CN214384653U - Safety control storage system - Google Patents

Safety control storage system Download PDF

Info

Publication number
CN214384653U
CN214384653U CN202022561252.5U CN202022561252U CN214384653U CN 214384653 U CN214384653 U CN 214384653U CN 202022561252 U CN202022561252 U CN 202022561252U CN 214384653 U CN214384653 U CN 214384653U
Authority
CN
China
Prior art keywords
information
target information
security
storage system
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202022561252.5U
Other languages
Chinese (zh)
Inventor
张竹瑞
骆飞
明淼晶
林纬园
邹瑜文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Anjilite New Technology Co ltd
Original Assignee
Shenzhen Anjili New Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Anjili New Technology Co ltd filed Critical Shenzhen Anjili New Technology Co ltd
Priority to CN202022561252.5U priority Critical patent/CN214384653U/en
Application granted granted Critical
Publication of CN214384653U publication Critical patent/CN214384653U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application is suitable for the technical field of safety control, and provides a safety control storage system. In the embodiment of the application, the operating device is connected with the safety management device and used for acquiring target information, verifying the target information and sending the target information after verification to the safety management device; the security management device is connected with the encryption device and used for generating a key parameter according to the target information and sending the key parameter and the target information to the encryption device; the encryption device is connected with the storage device and used for encrypting the target information according to the key parameter and sending the encrypted target information to the storage device so that the storage device executes corresponding operation according to the encrypted target information, and therefore the safety risk of storing the target information into the storage device is reduced.

Description

Safety control storage system
Technical Field
The application belongs to the technical field of safety control, and particularly relates to a safety control storage system.
Background
With the development of society, people usually use data storage media to store data to be reserved, because the data to be reserved often relates to the property that personal privacy or business confidentiality cannot be disclosed, people pay more and more attention to the leakage risk of data information brought in the data information storage process, and users cannot well control the storage media with the leakage risk of data information at present, so that the security risk of storing data into the storage media is high.
SUMMERY OF THE UTILITY MODEL
The embodiment of the application provides a safety control storage system, which can solve the problem that the safety risk of data storage in a storage medium is high.
In a first aspect, an embodiment of the present application provides a security management and control storage system, including an operating device, a security management device, an encryption device, and a storage device;
the operating device is connected with the safety management device and used for acquiring target information, verifying the target information and sending the target information after the target information passes the verification to the safety management device;
the security management device is connected with the encryption device and used for generating a key parameter according to the target information and sending the key parameter and the target information to the encryption device;
the encryption device is connected with the storage device and used for encrypting the target information according to the key parameter and sending the encrypted target information to the storage device so that the storage device executes corresponding operation according to the encrypted target information.
Optionally, the system further comprises a communication device; the communication device comprises a receiving module and a transmitting module;
the receiving module is connected with the operating device and used for receiving the target information so as to enable the safety management device to perform corresponding operation according to the target information;
the transmitting module is connected with the operating device and used for acquiring the execution status of the storage device when executing corresponding operation and sending the execution status to the operating device.
Optionally, the communication device employs a WIFI6 wireless transceiver.
Optionally, the security management apparatus further includes a processor, a key generator, and a secret parameter memory;
the processor is respectively connected with the key generator and the secret parameter memory and is used for generating trigger information according to the target information after receiving the target information and respectively sending the trigger information to the key generator and the secret parameter memory;
the key generator is connected with the processor and used for acquiring the trigger information and generating a key according to the trigger information;
the secret parameter memory is connected with the processor and used for acquiring the trigger information, sending secret parameters according to the trigger information and carrying out encryption operation on the secret key according to the secret parameters to obtain the secret key parameters.
Optionally, the operating device includes an instruction triggering module, an information display module, and an identity verification circuit;
the instruction triggering module is connected with the identity verification circuit and used for acquiring the target information and sending the target information to the identity verification circuit for verification;
the information display module is connected with the installation device and used for acquiring the execution status sent by the installation device and correspondingly displaying according to the execution status.
Optionally, the system further comprises a power management device;
and the power supply management device is used for providing electric quantity with preset specifications for each module in the installation and management device.
Optionally, the encryption device adopts an NVMe SSD main control chip.
Optionally, the storage device adopts a NAND Flash chip.
Optionally, the operating device is connected to the safety pipe devices, and is configured to send the target information to at least two safety pipe devices in a preset sequence.
Optionally, the operating device is connected to the safety management devices, and is configured to send the target information to at least two safety management devices simultaneously.
In the embodiment of the application, the operating device is connected with the safety management device and used for acquiring target information, verifying the target information and sending the target information after verification to the safety management device; the security management device is connected with the encryption device and used for generating a key parameter according to the target information and sending the key parameter and the target information to the encryption device; the encryption device is connected with the storage device and used for encrypting the target information according to the key parameter and sending the encrypted target information to the storage device so that the storage device executes corresponding operation according to the encrypted target information. The data is verified before being stored in the storage device by the operation device, so that the safety of the target information currently transmitted into the storage device is ensured, the target information is encrypted by the key parameter generated by the safety management device according to the target information passing the verification and then is sent to the storage device, the safety of the data information is further guaranteed, and the safety risk of the target information stored in the storage device is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a security management and control storage system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a second security management and control storage system according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a third structure of a safety management and control storage system according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
Fig. 1 is a schematic flowchart illustrating a security management and control storage system according to an embodiment of the present application, and as shown in fig. 1, the security management and control storage system may include an operating device 10, a security management device 20, an encryption device 30, and a storage device 40;
the operating device 10 is connected to the administration device 20, and is configured to acquire target information, verify the target information, and send the target information after verification to the administration device 20.
In this embodiment, in order to reduce the security risk of data information in information carriers including solid state disk, flash disk, optical disk, etc., a security management apparatus 20 may be disposed in the current information carrier for management and control, and a user may send control information or data information that the user wants to issue to the security management apparatus 20 connected to the operation apparatus 10 through the operation apparatus 10 in the security management and control storage system, where the control information or data information is the above-mentioned target information, because it is considered that if the user who currently operates the information carrier is not an authorized user, there is a risk of leakage of information in the current information carrier, when issuing the target information in the operation apparatus 10 in the security management and control storage system, the operation apparatus 10 verifies the identity information of the current operator included in the currently received target information, so as to determine whether the current operator has a corresponding operation right, to reduce the risk of leakage of data information in the information carrier.
The target information includes control information issued by the user according to the current state of the information carrier, and the user can obtain the current state of the information carrier through a display module in the operation device 10 operated by the user currently; the target information may also include information transmitted by operating the device 10 when the user wants to store data information, including but not limited to audio information, video information, image information, or text information.
Optionally, because the operation device 10 manages at least two security management devices 20 simultaneously, considering that different user groups have different operation authorities for different information carriers, when the authentication of the identity circuit in the operation device 10 is successful, there may be a situation that an operator with successful current authentication has no corresponding operation authority for one of the at least two information carriers corresponding to the operation device 10, so an identity verification circuit may also be provided in the security management device 20 to further verify whether the current operation user has an operation authority for the current information carrier.
The administration device 20 is connected to the encryption device 30, and configured to generate a key parameter according to the target information, and send the key parameter and the target information to the encryption device 30.
In this embodiment, after the security management apparatus 20 in the security management and control storage system receives the target information that is successfully verified, the management and control mechanism in the security management apparatus 20 may be triggered, so that the security management apparatus 20 generates a key parameter according to the target information sent by the operation apparatus 10, and sends the generated key parameter and the target information that is successfully verified to the encryption apparatus 30 in the information carrier, so that the encryption apparatus 30 performs a corresponding encryption operation on the target information according to the key parameter. The encryption device 30 adopts an NVMe SSD main control chip, for example, PCIe 3x4 NVMe 1.4SSD secure main control chip.
Optionally, since the target information may include control information issued by the user for the current state of the information carrier, the management and control mechanism in the management and control apparatus 20 may perform corresponding management and control operations according to the control information in the target information. For example, when the target information includes the system status of the encryption apparatus 30 in the current information carrier to be reset, the management apparatus 20 can monitor the current status of the encryption apparatus 30, which needs to be reset, in real time after sending the information to the encryption apparatus 30; or when the target information includes the system capability upgrade aiming at the encryption device 30 in the current information carrier, the security management device 20 can monitor the current state of the encryption device 30 in real time after sending the information to the encryption device 30.
Optionally, in an environment where the operating device 10 does not send the target information, if the security management device 20 receives a preset emergency trigger signal, that is, some modules in the current information carrier have a change with a security risk, and a signal generated by the change is an emergency signal preset inside the security management device 20, an emergency operation mechanism inside the security management device 20 may be triggered, and the security management device 20 may send the emergency trigger signal to the operating device 10, so that the operating device 10 performs a corresponding operation according to the emergency trigger signal, for example, notifies a user in a preset manner, so that the user sends corresponding target information according to the trigger signal; or directly issue the instruction information preset by the user according to the emergency trigger signal, so that the safety management device 20 performs corresponding operation according to the instruction information. The generation factors of the emergency trigger signal include the occurrence of connection between devices in the information carrier, and the identity information input by the user during operation, such as unauthorized people.
As a specific example and not by way of limitation, if the current information carrier is subjected to an illegal operation or attack due to external factors such as loss or interception by an unauthorized person, and the like, and the security management device 20 receives a preset emergency trigger signal, the security management device 20 sends the emergency trigger signal to the operation device 10, so that the operation device 10 issues a corresponding self-destruction instruction, and when the security management device 20 receives the self-destruction instruction issued by the operation device 10, the self-destruction operation is performed, and the current execution status of the self-destruction operation is fed back to the operation device 10 in real time, thereby ensuring that the data information in the information carrier does not enter the hands of the unauthorized person.
The encryption device 30 is connected to the storage device 40, and is configured to encrypt the target information according to the key parameter, and send the encrypted target information to the storage device 40, so that the storage device 40 performs a corresponding operation according to the encrypted target information.
In this embodiment, after the encryption device 30 receives the key parameter and the target information sent by the administration device 20, the sent target information is encrypted according to the key parameter, so as to reduce the security risk of the data information. After the encryption device 30 sends the successfully encrypted target information to the storage device 40 in the information carrier, the storage device 40 may execute corresponding operations according to the encrypted target information, for example, if the target information only includes data information for storage, the storage device 40 stores the target information, and after the storage is completed, the storage device 40 sends the execution result to the administration device 20, so that the administration device 20 feeds back the execution result to the operation device 10 in real time, thereby facilitating the user to monitor the current state of the information carrier. One or two or more storage devices 40 may be provided, and the storage devices 40 may be NAND Flash chips.
Optionally, if the purpose of the control information included in the current target information is to send part of the data information in the storage medium to the corresponding receiving end, the security management apparatus 20 triggers a corresponding management and control mechanism after receiving the target information, and sends the data information to the information receiving end included in the target information after receiving the corresponding data information fed back by the storage apparatus 40 according to the target information, where the information receiving end may be applied to schools, hospitals, industrial controls, and the like, it can be understood that, if there are at least two information receiving ends included in the target information, the security management apparatus 20 may send the corresponding data information to the corresponding information receiving ends simultaneously or sequentially.
It can be understood that, as shown in fig. 2, at least one information carrier can be controlled correspondingly through the operation device 10, when the user issues corresponding target information through the operation device 10, the target information can be sent to the control unit in at least two information carriers that the user expects to control simultaneously, so that the control unit can perform the following control operation, so as to implement the transmission, storage or corresponding control of one to many data information through the operation device 10. Then, the operation device 10 receives the execution status of the corresponding module in the information carrier fed back by the management and control unit in real time, so as to monitor the completion status of the at least two information carriers on the basis of ensuring the security in the data transmission and storage process, thereby achieving corresponding industrial control, for example, control of each process or station used in the industry 4.0.
Optionally, as shown in fig. 3, the security management and control storage system further includes a communication device 50; the communication device 50 comprises a receiving module 51 and a transmitting module 52;
the receiving module 51 is connected to the operating device 10, and is configured to receive the target information, so that the safety management device 20 performs a corresponding operation according to the target information.
The transmitting module 52 is connected to the operating device 10, and configured to acquire an execution status of the storage device 40 when executing a corresponding operation, and send the execution status to the operating device 10.
In this embodiment, the external information transmission of the security management device 20 is realized through at least one communication device 50, where the communication device 50 includes a preset communication protocol, and the security management device 20 can send corresponding data information to a corresponding receiving end that also includes the communication protocol through the communication protocol. The security management apparatus 20 can further obtain the execution status of the storage apparatus 40 when executing the corresponding operation, and send the execution status to the operation apparatus 10 through the transmitting module 52, and since the communication apparatus 50 includes the receiving module 51 and the transmitting module 52, the operation apparatus 10 and the security management apparatus 20 can exchange the current target information and the execution status obtained previously according to the target information simultaneously or exchange data in a priority order of a preset rule.
Optionally, the priority order of the preset rules includes sorting according to the data information, the execution status, and the urgency of the trigger signal of the policing device 20, and generally speaking, when the change of the current information carrier triggers the preset urgency trigger signal in the policing device 20, it indicates that the signal is most critical at present, so the signal can be transmitted first.
Optionally, the communication device 50 employs a WIFI6 wireless transceiver, and the frequency band of the wireless transceiver may be 2.4GHz/5.8 GHz. Through the WIFI6 wireless communication function who utilizes WIFI6 wireless transceiver, carry out information transmission and the management and control of predetermineeing the within range at WIFI6 wireless communication channel, for example, the radio frequency signal who carries target information receives through the antenna of above-mentioned WIFI6 wireless transceiver to realize information transmission.
Optionally, the wireless communication capability of the WIFI6 wireless transceiver is a radio frequency communication capability, and if a large amount of data needs to be exchanged between the operating device 10 and the information carrier and an excessive operating distance is not required, the WIFI6 protocol may be used. If the operating distance is considerable but the data exchange amount is small, the 5G communication protocol can be selected. Taking the scheme based on the 5G communication protocol as an example, because the protocol requires very little power consumption and the communication distance can reach 10 to 20 km, an operator can effectively control the information carrier within a town range without accurately knowing the position of the information carrier, for example, when the information carrier is lost, a self-destruction mechanism is started, and the like.
Optionally, the administration device 20 further comprises a processor 21, a key generator 22 and a security parameter memory 23;
the processor 21 is connected to the key generator 22 and the security parameter storage 23, and configured to generate trigger information according to the target information after receiving the target information, and send the trigger information to the key generator 22 and the security parameter storage 23, respectively.
In this embodiment, when the processor 21 in the administration device 20 receives the target information, it generates the trigger information according to the target information, that is, the trigger information generated according to the trigger mechanism in the processor 21, and the processor 21 respectively sends the trigger information to the key generator 22 and the secret parameter memory 23 in the administration device 20 so as to generate the key parameter which can be used to encrypt the target information, and the processor 21 may be an MCU or a CPU.
The key generator 22 is connected to the processor 21, and configured to acquire the trigger information and generate a key according to the trigger information.
The secret parameter memory 23 is connected to the processor 21, and is configured to obtain the trigger information, send a secret parameter according to the trigger information, and perform an encryption operation on the secret key according to the secret parameter to obtain the secret key parameter.
In this embodiment, when the key generator 22 and the secret parameter memory 23 in the security management apparatus 20 receive the trigger information sent by the processor 21, the key generator generates a key and a secret parameter respectively according to the trigger information, encrypts the key by using the secret parameter to obtain the key parameter, and sends the key parameter to the encryption apparatus 30, so that the encryption apparatus 30 performs the encryption operation of the target information according to the key parameter.
Optionally, the operating device 10 includes an instruction triggering module 11, an information display module 12, and an identity verification circuit 13;
the instruction triggering module 11 is connected to the authentication circuit 13, and is configured to acquire the target information and send the target information to the authentication circuit 13 for authentication.
In this embodiment, the operation device 10 obtains target information generated by a user operation through the instruction trigger module 11 disposed inside the operation device, and the identity information of the user currently operating the information carrier is realized through the identity verification circuit 13 disposed inside the operation device, so as to determine whether the current operator is an authorized person, so as to prevent data information in the current information carrier from leaking, the identity verification circuit 13 verifies the identity of the user through verifying the identity information in the target information sent by the instruction trigger module 11, and after the identity verification circuit 13 verifies successfully, the target information that is successfully verified is sent to the administration device 20, and the administration device 20 can perform a corresponding operation according to the received target information.
The information display module 12 is connected to the installation device 20, and is configured to obtain the execution status sent by the installation device, and perform corresponding display according to the execution status.
In this embodiment, the operation device 10 displays the corresponding execution status when the information carrier is controlled through the information display module 12 disposed inside the operation device, and the information display module 12 obtains the execution status of the storage medium sent by the administration device 20 and correspondingly displays the execution status according to the obtained execution status. The information display module 12 in the above-described operation device 10 is mainly displayed by an internally provided display device, such as an LED or an LCD.
Optionally, the security management and control storage system may further include a power management device; the power management device is used for providing the electric quantity with the preset specification to each module in the installation and management device 20.
In this embodiment, in order to prevent the operation device 10 from failing to control the information carrier in an unexpected situation, a power management device may be installed inside the information carrier, the power management device includes an energy storage unit, and the energy stored in the energy storage unit is used to provide the preset specification of electric quantity to each module in the safety management device 20, so that the safety management device can complete the management and control operation without external energy even when the operation related to the safety management and control is performed, where the energy storage unit includes a small-capacity battery or other energy storage elements.
By way of specific example and not limitation, only one power supply is provided, but the power supplies required by the modules are different, so that the power management module is required to supply power to the modules through the energy storage units built in the power management module. For example, if the current total voltage is 10 volts, and voltages required by other modules are 5 volts, 1.5 volts, and 2 volts, the power management module is required to reduce the voltage of 10 volts to 5 volts, 1.5 volts, and 2 volts respectively to supply corresponding module electric quantities, so that the corresponding modules operate.
Alternatively, the power management means may also supply power to other devices in the information carrier.
Optionally, the security management and control storage system may further include a display device, where the display device is disposed in the information carrier and is used to display a current operation state of the information carrier, and in a case where there is a need, the display device may perform corresponding display.
Optionally, the operation device 10 is connected to the safety pipe devices 20, and is configured to send the target information to at least two safety pipe devices 20 in a preset sequence.
Optionally, the operation device 10 is connected to the safety pipe device 20, and is configured to send the target information to at least two safety pipe devices 20 at the same time.
In the embodiment of the application, the operating device is connected with the safety management device and used for acquiring target information, verifying the target information and sending the target information after verification to the safety management device; the security management device is connected with the encryption device and used for generating a key parameter according to the target information and sending the key parameter and the target information to the encryption device; the encryption device is connected with the storage device and used for encrypting the target information according to the key parameter and sending the encrypted target information to the storage device so that the storage device executes corresponding operation according to the encrypted target information. The data is verified before being stored in the storage device by the operation device, so that the safety of the target information currently transmitted into the storage device is ensured, the target information is encrypted by the key parameter generated by the safety management device according to the target information passing the verification and then is sent to the storage device, the safety of the data information is further guaranteed, and the safety risk of the target information stored in the storage device is reduced.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (6)

1. A safety control storage system is characterized by comprising an operation device, a safety management device, an encryption device and a storage device;
the operation device is connected with the safety pipe device and comprises an instruction triggering module, an information display module and an identity verification circuit; the information display module adopts a display device;
the security management device is connected with the encryption device and comprises a processor, a key generator and a secret parameter memory;
the encryption device is connected with the storage device, the encryption device adopts an NVMe SSD master control chip, and the storage device adopts an NAND Flash chip.
2. The security-managed storage system of claim 1, further comprising a communication device; the communication device comprises a receiving module and a transmitting module; the receiving module is connected with the operating device; the transmitting module is connected with the operating device.
3. The security-managed storage system of claim 2, wherein said communication device employs a WIFI6 wireless transceiver.
4. The security-managed storage system of claim 1, comprising: the processor is respectively connected with the key generator and the secret parameter storage.
5. The security-managed storage system of claim 1, comprising: the instruction triggering module is connected with the identity verification circuit; the information display module is connected with the pipe installing device.
6. The security-managed storage system of claim 1, further comprising a power management device.
CN202022561252.5U 2020-11-06 2020-11-06 Safety control storage system Active CN214384653U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202022561252.5U CN214384653U (en) 2020-11-06 2020-11-06 Safety control storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202022561252.5U CN214384653U (en) 2020-11-06 2020-11-06 Safety control storage system

Publications (1)

Publication Number Publication Date
CN214384653U true CN214384653U (en) 2021-10-12

Family

ID=77991579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202022561252.5U Active CN214384653U (en) 2020-11-06 2020-11-06 Safety control storage system

Country Status (1)

Country Link
CN (1) CN214384653U (en)

Similar Documents

Publication Publication Date Title
WO2021022701A1 (en) Information transmission method and apparatus, client terminal, server, and storage medium
CN106375287B (en) Charging method of new energy automobile
EP2874151B1 (en) Method and apparatus for controlling access to encrypted data
CN205140035U (en) Mobile terminal and intelligent communication system who locks
CN105184935A (en) Bluetooth intelligent lock system capable of sharing passwords by WeChat
CN106611310B (en) Data processing method, wearable electronic device and system
CN112910100B (en) Credible power supply and receiving device and control method thereof
CN102255109A (en) Authentication method for mobile terminal battery, and mobile terminal thereof
CN103853672A (en) Mobile secure storage equipment with multiple data protection functions
CN102685073A (en) Secure payment method and mobile terminal
CN105631298B (en) A kind of ciphering and deciphering device and method
CN104346586B (en) The method of the storage device and type self-destroyed protection data of type self-destroyed protection data
CN114239015A (en) Data security management method and device, data cloud platform and storage medium
CN106959910A (en) Remote data management method and system
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN100592317C (en) Peripheral apparatus and method for verifying authority thereof
CN214384653U (en) Safety control storage system
CN112583595B (en) Vehicle charging safety management method
CN201150068Y (en) Multifunctional information safety equipment
CN108182745A (en) The smart lock and its encryption method of a kind of decentralization
CN112287310A (en) Safety control storage system
CN101236674A (en) Intelligent cipher key equipment and method for information exchange with external apparatus
KR100826780B1 (en) System and Method for Monitoring of User Terminal, Apparatus for the Same and Security Agent
CN113453223B (en) Key updating method, system, device, storage medium and terminal
CN113115308B (en) Secondary issuing method and authentication method for vehicle-mounted unit and related product

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 502, Block A, Jingang Center, Jingang Building, Haoye Community, Xixiang Street, Baoan District, Shenzhen City, Guangdong Province, 518000

Patentee after: Shenzhen anjilite New Technology Co.,Ltd.

Address before: No.302, no.6, zone 2, Fuhai Industrial Zone, Fuyong community, Fuyong street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen anjili New Technology Co.,Ltd.

CP03 Change of name, title or address