U disc capable of being encrypted and encryption method thereof

An encryption method and data encryption technology, applied in digital data protection, internal/peripheral computer component protection, preventing unauthorized use of memory, etc., can solve computer host infection, password theft, and illegal reading of encrypted files in U disks and other issues, to achieve the effect of eliminating cumbersome steps and potential safety hazards

Active Publication Date: 2015-09-30
HARBIN ANTIY TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defect of this design is that the software needs to be installed on a computer using a USB flash drive, which is inconvenient (operation in front of others) and unsafe
And for any computer host operating environment (including operating system, processor instruction architecture) software that uses a U disk, the corresponding version must be provided, otherwise the encryption function of the U disk cannot be used
And when you only need to import files, you also need to enter the password of the U disk. The password may be stolen because the password is peeked, or the computer host using the U disk is infected with a virus or a Trojan horse, which will cause the encrypted file of the U disk to be illegally read. Pick
[0003] For the analysis of the above-mentioned prior art, the inventor believes that under the comprehensive consideration that the USB flash drive is used to enter files into the encrypted area on other people's machines, and others borrow the USB flash drive to copy files, the prior art is still not safe and convenient enough, which also makes The development of secure U disk products needs to provide multiple tool software versions across platforms, which increases the workload of software development and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • U disc capable of being encrypted and encryption method thereof
  • U disc capable of being encrypted and encryption method thereof
  • U disc capable of being encrypted and encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention provides a specific embodiment of an encryptable U disk and its encryption method, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and methods of the present invention The advantages can be more obvious and easy to understand, and the technical solution in the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0032] The present invention firstly provides a kind of encryptable U disk, such as figure 1 As shown, it includes: USB interface 101, U disk control module 102, storage module 103, virtual file allocation and sector remapping module 104 and data encryption module 105:

[0033] The U disk control module 102 is used for data monitoring and processing of the virtual file distribution and sector remapping module 104 and the data encryption module 105, ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a U disc capable of being encrypted. The U disc comprises a U disc control module used for data monitoring and processing, a storage module used for data storage, a virtual file distribution and sector remapping module used for generating a disc distribution list, and a data encryption module used for encryption processing of sent files, the disc distribution list comprises a common catalog and a preset interface catalog, and when it is detected that a host has write-in operation aiming at the preset interface catalog, the files are sent to the data encryption module. According to the U disc capable of being encrypted, the defect that the operation of special application software is needed during file copying is overcome, the input of passwords is not required, complicated and inconvenient operation of mounting an encryption partition etc. is not needed, and encryption storage of the files can be realized.

Description

technical field [0001] The invention relates to a mobile storage device, in particular to an encryptable U disk and an encryption method thereof. Background technique [0002] At present, U-disk is very common as a mobile storage device. With the popularization of U-disk applications and the development of technology, its security and confidentiality requirements have gradually attracted attention. The following is the existing typical encrypted U-disk security Technology, the core is to divide the U disk into a confidential area and a non-confidential area, store sensitive files in the confidential area, and store non-sensitive files in the non-confidential area. For access to the confidential area, you need to install special software on the access computer and run this software, enter the password to access. The defect of this design is that the software needs to be installed on a computer using a USB flash drive, which is inconvenient (operation in front of others) and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/62G06F21/79
Inventor 桑胜田肖新光
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products