Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing method based on radio frequency identification

An information processing method and radio frequency identification technology, applied in the direction of digital data authentication, etc., can solve problems such as difficult equipment monitoring, no solution proposed, and no restriction on the use of legitimate user equipment, so as to reduce the risk of information leakage and encrypt storage reliable effect

Inactive Publication Date: 2015-05-20
成都布林特信息技术有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the technical solution for the storage system, encrypted storage and user authentication are mainly used to ensure that the information in the system is not stolen by illegal users, but there is no restriction on the use of equipment by legitimate users
In some solutions for restricting the use environment of equipment, the access of equipment to the host computer is restricted by installing corresponding software modules or hardware modules in the host computer, but such solutions are not easy to monitor the use of equipment
[0003] Therefore, for the above-mentioned problems existing in related technologies, effective solutions have not yet been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method based on radio frequency identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0013] The present invention describes a secure RFID-based stored data processing method that ensures authorized use, encrypted storage, and reliable deletion of the storage system, thereby being able to control the safe use area of ​​t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information processing method based on radio frequency identification. The method includes the steps: encrypting and storing all files in a system, and encrypting and decrypting the files apparent to a user performing reading and writing operations; uniformly setting a user name and passwords when initializing each storage system, and authenticating a user's identity in the access process; encrypting the files by a file private key, only presenting the file of the user and performing access control after identity authentication; authenticating the access level of an upper computer according to level signals of a detection pin on a USB (universal serial bus) socket when the storage systems access the upper computer; deploying an RFID (radio frequency identification) reader-writer at an exit of a controlled area when the upper computer is legally accessed, ensuring that the system can only perform normal reading and writing when accessing the legal upper computer in the controlled area, and deleting the stored private key if the system is taken out of the controlled area. By RFID processing, authorized use, encrypted storage and reliable deletion of the storage systems are ensured, so that safety use areas of the storage systems can be strictly controlled, and the risk of information leakage is reduced.

Description

technical field [0001] The invention relates to radio frequency identification, in particular to an information processing method based on radio frequency identification. Background technique [0002] In recent years, storage systems such as U disks and flash disks have been widely used in enterprise organizations as a flexible and fast storage medium. If insiders take out the storage system containing these sensitive information and use it externally, there is a risk of inadvertent disclosure of sensitive information. At present, in the technical solution for the storage system, encrypted storage and user authentication are mainly used to ensure that the information in the system is not stolen by illegal users, but it does not restrict legitimate users from using the device. In some solutions for restricting the use environment of equipment, the access of equipment to the host computer is restricted by installing corresponding software modules or hardware modules in the ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/35
Inventor 张鹏
Owner 成都布林特信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products