Secure storage device

A technology for safe storage and equipment, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of insufficient data encryption key transmission means, no data transmission security measures, etc. Effects of data leakage

Active Publication Date: 2014-12-24
POTEVIO INFORMATION TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The protection of data by the storage system is limited to the security of stored data, and there are n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0058] The first embodiment is: (1) The server module 102 supports Hypertext Markup Language 5 (HTML5) or an earlier version of HTML. The server module 102 can support various file operations in addition to generating traditional pages; (2) When the user When the local computer accesses the storage, it is completed through the HTML browser, and the server module 102 receives the file access request sent by the user's local computer through the HTML browser; when the user's local computer opens the file on the storage, it is equivalent to the server module 102 completing a series of operations , And display the operation results in the form of HTML5 objects or HTML pages.

Example Embodiment

[0059] The second embodiment is: (1) the server module 102 is an X-server, and the user's local computer issues a file access request through x-client or RDP; (2) when the user's local computer accesses the memory, the local X-client will be started. All operations are completed by the processor on the memory, and the user's local computer only displays the graphical results after the processing is completed. Among them, X-server means that the server is a device that supports the client to access through the graphics protocol, and the X-client terminal interacts with the server through the graphics protocol.

[0060] In addition, if the method of X-Server or HTML Server is not used, the server module 103 can be realized by starting a server software program on the secure storage. At the same time, the storage provides a client program that can be obtained by the user's local computer. The server module interacts. The client program can communicate with the server through secure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure storage device which comprises an interface module, a server module, an encryption algorithm module, an encryption strategy management module, a recognition module and a storage medium module. The server module is used for providing an operating system and file processing programs of the storage device, receiving file access requests from a local computer of a user, converting operation results into images, and transmitting the images to the local computer of the user through the interface module. The encryption algorithm module is used for extracting an encryption strategy from the encryption strategy management module, adopting the encryption strategy to carry out encryption on files according to random seeds formed by the recognition module and file characteristic information and then storing the files in the storage medium module and is also used for adopting the encryption strategy to carry out decryption on the files stored in the storage medium module according to encryption seeds formed by the recognition module and the file characteristic information. The recognition module is used for receiving information input by the user to generate the random seeds which are used as initial indexes of other secret keys.

Description

technical field [0001] The present application relates to the field of computer and storage technologies, and in particular to a safe storage device. Background technique [0002] In a computer system, the storage system, as an important place for code execution and data storage, plays an important role in realizing computing security; at the same time, the storage system is often the most vulnerable place to be attacked. Storage systems mainly include the following categories: [0003] Cache (Cache): Processor on-chip cache memory; [0004] Main memory: off-chip random access memory memory of the processor; [0005] Peripheral storage devices, typical devices include hard disk, U disk, etc.; [0006] Network storage devices: Typical devices include network attached storage (NAS), server storage, cloud storage, etc. [0007] From an attacker's point of view, attacking the processor is difficult (usually physically attacking the processor chip is not feasible for most att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78
CPCG06F21/6209G06F21/78G06F2221/2107
Inventor 李庆华
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products