Backup device and mobile memory apparatus bound method and backup device

A mobile storage device and a technology for installing equipment, which is applied in the field of information security, can solve the problem of unreliable binding between backup devices and mobile storage devices, and achieve the effect of reliable binding and ensuring security

Active Publication Date: 2008-03-19
LENOVO (BEIJING) LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The invention discloses a method for binding a backup device and a mobile storage device and the backup device, which are used to solve the problem of unreliable binding between the backup device and the mobile storage device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Backup device and mobile memory apparatus bound method and backup device
  • Backup device and mobile memory apparatus bound method and backup device
  • Backup device and mobile memory apparatus bound method and backup device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Generally speaking, Embodiment 1 includes: collecting the feature information of the mobile storage device, encrypting and generating a hardware identification tag, storing the hardware identification tag and its key in the hidden area of ​​the mobile storage device; installing the backup device on the installation device (PC ), the backup device verifies the hardware identification label, and decides whether to allow the installation operation according to the verification result.

[0057] As shown in Figure 1, Embodiment 1 includes:

[0058] Step 101: Collect characteristic information of the mobile storage device;

[0059] Wherein, the feature information may include: PID / VID, manufacturer information, file system, capacity, etc. of the mobile storage device, and may also be adjusted according to actual needs.

[0060] Step 102: using the key to encrypt the feature information to generate a hardware identification tag;

[0061] Among them, the key is randomly gener...

Embodiment 2

[0083] Compared with the first embodiment, the most fundamental difference of the second embodiment is the introduction of a new system label. The system label is generated when the backup device is installed, and is stored in the mobile storage device; the number of devices (PCs) on which the backup device is installed is limited by the number of system labels.

[0084] Moreover, when using the backup device to perform operations such as data backup or data restoration on the mobile storage device, the system label must be verified, which makes the binding of the backup device and the mobile storage device more tightly.

[0085] As shown in FIG. 2 , steps 201 to 210 are the same as the corresponding steps in the first embodiment. Embodiment two includes:

[0086] Step 201: collecting characteristic information of the mobile storage device;

[0087] Step 202: using the key to encrypt the feature information to generate a hardware identification tag;

[0088] Step 203: stori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for binding a back-up device and a mobile memory device, and the device includes the following steps: the characteristic information of the mobile memory device is collected, encrypted and generated into a hardware identification tag, and then the hardware identification tag and a key are stored in the mobile memory device; when receiving a command of installation, the back-up device inquires about the mobile memory device according to the preengagement, obtains the hardware identification tag as well as the key and analyzes out the characteristic information; the characteristic information of the mobile memory device is collected on the spot and contrasted with the analyzed characteristic information. If no difference is shown, the installation is permitted. The present invention encrypts the characteristic information of the mobile memory device and obtains the hardware identification tag. Only a corresponding back-up device can read the tag to acquire, collect and contrast the characteristic information on the spot, thereby guaranteeing the security of the characteristic information of the mobile memory device and achieving reliable binding effect of the back-up device and the mobile memory device. The present invention still discloses a back-up device.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for binding a backup device and a mobile storage device and a backup device. Background technique [0002] With the development of mobile storage technology, the use of mobile storage devices (such as mobile hard disks, U disks) is becoming more and more extensive, and the backup devices for data backup and data restoration used with mobile storage devices are also widely used. The functions of backup devices It can be realized by application software. As shown in Table 1, several backup devices are listed: [0003] Table 1 [0004] Trade Names backup device name Seagate CMS Bounceback Express Maxtor and Western Digital EMC|Dantz Retrospect Express Lenovo International Rescue and recovery patriots smart backup [0005] The backup devices provided by various manufacturers are similar in funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/51G06F21/78
Inventor 王元成
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products