A storage device capable of remotely deleting data and its use method

A storage device and data deletion technology, which is applied in digital data authentication, electronic digital data processing, computer security devices, etc., can solve the problems of inability to guarantee the safety of storage devices, failure to retrieve U disks, loss of storage devices, etc., to prevent Effects of data theft, increased likelihood, ease of use

Active Publication Date: 2018-02-06
HEBEI UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of science and technology, mobile storage devices, especially USB storage devices, have become the main tool for people to store information because of their small size, large storage capacity, and portability. Every moment there will be problems with storage device loss
[0003] Although there are many methods to ensure the security of storage devices, such as cryptographic technology for software encryption of storage devices; or the use of environmental awareness technology to make storage devices run or destroy in specific environments; Peng Dong et al. Technology Research and Implementation" combines encryption technology and access control technology to prevent the leakage of U disk information, but it cannot retrieve the U disk
This kind of method has certain limitations, if there is encryption, there will be decryption, and the encryption method alone cannot guarantee the security of the storage device; however, the environment awareness technology is limited by the location, and the storage device can only be used in a specific location, making The use of storage devices has significant limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A storage device capable of remotely deleting data and its use method
  • A storage device capable of remotely deleting data and its use method
  • A storage device capable of remotely deleting data and its use method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described below in conjunction with the accompanying drawings, but this should not be used as a limitation to the protection scope of the claims of the present invention.

[0020] figure 1 The example shown shows that, figure 1 Inside the middle dotted line frame is the storage device (abbreviated as the storage device) of the present invention that can delete data remotely, including the control unit 2 and the execution unit 1, the control unit 2 is a preset mobile phone that communicates with the execution unit 1, and the execution unit 1. Receive the command sent by the control unit 2; the execution unit 1 includes a dual-serial single-chip microcomputer 102, a GSM module 101, a GPS module 107, a USB read-write module 104, a storage device 109, and an EEPROM (Electrically Erasable Programmable Read-Only Memory) 105 , lithium battery 108, password lock 103 and tri-state gate circuit 106; described dual serial port single-chip mic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a memory device capable of remotely deleting data and a use method thereof. The memory device is characterized in that the memory device comprises a control unit and an execution unit, wherein the control unit is a preset mobile phone which is communicated with the execution unit; the execution unit receives an instruction sent from the control unit and comprises a double-serial-port single chip microcomputer, a GSM (Global System for Mobile Communications) module, a GPS (Global Positioning System) module, a USB (Universal Serial Bus) reading and writing module, memory equipment, an EEPROM (Electrically Erasable Programmable Read-Only Memory), a lithium battery, a coded lock and a triple gate circuit, wherein the double-serial-port single chip microcomputer serves as a central processing chip to communicate with the GSM module through a first serial port; the double-serial-port single chip microcomputer is connected with the GPS module through a second serial port; the double-serial-port single chip microcomputer is connected with one end of the USB reading and writing module through a parallel port; the other end of the USB reading and writing module is connected with the memory equipment; the double-serial-port single chip microcomputer is connected with the EEPROM through an I2C (Inter-Integrated Circuit) bus; the double-serial-port single chip microcomputer is connected with the lithium battery through A/D conversion; and the lithium battery supplies power to the whole execution unit.

Description

technical field [0001] The invention relates to a storage device capable of remotely deleting data and a usage method thereof. Background technique [0002] With the development of science and technology, mobile storage devices, especially USB storage devices, have become the main tool for people to store information because of their small size, large storage capacity, and portability. Every moment there is a problem of storage device loss. [0003] Although there are many methods to ensure the security of storage devices, such as cryptographic technology for software encryption of storage devices; or the use of environmental awareness technology to make storage devices run or destroy in specific environments; Peng Dong et al. Technology Research and Implementation" combined encryption technology and access control technology to prevent the leakage of U disk information, but it was not possible to retrieve the U disk. This kind of method has certain limitations, if there i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/88G06F21/78G06F21/30
CPCG06F21/305G06F21/78G06F21/88G06F2221/2143
Inventor 戴士杰李洋王瑞钦
Owner HEBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products