Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

A storage space and computer technology, applied in internal/peripheral computer component protection, digital data protection, etc., can solve problems such as not providing users with encryption/decryption operation interface

Active Publication Date: 2013-07-10
SHENZHEN C-DATA TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The encryption / decryption software technology in the prior art usually only implements the above-mentioned encryption / decryption in the form of files, but does not provide users with an encryption / decryption operation interface for specific functional requirements. For example, users often directly save user names, account numbers, passwords, and URLs information, personal note information, etc.
In addition, for how to backup and restore core data such as user data information, passwords, and encryption / decryption keys, the existing technologies do not provide better security and usability methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key
  • Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key
  • Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] Further details will be given below in conjunction with various embodiments shown in the accompanying drawings.

[0073] The present invention proposes a method for establishing an encryption / decryption storage space by means of a peripheral key of a personal computer, such as figure 1 As shown, the method is based on a personal computer, and an external hardware device 4 that is independent of the personal computer and has storage capacity; the personal computer includes a host 1, an input device and an output device, and a central A processor CPU 11, and a hard disk 12 storing an operating system and data therein. In the first embodiment of the present invention, the input devices are a keyboard 31 and a mouse 32 , which are electrically connected to the host 1 through the interface 14 . The output device adopts a display screen 2, which is electrically connected to the graphics card 13 in the host computer 1 through an interface, and the graphics card 13 completes d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for establishing encrypted / decrypted storage space by virtue of a personnel computer external secrete key is based on a personnel computer and an external hardware device where a secrete key is stored. The method comprises the following steps: mounting a data filter screen type encryption / decryption driving function on an upper bottom layer of an internal operating system of the personnel computer; establishing encrypted data storage partitions in available data storage space detected by the operating system; after the external hardware device is electrically connected with the personnel computer, mounting the encrypted data storage partitions in the operating system; and after the external hardware device is electrically disconnected from the personnel computer, demounting the encrypted data storage partitions from the operating system, and encrypting / decrypting data interactively of the encrypted data storage partitions. The method realizes isolation of the secrete key from the encrypted data as well as isolation of the common data from the encrypted data, enhances the crypticity of the encrypted data, and ensures the security of the encrypted data.

Description

technical field [0001] The present invention relates to data encryption / decryption in electronic data storage devices, in particular to data encryption / decryption in electronic data storage devices that need to be stored by personal computers. Background technique [0002] In more and more cases, it is necessary to perform encryption / decryption processing on data in a data memory related to a personal computer. The personal computer includes a minicomputer, a portable computer and a palmtop computer, and the minicomputer includes a host computer, an input device and an output device. The host is provided with a main board, and the main board is electrically connected to a central processing unit CPU, a hard disk for storing an operating system and data, and an interface. Common input devices are keyboard and mouse, and common output devices are monitors. The portable computer synthesizes a host display, a keyboard and a mouse into an integrated device that is easy to carry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/78
Inventor 马国强
Owner SHENZHEN C-DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products