Controllable information access storage device, information access control method and information protection method

A storage device and information technology, applied in the field of information protection, can solve problems such as inconvenience, general products and methods do not have appropriate structures and methods, cannot be kept secret and prevent arbitrary distribution, etc., and achieve technological progress and effective access control. Effect

Active Publication Date: 2009-08-05
FINEART TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many disadvantages in the existing known file security system, such as only using a single technology such as a general password mechanism or software for protection, so that users often fall into a dilemma in terms of portability and data security, and effective Or use a double security mode to protect the user's important data. A comprehensive solution is still to be developed. Therefore, if personal information is leaked and the information storage device is lost, others can still use it in other information processing devices, and it is impossible to keep it confidential and eliminate it. random distribution
[0003] It can be seen that the above-mentioned existing information storage device, information access control method and information protection method obviously still have inconvenience and defects in product structure, method and use, and need to be further improved urgently.
In order to solve the above-mentioned problems, the relevant manufacturers have tried their best to find a solution, but no suitable design has been developed for a long time, and there is no suitable structure and method for general products and methods to solve the above-mentioned problems. This is obviously a problem that relevant industry players are eager to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controllable information access storage device, information access control method and information protection method
  • Controllable information access storage device, information access control method and information protection method
  • Controllable information access storage device, information access control method and information protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to further explain the technical means and effects adopted by the present invention to achieve the intended invention purpose, the following, in conjunction with the accompanying drawings and preferred embodiments, will discuss the information storage device, information access control method and The specific implementation, structure, method steps, features and effects of the information protection method are described in detail below.

[0038] The aforementioned and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of preferred embodiments with reference to the drawings. Through the description of the specific implementation mode, when the technical means and functions adopted by the present invention to achieve the predetermined purpose can be obtained a deeper and more specific understanding, but the accompanying drawings are only for reference and description, and are not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a controllable access information storage device, an information access control method and an information protection method. The controllable access information storage device has a program area and a hidden area. A file in a plaintext / cryptograph area of the hidden area is corresponded to a virtual disc path by a virtual disc technology. When the information storage device is mounted to an information processing system and executes an identity identification and loading program, the plaintext / cryptograph area path and the virtual disc path are loaded via correct verification and execution result. The plaintext protection information is automatically encrypted to cryptograph protection information when written to the virtual disc path and then uploaded to the file. Operation of the user to the virtual disc path is operation of the file substantially. Therefore, propose and function of securing and managing the confidentiality of the file.

Description

technical field [0001] The present invention relates to an information storage device and an access method, in particular to an information storage device and information access controllable information storage device and an information access method that use virtual disk (disk is disk, hereinafter referred to as disk) technology to control access. Control methods and information protection methods. Background technique [0002] In order to cope with the storage and data volume growth of various software programs (programs are programs, hereinafter referred to as programs) derived from the trend of computerization, various information storage devices such as hard disks (hard disks) and flash drives are constantly being introduced, and it has become a Indispensable equipment for information processing devices. Although portable information storage devices are easy to carry and can be installed and used at any time, users and information system managers are still looking for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/74
Inventor 赖颂杰
Owner FINEART TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products