U disk encryption method

An implementation method and disk technology, applied in static memory, read-only memory, instruments, etc., can solve the problems of reducing equipment utilization, indiscriminate, waste resources, etc., to save equipment use costs, reduce overhead, and protect important data. Effect

Inactive Publication Date: 2010-11-03
许燕
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users have to buy a new U disk or mobile hard disk box. Old devices are not supported, and the cost for users is too high
[0005] 2: All data on the U disk (mobile hard disk) is encrypted without any distinction
As a result, U disk (mobile hard disk) can no longer share data conveniently, which reduces the utilization rate of equipment and wastes a lot of resources at the same time
[0006] 3: Data is encrypted at the chip level of the hard disk. All data on the hard disk is encrypted. Once the hard disk is damaged or malfunctions, it cannot be sent to a third party for data recovery.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • U disk encryption method
  • U disk encryption method
  • U disk encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to describe in detail the structure of the present invention and the effect achieved, the following preferred embodiments are now given and described as follows in conjunction with the accompanying drawings:

[0030] figure 1 In , applications and user operations interact with the system file interface, and the system file interface converts the request into a kernel state file service request. These requests are first sent to the file system driver, and the file system driver distributes the request to the corresponding disk device driver; the virtual disk driver operates according to the current state of the HID USB Key. If the Key does not exist, the virtual disk driver is prohibited from simulating the disk device to the system, and the protected area of ​​the protected disk cannot be accessed at this time; Mapped into a disk, the file data written to the disk is encrypted by the virtual disk driver and redirected to the protected area of ​​the actual disk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a U disk (mobile hard disk) encryption method which monitors the USB Hey state in real time, carries out identity verification and obtains a key by authorized USB Key, wherein the protected U disk (mobile hard disk) is divided into a protective area and a non-protective area; the protective area is mapped into a virtual disk when the authorized verification is passed, data wrote into the disk is encrypted and the data read from the disk is decrypted; the non-protective area is still used as a common U disk (mobile hard disk). When the USB Key does not exist, the protective area cannot be accessed. The data stored in the protective area of the U disk (mobile hard disk) is encrypted forever, and is automatically decrypted in a memory when being used by a user. The invention supports the U disks (mobile hard disks) and file systems of all types, does not change the use habit of conventional data and the action of application programs of users, and does not require the users to buy new U disk (mobile hard disk) equipment.

Description

Technical field [0001] The invention relates to a method for realizing encrypted U disk (mobile hard disk), which mainly realizes the automatic encryption and decryption protection of user U disk (mobile hard disk) data. Enable users to achieve automatic encryption and decryption of U disk (mobile hard disk) data without adding new system hardware facilities and changing traditional data usage habits, improving information security and preventing information leakage, while retaining U disk (mobile hard disk) Hard disk) data exchange and sharing features, without increasing the user's cost and burden to achieve "one disk dual-use". This method obtains the key from the USB Key and performs identity authentication, and uses virtual disk technology to realize real-time transparent encryption and decryption of data; this method divides the protected data area on the U disk (mobile hard disk), which is invisible to the user. When the Key exists, use the virtual disk technology to m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G11C16/22G11C7/24G11C7/10G06F12/14G06F21/00G06F21/78
Inventor 不公告发明人
Owner 许燕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products