Unlock instant, AI-driven research and patent intelligence for your innovation.

Data protection system of control supervisor data enter point

A data protection, entry point technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as cracking

Inactive Publication Date: 2009-01-07
张敏达
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, in recent years, the rapid development of optical disc burning technology has made the optical disc used to store multimedia, games, application programs, etc., no matter what data protection method is used, it is still cracked in the end.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection system of control supervisor data enter point
  • Data protection system of control supervisor data enter point
  • Data protection system of control supervisor data enter point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] see Figures 1A-1B , Figures 1A-1B It is a schematic diagram of the data protection system controlling the data entry point of the present invention. Such as Figure 1A As shown, the data protection system 5 for controlling data entry points in the present invention is mainly composed of a data protection device 10, a contactless card 14 belonging to the user, and a computing device 12 (such as a PDA that can store and process data).

[0027] In short, if the user needs to capture or write data from the data protection system 5, in addition to electrically connecting the computing device 12 to the bus 13 (such as USB, IDE, ATA, etc.) Only after unlocking through the contactless card 14 , which is legal as a key, can the user grab or write data from the data protection system 5 through the computing device 12 . In the system of the present invention, the identification code that can be stored in the RFID non-contact card 14 can replace the account number and password...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data protection system used for controlling and managing data-entering point is prepared as using storage unit to carry out access of data, forming said storage unit by data-entering point region and data region for actually storing data, pointing specific sector in data region as entering point by data-entering point and enabling operation unit to carry out data access on storage unit in system only by using non-contact card to release locking to let system provide relevant data-entering point.

Description

technical field [0001] The invention relates to a data protection system, in particular to a data protection system for controlling and managing data entry points. Background technique [0002] General computer operating systems use account / password verification as a means of data protection. Although the accounts / passwords of some operating systems are not easily cracked, once a data processing device such as a hard drive is detached from a computer, another computer can be used to easily read the data stored therein. [0003] In order to overcome this problem, the patent of "Taiwan, China" No. 550459 Bulletin No. provides a "computer data protection device" to expect to solve this problem. In short, the technical means used is to add this "computer data protection device" between the host computer (or the CPU of the computer) and the hard disk drive, and when writing / reading data from the hard drive, , to achieve the purpose of data protection through encryption / decrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F12/14G06F21/62
Inventor 张敏达
Owner 张敏达
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More