Protection method of memory device based on mobile communication network

A storage device, communication network technology, applied in wireless communication, safety devices, electrical components, etc., can solve problems such as inability to implement, and achieve the effect of working state protection and wide application range

Inactive Publication Date: 2010-01-27
SHENZHEN TRUTH DIGITAL TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this protection method cannot be implemented in special regions that do not have access to the Internet
The mobile communica

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in combination with specific embodiments.

[0030] A kind of SSD protection method based on mobile communication network:

[0031] The client has the following steps in turn:

[0032] 1) Automatically run the network registration unit;

[0033] 2) Automatically read the SN and PN codes of the SSD, and the owner fills in the registration information and uploads it to the server;

[0034] 3) Fill in the owner protection password and other information to upload to the server, and apply to the server for WMRS protection;

[0035] 4) Receive the confirmation registration success information downloaded from the server, and the owner who is confirmed as a legitimate user turns on WMRS, and uploads the owner information of the SSD to the server in real time;

[0036] 5) After receiving the security code comparison and identification results downloaded from the server in real time, once the SSD is found to be lost or stole...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a protection method of a memory device based on a mobile communication network. The protection method takes the memory device as a protected object, implements global online authentication by a network, carries out the data security read/write protection to the protected object, encrypts the data and authenticating the identity of a legal identity characteristic holder, and refuses an illegal user from using, wherein the network is a mobile communication network; and the global online locking is also carried out by adopting the mobile communication network. In the protection method, the password protection is used for the identity authentication of a legal user in the data of an equipment procedure control region of the protected object, and all illegal user groups are taken statistics, displayed at the real time and supervised on a server management platform of a manufacturer. The protection method protects all data of the memory device as well as rights and interests of the legal identity characteristic holder, provides the lifelong identity registration information management service for the legal identity characteristic holder, and also protects the user data security and the working status of the protected object. The invention also can provide recourse and rights activist information for the legal identity characteristic holder when the protected object is lost or illegally used.

Description

technical field [0001] The invention relates to storage device protection, in particular to a storage device protection method based on a mobile communication network. Background technique [0002] There are various protection technologies for existing storage devices, such as Quantum's data protection system DPS, Maxtor's data protection system Maxsafe, and Western Digital's protection system Data SafeGuide. The representative of the development trend of storage devices in the future is Solid State Disk (SSD), whose interface specifications and definitions, functions and usage methods are exactly the same as those of ordinary storage devices, and are basically similar to ordinary storage devices in terms of product shape and size. The storage devices are consistent, including types such as 3.5", 2.5" and 1.8". Regarding the protection technology of solid-state hard drives, the current Chinese patents only have "A Data Security Protection Method and Device" disclosed by CN10...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/12H04L29/06
CPCH04W12/06H04W12/069
Inventor 王德高向前
Owner SHENZHEN TRUTH DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products