Unlock instant, AI-driven research and patent intelligence for your innovation.

Data storage device, Huayi card and its information security processing method

A technology for data storage and data storage modules, applied in the fields of information storage and information security, can solve the problems of increased use complexity, hacker intrusion, and long decryption time, so as to avoid unreliable defects and improve security.

Active Publication Date: 2015-12-16
陈平 +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The external large-capacity FLASH storage chip involved in the above-mentioned patent can be packaged as an SD card, MicroSD card, MiniSD card or other mobile and portable storage devices. However, the problem is that the medical information in these mobile storage devices is not encrypted. For For patients, there is no privacy, personal information is easy to be stolen, and there are also prominent doctor-patient conflicts hidden
[0006] In the prior art, the data encryption of mobile and portable storage devices usually uses software, or uses a software-driven method to store data in a password-passing manner. However, precious data cannot be effectively kept secret through software interception or software interruption. The encryption software may instead allow viruses, Hackers invade and infect invisibly; moreover, when this mobile portable storage device is connected to the USB serial port, the user needs to install any driver before it can run, which increases the complexity of use and is not conducive to large-scale promotion
[0007] In addition, the mobile portable storage device itself can obtain a very efficient storage speed through the USB storage interface, but it uses software encryption, which leads to a long decryption time and seriously affects the data reading efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage device, Huayi card and its information security processing method
  • Data storage device, Huayi card and its information security processing method
  • Data storage device, Huayi card and its information security processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] figure 2 with image 3 Shown is a schematic structural diagram of a Huayi card provided in an embodiment of the present invention. Such as figure 2 As shown, the Huayi card provided in this embodiment includes a radio frequency card 1 and a mobile memory 2 which are separated from each other. The radio frequency card 1 is a rectangular card and constitutes the main body of the Huayi card. There is a receiving slot 11 therein. The shape of the slot 11 matches the shape of the mobile memory 2. In this embodiment, the mobile memory is a rectangular flash disk with a thickness slightly smaller than that of the radio frequency card.

[0048] Such as image 3 As shown, the mobile memory 2 is movably connected in the accommodating slot to realize a rotary connection with the radio frequency card. Rotating the mobile memory 2 clockwise can expose the communication interface to the radio frequency card 1 to facilitate connection with external devices such as a PC.

[0049] Figure ...

Embodiment 2

[0063] Such as Image 6 As shown, an information security processing method in another embodiment of the present invention includes the following steps:

[0064] Step S1: Provide a feature tag, the feature tag having an identity feature private key;

[0065] Step S2: Read the identity feature private key;

[0066] Step S3: Perform an AES operation according to the identity characteristic private key, and determine the corresponding authority to access the data by comparing the encryption key value. The identity characteristic private key is used as the main encryption key value in the AES operation.

[0067] The above-mentioned information security processing method first verifies the user's authority by the identity characteristic private key, and then encrypts the data according to the user's authority through the AES encryption operation. After such an encryption and decryption process, the corresponding data can be accessed, and the mobile storage is realized. Data encryption and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data storage device, a medical information card and an information safety processing method of the medical information card, wherein the medical information card comprises a data storage portion and an identity characteristic portion; the identity characteristic portion comprises a characteristic label with an identity characteristic private key inside; the data storage portion comprises an identity characteristic reading module, an encryption module, a data storage module and a communication interface, wherein the identity characteristic reading module is used for obtaining the identity characteristic private key in the identity characteristic portion and sending the private key to the encryption module, and the encryption module is used for conducting AES (advanced encryption standard) operation according to the identity characteristic private key and comparing encryption key values, thereby determining corresponding authorities to access the data in the data storage module. The medical information card uses the control of user authority information through radio frequency identification or fingerprint identification and the like and is combined with AES hardware to encrypt mobile storage data to realize highly reliable data encryption function. Therefore, the medical information card can conduct safety control in data reading and writing based on different user authorities without being connected to a user authentication server.

Description

Technical field [0001] The present invention relates to the technical field of information storage and information security, in particular to a medical information card and its information security processing method. Background technique [0002] The rapid development of information technology has brought great convenience and unprecedented innovation to all areas of people's daily lives. At present, the electronic medical insurance card widely used in the medical industry contains information such as the patient's name, age, social insurance number, and medical insurance account, gradually replacing the cumbersome medical insurance reimbursement procedures and paper forms. [0003] However, patients still have many inconveniences in the process of seeking medical advice, such as DR (Digital Radiography, direct digital X-ray photography system), CT (electronic computer X-raytomography technology, short for electronic computer X-ray tomography technology) and other medical imaging i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/073
Inventor 陈平魏如隆
Owner 陈平