Unlock instant, AI-driven research and patent intelligence for your innovation.

File storage and access method allowing card reader to accept user's validations directly

A file storage and access method technology, applied in the field of information security protection, can solve the problems of authorization and access authorization mechanism loopholes, and the card reader cannot be restricted, and achieves the effect of avoiding automatic operation, reasonable steps, and improving confidentiality.

Active Publication Date: 2015-04-29
ZHEJIANG YUANWANG SOFTWARE
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies of the above-mentioned prior art and provide a file storage and access method in which the card reader directly accepts user confirmation, which aims to solve the problem that the card reader in the prior art cannot limit file access and storage The confidentiality of the internal data of the device is not strong, there are loopholes in the access authorization mechanism, and technical problems that cannot directly accept user authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File storage and access method allowing card reader to accept user's validations directly
  • File storage and access method allowing card reader to accept user's validations directly

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the objectives, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below through the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described herein are only used to explain the present invention, and not to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.

[0031] see figure 1 , an embodiment of the present invention provides a file storage and access method that is directly confirmed by a card reader by a user. The dedicated file transfer software and the hardware platform used to interact with the user and run the dedicated file transfer software, the storage disk is provided with a storage area for storing the destination file and the encryption and acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information safety protecting method and discloses a file storage and access method allowing a card reader to accept user's validations directly. The method is based on the card reader comprising a control chip inside, a storage disk connected to the card reader in a communicating manner, special file transfer software managing the storage disk and a hardware platform used for interacting with a user and operating the special file transfer software. According to the method, the card reader has the function of limiting file accessing, the access authority of the hardware platform to a storage area is controlled in the operation range for each time, and the hardware platform is compatible with the existing data encryption storage disk; an input component allowing a user to use is arranged additionally, file access authorization can be operated in a processing chip independent to the hardware platform, Trojans and other viruses are prevented from controlling the hardware platform to operate automatically, and the confidentiality of mobile storage equipment is improved greatly.

Description

【Technical field】 [0001] The invention relates to a method for protecting information security, in particular to a file storage and access method in which a card reader directly accepts user confirmation. 【Background technique】 [0002] Ordinary mobile storage devices or memory cards are cheap and widely used, but when this device is connected to a computer, the internal data is directly opened to the computer in the form of data blocks for users to access. Therefore, it is easy for a third person or virus to steal data. Storage devices that have added data encryption or password authorization functions still cannot solve the problem of data theft. The reason is that once the user passes the password verification, the computer will gain access to all the data in the storage device, so that the virus can obtain all the data in the device. [0003] Therefore, in order to solve the problem that the data confidentiality of common mobile storage devices or memory cards is not str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/62G06F21/78
CPCG06F21/34G06F21/602G06F21/78G06F2221/2107G06F2221/2141
Inventor 傅如毅
Owner ZHEJIANG YUANWANG SOFTWARE