Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secrecy isolation hard disk and secrecy method thereof

A technology of hard disk and encrypted disk, applied in the protection of internal/peripheral computer components, instruments, electronic digital data processing, etc., can solve the problems of encrypted storage, lack of encryption and decryption function, hard disk data theft

Active Publication Date: 2011-11-23
XINGTANG TELECOMM TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chinese patent application No. 00104780.9 "hard disk device with security function and its security method", this protection method does not encrypt and store the data on the hard disk, but prevents unauthorized users from accessing the hard disk data through access control. Hard disk data can be stolen through abnormal technical means
Chinese Patent Application No. 02113032.9 "A Device and Method for Realizing Hard Disk Safety Isolation" requires adding special hardware between IDE interfaces, which is not suitable for notebook computers. Also, this device does not have encryption and decryption functions. Once the computer or hard disk is stolen, the data will be lost. can be obtained illegally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secrecy isolation hard disk and secrecy method thereof
  • Secrecy isolation hard disk and secrecy method thereof
  • Secrecy isolation hard disk and secrecy method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The security isolated hard disk and its security method proposed by the present invention are described as follows in conjunction with the accompanying drawings and embodiments.

[0042] Such as figure 1 As shown, it is a structural schematic diagram of the security isolation hard disk of the present invention. Security isolation hard disk includes hard disk interface, boot disk, encryption and decryption module, controller, local encrypted disk, and remote sending and receiving encrypted disk. The hard disk interface is connected to the main board of the computer, and is used to provide the read / write interface of the external system to the hard disk, and the confidential isolation hard disk uses the SATA interface; the boot disk is connected to the hard disk interface, and the external system obtains the boot disk data through the hard disk interface to start the hard disk and the authentication program of the authentication key, the authentication key is generally a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secrecy isolation hard disk which comprises a hard disk interface, a startup disk, an encrypting and decrypting module, a controller, a local secrecy disk and a remote receiving and transmitting secrecy disk, wherein the hard disk interface is connected with a computer mainboard; the local secrecy disk is physically isolated from the remote receiving and transmitting secrecy disk and used for storing secrecy data; and the remote receiving and transmitting secrecy disk is used for storing unclassified data. The invention also discloses a secrecy method of the secrecy isolation hard disk, a computer reads the startup disk data of the secrecy hard disk after being switched on, the startup disk leads a system to enter a login authentication program, and the secrecy isolation hard disk and an authentication KEY are mutually authenticated; if the authentication passes, the login authentication program prompts a user whether data is exchanged or not; if so, the dataexchange is carried out; otherwise, a working state of the secrecy isolation hard disk is selected; and the secrecy isolation hard disk resets the working state to start to work according to the selection. The hard disk realizes the physical isolation on a single hard disk, the two secrecy disks do not have the problem of electromagnetic leakage, the hard disk grade full disk encryption is realized, and the safety is high.

Description

technical field [0001] The invention relates to the technical field of hard disk security, in particular to a security isolation hard disk and a security method thereof. Background technique [0002] In the patent document of Chinese Patent Application No. 200410025825.5 "Computer Hard Disk Data Encryption Method and Its Device", a special encryption and decryption device for PCI interface is added between the hard disk and the host to take over all the control signals and response signals between the host and the hard disk , so as to control the encryption and decryption process and encryption and decryption operation of the actual data stream of the hard disk. In the patent document of Chinese patent application No. 00104780.9 "hard disk device with security function and its security method", a hard disk data protection method is provided. The password of the hard disk is set in advance. When the hard disk is connected to the host system, it is identified by external input...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/04G06F21/24G06F21/74G06F21/80
Inventor 刘尚焱
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products