Method based on internet for protecting memory device

A storage device and Internet technology, applied in user identity/authority verification, equipment, digital data authentication, etc., to achieve the effects of security protection, protection of rights and interests, and protection of working status

Inactive Publication Date: 2009-11-25
王德高
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As for the network online protection (storage network safeguard,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in combination with specific embodiments.

[0023] An Internet-based SSD protection method:

[0024] The client has the following steps in turn:

[0025] 1) Automatically run the network registration unit;

[0026] 2) Automatically read the SN and PN codes of the SSD, and the owner fills in the registration information and uploads it to the server;

[0027] 3) Fill in the owner protection password and other information to upload to the server, and apply for SNS protection to the server;

[0028] 4) Receive the confirmation registration success information downloaded from the server, and the owner who is confirmed as a legitimate user opens SNS, and uploads the owner information of the SSD to the server in real time;

[0029] 5) After receiving the security code comparison and identification results downloaded from the server in real time, once the SSD is found to be lost or stolen, or occupied by an illegal user, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method based on internet for protecting memory devcie, the protected object is memory device, includes that proceeding read-write protection of data security to the protected object, encrypting the data, proceeding identify certified to users with legal identity, and refuse illegal users, which is characterized in that, internet is applied to proceed global online identification. Password protection is used to identify legal users identity in data of device program control area of the protected object, counting, real-time displaying and monitoring all the illegal users through a server management platform of manufacturer. The invention protects all data of storage device, and protects rights and interests of users with legal identity, and provides identity registration information management service to users with legal identity for life. The invention provides protection to users data security and to operative mode of the protected object.When the protected object is lost or used by users with illegal identity, the invention can provide related information of recourse or rights protection to users with legal identity.

Description

technical field [0001] The invention relates to storage device protection, in particular to an Internet-based storage device protection method. Background technique [0002] There are various protection technologies for existing storage devices, such as Quantum's data protection system DPS, Maxtor's data protection system Maxsafe, and Western Digital's protection system Data SafeGuide. The representative of the development trend of storage devices in the future is Solid State Disk (SSD), whose interface specifications and definitions, functions and usage methods are exactly the same as those of ordinary storage devices, and are basically similar to ordinary storage devices in terms of product shape and size. The storage devices are consistent, including types such as 3.5", 2.5" and 1.8". Regarding the protection technology of solid-state hard drives, the current Chinese patents only have "A Data Security Protection Method and Device" disclosed by CN101403996A and "A Static L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/32G06F21/00G06F21/31G06F21/6218
Inventor 王德高向前
Owner 王德高
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products