CN201698408U - Storing mechanism capable of hiding or displaying part of storage space through RF induction manner - Google Patents

Storing mechanism capable of hiding or displaying part of storage space through RF induction manner Download PDF

Info

Publication number
CN201698408U
CN201698408U CN2010202344330U CN201020234433U CN201698408U CN 201698408 U CN201698408 U CN 201698408U CN 2010202344330 U CN2010202344330 U CN 2010202344330U CN 201020234433 U CN201020234433 U CN 201020234433U CN 201698408 U CN201698408 U CN 201698408U
Authority
CN
China
Prior art keywords
encrypting
output control
control chip
storing mechanism
decrypting input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010202344330U
Other languages
Chinese (zh)
Inventor
沈刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010202344330U priority Critical patent/CN201698408U/en
Application granted granted Critical
Publication of CN201698408U publication Critical patent/CN201698408U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a storing mechanism capable of hiding or displaying part of storage space through a RF induction manner, which comprises storage equipment, a RF induction module and an authentication device. The storing mechanism also comprises an encrypting/decrypting input/output control chip. The RF induction module is connected with the encrypting/decrypting input/output control chip, the encrypting/decrypting input/output control chip is connected with the storage equipment, and an interface connected with peripheral equipment is arranged on the encrypting/decrypting input/output control chip. For the storage equipment encrypted by adopting the technology provided by the utility model, the cryptographic area is in invisible non-recognition state without authorization, a non-authorized person does not aware the existence of the cryptographic area at all, the ID for authorization is encrypted by AES128bit and is difficult to decrypt.

Description

Hide or display part storage space storing mechanism by RF radio frequency induction mode
Technical field
The utility model relates to a kind of mobile storage technology, especially relates to a kind of RF radio frequency induction mode of passing through and hides or display part storage space storing mechanism.
Background technology
The measure of mobile storage technical field present stage solution security of stored information mainly contains following several mode:
1, software cryptography measure: i.e. encryption software by in PC, installing, the mobile storage disk body is encrypted or to the file encryption of storage, but only be that the password of opening disk body or document is set.Drawback: the document that on the PC of not pre-installing encryption software, can't open mobile storage disk body or storage; Password cracking is easy; The mobile storage disk body or the document that have been added password are with special icon display, cause that easily curiosity seeker, cracker pay close attention to, and finally cause cracking.
2, encrypting fingerprint measure: promptly, in PC, pre-install fingerprint identification software, by the fingerprint contrast that pre-sets, the document in identification mobile storage body or the memory bank by on mobile memory, installing fingerprint identification device additional.Drawback: the document that on the PC of not pre-installing fingerprint identification software, can't open mobile storage disk body or storage; The identification of fingerprint mistake takes place easily; Can not open when the icon that such mobile storage body shows in " my computer " window on PC is double-clicked, require the typing fingerprint, cause that easily curiosity seeker, cracker pay close attention to, after memory bank and fingerprint identification device were separated, memory bank easily was cracked.
3, RF radio frequency induction encryption measures: promptly by on mobile memory, installing RF radio frequency induction recognition device additional, corresponding one by one by RF radio frequency induction module and RF radio-frequency card, encryption and decryption mobile memory.Drawback: can only realize overall encryption, behind the induced RF radio-frequency card, deciphering totally, no file encryption level; Can not open when the icon that such mobile storage body shows in " my computer " window on PC is double-clicked, require the RF induction, cause that easily curiosity seeker, cracker pay close attention to, after memory bank and fingerprint identification device were separated, memory bank easily was cracked.
4, chip encryption measure: promptly by on mobile memory, installing the encryption chip device additional,, memory bank is encrypted, on memory bank, plugged USB KEY during use and realize deciphering, pull up USB KEY and realize encrypting by cryptographic algorithm.This kind encryption measures is safety encipher measure.Drawback: cost height; Can only realize overall encryption, plug USB KEY after, totally deciphering, no file encryption level; The vision of product own intuitively can find it is to encrypt memory bank, and there is enciphered message inside, has caused that the stranger pays close attention to.
Summary of the invention
Technical problem to be solved in the utility model provides a kind of RF radio frequency induction mode of passing through and hides or display part storage space storing mechanism.
The technical scheme in the invention for solving the technical problem is: a kind of RF radio frequency induction mode of passing through is hidden or display part storage space storing mechanism, comprise memory device, radio frequency induction module and authenticate device, described storing mechanism also comprises encrypting and decrypting input and output control chip, the radio frequency induction module is connected with encrypting and decrypting input and output control chip, encrypting and decrypting input and output control chip is connected with memory device, and encrypting and decrypting input and output control chip is provided with and the outside interface that is connected.
Described encrypting and decrypting input and output control chip is USB2.0 with the outside interface that is connected.
Hide important file for convenience, described memory device is divided into encrypted area and non-encrypted area, and described encrypted area is the concealed-enciphering district.
The interface that described encrypting and decrypting input and output control chip links to each other with memory device is the SATA interface.
The beneficial effects of the utility model are: realized encrypting hiding of space; comparative benefits: the hard disk that other cipher modes are encrypted; it is encrypted that unauthorized people recognizes hard disk easily; information is protected; in case unauthorized people knows about the needs of protected information; both can adopt various means to realize target; such as violence; coerce owner's public information of hard disk; or by technological means realization deciphering; but the memory device that adopts present technique to encrypt, encrypted area is to be stealthy nonrecognition state under unauthorized, unauthorized people is unaware of the existence of encrypted area in addition at all; the ID of authentication usefulness itself is encrypted by AES 128bit, is difficult to crack.
Description of drawings
Fig. 1 is a structural representation of the present utility model.
1, radio frequency induction module 2, encrypting and decrypting input and output control chip 3, memory device
4, encrypted area 5, non-encrypted area 6, interface 7, authenticate device
Embodiment
A kind of as shown in Figure 1 RF radio frequency induction mode of passing through is hidden or display part storage space storing mechanism, comprise memory device 3, radio frequency induction module 1 and authenticate device 7, described storing mechanism also comprises encrypting and decrypting input and output control chip 2, radio frequency induction module 1 is connected with encrypting and decrypting input and output control chip 2, encrypting and decrypting input and output control chip 2 is connected with memory device 3, and encrypting and decrypting input and output control chip 2 is provided with and the outside interface 6 that is connected; Described memory device 3 is divided into encrypted area 4 and non-encrypted area 5; Described encrypted area 4 is concealed-enciphering districts.
The authenticate device 3TAG KEYS (ID) that each movable storage device 3 coupling needs when two authentications are arranged, each ID is unique, before movable storage device 3 is encrypted, system will write down two the unique ID of this memory device 3 couplings and the sequence number of memory device 3, and be stored in the sequence number storage medium authentication identification when being used for external use after above-mentioned information encrypted with AES 128bit.
Authentication information is not to exist in the memory device 3, neither exist on the PC, but existed in the sequence number storage medium, only use by special instrument and just can read, but owing to adopted AES 128bit to encrypt, even adopted speciality tool to read authentication information, also be mess code information, so this authentication information have safety assurance by unauthorized user.
The KEY of the data encryption in the movable storage device 3 is that two ID and the hard disk sequence number encrypted by AES 128bit generate jointly.
Obtain authenticating the KEY that the back generates the data encryption in the movable storage device 3 the user, this KEY is neither existed in the computing machine, do not existed in the hard disk (to comprise the sequence number storage medium) yet,, can not be read the value of this KEY yet even other people spy upon the hard disk sequence number.
Data in the movable storage device 3 are pressed sector encryption by this KEY with non-standard algorithm.
Be divided into two districts during with movable storage device 3 initialization, 5, one of a non-encrypted area is an encrypted area 4, and authenticate device 3TAG KEY only implements authentication to the use of encrypted area 4.After movable storage device 3 connects PC, under non-authentication state, PC can only recognize non-encrypted area 5, the user can arbitrarily use this zone, promptly shows this non-encrypted area 5 in " my computer " window of PC, and non-encrypted area 5 does not show, and in " disk management " window, also do not show to have encrypted area 4, even adopt any software all can not inquire the existence of encrypted area 4, encrypted area 4 is in hidden state.
But after movable storage device 3 connects PC, induction TAG, after the ID authentication, the user not only can arbitrarily use non-encrypted zone, and can use and encrypt the zone, promptly in " my computer " window of PC, show non-encrypted area 5 and 4 two icons of encrypted area simultaneously.
Memory device 3 comprises the memory storage that external hard disk, flash disk, SSD etc. are connected with computing machine by external interface 6, and its interface is the standard of total interfaces such as USB2.0, USB3.0,1394, SATA, HDMI.
Use step of the present utility model is as follows:
1, before the product export, by the movable storage device 3 of factory initialization employing RF induction technology, and related two unique authenticate device 7 TAG KEY (ID).
2, set the size of encrypting storage space by special software, so far be provided with and finish.
3, after the user connects computing machine with this movable storage device 3; computing machine can recognize non-encrypted area 5; at this moment can't discern the storage space of RF induction protection; not only in " my computer " window, can't see by the storage space of RF induction protection, and in disk management, also can't discern the storage space of RF induction protection.
4, when with authenticate device 7 (TAG KEY) near movable storage device 3 after, be installed on authenticate device 7 received signals on the radio frequency induction module 1, show that encrypted area 4, computing machine can recognize by the storage space of RF induction protection.
5, when once more with authenticate device 7 (TAG KEY) near movable storage device 3 after, be installed on authenticate device 7 received signals on the radio frequency induction module 1, concealed encrypted district 4, computing machine can't be discerned by the storage space of RF induction protection.
6, after the storage space computer Recognition of being protected by the RF induction, the pilot lamp of movable storage device 3 is shown in green.
After having used the utility model, national security personnel go out to fetch confidential information, exist in the encrypted area, when this memory bank is taken by unauthorized people, discern less than encrypted area at all, can only see the information of non-encrypted area, have guaranteed Security Officer's safety.Confidential data is stored in transmittance process in the encrypted area 4, in case lose, unauthorized people has no way of finding out about it and has encrypted area, and the safety of data is guaranteed.User's sensitive information is stored in encrypted area, even memory bank is given unauthorized people, because unauthorized people can not know encrypted area 4, sensitive data is safe.

Claims (5)

1. one kind is passed through the hiding or display part storage space storing mechanism of RF radio frequency induction mode, comprise memory device (3), radio frequency induction module (1) and authenticate device (7), it is characterized in that: described storing mechanism also comprises encrypting and decrypting input and output control chip (2), radio frequency induction module (1) is connected with encrypting and decrypting input and output control chip (2), encrypting and decrypting input and output control chip (2) is connected with memory device (3), and encrypting and decrypting input and output control chip (2) is provided with and the outside interface (6) that is connected.
2. storing mechanism according to claim 1 is characterized in that: described encrypting and decrypting input and output control chip (2) is USB2.0 with the outside interface (6) that is connected.
3. storing mechanism according to claim 1 is characterized in that: described memory device (3) is divided into encrypted area (4) and non-encrypted area (5).
4. storing mechanism according to claim 3 is characterized in that: described encrypted area (4) is the concealed-enciphering district.
5. storing mechanism according to claim 1 is characterized in that: the interface that described encrypting and decrypting input and output control chip (2) links to each other with memory device (3) is the SATA interface.
CN2010202344330U 2010-06-23 2010-06-23 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner Expired - Fee Related CN201698408U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010202344330U CN201698408U (en) 2010-06-23 2010-06-23 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010202344330U CN201698408U (en) 2010-06-23 2010-06-23 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner

Publications (1)

Publication Number Publication Date
CN201698408U true CN201698408U (en) 2011-01-05

Family

ID=43399655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010202344330U Expired - Fee Related CN201698408U (en) 2010-06-23 2010-06-23 Storing mechanism capable of hiding or displaying part of storage space through RF induction manner

Country Status (1)

Country Link
CN (1) CN201698408U (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
CN102270182A (en) * 2011-07-04 2011-12-07 济南伟利迅半导体有限公司 Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN105512577A (en) * 2016-01-26 2016-04-20 福建省卓展信息科技有限公司 Off-line encrypted and decrypted USB flash drive and implementation method thereof
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN107169382A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of mobile hard disk and its secure storage method of data based on NFC technique
CN107239681A (en) * 2017-06-08 2017-10-10 山东超越数控电子有限公司 One kind encryption mobile hard disk upper computer software structure

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
WO2012022207A1 (en) * 2010-08-17 2012-02-23 湖南源科高新技术有限公司 Method and device for encryption and hard disk
CN102270182A (en) * 2011-07-04 2011-12-07 济南伟利迅半导体有限公司 Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN102270182B (en) * 2011-07-04 2014-04-23 济南伟利迅半导体有限公司 Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN105512577A (en) * 2016-01-26 2016-04-20 福建省卓展信息科技有限公司 Off-line encrypted and decrypted USB flash drive and implementation method thereof
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN107169382A (en) * 2017-03-29 2017-09-15 山东超越数控电子有限公司 A kind of mobile hard disk and its secure storage method of data based on NFC technique
CN107239681A (en) * 2017-06-08 2017-10-10 山东超越数控电子有限公司 One kind encryption mobile hard disk upper computer software structure

Similar Documents

Publication Publication Date Title
CN201698408U (en) Storing mechanism capable of hiding or displaying part of storage space through RF induction manner
US8683232B2 (en) Secure user/host authentication
TWI537732B (en) Data security system with encryption
US8839371B2 (en) Method and system for securing access to a storage device
CN102947836B (en) Memory device, main process equipment and use dual encryption scheme transmit the method for password between the first and second memory devices
CN103886234A (en) Safety computer based on encrypted hard disk and data safety control method of safety computer
CN101796764A (en) Biometric authentication device, system and method of biometric authentication
CN108345782B (en) Intelligent hardware safety carrier
CN103415855A (en) Mass storage device memory encryption methods, systems, and apparatus
CN102664036A (en) Fingerprint encryption intelligent digital U disk
CN103577764A (en) Document encryption and decryption method and electronic device with document encryption and decryption function
TW201608408A (en) Wireless authentication system and method for USB storage device
CN105227299A (en) A kind of data encrypting and deciphering management equipment and application process thereof
CN103678994A (en) USB encrypted storage method and USB encrypted storage system with environment control function
CN104123777B (en) A kind of gate inhibition's remote-authorization method
CN102236607A (en) Data security protection method and data security protection device
US20090187770A1 (en) Data Security Including Real-Time Key Generation
CN102346716B (en) Encryption method and decryption method of hard disk storage device and encryption and decryption system used for hard disk storage device
CN104915583A (en) Interface decryption processing method and mobile terminal
CN105787319A (en) Iris recognition-based portable terminal and method for same
US20160300416A1 (en) Electronic Lock and Verification Method for Unlocking the Same
CN104346586A (en) Self-destructive data protection storage device and self-destructive data protection method
Ranasinghe et al. RFID/NFC device with embedded fingerprint authentication system
CN103258269A (en) Electronic payment device for mobile equipment
CN101727557B (en) Secrecy isolation hard disk and secrecy method thereof

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110105

Termination date: 20110623