Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption sharing method for mobile storage device

A mobile storage device and public key encryption technology, applied in the field of information security, can solve problems such as the inability to decrypt access data, loss of mobility of mobile storage devices, security threats of mobile storage devices, etc., to achieve the effect of ensuring security

Inactive Publication Date: 2010-11-10
SHANGHAI BEIJING UNIV FOUNDER TECH COMP SYST
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When adopting common encryption methods known in the art, how to store the encrypted key is a problem. A safe method adopted in the prior art is to store the key in a TCM (TrustedCryptography Module, Trusted Cryptography Module), If the key is not obtained from the TCM, other people will not be able to decrypt and access the data in this mobile storage device, but this will bring a problem: the mobile storage device cannot be used in other computers, and the mobility of the mobile storage device will be lost
In order to solve this problem, the method adopted in the prior art is to export the key into a file form (encrypted by a password) from the TCM, and then manually import it on other computers, but this method brings problems to the user's operation on the one hand. Trouble one, you need to copy the key file to other computers; on the other hand, if the key in this file form is obtained by others, it will also pose a threat to the security of the mobile storage device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below through specific embodiments.

[0022] The following embodiments aim to provide an implementation solution for selectively sharing the same mobile storage device among multiple computers in a local area network. The program can be implemented in the following steps:

[0023] 1. Prepare

[0024] Install "Removable Storage Device Encryption Shareware" in each computer in the local area network. Of course, if it is determined that one or some computers do not participate in the sharing, the software may not be installed.

[0025] 2. Encryption and sharing designation

[0026] On computer A, the user encrypts a certain folder on the U disk through the software. The encryption process includes: the software generates a key a, encrypts the folder with the key, and sets the encrypted folder to be hidden.

[0027] At the same time, the software automatically lists other computers with the software installed on the same l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption sharing method for a mobile storage device, and belongs to the technical field of information security. The method comprises the following steps of: a) encrypting target data in the mobile storage device by using a first key; b) searching networking computers, and selecting one or more target computers therefrom by a user; c) encrypting the first key by using a public key of the target computers, and storing encrypted message; and d) when the mobile storage device is used in the target computer, decrypting the encrypted message by using a private key of the target computer to obtain the first key, and acquiring the target data through the first key. The method can be used for mobile storage.

Description

technical field [0001] The present invention relates to mobile storage, in particular to an encryption sharing method of a mobile storage device. It belongs to the field of information security technology. Background technique [0002] With the popularization of the use of mobile storage devices (U disks, mobile hard disks, etc.), incidents of losing mobile storage devices often occur. For example, in October 2008, the British "The Times" reported that the British Ministry of Defense lost a mobile hard drive, which stored the detailed information of about 100,000 active military personnel and 800,000 enlistment application materials, and the sensitive information of related family members was also included in the Inside, there are bank accounts, passport numbers, home addresses, dates of birth, driver's licenses and family doctors and other information, and these information are not encrypted, the severity of the incident can be imagined. [0003] In order to prevent the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 杨文兵
Owner SHANGHAI BEIJING UNIV FOUNDER TECH COMP SYST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More