Key based server data reading method
A data reading and server technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as file leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.
[0015] Such as figure 1 As shown, a key-based server data reading method, wherein the method steps include:
[0016] Connect to any networked computer through a USB key. If the USB key is authenticated, the system will add a virtual disk. This disk is mapped to the server file directory. Users can read server data in the virtual disk and write to the disk. It will be encrypted, and the data read from the disk will be decrypted; if there is no certified USB key, the mapping of the disk will disappear, and the server data will not be accessible.
[0017] The server needs to specify the location of the protected directory on the disk,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
