Unlock instant, AI-driven research and patent intelligence for your innovation.
Backup device and mobile memory apparatus bound method and backup device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A mobile storage device and a technology for installing equipment, which is applied in the field of information security, can solve the problem of unreliable binding between backup devices and mobile storage devices, and achieve the effect of reliable binding and ensuring security
Active Publication Date: 2008-03-19
LENOVO (BEIJING) LTD
View PDF0 Cites 5 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0013] The invention discloses a method for binding a backup device and a mobile storage device and the backup device, which are used to solve the problem of unreliable binding between the backup device and the mobile storage device
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0056] Generally speaking, Embodiment 1 includes: collecting the feature information of the mobile storage device, encrypting and generating a hardware identification tag, storing the hardware identification tag and its key in the hidden area of the mobile storage device; installing the backup device on the installation device (PC ), the backup device verifies the hardware identification label, and decides whether to allow the installation operation according to the verification result.
[0057] As shown in Figure 1, Embodiment 1 includes:
[0058] Step 101: Collect characteristic information of the mobile storage device;
[0059] Wherein, the feature information may include: PID / VID, manufacturer information, file system, capacity, etc. of the mobile storage device, and may also be adjusted according to actual needs.
[0060] Step 102: using the key to encrypt the feature information to generate a hardware identification tag;
[0061] Among them, the key is randomly gener...
Embodiment 2
[0083] Compared with the first embodiment, the most fundamental difference of the second embodiment is the introduction of a new systemlabel. The systemlabel is generated when the backup device is installed, and is stored in the mobile storage device; the number of devices (PCs) on which the backup device is installed is limited by the number of system labels.
[0084] Moreover, when using the backup device to perform operations such as data backup or data restoration on the mobile storage device, the system label must be verified, which makes the binding of the backup device and the mobile storage device more tightly.
[0085] As shown in FIG. 2 , steps 201 to 210 are the same as the corresponding steps in the first embodiment. Embodiment two includes:
[0086] Step 201: collecting characteristic information of the mobile storage device;
[0087] Step 202: using the key to encrypt the feature information to generate a hardware identification tag;
[0088] Step 203: stori...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The present invention discloses a method for binding a back-up device and a mobile memory device, and the device includes the following steps: the characteristic information of the mobile memory device is collected, encrypted and generated into a hardware identification tag, and then the hardware identification tag and a key are stored in the mobile memory device; when receiving a command of installation, the back-up device inquires about the mobile memory device according to the preengagement, obtains the hardware identification tag as well as the key and analyzes out the characteristic information; the characteristic information of the mobile memory device is collected on the spot and contrasted with the analyzed characteristic information. If no difference is shown, the installation is permitted. The present invention encrypts the characteristic information of the mobile memory device and obtains the hardware identification tag. Only a corresponding back-up device can read the tag to acquire, collect and contrast the characteristic information on the spot, thereby guaranteeing the security of the characteristic information of the mobile memory device and achieving reliable binding effect of the back-up device and the mobile memory device. The present invention still discloses a back-up device.
Description
technical field [0001] The invention relates to the technical field of information security, in particular to a method for binding a backup device and a mobile storage device and a backup device. Background technique [0002] With the development of mobile storage technology, the use of mobile storage devices (such as mobile hard disks, U disks) is becoming more and more extensive, and the backup devices for data backup and data restoration used with mobile storage devices are also widely used. The functions of backup devices It can be realized by application software. As shown in Table 1, several backup devices are listed: [0003] Table 1 [0004] Trade Names backup device name Seagate CMS Bounceback Express Maxtor and Western Digital EMC|Dantz Retrospect Express Lenovo International Rescue and recovery patriots smart backup [0005] The backup devices provided by various manufacturers are similar in funct...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.