Security method and system as well as correlative pairing enciphering system thereof

A technology of a security method and a security system, which is applied in the field of security methods and systems, and can solve problems such as damage to the correctness of information accessed by the user terminal

Inactive Publication Date: 2008-07-23
UNIVERSAL SCI IND CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, if the confidential data is accidentally changed by the client or tampered with by outsiders, it will damage the correctness of the information accessed by the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security method and system as well as correlative pairing enciphering system thereof
  • Security method and system as well as correlative pairing enciphering system thereof
  • Security method and system as well as correlative pairing enciphering system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] First, see figure 2 , which is a schematic diagram of the system architecture of the pairing encryption system 2 of the present invention. Such as figure 2 As shown, the pair encryption system 2 includes a storage device 20 , a host 22 and a pair encryption device 24 . The storage device 20 stores confidential data and is configured to be paired with the host 22 . The purpose of this pairing is to limit the use authority of the confidential data of the storage device 20 , and the client can only access the confidential data of the storage device 20 through the host 22 . The host 22 here is an electronic product, such as a personal digital assistant, a wireless communication device, a digital camera, a digital video player, and a GPS navigation system. The storage device 20 refers to a large-capacity storage medium, including flash memory cards of various specifications. The storage device 20 is pluggably connected to the host 22 , and the host 22 accesses and uses t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security method for controlling the access of host on memory device, wherein the memory device comprises a memory storing a first recognition code and a file system, the structure of the file system is matched to store secure data and a first memory space. The host pre-stores a second recognition code. The inventive security method comprises sending the data of the first memory space to the host, while the first memory space is generated by match security program, decrypting the data in the first memory space to generate a decrypt data, judging the correct of the decrypt data that checks if the decrypt data meets the first recognition code and security data, referring the correct of the decrypt data, controlling the host to store the security data. The invention can improve the security of storing device to provide more security to data supplier and client.

Description

technical field [0001] The present invention relates to a security method and system, in particular to a data security method and system, and a paired encryption system of a storage device and a host computer. Background technique [0002] The functions of consumer electronic products are becoming more and more diversified, and the user's demand for large-capacity data storage is also increasing. Therefore, it has become a trend to support expansion of storage capacity by inserting storage devices such as compact flash cards (for example, storage cards including Multimedia cards, Memorystick cards, etc.). If the data in digital format stored in the storage device is confidential or subject to copyright protection, the access authority of the end user must be restricted through a security procedure to prevent the digital data from being copied and distributed at will. [0003] Here, a method of securing data in a digital format will be briefly described. see figure 1 , whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/79
Inventor 曾其诚
Owner UNIVERSAL SCI IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products