Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal

A technology of mobile storage and design method, applied in the field of information, can solve the problems of unauthorized file hiding, inaccessibility, unrecognizable security mobile storage, etc.

Active Publication Date: 2013-11-13
GREATER BAY AREA STAR BIOTECH (SHENZHEN) CO LTD
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. Unauthorized secure mobile storage is unrecognizable
[0009] 3. Unauthorized files are hidden and inaccessible
[0010] This authorization method is that after the secure mobile storage is inserted into the computer, the secure mobile storage can be recognized by the computer, and the computer can also write files to the secure mobile storage, but at this time all the files and directories previously existing in the secure mobile storage are hidden, and the computer cannot Check it out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
  • Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
  • Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] see figure 1 , the design method of the secure mobile storage controller using wireless terminal authorization authentication and encryption and decryption in the present invention consists of two parts, the first is a secure mobile storage controller 1, and the second is a wireless authorized terminal 2. If the secure mobile storage controller is regarded as the first party, and the access computer 3 is regarded as the second party, then the wireless authorized terminal is used as a third-party device, and the basic idea of ​​the present invention is to introduce a third-party device—a wireless authorized terminal—to authenticate Authorize the access of the computer to the secure mobile storage controller, as well as the file encryption and decryption function and other security functions when the secure mobile storage controller reads out the file. At this time, for the owner of the safe mobile storage controller, it is not necessary to directly face the embarrassment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a design method for a safe and mobile storage controller authorized and encrypted / decrypted by a wireless terminal. The design method comprises a safe and mobile storage controller (1) and a wireless authorization terminal (2), wherein the safe and mobile storage controller (1) further comprises a wireless module (1.1), a safety module (1.2), an encryption / decryption module (1.3), a storage control module (1.4), a computer interface (1.5), a storage interface (1.6) and a storage carrier (4); and the wireless authorization terminal (2) comprises a wireless terminal system (2.1) and safety software (2.2). The safety software (2.2) on the wireless authorization terminal (2) realizes nine novel functions including the setting of a permission state, the finding and displaying, encryption / decryption and authorization of file names and menus, and the encryption / decryption of file contents when a computer accesses the safe and mobile storage controller (1), the backup and / or the encryption and backup of data and files between the safe and mobile storage controller (1) and the wireless authorization terminal (2), self-destruction protection of anti-cracking files of the safe and mobile storage controller (1) and the like.

Description

technical field [0001] The invention relates to the field of information technology, in particular to the subdivision field of security products, in particular to a design method of a secure mobile storage controller using a wireless terminal to authenticate terminal authorization and encrypt and decrypt. Background technique [0002] At present, mobile storage devices with USB storage, SATA storage and various memory cards as the mainstream have become very popular. From a technical point of view, whether it is UBS storage, SATA storage or various memory cards, it is a Device side, not a Host side. According to the standard definition of USB and SATA, the work is initiated by the host end actively, and the device end can passively receive, the host end is the master, and the device end is the slave end. Although OTG technology supports the application between USB Devices when there is no Host, after all, it has not changed the status quo that the U disk is a passive Device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/70
Inventor 丁贤根
Owner GREATER BAY AREA STAR BIOTECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products