WO2010142123A1 - Method for protecting a storage device based on internet - Google Patents

Method for protecting a storage device based on internet Download PDF

Info

Publication number
WO2010142123A1
WO2010142123A1 PCT/CN2009/075958 CN2009075958W WO2010142123A1 WO 2010142123 A1 WO2010142123 A1 WO 2010142123A1 CN 2009075958 W CN2009075958 W CN 2009075958W WO 2010142123 A1 WO2010142123 A1 WO 2010142123A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
user
legal
illegal
holder
Prior art date
Application number
PCT/CN2009/075958
Other languages
French (fr)
Chinese (zh)
Other versions
WO2010142123A8 (en
Inventor
王德高
向前
Original Assignee
Wang Degao
Xiang Qian
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wang Degao, Xiang Qian filed Critical Wang Degao
Publication of WO2010142123A1 publication Critical patent/WO2010142123A1/en
Publication of WO2010142123A8 publication Critical patent/WO2010142123A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the wood that Muyou wants to solve is the method of making a new one on the wood. Help legitimate users to provide legal users in my wood support and various lost, such as illegal users, P-address, wooden geographic location, legal user file system, and in my upgrade management, the effective use of illegal users for legitimate users Each.
  • the methods used in this are especially useful for SS insurance.
  • the identity of the legal identity holder includes the security and legality of the legitimate user identity of the legitimate identity holder of the legally owned user.
  • the legal identity of the holder of the identity includes the confidentiality of the identity of the user in the identity of the user.
  • the irreversible algorithm is stored in the manufacturer's customer and the service and the identity of the person who is updated as a legitimate user.
  • Each is one of the , , and each of the tapes.
  • Wood Friends Method The global legal identity of the users in my control is on the various management platforms of the manufacturer, and all illegal users. Some sub-tools and operating systems are also known for their control. Muyou method is not
  • Lifelong license holders of all legal identity holders provide lifelong The security and legitimacy of the identity of the legal identity holders of each image is preserved by the user who legally holds the image in the security of my identity.
  • the irreversible algorithm is stored in the manufacturer's client and the service and the update.
  • the identity of the legal identity is cracked. Not user-safe and like a work insurance.
  • the legal holder of the legal identity can provide the husband and wife. a is a wooden friend SS customer
  • 2c is a wooden friend who uses the enemy on the SS.
  • 6b is Muyou software, indicating
  • step 5 If you are more than one, if the ratio is not correct, step 5
  • Step 6 6 The identity of the enemy is illegal users and the customer on the request of step 6 S S security insurance illegal users waiting near SS
  • the SS command illegal terminal includes the establishment of various warning announcements, and the SS of the illegal user-installed SS valid legal user will be the first user on the illegal user.
  • the SS is normally included in the security of the SS and the first user and file system. Into a file in a specific manufacturer for each control or SS
  • the metafiles of other operating systems each complete the SS's dividend table, and the customer's user does not have XFFFF to install the other SS in the other C's vision and then change the manufacturer's work order in SS to fail her failure or all users. If the violent force resolves the SS P self-destruct interface, the illegal user law is normal only if the legitimate user returns the SS to the manufacturer or. the way
  • a wood such as a to 3 is shown.
  • the circle of a b c S S can be mutually exchanged by the customer on the one hand and the user input and return to the user on the other hand SS to the indication SS from the upper S reception on the SS rise ⁇ S S installation on the SS
  • the manual method can also be used, or the method of short estimation.
  • SS can also notify legitimate users by means of , ie , , , and short evaluation.
  • Each handshake is the SS kimono's SS identity to each of the immigrants including the Hermitian Hardware SS command. If the user is a legitimate user and the SS command is not available, it will work normally. Otherwise SS is normal
  • self-destruction can be self-destructive and violent in wood. "Including, for example, shackles, hardware connections, and so on.
  • the wood shown in 4 to 7b uses an internal S S .
  • the flow steps, hardware and software are shown in the circle, no longer here.
  • the above content is the way to take a break.
  • the step made by Muyou is not the same as that of Muyou.
  • the ordinary wooden people in the wood field of Muyou did not make some equivalent substitutions or good tastes under the premise of not Wanmuyou, and the performance or use of the same is still in the protection of Muyou.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

A method for protecting a storage device based on internet is provided by the present invention, the protected object is the storage device, the method includes performing secure read-write protection of the data to the protected object, encrypting the data, authenticating the identity of the holder with legal identity feature, and refusing the use of the illegal user, the method is characterized in that: the global on-line authentication is performed by using internet. The cipher protection is used for the legal user identity authentication in the data of the program control area of the protected object device, and all illegal user groups are counted, real-time displayed and monitored on the server management platform of the manufacturer. The present invention protects not only all the data of the storage device, but also the right of the holder with legal identity feature, and provides lifelong identity registration information management service for the holder with legal identity feature. Not only the user data security is protected, but also the working state of the protected object is protected. When the protected object is lost or the illegal user uses the device, the relevant information of tracing and maintaining rights are provided for the holder with legal identity feature.

Description

于 的 各 方法 木領域  Various methods of wood
木友 涉及 各 特別是涉及 于 的 各 方法。 背景 木  Muyou involves various methods that are particularly relevant. Background
有 各的保 木多 多 如 公司的敬 系統 PS 公司的 敬 系統 axsa比 以及西部 的保 系統 aa Sa比G de 。 未 各 的 勢的代表是固 o dSae sk 略 SS 其接口 和 又、 功能及 方法 普通 各完全相同 在 品外形和尺寸上也 木 普通 各一致 包括3.5"、 2.5"和 1.8"等 。有夫固 的保 木 目前中 古 利 有 01403996A公升的 《 安全保 方法及 》、 C 01398749A公 升的 《 均衡的方法、 和系統》、 49664A公升的 《固 及 她 管理 的方法》 以及 1030167A公升的 《 的 管理方法》。 SS 的保 方法 合法用戶 行注 管理 且只是 SS 用戶木 可操作 的敬 中的合法用戶身份 存在 、 破解的 。 至于涉及 SS 的 在我 o age ewokSa比g ad 略 S S 方法尚未 有 。 內容  There are a lot of various insurances such as the company's respect system PS company's respect system axsa ratio and the western security system aa Sa than G de. The representative of each potential is solid o dSae sk slightly SS its interface and again, functions and methods are generally the same in the shape and size of the wood are also common, including 3.5", 2.5" and 1.8 "Wait. Fumu's Baomu currently has 01403996A liters of "Safety Protection Methods and", C 01398749A liters of "balanced methods, and systems", 49,664A liters of "solid and her management methods" and 1030167A liters The "Management Method" of SS. The method of SS is legal user-lined management and only the legitimate user identity of the SS user can be manipulated and cracked. As for the SS method, I am slightly more SS method than g ad. Not yet available. Content
木友 所要解決的 木 是你 上 有 木的不足 提出一 新的 于 的 各 方法。 助合法用戶 在我 用的 各 力合法用戶提 供在我 木支持和 各遺失 例如 非法用戶的 P地址 木地理位 力合法用戶 文件系統及 的敬 在我升級管理 各的固 井有效 非法用戶 用合法用戶的 各。 于 的 各 方法尤其活用 于 SS 施保 。  The wood that Muyou wants to solve is the method of making a new one on the wood. Help legitimate users to provide legal users in my wood support and various lost, such as illegal users, P-address, wooden geographic location, legal user file system, and in my upgrade management, the effective use of illegal users for legitimate users Each. The methods used in this are especially useful for SS insurance.
木友 的 木 用以下 木方案予以解決  Muyou's wood is solved with the following wood scheme
于 的 各 方法 是 各 包括  Each method is included
安全 、 、 合法身份特 持有者 身份 以及 非法用戶 。  Security, legal identity, identity, and illegal users.
于 的 各 方法的特 是  The specifics of each method
全球在我 。  The world is in me.
木友 的 木 用以下 一步的 木方案予以解決 于 的 各 方法 包括 各控制 的敬 中 的合法用戶身份 。 有的分 工具和操作系統 木 各控制 的敬 操作 即 也 知曉 的 。 Muyou's wood is solved by the next wood plan Each method includes a legitimate user identity of each control. Some sub-tools and operating system wood control are also known.
全球在我 包括在 上 用戶 系統 以及在用 戶 S S成功 由 各 客戶端的保 即 佰 在我 即 佰 近 一旦 遺失或 、 非法用戶占有 即可 S S安全保 或者 非法占有正在 用狀 的保 以近 控制方式自毀 以 合法用戶的敬 安全 防止 非法 及 且只有合 其內部 的 。  Globally, I am included in the user system and the user SS is successfully saved by each client. I am close to the one or lost, or the illegal user possesses the SS security or illegal possession. The security of legitimate users is prevented from being illegal and only internal.
合法身份特 持有者身份 包括 合法持有 象的用戶提供終身身份 管理 各 象的合法身份特 持有者的合法用戶身份的安全性和合 法性。  The identity of the legal identity holder includes the security and legality of the legitimate user identity of the legitimate identity holder of the legally owned user.
合法身份特 持有者身份 包括由合法持有 象的用戶在我 身份安全 的保密 5不可逆 算法特 的 保存 在 制造商的 各 客戶 和服各 比 和更新 象的士人的合法用戶身份 破解。  The legal identity of the holder of the identity includes the confidentiality of the identity of the user in the identity of the user. The irreversible algorithm is stored in the manufacturer's customer and the service and the identity of the person who is updated as a legitimate user.
木友 的 木 用以下再 一步的 木方案予以解決  Muyou's wood is solved with the following wood plan
合法持有 象的用戶提供終身身份 管理 各 是將 于 作力合法用戶 升級 各的終身 。  Users who are legally possessed provide lifetime identity management. Each will be a lifelong extension of the legitimate user.
包括合法身份特 持有者身份、 、 方式 象的 銅 、 、 軟件、 用戶 以及用戶 。  This includes the identity of the legal identity holder, the mode of copper, software, users, and users.
是 各 泛指 于 或系統滿足永久的 形式以保存和 用的軟件 和 文件的 各。  It is the software and documentation that is generally referred to or that the system satisfies a permanent form for preservation and use.
各是 、 、 各和可 磁帶中的一 。  Each is one of the , , and each of the tapes.
是磁碟 和SS 中的一 。  Is one of the disk and the SS.
的 是包括控制 、 的SS  Is including control, SS
木友 有 木 比的有益效果是  Muyou has the beneficial effect of wood ratio
木友 方法 全球在我 各 控制 的敬 中的 合法用戶身份 在制造商 各 管理平台 、 和 所 有非法用戶 休。 有的分 工具和操作系統 木 各 控制 的敬 操 作 即 也 知曉 的 。木友 方法不  Wood Friends Method The global legal identity of the users in my control is on the various management platforms of the manufacturer, and all illegal users. Some sub-tools and operating systems are also known for their control. Muyou method is not
各的全部 合法身份特 持有者的 合法身份特 持有者提供終身 管理 各 象的合法身份特 持有者身份的安全性和合法性 由 合法持有 象的用戶在我 身份安全 的保密 5不 可逆 算法特 的 保存在 制造商的 各 用戶端和 服各 比 和更新 象的合法身份特 持有者身份 破解。 不 用戶 安全提供 而且 象的工作 行保 。 在 遺失或非法用戶 可力合法身份特 持有者提供相夫 、 的 。 a是木友 S S 客戶 示意Lifelong license holders of all legal identity holders provide lifelong The security and legitimacy of the identity of the legal identity holders of each image is preserved by the user who legally holds the image in the security of my identity. The irreversible algorithm is stored in the manufacturer's client and the service and the update. The identity of the legal identity is cracked. Not user-safe and like a work insurance. In the case of a lost or illegal user, the legal holder of the legal identity can provide the husband and wife. a is a wooden friend SS customer
b是木友 S S 終端 SS 示意 c是木友 S S 客戶 示意 b is Muyou S S terminal SS indicates c is Muyou S S customer
2a是木友 用戶 客戶 示意 2a is a friend of Muyou.
2b是木友 用戶 各 示意 2b is a friend of Muyou
2c是木友 各 利用 SS 上 的仇士 自 非法用戶 示意 2c is a wooden friend who uses the enemy on the SS.
3是木友 一中一介受到S S 的SS 的典型工作 。 3 is a typical work of the SS of the S S.
4是木友 S S 的 示意 4 is the indication of Muyou S S
5是木友 一介典型的S S 、 示意 5 is a wooden friend, a typical S S , indicating
6a是木友 客戶 軟件 示意 6a is Muyou customer software
6b是木友 各 軟件 示意 6b is Muyou software, indicating
7a是木友 客戶 硬件 示意 7a is Muyou customer hardware
7b是木友 各 硬件 示意 。  7b is the hardware of each of the friends.
休 方式  Hugh way
下面將 合 休 方式 木友 一步 。  The following will be a way to take a break.
于 的SS 方法  SS method
客戶 依 有以下步驟  Customer has the following steps
1 自  1 from
2 自 SS 的S 仇士 上 各  2 from SS's S.
3 仇士 及其它 上 各 向 各 S S  3 The enemy and the other are all S S
4 接收服各 下 的 成功 被 力合法用戶的仇士 佰 S S 向 各 上 SS 的仇士  4 Received the success of each service by the legitimate user of the enemy 佰 S S to each of the SS's genius
5 在 接收服各 下 的保密 比 一旦 SS 遺失或 、 非法用戶占有 立即將仇士是非法用戶的提示上 各  5 The confidentiality ratio under the receiving service. Once the SS is lost or the illegal user possesses, the prompting of the enemy is an illegal user.
6 合法用戶 汞制造商的 S S 管理系統 或者是通 制造商指定的 佰 在我 S S安全保 6 Legal user mercury manufacturer's SS management system or specified by the manufacturer Now my SS security
7 SS 接收到 各 指令 立即立即 自 系統 佰 下 提示目前用戶是非法用戶 合法用戶的 方式 以后再佰 系統 即 將木SS 安裝在其它 C 仍然視力空 不能 任何 。 制造商 各 依 有以下步驟  7 SS Received each command immediately Immediately from the system Prompt the current user is an illegal user Legal user's way. Later, the system will install the wood SS in other C. Still vision can not be any. Manufacturers each have the following steps
1 在 上 用戶 系統 // .Cc/egse  1 on the user system // .Cc/egse
2 將客戶 步驟2 上 的 制造商的 品出 比 且將 的 汞到S S  2 Compare the manufacturer's product on step 2 with the mercury to S S
3 將客戶 步驟3 上 的 S S 的仇士 及其它 比 且將 S S成功的用戶予以 客戶端的保 即 佰 在我 即佰 近 指令客戶 將 SS 行狀 上 制造商 各 通 制造商 各 SS 木比 和升級管理固  3 The customer of the SS in the customer step 3 and other users who have succeeded in the SS will be given the client's guarantee. I will immediately order the customer to send the SS line to the manufacturer. Solid
4 將客戶 步驟4 佰 S S 上 的SS 仇士 行合法用戶身份 將上 未的 5不可逆 算法特 的 密的保密 客戶 在我 比 即將保密 比 下 客戶 如果比  4 Will the customer Step 4 佰 S S on the SS *** line legal user identity will not on the 5 non-reversible algorithm special secret confidential customer
再 行一 比 如果比 果不正 步驟5 比  If you are more than one, if the ratio is not correct, step 5
保存在制造商 各 保用戶 唯一 和保密 Saved in the manufacturer, each user is unique and confidential
5 將客戶 步驟5 上 的仇士是非法用戶的提示 存入 S S 的  5 Deposit the prompt of the enemy on the customer's step 5 as an illegal user into S S
比 仇士的身份 如果 仇士的身份是非法用戶 步驟6 6 仇士的身份 是非法用戶 以及客戶 步驟6 上 的要求 S S安 全保 的 非法用戶 等待 近 SS  If the identity of the enemy is an illegal user Step 6 6 The identity of the enemy is illegal users and the customer on the request of step 6 S S security insurance illegal users waiting near SS
7 收到合法身份特 持有者 且由制造商 各 立即近 7 Received legal identity holder and by manufacturer
SS 指令 非法 終端 包括建立 各 預警公告 、 非法用戶裝 佰 S S有效 合法用戶的 SS 將在非法用戶 上 第一吋同 命令客戶 SS 正常 包括SS 的 各 安全保 及加 各 先 用戶 及文件系統 、 各 縮成一介文件 在特定的制造商 各控制 或 SS  The SS command illegal terminal includes the establishment of various warning announcements, and the SS of the illegal user-installed SS valid legal user will be the first user on the illegal user. The SS is normally included in the security of the SS and the first user and file system. Into a file in a specific manufacturer for each control or SS
其它操作系統的元 文件 各 完成 SS 的分 息表、 客戶 用 戶 未的 XFFFF 以 即 將木SS 安裝在其它 C 仍然視力空 再將 SS 中制造商 工作指令更改 佰 失敗 她于故障 或 所有用戶 。 如果暴力強制解 SS P 自毀 接口 失效 非法用戶 法正常 只有由合法用戶將SS 返回 制造商 或 。 方式 The metafiles of other operating systems each complete the SS's dividend table, and the customer's user does not have XFFFF to install the other SS in the other C's vision and then change the manufacturer's work order in SS to fail her failure or all users. If the violent force resolves the SS P self-destruct interface, the illegal user law is normal only if the legitimate user returns the SS to the manufacturer or. the way
一 木例如 a至 3所示。其中 a b c S S 的 由圈可 各 一方面 客戶 交互 接受用戶的 及 用戶輸入的 向用戶返回 另一方面 SS 到 指示SS 自 上 S 接收 在SS 上升佰 S S 在SS 上安裝 近 A wood such as a to 3 is shown. The circle of a b c S S can be mutually exchanged by the customer on the one hand and the user input and return to the user on the other hand SS to the indication SS from the upper S reception on the SS rise 佰 S S installation on the SS
" 如果原已安裝 則此步驟中 安裝" 佰"。  " If you have already installed it, install "佰" in this step.
成功 且在SS 上升佰 S S 如果用戶 SS 可 向 各 其流 2a和2b所示。 人工 的方式也可以 、 或 短估 的方式。  Success and rise in SS 佰 S S if user SS can be shown to each of streams 2a and 2b. The manual method can also be used, or the method of short estimation.
另一方面 在SS 中 各 SS 上 的仇士  On the other hand, the SS of the SS in SS
SS 是否 。 即 SS 用戶 沒有 各 也可以及早 。 如 2c所示。其 的方式 要是 SS 上 的仇士硬件 SS 在的硬 件 是否 。 如果 則 力有被 可能 此 可 非法用戶 等待Is SS? That is, SS users do not have to be early. As shown in 2c. The way to do this is if the hardware of the SS hardware on SS is in the hardware. If the force is possible, this can be illegal.
SS 也可 于 、 即 、 、 、 短估等手段通知合法 用戶。  SS can also notify legitimate users by means of , ie , , , and short evaluation.
一介 佰 S S 的 SS 的典型工作 3。 SS 接 首先  A typical work of SS for S S. SS first
各 握手即 SS 和服各 SS 身份 向 各 上 仇士 包括仇士硬件 SS 指令是否 。 如果 力合法用戶且 SS 指令沒有 則 正常工作 。 否則 SS 正常 Each handshake is the SS kimono's SS identity to each of the immigrants including the Hermitian Hardware SS command. If the user is a legitimate user and the SS command is not available, it will work normally. Otherwise SS is normal
SS 的 各 安全保 及加 各 可 SS 相夫 XFFFF SS 作力 仍然視力空 SS 她于故障 或  SS security and plus each SS SS XFFFF SS effort still vision empty SS she is faulty or
如果遇到暴力 則佰 自毀 。 其中自毀 可用 有 木中的自毀 木 而 暴力 " 包括比如 佰 的 接 各 、 硬件 連接 、 等等。 If you encounter violence, you will be self-destructive. Among them, self-destruction can be self-destructive and violent in wood. "Including, for example, shackles, hardware connections, and so on.
4至 7b所示 木 是利用一介 內部 的S S 的 。 其流 步驟、 軟硬件 分別 圈中所示 在此不再 。  The wood shown in 4 to 7b uses an internal S S . The flow steps, hardware and software are shown in the circle, no longer here.
以上內容是 合 休的 方式 木友 所作的 一步 不能 木 友 的 休 只同 于 。 于木友 木領域的普通 木人 未 在 不 萬木友 的前提下做出若干等同替代或 品交 而且性能或用途相同 都 尚視力 于木友 的保 固。  The above content is the way to take a break. The step made by Muyou is not the same as that of Muyou. The ordinary wooden people in the wood field of Muyou did not make some equivalent substitutions or good tastes under the premise of not Wanmuyou, and the performance or use of the same is still in the protection of Muyou.

Claims

1、 于 的 各 方法 是 各 包括 安全 、 、 合法身份特 持有者 身份 以及 非法用戶 其特 在于  1. The methods of each include security, legal identity, and the identity of the illegal user.
全球在我 。  The world is in me.
2、 要求1 的 于 的 各 方法 其特 在于  2. The methods of claim 1 are characterized by
包括 汝各控制程序 的用戶身份 。  Includes the user identity of each control program.
3、 要求2 的 于 的 各 方法 其特 在于  3. The method of requirement 2 is characterized by
全球在 包括在 上 用戶 系統 以及在用 戶 S S成功 由 各 客戶端的保 即 佰 在我 即 佰 近 一旦 遺失或 、 非法用戶占有 即可 S S安全保 或者 非法占有正在 用狀 的保 以近 控制方式自毀 。 The world is included in the user system and the user S S is successfully protected by each client. Once I am near, lost or illegal users can be S S security or illegally possess the use of the near-control method.
4、 要求3 的 于 的 各 方法 其特 在于  4. The methods of claim 3 are characterized by
合法身份特 持有者身份 包括 合法持有 象的用戶提供終身身份 管理 各。  The identity of the legal identity holder, including the legitimate holder of the image, provides lifetime identity management.
5、 要求4 的 于 的 各 方法 其特 在于  5. The methods of request 4 are characterized by
合法身份特 持有者身份 包括由合法持有 象的用戶在我 身份安全 的保密 5不可逆 算法特 的 保存 在 制造商的 各 客戶 和服各 比 和更新。  The identity of the legal identity holder includes the confidentiality of the identity of the user who is legally held by the user. The irreversible algorithm is stored in the manufacturer's customer service and is updated.
6、 要求5 的 于 的 各 方法 其特 在于  6. The method of claim 5 is characterized by
合法持有 象的用戶提供終身身份 管理 各 是將 于 作力合法用戶 升級 各的終身 。 Users who are legally possessed provide lifetime identity management. Each will be a lifelong extension of the legitimate user.
7、 要求6 的 于 的 各 方法 其特 在于  7. The method of claim 6 is characterized by
包括合法身份特 持有者身份、 、 方式 象的 銅 、 、 軟件、 用戶 以及用戶 。  This includes the identity of the legal identity holder, the mode of copper, software, users, and users.
8、 要求7 的 于 的 各 方法 其特 在于  8. The method of claim 7 is characterized by
存儲 各足 存儲 各和可 磁帶中的一 Storage, storage, storage, and
9、 要求8 的 于 的 各 方法 其特 在于  9. The method of claim 8 is characterized by
是磁碟 和SSD中的一 。 It is one of the disk and SSD.
10、 要求9 的 于 阿的存儲 各 方法 其特 在于 是包括控制 、 存儲 的SSD 10. The storage of the request 9 is a method that includes control and storage of the SSD.
11、 固 方法 其特 是包括如下步驟  11. Solid method The following steps are included.
A、 SS 接 首先尋找阿 各 握手然 向 各 上 信息 SSD 令是否  A, SS, first look for A, shake hands, each information, SSD, whether
B、 如果 力合法用戶且 SS 指令沒有 則 正常工作 否 則 步驟C中的保  B. If the force is legal and the SS command is not available, then it works normally. Otherwise, the protection in step C
C、 SS 正常 。  C, SS is normal.
12、 要求 11 的固 方法 其特 是 在步驟C中胚包括如下 步驟 的至少 者 12. The solid method of claim 11 is characterized in that the embryo in step C includes at least one of the following steps
SS 的 存儲 各 安全保 及加 各  SS storage security and each
C2 SS 相夫 F F填充 SS 作力 仍然 力空  C2 SS phase F F filling SS force still force
C3 SS 她于故障 或 。  C3 SS She is at fault or .
13、 要求11或12 的固 方法 其特 是 如果遇到暴力 則 自毀程序 暴力 "包括 超迂 的 接 各 、 硬 件 接 、 。  13. A solid method that requires 11 or 12, especially if it is violent, then self-destructive procedures are violent, including super-connected, hard-wired, and.
14、 要求11或12 的固 方法 其特 是 在步驟A中 各 接收到 硬件信息 判斷 是否非法 如果 非法 則 非法用戶 等待 14. A solid method that requires 11 or 12. In step A, each receives hardware information to determine whether it is illegal. If it is illegal, the illegal user waits.
SS 或者 于 、 即 手段通知合法用戶。  The SS or the means to notify the legitimate user.
替換面 ( 26 ) Replacement surface ( 26 )
PCT/CN2009/075958 2009-06-11 2009-12-24 Method for protecting a storage device based on internet WO2010142123A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910107860.4 2009-06-11
CN 200910107860 CN101588371A (en) 2009-06-11 2009-06-11 Method based on internet for protecting memory device

Publications (2)

Publication Number Publication Date
WO2010142123A1 true WO2010142123A1 (en) 2010-12-16
WO2010142123A8 WO2010142123A8 (en) 2011-03-17

Family

ID=41372434

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075958 WO2010142123A1 (en) 2009-06-11 2009-12-24 Method for protecting a storage device based on internet

Country Status (2)

Country Link
CN (1) CN101588371A (en)
WO (1) WO2010142123A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588371A (en) * 2009-06-11 2009-11-25 王德高 Method based on internet for protecting memory device
CN101635921B (en) * 2009-07-31 2012-06-27 深圳趋势数码科技有限公司 Protection method of memory device based on mobile communication network
US20120079278A1 (en) * 2010-09-28 2012-03-29 Microsoft Corporation Object security over network
CN104468112A (en) * 2014-08-13 2015-03-25 中经云数据存储科技(北京)有限公司 Authorized access control method based on optical disc juke-box system and safety system
CN105183671A (en) * 2015-09-15 2015-12-23 深圳市图美电子技术有限公司 Method for preventing hard disk data from being modified and covered
CN106355112A (en) * 2016-08-30 2017-01-25 深圳泰首智能技术有限公司 Method of destructing data in encrypted mobile storage device and server
CN107679607A (en) * 2017-08-25 2018-02-09 芜湖市振华戎科智能科技有限公司 Exclusive personal encrypted u disk

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128162A1 (en) * 2006-05-08 2007-11-15 Hui Lin A method for protecting digital content by encrypting and decrypting a memory card
CN101252433A (en) * 2008-04-03 2008-08-27 张晶 Method for combining mobile memory apparatus with network verification
CN101403996A (en) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 Data security protection method and device
CN101441604A (en) * 2008-12-12 2009-05-27 成都市华为赛门铁克科技有限公司 Solid hard disk and access protection method of the same
CN101588371A (en) * 2009-06-11 2009-11-25 王德高 Method based on internet for protecting memory device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128162A1 (en) * 2006-05-08 2007-11-15 Hui Lin A method for protecting digital content by encrypting and decrypting a memory card
CN101252433A (en) * 2008-04-03 2008-08-27 张晶 Method for combining mobile memory apparatus with network verification
CN101403996A (en) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 Data security protection method and device
CN101441604A (en) * 2008-12-12 2009-05-27 成都市华为赛门铁克科技有限公司 Solid hard disk and access protection method of the same
CN101588371A (en) * 2009-06-11 2009-11-25 王德高 Method based on internet for protecting memory device

Also Published As

Publication number Publication date
WO2010142123A8 (en) 2011-03-17
CN101588371A (en) 2009-11-25

Similar Documents

Publication Publication Date Title
US10652226B2 (en) Securing communication over a network using dynamically assigned proxy servers
US9712565B2 (en) System and method to provide server control for access to mobile client data
TWI672073B (en) Communication, communication access/call method, device and system between mobile terminals
EP3346660B1 (en) Authentication information update method and device
WO2010142123A1 (en) Method for protecting a storage device based on internet
US20160149894A1 (en) System and method for providing multi factor authentication
WO2016155220A1 (en) Single sign-on method, system and terminal
US8850563B2 (en) Portable computer accounts
US9432357B2 (en) Computer network security management system and method
JP5678150B2 (en) User terminal, key management system, and program
CN109460647B (en) Multi-device secure login method
KR20140023085A (en) A method for user authentication, a authentication server and a user authentication system
KR101314695B1 (en) Intranet Security Management System, Blocking Server therefor, and Security Method thereof
TW201244441A (en) System and method for generating a password according to an ID code as well as a client, a server and a storage medium of the system
WO2016179860A1 (en) Method and apparatus for protecting position information in multi-operating system terminal, and terminal
TW202127289A (en) Method for cross-platform authorizing access to resources and authorization system thereof
JP2004334521A (en) Access control system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09845732

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09845732

Country of ref document: EP

Kind code of ref document: A1