CN1866154A - Method of using super password to decipher - Google Patents

Method of using super password to decipher Download PDF

Info

Publication number
CN1866154A
CN1866154A CN 200510073653 CN200510073653A CN1866154A CN 1866154 A CN1866154 A CN 1866154A CN 200510073653 CN200510073653 CN 200510073653 CN 200510073653 A CN200510073653 A CN 200510073653A CN 1866154 A CN1866154 A CN 1866154A
Authority
CN
China
Prior art keywords
user
computer
storage device
movable storage
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510073653
Other languages
Chinese (zh)
Other versions
CN100374973C (en
Inventor
王元成
杨宇光
马强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005100736533A priority Critical patent/CN100374973C/en
Publication of CN1866154A publication Critical patent/CN1866154A/en
Application granted granted Critical
Publication of CN100374973C publication Critical patent/CN100374973C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosed method to decipher with a super cipher comprises: the first computer receives user command for cipher and displays self cipher; the provider uses received user cipher and pre-set super cipher to obtain the first super cipher and return to user; the first computer uses received user first super cipher and pre-set algorithm same as the provider to obtain the second super cipher, and decides whether the two ciphers same, yes to decipher the data in mobile device. This invention brings convenience to both user and provider.

Description

A kind of method of using super password to decipher
Technical field
The present invention relates to the communication technology, particularly relate to a kind of method of using super password to decipher.
Background technology
At present, a lot of movable storage devices all have encryption function such as portable hard drive, USB flash disk and MP3 etc.After the user saves the data in the movable storage device, if this user wishes and can encrypt the data of being preserved, to prevent that other people from usurping, the encryption function that then can utilize movable storage device (herein and the movable storage device that all refers to have encryption function of movable storage device hereinafter described) to provide, a user cipher to movable storage device input oneself setting, after movable storage device obtains this user cipher, this user cipher is preserved, utilized key and cryptographic algorithm in self that the data that the user preserved are encrypted then.Like this, in subsequent process, if a user wishes and the data of encrypting storing in this movable storage device can be recovered out, then must be at first to password of this movable storage device input, the password that movable storage device is judged the current input of user with self in the user cipher preserved whether identical, if it is identical, then movable storage device is decrypted according to the key in self and the decipherment algorithm data to encrypting storing, thereby recover the actual content of data, if inequality, then movable storage device can not be decrypted the enciphered data that is kept in self.
This shows, encryption function by movable storage device, the user can utilize self set, only come the data that are kept in the movable storage device are carried out encryption and decryption by a user cipher known to self, thereby prevent that other user from usurping the data that are kept in the movable storage device, improved the security of data storage.Yet, in actual use, breaking a code in order to prevent other people, the user cipher that the user sets is not only complexity but also do not have rule normally.Like this, though, user cipher is difficult to be decoded, but, also improved the difficulty of user self memory user cipher simultaneously, make the user to tend to forget the user cipher that oneself sets, can't input with movable storage device in the identical password of user cipher preserved, like this, movable storage device then can not be decrypted the data of encrypting storing in self, thus make the user can't recover own in movable storage device the data of encrypting storing.
May forget the user cipher that oneself sets in order to solve above-mentioned user, make the user can't obtain own in movable storage device the shortcoming of encrypting storing data, the solution of prior art comprises:
Method one: supplier sets a super code in advance in movable storage device, and when this movable storage device is provided, provides this super code to the user who buys this movable storage device, preserves this super code by the user.
In the method, after the user forgets the initial user password, can import the super code of self preserving, movable storage device judges that the super code of user's input is identical with the super code of setting in advance in self after, then the data of encrypting storing in self are decrypted, recover the actual content of data.Like this, just guaranteed that the user under the situation of forgetting the user cipher that oneself is set, still can obtain the actual data content that oneself is kept in the movable storage device.
But, in this method one, if being each different movable storage device, supplier sets different super codes, it is the super code difference that each user preserves, can only use own distinctive super code to come enabling decryption of encrypted to be kept at data in the own movable storage device though can guarantee each user, and can not decipher data in other people movable storage device, guaranteed the security of data storage.But, the super code difference that supplier sets, just mean, supplier must dispose different decrypted programs in each different movable storage device, thereby be unfavorable for that supplier produces in batches movable storage device, and can have additional supply of the cost of discussing after-sales service, damaged supplier's interests;
If being each different movable storage device, supplier sets identical super code, the super code that is each user's preservation is identical, mean that then a user can utilize the super code that oneself obtains and preserve to decipher data in other people movable storage device, thereby can't guarantee the security of storage of subscriber data, damage user's interests.
Method two: supplier sets a super code in advance in movable storage device, and preserves this super code by supplier.
In the method, after forgetting the user cipher of oneself setting as the user, the user must deliver to suppliers with the movable storage device of oneself, utilize the super password to decipher data of being preserved by supplier, recover the actual content of data, to guarantee that the user under the situation of forgetting the user cipher that oneself is set, still can obtain the actual data content that oneself is kept in the movable storage device.
But, in this method two, because super code is grasped in supplier's hand, rather than in the own hand of user, therefore have potential safety hazard, and, the user movable storage device must be delivered to supplier so that maintenance, its process is loaded down with trivial details, for the user has brought great inconvenience, has damaged user's interests.
By above description as can be seen, in the prior art, method one and method two all are to have utilized the predefined super code of supplier to decipher when using super code to be decrypted, but no matter the super code of this setting is kept in user's hand still in supplier's hand, all maintenance provider and user both sides' interests simultaneously.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of method of using super password to decipher, the user can forgotten under the situation that oneself sets user cipher, be decrypted by obtaining super code by first computer of oneself selecting, improved the security of data storage, and help provider-side movable storage device is produced in batches, thereby maintenance customer and supplier both sides' interests.
In order to achieve the above object, technical scheme of the present invention is achieved in that
A kind of method of using super password to decipher may further comprise the steps:
A, first computer receive after the user obtains the instruction of machine code, and the machine code of self is presented to the user;
After B, provider-side received the machine code of first computer that the user sends here, the super code algorithm that utilizes this machine code and be provided with in provider-side in advance calculated first super code, then this first super code is delivered to the user;
After C, first computer receive first super code of user's input, according to machine code and the super code algorithm that in self, be provided with in advance, identical with provider-side of self, calculate second super code, judge then whether first super code is identical with second super code, if it is identical, execution in step D then, otherwise, current flow process finished;
D, first computer are decrypted the data that encryption is stored in the movable storage device.
Before steps A, this method further may further comprise the steps:
A01, movable storage device is linked to each other with first computer, after first computer receives the instruction of user ID key, in the file that the key backup in this movable storage device encrypted partition is set to first computer self, and this file hidden the user;
A02, movable storage device is linked to each other with employed current computer, current computer receives the order of user's data decryption, and wherein, described current computer is first computer or other computer;
A03, current computer prompting user import user cipher, then behind the password that receives user's input, judge whether the password that the user inputs is identical with the predefined user cipher of user, if it is identical, then utilize key and decipherment algorithm in the movable storage device to be decrypted, and finish current flow process, if inequality, execution in step A04;
A04, current computer are deleted the key in the encrypted partition in the movable storage device, or are rewritten as a forbidden digit string;
Described step D specifically comprises: first computer obtains the key that is backed up from steps A 01 described file, and the key that will back up writes in the encrypted partition of movable storage device, and first computer utilizes the key of this backup and the decipherment algorithm of movable storage device that the data of encrypting storing in movable storage device are decrypted.
After first computer receives the instruction of user ID key, and before the key in the movable storage device encrypted partition was backed up in execution, described steps A 01 further comprised: first computer prompting user imports user cipher; After first computer receives the password of the current input of user, whether the password of judging the current input of user is identical with the user cipher that the user sets in movable storage device in advance, if it is identical, then continue to carry out the described step that key in the movable storage device encrypted partition is backed up, otherwise finish current flow process.
After current computer judges that password that the user inputed and the predefined user cipher of user are inequality, and before execution in step A04, described steps A 03 further comprises: current computer judges that whether received the user inputs the number of times of password greater than predefined frequency threshold value, if, execution in step A04 then, otherwise, return steps A 03.
Judge first super code identical with second super code after, and before execution in step D, described step C further comprises: first computer is rewritten as the password that dispatches from the factory of this movable storage device with the predefined user cipher of the user who preserves in the movable storage device, and points out first user can utilize the password to decipher data of dispatching from the factory;
Carrying out first computer is stored in the step that the data in the movable storage device are decrypted to encryption before, described step D further comprises: first computer receives the password of user's input, whether this password of judging user's input is identical with the password that dispatches from the factory of movable storage device, if, then the continuation execution is described is stored in the step that the data in the movable storage device are decrypted to encryption, otherwise, finish current flow process.
As seen, the method for the present invention's proposition has the following advantages:
1, after the user forgets Password, the present invention can or rewrite the deletion of the key in the movable storage device encrypted partition, so, use the super password to decipher data also can only utilize the selected backup of user oneself that first computer of the required key of deciphering is arranged, and can not be other computer, like this, even other wants that the user who usurps enciphered data has decoded the user cipher that this user sets, because the key in the movable storage device encrypted partition is deleted or rewriting, the user who usurps enciphered data also can't determine to back up first computer of the required key of deciphering, also promptly can't obtain the required key of deciphering, thereby can't be decrypted from first computer.In addition, in the present invention, deciphering required super code is that first computer of selecting according to the user in actual use calculates, rather than predefined by supplier in the prior art, has increased the security of data storage.This shows, the present invention utilizes the process of super password to decipher closely to link to each other with first computer that the user selectes, other user can't determine first computer that this is selected, then can't the data of encrypting storing in the movable storage device be decrypted, thereby improved the security of user storage data greatly, safeguarded user's interests.
2, in the present invention, because the first computer difference of the backup keys that different user is selected, so supplier can be under the different prerequisite of the super code that guarantees to calculate for different user, promptly guarantee under the situation of storage of subscriber data security, be the identical decrypted program of all movable storage device configurations, thereby help supplier movable storage device is carried out batch generation and after-sales service etc., safeguarded supplier's interests.
Therefore, the method for the use super password to decipher that the present invention proposes, maintenance customer and supplier both sides' interests simultaneously.
Description of drawings
Fig. 1 is the process flow diagram of the embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with drawings and the specific embodiments.
Fig. 1 is the process flow diagram of the embodiment of the invention.Referring to Fig. 1, the present invention utilizes super code to the process that the data of encrypting storing in movable storage device are decrypted, and specifically may further comprise the steps:
Step 101: first user links to each other first movable storage device with first computer, and to the instruction of first computer input backup keys.
Step 102: first computer points out first user to import user cipher after receiving the backup keys instruction of first user input.
Step 103: after first user inputed a password, first computer obtained this password, and judged whether the user cipher that the current password that obtains and first user preestablish and be kept in first movable storage device is identical, if, then execution in step 104, otherwise, finish current flow process.
Here, first computer is obtaining correct password, promptly be kept at first movable storage device in the identical password of user cipher after, ability execution in step 104, it is the process of follow-up this first movable storage device key of backup, be in order to guarantee the legitimacy of backup keys process, guarantee that promptly the user of present instruction backup movable storage device key is first user who has this first movable storage device, rather than other disabled user.
Step 104: first computer obtains the key of this first movable storage device from the encrypted partition of first movable storage device, and with in the key backup the obtained file under first computer self set path, and this file is hidden the user.
Here, such as, first computer with key backup in self C: Windows lenovo in the miyao file, and first computer file of backup keys is hidden the user is for fear of first user or other user the key that is backed up to be made amendment, cause the required actual key of key that first computer backed up and the deciphering of first movable storage device different, and the consequence that can't decipher.
To step 104, the present invention carries out the process of backup keys on first computer that first user selects in above-mentioned steps 101.First user can select an own often use and stable computer to be used as first computer of backup keys.And first user backup keys on the first own selected computer is in subsequent process, if first user self has forgotten user cipher, then can only obtain the super code that deciphering is used by this first selected computer.That is to say, because it is selected that first computer of backup keys is first user oneself, other people are difficult to know key backup on first computer, also usurp the data of encrypting storing in first movable storage device with regard to being difficult to by the key of this backup, thereby improve the security of data storage.
Step 105: when first user need decipher data in first movable storage device, first user linked to each other first movable storage device with a computer, and to this computer input decryption instructions.
Computer described in this step can be any computer, promptly can be that first computer also can be other computer except that first computer.In addition, for convenience of description, below the computer described in this step is referred to as current computer.
Step 106: current computer points out first user to import user cipher.
Step 107: first user inputs a password, current computer obtains this password, judge then whether this password that is obtained is identical with the user cipher that first user preestablishes and is kept in first movable storage device, if, then carry out the existing process that the data of encrypting storing in first movable storage device is decrypted according to the key in first movable storage device and decipherment algorithm, and finish current flow process, otherwise, execution in step 108.
Step 108: whether current computer judges number of times that first user inputed password greater than predefined frequency threshold value, if then execution in step 109, otherwise, return step 106.
Step 109: current computer is with the deletion of the key in the first movable storage device encrypted partition or be rewritten as a predefined forbidden digit string, and points out first user to be decrypted enciphered data.
Here, current computer is with deletion of the key in the first movable storage device encrypted partition or rewriting, be since current computer continuous several times obtained be kept at first movable storage device in the different bad password of user cipher, in order to prevent that current other user from usurping the data of encrypting storing in first movable storage device, current computer is with deletion of the key in the first movable storage device encrypted partition or rewriting, thereby make in current and subsequent process, can't utilize the secret key decryption data in first movable storage device, improve the security of data storage.
In addition, described forbidden digit string can be exemplified as complete 0 or complete 1 code.
Step 110: first user imports on first computer and obtains machine code instruction, and first computer is shown to first user with the machine code of self.
Here, described machine code be meant be used for distinguishing with other computer, the distinctive code of first computer self.First computer can obtain the machine code of self by the machine code memory location of setting in advance in self, and presents to first user.The detailed process that first computer obtains self machine code is a prior art, is not described in detail herein.
Step 111: first user delivers to provider-side with the machine code of first computer.
Here, first user mode that the machine code of first computer is delivered to provider-side can be modes such as mail or phone.
Step 112: the super code algorithm that provider-side is utilized the machine code of first computer and set in provider-side in advance, draw first super code, notify first user with first super code of gained then.
Here, described machine code and the predefined super code algorithm that utilizes first computer, the process that draws first super code can be exemplified as: with the first computer machine sign indicating number and a predefined character string carry out with or XOR, to the machine code negate of first computer and other algorithm etc.In addition, to notify first user's mode can be modes such as mail or phone to provider-side.
Step 113: first user links to each other first movable storage device, and imports this first super code to first computer after knowing first super code that supplier provides with first computer.
Step 114: after first computer receives first super code of user's input, at first obtain the machine code of self, utilize machine code of being obtained and the super code algorithm identical that in self, is provided with in advance then with provider-side, draw second super code, judge then whether first super code is identical with second super code, if identical, then execution in step 115, otherwise first computer points out first user can't carry out decrypting process, and finishes current flow process.
Step 115: first computer is from obtaining the key of backup certainly in the file of step 104 set path, and the backup keys of being obtained is write in the encrypted partition of first movable storage device, and the predefined user cipher of preserving in first movable storage device of first user is rewritten as the password that dispatches from the factory of first movable storage device, point out first user can utilize this password to decipher data of dispatching from the factory simultaneously.
Here, first user can find the password that dispatches from the factory in the operation instructions of first movable storage device, such as being " 000000 ".
In addition, because first user has forgotten the user cipher that oneself is set, also promptly first movable storage device need not to preserve this user cipher again, therefore, first computer is rewritten as the password that dispatches from the factory with the user cipher in first movable storage device, makes first user can carry out the setting of user cipher again.And first computer writes the key that backs up in the encrypted partition of first movable storage device, is in order to recover the encryption function of first movable storage device, so that first user can continue to use.
Step 116: first user is to password of first computer input, after first computer receives this password, judge whether received password is identical with the password that dispatches from the factory of movable storage device, if it is identical, then execution in step 117, otherwise, point out first user can't carry out decrypting process, and finish current flow process.
Here, because first user grasps the dispatch from the factory user of password of first movable storage device, therefore, first computer judges whether received password is identical with the password that dispatches from the factory of movable storage device, be to be first user, prevent that further other user from usurping the enciphered data in first movable storage device in order to ensure the active user.
Step 117: first computer utilizes key and the decipherment algorithm in the first movable storage device encrypted partition that the data of encrypting storing in movable storage device are decrypted, and recovers the actual content of data.
So far, first user has realized the process of data decryption by super code after forgetting the user cipher that oneself sets.
Movable storage device of the present invention is meant and can carries out information interaction with PC.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1, a kind of method of using super password to decipher is characterized in that, this method may further comprise the steps:
A, first computer receive after the user obtains the instruction of machine code, and the machine code of self is presented to the user;
After B, provider-side received the machine code of first computer that the user sends here, the super code algorithm that utilizes this machine code and be provided with in provider-side in advance calculated first super code, then this first super code is delivered to the user;
After C, first computer receive first super code of user's input, according to machine code and the super code algorithm that in self, be provided with in advance, identical with provider-side of self, calculate second super code, judge then whether first super code is identical with second super code, if it is identical, execution in step D then, otherwise, current flow process finished;
D, first computer are decrypted the data that encryption is stored in the movable storage device.
2, method according to claim 1 is characterized in that, before steps A, this method further may further comprise the steps:
A01, movable storage device is linked to each other with first computer, after first computer receives the instruction of user ID key, in the file that the key backup in this movable storage device encrypted partition is set to first computer self, and this file hidden the user;
A02, movable storage device is linked to each other with employed current computer, current computer receives the order of user's data decryption, and wherein, described current computer is first computer or other computer;
A03, current computer prompting user import user cipher, then behind the password that receives user's input, judge whether the password that the user inputs is identical with the predefined user cipher of user, if it is identical, then current computer utilizes key and the decipherment algorithm in the movable storage device to be decrypted, and finish current flow process, if inequality, execution in step A04 then;
A04, current computer are deleted the key in the encrypted partition in the movable storage device, or are rewritten as a forbidden digit string;
Described step D specifically comprises: first computer obtains the key that is backed up from steps A 01 described file, and the key that will back up writes in the encrypted partition of movable storage device, and first computer utilizes the key of this backup and the decipherment algorithm of movable storage device that the data of encrypting storing in movable storage device are decrypted.
3, method according to claim 2, it is characterized in that, after first computer receives the instruction of user ID key, and before the key in the movable storage device encrypted partition was backed up in execution, described steps A 01 further comprised: first computer prompting user imports user cipher; After first computer receives the password of the current input of user, whether the password of judging the current input of user is identical with the user cipher that the user sets in movable storage device in advance, if it is identical, then continue to carry out the described step that key in the movable storage device encrypted partition is backed up, otherwise finish current flow process.
4, method according to claim 2, it is characterized in that, after current computer judges that password that the user inputed and the predefined user cipher of user are inequality, and before execution in step A04, described steps A 03 further comprises: current computer judges and whether received number of times that the user inputs password greater than predefined frequency threshold value, if, execution in step A04 then, otherwise, return steps A 03.
5, according to each described method in the claim 1 to 4, it is characterized in that, judge first super code identical with second super code after, and before execution in step D, described step C further comprises: first computer is rewritten as the password that dispatches from the factory of this movable storage device with the predefined user cipher of the user who preserves in the movable storage device, and points out first user can utilize the password to decipher data of dispatching from the factory;
Carrying out first computer is stored in the step that the data in the movable storage device are decrypted to encryption before, described step D further comprises: first computer receives the password of user's input, whether this password of judging user's input is identical with the password that dispatches from the factory of movable storage device, if, then the continuation execution is described is stored in the step that the data in the movable storage device are decrypted to encryption, otherwise, finish current flow process.
CNB2005100736533A 2005-05-20 2005-05-20 Method of using super password to decipher Active CN100374973C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100736533A CN100374973C (en) 2005-05-20 2005-05-20 Method of using super password to decipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100736533A CN100374973C (en) 2005-05-20 2005-05-20 Method of using super password to decipher

Publications (2)

Publication Number Publication Date
CN1866154A true CN1866154A (en) 2006-11-22
CN100374973C CN100374973C (en) 2008-03-12

Family

ID=37425199

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100736533A Active CN100374973C (en) 2005-05-20 2005-05-20 Method of using super password to decipher

Country Status (1)

Country Link
CN (1) CN100374973C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727558B (en) * 2008-10-28 2012-10-10 联想(北京)有限公司 Method for clearing password of computer, computer and server
CN104217143A (en) * 2013-05-30 2014-12-17 英业达科技有限公司 Unlocking method
CN106161013A (en) * 2016-08-30 2016-11-23 江苏南世桥信息技术有限公司 A kind of file encrypting method based on computer machine code

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1168185A3 (en) * 2000-05-08 2004-01-02 Nokia Corporation Method for protecting a memory card, and a memory card
FR2838206A1 (en) * 2002-04-08 2003-10-10 Canal Plus Technologies METHOD AND DEVICE FOR PROTECTING DIGITAL DATA STORED IN A MEMORY
CN1512356A (en) * 2002-12-27 2004-07-14 江西博纳技术有限公司 Network self acknowledging mode and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727558B (en) * 2008-10-28 2012-10-10 联想(北京)有限公司 Method for clearing password of computer, computer and server
CN104217143A (en) * 2013-05-30 2014-12-17 英业达科技有限公司 Unlocking method
CN106161013A (en) * 2016-08-30 2016-11-23 江苏南世桥信息技术有限公司 A kind of file encrypting method based on computer machine code

Also Published As

Publication number Publication date
CN100374973C (en) 2008-03-12

Similar Documents

Publication Publication Date Title
CN103106372B (en) For lightweight privacy data encryption method and the system of android system
CN100490372C (en) A method for backup and recovery of encryption key
US8621189B2 (en) System and method for hardware strengthened passwords
EP1688858A1 (en) Systems and methods for managing multiple keys for file encryption and decryption
CN101674575B (en) Method for protecting security of mobile communication terminal data and device thereof
CN1745555A (en) System and method of protecting data on a communication device
CN100495421C (en) Authentication protection method based on USB device
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN1273657A (en) Apparatus for data distribution and terminal for data distribution
CA2826837C (en) System and method for remote reset of password and encrytion key
CN1719373A (en) Finger print encryption and decryption method of electron decument
WO2011023051A1 (en) Data encryption method, data decryption method and mobile terminal
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN102868826B (en) Terminal and terminal data protection method
WO2011130970A1 (en) Device and method for protecting data of mobile terminal
CN102769525B (en) The user key backup of a kind of TCM and restoration methods
CN1866154A (en) Method of using super password to decipher
CN102053926A (en) Storage device and data security control method thereof
CN109934013A (en) A kind of data guard method and device
CN1266617C (en) Computer data protective method
CN101692266A (en) Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
EP2469441A1 (en) System and method for hardware strenghtened passwords
CN102883039A (en) Method for encrypting multimedia private diary of mobile phone
CN1889431A (en) Multifunction intelligent key equipment and safety controlling method thereof
CN112395629A (en) File encryption method and system based on TCM chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant