Trusted safe mobile storage device

A technology of mobile storage device and mobile storage device, applied in the field of information security

Active Publication Date: 2010-11-10
TSINGHUA TONGFANG CO LTD
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are no technical reports on the safe use o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted safe mobile storage device
  • Trusted safe mobile storage device
  • Trusted safe mobile storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] see figure 1 , the present invention includes a mobile storage device and a trusted computing device such as a trusted PC, a trusted server, or a trusted mobile phone connected to the removable storage device. The mobile storage device and the trusted computing device are bound by digital signature and signature authentication. Only the letter computing device can read or write data from the data storage unit of the mobile storage device. One trusted computing device can be bound to one or more mobile storage devices at the same time, and one mobile storage device can be bound to one or more trusted computing devices at the same time. Trusted computing equipment includes interconnected trusted applications, trusted OSKernel, trusted Boot Loader, trusted BIOS / EFI and trusted cryptographic module TCM. The trusted cryptographic module TCM serves as the trusted root of the trusted computing device, and builds a trusted computing environment based on the trusted root. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted safe mobile storage device, belonging to the technical field of information security. The device comprises a mobile storage device and a trusted computing device connected with the mobile storage device. The mobile storage device comprises an access control unit, a cryptography service unit, a data storage unit and a USB interface. The identity of the mobile storage device is bound with the identity of the trusted computing device in a way of digital signature and signature verification. The trusted computing device comprises a trusted application program, a trusted OS Kernel, a trusted Boot Loader, a trusted BIOS/EFI and a trusted crypto module (TCM) which are connected with each other. The trusted crypto module (TCM) is used as the trusted root of the trusted computing device and a trusted computing environment is constructed based on the trusted root. Compared with the prior art, through binding the identity of the mobile storage device with the identity of the trusted computing device, the invention has the advantages that data in the mobile storage device can flow only in a local range and the data leakage is effectively avoided.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a trusted and secure mobile storage device. Background technique [0002] In recent years, mobile storage technology has developed rapidly, and both storage capacity and read / write speed have reached a very high level. At present, there are two kinds of mobile storage devices on the market that are popular with consumers, one is commonly known as U disk, and the other is commonly known as mobile hard disk. These two types of mobile storage devices provide users with portable data storage solutions. U disk storage capacity usually varies between 32MB and 64GB. The data transmission between the U disk and the outside world usually follows the USB 1.1 and 2.0 standards, and the transmission rate can reach up to 480Mbps. Due to the impact of cost and price, the capacity of common U disks on the market is generally not too large, usually about several GB. In order to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/00G06F1/00G06F12/14G11C5/00H04L9/32G11B20/00G06F13/00
Inventor 刘锋周培军李康清郑必可
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products