Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-interface encryption memory card and management method and system of data in double-interface encryption memory card

An encrypted storage, dual-interface technology, applied in the field of data processing, can solve the problems of poor non-contact interface transmission rate, unsuitable for storing a large amount of data, slow data transmission speed, etc., to achieve high-speed data transmission, improve security, prevent data leaked effect

Inactive Publication Date: 2012-09-12
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] For mode 3), although the data therein is stored in the form of ciphertext, it can prevent the data leakage therein after the U disk is lost, but it cannot prevent the user who has the use authority and knows the password from intentionally leaking the data therein;
[0011] For mode 4), the contact communication of the dual-interface card adopts the integrated circuit (IC, Integrate Circuit) card interface, so it will cause the data transmission speed to be very slow, which is not suitable for storing large amounts of data, and the transmission rate of the contactless interface is also far away. Not as fast as the Universal Serial Bus (USB) interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
  • Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
  • Double-interface encryption memory card and management method and system of data in double-interface encryption memory card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Aiming at the problems existing in the prior art, the present invention provides a dual-interface encryption memory card and a data management method and system therein. The dual-interface encrypted memory card has two interfaces at the same time, which are USB interface and radio frequency identification (RFID, Radio Frequency Identification) interface. The USB interface is used to connect with a PC for data reading and writing, and the RFID interface is used to receive and send radio frequency signals. , receive security commands from radio frequency signals, and store data in the card after encryption.

[0036] In order to make the technical solution of the present invention more clear and understandable, the solution of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0037] figure 1 It is a flow chart of an embodiment of the data management method in the dual-interface encryption memory car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a double-interface encryption memory card with a USB (universal serial bus) interface and a RFID (radio-frequency identification) interface, and a management method and system of data in the double-interface encryption memory card. The management method comprises the steps that the USB interface is used for connecting with a PC (personal computer) to carry out data reading / writing, and the RFID interface is used for receiving and sending radio-frequency signal, and receiving a security command from the radio-frequency signal; the data in the card is stored after encryption; in an initialization stage, the double-interface encryption memory card generates a data key and stores the data key; in a use state, the data key in the double-interface encryption memory card is in a null state, when a first radio-frequency reading / writing device is activated in a used area, the data key is in a usable state, and the data key is used for encrypting and decrypting the data and completing the reading / writing operation; and in a destroy stage, when the double-interface encryption memory card enters a destroy area, the destroy command sent by a second radio-frequency reading / writing device is received and executed so as to destroy the stored data key. By the adoption of the scheme disclosed by the invention, the data security and data transmission speed are improved.

Description

technical field [0001] The invention relates to data processing technology, in particular to a double-interface encryption memory card, a data management method in the double-interface encryption memory card, and a data management system in the double-interface encryption memory card. Background technique [0002] In the prior art, portable storage devices such as USB flash drives are often used to transfer data conveniently and quickly. With the improvement of user requirements for data security and the continuous development of technology, in order to prevent the leakage of user data after the loss of USB flash drives, there are Several protection methods for the data in the U disk are introduced. [0003] 1) Software encryption: the U disk itself has no encryption function, and the data is encrypted by the encryption software on the personal computer (PC, Personal Computer), and then the encrypted data is stored on the U disk. [0004] 2) File hidden U disk: The files in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06K19/073G06K17/00
Inventor 荆继武林璟锵余幸杰马存庆王展
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products