Data storage device, Huayi card and its information security processing method
A technology for data storage and data storage modules, applied in the fields of information storage and information security, can solve the problems of increased use complexity, hacker intrusion, and long decryption time, so as to avoid unreliable defects and improve security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] figure 2 with image 3 Shown is a schematic structural diagram of a Huayi card provided in an embodiment of the present invention. Such as figure 2 As shown, the Huayi card provided in this embodiment includes a radio frequency card 1 and a mobile memory 2 which are separated from each other. The radio frequency card 1 is a rectangular card and constitutes the main body of the Huayi card. There is a receiving slot 11 therein. The shape of the slot 11 matches the shape of the mobile memory 2. In this embodiment, the mobile memory is a rectangular flash disk with a thickness slightly smaller than that of the radio frequency card.
[0048] Such as image 3 As shown, the mobile memory 2 is movably connected in the accommodating slot to realize a rotary connection with the radio frequency card. Rotating the mobile memory 2 clockwise can expose the communication interface to the radio frequency card 1 to facilitate connection with external devices such as a PC.
[0049] Figure ...
Embodiment 2
[0063] Such as Image 6 As shown, an information security processing method in another embodiment of the present invention includes the following steps:
[0064] Step S1: Provide a feature tag, the feature tag having an identity feature private key;
[0065] Step S2: Read the identity feature private key;
[0066] Step S3: Perform an AES operation according to the identity characteristic private key, and determine the corresponding authority to access the data by comparing the encryption key value. The identity characteristic private key is used as the main encryption key value in the AES operation.
[0067] The above-mentioned information security processing method first verifies the user's authority by the identity characteristic private key, and then encrypts the data according to the user's authority through the AES encryption operation. After such an encryption and decryption process, the corresponding data can be accessed, and the mobile storage is realized. Data encryption and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 