Unlock instant, AI-driven research and patent intelligence for your innovation.

Security certification method applied on mobile storage device

A mobile storage device, security authentication technology, applied in the direction of user identity/authority verification, preventing unauthorized use of memory, etc., can solve the problems of low security, not meeting requirements, restricting applications, etc., to improve security performance and reliability. Enhanced, driverless effects

Active Publication Date: 2009-10-21
AEROSPACE INFORMATION
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Some secure mobile storage devices use client software to implement data encryption and decryption. When using it, you need to install the client software first, which is inconvenient to operate. More importantly, the software encryption makes the key and encryption program easy to crack, and the security is very low.
[0008] Some secure mobile storage devices use chips to implement data encryption, but the chips they use have low physical attack resistance, making the encryption algorithms and keys in the chips easy to be cracked, and some secure mobile storage devices use internationally publicized These algorithms do not have independent intellectual property rights. According to the "National Commercial Encryption Management Regulations", these algorithms are not recognized by the State Encryption Administration, which limits their application in some special industries in China.
[0009] It can be seen that these products either have insufficient security and reliability of identity authentication, or insufficient data encryption strength. At the same time, they do not meet the requirements of the State Cryptography Administration for commercial encryption products, and have not completely solved the problem of ordinary mobile storage devices. security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certification method applied on mobile storage device
  • Security certification method applied on mobile storage device
  • Security certification method applied on mobile storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The above-mentioned and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0055] see figure 1As shown, it is a schematic diagram of the connection relationship of the physical structure of the present invention. As a mobile storage device, it is naturally the main body for data storage. From the perspective of data security, it must have a corresponding encryption chip, authentication The chip and the processor can carry out data transmission with the corresponding receiving device through the data interface, so it can be seen from the figure that the connection relationship of the physical structure of the present invention includes: a mobile storage device 2, a mobile storage device 2 The combined security key carrier 1 and a computer 3 are used as the transfer target device. The combination of the mobile storage device 2 and the computer 3 can use USB or serial data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security certification method applied on a mobile storage device. The mobile storage device is matched with a safe key carrier; and the security certification method comprises the following steps: a: determining whether the safe key carrier corresponding to the mobile storage device has validity or not , and implementing a step e if the certification does not pass; b: determining whether the mobile storage device corresponding to the safe key carrier has validity or not, and implementing the step e if the certification does not pass; c: inputting a user password by a user, determining whether the usage of the safe key carrier used by the user has validity or not, and implementing the step e if the certification is not valid; d: allowing the user to access the data in the mobile storage device if the certification passes, and implementing a step f; e: not allowing the user to access the data in the mobile storage device if the certification fails, and implementing the step f; and f: finishing the certification. The invention can achieve the aim of improving the security.

Description

technical field [0001] The invention relates to a safety authentication method, in particular to a safety authentication method applied on a mobile storage device to increase reliability. Background technique [0002] In recent years, the use of mobile storage devices as large-capacity data storage devices has been widely used in all walks of life, especially mobile storage devices with USB interfaces, which are versatile, easy to carry, easy to use, large capacity, Features such as long life have replaced the early 3.5-inch and 5.25-inch floppy disks. However, while these large-capacity mobile storage devices bring convenience to users, they also bring great security risks, such as the inability to authenticate user identities and the easy leakage of data stored in plain text. Once the user's mobile storage device is lost or accessed by an illegal owner, it will cause the leakage of internal confidential data, which will cause immeasurable losses to the user and even the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F12/14
Inventor 陈懿孟凡涛
Owner AEROSPACE INFORMATION
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More