U disk encryption method
An implementation method and disk technology, applied in static memory, read-only memory, instruments, etc., can solve the problems of reducing equipment utilization, indiscriminate, waste resources, etc., to save equipment use costs, reduce overhead, and protect important data. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to describe in detail the structure of the present invention and the effect achieved, the following preferred embodiments are now given and described as follows in conjunction with the accompanying drawings:
[0030] figure 1 In , applications and user operations interact with the system file interface, and the system file interface converts the request into a kernel state file service request. These requests are first sent to the file system driver, and the file system driver distributes the request to the corresponding disk device driver; the virtual disk driver operates according to the current state of the HID USB Key. If the Key does not exist, the virtual disk driver is prohibited from simulating the disk device to the system, and the protected area of the protected disk cannot be accessed at this time; Mapped into a disk, the file data written to the disk is encrypted by the virtual disk driver and redirected to the protected area of the actual disk...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com