. In addition, the embodiments of the present application described below with reference to the drawings are exemplary only for explaining the embodiments of the present application and are not to be construed as limiting the present application.
In recent years, with the continuous development of electronic devices such as mobile phones, tablet computers, notebook computers, etc., the demand of users for storage space of electronic devices has also increased. Currently, the existing electronic devices on the market can backup the data in the electronic device by adding a data storage device, and restore the data backed up in the data storage device to the electronic device when needed, so as to solve the problem of insufficient storage space of the electronic device. However, the conventional data storage device is generally not provided with an encryption function, and if the data storage device is lost, data stored in the data storage device is easily leaked, resulting in poor confidentiality of the data storage device. In order to solve the above problems, the present application provides a data storage device 100 (shown in fig. 1), a data interaction system 1000 (shown in fig. 1), and a data interaction method (shown in fig. 4).
Referring to fig. 1, a data interaction system 1000 according to an embodiment of the present application includes a data storage device 100 and an electronic apparatus 200. Communication can be established between the electronic device 200 and the data storage 100.
Specifically, in some embodiments, in the case where communication is established between the electronic device 200 and the data storage device 100, the electronic device 200 is able to send a connection request to the data storage device 100, the data storage device 100 sends an authentication notification to the electronic device 200 after receiving the connection request, and in the case where authentication is passed, the electronic device 200 is able to access the data storage device 100; in case the authentication is not passed, the electronic device 200 is not able to access the data storage 100. Where the electronic device 200 is capable of accessing the data storage device 100, the electronic device 200 is capable of backing up data to the data storage device 100, or restoring data in the data storage device 100 to the electronic device 200, or performing other operations (e.g., copying or deleting, etc.) on data in the data storage device 100. It should be noted that, in some embodiments, the electronic device 200 may be a mobile phone, a tablet computer, a camera, a personal digital assistant, a wearable device, a smart robot, a smart vehicle, etc., where the wearable device includes a smart bracelet, a smart watch, smart glasses, etc.
In some embodiments, the data storage device 100 is capable of establishing communication with different electronic devices 200, thereby enabling data interaction between the different electronic devices 200. For example, first, the data storage device 100 establishes communication with the first electronic apparatus, and in the case that authentication is passed, data within the first electronic apparatus can be backed up into the data storage device 100. Then, the same data storage device 100 establishes communication with the second electronic device, and in case that authentication is passed, the data of the first electronic device stored in the data storage device 100 can be downloaded (restored) to the second electronic device, thereby realizing data interaction between the first electronic device and the second electronic device. Wherein the first electronic device is different from the second electronic device.
If communication is established between the electronic device 200 and the data storage device 100 through Wi-Fi, in the process that authentication is passed and data in the electronic device 200 is backed up to the data storage device 100, the Wi-Fi of the electronic device 200 can only perform data transmission, but cannot perform network operation through Wi-Fi, so that normal use of the electronic device 200 by a user is affected. In addition, in the case of poor Wi-Fi signals, the speed of backing up the data in the electronic device 200 to the data storage device 100 is slow, and the data is easy to be lost in the backup process, so that the data integrity is affected.
Thus, in an embodiment of the present application, communication between the electronic device 200 and the data storage device 100 can be established through bluetooth, a near field communication technology (Near Field Communication, NFC) or the data interface 35. The data interface 35 may include USB Type-A, mini-USB, micro-USB, USB Type-B or USB Type-C, and the like, and is not limited herein. Therefore, the data interaction between the electronic equipment 200 and the data storage device 100 does not need to occupy Wi-Fi, so that the influence of network speed is avoided, and the speed of the data interaction between the electronic equipment 200 and the data storage device 100 is further improved. In addition, the communication between the electronic device 200 and the data storage device 100 is established by using bluetooth, NFC or the data interface 35, so that the loss of data during the transmission process can be prevented, and the integrity of the data can be ensured.
In some embodiments, the data interaction system 1000 can also include a cloud 300. The electronic device 200 is further configured to backup the data backed up in the storage module 20 to the cloud 300.
Specifically, in some embodiments, the electronic device 200 may be communicatively connected to the cloud 300 through Wi-Fi, so that data in the electronic device 200 can be backed up to the cloud 300, or the data in the cloud 300 can be restored to the electronic device 200, or other operations (such as copying or deleting) can be performed on the data in the cloud 300. The data in the electronic device 200 is backed up to the data storage device 100 and the cloud 300, so that in the case that the data storage device 100 is lost, the data stored in the data storage device 100 will not leak, and the confidentiality of the data storage device 100 can be improved. In addition, if the data storage device 100 is lost, the user can still use the data backed up in the cloud 300, thereby improving the user experience.
With continued reference to fig. 1, the data storage device 100 according to the embodiment of the application includes a main body 10, a storage module 20 disposed on the main body 10, a communication module 30 disposed on the main body 10, and a processor 40 disposed on the main body 10. The storage module 20 is used for storing data. The communication module 30 is configured to establish communication between the data storage device 100 and the external electronic device 200, and in a case where the communication module 30 receives a connection request of the electronic device 200, the communication module 30 sends an authentication notification to the electronic device 200. In case the authentication passes, the processor 40 is configured to control the access of the electronic device 200 to the data storage 100; in case the authentication is not passed, the processor 40 is arranged for controlling the electronic device 200 not to be allowed to access the data storage 100.
Referring to fig. 2, in some embodiments, the communication module 30 may include a bluetooth module 31, an NFC module 33, or a data interface 35. The data interface 35 may include USB Type-A, mini-USB, micro-USB, USB Type-B or USB Type-C, and the like, and is not limited herein.
Specifically, if the communication module 30 is the bluetooth module 31, the bluetooth module 31 is turned on to receive a connection request from the electronic device 200 when the data storage device 100 is turned on, the bluetooth module 31 can send an authentication notification to the electronic device 200 according to the connection request, and the electronic device 200 can access the data storage device 100 when the authentication is passed; in case the authentication is not passed, the electronic device 200 is not able to access the data storage 100.
If the communication module 30 is the NFC module 33, the NFC module 33 is started when the data storage device 100 is turned on, and when the electronic device 200 is placed on the body 10, that is, when the electronic device 200 is in contact with the NFC module 33, the NFC module 33 can send an authentication notification to the electronic device 200, and when the authentication is passed, the electronic device 200 can access the data storage device 100; in case the authentication is not passed, the electronic device 200 is not able to access the data storage 100.
If the communication module 30 is the data interface 35 and the data interface 35 is USB Type-C, the communication module 30 may send an authentication notification to the electronic device 200 when the data storage device 100 is turned on and the electronic device 200 is connected to the data storage device 100 through a USB Type-C data line, and the electronic device 200 may access the data storage device 100 when the authentication is passed; in case the authentication is not passed, the electronic device 200 is not able to access the data storage 100.
Referring to fig. 1 and 3, in some embodiments, the communication module 30 is further configured to receive verification information fed back by the electronic device 200, and the processor 40 is configured to analyze whether the verification information matches preset authentication information. In case that the verification information matches the preset authentication information, the processor 40 confirms that the authentication passes; in the event that the verification information does not match the authentication information, the processor 40 confirms that the authentication is not passed.
Specifically, in the case where the communication module 30 transmits an authentication notification to the electronic device 200, the electronic device 200 can feed back verification information according to the authentication notification, and in the case where the verification information matches preset authentication information, the processor 40 confirms that the authentication is passed, and the electronic device 200 can access the data storage 100; in case the verification information does not match the preset authentication information, the processor 40 confirms that the authentication is not passed and the electronic device 200 is not able to access the data storage 100. It should be noted that, in some embodiments, when the verification information does not match the preset authentication information, the processor 40 confirms that the authentication is not passed, the electronic device 200 can feed back new verification information again, the processor 40 analyzes whether the new verification information matches the preset authentication information, and when the new verification information matches the preset authentication information, the processor 40 confirms that the authentication is passed, and the electronic device 200 can access the data storage device 100; in case the new authentication information does not match the preset authentication information, the processor 40 confirms that the authentication is not passed and the electronic device 200 is not able to access the data storage 100.
In some implementations, the authentication information is user input. Specifically, in the case where the communication module 30 transmits an authentication notification to the electronic device 200, the user can verify information through the electronic device 200 data, the processor 40 analyzes whether authentication information preset for the verification information is matched, and if the verification information is matched with the preset authentication information, the electronic device 200 can access the data storage 100. In other embodiments, the verification information is stored in the cloud 300 in communication with the electronic device 200. In still other embodiments, the authentication information is stored in the electronic device 200. The verification information stored in the electronic device 200 can be updated and replaced by the verification information stored in the cloud 300 in communication with the electronic device 200. It should be noted that, in some embodiments, in a case where the electronic device 200 and the data storage device 100 pass authentication, the electronic device 200 and the data storage device 100 need not send an authentication notification to the electronic device 200 when the electronic device 200 and the data storage device 100 establish communication next time, and the electronic device 200 can directly access the data storage device 100.
In some embodiments, the storage module 20 is also used to store authentication information. In particular, the authentication information may be pre-stored in the memory module 20 and may be read by the processor 40. For example, the authentication information may be provided in the memory module 20 prior to the output of the data storage device 100. For another example, authentication information is not set in the initial storage module 20, and when the electronic device 200 accesses the data storage device 100 for the first time, the electronic device 200 can add authentication information to the storage module 20. The setting of the authentication information can enable the electronic device 200 to access the data storage device 100 only when the authentication information is successfully matched with the verification information, so that leakage of data in the data storage device 100 is reduced or even avoided, and confidentiality of the data storage device 100 is improved. It should be noted that, in some embodiments, in a case where the verification information matches the preset authentication information, that is, in a case where the electronic device 200 can access the data storage device 100, the electronic device 200 can perform operations (such as updating, deleting, or adding) on the authentication information.
In some implementations, the authentication information can be a cryptographic template and the verification information is cryptographic information. Specifically, in some embodiments, the cryptographic templates are stored in the memory module 20. When the communication module 30 transmits an authentication notification to the electronic device 200, the user can input password information and use the password information as authentication information, and the processor 40 analyzes whether the authentication information matches the password template. For example, the password information may be a password of a certain number of digits (e.g., a six-digit number), and after the communication module 30 detects a six-digit password entered by the user, the processor 40 may be able to analyze whether the six-digit password matches the password template. In the case that the six-digit password matches the password template, the processor 40 confirms that the authentication passes, and the electronic device 200 can access the data storage apparatus 100; in the event that the six-digit password does not match the password template, the processor 40 confirms that the authentication is not passed and the electronic device 200 is not able to access the data storage 100.
In other embodiments, the authentication information may be a fingerprint template and the verification information is fingerprint information. In particular, in some embodiments, a user may enter a fingerprint template on the data storage device 100, the fingerprint template being stored in the storage module 20. When the communication module 30 transmits an authentication notification to the electronic device 200, the user can input fingerprint information and use the fingerprint information as authentication information, and the processor 40 analyzes whether the authentication information matches the password template. Since the fingerprint information has stability and uniqueness, the reliability of authentication can be improved by using the fingerprint information as authentication information, thereby improving the confidentiality of the data storage device 100. It should be noted that, in some embodiments, the authentication information may be only a password template, and the verification information may be only password information; or the authentication information can be only a fingerprint template, and the verification information can be only fingerprint information; or the authentication information can be a password template and a fingerprint template, and the verification information can be password information and fingerprint information.
Referring to fig. 1, in some embodiments, where the processor 40 controls to allow the electronic device 200 to access the data storage device 100, the processor 40 is further configured to allow the electronic device 200 to backup data in the storage module 20 and restore data in the storage module 20 to the electronic device 200.
Specifically, in the case where the electronic device 200 is capable of accessing the data storage device 100, the electronic device 200 can upload (back up) data to the data storage device 100, or download (restore) data in the data storage device 100 to the electronic device 200, or perform other operations (e.g., copy or delete, etc.) of the data in the data storage device 100.
In some embodiments, where the electronic device 200 has access to the data storage device 100, the electronic device 200 is also capable of performing encryption processing on data in the data storage device 100. When the electronic device 200 requests access to the encrypted data in the data storage device 100, the communication module 30 can send an authentication notification to the electronic device 200, and when the authentication is passed, the electronic device 200 can control (access, upload, download, delete, etc.) the encrypted data. For example, when the electronic device 200 uploads the photos, videos, and address books into the storage module 20 in the data storage device 100, the electronic device 200 can encrypt a portion of the data in the photos, videos, and address books in the storage module 20. When the electronic device 200 accesses the encrypted data next time, the electronic device 200 needs to feed back the verification information to the communication module 30, and the processor 40 analyzes whether the verification information matches the authentication information, and when the verification information matches the authentication information, the electronic device 200 can access the encrypted data. In some embodiments, the verification information is the same as the verification information in the above embodiments, and in this case, the authentication information is the same as the authentication information in the above embodiments; or the verification information is different from the authentication information in the above embodiment, and at this time, the authentication information is different from the authentication information in the above embodiment.
With continued reference to fig. 1, in some embodiments, the data storage device 100 may further include an indicator light 50, where the indicator light 50 is disposed on the body 10, and the indicator light 50 is used to reflect the current state of the data storage device 100; or to reflect the connection status and/or authentication result of the data storage device 100. Specifically, the setting of the indicator light 50 can facilitate the user to determine the working state of the data storage device 100, thereby facilitating the use of the data storage device 100 by the user, and preventing the user from performing an incorrect operation, for example, disconnecting the connection between the data storage device 100 and the electronic apparatus 200 when the data storage device 100 is still in the backup state, resulting in a backup failure; on the other hand, the appearance effect of the data storage device 100 can be improved.
In some embodiments, the indicator light 50 may be circular, square, oval, elongated, etc. In the embodiment of the present application, the shape of the indicator lamp 50 is described as a circular ring. The indicator lamp 50 may be an RGB atmosphere lamp.
In some embodiments, the indicator light 50 may reflect the current state of the data storage device 100 by employing different illumination patterns, or reflect the connection state and/or authentication result of the data storage device 100. Wherein. The light emission form of the indicator lamp 50 may include, but is not limited to, light emission color, light emission state (normally bright or blinking, etc.), light emission area, etc. It should be noted that, in some embodiments, the light emitting form of the indicator light 50 may be pre-stored in the memory module 20 and may be read by the processor 40. For example, the light emitting form of the indicator light 50 may be disposed in the memory module 20 prior to the output of the data storage device 100. The processor 40 is capable of controlling the light emission pattern of the indicator light 50 according to the different operating states of the data storage device 100.
In some embodiments, indicator light 50 may be in a flashing state while data storage device 100 is in a backup state. Specifically, in the case that the authentication is passed, the electronic device 200 can backup the data to the storage module 20 of the data storage device 100, and at this time, the indicator light 50 may flash continuously. In other embodiments, the indicator light 50 determines the area in which the indicator light 50 is on according to the backup progress while the data storage device 100 is in the backup state. Specifically, in the case that the authentication is passed, the electronic device 200 can backup the data to the storage module 20 of the data storage apparatus 100, and at this time, the indicator light 50 may reflect the backup progress through the difference of the on areas of the indicator light 50. For example, in the case where the backup progress is 50%, half of the area of the indicator lamp 50 is in an on state, that is, half of the area of the indicator lamp 50 can emit light; in the case where the backup progress is 75%, the 3/4 area of the indicator lamp 50 is turned on, i.e., the 3/4 area of the indicator lamp 50 can emit light. In still other embodiments, when the communication module 30 receives a connection request of the electronic device 200, and the communication module 30 sends an authentication notification to the electronic device 200, and the authentication is not passed, the indicator light 50 may be in a normally-on state and emit red light; in the case that the communication module 30 receives the connection request of the electronic device 200 and the communication module 30 transmits the authentication notification to the electronic device 200, and the authentication is passed, the indication lamp 50 may be in a normally-on state and emit green light. It will be appreciated that the above embodiments are merely exemplary, and that indicator light 50 may be responsive to the current state of data storage device 100 in a variety of different light emission forms; or to the connection status and/or authentication result of the data storage device 100, not illustrated herein.
It will be appreciated that in some embodiments, the electronic device 200 is able to change the form of illumination of the indicator light 50 in case the verification information matches the preset authentication information, i.e. in case the electronic device 200 has access to the data storage 100. For example, when the data storage device 100 is turned on, the indicator lamp 50 is in a blinking state and emits blue light. In the case where the electronic apparatus 200 can access the data storage device 100, the electronic apparatus 200 can change the light emission form of the indicator lamp 50 to be normally on and emit red light, so that the indicator lamp 50 is in a normally on state and emits red light when the data storage device 100 is turned on next time.
Referring to fig. 1, 3 and 4, in some embodiments, an application 210 may be provided in the electronic device 200, where the application 210 is configured to issue a control instruction to the data storage device 100, and the data storage device 100 performs a corresponding operation according to the control instruction.
Specifically, in the case that the authentication is passed, the electronic device 200 can access the data storage device 100, and at this time, the electronic device 200 can issue a control instruction to the data storage device 100 through the application 210, so that the data storage device 100 performs a corresponding operation according to the control instruction. In some embodiments, the control instructions include, but are not limited to, clearing data, setting an indicator light, immediately backing up, starting restore, backing up a cloud disk, setting a security password (authentication information), or automatic backup time, etc.
More specifically, in the case where the control instruction is "immediate backup", the user may click on "immediate backup" (shown in the left diagram in fig. 4) in the application 210 to issue an instruction of "immediate backup" to the data storage device 100, at which time, the selected data in the electronic apparatus 200 can be backed up to the storage module 20 of the data storage device 100; or all data in the electronic device 200 can be backed up to the memory module 20 of the data storage apparatus 100.
In the case that the control instruction is "start restore", the user may click on "start restore" in the application 210 (shown in the left diagram in fig. 4) to issue the instruction of "start restore" to the data storage device 100, where the selected data in the storage module 20 of the data storage device 100 can be restored to the electronic apparatus 200; or all of the data in the memory module 20 of the data storage device 100 can be restored to the electronic apparatus 200.
In the case that the control instruction is "backup cloud disc", the user may click on "backup cloud disc" (shown in the left diagram in fig. 4) in the application 210 to issue the instruction of "backup cloud disc" to the data storage device 100, where at this time, the selected data in the electronic device 200 may be backed up to the storage module 20 and the cloud disc 300 of the data storage device 100; or all data in the electronic device 200 can be backed up to the storage module 20 and the cloud disk 30 of the data storage apparatus 100; or selected data in the storage module 20 of the data storage device 100 can be backed up to the cloud disk 300; or all data in the storage module 20 of the data storage device 100 can be backed up to the cloud disk 300.
In the case where the control instruction is "set indicator light", the user may click on "indicator light" (shown in the left diagram of fig. 4) in the application 210 to issue an instruction of "set indicator light" to the data storage device 100, at which time the user may change the light emission form (e.g., light emission color, light emission state, light emission area, etc.) of the indicator light 50.
In the case where the control instruction is "clear data", the user may click on "clear" in the application 210 (shown in the left diagram of fig. 4) to issue an instruction of "clear data" to the data storage device 100, at which point the user may selectively clear data in the storage module 20 of the data storage device 100.
In the case where the control instruction is "security password setting", the user may click on "security password setting" in the application 210 (shown in the right diagram in fig. 4) to issue an instruction of "security password setting" to the data storage device 100, at which time the user may operate (e.g., update, delete, or add, etc.) the authentication information.
In the case where the control instruction is "auto backup time", the user may click on "auto backup time" (shown in the right diagram of fig. 4) in the application 210 to issue an instruction of "auto backup time" to the data storage device 100, at which time the user may preset the time for the data storage device to auto backup. Specifically, in the case where the electronic device 200 can access the data storage device 100, the data in the electronic device 200 can be automatically backed up to the data storage device 100 when a preset time arrives; or the data in the data storage device 100 can be automatically backed up to the cloud 300 when a preset time arrives.
When the user can click on "about the data storage device" (shown in the right diagram in fig. 4) in the application 210, the user can view the version information and model number of the data storage device 100.
When the user can click "log out" in the application 210 (shown in the right-hand diagram in fig. 4), the user can log out of the application 210 to disconnect the electronic device 200 from the data storage 100.
Referring to fig. 1 and 5, a data interaction method according to an embodiment of the present application includes:
01: the electronic device 200 transmits a connection request to the data storage 100;
03: the data storage device 100 transmits an authentication notification to the electronic apparatus 200 according to the connection request;
05: the data storage device 100 acquires authentication information of the electronic apparatus 200;
07: the data storage device 100 analyzes whether the verification information matches with preset authentication information;
08: in case the verification information matches the authentication information, the data storage 100 allows the electronic device 200 to access; a kind of electronic device with high-pressure air-conditioning system
09: in case the verification information does not match the authentication information, the data storage device 100 does not allow the electronic apparatus 200 to access.
Specifically, in some embodiments, when the electronic device 200 sends a connection request to the data storage device 100, the data storage device 100 sends an authentication notification to the electronic device 200 according to the connection request, the electronic device 200 feeds back verification information according to the authentication notification, the data storage device 100 obtains the verification information of the electronic device 200, analyzes whether the verification information matches with preset authentication information, and in the case that the verification information matches with the authentication information, the electronic device 200 can access the data storage device 100; in case the verification information does not match the authentication information, the electronic device 200 is not able to access the data storage 100. Where the electronic device 200 is capable of accessing the data storage device 100, the electronic device 200 is capable of backing up data to the data storage device 100, or restoring data in the data storage device 100 to the electronic device 200, or performing other operations (e.g., copying or deleting, etc.) on data in the data storage device 100.
In the data interaction method of the embodiment of the present application, the electronic device 200 can access the data storage device 100 when the verification information matches the authentication information; in the case where the authentication information and the verification information are not matched, the electronic device 200 cannot access the data storage device 100, and thus it is possible to prevent leakage of data stored in the data storage device 100 when the data storage device 100 is lost, thereby improving confidentiality of the data storage device 100.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable storage medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a computer-readable storage medium can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer-readable storage medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, and where the program, when executed, includes one or a combination of the steps of the method embodiments. In addition, each functional unit in the embodiments of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product. The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like.
Although embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives and variations may be made to the above embodiments by those skilled in the art within the scope of the application, which is defined by the claims and their equivalents.

Claims (11)

1. A data storage device, comprising:
a body;
the storage module is arranged on the body and is used for storing data;
the communication module is arranged on the body and is used for establishing communication between the data storage device and external electronic equipment, and the communication module sends an authentication notice to the electronic equipment under the condition that the communication module receives a connection request of the electronic equipment; a kind of electronic device with high-pressure air-conditioning system
A processor arranged on the body, wherein the processor is used for controlling the electronic equipment to be allowed to access the data storage device under the condition that authentication is passed; in case the authentication is not passed, the processor is configured to control not to allow the electronic device to access the data storage.
2. The data storage device of claim 1, wherein the communication module comprises a bluetooth module, a short-range wireless communication technology module, or a data interface.
3. The data storage device of claim 1, wherein the communication module is further configured to receive authentication information fed back by the electronic device, and the processor is configured to analyze whether the authentication information matches preset authentication information;
the processor confirms that authentication passes under the condition that the verification information is matched with the authentication information;
in the event that the verification information does not match the authentication information, the processor confirms that authentication is not passed.
4. A data storage device according to claim 3, wherein the storage module is further configured to store the authentication information.
5. A data storage device according to claim 3, wherein,
the authentication information is a password template, and the verification information is password information; and/or
The authentication information is a fingerprint template, and the verification information is fingerprint information.
6. The data storage device of claim 1, wherein the processor is further configured to allow the electronic device to backup data to the storage module and restore data in the storage module to the electronic device, if the processor controls allowing the electronic device to access the data storage device.
7. The data storage device of claim 1, wherein the data storage device further comprises:
the indicating lamp is arranged on the body and is used for reflecting the current state of the data storage device; or to reflect the connection status and/or authentication result of the data storage device.
8. A data interaction system, comprising:
the data storage device of any one of claims 1-7; a kind of electronic device with high-pressure air-conditioning system
And the electronic equipment can establish communication with the data storage device.
9. The data interaction system of claim 8, wherein the electronic device is further configured to backup the data backed up in the storage module to the cloud.
10. The data interaction system of claim 8, wherein an application program is provided in the electronic device, the application program being configured to issue a control instruction to the data storage device, and the data storage device performing a corresponding operation according to the control instruction.
11. A method of data interaction, comprising:
the electronic equipment sends a connection request to the data storage device;
the data storage device sends an authentication notice to the electronic equipment according to the connection request;
the data storage device acquires verification information of the electronic equipment;
the data storage device analyzes the verification information and preset authentication information;
in case the authentication information matches the authentication information, the data storage means allows the electronic device to access;
in the event that the authentication information does not match the authentication information, the data storage device does not allow access to the electronic device.
CN202310453058.0A 2023-04-24 2023-04-24 Data storage device, data interaction system and data interaction method Pending CN116662225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310453058.0A CN116662225A (en) 2023-04-24 2023-04-24 Data storage device, data interaction system and data interaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310453058.0A CN116662225A (en) 2023-04-24 2023-04-24 Data storage device, data interaction system and data interaction method

Publications (1)

Publication Number Publication Date
CN116662225A true CN116662225A (en) 2023-08-29

Family

ID=87726940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310453058.0A Pending CN116662225A (en) 2023-04-24 2023-04-24 Data storage device, data interaction system and data interaction method

Country Status (1)

Country Link
CN (1) CN116662225A (en)

Similar Documents

Publication Publication Date Title
US6041229A (en) Transferring information
WO2016127606A1 (en) Burning method and burning system
CN105431816A (en) Synchronizing device association data among computing devices
US9898747B2 (en) Information processing system performing synchronization between memory devices and memory devices performing wireless communication
KR20130000343U (en) Data backup device for smartphone
CN103995723A (en) IVI system firmware updating method and device based on mobile storage equipment
CN107943501A (en) Embedded device upgrade method, device, computer equipment and storage medium
US11096042B2 (en) Preprocessing method and device for configuring NFC smart card
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
JP6609471B2 (en) Electronic device, method and program
CN109450997B (en) Data cross-terminal migration method and device, computer equipment and storage medium
US20150079968A1 (en) Information processing method and electronic device
CN116662225A (en) Data storage device, data interaction system and data interaction method
CN110675894B (en) HDCP key online burning method and device and electronic equipment
JP6393171B2 (en) Information processing terminal and control program for information processing terminal
CN111046356A (en) Content access method and device and computer readable storage medium
CN108021967B (en) Method and device for copying intelligent card and computer readable storage medium
KR101919670B1 (en) Control apparatus for use in distributed control system
CN104317233A (en) Programmable display
CN114036491A (en) Software management method, system and storage medium
CN105592440A (en) Intelligent card content management system
JP2006352519A (en) Data backup device, data backup method, and data restoration method
CN108920980B (en) Encryption method, chip and device
CN108319679B (en) Method and device for generating primary key
CN104615507A (en) Backup data batch reduction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination