Data storage device, medical information card, and information safety processing method of medical information card
A data storage and data storage module technology, applied in the field of information storage and information security, can solve problems such as increasing the complexity of use, hacking, and long decryption time, and achieve the effect of avoiding unreliable defects and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] figure 2 with image 3 Shown is a schematic structural diagram of the Huayi card provided by the embodiment of the present invention. Such as figure 2 As shown, the Huayi card provided in this embodiment includes a radio frequency card 1 and a mobile memory 2 which are separated from each other. The shape of the slot 11 matches the profile of the mobile memory 2. In this embodiment, the mobile memory is a rectangular flash drive with a thickness slightly smaller than that of the radio frequency card.
[0048] Such as image 3 As shown, the mobile memory 2 is movably connected in the accommodating slot, and is rotatably connected with the radio frequency card. Rotating the mobile memory 2 clockwise can expose the communication interface to the outside of the radio frequency card 1, so as to facilitate connection with external devices such as a PC.
[0049] Figure 4 The functional module composition diagram of the Huayi card is provided for the embodiment of the p...
Embodiment 2
[0063] Such as Image 6 As shown, an information security processing method in another embodiment of the present invention includes the following steps:
[0064] Step S1: Provide a feature tag, the feature tag has an identity feature private key;
[0065] Step S2: Read the identity characteristic private key;
[0066] Step S3: Perform AES operation according to the identity characteristic private key, and compare the encrypted key value to determine the corresponding authority to access data, and the identity characteristic private key is used as the main encryption key value in the AES operation.
[0067] The above-mentioned information security processing method first uses the identity characteristic private key to verify the user authority, and then encrypts the data according to the user authority through AES encryption operation. After such encryption and decryption process, the corresponding data can be accessed, and at the same time, the mobile storage Data encryption...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 