CN206388181U - A kind of encrypted data transmission line for computer - Google Patents

A kind of encrypted data transmission line for computer Download PDF

Info

Publication number
CN206388181U
CN206388181U CN201720066969.8U CN201720066969U CN206388181U CN 206388181 U CN206388181 U CN 206388181U CN 201720066969 U CN201720066969 U CN 201720066969U CN 206388181 U CN206388181 U CN 206388181U
Authority
CN
China
Prior art keywords
interface
data
computer
transmission line
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201720066969.8U
Other languages
Chinese (zh)
Inventor
骆建军
车嵘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sage Microelectronics Corp
Original Assignee
Sage Microelectronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sage Microelectronics Corp filed Critical Sage Microelectronics Corp
Priority to CN201720066969.8U priority Critical patent/CN206388181U/en
Application granted granted Critical
Publication of CN206388181U publication Critical patent/CN206388181U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a kind of encrypted data transmission line for computer, first interface and second interface are set respectively at its two ends, DEU data encryption unit is also set up in the data line, DEU data encryption unit is electrically connected with first interface and second interface respectively;Wherein, first interface is connected with main frame, second interface is connected with storage device, DEU data encryption unit sets up communication with main frame and storage device respectively and be connected and carry out data transmission according to the communications protocol of agreement, and the clear data that main frame writes is encrypted as ciphertext data storage in storage device or by the ciphertext data deciphering read from storage device to be transferred to main frame after clear data by DEU data encryption unit.Compared with prior art, the technical solution of the utility model provides a kind of cost low, easy for installation encrypted data transmission line, so as to easily solve the stolen security threat of storage device, while additionally providing quick, thoroughly data destroying function.

Description

A kind of encrypted data transmission line for computer
Technical field
The utility model belongs to data storage and data security arts, more particularly to a kind of encryption data for computer Transmission line.
Background technology
The problem of data safety of computer (hard disk and movable storage device) is always the focus of social concerns.Computer is hard Disk problem of data safety mainly has two important steps:One is the data safety of hard disk during use, such as hard disk be stolen and That causes divulges a secret;Another is the data destroying problem of hard disk, such as when hard disk is scrapped or switchs to weight under insecure environments Newly in use, needing to carry out data destroying processing to the former deposit data of hard disk.Movable storage device has that small volume, capacity are big, make With convenient and transmission speed it is fast the advantages of, but the safety problem of movable storage device is also following, when these equipment and meter Calculation machine is connected, and can not only make in virus and Malware intrusion computer, can also confidential data in downloading computer, cause Personal, the enterprise even loss of country.Therefore security threat is the problem of mobile device application is badly in need of solving and improved.
The current antitheft major measure of hard disk is to be bound computer and hard disk by special-purpose software, such as by computer MAC Sequence number binding of address and hard disk etc..This kind of solution is required for professional to carry out software development and maintenance, cost Height, and there is system compatible sex chromosome mosaicism, the shortcomings of applicability is narrow.It is main to use exclusive data pin in terms of hard disc data destruction Ruin software and hard disk is repeated erasable, such as can write 0 using whole disk, write 1 or write the modes such as random number.This data pin The major defect for ruining mode is that data destroying is not thorough, especially for solid state hard disc, it is difficult to accomplish 100% destruction data, Time-consuming in addition.Mechanical hard disk can also thoroughly destroy data using the mode of magnetization, but cost it is high, in-convenience in use.
Solving the mode of movable storage device security threat at present mainly has two kinds, and one kind is artificially to forbid computer peripheral equipment The use of interface, such as forbid the use of USB interface, and this method applies more in departments such as enterprise, governments, but so straight Connect and have rejected the convenience of movable storage device and reduce operating efficiency.Another method is moved using technological means control access The use of dynamic storage device, i.e., affix one's name to solution in computer-internal and equipment access monitored in real time, solution is main It is divided to two kinds of driving stage programming and windows application programs.But two kinds of solutions be required for professional develop and Safeguard, cost is at a relatively high.
Therefore, for drawbacks described above present in currently available technology, it is necessary to be studied in fact, to provide a kind of scheme, Solve defect present in prior art.
Utility model content
In view of this, it is necessory to provide a kind of encrypted data transmission line for computer, cost is low, easy for installation, The stolen security threat of storage device is can solve the problem that, while quick, thoroughly data destroying function is additionally provided, either individual People or the common market of enterprise, or in niche markets such as finance, government, public security, all with extensive market potential and hair Exhibition prospect.
In order to overcome the defect of prior art, the technical solution of the utility model is:
A kind of encrypted data transmission line for computer, first interface and second interface are set at its two ends respectively, should DEU data encryption unit is also set up in data line, the DEU data encryption unit connects with the first interface and described second respectively Mouth electrical connection, encryption and decryption computing is carried out for the data to transmission;Wherein, the first interface is connected with main frame, described Second interface is connected with storage device, and the DEU data encryption unit sets up communication with main frame and storage device respectively and is connected and presses Communications protocol as agreed carries out data transmission, and the clear data that main frame writes is encrypted as ciphertext number by the DEU data encryption unit According to be stored in storage device or by the ciphertext data deciphering read from storage device be clear data after be transferred to main frame.
Preferably, the DEU data encryption unit includes the 3rd interface, the 4th interface, the first protocol process module, main control Device, encryption/decryption module and second protocol processing module, wherein, the 3rd interface passes through the first cable and first interface electricity Gas is connected, and the 4th interface is electrically connected by the second cable and the second interface;First protocol process module is used Data communication is carried out in passing through first cable and main frame;The second protocol processing module is used to pass through second cable Data communication is carried out with storage device;The encryption/decryption module is used to perform enciphering and deciphering algorithm;The master controller and described the One protocol process module, encryption/decryption module and second protocol processing module, control first protocol process module, encryption and decryption mould Block and second protocol processing module carry out data processing.
Preferably, the first cable built-in power line, signal wire and ground wire, the second cable built-in power line, Signal wire and ground wire, first cable and second cable are arranged within gum cover together;The first interface and institute Stating second interface includes FPDP and power port.
Preferably, the DEU data encryption unit is realized using dedicated encrypted switching chip.
Preferably, the dedicated encrypted switching chip is set in first interface or second interface.
Preferably, when the storage device is hard disk, the first interface is connected with the hard disc data interface of host mainboard Connect, the second interface is connected with the data-interface of hard disk;The first interface and the second interface be SATA interface or SAS interfaces.
Preferably, when the storage device is mobile storage disc, the data-interface phase of the first interface and host mainboard Connection, the second interface is with setting Peripheral Interface seat on host machine casing to be connected;Mobile storage disc accesses the Peripheral Interface Communication is set up after seat by the DEU data encryption unit and main frame to be connected.
Preferably, the first interface and the second interface use USB interface or UFS interfaces.
Preferably, also set up for strengthening the signal regenerator of transmission signal strength, the signal regenerator is arranged on institute State the front end and/or rear end of DEU data encryption unit.
Preferably, the DEU data encryption unit also Receiving Host send control instruction and according to the control instruction carry out phase The information configuration answered.
Compared with prior art, using the technical solution of the utility model, enterprise can advantageously build a peace very much The inside use environment of full computer data storage:That is the storage device of enterprises is only capable of setting in the computer of enterprises It is standby above normally to be read and write, and will be identified that legacy data can not on blank panel, disk in other outside common computers It is identified, prevent because storage device is stolen or illegal divert and caused by information leakage;On the other hand, can be by the communication of agreement Protocol command updates or removed the mode of original cipher key, realizes that rapidly and thoroughly hard disc data destroys operation;Also can be by direct The mode of data wire is changed or destroyed, the data destroying operation of hard disk is completed.In addition, stating the same of technique effect in realization When do not influence the normal of user to use, all storage device data encryption and decryption operations are all automatic realize.
Brief description of the drawings
Fig. 1 is the theory diagram for the encrypted data transmission line that the utility model is used for computer.
Fig. 2 is the composition frame chart for the encrypted data transmission line that the utility model is used for computer.
Fig. 3 is the structured flowchart of DEU data encryption unit in the utility model.
Fig. 4 be the utility model in be used for hard disk data line structured flowchart.
Fig. 5 is the structured flowchart of the data line of SATA interface in the utility model.
Fig. 6 is the theory diagram of the another embodiment of the utility model encrypted data transmission line.
Specific examples below will further illustrate the utility model with reference to above-mentioned accompanying drawing.
Embodiment
Make below with reference to a kind of encrypted data transmission line for computer that accompanying drawing is provided the utility model into one Walk explanation.
In order to overcome the defect of prior art, applicant to conducting in-depth research in the prior art, it has been found that Data line stores a link of security protection system as computer and storage device, in the prior art scheme but only As the single electrical connection cable of function.Therefore, the data transfer of the present utility model with Data Encryption Transmission function Line, is built-in with encrypting module, by configuring this data line with Data Encryption Transmission function in computer-internal Mode, realizes that the automatic encryption and decryption of the storage device data to being accessed is operated, the internal security for foring storage dish uses ring Border:I.e. storage dish is only capable of normally being read and write in the computer equipment of this data wire particular arrangement, and it is outside other Will be identified that legacy data can not be identified on blank panel, disk in common computer, therefore, even if hard disk be stolen, also without Method causes leakage of data, it is ensured that computer hard disk data safety.
Referring to Fig. 1 and Fig. 2, show the utility model proposes encrypted data transmission line principle and composition frame chart, should The two ends of data line set first interface (10) and second interface (11) respectively, at the same also set up in data wire respectively with First interface (10) and the DEU data encryption unit (12) of second interface (11) electrical connection, are carried out plus solution for the data to transmission Close computing;First cable (13) and the second cable (14) are arranged within gum cover (15) together, the first cable (13) built-in power Line (131), signal wire (132) and ground wire (133), the second cable (14) built-in power line (141), signal wire (142) and connect Ground wire (143);First interface (10) and second interface (11) include FPDP and power port, are respectively configured to provide power supply Power supply and data communication.Wherein, first interface (10) is connected with main frame, and second interface (11) is connected with storage device, number Communication is set up with main frame and storage device respectively according to ciphering unit (12) to be connected and according to the communications protocol progress data biography of agreement Defeated, the clear data that main frame writes is encrypted as ciphertext data storage in storage device or will be from by DEU data encryption unit (12) Storage device read ciphertext data deciphering be clear data after be transferred to main frame.
Further, it can not only realize that reading and writing data is same by the communications protocol of agreement between data line and main frame When can also realize the transmission of control command, DEU data encryption unit (12) goes back the control instruction of Receiving Host transmission and according to the control System instruction carries out corresponding information configuration.Such as, the management of key can be realized by the communications protocol of agreement, so that in data Transmission, distribution can be realized in transmission line, update and destroys key, and then can be real by way of updating or destroying key Now quick, thoroughly hard disc data destruction.
In a preferred embodiment, the first control instruction that DEU data encryption unit (12) Receiving Host is sent, and then DEU data encryption unit (12) obtains the key of host assignment and storage.By the way of host assignment key, for enterprises The data safety management of multiple stage computers is very convenient, such as, the storage device distribution identical key used enterprises, So, storage device is only capable of normally being read and write in each computer equipment internally;And other are common outside access When on computer, because outer computer can not correctly understand storage device MBR cipher-text informations, be identified as blank panel, on disk Legacy data file also can not be identified, so as to prevent information leakage.
In a preferred embodiment, the second control instruction that DEU data encryption unit (12) Receiving Host is sent, master control The key of storage in the nonvolatile memory is removed or updated to device (123) processed by control command.It is quick, thorough so as to realize The data destroying function at bottom.
In a preferred embodiment, the 3rd control instruction that DEU data encryption unit (12) Receiving Host is sent, and then Random number is as key and stores for DEU data encryption unit (12) generation.Due to generating key by the way of random number, so that greatly The big security for improving key.
Referring to Fig. 3, it show as the structured flowchart of DEU data encryption unit in the utility model (12), DEU data encryption unit (12) the 3rd interface (121), the 4th interface (126), the first protocol process module (122), master controller are further comprised (123), wherein, the 3rd interface (121) passes through the first cable for encryption/decryption module (124) and second protocol processing module (125) (13) it is electrically connected with first interface (10), the 4th interface (126) is electrically connected by the second cable (14) with second interface (11) Connect;First protocol process module (122) is used to carry out data communication with main frame by the first cable (13);Second protocol handles mould Block (125) is used to carry out data communication with storage device by the second cable (14);First protocol process module (122) and second Protocol process module (125) is used for the function of completing to arrange communications protocol physical layer and articulamentum parsing;Encryption/decryption module (124) it is used to perform enciphering and deciphering algorithm;Master controller (123) and the first protocol process module (122), encryption/decryption module (124) With second protocol processing module (125), control at the first protocol process module (122), encryption/decryption module (124) and second protocol Manage module (125) and carry out data processing, that is, master controller (123) can recognize the type of transmitted protocol package, if Packet, then the first protocol process module (122) or second protocol processing module (125) are parsed after the protocol package again by adding solution Close module (124) data is encrypted/decryption oprerations;If order bag or state bag, then directly parse the protocol package And perform corresponding command operating, such as it can transmit, distribute and more new key according to the communications protocol order of agreement, it is certainly close Key can also be generated at random.
Certainly, nonvolatile memory is also included in DEU data encryption unit (12), nonvolatile memory can individually be set Put or integrated master controller in, mainly for storing the key of enciphering and deciphering algorithm and the firmware of DEU data encryption unit (12).
Further, DEU data encryption unit (12) also includes randomizer, randomizer and master controller (123) it is connected, for producing random number, produced random number can be used as key.
In a kind of preferred embodiment, DEU data encryption unit (12) is realized using dedicated encrypted switching chip.For simplification The structure design of encrypted data transmission, dedicated encrypted switching integrated chip is set in first interface (10) or second interface (11), So as to save the first cable (13) or the second cable (14).Certainly different interface and agreement, encryption switching chip are used Can be the agreement switching chip of the forms such as SATA-SATA, USB-USB or SAS-SAS, it is right containing enciphering and deciphering algorithm module Data carry out encryption and decryption computing.The clear data of computer write-in hard disk is transferred to encryption switching chip through data from interface, plus Plaintext is changed into ciphertext by close switching chip, and is transferred to external hard disc through data main interface;The ciphertext that computer is read from hard disk Data are transferred to encryption switching chip through data main interface, and encryption switching chip changes into ciphertext in plain text, and through data from interface It is transferred to main frame.
When encryption switching chip transfers chip using the agreement of SATA-SATA forms, the first protocol process module (122) It is SATA data respectively from protocol module and SATA data master agreement modules with second protocol processing module (125);When encryption turns Connect chip using USB-USB forms agreement switching chip when, the first protocol process module (122) and second protocol processing module (125) it is usb data respectively from protocol module and usb data master agreement module.
Further, enciphering and deciphering algorithm module, using the cryptographic symmetrical algorithm of high speed, can be but to be not limited to state close One of SM4, AES, GOST or DES scheduling algorithm.
In a preferred embodiment, encryption switching chip uses model X-Wall DX USB OTG or X-Wall MX+ special chip.
Using above-mentioned technical proposal, due to containing DEU data encryption unit (12) inside data line, to main frame and it can deposit The data transmitted between storage equipment carry out encryption and decryption computing automatically;Meanwhile, it can be transmitted, divided by the communications protocol order of agreement Match somebody with somebody, update and destroy key;Further, quick, thoroughly hard disk number can be realized by way of updating or destroying key According to destruction.
In actual use, storage device is hard disk or mobile storage disc.Referring to Fig. 4, the number for hard disk is shown According to the structured flowchart of transmission line, when storage device is hard disk, first interface (10) is connected with the hard disc data interface of host mainboard Connect, second interface (11) is connected with the data-interface of hard disk;First interface (10) includes data from interface and power interface one, Second interface (11) includes data main interface and power interface two, and power interface is output as data for the power supply of access host and added Close unit (12) and hard disk provide power supply, and described data are matched from the communications protocol formation of interface and data main interface.Need Point out, although first interface (10) and second interface (11) are shown including FPDP and power port in Fig. 4, but with The second interface (11) of hard disk connection can also only include FPDP, and the feeder ear of hard disk is directly provided by main frame.Ginseng See Fig. 5, show the structured flowchart of the data line of SATA interface in the utility model, first interface (10) includes SATA numbers According to from interface, it is connected for the hard disk SATA data-interfaces with main frame, second interface (11) includes SATA data main interfaces, is used for Be connected with the SATA data-interfaces in hard disk, Data Transport Protocol uses SATA protocol, namely formed respectively SATA from interface and SATA main interfaces are matched.Certainly, data line of the present utility model is not limited in SATA interface, it would however also be possible to employ SAS etc. Other interface shapes, during using SAS interfaces, SAS is matched from interface and SAS main interfaces.Specifically used and operation principle is as follows:
1) data of the hard disc data transmission line are connected from interface with the hard disk main interface of computer, data main interface and The data-interface of external hard disc is connected;Power interface one is connected with the output interface of computer power supply, by the He of power interface two The power interface of external hard disc is connected;
2) when initial, DEU data encryption unit (12) can be used as encryption and decryption key with any one random number;Also can be by about Fixed communications protocol order, by host assignment key;Produced key is preserved in the nonvolatile memory.
3) when computer carries out data write operation to external hard disc, the clear data of institute's write-in hard disk is through data from connecing Port transmission is to DEU data encryption unit (12), and plaintext is changed into ciphertext by DEU data encryption unit (12), and is transferred to through data main interface Hard disk;All data that hard disk is preserved are ciphertext, when hard disk is stolen or arrives other computers by illegal peculation, firmly The data of disk can not normally be read, so as to prevent information leakage.
4) when main frame reads hard disc data, the ciphertext data read from hard disk through data main interface are transferred to data encryption Unit (12), DEU data encryption unit (12) changes into ciphertext in plain text, and is transferred to main frame from interface through data.Computer The data read are clear data, do not influence the normal of user to use.
5), can be by the communications protocol order of agreement more when carrying out data dump or during data destroying to hard disc data New or removing original cipher key, by way of directly changing or destroying data wire, can also complete the data destroying behaviour of hard disk Make.
Similarly, when storage device is mobile storage disc, first interface (10) is connected with the data-interface of host mainboard, the Two interfaces (11) are with setting Peripheral Interface seat on host machine casing to be connected;Pass through data after mobile storage disc access Peripheral Interface seat Ciphering unit (12) is set up communication with main frame and is connected.Using different data communication protocols, first interface (10) and second interface (11) different types of Peripheral Interface can be used, USB interface or UFS interfaces are generally used in actual use.
Specifically used and operation principle is as follows:
1) USB/UFS of data line is connected from interface with the USB/UFS main interfaces of computer, by data line USB/UFS main interfaces be connected with outside USB/UFS mobile storage discs;
2) when initial, it is close that the random number that data line can be produced by internal randomizer is used as encryption and decryption Key;Also can be by the communications protocol order of agreement, by host assignment key;
3) when main frame reads and writes outside USB/UFS mobile storage discs, the information such as all data, order and state is logical Cross data line to be parsed and transmitted, wherein order bag and state bag are not processed and directly transmitted, packet then passes through Transmitted again after encryption and decryption computing.All data messages of external USB/UFS storage dishes, including MBR (MBR) and Data file is ciphertext.
4) by way of the device of same key is configured to the USB interface of multiple stage computers, computer USB/UFS is constituted The internal security use environment of interface:I.e. internal USB/UFS storage dishes are only capable of ability in each computer equipment internally Normally read and write;And when outside access in other common computers, because outer computer can not correctly understand the MBR of storage dish Cipher-text information and be identified as blank panel, legacy data file also can not be identified on disk, so as to prevent information leakage;It is another Aspect, when the USB/UFS storage dishes of outside access embedded computer system, the MBR of the disk be decrypted into mess code and by An original disc (RAW disks) is identified as, the disk legacy data is also decrypted into mess code and can not be identified, so as to avoid possible Virus infection or malicious data such as steal at the behavior.
Improved constantly with the access speed of storage device interface, 3Gbps even more highs are can reach, due to the utility model DEU data encryption unit (12) is provided with data line, makes high speed communications signals easily signal attenuation, so as to influence number According to the reliability of transmission.In order to improve the reliability of data transfer, the utility model proposes a kind of preferred embodiment, in encryption The signal regenerator (15,16) for strengthening transmission signal strength is also set up in data line, signal regenerator (15,16) is set Put in the front end and/or rear end of DEU data encryption unit (12).Referring to Fig. 6, the utility model encrypted data transmission line is shown The theory diagram of another embodiment, the first signal regenerator (15) is serially connected in first interface (10) and DEU data encryption unit (12) between;Secondary signal regenerator (16) is serially connected between second interface (11) and DEU data encryption unit (12).Ordinary circumstance Under, the first signal regenerator (15) and secondary signal regenerator (16) are positioned close to the place of DEU data encryption unit (12), main The high speed communications signals that machine is transmitted through first interface (10), the first cable (13) again to the first signal regenerator (15), through After one signal regenerator (15) strengthens and recovered, DEU data encryption unit (12) is transmitted directly to, vice versa.By setting first Signal regenerator (15) and secondary signal regenerator (16), so as to compensate due to setting DEU data encryption unit in data line (12) loss of signal caused by, substantially increases the reliability of data transfer.
Further, the first signal regenerator (15) and secondary signal regenerator (16) are real using integrated chip PS8513C It is existing.Certainly, the first signal regenerator (15) and secondary signal regenerator (16) can also be arranged in DEU data encryption unit (12).
The explanation of above example is only intended to help and understands method of the present utility model and its core concept.It should refer to Go out, for those skilled in the art, can also be to this on the premise of the utility model principle is not departed from Utility model carries out some improvement and modification, and these are improved and modification also falls into the utility model scope of the claims It is interior.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or new using this practicality Type.A variety of modifications to these embodiments will be apparent for those skilled in the art, the utility model Defined in General Principle can be real in other embodiments in the case where not departing from spirit or scope of the present utility model It is existing.Therefore, the utility model is not intended to be limited to these embodiments shown in the utility model, and is to fit to and this practicality The new disclosed principle most wide scope consistent with features of novelty.

Claims (10)

1. a kind of encrypted data transmission line for computer, first interface (10) and second interface are set at its two ends respectively (11), it is characterised in that DEU data encryption unit (12) is also set up in the data line, the DEU data encryption unit (12) is respectively It is electrically connected with the first interface (10) and the second interface (11), encryption and decryption computing is carried out for the data to transmission; Wherein, the first interface (10) is connected with main frame, and the second interface (11) is connected with storage device, and the data add Close unit (12) sets up communication with main frame and storage device respectively and is connected and carries out data transmission according to the communications protocol of agreement, institute State DEU data encryption unit (12) and the clear data that main frame writes is encrypted as ciphertext data storage in storage device or will be from Storage device read ciphertext data deciphering be clear data after be transferred to main frame.
2. the encrypted data transmission line according to claim 1 for computer, it is characterised in that the data encryption list First (12) include the 3rd interface (121), the 4th interface (126), the first protocol process module (122), master controller (123) plus Deciphering module (124) and second protocol processing module (125), wherein, the 3rd interface (121) by the first cable (13) with First interface (10) electrical connection, the 4th interface (126) passes through the second cable (14) and the second interface (11) Electrical connection;First protocol process module (122) is used to carry out data communication by first cable (13) and main frame; The second protocol processing module (125) is used to carry out data communication by second cable (14) and storage device;It is described Encryption/decryption module (124) is used to perform enciphering and deciphering algorithm;The master controller (123) and first protocol process module (122), encryption/decryption module (124) and second protocol processing module (125), control first protocol process module (122), add Deciphering module (124) and second protocol processing module (125) carry out data processing.
3. the encrypted data transmission line according to claim 2 for computer, it is characterised in that first cable (13) built-in power line (131), signal wire (132) and ground wire (133), the second cable (14) built-in power line (141), Signal wire (142) and ground wire (143), first cable (13) and second cable (14) are arranged on gum cover (15) together Within;The first interface (10) and the second interface (11) include FPDP and power port.
4. the encrypted data transmission line according to claim 1 or 2 for computer, it is characterised in that the data add Close unit (12) is realized using dedicated encrypted switching chip.
5. the encrypted data transmission line according to claim 4 for computer, it is characterised in that the dedicated encrypted turns Chip is connect to be arranged in first interface (10) or second interface (11).
6. the encrypted data transmission line according to claim 1 or 2 for computer, it is characterised in that the storage is set It is standby that the first interface (10) is connected with the hard disc data interface of host mainboard when being hard disk, the second interface (11) and The data-interface of hard disk is connected;The first interface (10) and the second interface (11) are SATA interface or SAS interfaces.
7. the encrypted data transmission line according to claim 1 or 2 for computer, it is characterised in that the storage is set During for being mobile storage disc, the first interface (10) is connected with the data-interface of host mainboard, the second interface (11) With setting Peripheral Interface seat on host machine casing to be connected;Mobile storage disc is added after accessing the Peripheral Interface seat by the data Close unit (12) is set up communication with main frame and is connected.
8. the encrypted data transmission line according to claim 7 for computer, it is characterised in that the first interface (10) and the second interface (11) use USB interface or UFS interfaces.
9. the encrypted data transmission line according to claim 1 or 2 for computer, it is characterised in that also setting up is used for Strengthen the signal regenerator (15,16) of transmission signal strength, the signal regenerator (15,16) is arranged on the data encryption list The front end and/or rear end of first (12).
10. the encrypted data transmission line according to claim 1 or 2 for computer, it is characterised in that the data add Close unit (12) goes back the control instruction of Receiving Host transmission and carries out corresponding information configuration according to the control instruction.
CN201720066969.8U 2017-01-20 2017-01-20 A kind of encrypted data transmission line for computer Active CN206388181U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720066969.8U CN206388181U (en) 2017-01-20 2017-01-20 A kind of encrypted data transmission line for computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720066969.8U CN206388181U (en) 2017-01-20 2017-01-20 A kind of encrypted data transmission line for computer

Publications (1)

Publication Number Publication Date
CN206388181U true CN206388181U (en) 2017-08-08

Family

ID=59493635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720066969.8U Active CN206388181U (en) 2017-01-20 2017-01-20 A kind of encrypted data transmission line for computer

Country Status (1)

Country Link
CN (1) CN206388181U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845254A (en) * 2017-01-20 2017-06-13 杭州华澜微电子股份有限公司 A kind of encrypted data transmission line for computer

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845254A (en) * 2017-01-20 2017-06-13 杭州华澜微电子股份有限公司 A kind of encrypted data transmission line for computer

Similar Documents

Publication Publication Date Title
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN102073808B (en) Method for encrypting and storing information through SATA interface and encryption card
CN101196855A (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN104090853A (en) Solid-state disc encryption method and system
CN110188564B (en) Mobile data storage terminal based on quantum key encryption
CN107590402A (en) A kind of data storage ciphering and deciphering device and method
CN102737270B (en) A kind of bank intelligent card chip secure coprocessor based on domestic algorithm
CN102355350A (en) File encryption method applied for mobile intelligent terminal and system thereof
CN206611427U (en) A kind of key storage management system based on trust computing device
CN103345453A (en) Hard disk data encryption card supporting SATA interface and encryption and decryption method
CN102201044A (en) Universal serial bus (USB) security key
CN108491724A (en) A kind of hardware based computer interface encryption device and method
CN106845254A (en) A kind of encrypted data transmission line for computer
CN105809068A (en) High-speed storage control SOC chip supporting adoption of hardware encryption algorithm
CN107911221A (en) The key management method of solid-state disk data safety storage
CN107733936B (en) Encryption method for mobile data
CN206388181U (en) A kind of encrypted data transmission line for computer
CN203930840U (en) A kind of hardware encryption card
CN203720848U (en) Hard disk encryption device based on AES (advanced encryption standard) algorithm
CN106612247A (en) A data processing method and a storage gateway
CN201051744Y (en) A secure encryption network card device
CN103873245B (en) Dummy machine system data ciphering method and equipment
CN102761559B (en) Network security based on private data shares method and communication terminal

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant